Speakers @

IDM uk

Identity Management

9 November 2021

Brought to you by Whitehall Media

Speakers @ IDM uk

Featured Speakers

Extensive research is carried out in order to ensure that our programmes provide a platform for industry experts from the worlds most data driven organisations are able to address the most important issues which matter to you and provide a path towards greater success

Keynote Speaker
Steve Furnell
Professor of Cyber Security, University of Nottingham

Steven Furnell is a professor of cybersecurity at the University of Nottingham in the United Kingdom.

He is also an Adjunct Professor with Edith Cowan University in Western Australia and an Honorary Professor with Nelson Mandela University in South Africa.
His research interests include usability of security and privacy, security management and culture, and technologies for user authentication and intrusion detection. He has authored over 340 papers in refereed international journals and conference proceedings, as well as various books and books chapters.

Professor Furnell is the current Chair of Technical Committee 11 (security and privacy) within the International Federation for Information Processing, as well as the editor-in-chief of Information and Computer Security, and a board member of the Chartered Institute of Information Security.

Keynote Speaker
Megha Rastogi
Lead Product Manager, Machine Learning & Identity Access Management, SurveyMonkey

Megha Rastogi is a product leader with more than a decade of experience building innovative products at leading global companies, like Expedia, Yahoo, Verizon, SurveyMonkey.

Currently, she is a Lead Product Manager at SurveyMonkey managing ML-powered insights and unifying Identity and Access Management across SurveyMonkey products.

Prior to SurveyMonkey, she was a Senior Product Manager at Asurion where she bought to market a mobile security app and a digital health product.

Before that, she has worked as a Global Product Manager at Expedia, helping the needs of business travellers.

She has also led product strategy for emerging markets at Yahoo and worked to understand the needs of users around the world.

She graduated from Cornell University with her Bachelor and Master of Engineering in Computer Science and studied Management at Harvard University Extension School.

Keynote Speaker
Stefan Bosnjakovic
External IAG architect, Hilti AG

The emphasis of my professional activity during the last fifteen plus years was on IAM
(Identity and Access Management) and GRC (Governance, Risk and Compliance)
projects, driven by the clients’ needs to comply with regulatory demands and close
audit findings, complemented by related project activities incl. SoD (Segregation of
Duties) methodology development, RE (Requirement Engineering), RM (role modelling
and design of standardised access- and role-models), onboarding and full integration of
complex business application suits into the corporate IAM-frameworks, WM (workflowand associated process modelling) and BPAM (business process analysis and
modelling), applying relevant security norms (ISO27000, Cobit, MaRisk, ITGrundschutz, etc.) and regulatory requirements (EU (GDPR), ECB, SOx, MAS, FFIEC,
BaFin (BAIT, VAIT, KAIT), BuBa, FinMA, BoE, etc.).

In addition to pure IAG issues, I am also working on general IT-security related aspects
like HPAM (High Privileged Access Management), SSO (Single-Sign-On), CM (Cloud
Migration), Firewall and VPN to complete an IAG framework.

Rounded-up by communication, coordination and setting up train-the-trainer schemes
with HR, relevant business and specialist departments.

Keynote Speaker
Kumud Dubey
Senior ASIC Verification Engineer, Boeing

With over 18 years of experience in the software industry with leading MNCs like Alcatel Lucent, Mentor Graphics and Cadence Design Systems, Kumud has been a part of senior management and recognised as a thought leader within these organizations.

At present, she is working with Boeing India as a Senior ASIC Verification Engineer.

Being a prominent speaker and a well sought-after name in national and international conferences, she has been regularly quoted in Indian print and digital media on global issues. She has been invited by various Indian government bodies, including its defence forces to train their cyber workforce.

Along with her team, she has devised and conducted various events for capacity building and cyber safety awareness in association with state police departments and UNICEF.

She has supported various government initiatives in their technical reviews and audits, especially the smart city initiatives of the Government of India.
She has been involved actively in the Cadence Design System for solving complex design problems using Machine Learning Algorithms.

Seminar Speaker
Kevin Bocek
Vice President, Security Strategy and Threat Intelligence, Venafi

Kevin Bocek is responsible for security strategy and threat intelligence at Venafi. He brings more than 16 years of experience in IT security with leading security and privacy leaders including RSA Security, Thales, PGP Corporation, IronKey, CipherCloud, nCipher, andXcert. He is sought after for comment by the world’s leading media such as Wall Street Journal, New York Times, Washington Post,Forbes, Fortune, BBC, Süddeutsche Zeitung, USA

Keynote Speaker
Jamie Hughes
CIAM Product Manager, Beyond Identity

Senior Solutions Engineer at Beyond Identity. Jamie has spent the last 5 years working for early stage Identity and Access Management companies helping to drive success in the EMEA region. Software/DevOps Engineering background now advising and enabling clients on all things identity with a strong focus on Consumer Identity Management.

