Speakers @

IDM uk

Identity Management

8 November 2022

London

Speakers @ IDM uk

Featured Speakers

Extensive research is carried out in order to ensure that our programmes provide a platform for industry experts from the worlds most data driven organisations are able to address the most important issues which matter to you and provide a path towards greater success

Previous Speaker
Gavin Brown
Sales Director UK, iC Consult UK

Gavin has 20 years of experience working with customers to enable the benefits of IAM and Cloud solutions.  As iC Consult’s Sales Director for UK and Ireland, Gavin works with new and existing customers, in collaboration with our network of partners.

Previous Speaker
Craig Perrett
Global Head of Identity Architecture, WPP

Craig Perrett is the Global Head of Identity Architecture for WPP PLC. In this role, he develops the strategy and governance for the future state of the group’s Identity and Access management programs. The key focus is on designing a more secure, robust and user-friendly experience for all their colleagues and clients across every business line. The ethos of the strategy is about enabling technology to empower advanced thinking for the future of tomorrow.

Previous Speaker
Max Faun
Head of EMEA Consulting, Okta

Max Faun leads Okta’s European Value Consulting Practice. Prior to joining Okta he worked at Accenture, advising Global clients across numerous industry groups on strategic decisions. He is passionate about the business implications of modern identity from a financial, security and user productivity perspective as well as wider technology trends. Max holds an MA in Intelligence and Security as well as a BA in International Relations.

Previous Speaker
Ian Lowe
Director of Industry Solutions, Okta

Ian Lowe is Okta’s Director of Solutions Marketing for EMEA. In his 19 year career, Ian has become a recognized product marketing and sales enablement leader having created and launched successful cloud-based security solutions that are used by top technology firms, financial services organizations and Governments around the world today; Including but not limited to the White House, Microsoft and HSBC.

Previous Speaker
Martin Sandren
IAM Business Analyses Manager, Ahold Delhaize

Martin Sandren is a security architect and delivery lead with over eighteen years of experience in various information security-related roles who are primarily focused on security architecture and digital identity including global scale customer, privileged and internal IAM systems using Microsoft Azure Active Directory, SailPoint, Saviynt, ForgeRock, IBM, and Oracle security stacks.

Experience includes architect, onshore and offshore team lead as well as an individual developer. Wide international experience gained through having lived and worked in Sweden, Germany, the UK, the USA, and the Netherlands.

Martin is a frequent speaker at international conferences such as Consumer Identity World, MyData and European Cloud Conference.

Martin is a board member of the IDnext foundation, founder of the Digital Identity Amsterdam meetup and active within IDPro.

Previous Speaker
Eve Maler
CTO, ForgeRock

Eve Maler is ForgeRock’s CTO. She is a globally recognised strategist, innovator, and communicator on digital identity, security, privacy, and consent, with a passion for fostering successful ecosystems and individual empowerment. She has 20 years of experience innovating and leading standards such as SAML and User-Managed Access (UMA), and has also served as a Forrester Research security and risk analyst. She leads the ForgeRock Labs team investigating and prototyping innovative approaches to solving customers’ identity challenges, along with driving ForgeRock’s industry standards leadership.

Previous Speaker
Allan Foster
Chief Evangelist, ForgeRock

Allan Foster has helped build ForgeRock into a multinational identity software vendor with offices on four continents. Allan’s deep technical knowledge has been well used in all aspects of the business while at ForgeRock, with responsibilities in Support, Engineering, Product Management, Federal, Emerging Technology, Sales and now in the Partner Community. Allan also serves on several boards. He is currently President of the Board at the Kantara Initiative. He is also a director on the board of the DIACC. In the past has also served on the board at.IEEE-ISTO, Portland Macintosh User Group, where he was president, and East County Business Alliance. Allan also previously served as VP APJ, CTO Office at ForgeRock.

Allan Foster is a founding member of ForgeRock, bringing skills in the entire Identity management space. He has proven skills in Access Management, Federation, and Portal Architectures. Allan is based in Portland, Oregon in the USA, and has worked with the ForgeRock products, as well as prior version of the products for several years. Allan brings 25 years of experience in the development, internet, and Identity management spaces to ForgeRock. Allan\\\’s career has reached from Apple Computer inc, to Netscape, AOL, Guru Associates, and Sun Microsystems before joining the team at ForgeRock. Allan now serves at ForgeRock as VP Community, and OpenAM Engineering.

