Attendees accessed the latest Gartner research specifically designed to help IAM leaders gain critical insights to sustain effective IAM programs to provide the right access to the right people.
Agenda
Attendees accessed the latest Gartner research specifically designed to help IAM leaders gain critical insights to sustain effective IAM programs to provide the right access to the right people.
Learn new ways to improve PAM with DevOps. Architect to limit breaches and enhance security and agility.
IGA is an essential IAM function for most organizations. Learn how it provides compliance and data protection benefits and enables management of the user life cycle across heterogeneous applications.
Privacy is shaking up identity and access management. IAM leaders need to be prepared to address issues of compliance and customer confidence.
Hear the latest insights on MFA and fraud protection. Use analytics to tighten security without compromising user experience.
Update your strategy for hybrid and multicloud environments. Hone the way you support single sign-on and bridge gaps in evolving platforms.
A formal program management approach should be adopted to engage business stakeholders, govern IAM activities, address project and program risks, and accomplish desired business outcomes.
Monday, 06 March, 2023 / 10:20 AM - 10:40 AM GMT
Anil Bhandari, Chief Mentor, Arcon Techsolutions
An increase in the types of digital identities, coupled with multi-cloud adoption, has added complexity to managing identities and privileges. How does one get future-ready, to address these new-age challenges? An Identity-centric security strategy centers on effective governance with zero trust, that simplifies and unifies critical aspects of Access Management (AM), Identity Governance Administration (IGA) and Privileged Access Management (PAM). Join us to explore the benefits of a Converged Identity security approach that is outcome-driven, and looks to ditch the silos of key IAM components.
Monday, 06 March, 2023 / 11:00 AM - 11:30 AM GMT
James Hoover, Principal Analyst, Gartner
This session will outline the current state and emerging trends in the market for privileged access management (PAM).
Monday, 06 March, 2023 / 11:00 AM - 11:30 AM GMT
Homan Farahmand, VP Analyst, Gartner
Digital identity requirements and importance are growing, as organizations are migrating their infrastructure and apps to the cloud. Enterprises anticipate innovations to enable continuous, dynamic, and intelligent IAM controls, while bracing for emerging decentralized identity impact and potential Web 3 business model disruption. This session discusses key trends and IAM outlook in the coming years.
Monday, 06 March, 2023 / 11:00 AM - 11:30 AM GMT
Michael Kelley, Sr Director Analyst, Gartner
Access management tools are offering an array of increasingly converged technologies. This session will cover the progression and maturity of access management tools and how they will help you achieve identity first security strategies.
Monday, 06 March, 2023 / 11:45 AM - 12:15 PM GMT
Morey Haber, CSO, BeyondTrust
Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed, and serviced from the cloud.
Attackers have also realigned their efforts, focusing on staying undetected, quickly monetizing exploitations, and publicly shaming organizations after successful breaches.
BeyondTrust Chief Security Officer (CSO), Morey J.Haber will offer best practices for minimizing these increasingly exploited cloud attack vectors. Join him to learn cutting edge strategies for building the optimal cloud defense for your organizations unique cloud environment and identities.
Monday, 06 March, 2023 / 11:45 AM - 12:15 PM GMT
Alan Radford, SOLUTIONS ARCHITECT, One Identity
Insert abstractMost large organisations attempt to manage thousands – and hundreds of thousands – of customer, partner and employee identities across multiple applications and data silos. Each system has a unique user-permissions provisioning and approval process. This leads to operational inefficiencies and cybersecurity gaps that threat actors can take advantage of to wreak havoc on your organisation. Join this session, led by Alan Radford, Technical Strategist at One Identity, to discover how to unify your identity and security strategies, thus saving time, money and strengthening security.
Monday, 06 March, 2023 / 11:45 AM - 12:15 PM GMT
Richard Owen, SECURITY ARCHITECT, Cazoo
Philip Hoyer, FIELD CTO EMEA, Okta
Okta's customers no longer need to make a trade-off between delivering a great user experience and strong security. In less than 3 years since launch, Okta customer Cazoo is now the UK's largest independent used car retailer and it's workforce expanded to match pace, growing to over 3,500 employees now.