Keynote Speaker
Dr Gilad Rosner
Founder, IoT Privacy Forum; Expert in Public Policy of IoT & Identity Management; Privacy and Technology Policy Researcher

Dr Gilad Rosner is a privacy and information policy researcher and the founder of the non-profit Internet of Things Privacy Forum, a crossroads for industry, regulators, academics, government and privacy advocates to discuss the privacy challenges of the IoT. The Forum’s mission is to produce guidance, analysis and best practices to help industry and government to reduce privacy risk and innovate responsibly in the domain of connected devices.

Gilad’s broader work focuses on the IoT, identity management, US & EU privacy and data protection regimes, and online trust. His research has been used by the UK House of Commons Science and Technology Committee report on the Responsible Use of Data and he is a featured expert on O’Reilly and the BBC. Gilad is an internationally invited speaker and has given talks at industry conferences, universities, and government agencies, including the US National Institute of Standards and Technology. Gilad has a 20-year career in IT, having worked with identity management technology, digital media, automation and telecommunications.

Gilad is a member of the UK Cabinet Office Privacy and Consumer Advisory Group, which provides independent analysis and guidance on Government digital initiatives and is a member of the IEEE Global Initiative for Ethical Considerations in Artificial Intelligence and Autonomous Systems. He is a Visiting Researcher at the Horizon Digital Economy Research Institute, an Affiliate Researcher at UC Berkeley’s Centre for Long-Term Cybersecurity and has consulted on trust issues for the UK government’s identity assurance programme, Verify.gov.

Seminar Speaker
Domanic Smith-Jones
Solution Engineer, Auth0

An ‘SE’ at Auth0 works alongside the sales team through various types of practical engagement to help prospects understand their business problems, and in turn, transform them into elegant solutions. With over a decade of experience in IT spanning from software development to solution selling and implementation, Domanic has built his skills across industries during roles at IBM as a Software Engineer and OpenText in Professional Services and Solution Consulting.

Seminar Speaker
James Maude
Lead Cyber Security Researcher, BeyondTrust

James Maude is the Lead Cyber Security Researcher at BeyondTrust. James has broad experience in security research, conducting in-depth analysis of malware and cyber threats to identify attack vectors and trends in the evolving security landscape. His background in forensic computing and active involvement in the security research community makes him an expert voice on cybersecurity. He regularly presents at international events and hosts webinars to discuss threats and defense strategies.

 

 

Keynote Speaker
Richard Bird
Chief Customer Information Officer, Ping Identity

Richard Bird is the Chief Customer Information Officer for Ping Identity. He is a cyber security veteran, a former chief information security officer and a former chief information officer. An internationally recognized data privacy and identity-centric security expert and global speaker, Richard presents regularly across 5 continents. He is a Forbes Tech council member and has appeared on Bloomberg Business and Yahoo Finance and is frequently quoted by Wall Street Journal, CNBC, Bloomberg, The Financial Times, Business Insider, CNN, and Fox News on topics ranging from data privacy regulations to cybersecurity enabled consumer protection. He is also the host of the podcast “Hello, USER”. Richard is widely known for wearing bow ties and while he probably isn’t the most tattooed person in cyber security today, he at least has to be in the top 5%.

 

Seminar Speaker
Robert Byrne
Field Strategist, One Identity

Rob Byrne, a field strategist at One Identity, has worked in IT for more than 20 years in various roles – including development, consulting and technical sales – the majority of his career has focused on identity management. Prior to joining Quest, Rob worked for Oracle and Sun Microsystems.

Keynote Speaker
Karl Lankford
RVP Solutions Engineering, BeyondTrust

Karl Lankford is the Regional Vice President, Solutions Engineering for BeyondTrust, where he has worked for 7 years. A highly capable security leader, Karl has acquired a wide range of security experience and knowledge over the last decade, working across multiple industries. Karl is a regular speaker at industry conferences, delivering disruptive technical and strategic thought-leadership insight to the international cybersecurity community.

