IDM EUROPE

Identity Management

8 March 2017

Mövenpick Hotel, Amsterdam

SOCIAL


LATEST BLOGS


USG People Identity for branding

22nd March 2016

Close interaction with clients, organisations and customers 


NXP Semiconductors embraces cloud security

NXP chooses hybrid IAM solution to support global Cloud strategy 


LATEST TWEETS

EUROPE’s LEADING IDENTITY & ACCESS MANAGEMENT CONFERENCE
for senior risk management, security and IAM professionals across government and large enterprise organisations

At a glance

EUROPE’S LEADING IDENTITY AND ACCESS MANAGEMENT CONFERENCE FOR SENIOR RISK MANAGEMENT, SECURITY AND IAM PROFESSIONALS ACROSS GOVERNMENT AND LARGE ENTERPRISE ORGANISATIONS

Identity and Access Management (IAM) has emerged as a critical cornerstone for realising business benefits, from cost savings and unlocking efficiencies to business growth and greater visibility. Identity is now the focal point of customer relationships and is increasingly a pillar of support that facilitates improved performance through giving the right people the right level of access at the right time. For most enterprises, IAM is the first line of defence for protecting systems, applications and data along with confidentiality, integrity and privacy.

WHITEHALL MEDIA’S 3RD IDM EUROPE CONFERENCE WILL OFFER A HIGH LEVEL PLATFORM FOR THOUGHT LEADERS, PRACTITIONERS AND IAM SPECIALISTS ACROSS EUROPE
to discuss the infrastructural challenges and opportunities associated with managing and security identity within the enterprise. This must-attend event will review policies, processes, standards and emerging technologies being utilised by government and large enterprise to balance the need to secure their business with the imperative to grow.

FEATURED TOPICS

  • Analytics (user behaviour, privileged accounts)
  • Authentication, Authorisation, Access
  • Cloud Computing Challenges
  • Data Governance / Protection
  • Data Loss Prevention
  • Encryption techniques
  • Enterprise Mobility and BYOD risks
  • Federated Access Management
  • Governance, Compliance, Regulatory Requirements
  • IAM and Disruptive Technologies (Cloud, IoT, Blockchain) – opportunities and risks
  • IAM Programme Management
  • Identity Administration
  • Identity Intelligence
  • Identity as a Service (IaaS)
  • Implementing an Identity Management Architecture
  • Incident Handling and Reporting
  • Managing User Entitlements & Privileges
  • Password Management
  • Proactive Monitoring of Systems
  • Provisioning / De-Provisioning
  • Network Security and IAM considerations
  • Risk Management and Information Security
  • Security Classification and Policy Enforcement
  • Security Intelligence and Analytics
  • Server and Network Security
  • Single Sign-On (SSO)
  • Strategic IT Security Policy and Planning
  • Threat Intelligence Monitoring
  • Two-factor Authentication
  • User Credential Management
  • User Self-Service

FEATURED SPEAKERS

SPONSORS

 cpd-membercpd-certified

SUMMARY

icon-attendeesicon-companiesicon-exhibitors

icon-keynotesicon-vendorsicon-productsicon-seminarsicon-one-oneicon-networking