IDM EUROPE

Identity Management

20 September 2017

Mövenpick Hotel, Amsterdam

SOCIAL


LATEST BLOGS


USG People Identity for branding

22nd March 2016

Close interaction with clients, organisations and customers 


NXP Semiconductors embraces cloud security

NXP chooses hybrid IAM solution to support global Cloud strategy 


LATEST TWEETS

PROGRAMME

Session ONE – Context-aware, Risk-driven and Business-centric Identity and Access Management for the Enterprise

We explore how IAM can become a key enabler of business growth for organisations. Through cross-sector case studies and industry perspectives we charter key IAM imperatives including accountability, transparency, user experience and managing trust, privileges and entitlements. The early morning session will also explore:

  • EU Regulations and European-wide Identity Management initiatives
  • Why businesses require identity governance
  • Examples of successful deployments of comprehensive, customer focused identity management infrastructures
  • The impact of identity management investment on top-line revenue
  • How to use IAM to achieve business goals and empower digital business
  • The changing security landscape (attackers, threats and risks) and disruptive technologies
  • Operationalising identity intelligence for efficiency and risk mitigation
  • Future trends in the IAM space
9.00
Chair’s Opening Address
09:05
Keynote Address: Secure Access for Faster, Simpler Government

In this opening session we hear about how one government ministry is applying Identity Life Cycle management to optimise its performance, reduce inefficiencies and deliver better public services.

09:25
A Smarter Way to Manage Identity

Organisations are having to provide access for a growing number of identities both within and outside their organisation, without compromising security or exposing sensitive information. This session provides an overview of how one large organisation is achieving the right balance between customer and employee identity management.

09.40
Making Identity the Centrepiece of your Security Landscape

The evolving security landscape is forcing organisations to review their IAM strategies. Thinking in terms of defending the organisational perimeter is no longer viable for the connected enterprise. This session explores the coming transition of IAM and its changing role within the cyber-security landscape.

10.00
Bolstering Security through Effective Risk Management

Although compliance is still a key driver in IAM initiatives, IAM is evolving into a risk-based discipline with many enterprises focused on entitlement management and enforcement of access controls. Effective IAM systems should be able to identify where an organisation is at risk. If you cannot see risk then you cannot control it.

In this session we explore a risk-driven approach to IAM which takes consideration of: access management policies, consistent application of role/rule-based access, segregation of duties as well as non-technical issues like managing confidential information, employee contractual considerations and data protection aspects of information breaches.

10:15
The Business Case for IAM

As European states transition towards information-based economies, intellectual property and trade secrets are critical to the survival of large competitive business. In this morning keynote session, we look to explore the critical tenets of identity management and explore:

  • The value proposition of IAM and how can it help to empower business, improve growth and performance
  • How businesses can align their strategic business objectives with their risk management metrics and IAM solutions
  • IAM essentials – control, accountability, transparency, compliance
  • Defining and implementing a IAM & GRC roadmap
  • An overview of market drivers, trends and standards
10.35
Identity Governance: Securing Privileged Accounts

Privileged accounts have a valid set of credentials which can be used (or misused) to gain access to mission-critical systems and networks. With non-restrictive, elevated levels of access, privileged accounts can evade access controls and can easily be used by attackers or malicious insiders to cause significant damage. In this session we explore how businesses can utilise analytics, among other best practice solutions, to secure privileged accounts and implement processes that mitigate risk, look at the ‘right’ data and not all the data, and meet high stakes compliance requirements.

10:50
Questions To The Panel Of Speakers
11:00
Morning Networking and Refreshments Served in the Exhibition Area
11:30
Meeting Audit and Compliance Needs

We focus on IDM standards, guidelines and procedures as well as on the implementation and governance of these activities with specific reference to audit and compliance needs and challenges.

11:50
Trust Based Access Control

Employees require access to sensitive information and critical systems for numerous reasons and levels of trust have to be associated with access control. In this session we consider:

  • What trust based access control should look like
  • Identifying secure users and behaviours
  • Balancing enablement with accountability
  • Balancing security with usability – taking account of user experience and needs
12:05
Questions to the Panel of Speakers

Delegate movement to the Seminar Rooms

12:15
Seminar Sessions
13:00
Networking Lunch Served in the Exhibition Area

Session TWO – The Future of IAM in Enterprise

  • Defining an IAM strategy, Benchmarking Performance, Identifying and Overcoming Challenges
  • Exploring how to maintain, monitor, improve, optimise and govern IAM infrastructure
14:00
Chair’s Afternoon Address
14:05
Afternoon Keynote Address: Promoting the Digital Economy

Fast and flexible access is becoming important than ever to driving efficiency in government. In this keynote session, delegates will hear about how the public sector balances faultless security with operational flexibility, and the journey that has been undertaken to make access and authentication quicker and simpler.

14.25
Using Identity to Empower your Business

We hear from a multinational retailer about how they are supporting the entire identity lifecycle within their organisation, and explore:

  • Defining IAM strategy, implementing a roadmap
  • Managing IAM projects – common mistakes and how to avoid them
  • Scaling to thousands of identities
  • Offering adaptive risk-based authentication
  • Supporting the latest standards
14:40
Data-centric Security and Fine-grained Access Management

This presentation explores new ways of authentication, shares best practice on future-proofing IAM investment and offers key tips on managing access management in large organisations.

15:00
Questions to the Panel of Speakers
15:10
Afternoon Networking and Refreshments served in the Exhibition Area
15.40
Case Study: Overcoming IAM Challenges at a Financial Institution

In this session we hear about the IAM challenges of a financial institution, and how they are working to overcome them with particular attention devoted to:

  • Why organisations deploy IAM
  • Why IAM projects stall and how to overcome common challenges
  • Recipe for success – top tips
15.55
Managing Cloud Risks and Rewards

Navigating the complex blend of on and off premise business critical resources is a big challenge for large enterprise organisations. This session will explore developing cloud standards and the core requirements from users and organisations about cloud infrastructure.

16.10
Is this the end of the road for passwords?
  • What is the future of passwords?
  • Are password managers reliable?
  • Will biometric systems replace passwords?

We explore the complexities of the much-maligned password system, and how enterprises can balance convenience with risk.

16.25
Closing Keynote: The Future of IAM

Our closing keynote session discusses key themes pertinent for IAM in the enterprise, including:

  • Identity, privacy and trust
  • Overcoming authentication challenges
  • Building user awareness
  • Defending against malware
  • New and existing challenges: mobile identity management, scalability, compromised credentials, privileged account management
  • Preventing misuse of delegated credentials
16.45
Questions to the Panel of Speakers
16.50
Closing Remarks from the Conference Chair
17.00
Conference Closes, Delegates Depart

Please note:
Whitehall Media reserve the right to change the programme without prior notice.