Programme @

IDM uk

Identity Management

5 November 2024

Victoria Park Plaza, London

Programme @ IDM uk

Morning Session

How to implement your IAM strategy, embed across the business and bring your customers with you

  • Product Led – What does it look like for IAM and PAM?
  • The Path to Autonomous Identity Security
  • What is a Security Story and Why Does IDM Need One?
  • Harnessing the Power of Fraud Decisioning and Orchestration
  • Looking at the Digital Identity Wallet’s Travel Use Case and Beyond
  • Identity Federation – Trusting someone else’s Identity
  • A Time Traveler’s Log-In: 5 Customer IAM ‘A-ha’ Moments from the Future Front Lines
  • Prevention of Lateral Movement using MFA and service account protection in Active Directory
  • PAM: The critical foundation for a successful Identity Security Strategy

09:00 (GMT)

Welcome from the Conference Chair

Dr Gilad Rosner
Digital Identity, Privacy and Regulatory Consultant
view profile

Dr Gilad Rosner, Digital Identity, Privacy and Regulatory Consultant

09:15 (GMT)

Product Led – What does it look like for IAM and PAM?

Julia Legge
IAM Product Lead, Hargreaves Lansdown
view profile

Julia Legge, IAM Product Lead, Hargreaves Lansdown

As more and more organisations move to product-led ways of working, how can we embed these in the IAM space? What does it mean to be product-led when our goal is to balance operational efficiency with operational security? Expect to come away with food for thought, and ideas on how you can implement product-led ways of working in your own organisation.

09:30 (GMT)

The Path to Autonomous Identity Security

Managing access for hundreds to thousands of identities in disparate systems with manual processes is difficult, inefficient, and worst of all, risky. Traditional approaches to certification campaigns can be flawed and are often time-consuming. Organisations need to shift the way certifications are performed, using actionable insights to build and maintain their identity security policy and focus on access that deviates from policy. In this session we will provide an overview of the Autonomous Identity Security methodology and look at each step in the process. We will look at the benefits and outcomes gained from simplifying the way you manage your identity programme.

09:45 (GMT)

What is a Security Story and Why Does IDM Need One?

Cal Brown
Security Story Lead, BT
view profile

Cal Brown, Security Story Lead, BT

Some problems are too complex for single programmes or initiatives. They involve many moving parts, contradictory priorities, and plain old-fashioned Really Difficult Stuff. Cal will go through how BT is using the security story concept to transform their IDM capability and they will share their learnings from the experience.

  • What makes a security story?
  • What’s the IDM story?
  • How is it working?

10:00 (GMT)

Harnessing the Power of Fraud Decisioning and Orchestration

Fraud prevention is a complex business, made more challenging by the constantly-increasing array of tools that fraud teams must manage. Most online businesses today use multiple sources of risk signals, many of which come into play at different points throughout the customer journey. The challenge is making those signals work together to make better mitigation decisions, targeting suspicious users without disrupting legitimate ones.
Fraud decisioning and orchestration hubs provide a solution to this challenge by centralizing fraud decisioning, ingesting signals from a variety of sources and vendors and turning those signals into real-time mitigation decisions.

10:15 (GMT)

Looking at the Digital Identity Wallet’s Travel Use Case and Beyond

Annet Steenbergen
Advisor/SME Digital Identity and Travel, EU Digital Wallet Consortium (EWC)
view profile

Annet Steenbergen, Advisor/SME Digital Identity and Travel, EU Digital Wallet Consortium (EWC)

The developments with Digital Identity Wallets are manyfold and will bring big changes to the way we identify ourselves, the data we share and do not share and will require business processes to be ready for these changes. The travel use case is a good example where the digital identity wallet will give many opportunities for a better passenger experience, but also improved data management and security.

  • What are the global developments in the travel industry that will change the way we travel?
  • A look at eIDAS 2.0 and the large-scale pilot on the travel use case
  • How will digital health data, payments, academic credentials etc also impact the travel use case for Digital Identity wallets

10:30 (GMT)

Identity Federation - Trusting someone else’s Identity

Enterprise organisation have increasingly large numbers of contractors, and often outsource specific functions to 3rd party organisations. Traditional Identity management means essentially treating every ‘internal external’ as an actual staff member, with all the associated management overheads & licensing costs, but with the downside of not being in full control of their Joiner Mover Leaver process.

In this session learn about:

  • Different Types of Identity Federation for your ‘internal externals’
  • Additional Controls for Privileged Access, depending on who or what needs to be accessed
  • How to achieve cost savings whilst improving security
  • How to satisfy Cyberinsurance’s increased requirements for externals to be tightly managed

10:45 (GMT)

Questions to the Panel of Speakers

11:00 (GMT)

Refreshment Break Served in the Exhibition Area

11:25 (GMT)

Welcome to Session Two

Dr Gilad Rosner, Digital Identity, Privacy and Regulatory Consultant

11:30 (GMT)

A Time Traveler’s Log-In: 5 Customer IAM 'A-ha' Moments from the Future Front Lines

This presentation provides a peek into the future requirements of your customer IAM projects based on a case study at a private, nonprofit New England college. Tech-savvy students are proxies for what tomorrow’s “typical” customers will expect when they sign up and sign into your customer-facing apps. In this case study of Southern New Hampshire University’s customer IAM rollout, we’ll dispel common customer IAM myths and share insights learned from our rollout to more than 150,000 students.