In our session, we talk to Richard Owen, Security Architect about how Okta provides seamless IT experiences for Cazoo employees through Lifecycle Management while boosting security with SSO and MFA; resulting in time and money saved and peace of mind for Cazoo and its employees and customers.
Monday, 06 March, 2023 / 11:45 AM - 12:30 PM GMT
Heiko Klarl, Chief Marketing and Sales Officer, iC Consult Group GmbH
Andre Priebe, Chief Technology Officer, iC Consult GmbH
Liam Hogan, DIRECTOR IT, Jaguar Land Rover
chris patrick, Managing Director, iC Consult
Digital Identities are the core of every Zero Trust strategy. Managed Services and BPO for IAM are an efficient approach to implement this strategy with consistent levels of security within the enterprise. Central governance, a high grade of automation and the flexibility to support DevOps and agile teams are not a contradiction when implemented in a smart way.
Join our discussion on:
- The role of Managed Services in Zero Trust
- How to benefit from Business Process Outsourcing for IAM
- How this supports a Zero Trust Strategy at a global scale
Monday, 06 March, 2023 / 12:30 PM - 01:00 PM GMT
Felix Gaehtgens, VP Analyst, Gartner
Authorization technology has been in a renaissance period, with many new technologies, vendors and specifications appearing within the last two years. This session shines a light on the current market, including open source initiatives, where they are used and where the state of the art lies with regards to authorization technology.
Monday, 06 March, 2023 / 01:10 PM - 01:30 PM GMT
Graham Francis, HEAD OF DIGITAL SECURITY NORTHERN EUROPE, Atos
Today, in order to fulfil the requirements of a Zero Trust strategy, businesses’ global ecosystem needs to define a source of trust. Identity-first is the single transportable constant making this journey possible. Identities can come from anywhere in the ecosystem, making identity the new perimeter, and access the attack surface changing the threat landscape. Join Graham Francis, Head of digital security at Atos, as he describes the journey to a converged IAM and Governance Solution with a Zero trust strategy at its core.
Monday, 06 March, 2023 / 02:00 PM - 02:20 PM GMT
Fabian Eberle, CO-FOUNDER, Keyless Technologies
With DIY phishing kits and SIM swapping more prevalent than ever, bypassing MFA challenges has never been easier. Countries such as Malaysia are instructing financial institutions to cease using SMS OTPs altogether; is this the beginning of the end? As with traditional passwords, OTPs are vulnerable. So long as they can be typed, shared, or seen by others, they can be compromised. This presentation will cover the inherent weaknesses of OTPs and explore the emerging alternatives that can help businesses enable strong, frictionless security.
Monday, 06 March, 2023 / 03:15 PM - 03:45 PM GMT
Barak Feldman, MANAGER, SVP, PAM and Identity Security
Every identity is a gateway to your organization’s most valuable resources. Privilege users are no longer just IT admins. Almost any identity can have high-value or high-level access. How can you ensure that the right users securely access the right resources at the right time?
Enter Identity Security, a strategy to enable Zero Trust and enforce least privilege, with dynamic adaptive controls, giving the right level of access, based on risk.
In this panel we will explore:
Rethinking privilege
How organizations are adopting Identity Security
Starting your Identity Security program
Monday, 06 March, 2023 / 04:40 PM - 05:00 PM GMT
Scott Shields, TECHNO KING, Delinea
The cyber insurance industry is evolving fast to help your business mitigate risk. Cyber insurance offers a safety net for businesses threatened by the rapid growth of insider cybercrime and external cyber threats, particularly ransomware. While cyber insurance has been a reliable safety net for years - driven by accelerating insider cybercrime and exploding ransomware attacks - things are changing fast. It’s important to understand the dynamics of the rapidly changing market and consider how well your security controls will stand up to an insurance company’s review.
Tuesday, 07 March, 2023 / 09:50 AM - 10:10 AM GMT
Bojan Simic, CEO, HYPR Corp.
Best-in-class authentication has been on everyone’s mind; and it’s no surprise. The vast majority of recent breaches can be traced back to the failure of passwords and legacy MFA. With recent guidance for phishing-resistant MFA, organisations have become Passwordless Curious, but may be hesitant to move forward until they can quantify the business case. Join us for this exciting session where we will outline the benefits of implementing phishing-resistant MFA and discuss the quantifiable value drivers which you can champion within your organisation.
