2022 day highlights

Over 3 days attendees had access to unbiased, researched backed Gartner content, as well as guest keynotes, case studies, and solution provider sessions to help build their future-proof identity and access management strategy.  

Day 1

Speakers:

  • Rebecca Wyer, Head of Identity Services, NatWest Group
  • Amanda Miglionico, Digital Experience Lead, NatWest Bank

Gartner Experts:

  • Mary Mesaglio, Managing Vice President, Gartner
  • Akif Khan, VP Analyst, Gartner

Sessions:

  • Gartner Opening Keynote: How to Digitally Accelerate When You’re So Freaking Tired
  • Case Study: Why a Multi-Factor Authentication Service is a Critical Part of an IAM Implementation
  • Emerging Technologies in IAM

Day 2

Speakers:

  • Baroness Susan Greenfield, Founder & CEO, Neuro-Bio Ltd
  • Peter Hinssen, Keynote Speaker, Author, Nexxworks

Gartner Experts:

  • Patrick Hevesi, VP Analyst, Gartner

Sessions:

  • Guest Keynote: The Impact Of The Digital World On The 21st Century Mind
  • Guest Keynote: Preparing for the Never Normal
  • Technical Insights — Cybersecurity Mesh Deep Dive: Architecture

A look back at 2022's agenda

View By:

A look back at 2022's agenda

Wednesday, 11 May, 2022 / 07:00 PM - 08:15 PM BST

Registration and Information

Registration and information hours for the day.

Thursday, 12 May, 2022 / 07:30 AM - 07:00 PM BST

Registration and Information

Registration and information hours for the day.

Thursday, 12 May, 2022 / 08:00 AM - 09:30 AM BST

Arrival Refreshments on the Exhibit Showcase

Head to the Exhibit Showcase to enjoy a coffee and morning pastry! Engage with your peers, Gartner experts, and exhibitors before the Keynote session.

Thursday, 12 May, 2022 / 08:00 AM - 04:45 PM BST

IBM Security: Enterprise cybersecurity solutions

Let's create security that trusts nothing and verifies everything. The future of security should be one of confidence. Grow, innovate and adopt new ways of working with contextual, predictive security. See how zero trust security can move your business forward.

Thursday, 12 May, 2022 / 08:00 AM - 04:45 PM BST

Okta Engagement Zone

Come visit the Okta Engagement Zone to talk with our experts, view our product demos and find out more about becoming an identity-first organisation. You can also pick up some Okta goodies and see yourself in a different way...

Thursday, 12 May, 2022 / 09:30 AM - 10:15 AM BST

Gartner Opening Keynote: How to Digitally Accelerate When You’re So Freaking Tired

Mary Mesaglio, Managing Vice President, Gartner

It’s 2022 and the crises just keep coming. Leaders are expected to guide their people through a raft of big problems: from Covid to geopolitical tensions to social justice to inflation. It’s tough out there. Meanwhile, organizations continue to transform and you must find a way to motivate your people in the face of all this. Executive expectations haven’t abated because we’re all feeling the fatigue. This opening keynote addresses how to continue your digital acceleration while keeping your people – and yourself – safe and whole.

Thursday, 12 May, 2022 / 10:15 AM - 11:00 AM BST

Refreshment Break

Join us for refreshments in a brief break between sessions.

Thursday, 12 May, 2022 / 10:15 AM - 07:00 PM BST

Exhibit Showcase Open Hours

Visit the Exhibit Showcase to evaluate industry offerings that can move your business forward. Engage with your peers, Gartner experts, and exhibitors. Attend a theater session to see technology in action.

Thursday, 12 May, 2022 / 10:30 AM - 10:50 AM BST

Appgate: How IAM will be Driving Network Security in the Future

IAM has played a big role in providing the right application access rules for people in your organisation. In this session we will explain how modern security architectures like Zero Trust Network Access (ZTNA) can leverage the company's efforts that were made to implement IAM to also align and automate network access, and eliminate the network as an attack vector.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Thursday, 12 May, 2022 / 11:00 AM - 11:30 AM BST

State of User Authentication, 2022

Ant Allan, VP Analyst, Gartner

User authentication is at the heart of account protection for both consumer and workforce use cases, but cutting through the noise about passwordless authentication, hardware tokens, and biometric authentication can be difficult. This session separates hype from the reality, theoretical from possible, and provides context of how to think about, and invest in, new user authentication technologies.

Thursday, 12 May, 2022 / 11:00 AM - 11:30 AM BST

Emerging Technologies in IAM

Akif Khan, VP Analyst, Gartner

The session will cover the key emerging technologies in IAM and how IAM leaders can better prepare themselves for these.

Thursday, 12 May, 2022 / 11:00 AM - 11:30 AM BST

The State of Access Management, 2022

Henrique Teixeira, Sr Director Analyst, Gartner

Access Management technologies are enablers of Identity First security. What has been changing in the market, driving the need to account for new user constituencies, and new work models? How is access management technology continuing to evolve to meet these new challenges? We will talk about what is available today, and what kinds of things can you expect to take advantage of in the near future.

Thursday, 12 May, 2022 / 11:00 AM - 11:30 AM BST

Top Trends in Security and Risk Management

Patrick Hevesi, VP Analyst, Gartner

“Top trends” highlight shifts in the security ecosystem that aren't widely recognized, but are likely to have potential for disruption. This presentation will describe the significant trends in risk management and how organizations are taking advantage of these trends. Key issues include: Top technological improvements in the security product landscape; Trends in creating a top notch security organization; and long-term trends that will influence security strategy

Thursday, 12 May, 2022 / 11:00 AM - 11:45 AM BST

Ask the Expert: How Do I Automate All These Identity Governance and Administration Tasks?

David Collinson, Sr Director Analyst, Gartner

IGA is often used as a tool to automate various manual processes - up to and including the use of robots and AI. This session will give you an opportunity to ask questions around automation and IGA;

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Thursday, 12 May, 2022 / 11:00 AM - 12:30 PM BST

Workshop: Defining a Successful IAM Program

Kevin Kampman, Sr Director Analyst, Gartner

During this workshop IAM leaders will learn the importance, and what steps are required for the definition of a well-crafted IAM Program. The session will include exercises for creating your own IAM vision.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Thursday, 12 May, 2022 / 11:45 AM - 12:15 PM BST

CyberArk: How Digital Identities Drive Cybersecurity Debt

The rapid pace of digital transformation investments has led to a rise in cybersecurity debt, increasing the threat of attack. According to the 2022 CyberArk Identity Security Threat Landscape Report, 79% say security has taken a backseat in favor of accelerating digital initiatives. Learn about the impact of increasing digital identities on cybersecurity debt, and what building blocks can be put in place to strengthen defenses.

