Follow us on Twitter  Watch our You Tube Channel  Add us on Linkedin  follow us on google plus


  • secureauth
  • ping-identity
  • dell-secruity


  • hid
  • cyberark


  • sailpoint
  • onelogin
  • ilex
  • identity-experts
  • ssh
  • osirium
  • axiomatics
  • aurionpro
  • i-welcome
  • thycotic
  • saviynt
  • intragen-logo
  • betasystems
  • rsa


  • isf


  • cpd-member
  • cpd-certified
The UK’s leading event for the discussion and deployment of risk-driven business-centric Identity and Access Management across government and large enterprise organisations

The global business environment is both agile and dynamic. As organisations move towards digital platforms, the way in which enterprise manage identities and govern employee access to resources is becoming increasingly important. Today’s connected enterprise allows little room for complacency in securing entry points and data assets.

Identity and Access Management is central to enabling business agility, for consolidation of access and supporting collaborative working, and to delivering new channels and anytime, anywhere access. Globally the IAM landscape is set to grow to an estimated $18.30 billion in 2019, with an annual compound growth rate of nearly 15 per cent. This impressive growth points to the increasingly complex task of managing identity in the enterprise given the advent of mobile, cloud and other ICT consumerisation trends.

The IAM sector is poised for major growth and transformation as businesses of all sizes look to develop strategies that are aligned to the needs of their business but also consider people, processes and technology issues. Join hundreds of thought-leaders and innovators at Whitehall Media’s leading-edge 14th biannual Identity Management conference and identify new frontiers and opportunities, discuss ways to transform IAM into an actionable critical business resource and review the latest trends and technologies shaping the IAM sector to help you stay ahead of the curve.

Register NOW
Download the sponsorship packages
Meet the speakers
Previous Attendees
Meet the sponsors
WM Blogs


  • Authentication, Authorisation, Access
  • Cloud Computing Challenges
  • Data Governance
  • Data Loss Prevention
  • Encryption techniques
  • Enterprise Mobility and BYOD risks
  • Federated Access Management
  • Governance, Compliance, Regulatory Requirements
  • IAM and Disruptive Technologies – opportunities and risks
  • Identity Administration
  • Identity Intelligence
  • Identity as a Service (IaaS)
  • Implementing an Identity Management Architecture
  • Incident Handling and Reporting
  • Managing User Entitlements & Privileges
  • Password Management
  • Proactive Monitoring of Systems
  • Provisioning / De-Provisioning
  • Risk Management and Information Security
  • Security Classification and Policy Enforcement
  • Security Intelligence and Analytics
  • Server and Network Security
  • Single Sign-On (SSO)
  • Strategic IT Security Policy and Planning
  • Threat Intelligence Monitoring
  • Two-factor Authentication
  • User Credential Management
  • User Self-Service