Tuesday, 07 March, 2023 / 09:50 AM - 10:10 AM GMT
Oded Hareven, CEO & CO-FOUNDER,
The rise of machine identities and DevOps automation has caused “Secrets Sprawl,” due to the increase of database credentials, certificates, API keys, and other machine secrets.
These machine secrets are kept in siloed point solutions, multiple DevOps tools, hardcoded, and saved across on-prem servers or multiple cloud providers. Secrets sprawl is at the root of the difficulty of tracking, securing and managing machine secrets.
Join CEO, Oded Hareven as he explores the rise of machine identities, secrets sprawl, and actionable steps that IAM teams can take to address these challenges.
Tuesday, 07 March, 2023 / 10:30 AM - 11:15 AM GMT
David Chase, Sr Director Analyst, Gartner
A chance to ask an analyst your questions on implementing identity first, zero trust, and ITDR (identity threat detection and response).
Tuesday, 07 March, 2023 / 11:15 AM - 11:45 AM GMT
Oliver Cheal, DIRECTOR, EMEAR, Duo Security
Josh Green, TECH EVANGELIST, Cisco Systems
It was only a matter of time before threat actors found a weakness in push-based MFA. It was there all along: our patience. Our patience only lasts so long, and attackers have been exploiting its limits to phish us mercilessly. The good news is that we are anything but defenceless. Behavioural analytics and adaptive authentication can mitigate the attacks quickly, while deploying passwordless and device trust render these attacks completely obsolete. Even better still, these new technologies make the user experience easier than ever.
Tuesday, 07 March, 2023 / 12:00 PM - 12:30 PM GMT
David Chase, Sr Director Analyst, Gartner
Organizations struggle with changes to authentication, authorization, architecture and migrating to new access management platforms. In this session, guidance and strategies to handling these changes will be discussed.
Tuesday, 07 March, 2023 / 12:00 PM - 12:45 PM GMT
Abhyuday Data, Director Analyst, Gartner
Access management tools are the key to ubiquitous application access, enabling any user to access any application, anytime and anywhere. Gartner has identified a five-step approach to create a modern, efficient access management strategy that serves the needs of all user segments. This session gives you an opportunity to ask questions about that approach for your broader access management strategy.
Tuesday, 07 March, 2023 / 01:05 PM - 01:25 PM GMT
In this session, Brian Trzupek will discuss “invisible authentication” as a strategy to improve end user experience, reduce the IT support burden, and improve security posture related to authentication to IT services and applications. Invisible authentication is governed by certificate-mediated rather than password-governed access. Brian will explore how organizations are:
Automating certificate provisioning for authentication to services such as WiFi and VPN
Achieving instant revocation and remediation to eliminate security gaps
Managing last-mile installation to end-user applications
Tuesday, 07 March, 2023 / 01:05 PM - 01:25 PM GMT
Travis Spencer, CEO, Curity
Security is never a simple task; the same applies to APIs. And even more challenging at scale. It’s naturally easier to protect a few endpoints and microservices than hundreds. As the API ecosystem grows, just starting to use OAuth may not be enough. Proper handling of OAuth tokens, utilising different features, and other non-trivial implementation details must be overcome. To help with these, this talk will describe:
- The different perspectives that should be viewed when assessing the size of an API ecosystem; Common security issues; and
- How to address these security challenges.
Tuesday, 07 March, 2023 / 01:30 PM - 01:50 PM GMT
Frank Hamerlinck, CEO, Trustbuilder
Streamline your B2B2X digital ecosystem with identity-centric personas and policy-based access control. As customers, workforce, partners, suppliers,… become increasingly intertwined, companies face the challenge of managing access for multiple mandates. Combining different personas into a single user profile and allowing users to always authenticate with a single set of credentials enhances user experience. It also allows for effective management of customer, workforce, and partner data, ensuring compliance and security, while reducing complexity and automating data removal when mandates end.