Thursday, 12 May, 2022 / 11:45 AM - 12:15 PM BST

Okta: Run Towards Your Problems, and not Away From Them; Start with Identity

Joe Diamond, PRODUCT MARKETING, Okta

Are you running from your problems? Or towards them? The work-from-anywhere and on any device environment has emerged, making it harder than ever to keep the bad guys out. We can no longer rely on a physical perimeter, but we can modernize our identity controls to better safeguard our users, devices, applications and data. In this session we explore how an identity-first approach can drastically improve your security posture, while also improving the end user experience.

Thursday, 12 May, 2022 / 11:45 AM - 12:15 PM BST

One Identity: Get Ahead of Convergence with Unified Identity Security​

Alan Radford, SOLUTIONS ARCHITECT, One Identity

Do not miss this lively and potentially entertaining session that brings together solution providers from various industries to share the challenges, foibles, fixes and success stories on the way to implementing unified identity security. Hear how they overcame boardroom naysayers, legacy limitations and consolidated security vendors to secure the people, apps and data that are essential to the success of their organisation.

Thursday, 12 May, 2022 / 11:45 AM - 12:15 PM BST

Ping Identity: Defuse Your Next Crisis with an Agile IAM Strategy

M Jason Wolf, CHIEF REVENUE OFFICER, Ping Identity

Ever feel like you’re lurching from crisis to crisis? Over the past two years, the pandemic has forced organisations to pivot to digital services at breakneck speed, putting customer and employee experiences at risk. Today, these hastily developed digital services find themselves on the front line, as escalating geopolitical tensions threaten to trigger cyberattacks on an unprecedented scale.
In this session, we’ll explore how an agile IAM strategy can help you defuse UX and cybersecurity crises—and invite a special guest to share the story of how they’ve achieved this in practice.

Thursday, 12 May, 2022 / 11:45 AM - 12:15 PM BST

Saviynt: Completing The 1,000 Piece IAM Convergence Puzzle

Chris Owen, Dir. of Product Management, Saviynt

Even knowing what the end picture will look like, finishing a 1,000-piece puzzle has never been easy. Navigating the different colours, shapes and other people trying to “help” has its challenges. The same can be said for converging identity and security technologies and programs, but instead of 1,000 pieces, you may have more than 100,000 endpoints, users, applications, third-parties and more to govern and administer. This session reveals how organisations can plan for, and execute on, a converged IAM strategy that simplifies management while increasing enterprise security.

Thursday, 12 May, 2022 / 11:45 AM - 12:30 PM BST

Roundtable: How IAM Managed Services Contribute to a Global Cyber Security Strategy, moderated by iC Consult

Ulli Rottmüller, Head of Marketing, iC Consult Group GmbH

Digital Identities are the core of Zero Trust. Managed Services for IAM are an efficient approach to leverage consistent levels of security with factory patterns. DevOps models require flexibility, so it is crucial to ensure that central MSP approaches do not conflict or slow down agile development.
Join your peer in the interactive session to discuss:

– The role of Managed Services in Zero Trust
– How IAM processes enable DevOps teams
– How MSP supports a Zero Trust Strategy at a global scale

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Thursday, 12 May, 2022 / 12:30 PM - 01:00 PM BST

How to Mature Your Microsoft 365 Identity Management

Paul Rabinovich, Sr Director Analyst, Gartner

Implementing hybrid identity for Microsoft 365 and protecting employee, administrator and partner access can be daunting. This session will guide you through best practices for Microsoft 365 IAM.

Thursday, 12 May, 2022 / 12:30 PM - 01:00 PM BST

Do Privileged Access Management Right: How to Build an Effective and Mature PAM Program

Felix Gaehtgens, VP Analyst, Gartner

Many organizations struggle with PAM after some small initial success, can't manage to get further. This session: sheds light on: Why is PAM such a crucial piece of any security program? What are the common pitfalls? What should you do in the near, medium and long term?

Thursday, 12 May, 2022 / 12:30 PM - 01:00 PM BST

Case Study: Digital Identity & Security Experience Powering a Bank’s Digital Transformation Journey

Miguel Villaumbrales, Senior Manager, BBVA

Digital positioning has been revealed as one of the key pillars of successful companies. Digital ecosystems changes traditional paradigms and BBVA due to it digital position, embraced those new ecosystems and customer experiences, providing banking services wherever.
This session will bring to life how BBVA built a powerful Digital Identity strategy accompanying the business in a synergic way, thanks to the biometrics ecosystem we delivered. The result: power banking security embedded in every single transaction.

Thursday, 12 May, 2022 / 12:30 PM - 01:00 PM BST

Case Study: Why a Multi-Factor Authentication Service is a Critical Part of an IAM Implementation

Rebecca Wyer, Head of Identity Services, NatWest Group

Amanda Miglionico, Digital Experience Lead, NatWest Bank

NatWest will discuss how multi-factor authentication and biometrics are a key component of an IAM project. They will discuss the challenges of setting up and delivering a project of this scale across their multiple banking brands. They will outline how they have achieved significant customer and business benefits.

Thursday, 12 May, 2022 / 12:30 PM - 01:15 PM BST

Ask the Expert: How to build your Cloud Security Strategy and Architecture

Patrick Hevesi, VP Analyst, Gartner

Come ask the expert any question on the acronym soup in Cloud Security - CASB, SSE, CSPM, CWPP, CNAPP, SASE, CSMA, CIEM and IAM. How the different products work, any questions on where to start and how to build your cloud security architecture.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Thursday, 12 May, 2022 / 01:00 PM - 02:00 PM BST

Exhibitor Networking Lunch: How to Put Identity Data to Work to Stop Identity Sprawl in its Tracks, Hosted by Radiant Logic

Identity management is moving from being network centric to data centric–on a massive scale–while also demanding digital transformation efforts at an unprecedented speed. This lunch conversation will discuss how to best embrace a step-by-step approach to identity modernization, where and what to start with, and how to leverage an identity data foundation as the basis for all of your projects.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Thursday, 12 May, 2022 / 01:00 PM - 02:00 PM BST

Exhibitor Networking Lunch: Biggest aha moments on the Identity Security Journey, Hosted by Sailpoint

Come have lunch with leading SailPoint experts who will share their many lessons learned on the Identity Security Journey, so you don’t have to. Bring your lessons and questions too for an interactive lunch where we all learn together from our combined experiences.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Thursday, 12 May, 2022 / 01:00 PM - 02:00 PM BST

Exhibitor Networking Lunch: Consolidate Vendors to Strengthen IT Security, Hosted by OneIdentity

Join our Premier Lunch as we dive into the rapid convergence of Access Management, IGA and PAM solutions. It’s been estimated that by 2025 70% of new deployments will converged systems. In this lunch, you learn how One Identity’s Unified Identity Security offering can accelerate your strategy and help to consolidate the number of vendors and solutions required to protect what’s essential to your success.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Thursday, 12 May, 2022 / 01:00 PM - 02:00 PM BST

Exhibitor Networking Lunch: Beyond the Vault: Cloud-Powered PAM and the Least Privilege Revolution, Hosted by Saviynt

Chris Owen, Dir. of Product Management, Saviynt

Across the globe, enterprises race toward improved cloud migration and digitisation – a transition that requires PAM and identity governance platforms to also keep pace.

