Seminars @ 12:30 & 15:30
Away from the conference hall, you have the opportunity to deep dive into a subject that is of most relevance to you. With a wide selection of seminars to choose from, you are certain to find one which feels as though it has been tailor-made with you in mind. Seminars run twice giving you the opportunity to attend two of them.
Unlocking the Key to Identity Security Success: The Vital Role of PAM
SEMINAR
A
Lee Morton, Solutions Engineer, BeyondTrust
The world of cyber security is changing, with more dynamic highly connected systems than ever. With an explosion of apps, accounts and access, the battleground has shifted from traditional perimeter and endpoint security into the world of identity security.
Following on from his main agenda session, join Lee as he discusses what is driving this paradigm shift and how attackers are successfully exploiting the gaps in visibility between IAM and security tools, leading to a new discipline of Identity Threat Detection and Response (ITDR).
You will hear:
- Examples of tactics used in real world attacks and highlight mitigations available
- How PAM is evolving to meet the needs of ITDR
- How implementing least privilege and PAM as foundational controls can prevent attackers exploiting privileged accounts and overly permissive access to systems
SEMINAR A
Lee Morton, Solutions Engineer, BeyondTrust
The world of cyber security is changing, with more dynamic highly connected systems than ever. With an explosion of apps, accounts and access, the battleground has shifted from traditional perimeter and endpoint security into the world of identity security.
Following on from his main agenda session, join Lee as he discusses what is driving this paradigm shift and how attackers are successfully exploiting the gaps in visibility between IAM and security tools, leading to a new discipline of Identity Threat Detection and Response (ITDR).
You will hear:
- Examples of tactics used in real world attacks and highlight mitigations available
- How PAM is evolving to meet the needs of ITDR
- How implementing least privilege and PAM as foundational controls can prevent attackers exploiting privileged accounts and overly permissive access to systems
Protect your Organisation from Identity-Based Attacks
SEMINAR
B
Adam Evans, Senior Manager, Identity Specialists, Okta
Stephen Williams, Founder & MD Atlas Identity
Today’s IT and security leaders know that the evolving digital landscape presents unprecedented opportunity and unprecedented risk. Your digital blast radius includes users, devices, networks, applications, and data, making organisations vulnerable to malicious activity. Malicious actors often exploit the weakest link – people – to launch attacks (did you know that 89% of web app attacks stem from credential abuse?).
Join Okta and EMEA Delivery Partner of the Year, Atlas Identity for an engaging session – where we’ll delve into the five most prevalent identity attacks targeting users today, and provide tactical guidance on best practices for mitigation. We’ll discuss the what, how, and why for these attacks and equip you with straightforward yet powerful security techniques to stay ahead of threat actors. Expect actionable information to help you regardless of your IT stack!
During this session, we’ll cover:
- The five most prevalent identity attacks targeting users today
- Why they work
- How you can secure your organisation from each of them
- How our customers benefit from Okta today
SEMINAR B
Adam Evans, Senior Manager, Identity Specialists, Okta
Stephen Williams, Founder & MD Atlas Identity
Today’s IT and security leaders know that the evolving digital landscape presents unprecedented opportunity and unprecedented risk. Your digital blast radius includes users, devices, networks, applications, and data, making organisations vulnerable to malicious activity. Malicious actors often exploit the weakest link – people – to launch attacks (did you know that 89% of web app attacks stem from credential abuse?).
Join Okta and EMEA Delivery Partner of the Year, Atlas Identity for an engaging session – where we’ll delve into the five most prevalent identity attacks targeting users today, and provide tactical guidance on best practices for mitigation. We’ll discuss the what, how, and why for these attacks and equip you with straightforward yet powerful security techniques to stay ahead of threat actors. Expect actionable information to help you regardless of your IT stack!
During this session, we’ll cover:
- The five most prevalent identity attacks targeting users today
- Why they work
- How you can secure your organisation from each of them
- How our customers benefit from Okta today


