A) Foundational Strategies in IAM
Every program needs a solid foundation. This track provides the information you need to properly plan and organize your IAM program, create or restart an IAM strategy and ensure that process and controls are implemented to gain real business benefits. It provides time-proven best practices, focuses on doing the simple and most appropriate things first, and helps you avoid a number of pitfalls.
B) Next Steps: Enhance and Advance Your IAM Program
Your IAM program is established. You have identified a set of projects. How will you move forward simply and successfully? This track helps you make the most of the tools that you have, augment those tools appropriately to fill gaps and ensure you are positioning your current IAM infrastructure for success.
C) Future Focus: IAM in the Digital Age
The Nexus of Forces (cloud, mobile, social and information) continues to have a profound effect on IAM programs. Digital business and the Internet of Things have begun to influence IAM plans. This track explores where and how IAM can support and leverage these emerging trends and technologies.
D) Tech Insights for Agile IAM Architectures
These in-depth talks provide an architectural perspective on how IAM technology and processes can support value creation in your organization. Get real-world insight into modern identity architecture, identity governance and administration, identity analytics, identity proofing, authorization, identity in the cloud, identity for third-parties, privileged account management, and using identity to protect APIs.
E) The Big Picture: Security, Risk and IAM
IAM and threat protection security are related disciplines. There are process, organizational, functional and technological overlaps that should be considered so you can maximize your investment and have a robust, multifaceted approach to IAM, infrastructure protection and risk management within your organization. This track provides advice on the security disciplines that intersect with IAM, focusing on the most important security trends.