IDM EUROPE

Identity Management

20 September 2018

Postillion Convention Centre Amsterdam

SOCIAL


LATEST BLOGS


Are freelancers your weakest security link?

15th August 2017

Attractive benefits, flexible working hours and multiple career opportunities define a better work-life balance, it’s therefore no wonder that the UK is seeing an increase […]


Of ‘Things’ and ‘Strings’

3rd March 2017

It requires a consistent reorientation and adjustment of current technologies and methods to meet the upcoming challenges of Identity Management.


LATEST TWEETS

PROGRAMME

PLEASE NOTE: All Conference Sessions (including slides) will be presented in English ONLY

The conference will finish with a Drinks Reception sponsored by One Identity 

Session ONE – Context-aware, Risk-driven and Business-centric Identity and Access Management for the Enterprise

We explore how IAM can become a key enabler of business growth for organisations. Through cross-sector case studies and industry perspectives we charter key IAM imperatives including accountability, transparency, user experience and managing trust, privileges and entitlements. The early morning session will also explore:

  • EU Regulations and European-wide Identity Management initiatives
  • Why businesses require identity governance
  • Examples of successful deployments of comprehensive, customer focused identity management infrastructures
  • The impact of identity management investment on top-line revenue
  • How to use IAM to achieve business goals and empower digital business
  • The changing security landscape (attackers, threats and risks) and disruptive technologies
  • Operationalising identity intelligence for efficiency and risk mitigation
  • Future trends in the IAM space
09.15
Chair’s Opening Address

Robert Garskamp, Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform

09.40
Identity Systems at Scale: A Look at Standards, Certification, Trust Frameworks & Registration

Don Thibeau, Chairman and President,

Open standards like HTTP, OAuth, and OpenID Connect allow competing organizations to add value to their services, platforms, and products by ensuring interoperability across commercial, banking and government ecosystems.
 
Open standards can be a powerful tool set for developers. But identity systems require rules that address liability as well as ensure technical conformance. This presentation is a pragmatic look at ensuring conformance to open standards via self-certification using the ground-breaking OpenID Certification Program as a case study. We’ll look at how technology tools like standards and self-certification can be fit for purpose with governance rules that define the business, legal and technical requirements of identity systems. We’ll pay particular attention to how trust frameworks assign and enforce liability in complex identity systems. We’ll outline how registering trust frameworks ensure the transparency needed to build and maintain the trust needed in identity systems at scale.
 
The presentation concludes with presenting current, real world use-cases of identity systems at scale. We’ll highlight how technology tools and governance rules are enabling global identity projects. We’ll overview the Open Banking initiative in the UK, the International Air Travel Association (IATA)’s “One Identity” Program and other global identity initiatives.

 

10:00
Use Identity as a Strategic Asset in your Digital Transformation

Christian Stendevad, Executive Vice President, Omada

Identity provides multiple easy ways to create measurable value for the business. Improving security, efficiency, and compliance is just the beginning. Identity gives technical leaders a role in digital transformations, M&A, HR service quality, marketing insight and more…

10:15
Identity Management: Old Issues and Perspectives

Dimitri Chichlo, Former Vice President Information Security & Business Continuity,  Edmond de Rothschild

Since the beginning of networks, Identity Management has been a long, painful-running story, always at the forefront of hacking cases.

In this session, we are explore the following questions:
• What can we learn from the past regarding Identity Management?
• Who can you involve in order to ensure that digital identities are properly managed in organisations?
• What can you do to help your end users taking an active part in Identity Management?

10.35
Driving Technical Excellence with IDaaS: How a leading international audit, accountancy, advisory, tax and legal service company creates integrity and long-term value for its customers with Okta

Frank Keessen, IT Director, Mazars Netherlands

Today’s IT leaders have an unprecedented opportunity to transform the way their organisations do business. Mazars, an international, integrated and independent organisation, specialising in audit, accountancy, advisory, tax and legal service, has a strong focus on integrity and technical excellence, and creating long-term value for its customers. With thousands of customers and a multitude of disparate platforms, Mazars required a consolidated way of their end-users interacting with their platform. Additionally, delivering cloud services meant Mazars needs to protect information and safeguard privacy of all their users at any time. In this session, Frank Keessen, IT Director of Mazars Netherlands, will share how they have been able to deliver secure application access on one consolidated platform without causing an identity crisis whilst at the same time enhance the ease of use of their platform, and talk through the role Okta has played in this success.