Previous Speaker
Steve Furnell
Professor of Cyber Security, University of Nottingham

Steven Furnell is a professor of cybersecurity at the University of Nottingham in the United Kingdom.

He is also an Adjunct Professor with Edith Cowan University in Western Australia and an Honorary Professor with Nelson Mandela University in South Africa.
His research interests include usability of security and privacy, security management and culture, and technologies for user authentication and intrusion detection. He has authored over 340 papers in refereed international journals and conference proceedings, as well as various books and books chapters.

Professor Furnell is the current Chair of Technical Committee 11 (security and privacy) within the International Federation for Information Processing, as well as the editor-in-chief of Information and Computer Security, and a board member of the Chartered Institute of Information Security.

Previous Speaker
Megha Rastogi
Lead Product Manager, Machine Learning & Identity Access Management, SurveyMonkey

Megha Rastogi is a product leader with more than a decade of experience building innovative products at leading global companies, like Expedia, Yahoo, Verizon, SurveyMonkey.

Currently, she is a Lead Product Manager at SurveyMonkey managing ML-powered insights and unifying Identity and Access Management across SurveyMonkey products.

Prior to SurveyMonkey, she was a Senior Product Manager at Asurion where she bought to market a mobile security app and a digital health product.

Before that, she has worked as a Global Product Manager at Expedia, helping the needs of business travellers.

She has also led product strategy for emerging markets at Yahoo and worked to understand the needs of users around the world.

She graduated from Cornell University with her Bachelor and Master of Engineering in Computer Science and studied Management at Harvard University Extension School.

Previous Speaker
Stefan Bosnjakovic
External IAG architect, Hilti AG

The emphasis of my professional activity during the last fifteen plus years was on IAM
(Identity and Access Management) and GRC (Governance, Risk and Compliance)
projects, driven by the clients’ needs to comply with regulatory demands and close
audit findings, complemented by related project activities incl. SoD (Segregation of
Duties) methodology development, RE (Requirement Engineering), RM (role modelling
and design of standardised access- and role-models), onboarding and full integration of
complex business application suits into the corporate IAM-frameworks, WM (workflowand associated process modelling) and BPAM (business process analysis and
modelling), applying relevant security norms (ISO27000, Cobit, MaRisk, ITGrundschutz, etc.) and regulatory requirements (EU (GDPR), ECB, SOx, MAS, FFIEC,
BaFin (BAIT, VAIT, KAIT), BuBa, FinMA, BoE, etc.).

In addition to pure IAG issues, I am also working on general IT-security related aspects
like HPAM (High Privileged Access Management), SSO (Single-Sign-On), CM (Cloud
Migration), Firewall and VPN to complete an IAG framework.

Rounded-up by communication, coordination and setting up train-the-trainer schemes
with HR, relevant business and specialist departments.

Previous Speaker
Kumud Dubey
Senior ASIC Verification Engineer, Boeing

With over 18 years of experience in the software industry with leading MNCs like Alcatel Lucent, Mentor Graphics and Cadence Design Systems, Kumud has been a part of senior management and recognised as a thought leader within these organizations.

At present, she is working with Boeing India as a Senior ASIC Verification Engineer.

Being a prominent speaker and a well sought-after name in national and international conferences, she has been regularly quoted in Indian print and digital media on global issues. She has been invited by various Indian government bodies, including its defence forces to train their cyber workforce.

Along with her team, she has devised and conducted various events for capacity building and cyber safety awareness in association with state police departments and UNICEF.

She has supported various government initiatives in their technical reviews and audits, especially the smart city initiatives of the Government of India.
She has been involved actively in the Cadence Design System for solving complex design problems using Machine Learning Algorithms.

Previous Speaker
Kevin Bocek
Vice President, Security Strategy and Threat Intelligence, Venafi

Kevin Bocek is responsible for security strategy and threat intelligence at Venafi. He brings more than 16 years of experience in IT security with leading security and privacy leaders including RSA Security, Thales, PGP Corporation, IronKey, CipherCloud, nCipher, andXcert. He is sought after for comment by the world’s leading media such as Wall Street Journal, New York Times, Washington Post,Forbes, Fortune, BBC, Süddeutsche Zeitung, USA

Previous Speaker
Jamie Hughes
CIAM Product Manager, Beyond Identity

Senior Solutions Engineer at Beyond Identity. Jamie has spent the last 5 years working for early stage Identity and Access Management companies helping to drive success in the EMEA region. Software/DevOps Engineering background now advising and enabling clients on all things identity with a strong focus on Consumer Identity Management.