The problems with legacy PAM include limited oversight, high deployment and operational costs, and static account architecture built around usernames and passwords — all of which slow modernisation.

Over lunch, we’ll discuss the history of PAM, explore its password vaulting roots, and how modern enterprises can embrace zero trust by integrating IGA and PAM capabilities.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Thursday, 12 May, 2022 / 01:00 PM - 02:00 PM BST

Exhibitor Networking Lunch: Okta's Identity over Lunch

Join the Okta team for lunch to review the Identity and Access Management Summit so far and discuss what it takes to be an identity-first organisation. We will look at the key messages that have come out of the conference, exchange our insights and talk about next steps on how your organisation can enable everyone to safely use any technology.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Thursday, 12 May, 2022 / 01:00 PM - 02:00 PM BST

Exhibitor Networking Lunch: Unmanaged, Unsecured Identities, Hosted by CyberArk

Digital acceleration has been rapid and has created many hundreds of thousands of new human and non-human identities in the average enterprise organization, many of which have sensitive access. On top of an increased level of threat from ransomware and supply chain attacks, have we created an easily-exploitable identity-centric attack surface? Join CyberArk and PwC for an open discussion on how the necessary steps organisations took to adapt in the recent, turbulent past - featuring significant environmental, political, trade and health challenges – may have affected our cyber resilience.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Thursday, 12 May, 2022 / 01:00 PM - 02:30 PM BST

Grab lunch on the Exhibit Showcase

Head to the Exhibit Showcase for a bite to eat! Engage with your peers, Gartner experts, and exhibitors while enjoying delicious food and beverages. Evaluate industry offerings that can move your business forward. Attend a theater session to see technology in action.

Thursday, 12 May, 2022 / 01:15 PM - 01:35 PM BST

Delinea: Modern PAM: Defining the boundaries of access

As teams continue to work remotely and more IT resources move to the cloud, security strategies must keep pace. Modern Privileged Access Management (PAM) is a zero-trust approach that puts privileged access at the centre of your cybersecurity strategy. In this session, learn how the latest security requirements are steering the evolution of PAM to make sure users can get just-in-time, just-enough access, while IT gets the control to stay secure and compliant. With seamless security that operates behind the scenes, you don't need to compromise productivity to reduce your risk.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Thursday, 12 May, 2022 / 01:40 PM - 02:00 PM BST

Yubico: Establishing Trusted Identities Within your Zero Trust Strategy

Nic Sarginson, Solutions Lead, Yubico Ltd

Passwords are no longer secure. Mobile authentication is phishable. Strong authentication is critical. Validating that the devices used for authentication are secure is critical to Zero Trust. Mobile phone numbers are not uniquely tied to users and can be hacked. In this session, learn why not all MFA is created equal and why phishing-resistant MFA should be a key part of establishing trusted identities in support of your Zero Trust strategy.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Thursday, 12 May, 2022 / 02:05 PM - 02:25 PM BST

Onfido: Think like a Fraudster: Decoding new Behaviours

Identity fraud rates have increased 44% since 2019 — and aren't slowing down.

But better understanding of fraudster behaviours can help you to protect your business.

In this session, we’ll be sharing proprietary data insights to examine how fraudulent behaviour is changing.

Join to learn:

How attack patterns have changed
Which industries are being most heavily targeted
Which global identity documents are most frequently targeted by fraud

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Thursday, 12 May, 2022 / 02:30 PM - 03:00 PM BST

Address the Top Maturity Gaps in IAM Programs with Insights from Gartner's ITscore

David Collinson, Sr Director Analyst, Gartner

Security and Risk leaders struggle to achieve the desired level of maturity across certain key activities that are critical to a healthy IAM function. Failure to address these "top gaps" devalues IAM programs, and increases risk to the enterprise. This session will outline the top gaps IAM programs are experiencing, and provide guidance on how to improve maturity in these critical areas.

Thursday, 12 May, 2022 / 02:30 PM - 03:00 PM BST

Cybersecurity Mesh Architecture 101

Felix Gaehtgens, VP Analyst, Gartner

With many IT assets now outside traditional enterprise perimeters, IT leaders must rethink security. Enter the cybersecurity mesh architecture, a composable and scalable approach to extend security controls to distributed assets by decoupling policy enforcement from the assets being protected.

Thursday, 12 May, 2022 / 02:30 PM - 03:00 PM BST

How to Choose an Access Management Solution: Using the MQ and Beyond

Henrique Teixeira, Sr Director Analyst, Gartner

Access management solutions are mature, rich with features and offer a broadened scope that overlaps with many adjacent areas. Learn how to better use the AM MQ and a five-step approach to select a long-lasting, cost-efficient AM solution.

Thursday, 12 May, 2022 / 02:30 PM - 03:00 PM BST

Practical Applications of Decentralized Identity and Verifiable Claims

Homan Farahmand, VP Analyst, Gartner

Decentralized identity and verifiable claims will disrupt IAM by enabling a shared trust model, protocol-based controls, and decentralized identity data exchange. In this session we discuss how organizations can leverage these technologies to drive efficiency in identity verification and data exchange for business processes in digital ecosystems.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Thursday, 12 May, 2022 / 02:30 PM - 03:15 PM BST

Ask the Expert: Is Secure, Simple, Seamless User Authentication Possible?

Ant Allan, VP Analyst, Gartner

Growing attacks on identity require strong, multi-factor user authentication, but diverse endpoints, complex application environments, and an unwillingness to add friction to the user experience can derail efforts to improve the security of user authentication. Bring your questions about trends and best practices for customer and employee user authentication to this session.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Thursday, 12 May, 2022 / 02:30 PM - 04:00 PM BST

Workshop: Defining Meaningful Metrics for IAM

Kevin Kampman, Sr Director Analyst, Gartner

Knowing what metrics matter to your IAM stakeholders is critical to prioritizing, developing and monitoring IAM features. Metrics identify the success of individual projects and where attention and improvements must take place. To succeed, they must be terms the stakeholder recognizes and understand. They should also align with or influence other initiatives. Learn how to set proper expectations.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Thursday, 12 May, 2022 / 03:15 PM - 03:45 PM BST

Auth0: How can Strategic CIAM Impact Your Business

Data breaches, account takeover, credential stuffing, and identity theft cost trust and impact revenue. Customer Identity and Access Management (CIAM) at a strategic level helps to mitigate these risks before they affect your business. Strategic CIAM aligns the right people, processes, and technology partners to create conversion points and increase your bottom line. This session will give you a better understanding of what strategic CIAM is, how it differs from IAM, its relevance to your business - and the benefits of considering a new approach.

