Morning Session
How to implement your IAM strategy, embed across the business and bring your customers with you
- Product Led – What does it look like for IAM and PAM?
- The Path to Autonomous Identity Security
- What is a Security Story and Why Does IDM Need One?
- Harnessing the Power of Fraud Decisioning and Orchestration
- Looking at the Digital Identity Wallet’s Travel Use Case and Beyond
- Identity Federation – Trusting someone else’s Identity
- A Time Traveler’s Log-In: 5 Customer IAM ‘A-ha’ Moments from the Future Front Lines
- Prevention of Lateral Movement using MFA and service account protection in Active Directory
- PAM: The critical foundation for a successful Identity Security Strategy
09:00 (GMT)
Welcome from the Conference Chair
Dr Gilad Rosner, Digital Identity, Privacy and Regulatory Consultant
09:15 (GMT)
Product Led – What does it look like for IAM and PAM?
Julia Legge, IAM Product Lead, Hargreaves Lansdown
As more and more organisations move to product-led ways of working, how can we embed these in the IAM space? What does it mean to be product-led when our goal is to balance operational efficiency with operational security? Expect to come away with food for thought, and ideas on how you can implement product-led ways of working in your own organisation.
09:30 (GMT)
The Path to Autonomous Identity Security
Paul Squires, Lead Identity Strategist, SailPoint
Managing access for hundreds to thousands of identities in disparate systems with manual processes is difficult, inefficient, and worst of all, risky. Traditional approaches to certification campaigns can be flawed and are often time-consuming. Organisations need to shift the way certifications are performed, using actionable insights to build and maintain their identity security policy and focus on access that deviates from policy. In this session we will provide an overview of the Autonomous Identity Security methodology and look at each step in the process. We will look at the benefits and outcomes gained from simplifying the way you manage your identity programme.
09:45 (GMT)
What is a Security Story and Why Does IDM Need One?
Cal Brown, Security Story Lead, BT
Some problems are too complex for single programmes or initiatives. They involve many moving parts, contradictory priorities, and plain old-fashioned Really Difficult Stuff. Cal will go through how BT is using the security story concept to transform their IDM capability and they will share their learnings from the experience.
- What makes a security story?
- What’s the IDM story?
- How is it working?
10:00 (GMT)
Harnessing the Power of Fraud Decisioning and Orchestration
Rob Otto, EMEA Field CTO, Ping Identity
Fraud prevention is a complex business, made more challenging by the constantly-increasing array of tools that fraud teams must manage. Most online businesses today use multiple sources of risk signals, many of which come into play at different points throughout the customer journey. The challenge is making those signals work together to make better mitigation decisions, targeting suspicious users without disrupting legitimate ones.
Fraud decisioning and orchestration hubs provide a solution to this challenge by centralizing fraud decisioning, ingesting signals from a variety of sources and vendors and turning those signals into real-time mitigation decisions.
10:15 (GMT)
Looking at the Digital Identity Wallet’s Travel Use Case and Beyond

Annet Steenbergen
Advisor/SME Digital Identity and Travel, EU Digital Wallet Consortium (EWC)
view profileAnnet Steenbergen, Advisor/SME Digital Identity and Travel, EU Digital Wallet Consortium (EWC)
The developments with Digital Identity Wallets are manyfold and will bring big changes to the way we identify ourselves, the data we share and do not share and will require business processes to be ready for these changes. The travel use case is a good example where the digital identity wallet will give many opportunities for a better passenger experience, but also improved data management and security.
- What are the global developments in the travel industry that will change the way we travel?
- A look at eIDAS 2.0 and the large-scale pilot on the travel use case
- How will digital health data, payments, academic credentials etc also impact the travel use case for Digital Identity wallets
10:30 (GMT)
Identity Federation - Trusting someone else’s Identity
Mark Lillywhite, Senior Sales Engineer, Delinea
Enterprise organisation have increasingly large numbers of contractors, and often outsource specific functions to 3rd party organisations. Traditional Identity management means essentially treating every ‘internal external’ as an actual staff member, with all the associated management overheads & licensing costs, but with the downside of not being in full control of their Joiner Mover Leaver process.
In this session learn about:
- Different Types of Identity Federation for your ‘internal externals’
- Additional Controls for Privileged Access, depending on who or what needs to be accessed
- How to achieve cost savings whilst improving security
- How to satisfy Cyberinsurance’s increased requirements for externals to be tightly managed
10:45 (GMT)
Questions to the Panel of Speakers
11:00 (GMT)
Refreshment Break Served in the Exhibition Area
11:25 (GMT)
Welcome to Session Two
Dr Gilad Rosner, Digital Identity, Privacy and Regulatory Consultant
11:30 (GMT)
A Time Traveler’s Log-In: 5 Customer IAM 'A-ha' Moments from the Future Front Lines

Robert Block
Senior VP, Global Alliances & Business Development, Strivacity
view profile
Matt Connors
CISO Southern New Hampshire University
view profileMatt Connors, CISO, Southern New Hampshire University
Robert Block, Senior VP, Global Alliances & Business Development, Strivacity
This presentation provides a peek into the future requirements of your customer IAM projects based on a case study at a private, nonprofit New England college. Tech-savvy students are proxies for what tomorrow’s “typical” customers will expect when they sign up and sign into your customer-facing apps. In this case study of Southern New Hampshire University’s customer IAM rollout, we’ll dispel common customer IAM myths and share insights learned from our rollout to more than 150,000 students.