Previous Speaker
Dr Gilad Rosner
Founder, IoT Privacy Forum; Expert in Public Policy of IoT & Identity Management; Privacy and Technology Policy Researcher

Dr Gilad Rosner is a privacy and information policy researcher and the founder of the non-profit Internet of Things Privacy Forum, a crossroads for industry, regulators, academics, government and privacy advocates to discuss the privacy challenges of the IoT. The Forum’s mission is to produce guidance, analysis and best practices to help industry and government to reduce privacy risk and innovate responsibly in the domain of connected devices.

Gilad’s broader work focuses on the IoT, identity management, US & EU privacy and data protection regimes, and online trust. His research has been used by the UK House of Commons Science and Technology Committee report on the Responsible Use of Data and he is a featured expert on O’Reilly and the BBC. Gilad is an internationally invited speaker and has given talks at industry conferences, universities, and government agencies, including the US National Institute of Standards and Technology. Gilad has a 20-year career in IT, having worked with identity management technology, digital media, automation and telecommunications.

Gilad is a member of the UK Cabinet Office Privacy and Consumer Advisory Group, which provides independent analysis and guidance on Government digital initiatives and is a member of the IEEE Global Initiative for Ethical Considerations in Artificial Intelligence and Autonomous Systems. He is a Visiting Researcher at the Horizon Digital Economy Research Institute, an Affiliate Researcher at UC Berkeley’s Centre for Long-Term Cybersecurity and has consulted on trust issues for the UK government’s identity assurance programme, Verify.gov.

Previous Speaker
Domanic Smith-Jones
Solution Engineer, Auth0

An ‘SE’ at Auth0 works alongside the sales team through various types of practical engagement to help prospects understand their business problems, and in turn, transform them into elegant solutions. With over a decade of experience in IT spanning from software development to solution selling and implementation, Domanic has built his skills across industries during roles at IBM as a Software Engineer and OpenText in Professional Services and Solution Consulting.

Previous Speaker
James Maude
Lead Cyber Security Researcher, BeyondTrust

James Maude is the Lead Cyber Security Researcher at BeyondTrust. James has broad experience in security research, conducting in-depth analysis of malware and cyber threats to identify attack vectors and trends in the evolving security landscape. His background in forensic computing and active involvement in the security research community makes him an expert voice on cybersecurity. He regularly presents at international events and hosts webinars to discuss threats and defense strategies.

 

 

Previous Speaker
Richard Bird
Chief Customer Information Officer, Ping Identity

Richard Bird is the Chief Customer Information Officer for Ping Identity. He is a cyber security veteran, a former chief information security officer and a former chief information officer. An internationally recognized data privacy and identity-centric security expert and global speaker, Richard presents regularly across 5 continents. He is a Forbes Tech council member and has appeared on Bloomberg Business and Yahoo Finance and is frequently quoted by Wall Street Journal, CNBC, Bloomberg, The Financial Times, Business Insider, CNN, and Fox News on topics ranging from data privacy regulations to cybersecurity enabled consumer protection. He is also the host of the podcast “Hello, USER”. Richard is widely known for wearing bow ties and while he probably isn’t the most tattooed person in cyber security today, he at least has to be in the top 5%.

 

Previous Speaker
Robert Byrne
Field Strategist, One Identity

Rob Byrne, a field strategist at One Identity, has worked in IT for more than 20 years in various roles – including development, consulting and technical sales – the majority of his career has focused on identity management. Prior to joining Quest, Rob worked for Oracle and Sun Microsystems.

Previous Speaker
Karl Lankford
RVP Solutions Engineering, BeyondTrust

Karl Lankford is the Regional Vice President, Solutions Engineering for BeyondTrust, where he has worked for 7 years. A highly capable security leader, Karl has acquired a wide range of security experience and knowledge over the last decade, working across multiple industries. Karl is a regular speaker at industry conferences, delivering disruptive technical and strategic thought-leadership insight to the international cybersecurity community.