Thursday, 12 May, 2022 / 03:15 PM - 03:45 PM BST

BeyondTrust: The Path to Zero Trust by Securing Privileged Identities

Morey Haber, CSO, BeyondTrust

Attacks on identity and privileged access pathways are relentless, with the stakes of a cyber-breach never higher. Securing privileged identity is critical as it is the foundation of a successful Zero Trust implementation.
In this session you will learn:
• Why protecting identities is fundamental to achieving Zero Trust
• Practical steps to secure your privileged identities
• The role Privileged Access Management plays in achieving Zero Trust

Thursday, 12 May, 2022 / 03:15 PM - 03:45 PM BST

ForgeRock: Using Modern CIAM to Drive Customer Privacy and Data Sovereignty

Alex Laurie, Solution Architecture, Forgerock

Data privacy is no longer just about meeting regulatory compliance. So how does modern IAM help you to future-proof your investments, build customer trust, and achieve data sovereignty? Join this session to learn how to:

- Mitigate risks of identity fraud, cybersecurity breach, and unauthorised access
- Achieve data residency flexibility, resiliency, and scalability
- Become more customer centric by enabling comprehensive and streamlined privacy experiences

Thursday, 12 May, 2022 / 03:15 PM - 03:45 PM BST

Radiant Logic: The Building Blocks of IAM Modernization at Marriott

Sentil Selliah, Director IAM, Marriott

With over 3,700 properties worldwide, Marriott is one of the world’s leading hoteliers. Over the last few years, they embarked on an ambitious project to go from being network centric to data centric–and on a massive scale. This session will discuss how they are using an Identity Data Fabric to modernize their IAM infrastructure and embrace digital transformation by enabling business initiatives, minimizing proliferation of PII, and mitigating risk.

Thursday, 12 May, 2022 / 03:15 PM - 03:45 PM BST

SailPoint: RWE Brings the Core Components of Identity Security to life with SailPoint

Organizations are adopting cloud technologies at a faster rate and enabling the “everywhere enterprise” new era of work, all while driving their digital transformations. Join this session to learn about RWE's identity security strategy, and how they are securing their organization with exponential intelligence, empowering their workforce through frictionless automation, and connecting their entire infrastructure with comprehensive integration.

Thursday, 12 May, 2022 / 03:15 PM - 04:00 PM BST

Roundtable: Protect your legacy: - How to Extend Modern MFA and SSO to any System, moderated by Silverfort

Hed Kovetz, CEO & Co-Founder, Silverfort

As identity threats increase in volume and sophistication the ability to protect your entire resources against the use of compromised credentials is more important than ever. We’ll host a Silverfort customer to discuss real-life examples of MFA coverage gaps and how Silverfort assisted in overcoming them. The session will focus on the newly emerging compliance and security concerns that make MFA enforcement across all systems a critical necessity

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Thursday, 12 May, 2022 / 03:45 PM - 04:15 PM BST

Refreshment Break

Join us for refreshments in a brief break between sessions.

Thursday, 12 May, 2022 / 03:50 PM - 04:10 PM BST

PlainID: Dynamic Authorization - A Crucial Part of Identity First Security

Gal Helemski, CO-FOUNDER AND CTO/CPO, PlainID

In this session we will present a new architecture for Identity First Security based on centralized Access and Authorization Policy Management Platform. We will discuss the complexity businesses face when securely connecting identities to digital assets, and examine pro and cons, specific real-world implementations and more.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Thursday, 12 May, 2022 / 04:15 PM - 04:45 PM BST

Best Practices for Improving Access Management

David Chase, Sr Director Analyst, Gartner

Access management is a key part of identity first security. Organizations need to optimize AM activities in the context of broader identity, security and business goals, for example as part of an identity first security, zero-trust or cloud first initiatives.

Thursday, 12 May, 2022 / 04:15 PM - 04:45 PM BST

Insights From the Magic Quadrant and Critical Capabilities for Privileged Access Management

Felix Gaehtgens, VP Analyst, Gartner

Through a selection of relevant Gartner insights and complementary methodologies, we will provide insight into latest updates in the privileged access management market.

Thursday, 12 May, 2022 / 04:15 PM - 04:45 PM BST

Preventing ATO Fraud

Akif Khan, VP Analyst, Gartner

In this presentation, Gartner will address the prevalent new fraud threat that is keeping end user leaders awake at night. In this presentation we will explore an overview of ATO fraud, what the impact is to financial institutions and end users, and what action plan can be initiated to address this new issue

Thursday, 12 May, 2022 / 04:15 PM - 04:45 PM BST

Case Study: Bias, Blind Spots and Bad Identity Systems

Emma Lindley, Co-Founder, Women in Identity

Details coming soon.

Thursday, 12 May, 2022 / 04:15 PM - 05:00 PM BST

Ask the Expert: Data Residency - Managing Personal Data in the Cloud for Europe, China, Russia and India

Nader Henein, VP Analyst, Gartner

Data residency risks breaking a decade long cloud strategy into individual country specific servers, this hands on session will allow you to raise your concerns, get answers and pull together a strategy to centralize when possible and localize when necessary.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Thursday, 12 May, 2022 / 04:15 PM - 05:45 PM BST

Workshop: How Best to Build and Execute an RFP for an IGA Product

David Collinson, Sr Director Analyst, Gartner

This workshop will help you by practically taking you through the stages of preparing for an RFP for an IGA product. Attendees will leave with a practical approach to a succesful RFP.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Thursday, 12 May, 2022 / 05:00 PM - 05:30 PM BST

Enabling Identity First Security with Policy-Based Authorization

Homan Farahmand, VP Analyst, Gartner

Policy-based authorization has become a focal point for developing the next generation of identity-centric access controls. It includes both human and machine use cases supporting access to modern apps, computing units, data objects and underlying networks. In this session we discuss key use cases, policy management, and policy enforcement patterns to enhance security model of digital systems.

Thursday, 12 May, 2022 / 05:00 PM - 05:30 PM BST

How to Choose a User Authentication Vendor

Ant Allan, VP Analyst, Gartner

With more than 300 vendors in the user authentication market, choosing one or more vendors to fit your needs across a variety of use cases for employees and customers can be fraught with difficulty. How can you identify the most effective authentication methods (with or without passwords)? Where can you find the ablest providers among the IAM marketverse? Do you need to look beyond the methods already available within your IAM infrastructure?

Thursday, 12 May, 2022 / 05:00 PM - 05:30 PM BST

How to Evolve your Identity Fabric to Achieve Identity-First Security

Erik Wahlstrom, Sr Director Analyst, Gartner

In a world where identity is the only perimeter, identity-first security has become an imperative. IAM must be deployed more cohesively as a composable, distributed, resilient identity fabric. Organizations should also apply IAM best practices to more of their applications and services and to the IAM infrastructure itself.