11:45 (GMT)
Prevention of Lateral Movement using MFA and service account protection in Active Directory
Nicholas Colin, UK & Eire Sales Director, Silverfort
In recent years we have witnessed the commodization of lateral movement skills required for attacks on IT infrastructure, leading to massive increases in the spread of ransomware, both in terms of scale of these attacks as well as the size of their impact on business critical assets.
What are the security gaps to address this exponential phase of the attack?
This session addresses a novel approach to identity security, which allows detection of various types of lateral movement as well as response policies that effectively block this part of the attack.
12:00 (GMT)
PAM: The critical foundation for a successful Identity Security strategy
Lee Morton, Solutions Engineer, BeyondTrust
There is a fundamental shift in the cyber battleground from traditional perimeter and endpoint security into the world of identity security. Attackers are successfully exploiting gaps in visibility between IAM and security tools, leading to a new discipline of Identity Threat Detection and Response (ITDR)
Join Lee Morton, Solutions Engineer, as he introduces how Privilege Access Management (PAM) is evolving to meet the needs of ITDR.
12:15 (GMT)
Questions to the Panel of Speakers & Delegates move to the Seminar Rooms
12:30 (GMT)
Seminar Sessions
13:15 (GMT)
Networking Lunch Served in the Exhibition Area
Afternoon Session
Understanding your IAM ecosystem, mapping its landscape and understanding what the future holds
- Case Studies in Identity Maturity Modelling: Enabling continual value on your Identity Governance Journey
- Future of IAM : How will IAM evolve in the future? And How can IAM help organizations stay ahead of the curve?
- Identity Threat Detection and Response: Lessons from a Fortune 500 Company
14:00 (GMT)
Conference Chair’s Afternoon Address
Digital Identity, Privacy and Regulatory Consultant
14:05 (GMT)
Case Studies in Identity Maturity Modelling: Enabling continual value on your Identity Governance Journey
Craig Ramsay, Senior Solution Architect, Omada
Identity-first security models are central to organizations looking to successfully implement Zero Trust. But how do you get there if you don’t know where you’re starting from? This session explains how utilizing an Identity Maturity Model as the cornerstone to build out your Identity Roadmap will set you up for success in the short, medium, and long term. Practical takeaways from this session are:
- Key areas of Identity to assess when establishing an Identity Maturity Model
- How to translate your Identity Maturity Model into an Identity Roadmap with defined milestones and clear deliverables
- How Omada has used this approach to deliver tangible business value to three of our customers
14:20 (GMT)
Future of IAM : How will IAM evolve in the future? And How can IAM help organizations stay ahead of the curve?
Aditya Kumar, IOT Lead Solution Designer, Vodafone Business
The Future of IAM is mostly likely to focus on:
- The rise of cloud-based IAM solutions
- Increasing use of Biometric Authentication
- The adoption of zero-trust architecture
- Use of AI/ML in IAM
- Continuous Authentication
IAM is an essential tool for organizations that want to stay ahead of the curve in terms of security, compliance, and agility by:-
- Improving Security
- Reducing Compliance Risk
- Increasing Agility and Efficiency
- Improving User Experience
14:35 (GMT)
Identity Threat Detection and Response: Lessons from a Fortune 500 Company
David Hitchen, Senior Solutions Architect, Semperis
Identity threat detection and response (ITDR), as coined by Gartner, is a category of solutions designed to defend identity systems such as Active Directory, Entra ID (formerly Azure AD), and Okta against cyber threats. Join this session to discover how one Fortune 500 company created an effective ITDR strategy that improved its operational resilience—and how your organisation can, too.
- Learn how the company modernised its disaster recovery approach to protect against cyber threats by implementing identity threat detection and response (ITDR).
- Discover the challenges of identity-threat protection in large, complex environments.
- See how the company created a Business Continuity Plan (BCP) that includes attack-path monitoring and steps to quickly recover the business when ransomware strikes.
14:50 (GMT)
Questions to the Panel of Speakers
15:05 (GMT)
Afternoon Networking Break
Refreshments served in the Exhibition Area
15:30 (GMT)
Seminars
Delegates have the chance to attend another one of the Seminar Sessions
16:15 (GMT)
Conference Closes
Delegates Depart
Please note:
Whitehall Media reserve the right to change the programme without prior notice.
Follow us on social
Keep up to date with what's going on by following us on social media.