SOCIAL


LATEST BLOGS


Is the EU GDPR the Y2K of Digital Marketing? – posted by Gigya

4th November 2016

Remember the great Y2K scare of the late 1990s? Civilisation was supposedly going to grind to a halt at 12:01 a.m. on January 1, 2000, […]


Survey Says — You’re Probably Not Prepared for the EU GDPR – posted by Gigya

Dell recently dropped a bomb on the digital business community (read: the business community) in the form of a press release and report based on […]


LATEST TWEETS

THE UK’s LEADING EVENT FOR RISK DRIVEN
business-centric IAM luminaries, practitioners and end-users from across government and large enterprise organisations

At a glance

THE GLOBAL BUSINESS ENVIRONMENT IS BOTH AGILE AND DYNAMIC.

As organisations move towards digital platforms, the way in which enterprise manage identities and govern employee access to resources is becoming increasingly important. Today’s connected enterprise allows little room for complacency in securing entry points and data assets.

Identity and Access Management is central to enabling business agility, consolidation of access and supporting collaborative working, to delivering new channels and anytime, anywhere access. Globally the IAM landscape is set to grow to an estimated $18.30 billion in 2019, with an annual compound growth rate of nearly 15 per cent. This impressive growth points to the increasingly complex task of managing identity in the enterprise given the advent of mobile, cloud and other disruptive technology trends.

JOIN HUNDREDS OF THOUGHT-LEADERS AND INNOVATORS AT WHITEHALL MEDIA’S LEADING 15th BIANNUAL IDENTITY MANAGEMENT CONFERENCE
to identify new frontiers and opportunities, discuss ways to transform your IAM infrastructure into an actionable critical business resource and review the latest trends and technologies shaping the IAM sector to help you stay ahead of the curve.

FEATURED TOPICS

  • Analytics (user behaviour, privileged accounts)
  • Authentication, Authorisation, Access
  • Cloud Computing Challenges
  • Data Governance / Protection
  • Data Loss Prevention
  • Encryption techniques
  • Enterprise Mobility and BYOD risks
  • Federated Access Management
  • Governance, Compliance, Regulatory Requirements
  • IAM and Disruptive Technologies (Cloud, IoT, Blockchain) – opportunities and risks
  • IAM Programme Management
  • Identity Administration
  • Identity Intelligence
  • Identity as a Service (IaaS)
  • Implementing an Identity Management Architecture
  • Incident Handling and Reporting
  • Managing User Entitlements & Privileges
  • Password Management
  • Proactive Monitoring of Systems
  • Provisioning / De-Provisioning
  • Network Security and IAM considerations
  • Risk Management and Information Security
  • Security Classification and Policy Enforcement
  • Security Intelligence and Analytics
  • Server and Network Security
  • Single Sign-On (SSO)
  • Strategic IT Security Policy and Planning
  • Threat Intelligence Monitoring
  • Two-factor Authentication
  • User Credential Management
  • User Self-Service

FEATURED SPEAKERS

SPONSORS

cpd-certifiedcpd-member

SUMMARY

icon-attendeesicon-companiesicon-exhibitors

icon-keynotesicon-vendorsicon-productsicon-seminarsicon-one-oneicon-networking