Tuesday, 07 March, 2023 / 02:00 PM - 02:30 PM GMT
Erik Wahlstrom, Sr Director Analyst, Gartner
What modern identity protocol should you implement in your applications and services, such as OAuth 2.0, OpenID Connect, SAML, OPA, FIDO? How do you do it at scale? In this technical session we will define what protocol to use for what specific use case.
Tuesday, 07 March, 2023 / 02:00 PM - 03:30 PM GMT
David Chase, Sr Director Analyst, Gartner
Modern architectures and applications place additional demands on access management tools. This workshop will introduce access management evaluation criteria guidelines, and discuss what features you should look for and what vendors to consider for your next employee access management solution.
Tuesday, 07 March, 2023 / 02:45 PM - 03:15 PM GMT
Teemu Tunkelo, CEO, SSH Communications Security Oyj
To improve security and ensure compliance, organizations are moving away from static perimeter-based cyber defense to a Zero Trust model, where there are no passwords or keys nor implicitly trusted users, connections, applications, servers, or devices. The increased need for remote work, multi-cloud environments & 3rd party access have created the need for solutions that are passwordless and borderless.
Join this session to learn how you can:
- Get rid of all passwords
- Move past rotating secrets
- Forget SMS-based MFA
- Base your access on identities
- Monitor, verify, and control 24/7
Tuesday, 07 March, 2023 / 02:45 PM - 03:30 PM GMT
Alan Radford, SOLUTIONS ARCHITECT, One Identity
Hear from your peers. Participate in this interactive session, hosted by One Identity, to learn how others have overcome identity challenges such as phishing, stolen credentials, third-party access, credential surfing or compromised privileged access. In this 45-minute session, be prepared to share your IAM successes and setbacks, and to gain insights from industry colleagues. Ultimate objective for this collaborative session is to learn you’re not alone, and to envision a path to a secure and unified approach to identity management.
Tuesday, 07 March, 2023 / 03:45 PM - 04:15 PM GMT
Homan Farahmand, VP Analyst, Gartner
Policy-based authorization has become a focal point for developing the next generation of identity-centric access controls. However, the one-size authorization architecture doesn't fit all authorization use cases. In this session. we review key enterprise policy management requirements and runtime architecture patterns for cloud, API, applications, data & analytics, microservices and other common authorization use cases.
Tuesday, 07 March, 2023 / 03:45 PM - 04:15 PM GMT
Michael Kelley, Sr Director Analyst, Gartner
This session will present the Magic Quadrant and Critical Capabilities for the access management market.
Tuesday, 07 March, 2023 / 04:30 PM - 05:00 PM GMT
Paul Rabinovich, Sr Director Analyst, Gartner
Active Directory is a critical IT asset for an overwhelming majority of organizations. This session will guide you on how to apply current IAM best practices to Active Directory. Among other things, we'll talk about hybridization and cloud, topology optimization, group management, identity governance, privileged access management, MFA, and AD threat detection and response.
Monday, 06 March, 2023 / 03:15 PM - 03:45 PM GMT
Matthew Berzinski, SENIOR DIRECTOR, PRODUCT MANAGEMENT, ForgeRock
Alex Laurie, Solution Architecture, Forgerock
Passwordless authentication is gaining momentum with good reason. Users love it and would-be intruders hate it. So why hasn’t it caught on more quickly? Many enterprises are saddled with legacy technology, identity silos, and complex policies. But now you can orchestrate passwordless journeys for your workforce and customers using contextual factors, such as user location, behaviour, and device — driven by continuous AI-powered orchestration. Join this session to explore the evolution to passwordless and how to enable it for your legitimate users while reducing the risk of unauthorised access.
Monday, 06 March, 2023 / 04:00 PM - 04:30 PM GMT
Mary Ruddy, VP Analyst, Gartner
In a world where identity is the only perimeter, more effective identity and access management (IAM) is now an imperative. IAM must be deployed more cohesively as a composable, distributed, resilient identity fabric. This session will explain the 10 identity fabric principles that should guide IAM decisions.