10.50
Identity and Access Management (IAM) from a Philosophical Perspective – Dare to Question Why

Theo Sinnema, Identity and Access Management Consultant

This presentation will be focused on the why questions within Identity and Access Management from a customer, (end-)user, business and IT perspective knowing what the challenges will be faced (or already are faced) in the world of connecting things, people, information, identities.

11:10
Questions To The Panel Of Speakers
11.35
Morning Networking and Refreshments Served in the Exhibition Area
12:00
Seminar Sessions
12:45
Networking Lunch Served in the Exhibition Area

Session TWO – The Future of IAM in Enterprise

  • Defining an IAM strategy, Benchmarking Performance, Identifying and Overcoming Challenges
  • Exploring how to maintain, monitor, improve, optimise and govern IAM infrastructure
14:00
Chair’s Afternoon Address

Robert Garskamp, Entrepreneur, Advisor on Digital Identity Matters and Founder of the IDnextplatform

14:05
Consumable Access for the Enterprise

Colin Brown, Identity and Access Management Architect, BBC

The BBC is a huge collaborative endeavour, involving disparate groups of people in the creative delivery of entertainment and information. It is it no longer reasonable to expect people to put up with complex journeys and poor user interfaces or to assume an enterprise desktop. BBC Login has brought consumer standards to the enterprise to truly enable the vision of risk based access for globally mobile heterogeneous workforce.

In this presentation Colin Brown, Lead IAM Architect, will describe how the BBC has gone from concept to reality in under 12 months, describing the objectives, the outcomes and the challenges along the path to delivery.

14:25
GDPR and Data Breaches

Kannan Rasappan, PSD2 Solution Architect at Lloyds Banking Group

With rising identity federation in app and cloud world – digital identity is at greater threat. It comes as no surprise then that we hear about data leaks in the news. The open banking revolution is set to add stress to the ecosystem. GDPR is a serious effort in a long time from regulators to better manage, and hopefully improve, the situation for the benefit of digital users. With GDPR, the main focus is on identity data and how the data processors are bound by contract with data controllers. In this talk we cover identity management, best security practices, cost impact, data processor contracts, data breach detection as well as response and technical strategies for organisations.

14:45
Gaining Best Interaction Between Technology and Human in Identity Profiling

Chris Brown, VP International, Basis Technology

  • What are the key challenges with profiling individuals or organisations
  • Which domains are struggling with profiling and are they similar
  • Can technology help humans deliver a better system
  • Case studies
15:00
Questions to the Panel of Speakers
15:10
Afternoon Networking and Refreshments served in Exhibition Area
15.35
eIDAS Implementation in the Netherlands

Alice Vasilescu, ‎IT Project Officer – Connecting Europe Facility (CEF) eID at European Commission

Hans van der Burght, Information Architect and Lead Analyst, Dutch Ministry of Economic Affairs

The eIDAS Regulation provides a predictable legal framework and ensures the cross-border mutual recognition of eID means in the EU.
Since 29 September 2015, following the adoption of the implementing acts on cooperation between Member States on eID, on interoperability framework, on assurance levels for eID means and on notification, EU Member States may, on a voluntary basis, notify and recognise national eID means that citizens and companies could use across borders to access online public services. As of 29 September 2018 the recognition of notified eID will become mandatory. And though the regulation is primarily focused on online public services, the private sector could benefit from the use of the eIDAS eID services. Additionally, it is worth exploring whether this regulation could bring together key stakeholders of the eID landscape and bring benefits beyond the cross-border use cases envisaged by eIDAS, in particular at the national level.
In this context, the presentation will try to address the following three questions.
• What does this mean for the Member States? What is the status of eIDAS eID?
• What are the benefits for private service providers (IDPs and Relying Party)?
• How can eIDAS stimulate the electronic identification landscape alongside the cross-border use case?

15:55
Working with eIDAS – What are the main new application areas and services?

Hans Graux, Partner, Time.lex

The eIDAS Regulation became applicable across the EU on 1 July 2016, meaning that businesses have now had more than a year to experiment. But how much has actually changed, and have any innovations come from eIDAS? What are the main evolutions in trust services, but also in specific sectors like fintech, medtech and the public sector that build on the eIDAS framework? And what is still to come in the near future?

This session will look at some of the new ideas and realisations that have emerged with the support of eIDAS, and provides an outlook on likely new services for the future.

16:15
Questions to the Panel of Speakers
16:25
Closing Remarks from the Conference Chair
16:30
Conference Closes with a Drinks Reception sponsored by One Identity

Please note:
Whitehall Media reserve the right to change the programme without prior notice.