Keynote Speaker
Hans-Robert Vermeulen
Identity Strategist, SailPoint

Hans-Robert Vermeulen brings over 20 years of experience in the broader Governance and Identity and Access Management space, ranging from consultancy and advisory work to technical pre-sales, Hans-Robert has a wealth of experience and understands the underlying business issues and complexity associated with the security and Identity Governance challenges that businesses face in today’s complex market. Hans-Robert is the Identity Strategist in EMEA. He has been with SailPoint for over nine years and was a part of the original team that built out the European region and Eastern Europe territories.

Keynote Speaker
Craig Ramsay
Senior Solution Consultant, Omada

Craig has a wealth of experience within Identity, primarily focused around IAM and IGA. He has worked at financial institutions helping them set up and run their identity functions before moving to the vendor side into Professional Services and now a Senior Solution Consultant at Omada.

He has strong experience in User Lifecycle Management; Role Management; Violation Management and Identity Strategy with knowledge of complimentary Identity technologies such as PAM, DAG, CIEM and others. Craig is based out of Edinburgh, Scotland.

Seminar Speaker
Marcus Idle
Head of External Identity, ThirdSpace

Marcus is an expert in Microsoft’s Azure AD B2B and B2C technologies, and is passionate about bringing cloud and external identity to life to solve organisational challenges. Prior to starting his current role, Marcus was previously a Technical Architect, building solutions for the public sector based on Microsoft Dynamics. Before that, he built CRM tools for membership organisations. In his spare time, he is always ready to play tennis, and will even indulge in the occasional game of ping pong.

Keynote Speaker
Tim Bedard
Senior Product Marketing Director, ForgeRock

Tim is Sr. Director of Product Marketing at ForgeRock and is responsible for the company’s identity management, identity governance and autonomous identity solutions. He is a cybersecurity expert who has held leadership positions in product strategy, product management, and marketing at leading security organisations, including: SailPoint Technologies, RSA Security and CA Technologies. Tim is an active security evangelist at industry leading trade shows and in his free time works towards becoming a scratch golfer!

Keynote Speaker
Michael Bunyard
Head of Marketing, IAM, WSO2

Michael Leads WSO’s Identity and Access marketing efforts. Prior to WSO2, Michael was the Program Director of IBM Security’s IAM Product Marketing team, in addition to leading Product Marketing for Mobile Security, Data Security, and Fraud. Michael has over 20 years of experience, and has led Product Marketing and Product Management for several software companies focused on enterprises. Michael holds an MBA in Management from St. Mary’s University in California.

Keynote Speaker
Saru Tumuluri
India Ambassador, Women in Identity

Saru Tumuluri is the CEO of Khosla Labs and is currently focused on scaling Veri5Digital, a leading Global Digital Identity and Customer On-Boarding SaaS platform from India.

With over two decades of experience pertaining to entrepreneurship in India and the United States, Saru is focused on bringing new technology-driven opportunities to entrepreneurs, with an aim to solve large-scale problems in India and across the globe.

Saru is currently the country Ambassador for Women in Identity (WiD), a registered non-profit membership organisation, run by volunteers whose purpose is to champion a more diverse workforce, inclusive of all, to enter, and work, and advance in the growing industry of Digital Identity.

Seminar Speaker
Chris Owen
Director of Product Management, Saviynt

Chris is currently responsible for helping to drive Saviynt’s product innovation, roadmap, go-to-market messaging and competitive intelligence. 

 

He has acquired a wealth of experience in Identity & Access Management (IAM) and Privileged Access Management (PAM) over a 15-year career in various technical and leadership roles at Quest / One Identity, CyberArk, BeyondTrust and Centrify.

 

Chris began his career as a technical lead of one of the largest transformation projects in Europe at that time.

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Authentication v Authorisation
Authentication. Authorization. It’s all just logging in right? Are they essentially the same thing? Although some may use the terms interchangeably, they are actually very different concepts and understanding how they differ is important for anyone in the security space. In the most simplistic terms, authentication is the process of ensuring the user is who...
Introducing Code Commit Signing to Secure Your SDLC
In today’s model of distributed software in the cloud, engineering teams are developing, building, and delivering all the time. Plus, with continuous integration and continuous delivery (CI/CD) pipelines, there are no stopping points for manual security checks. Once the entire build is complete, it’s even more difficult, time-consuming, and resource-intensive to check the entire build...
The history and future of passwords
The inception of passwords in the 1960s changed the digital world as we know it. Passwords are now an unconscious standard practice in the lives of most, and from your first pet to the street you grew up on, they are deeply ingrained in our minds. The first passwords introduced the concept of authentication to cybersecurity, or...