Thursday, 12 May, 2022 / 05:00 PM - 05:30 PM BST

How to Make a Great Decision, Every Time

Mary Mesaglio, Managing Vice President, Gartner

CIOs make critical decisions every day — decisions that impact the viability and success of the organization, and the quality of life of the people who work there. Make those decisions count by understanding how to frame and evaluate your options using proven frameworks for every type of decision.

Thursday, 12 May, 2022 / 05:30 PM - 07:00 PM BST

Exhibit Showcase Networking Reception

Join us for a networking reception on the Exhibit Showcase where you can engage with your peers, Gartner experts, and exhibitors while enjoying delicious food and beverages. Evaluate industry offerings that can move your business forward. Attend a theater session to see technology in action.

Thursday, 12 May, 2022 / 05:40 PM - 06:00 PM BST

Okta: How to Become an Identity-first Company

Max Faun, NA, Okta

Today we live in a new digital world which has been shaped by numerous technological innovations. Customers and employees alike want the freedom to access anything from anywhere, shaped by the mobile-first revolution.
Okta’s vision is to accelerate a world where everyone can safely use any technology. Join our Theater Session to find out how your organisation can deliver secure and frictionless experiences across every user without compromise.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Thursday, 12 May, 2022 / 06:10 PM - 06:30 PM BST

Venafi: Rise of Machines Meets Digital Transformation

The number of machines of all types is rising. Every machine has an identity. Compromise and fraud of machine identities are prime attack vectors for hackers. Errors create outages and resulting in millions of dollars in lost revenue. Leading analysts are recommending Machine Identity Management as a top security trend. This session will discuss the impact on an organization’s ability to move faster in their quest for Digital Transformation.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Thursday, 12 May, 2022 / 06:45 PM - 08:15 PM BST

Cocktails without Compromise - VIP networking reception, Hosted by WSO2

After a long day, WSO2 welcomes you to the Eighteen Sky Bar at the InterContinental to enjoy WSO2 Signature Cocktails, refreshments, canapés, and entertainment.
Take this opportunity to relax and network with peers and enjoy the London skyline.

Entrance to the reception is limited to pass holders. Visit WSO2 at booth #700 to collect your VIP pass.

Friday, 13 May, 2022 / 07:30 AM - 04:45 PM BST

Registration and Information

Registration and information hours for the day.

Friday, 13 May, 2022 / 08:00 AM - 09:00 AM BST

Arrival Refreshments on the Exhibit Showcase

Head to the Exhibit Showcase to enjoy a coffee and morning pastry! Engage with your peers, Gartner experts, and exhibitors before the Keynote session.

Friday, 13 May, 2022 / 08:00 AM - 04:45 PM BST

IBM Security: Enterprise cybersecurity solutions

Let's create security that trusts nothing and verifies everything. The future of security should be one of confidence. Grow, innovate and adopt new ways of working with contextual, predictive security. See how zero trust security can move your business forward.

Friday, 13 May, 2022 / 08:00 AM - 04:45 PM BST

Okta Engagement Zone

Come visit the Okta Engagement Zone to talk with our experts, view our product demos and find out more about becoming an identity-first organisation. You can also pick up some Okta goodies and see yourself in a different way...

Friday, 13 May, 2022 / 09:00 AM - 09:45 AM BST

Guest Keynote: The Impact Of The Digital World On The 21st Century Mind

Baroness Susan Greenfield, Founder & CEO of Neuro-Bio Ltd, Neuro-Bio Ltd

The events of the last two years have imposed the biggest ever uncontrolled experiment on the human mind, having effects in ways and to extents that it is hard to predict. The human brain becomes highly personalized after birth by the development of unique configurations of connections between the brain cells that characterize its subsequent growth, personalizing it into a highly individual ‘mind’ that is in constant dialogue with the environment. Since the 21stCentury, especially over the last year, is transforming our environment in unprecedented ways, it follows that human brains, and thus our minds, could also be undergoing unprecedented changes. Possibilities range from robotic-type attitudes through to infantilized mindsets to perhaps realising an unprecedented individual potential. Insights from neuroscience might help us anticipate what lies ahead and, most importantly, suggest how we might mitigate the risks and maximise opportunities to make the most of the mid-21st Century.

Friday, 13 May, 2022 / 09:45 AM - 10:30 AM BST

Refreshment Break

Join us for refreshments in a brief break between sessions.

Friday, 13 May, 2022 / 09:45 AM - 05:30 PM BST

Exhibit Showcase Open Hours

Visit the Exhibit Showcase to evaluate industry offerings that can move your business forward. Engage with your peers, Gartner experts, and exhibitors. Attend a theater session to see technology in action.

Friday, 13 May, 2022 / 10:00 AM - 10:20 AM BST

ARCON: Meeting the Identity and Access Challenges in a Multi-Cloud World

Organizations are fast adopting a cloud-first approach in order to enhance their IT operational effectiveness and efficiency. As organizations adopt a multi-cloud approach, more and more digital identities are being created. The threats of credentials abuse and data breach increases significantly when identity and access management practices are not robust enough to manage the cloud resources.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Friday, 13 May, 2022 / 10:30 AM - 11:00 AM BST

Connect Business Value and Identity Management

Kevin Kampman, Sr Director Analyst, Gartner

Leaders responsible for IAM generally focus on the technical benefits of an IAM solution rather than its impact on the organization's goals and objectives. They are not accustomed to recognizing and accommodating the influence IAM has on business outcomes or associating IAM with environmental, organization or social change. These skills are critical to an initiative with IAM's scope and breadth.

Friday, 13 May, 2022 / 10:30 AM - 11:00 AM BST

Gain a Critical Advantage Over Cybercrimes Through Diversity, Equity and Inclusion

Nader Henein, VP Analyst, Gartner

Workplace and supplier diversity is at the forefront of organizations’ minds. Beyond the ethical and moral benefits, DEI can protect against an increasingly broad range of cyber attacks. We will discuss the business case for DEI, how to develop a one-page DEI strategy and how to grow your employee and supplier diverse base.

Friday, 13 May, 2022 / 10:30 AM - 11:00 AM BST

Guidance for Privileged Access Management

Homan Farahmand, VP Analyst, Gartner

PAM is a complex cyber defense discipline that requires careful technical planning for coverage areas. In this session we discuss the basic and emerging controls architecture to drive a zero standing privilege model for multi-cloud and hybrid environments. This includes PAM best practices and what works practically, considering organizational challenges and tools limitations.

Friday, 13 May, 2022 / 10:30 AM - 11:00 AM BST

The State of Identity Proofing and Affirmation

Akif Khan, VP Analyst, Gartner

Obtaining confidence in a customer’s or employee's identity is the foundation of identity-first security. IAM leaders must understand the current state-of-the-art, balancing assurance needs with friction in the UX, while orchestrating multiple tools and becoming aware of strategic trends on the horizon.

