A) Foundational Strategies in IAM
Every program needs a solid foundation. This track provides the information you need to properly plan and organize your IAM program, create or restart an identity and access management (IAM) strategy and ensure that processes and controls are implemented to gain real business benefits. We provide time-proven and emerging best practices, with a focus on doing the simple and right things first, and will help you avoid a number of pitfalls.
B) Moving Your IAM Program Forward
You have IAM experience. You’ve established your IAM program and you’ve created a roadmap. It’s time to get busy on your projects and move forward. In this track, we identify best practices, help you avoid pitfalls, and help with tool and service selection in dynamic IAM markets.
C) Building IAM for the Future
As organizations position themselves for the digital age, IAM programs are faced with new business demands and expectations. Business transparency, openness and the Internet of Thing’s enablement at the edge are forcing IAM leaders to reimagine IAM and how they have been managing their programs. In this track, we explore how digital business will accelerate changes in IAM program management, technology delivery and scale to address changes in business.
D) TechInsights for Agile IAM Architectures
Providing an architectural perspective on how IAM technology and processes can support value creation in your organization. These will be in-depth talks providing real-world insight into modern identity architecture, identity governance and administration, identity analytics, identity proofing, authorization, identity in the cloud, identity for third parties, privileged account management, and using identity to protect APIs.
E) Beyond the Checkbox: Security, Risk and Privacy
It’s now clear that in order for digital business to succeed, security, risk, privacy and IAM must be aligned. There are process, organizational, functional and technology overlaps that should be considered so that you can maximize your investments and have a robust, multifaceted approach to IAM, infrastructure protection, risk management and privacy protection. In this track, we cover the security disciplines that align with IAM along with the most important security trends.