Adam Evans
Senior Manager, Identity Specialists, Okta
view profile
Stephen Williams
Founder and Managing Director, Atlas Identity
view profileRoom / Location:
Edward 1
The Adecco Group’s Identity Transformation Journey. A live case study
SEMINAR
C
Bharat Halai, Global Head of Identity & Access Management, The Adecco Group
Brooks Wallace, SVP of Sales, EMEA, Saviynt
The Adecco Group is the world’s leading talent company. Its purpose is to make the future work for everyone. It comprises three business units – Adecco, Akkodis and LHH – across 60 countries. The Adecco Group enables sustainable and lifelong employability for individuals, delivers digital and engineering solutions to power the Smart Industry transformation and empowers organisations to optimise their workforces.
Explore the pivotal role played by the integration of an enterprise identity governance and administration cloud platform in advancing The Adecco Group’s transformation strategy. Uncover the key factors that propelled its deployment within the organisation.
Join Bharat Halai, the Global Head of Identity & Access Management, as he delves into the journey towards implementation. This is your chance to engage in a dialogue, gain insights, and draw from Bharat’s wealth of experience.
SEMINAR C
Bharat Halai, Global Head of Identity & Access Management, The Adecco Group
Brooks Wallace, SVP of Sales, EMEA, Saviynt
The Adecco Group is the world’s leading talent company. Its purpose is to make the future work for everyone. It comprises three business units – Adecco, Akkodis and LHH – across 60 countries. The Adecco Group enables sustainable and lifelong employability for individuals, delivers digital and engineering solutions to power the Smart Industry transformation and empowers organisations to optimise their workforces.
Explore the pivotal role played by the integration of an enterprise identity governance and administration cloud platform in advancing The Adecco Group’s transformation strategy. Uncover the key factors that propelled its deployment within the organisation.
Join Bharat Halai, the Global Head of Identity & Access Management, as he delves into the journey towards implementation. This is your chance to engage in a dialogue, gain insights, and draw from Bharat’s wealth of experience.


Bharat Halai
Global Head of Identity & Access Management, The Adecco Group
view profile
Brooks Wallace
SVP of Sales, EMEA, Saviynt
view profileRoom / Location:
Edward 3
Privileged Access Governance
SEMINAR
D
Alan Radford, Field Strategist, One Identity
Privileged Access Management (PAM) technologies are often used as standalone solutions, without proper integration to other security process controls that are in place, particularly when it comes to Identity Governance and Administration (IGA) technologies.
Organizations that operate PAM and IGA in silos, lack the ability to apply consistent access policies across end-to-end access mapping and provisioning processes for privileged accounts. Without these systems integrated, they lose 360-degree visibility of identities and user accounts, rights, and activities associated with them, left unable to answer who has access to request what access, how and why.
Join this session to learn how the One Identity unified approach to consolidating identity security silos can help you become more secure and efficient within your security program.
SEMINAR D
Alan Radford, Field Strategist, One Identity
Privileged Access Management (PAM) technologies are often used as standalone solutions, without proper integration to other security process controls that are in place, particularly when it comes to Identity Governance and Administration (IGA) technologies.
Organizations that operate PAM and IGA in silos, lack the ability to apply consistent access policies across end-to-end access mapping and provisioning processes for privileged accounts. Without these systems integrated, they lose 360-degree visibility of identities and user accounts, rights, and activities associated with them, left unable to answer who has access to request what access, how and why.
Join this session to learn how the One Identity unified approach to consolidating identity security silos can help you become more secure and efficient within your security program.
Leave your legacy: From on-prem to The Cloud, with Microsoft Entra ID
SEMINAR
E
Martyn Gill, Senior Identity Architect, Kocho
Tom Urwin, Senior Identity Architect, Kocho
Entra ID is more than just a name change. It’s the biggest shake up to the identity landscape we’ve seen in years, with many previously ‘on-prem’ processes now able to move to The Cloud.
Join Microsoft Identity expert, Martyn Gill, to discover the core new functionality included in Entra ID, AND learn what traditional MIM or bespoke on-premises processes are now ready and able to move into the cloud.
Discover new possibilities and processes for:
- Moving MIM workloads to Entra ID
- Multi-cloud / cloud-first HR driven provisioning
- Managing and automating identity workflows
- Seamless entitlements management
- Microsoft’s most advanced governance controls yet
Kocho is a top 3 global identity partner, with over 20+ years working closely with Microsoft and enterprise organisations.
SEMINAR E
Martyn Gill, Senior Identity Architect, Kocho
Tom Urwin, Senior Identity Architect, Kocho
Entra ID is more than just a name change. It’s the biggest shake up to the identity landscape we’ve seen in years, with many previously ‘on-prem’ processes now able to move to The Cloud.
Join Microsoft Identity expert, Martyn Gill, to discover the core new functionality included in Entra ID, AND learn what traditional MIM or bespoke on-premises processes are now ready and able to move into the cloud.
Discover new possibilities and processes for:
- Moving MIM workloads to Entra ID
- Multi-cloud / cloud-first HR driven provisioning
- Managing and automating identity workflows
- Seamless entitlements management
- Microsoft’s most advanced governance controls yet
Kocho is a top 3 global identity partner, with over 20+ years working closely with Microsoft and enterprise organisations.


Martyn Gill
Senior Identity Architect, Kocho
view profile
Follow us on social
Keep up to date with what's going on by following us on social media.