Friday, 13 May, 2022 / 10:30 AM - 11:15 AM BST

Ask the Expert: How to Keep Teams Safe and Motivated When in Constant Crisis Mode

Mary Mesaglio, Managing Vice President, Gartner

It’s hard to be a leader right now. The world seems be lurching from crisis to crisis. There’s not time to adjust, let alone recover. This session is focused on the practical: tactics that leaders can use to keep their teams motivated, even as everyone is exhausted and the crises multiply. The emphasis is on what that attendees can immediately put into practice.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Friday, 13 May, 2022 / 10:30 AM - 12:00 PM BST

Workshop: Selecting the Right Employee SSO Solution for Your Evolving Organization

David Chase, Sr Director Analyst, Gartner

Modern architectures and applications place additional demands on access management tools. This workshop will introduce access management evaluation criteria guidelines and discuss what features you should look for and what vendors to consider for your next employee access management solution.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Friday, 13 May, 2022 / 11:15 AM - 11:45 AM BST

IBM: How to Avoid User Disharmony and Discord: A Proven risk Engine = User Confidence

Assaf Ezov, Product Manager, IBM

Strengthening security can create friction for your employees and consumers. But the right adaptive access software, providing deep risk assessment for IAM systems, can keep user disharmony and discord to a minimum. Based on the proven, ageless IBM Security™ Trusteer® risk engine, this session will demonstrate how organizations can protect against malicious actors while balancing your MFA requirements…for your, and your users’ peace of mind.

Friday, 13 May, 2022 / 11:15 AM - 11:45 AM BST

SSH: The Chances Are, You're Managing Only 20% of Your Critical Credentials with PAM

Passwords in a vault and rotated regularly? You're still at risk. Join SSH’s CEO Teemu Tunkelo to discover why encryption keys need similar audit attention as passwords, why existing Privileged Access Management solutions can’t handle them and how to truly be in control of all of your credentials. Zero Trust credentials management paves the way for a passworldess and keyless future with minimal management effort and maximum access security.

Friday, 13 May, 2022 / 11:15 AM - 11:45 AM BST

Thales: Is the Demise of OTP Authentication Imminent?

Chris Martin, EMEA IAM Solution Architect, Thales

The spate of damaging cyber-attacks over the past year and efforts to reduce the risk of breach from credential compromise is leading regulators and industry leaders to re-assess the efficacy of OTP authentication. In this session, we will examine how this will affect your authentication and access management strategy today and tomorrow. We will discuss the choices for expanding authentication coverage to all users - and not just users, but all apps, given the need to protect hybrid and other most complex environments. We will show how to achieve this with modern authentication techniques.

Friday, 13 May, 2022 / 11:15 AM - 11:45 AM BST

WSO2: B2B CIAM For the Win!

Geethika Cooray, VP & GM IAM BU, WSO2

Your Customer Identity and Access Management (CIAM) program doesn't have to be burdened with uncomfortable tradeoffs. You can achieve your security objectives AND deliver a low-friction customer experience (CX), extend the platform to suit your organization's needs, deploy it however your organization requires, and achieve a quick ROI. Learn how one of our marquee customers is partnering with WSO2 to achieve CIAM Without Compromise.

Friday, 13 May, 2022 / 11:15 AM - 11:45 AM BST

VU: How to eliminate identity fraud forever

Eliminating identity fraud seems impossible, but it isn’t. In today’s market, we can find powerful enough tools to significantly reduce identity fraud in information systems, but we lack the sufficient societal organization to close the digital gap. If undealt with, identity fraud will continue to grow at alarming rates, as fraudsters become better at stealing information. In this session we will learn how governments, digital identity innovators, and web 3 players can collaborate to redesign the digital identity paradigm, and protect citizens by eliminating fraud forever

Friday, 13 May, 2022 / 11:15 AM - 12:00 PM BST

Roundtable: Consolidate Vendors to Strengthen IT Security, moderated by One Identity

Alan Radford, SOLUTIONS ARCHITECT, One Identity

Stuart Sharp, VP Product Strategy, One Identity

Join our roundtable discussion as we dive into the rapid convergence of Access Management, IGA and PAM solutions. It’s been estimated that by 2025 70% of new deployments will converged systems. In this interactive session, you learn how One Identity’s Unified Identity Security offering can accelerate your strategy and help to consolidate the number of vendors and solutions required to protect what’s essential to your success.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Friday, 13 May, 2022 / 12:00 PM - 12:30 PM BST

Active Directory in Transition: Gartner Survey Results and Analysis

Paul Rabinovich, Sr Director Analyst, Gartner

Gartner clients often ask if they can drop their Active Directory and migrate to a cloud-based identity service. Technology is already in place to support this journey, but do real-world Active Directory customers actually take it? In this session we will share the results of a Gartner survey about the future of Active Directory as seen by end-user organizations.

Friday, 13 May, 2022 / 12:00 PM - 12:30 PM BST

Top Practices for Strengthening Your CIAM Strategy

Nat Krishnan, Sr Director Analyst, Gartner

What are companies doing for CIAM? What are the primary considerations for a company planning to move from a “build it” to a “buy it” CIAM capability? How can you differentiate yourself from your competitors through a superior CIAM portal that your customers love? What are the main considerations, and how is privacy regulation impacting these decisions? We will discuss best practices around CIAM, what are the main considerations, how to plan for the best user experience to achieve your goals.

Friday, 13 May, 2022 / 12:00 PM - 12:30 PM BST

Machine Identities, Secrets, Keys and Certificates – The Team, the Process and the Tools

Erik Wahlstrom, Sr Director Analyst, Gartner

In this session we will look at a best-of-breed verses all-in-one tooling discussions of the expanding portfolio of tools that manage our machine identities, secrets, keys and certificates.

Friday, 13 May, 2022 / 12:00 PM - 12:30 PM BST

Case Study: How to Build a Single Customer Identity

Kevin Foley, Head Of Technology – Digital, Admiral Insurance

This session will bring to life the 2 year journey of how the vision to build a single customer identity for all customers was transformed into a reality. This presentation will address the various phases of the journey, from ideation through to design and execution. Highlighting, challenges that are currently being faced to achieve a MVP.

Friday, 13 May, 2022 / 12:00 PM - 12:45 PM BST

Ask The Expert: What are the best practices for privileged access management?

Felix Gaehtgens, VP Analyst, Gartner

Privileged access is the prime cause of breaches, yet more people than ever require it for their work. Requirements for PAM are evolving quickly to include hybrid multicloud scenarios and machine identities. Bring your questions about trends, best practices to this session.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Friday, 13 May, 2022 / 12:30 PM - 01:30 PM BST

Exhibitor Networking Lunch hosted by Ping Identity Executives, Jason Wolf (Chief Revenue Officer) & Paul Van der Lee (Vice President, EMEA).

