Seminars @

IDM uk

Identity Management

8 November 2023

Victoria Park Plaza, London

Seminars @ IDM uk

Seminars @ 12:30 & 15:30

Away from the conference hall, you have the opportunity to deep dive into a subject that is of most relevance to you. With a wide selection of seminars to choose from, you are certain to find one which feels as though it has been tailor-made with you in mind. Seminars run twice giving you the opportunity to attend two of them.

Unlocking the Key to Identity Security Success: The Vital Role of PAM


Lee Morton, Solutions Engineer, BeyondTrust 

The world of cyber security is changing, with more dynamic highly connected systems than ever. With an explosion of apps, accounts and access, the battleground has shifted from traditional perimeter and endpoint security into the world of identity security.

Following on from his main agenda session, join Lee as he discusses what is driving this paradigm shift and how attackers are successfully exploiting the gaps in visibility between IAM and security tools, leading to a new discipline of Identity Threat Detection and Response (ITDR).

You will hear:

  • Examples of tactics used in real world attacks and highlight mitigations available
  • How PAM is evolving to meet the needs of ITDR
  • How implementing least privilege and PAM as foundational controls can prevent attackers exploiting privileged accounts and overly permissive access to systems
Lee Morton seminar
Solutions Engineer, BeyondTrust
view profile
Room / Location:
Main Conference Room

Protect your Organisation from Identity-Based Attacks


Adam Evans, Senior Manager, Identity Specialists, Okta
Stephen Williams, Founder & MD Atlas Identity 

Today’s IT and security leaders know that the evolving digital landscape presents unprecedented opportunity and unprecedented risk. Your digital blast radius includes users, devices, networks, applications, and data, making organisations vulnerable to malicious activity. Malicious actors often exploit the weakest link – people – to launch attacks (did you know that 89% of web app attacks stem from credential abuse?).

Join Okta and EMEA Delivery Partner of the Year, Atlas Identity for an engaging session – where we’ll delve into the five most prevalent identity attacks targeting users today, and provide tactical guidance on best practices for mitigation. We’ll discuss the what, how, and why for these attacks and equip you with straightforward yet powerful security techniques to stay ahead of threat actors. Expect actionable information to help you regardless of your IT stack!

During this session, we’ll cover:

  • The five most prevalent identity attacks targeting users today
  • Why they work
  • How you can secure your organisation from each of them
  • How our customers benefit from Okta today
Adam Evans
Senior Manager, Identity Specialists, Okta
view profile
Stephen Williams
Founder and Managing Director, Atlas Identity
view profile
Room / Location:
Edward 1

The Adecco Group’s Identity Transformation Journey. A live case study


Bharat Halai, Global Head of Identity & Access Management, The Adecco Group
Brooks Wallace, SVP of Sales, EMEA, Saviynt

The Adecco Group is the world’s leading talent company. Its purpose is to make the future work for everyone. It comprises three business units – Adecco, Akkodis and LHH – across 60 countries. The Adecco Group enables sustainable and lifelong employability for individuals, delivers digital and engineering solutions to power the Smart Industry transformation and empowers organisations to optimise their workforces.

Explore the pivotal role played by the integration of an enterprise identity governance and administration cloud platform in advancing The Adecco Group’s transformation strategy. Uncover the key factors that propelled its deployment within the organisation.

Join Bharat Halai, the Global Head of Identity & Access Management, as he delves into the journey towards implementation. This is your chance to engage in a dialogue, gain insights, and draw from Bharat’s wealth of experience.

Bharat Halai
Global Head of Identity & Access Management, The Adecco Group
view profile
Brooks Wallace
SVP of Sales, EMEA, Saviynt
view profile
Room / Location:
Edward 3

Privileged Access Governance


Alan Radford, Field Strategist, One Identity

Privileged Access Management (PAM) technologies are often used as standalone solutions, without proper integration to other security process controls that are in place, particularly when it comes to Identity Governance and Administration (IGA) technologies.

Organizations that operate PAM and IGA in silos, lack the ability to apply consistent access policies across end-to-end access mapping and provisioning processes for privileged accounts. Without these systems integrated, they lose 360-degree visibility of identities and user accounts, rights, and activities associated with them, left unable to answer who has access to request what access, how and why.

Join this session to learn how the One Identity unified approach to consolidating identity security silos can help you become more secure and efficient within your security program.

Alan Radford
Field Strategist, One Identity
view profile
Room / Location:
Edward 5

Leave your legacy: From on-prem to The Cloud, with Microsoft Entra ID


Martyn Gill, Senior Identity Architect, Kocho
Tom Urwin, Senior Identity Architect, Kocho

Entra ID is more than just a name change. It’s the biggest shake up to the identity landscape we’ve seen in years, with many previously ‘on-prem’ processes now able to move to The Cloud.

Join Microsoft Identity expert, Martyn Gill, to discover the core new functionality included in Entra ID, AND learn what traditional MIM or bespoke on-premises processes are now ready and able to move into the cloud.

Discover new possibilities and processes for:

  • Moving MIM workloads to Entra ID
  • Multi-cloud / cloud-first HR driven provisioning
  • Managing and automating identity workflows
  • Seamless entitlements management
  • Microsoft’s most advanced governance controls yet

Kocho is a top 3 global identity partner, with over 20+ years working closely with Microsoft and enterprise organisations.

Martyn Gill
Senior Identity Architect, Kocho
view profile
Tom Urwin
Senior Identity Architect, Kocho
view profile
Room / Location:
Edward 7

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Why Identity is the Cornerstone of a Zero Trust Architecture
Written by Scott Silver, Xalient  As organisations continue to embrace digital transformation to gain access to the cloud’s many benefits, this means that computing environments are evolving into borderless IT ecosystems. Digital identities are also evolving at pace and identity security is now a crucial aspect of cybersecurity. As we continue to digitally transform organisations,...
Challenges of Adopting Zero Trust
Why adopting a Zero Trust approach is not as straightforward as it might appear Written by Steven Daniëls and David Morimanno, thought leaders at Xalient Group. The world has changed. With the move to hybrid working, the rapid adoption of cloud, increased use of mobile and IoT devices, and more, every organization’s attack surface has...
identity and access management
The Importance Of Strong Passwords
Overusing similar passwords, or passwords with incredibly easy guesswork, is one of the biggest issues circling identity and access management. As many people have problems memorizing different passwords, it is not uncommon for similar passwords over personal accounts and work-based identity management solutions. For hackers, the natural first-guess options will be children’s names or similar...