SOCIAL


LATEST BLOGS


Managing the outsourced, outsourced outsourcer

12th September 2016

How can you guarantee that your organisation is one of the lucky ones? Provocative title, but here’s how it happens: your organisation outsources the management […]


Ilex International and Goode Intelligence explore the future of mobile security

20th June 2016

Ilex International has worked with mobile security research and consultancy specialist, Goode Intelligence, to develop a white paper which explores the increase in mobility – […]


LATEST TWEETS

THE UK’S LEADING EVENT FOR THE DISCUSSION AND
deployment of risk-driven business-centric Identity and Access Management across government and large enterprise organisations

WHY ATTEND?

THE UK’S LEADING EVENT FOR THE DISCUSSION AND DEPLOYMENT OF RISK-DRIVEN BUSINESS-CENTRIC IDENTITY AND ACCESS MANAGEMENT ACROSS GOVERNMENT AND LARGE ENTERPRISE ORGANISATIONS

The global business environment is both agile and dynamic. As organisations move towards digital platforms, the way in which enterprise manage identities and govern employee access to resources is becoming increasingly important. Today’s connected enterprise allows little room for complacency in securing entry points and data assets.

JOIN HUNDREDS OF THOUGHT-LEADERS AND INNOVATORS AT WHITEHALL MEDIA’S LEADING 14th BIANNUAL IDENTITY MANAGEMENT CONFERENCE
and identify new frontiers and opportunities, discuss ways to transform IAM into an actionable critical business resource and review the latest trends and technologies shaping the IAM sector to help you stay ahead of the curve.

FEATURED TOPICS

Analytics (user behaviour, privileged accounts)
Authentication, Authorisation, Access
Cloud Computing Challenges
Data Governance / Protection
Data Loss Prevention
Encryption techniques
Enterprise Mobility and BYOD risks
Federated Access Management
Governance, Compliance, Regulatory Requirements
IAM and Disruptive Technologies (Cloud, IoT, Blockchain) – opportunities and risks

IAM Programme Management
Identity Administration
Identity Intelligence
Identity as a Service (IaaS)
Implementing an Identity Management Architecture
Incident Handling and Reporting
Managing User Entitlements & Privileges
Password Management
Proactive Monitoring of Systems
Provisioning / De-Provisioning

Network Security and IAM considerations
Risk Management and Information Security
Security Classification and Policy Enforcement
Security Intelligence and Analytics
Server and Network Security
Single Sign-On (SSO)
Strategic IT Security Policy and Planning
Threat Intelligence Monitoring
Two-factor Authentication
User Credential Management
User Self-Service

FEATURED SPEAKERS

SPONSORS

cpd-member

SUMMARY

icon-attendeesicon-companiesicon-exhibitors

icon-keynotesicon-vendorsicon-productsicon-seminarsicon-one-oneicon-networking