Tuesday, 07 March, 2023 / 11:15 AM - 11:45 AM GMT
Angelika Steinacker, CTO IAM , IBM SECURITY EUROPE, IBM Global Security
Controlling identities and access rights in cloud environments is a challenge. Although every large enterprise has an IAM framework, it sometimes seems impossible to integrate IAM in the cloud with the enterprise framework. CIAG (Cloud Identity & Access Governance) is the orchestration layer between cloud and enterprise framework and provides the methods and assets to achieve the integration. This session will show how an organization can leverage the CIAG assets to keep their clouds clean and making identity and access governance in and across cloud environments maintainable and sustainable.
Tuesday, 07 March, 2023 / 12:00 PM - 12:45 PM GMT
Abhyuday Data, Director Analyst, Gartner
Access management tools are the key to ubiquitous application access, enabling any user to access any application, anytime and anywhere. Gartner has identified a five-step approach to create a modern, efficient access management strategy that serves the needs of all user segments. This session gives you an opportunity to ask questions about that approach for your broader access management strategy.
Tuesday, 07 March, 2023 / 12:40 PM - 01:00 PM GMT
Tudor James, PRESALES ENGINEER, Qomplx
Identity systems are under attack like never before with attackers who simply login and elevate privilege. Learn where MFA and PAM work, and how you can improve your attack detection capabilities to get a complete identity security solution. Additionally, understand how you can improve your overall identity security posture by ensuring identities are secured, your attack detections are comprehensive, and your response is tried and true.
• Why MFA is not enough
• Why you need to assume breach
• What ITDR actually means
• Why the best ITDR programs include prevention along with detection
Tuesday, 07 March, 2023 / 02:45 PM - 03:15 PM GMT
Simon Wood, CEO, Ubisecure Ltd
IAM has evolved to secure and protect transactions, from the smallest interaction to the largest global contract. Individuals have a plethora of technology available to identify themselves. However, organisations are underserved and under-identified with no standard ability for individuals to express their verified relationship to various organisations. Learn how to achieve true B2B IAM - only made possible by combining strongly authenticated individuals with highly assured organisation identities to allow them to express who they are, who they represent and the rights they have when doing so.
Tuesday, 07 March, 2023 / 04:30 PM - 05:00 PM GMT
James Hoover, Principal Analyst, Gartner
This Hype Cycle for Digital Identity emphasizes the maturation of innovations that enable and deliver digital identity services.
Monday, 06 March, 2023 / 11:00 AM - 11:30 AM GMT
Ant Allan, VP Analyst, Gartner
To improve security and enhance UX, many organizations are already implementing various styles of passwordless authentication across a variety of use cases. This session will look to address the following questions. How can IAM leaders choose among the many passwordless approaches? Which approaches are most effective? Which approaches are feasible in which use cases? How do you deal with legacy applications? How can you craft a cohesive strategy across multiple use cases?
Monday, 06 March, 2023 / 01:10 PM - 01:30 PM GMT
Nic Sarginson, Principal Solutions Engineer, Yubico
As long as passwords exist, enterprises are vulnerable to account takeover attacks – yet organizations looking to eliminate passwords may not know where to begin their passwordless journey. While passwordless authentication methods—especially those based on FIDO2—are widely available, they are not yet universally supported nor adopted. This lack of a universal approach can cause confusion and complacency. Learn why (and how) organizations should move away from passwords and legacy MFA to advance to and adopt a secure passwordless strategy centered on phishing-resistant MFA in 2023.
Monday, 06 March, 2023 / 01:10 PM - 01:30 PM GMT
Graham Francis, HEAD OF DIGITAL SECURITY NORTHERN EUROPE, Atos
Today, in order to fulfil the requirements of a Zero Trust strategy, businesses’ global ecosystem needs to define a source of trust. Identity-first is the single transportable constant making this journey possible. Identities can come from anywhere in the ecosystem, making identity the new perimeter, and access the attack surface changing the threat landscape. Join Graham Francis, Head of digital security at Atos, as he describes the journey to a converged IAM and Governance Solution with a Zero trust strategy at its core.