Previous Speaker
Hans-Robert Vermeulen
Identity Strategist, SailPoint

Hans-Robert Vermeulen brings over 20 years of experience in the broader Governance and Identity and Access Management space, ranging from consultancy and advisory work to technical pre-sales, Hans-Robert has a wealth of experience and understands the underlying business issues and complexity associated with the security and Identity Governance challenges that businesses face in today’s complex market. Hans-Robert is the Identity Strategist in EMEA. He has been with SailPoint for over nine years and was a part of the original team that built out the European region and Eastern Europe territories.

Previous Speaker
Craig Ramsay
Senior Solution Consultant, Omada

Craig has a wealth of experience within Identity, primarily focused around IAM and IGA. He has worked at financial institutions helping them set up and run their identity functions before moving to the vendor side into Professional Services and now a Senior Solution Consultant at Omada.

He has strong experience in User Lifecycle Management; Role Management; Violation Management and Identity Strategy with knowledge of complimentary Identity technologies such as PAM, DAG, CIEM and others. Craig is based out of Edinburgh, Scotland.

Previous Speaker
Marcus Idle
Head of External Identity, ThirdSpace

Marcus is an expert in Microsoft’s Azure AD B2B and B2C technologies, and is passionate about bringing cloud and external identity to life to solve organisational challenges. Prior to starting his current role, Marcus was previously a Technical Architect, building solutions for the public sector based on Microsoft Dynamics. Before that, he built CRM tools for membership organisations. In his spare time, he is always ready to play tennis, and will even indulge in the occasional game of ping pong.

Previous Speaker
Tim Bedard
Senior Product Marketing Director, ForgeRock

Tim is Sr. Director of Product Marketing at ForgeRock and is responsible for the company’s identity management, identity governance and autonomous identity solutions. He is a cybersecurity expert who has held leadership positions in product strategy, product management, and marketing at leading security organisations, including: SailPoint Technologies, RSA Security and CA Technologies. Tim is an active security evangelist at industry leading trade shows and in his free time works towards becoming a scratch golfer!

Previous Speaker
Michael Bunyard
Head of Marketing, IAM, WSO2

Michael Leads WSO’s Identity and Access marketing efforts. Prior to WSO2, Michael was the Program Director of IBM Security’s IAM Product Marketing team, in addition to leading Product Marketing for Mobile Security, Data Security, and Fraud. Michael has over 20 years of experience, and has led Product Marketing and Product Management for several software companies focused on enterprises. Michael holds an MBA in Management from St. Mary’s University in California.

Previous Speaker
Saru Tumuluri
India Ambassador, Women in Identity

Saru Tumuluri is the CEO of Khosla Labs and is currently focused on scaling Veri5Digital, a leading Global Digital Identity and Customer On-Boarding SaaS platform from India.

With over two decades of experience pertaining to entrepreneurship in India and the United States, Saru is focused on bringing new technology-driven opportunities to entrepreneurs, with an aim to solve large-scale problems in India and across the globe.

Saru is currently the country Ambassador for Women in Identity (WiD), a registered non-profit membership organisation, run by volunteers whose purpose is to champion a more diverse workforce, inclusive of all, to enter, and work, and advance in the growing industry of Digital Identity.

Previous Speaker
Chris Owen
Director of Product Management, Saviynt

Chris is currently responsible for helping to drive Saviynt’s product innovation, roadmap, go-to-market messaging and competitive intelligence. 

 

He has acquired a wealth of experience in Identity & Access Management (IAM) and Privileged Access Management (PAM) over a 15-year career in various technical and leadership roles at Quest / One Identity, CyberArk, BeyondTrust and Centrify.

 

Chris began his career as a technical lead of one of the largest transformation projects in Europe at that time.

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Authentication v Authorisation
Authentication. Authorization. It’s all just logging in right? Are they essentially the same thing? Although some may use the terms interchangeably, they are actually very different concepts and understanding how they differ is important for anyone in the security space. In the most simplistic terms, authentication is the process of ensuring the user is who...
Introducing Code Commit Signing to Secure Your SDLC
In today’s model of distributed software in the cloud, engineering teams are developing, building, and delivering all the time. Plus, with continuous integration and continuous delivery (CI/CD) pipelines, there are no stopping points for manual security checks. Once the entire build is complete, it’s even more difficult, time-consuming, and resource-intensive to check the entire build...
The history and future of passwords
The inception of passwords in the 1960s changed the digital world as we know it. Passwords are now an unconscious standard practice in the lives of most, and from your first pet to the street you grew up on, they are deeply ingrained in our minds. The first passwords introduced the concept of authentication to cybersecurity, or...