Over the past two years, the pandemic has forced organisations to pivot to digital services at breakneck speed, putting customer and employee experiences at risk. Today, these hastily developed digital services find themselves on the front line, as escalating geopolitical tensions threaten to trigger cyberattacks on an unprecedented scale.
Join this discussion to explore how an agile IAM strategy can help you defuse UX and cybersecurity crises.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Friday, 13 May, 2022 / 12:30 PM - 01:30 PM BST

Exhibitor Networking Lunch: Protect Your Customers with Modern IAM Architecture Hosted by ForgeRock

Account takeover attacks have risen by over 300% between 2019 and 2021. Meanwhile, unauthorised access was responsible for 43% of all breaches in 2020. Both external and internal threats make it more difficult to protect your customers. Modern IAM architecture helps you address these challenges through:

• Secure full tenant isolation in the cloud
• Privacy and security by design
• Enterprise-grade scalability, performance, and resiliency
• Deployment flexibility across self-managed, any cloud, and hybrid IT environments

Join ForgeRock to find out Modern IAM architecture helps you to get ahead.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Friday, 13 May, 2022 / 12:30 PM - 01:30 PM BST

Exhibitor Networking Lunch: Strategies for Intelligent Identity, Hosted by BeyondTrust

Join BeyondTrust Chief Security Officer, Morey J. Haber and a select group of Identity leaders as they share their latest challenges, experiences and successes. A meeting of minds, this is an opportunity for you to connect with top Privileged Access Management (PAM) and IAM strategists in a private setting over lunch and drinks.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Friday, 13 May, 2022 / 12:30 PM - 01:30 PM BST

Exhibitor Networking Lunch: Auth0: How can Strategic CIAM Impact Your Business

Data breaches, account takeover, credential stuffing, and identity theft cost trust and impact revenue. Customer Identity and Access Management (CIAM) at a strategic level helps to mitigate these risks before they affect your business. Strategic CIAM aligns the right people, processes, and technology partners to create conversion points and increase your bottom line. This session will give you a better understanding of what strategic CIAM is, how it differs from IAM, its relevance to your business - and the benefits of considering a new approach.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Friday, 13 May, 2022 / 12:30 PM - 02:00 PM BST

Grab lunch on the Exhibit Showcase

Head to the Exhibit Showcase for a bite to eat! Engage with your peers, Gartner experts, and exhibitors while enjoying delicious food and beverages. Evaluate industry offerings that can move your business forward. Attend a theater session to see technology in action.

Friday, 13 May, 2022 / 12:45 PM - 01:05 PM BST

Sift (including Keyless): Balancing Frictionless Experiences Against Rising Fraud

Gal Steinberg, VP PRODUCTS, Keyless

From logging in, to authorizing payments, to recovering accounts, to securing identities against rising cases of fraudulent ATO attacks – authentication pops up often during the customer lifecycle, impacting perceptions of your business along the way. In this talk we’ll look at the most complex authentication scenarios and evaluate which solutions can best eliminate friction from the customer journey, while preventing the most sophisticated fraud threats.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Friday, 13 May, 2022 / 01:10 PM - 01:30 PM BST

Daon: How Japanese Institutions are Removing the Friction from Customer Identity Journeys

How large Japanese institutions are removing the friction out of the Customer Identity Journey

This session will address how Japanese institutions are delivering eKYC and passwordless authentication. Highlighting, how they are achieving convenient, secure, and scalable ways to authenticate their customers and manage costs.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Friday, 13 May, 2022 / 01:35 PM - 01:55 PM BST

QOMPLX: A View to a Ransom: Risky Exposures & Third-Party Vendors

How secure are your third-party vendors? Join this QOMPLX demonstration to learn:
How cloud providers and other vendors can extend attack surfaces
Attacker techniques that compromise on-premise Active Directory or cloud services
Best practices for threat identification and network defense

Primary Learning Objective: Join Tudor James to learn attacker paths and techniques used to compromise third party vendors and infiltrate your network. Lessons learned will enable your organization to identify suspicious activities and create better defenses.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Friday, 13 May, 2022 / 02:00 PM - 02:30 PM BST

API Access Control 201: Architect a Modern API Access Control Strategy

Erik Wahlstrom, Sr Director Analyst, Gartner

In this technical session we will establish an agile and composable identity fabric that supports API access control that consists of multiple types of identity tools and components that together enable encryption, authentication and authorization for your distributed APIs.

Friday, 13 May, 2022 / 02:00 PM - 02:30 PM BST

How to Choose and Deploy an Identity Governance and Administration Solution

David Collinson, Sr Director Analyst, Gartner

This session will help provide IAM leaders with best practice advice to both select and then deploy an IGA tool. Starting with what an IGA tool comprises of, and working methodically through the stages of the buying journey it will help IAM leaders select the right product for their organization. The second part of the presentation will then focus on how to succesfully deploy it.

Friday, 13 May, 2022 / 02:00 PM - 02:30 PM BST

Technical Insights — Cybersecurity Mesh Deep Dive: Architecture

Patrick Hevesi, VP Analyst, Gartner

This session will continue on from Introduction to the Cybersecury Mesh Concept and dive deep into how to build the cybersecurity mesh architecture (CSMA). We will discuss the evolution of best-of-breed to the new CSMA along with pros and cons of each approach. Finally, we will discuss the vendor landscape from larger security vendors with full stacks to open source/distributed CSM solutions.

Friday, 13 May, 2022 / 02:00 PM - 02:30 PM BST

Who Do You Want to Be Post-Crisis? Actions for Leaders

Mary Mesaglio, Managing Vice President, Gartner

There is a lot of corporate soul searching going on right now. Some enterprises are doubling down on their values while others are adopting new ones. In all cases, values are inspiring and exciting, but not enough on their own to drive change. This session covers the values-to-action pyramid, walking through practical ways to turn values into everyday behaviors.

Friday, 13 May, 2022 / 02:00 PM - 02:45 PM BST

Ask the Expert: Access Management

Henrique Teixeira, Sr Director Analyst, Gartner

Access management has become the source of trust for identity-first security. Increased dependence on identities for access anywhere, anytime, requires AM to be more reliable and easier to adopt. Identity orchestration, IAM convergence and SaaS resilience importance will increase during 2022. Ask me anything about access management!

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Friday, 13 May, 2022 / 02:00 PM - 03:00 PM BST

Contract Negotiation Clinic: Best Practices in Negotiating Both Traditional and Cloud-Based Infrastructure Contracts

David Groombridge, Distinguished VP Analyst, Gartner

Traditional deals, such as data center outsourcing and cloud-based solutions such as infrastructure as a service (IaaS) have unique attributes and requirements with changes occurring frequently as the market matures.This session will provide sourcing executives and procurement managers with key attributes and contract examples to help organizations understand what to look for and how to negotiate deals.
Key issues:
• What are the differences between traditional and emerging cloud based contracts, KI?
• What opportunities do I have to negotiate these contracts?
• What do I do to limit risk via the contracts?

