IDM EUROPE

Identity Management

14 December 2016

Mövenpick Hotel, Amsterdam

SOCIAL


LATEST BLOGS


USG People Identity for branding

22nd March 2016

Close interaction with clients, organisations and customers 


NXP Semiconductors embraces cloud security

NXP chooses hybrid IAM solution to support global Cloud strategy 


LATEST TWEETS

EUROPE’s LEADING IDENTITY & ACCESS MANAGEMENT CONFERENCE
for senior risk management, security and IAM professionals across government and large enterprise organisations

WHY ATTEND?

EUROPE’S LEADING IDENTITY AND ACCESS MANAGEMENT CONFERENCE FOR SENIOR RISK MANAGEMENT, SECURITY AND IAM PROFESSIONALS ACROSS GOVERNMENT AND LARGE ENTERPRISE ORGANISATIONS

Identity and Access Management (IAM) has emerged as a critical cornerstone for realising business benefits, from cost savings and unlocking efficiencies to business growth and greater visibility. Identity is now the focal point of customer relationships and is increasingly a pillar of support that facilitates improved performance through giving the right people the right level of access at the right time. For most enterprises, IAM is the first line of defence for protecting systems, applications and data along with confidentiality, integrity and privacy.

WHITEHALL MEDIA’S 3RD IDM EUROPE CONFERENCE WILL OFFER A HIGH LEVEL PLATFORM FOR THOUGHT LEADERS, PRACTITIONERS AND IAM SPECIALISTS ACROSS EUROPE
to discuss the infrastructural challenges and opportunities associated with managing and security identity within the enterprise. This must-attend event will review policies, processes, standards and emerging technologies being utilised by government and large enterprise to balance the need to secure their business with the imperative to grow.

FEATURED TOPICS

Analytics (user behaviour, privileged accounts)
Authentication, Authorisation, Access
Cloud Computing Challenges
Data Governance / Protection
Data Loss Prevention
Encryption techniques
Enterprise Mobility and BYOD risks
Federated Access Management
Governance, Compliance, Regulatory Requirements
IAM and Disruptive Technologies (Cloud, IoT, Blockchain) – opportunities and risks

IAM Programme Management
Identity Administration
Identity Intelligence
Identity as a Service (IaaS)
Implementing an Identity Management Architecture
Incident Handling and Reporting
Managing User Entitlements & Privileges
Password Management
Proactive Monitoring of Systems
Provisioning / De-Provisioning

Network Security and IAM considerations
Risk Management and Information Security
Security Classification and Policy Enforcement
Security Intelligence and Analytics
Server and Network Security
Single Sign-On (SSO)
Strategic IT Security Policy and Planning
Threat Intelligence Monitoring
Two-factor Authentication
User Credential Management
User Self-Service

FEATURED SPEAKERS

SPONSORS

 cpd-member

SUMMARY

icon-attendeesicon-companiesicon-exhibitors

icon-keynotesicon-vendorsicon-productsicon-seminarsicon-one-oneicon-networking