Monday, 06 March, 2023 / 02:00 PM - 02:20 PM GMT
Fabian Eberle, CO-FOUNDER, Keyless Technologies
With DIY phishing kits and SIM swapping more prevalent than ever, bypassing MFA challenges has never been easier. Countries such as Malaysia are instructing financial institutions to cease using SMS OTPs altogether; is this the beginning of the end? As with traditional passwords, OTPs are vulnerable. So long as they can be typed, shared, or seen by others, they can be compromised. This presentation will cover the inherent weaknesses of OTPs and explore the emerging alternatives that can help businesses enable strong, frictionless security.
Monday, 06 March, 2023 / 03:15 PM - 03:45 PM GMT
Matthew Berzinski, SENIOR DIRECTOR, PRODUCT MANAGEMENT, ForgeRock
Alex Laurie, Solution Architecture, Forgerock
Passwordless authentication is gaining momentum with good reason. Users love it and would-be intruders hate it. So why hasn’t it caught on more quickly? Many enterprises are saddled with legacy technology, identity silos, and complex policies. But now you can orchestrate passwordless journeys for your workforce and customers using contextual factors, such as user location, behaviour, and device — driven by continuous AI-powered orchestration. Join this session to explore the evolution to passwordless and how to enable it for your legitimate users while reducing the risk of unauthorised access.
Monday, 06 March, 2023 / 04:00 PM - 04:30 PM GMT
Paul Rabinovich, Sr Director Analyst, Gartner
Like all security controls, MFA itself is vulnerable to attacks. Man in the middle, prompt bombing, SIM swaps, social engineering and session hijacking are a few examples of attacks against MFA implementations. In this session, we will discuss common threats and ways to counter them.
Tuesday, 07 March, 2023 / 09:50 AM - 10:10 AM GMT
Bojan Simic, CEO, HYPR Corp.
Best-in-class authentication has been on everyone’s mind; and it’s no surprise. The vast majority of recent breaches can be traced back to the failure of passwords and legacy MFA. With recent guidance for phishing-resistant MFA, organisations have become Passwordless Curious, but may be hesitant to move forward until they can quantify the business case. Join us for this exciting session where we will outline the benefits of implementing phishing-resistant MFA and discuss the quantifiable value drivers which you can champion within your organisation.
Tuesday, 07 March, 2023 / 11:15 AM - 11:45 AM GMT
Hed Kovetz, CEO & Co-Founder, Silverfort
MFA and other identity security controls are very effective in protecting web apps and modern systems, but until now they couldn't be applied to legacy systems, command-line interfaces, service accounts, OT systems and many other sensitive resources. These 'blind spots' are extensively leveraged in data breaches and ransomware attacks, and also prevent meeting regulatory and cyber insurance requirements. In this session we will show how identity security controls, ranging from the traditional MFA to the emerging ITDR, can now be extended to critical resources that couldn’t be protected before.
Tuesday, 07 March, 2023 / 11:15 AM - 11:45 AM GMT
Oliver Cheal, DIRECTOR, EMEAR, Duo Security
Josh Green, TECH EVANGELIST, Cisco Systems
It was only a matter of time before threat actors found a weakness in push-based MFA. It was there all along: our patience. Our patience only lasts so long, and attackers have been exploiting its limits to phish us mercilessly. The good news is that we are anything but defenceless. Behavioural analytics and adaptive authentication can mitigate the attacks quickly, while deploying passwordless and device trust render these attacks completely obsolete. Even better still, these new technologies make the user experience easier than ever.
Tuesday, 07 March, 2023 / 12:00 PM - 12:30 PM GMT
Ant Allan, VP Analyst, Gartner
User authentication is a cornerstone of identity-first security, and digital identity for workforce and customers. Market hype about passwordless, risk-based and continuous authentication can be daunting. This session will help IAM leaders understand the value of authentication, the shift to continuous adaptive trust, and where this fits with zero trust, adaptive access and the identity fabric.
Tuesday, 07 March, 2023 / 12:40 PM - 01:00 PM GMT
Tudor James, PRESALES ENGINEER, Qomplx
Identity systems are under attack like never before with attackers who simply login and elevate privilege. Learn where MFA and PAM work, and how you can improve your attack detection capabilities to get a complete identity security solution. Additionally, understand how you can improve your overall identity security posture by ensuring identities are secured, your attack detections are comprehensive, and your response is tried and true.
