Wednesday 20th September, 2017
The Seminars will take place from 12.15 – 13.00.
Delegates will be able to attend one seminar at the event. No pre selection is required – delegates will be able to select which session they attend onsite.
Operationalising Identity Intelligence for Efficiency and Risk Mitigation
Exploring intelligent approaches to access management which leverage a pragmatic approach to improve security operations, measurably reduce regulatory risks and reduce costs.
Data Breaches and Access Risks
Uncovering access risks often exploited in data breaches, identifying ways to improve your IAM infrastructure and planning IAM controls to support and secure your operations which meet compliance requirements.
IAM Architecture in the Cloud
The advent of Cloud is transforming the way businesses implement IAM. As organisations extend their IT infrastructures, they are faced with different on premise and cloud-based identity stores as users have multiple identities, both corporate and personal. This seminar will explore the plethora of IDM federation challenges and the opportunities offered by Cloud.
Privileged Account Management for the Real World
What is privileged account management and why does it matter? This seminar will discuss how to know who has access to sensitive data and build appropriate controls.
Secure Access Control for the Mobile Enterprise
Sharing best practice and identifying key success factors in secure implementation of BYOD and extending IAM infrastructure to mobile deployments.
Simplifying User Authentication
With the advent of cloud computing and enterprise mobility, access management has become more complicated. A critical issue facing IT departments is how to make access faster while also effectively managing security risks. Maintaining separate passwords and authenticating access to different applications can be a frustrating experience that can result in lack of productivity and revenue losses for businesses. This seminar explores how large enterprise can simplify user authentication, saving time and money.
A Crash Course in IAM Essentials: Control, Accountability, Transparency
Identifying best practice and ideal scenarios for optimum control, better accountability and transparency for both end-users and administrators.
Threat Intelligence: Managing Risk with Confidence
Are you underestimating your level of risk? This session looks to showcase successful examples of threat intelligence monitoring and response.
SSO – Improving Productivity and Performance
Providing a single login experience can cut down on wasted time and expenditure. SSO eliminates password reset calls, protects against unauthorized access to business applications and can help to improve productivity and performance. In this seminar session you will see how your organisation can benefit and make best use of SSO.
Using Identity to Empower and Grow your Business
How can enterprises with thousands of employees and global operations use their identity stores to empower and grow their business? Join this seminar session to learn more.