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Friday, 13 May, 2022 / 02:45 PM - 03:15 PM BST

Duo Security: Future Proof Your Secure Access Strategy

Richard Archdeacon, Advisory CISO, Duo

Josh Green, TECH EVANGELIST, Cisco Systems

Richard Archdeacon, Advisory CISO, Cisco

Recent years have seen a massive shift in trends in the way we work. Cloud services and solutions have been adopted en-masse, working from anywhere and everywhere has become a norm and multi-layered approach to access control as a way of preventing the common vulnerabilities has become commonplace.

Join this session to explore how to enable business resilience with a secure access strategy, covering people, processes and technology incorporating new trends such as Passwordless and Continuous Trusted Access.

Friday, 13 May, 2022 / 02:45 PM - 03:15 PM BST

Omada: How Kohler Successfully Chose and Deployed a Modern IGA Solution

Owen John, SNR CYBER SECURITY ARCHITECT, Kohler Co.

This case study session will illustrate Kohler’s transformation journey from a highly customized outdated legacy system to modern IGA. The session will address:

•How a legacy IGA was creating barriers to success
•How they chose Omada as their IGA platform
•How they secure and manage 40,000 identities across the globe
•What Kohler learned before, during and after deployment.

Friday, 13 May, 2022 / 02:45 PM - 03:15 PM BST

Transmit Security: Fortify Security and Remove Customer Barriers with Passwordless

The goal of passwordless is to optimize security and customer experience. But there’s a passwordless paradox: most solutions don’t fully remove passwords and create a new set of barriers, making it difficult to switch devices or move across apps, sites and channels. Join this talk to hear how European Bank BRED worked with Transmit Security to improve accessibility for their new Keyring payment service designed for disabled adults. In 7 days, BRED began delivering password-free banking while decreasing fraud, costs and support call volume. And they did it with no app, no passwords anywhere.

Friday, 13 May, 2022 / 02:45 PM - 03:15 PM BST

Ubisecure: How Reusable Digital Identity Will Drive Your Business & Delight Customers

Simon Wood, CEO, Ubisecure Ltd

Lauri Immonen, HEAD OF DIGITAL IDENTITY, Telia Company

BYOI, or reusable digital identities, from Banks, Mobile Operators and eIDs are becoming less regionally siloed and gaining ubiquity as we realise cross-border identity networks-of-networks. Learn from Nordic telco Telia Company how it helps its clients leverage dozens of strong identity schemes via a single identity brokering platform. Why and how Telia built it, how end-customers benefit, and what’s coming next with the new EU ID and GAIN.

Friday, 13 May, 2022 / 02:45 PM - 03:30 PM BST

Roundtable: It’s Not Who You Know, It’s Who You Don’t. The Risks of All Other Identities, moderated by SECZETTA

Nicole Rowe, Chief Marketing Officer, SecZetta

Richard Bird, CHIEF PRODUCT OFFICER, SecZetta

The two most common identities we have the ability to manage at the solution level are workforce and customer. But, what about all of the other identities? There is a huge universe of distinct and unique identities we haven't been able to manage for several decades that include: contractors, franchisees, independent agents, devices and so many others. Join your peers in the interactive session to discuss how to action to address the risk of all of these other identities. Because now, more than ever, we need to.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Friday, 13 May, 2022 / 03:30 PM - 04:00 PM BST

Take 3 Steps Towards Passwordless Authentication (Passwörterdämmerung Redux!)

Ant Allan, VP Analyst, Gartner

The twilight of the passwords has long been foretold but is now, at last, upon us. Security and UX are key drivers for passwordless authentication. But how can IAM leaders choose among the many passwordless approaches? Which are the most effective? Where do novel methods add value? What is the role of FIDO2? How does passwordless authentication fit with zero trust, adaptive access and the identity fabric? How can you craft a cohesive strategy across multiple use cases?

Friday, 13 May, 2022 / 03:30 PM - 04:00 PM BST

How to Architect CIAM and Select the Right Vendors

Nat Krishnan, Sr Director Analyst, Gartner

As requirements for great CIAM become more sophisticated, best practices for architecting CIAM and selecting vendors are evolving. This session will focus on the broadening scope of CIAM deployment architecture, selection criteria and vendors you should consider for your short lists.

Friday, 13 May, 2022 / 03:30 PM - 04:00 PM BST

Outlook for Privacy, 2022-2023

Nader Henein, VP Analyst, Gartner

Privacy is profoundly impacting digital transformation priorities and lies at the core as organizations build new engagement models with consumers and relationships with employees. 2022 sits between major developments in Asia-Pacific and Europe in 2021, and the US in 2023. Join this session to learn of these significant evolutions, both from the regulatory as well as technology perspectives.

Friday, 13 May, 2022 / 03:30 PM - 04:00 PM BST

What’s Next in Cloud Identity Risks? CIEM and Beyond

Henrique Teixeira, Sr Director Analyst, Gartner

Entitlement management used to be a manageable problem. However, with the explosion of many thousands of permissions per identity in cloud infrastructures, legacy IAM approaches are no longer sufficient. Join this session to learn what cloud infrastructure entitlement management means, and how can it help to mitigate identity risks in the cloud.

Friday, 13 May, 2022 / 03:30 PM - 04:15 PM BST

Ask the Expert: Identity Proofing and Account Takeover

Akif Khan, VP Analyst, Gartner

In this session, leading analyst Jonathan Care answers your questions around the challenging identity proofing market, and how this affects the problem of account takeover.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Friday, 13 May, 2022 / 03:30 PM - 04:15 PM BST

Ask the Expert: How Do I Manage My Machine Identities?

Erik Wahlstrom, Sr Director Analyst, Gartner

Organizations find themselves needing to manage and provide best practices for how to handle the machine identities for a growing number of workloads. Bring your own questions to this session on how to manage secrets, keys and certificates in a hybrid and multi cloud environment.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Friday, 13 May, 2022 / 04:00 PM - 04:45 PM BST

Refreshment Break

Join us for refreshments in a brief break between sessions.

Friday, 13 May, 2022 / 04:45 PM - 05:30 PM BST

Guest Keynote: Preparing for the Never Normal

Peter Hinssen, Keynote Speaker, Author, Nexxworks

The Never Normal concept covers the constantly changing business environment, with Seismic Shocks such as technological, biological, ecological, social, and even geopolitical driving Systemic Shifts. Every single one of these Shifts offers opportunities, and companies need to have an eye on the 'Day After Tomorrow' to seize these chances.
The Never Normal can seem daunting, and it’s not just about ‘robustness’, the capacity to brace and survive the Never Normal, but more so about ‘resilience’, the capability to bounce back, take advantage, perhaps bounce ‘forward’ to innovate.
Peter Hinssen will illustrate what he calls the VACINE model that address how the combination of Velocity, Agility, Creativity, Innovation, Networking and an appetite for Experimentation can help organizations and leaders re-think, re-set and re-boot the concept of security, identity and access.

Join us in 2023

Get conference email updates.
Contact Information

All fields are required.

  • Step 2 of 2