Follow us on Twitter  Watch our You Tube Channel  Add us on Linkedin  follow us on google plus


  • microsoft-bw-logo


  • dell-secruity


  • globalsign
  • wedacon
  • ssh
  • i-welcome
  • betasystems


  • idnext


  • cpd-member
Europe’s leading Identity and Access Management conference for senior risk management, security and IAM professionals across government and large enterprise organisations

Identity and Access Management (IAM) has emerged as a critical cornerstone for realising business benefits, from cost savings and unlocking efficiencies to business growth and greater visibility. Identity is now the focal point of customer relationships and is increasingly a pillar of support that facilitates improved performance through giving the right people the right level of access at the right time. For most enterprises, IAM is the first line of defence for protecting systems, applications and data along with confidentiality, integrity and privacy.

The IAM sector is poised for major growth as businesses of all sizes look to develop strategies that are aligned to the needs of their business but also consider people, processes and technology. The global IAM landscape is set to grow to an estimated $18.3 billion in 2019 with an annual compound growth rate of nearly 15 per cent.

Whitehall Media’s 3rd IDM Europe conference will offer a high level platform for thought leaders, practitioners and IAM specialists across Europe to discuss the infrastructural challenges and opportunities associated with managing and security identity within the enterprise. This must-attend event will review policies, processes, standards and emerging technologies being utilised by government and large enterprise to balance the need to secure their business with the imperative to grow.

Featured Speakers

  • Robert

    Robert Garskamp, Chairman and Founder, IDNext Platform

    View more >>

Register NOW
Download the sponsorship packages
Meet the speakers
Previous Attendees
Meet the sponsors
WM Blogs


  • Analytics Insights and IAM
  • Authentication, Authorisation, Access
  • Cloud Computing Challenges
  • Data Loss Prevention
  • Data Governance
  • Data Protection Directives and Regulation
  • e-Government initiatives and trends
  • eID and electronic Trust Services (eTS)
  • Encryption techniques
  • Enterprise Mobility and BYOD risks
  • Federated Access Management
  • Future IAM trends
  • Governance, Compliance, Regulatory Requirements
  • IAM and Disruptive Technologies – opportunities and risks
  • Identity Administration
  • Identity as a Service (IaaS)
  • Implementing an Identity Management Architecture
  • Incident Handling and Reporting
  • Managing User Entitlements & Privileges
  • Password Management
  • Proactive Monitoring of Systems
  • Provisioning / De-Provisioning
  • Risk Management and Information Security
  • Roles Management
  • Security Classification and Policy Enforcement
  • Server and Network Security
  • Single Sign-On (SSO)
  • Strategic IT Security Policy and Planning
  • Threat Intelligence Monitoring
  • User Credential Management