IDM EUROPE

Identity Management

20 September 2017

Mövenpick Hotel, Amsterdam

SOCIAL


LATEST BLOGS


Of ‘Things’ and ‘Strings’

3rd March 2017

It requires a consistent reorientation and adjustment of current technologies and methods to meet the upcoming challenges of Identity Management.


CISO should be the dyke warden of IT security

2nd March 2017

Ian Yoxall, Principal Consultant, Intragen When it comes to IT security, many people have an SEP (Somebody Else’s Problem) mentality. Responsibility for security cannot be outsourced. It […]


LATEST TWEETS

EUROPE’s LEADING IDENTITY & ACCESS MANAGEMENT CONFERENCE
for senior risk management, security and IAM professionals across government and large enterprise organisations

At a glance

EUROPE’S LEADING IDENTITY AND ACCESS MANAGEMENT CONFERENCE FOR SENIOR RISK MANAGEMENT, SECURITY AND IAM PROFESSIONALS ACROSS GOVERNMENT AND LARGE ENTERPRISE ORGANISATIONS

The IAM sector is poised for major growth as businesses of all sizes look to develop strategies that are aligned to the needs of their business but also consider people, processes and technology. The global IAM landscape is set to grow to an estimated $18.3 billion in 2019 with an annual compound growth rate of nearly 15 per cent.

WHITEHALL MEDIA’S 4TH IDM EUROPE CONFERENCE WILL OFFER A HIGH LEVEL PLATFORM FOR THOUGHT LEADERS, PRACTITIONERS AND IAM SPECIALISTS ACROSS EUROPE
to discuss the infrastructural challenges and opportunities associated with managing and security identity within the enterprise. This must-attend event will review policies, processes, standards and emerging technologies being utilised by government and large enterprise to balance the need to secure their business with the imperative to grow.

FEATURED TOPICS

  • Analytics Insights and IAM
  • Authentication, Authorisation, Access
  • Cloud Computing Challenges
  • Data Loss Prevention
  • Data Governance
  • Data Protection Directives and Regulation
  • e-Government initiatives and trends
  • eID and electronic Trust Services
  • Encryption techniques
  • Enterprise Mobility and BYOD risks
  • Federated Access Management
  • Future IAM trends
  • Governance, Compliance, Regulatory Requirements
  • IAM and Disruptive Technologies – opportunities and risks
  • Identity Administration
  • Identity as a Service (IaaS)
  • Implementing an Identity Management Architecture
  • Incident Handling and Reporting
  • Managing User Entitlements & Privileges
  • Password Management
  • Proactive Monitoring of Systems
  • Provisioning / De-Provisioning
  • Risk Management and Information Security
  • Roles Management
  • Security Classification and Policy Enforcement
  • Server and Network Security
  • Single Sign-On (SSO)
  • Strategic IT Security Policy and Planning
  • Threat Intelligence Monitoring
  • User Credential Management

FEATURED SPEAKERS

SPONSORS

 cpd-member

SUMMARY

icon-attendeesicon-companiesicon-exhibitors

icon-keynotesicon-vendorsicon-productsicon-seminarsicon-one-oneicon-networking