11:45 (GMT)

Prevention of Lateral Movement using MFA and service account protection in Active Directory

In recent years we have witnessed the commodization of lateral movement skills required for attacks on IT infrastructure, leading to massive increases in the spread of ransomware, both in terms of scale of these attacks as well as the size of their impact on business critical assets.

What are the security gaps to address this exponential phase of the attack?

This session addresses a novel approach to identity security, which allows detection of various types of lateral movement as well as response policies that effectively block this part of the attack.

12:00 (GMT)

PAM: The critical foundation for a successful Identity Security strategy

There is a fundamental shift in the cyber battleground from traditional perimeter and endpoint security into the world of identity security. Attackers are successfully exploiting gaps in visibility between IAM and security tools, leading to a new discipline of Identity Threat Detection and Response (ITDR)

Join Lee Morton, Solutions Engineer, as he introduces how Privilege Access Management (PAM) is evolving to meet the needs of ITDR.

12:15 (GMT)

Questions to the Panel of Speakers & Delegates move to the Seminar Rooms

12:30 (GMT)

Seminar Sessions

13:15 (GMT)

Networking Lunch Served in the Exhibition Area

Afternoon Session

Understanding your IAM ecosystem, mapping its landscape and understanding what the future holds

  • Case Studies in Identity Maturity Modelling: Enabling continual value on your Identity Governance Journey
  • Future of IAM : How will IAM evolve in the future? And How can IAM help organizations stay ahead of the curve?
  • Identity Threat Detection and Response: Lessons from a Fortune 500 Company

14:00 (GMT)

Conference Chair’s Afternoon Address

Dr Gilad Rosner
Digital Identity, Privacy and Regulatory Consultant
view profile

Digital Identity, Privacy and Regulatory Consultant

14:05 (GMT)

Case Studies in Identity Maturity Modelling: Enabling continual value on your Identity Governance Journey

Identity-first security models are central to organizations looking to successfully implement Zero Trust. But how do you get there if you don’t know where you’re starting from? This session explains how utilizing an Identity Maturity Model as the cornerstone to build out your Identity Roadmap will set you up for success in the short, medium, and long term. Practical takeaways from this session are:

  • Key areas of Identity to assess when establishing an Identity Maturity Model
  • How to translate your Identity Maturity Model into an Identity Roadmap with defined milestones and clear deliverables
  • How Omada has used this approach to deliver tangible business value to three of our customers

14:20 (GMT)

Future of IAM : How will IAM evolve in the future? And How can IAM help organizations stay ahead of the curve?

Aditya Kumar
IOT Lead Solution Designer, Vodafone Business
view profile

Aditya Kumar, IOT Lead Solution Designer, Vodafone Business

The Future of IAM is mostly likely to focus on:

  • The rise of cloud-based IAM solutions
  • Increasing use of Biometric Authentication
  • The adoption of zero-trust architecture
  • Use of AI/ML in IAM
  • Continuous Authentication

IAM is an essential tool for organizations that want to stay ahead of the curve in terms of security, compliance, and agility by:-

  • Improving Security
  • Reducing Compliance Risk
  • Increasing Agility and Efficiency
  • Improving User Experience

14:35 (GMT)

Identity Threat Detection and Response: Lessons from a Fortune 500 Company

Identity threat detection and response (ITDR), as coined by Gartner, is a category of solutions designed to defend identity systems such as Active Directory, Entra ID (formerly Azure AD), and Okta against cyber threats. Join this session to discover how one Fortune 500 company created an effective ITDR strategy that improved its operational resilience—and how your organisation can, too.

  • Learn how the company modernised its disaster recovery approach to protect against cyber threats by implementing identity threat detection and response (ITDR).
  • Discover the challenges of identity-threat protection in large, complex environments.
  • See how the company created a Business Continuity Plan (BCP) that includes attack-path monitoring and steps to quickly recover the business when ransomware strikes.

14:50 (GMT)

Questions to the Panel of Speakers

15:05 (GMT)

Afternoon Networking Break

Refreshments served in the Exhibition Area

15:30 (GMT)

Seminars

Delegates have the chance to attend another one of the Seminar Sessions

View the Seminar Sessions

16:15 (GMT)

Conference Closes

Delegates Depart

Please note:
Whitehall Media reserve the right to change the programme without prior notice.

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Uniting large-scale, complex businesses with PowerSyncPro
Blog by: PowerSyncPro Mergers and acquisitions involving tens – or even hundreds – of thousands of users require complex tenant-to-tenant migrations. Traditionally, those migrations have been fraught with problems. Problems that impact your people, your productivity and your profit. Combining solid preparation with the right software solution can dramatically reduce the pain involved. Enter PowerSyncPro:...
Considering Passwordless? Here’s How to Do It
Blog by: CyberArk When creating a new password, you know the drill – it must be at least eight characters long, contain special characters and avoid sequential characters or be based on dictionary words. Although these requirements can be a pain in the neck and seriously hamper end user experience, they are not a sign...
Analytics and AI: Pioneering the Next Chapter in Identity Security
Blog by: Saviynt Identity proliferation, access sprawl,  over-provisioned access, and reviewer fatigue will continue to grow in your identity ecosystem. In the rapidly evolving landscape of identity security and governance platforms, a few tipping point technologies have emerged. The potential is immense – how do you harness the power? Right start your identity strategy with...