Identity Management

20 September 2017

Mövenpick Hotel, Amsterdam



Of ‘Things’ and ‘Strings’

3rd March 2017

It requires a consistent reorientation and adjustment of current technologies and methods to meet the upcoming challenges of Identity Management.

CISO should be the dyke warden of IT security

2nd March 2017

Ian Yoxall, Principal Consultant, Intragen When it comes to IT security, many people have an SEP (Somebody Else’s Problem) mentality. Responsibility for security cannot be outsourced. It […]



Wednesday 20th September, 2017

PLEASE NOTE: All Conference Sessions (including slides) will be presented in English ONLY
The Seminars will take place from 12.15 – 13.00.
Delegates will be able to attend one seminar at the event. No pre selection is required – delegates will be able to select which session they attend onsite.


Operationalising Identity Intelligence for Efficiency and Risk Mitigation

Exploring intelligent approaches to access management which leverage a pragmatic approach to improve security operations, measurably reduce regulatory risks and reduce costs.

Balancing between Productivity & Control

Eddie van Ravesteijn , Director Business Enablement RES, Ivanti

What’s the most critical thing every enterprise worker needs to reach full productivity potential?

Access. Access to the right apps and services at the right time, based on the worker’s immediate context.

RES enables you to unlock that productivity potential by proactively and dynamically provisioning workers for the right access, apps and services, so they’re enabled to meet business performance targets. With RES, you can meet their needs from Day One on the new job, and each day after as their roles, responsibilities and even day-to-day working contexts change.

Provisioning can be incredibly complex. But RES makes it simple. With new hiring’s, transfers, promotions, departures and changes to working context (such as location, device and time of day), you can automatically provision and de-provision worker access to technology assets as needed.

Join our session to learn more about finding the balance between productivity and control.



IAM Architecture in the Cloud

The advent of Cloud is transforming the way businesses implement IAM. As organisations extend their IT infrastructures, they are faced with different on premise and cloud-based identity stores as users have multiple identities, both corporate and personal. This seminar will explore the plethora of IDM federation challenges and the opportunities offered by Cloud.

Privileged Account Management for the Real World

What is privileged account management and why does it matter? This seminar will discuss how to know who has access to sensitive data and build appropriate controls.

Secure Access Control for the Mobile Enterprise

Sharing best practice and identifying key success factors in secure implementation of BYOD and extending IAM infrastructure to mobile deployments.

Simplifying User Authentication

With the advent of cloud computing and enterprise mobility, access management has become more complicated. A critical issue facing IT departments is how to make access faster while also effectively managing security risks. Maintaining separate passwords and authenticating access to different applications can be a frustrating experience that can result in lack of productivity and revenue losses for businesses. This seminar explores how large enterprise can simplify user authentication, saving time and money.

A Crash Course in IAM Essentials: Control, Accountability, Transparency

Identifying best practice and ideal scenarios for optimum control, better accountability and transparency for both end-users and administrators.

Threat Intelligence: Managing Risk with Confidence

Are you underestimating your level of risk? This session looks to showcase successful examples of threat intelligence monitoring and response.

SSO – Improving Productivity and Performance

Providing a single login experience can cut down on wasted time and expenditure. SSO eliminates password reset calls, protects against unauthorized access to business applications and can help to improve productivity and performance. In this seminar session you will see how your organisation can benefit and make best use of SSO.

Using Identity to Empower and Grow your Business

How can enterprises with thousands of employees and global operations use their identity stores to empower and grow their business? Join this seminar session to learn more.