• Why MFA is not enough
• Why you need to assume breach
• What ITDR actually means
• Why the best ITDR programs include prevention along with detection
Tuesday, 07 March, 2023 / 01:05 PM - 01:25 PM GMT
In this session, Brian Trzupek will discuss “invisible authentication” as a strategy to improve end user experience, reduce the IT support burden, and improve security posture related to authentication to IT services and applications. Invisible authentication is governed by certificate-mediated rather than password-governed access. Brian will explore how organizations are:
Automating certificate provisioning for authentication to services such as WiFi and VPN
Achieving instant revocation and remediation to eliminate security gaps
Managing last-mile installation to end-user applications
Tuesday, 07 March, 2023 / 02:00 PM - 02:45 PM GMT
Ant Allan, VP Analyst, Gartner
This interactive session enables attendees to ask the Gartner expert and learn from others about any authentication or adjacent topic. Topics covered include requirements definition, the pros and cons of different technologies, passwordless authentication trends, the shift towards continuous adaptive trust, synergies with identity proofing, user experience and life cycle management.
Tuesday, 07 March, 2023 / 02:45 PM - 03:15 PM GMT
Teemu Tunkelo, CEO, SSH Communications Security Oyj
To improve security and ensure compliance, organizations are moving away from static perimeter-based cyber defense to a Zero Trust model, where there are no passwords or keys nor implicitly trusted users, connections, applications, servers, or devices. The increased need for remote work, multi-cloud environments & 3rd party access have created the need for solutions that are passwordless and borderless.
Join this session to learn how you can:
- Get rid of all passwords
- Move past rotating secrets
- Forget SMS-based MFA
- Base your access on identities
- Monitor, verify, and control 24/7
Tuesday, 07 March, 2023 / 02:45 PM - 03:15 PM GMT
Aizo Krikke, SENIOR PRODUCT OWNER, a.s.r.
a.s.r. has a long history of providing customer-friendly insurance products on the Dutch market. Over the years, the company has grown into a merger organisation offering a wide range of brands and products, with different go to market approaches, backend systems and processes. Join this session to understand how a.s.r. streamlined the user experience for their B2C and B2B channel and business customers, by leveraging a CIAM platform and delivered a frictionless and consistent user journey across all brands and products.
Monday, 06 March, 2023 / 12:30 PM - 01:00 PM GMT
Felix Gaehtgens, VP Analyst, Gartner
Authorization technology has been in a renaissance period, with many new technologies, vendors and specifications appearing within the last two years. This session shines a light on the current market, including open source initiatives, where they are used and where the state of the art lies with regards to authorization technology.
Monday, 06 March, 2023 / 04:40 PM - 05:00 PM GMT
Tom Ammirati, CRO, PlainID
Static and inflexible policies through traditional access control methods have failed to address security risk in real-time. Enterprises are expanding on an Identity-First Security strategy to better support Zero Trust initiatives and address their complex, distributed environments. In this session we cover how enterprises can deliver dynamic controls for Identity-First Security in a consistent, continuous, and contextual manner by externalizing Authorization.
Tuesday, 07 March, 2023 / 01:05 PM - 01:25 PM GMT
Travis Spencer, CEO, Curity
Security is never a simple task; the same applies to APIs. And even more challenging at scale. It’s naturally easier to protect a few endpoints and microservices than hundreds. As the API ecosystem grows, just starting to use OAuth may not be enough. Proper handling of OAuth tokens, utilising different features, and other non-trivial implementation details must be overcome. To help with these, this talk will describe:
- The different perspectives that should be viewed when assessing the size of an API ecosystem; Common security issues; and
- How to address these security challenges.
Tuesday, 07 March, 2023 / 03:45 PM - 04:15 PM GMT
Homan Farahmand, VP Analyst, Gartner
Policy-based authorization has become a focal point for developing the next generation of identity-centric access controls. However, the one-size authorization architecture doesn't fit all authorization use cases. In this session. we review key enterprise policy management requirements and runtime architecture patterns for cloud, API, applications, data & analytics, microservices and other common authorization use cases.
Tuesday, 07 March, 2023 / 04:30 PM - 05:00 PM GMT
James Hoover, Principal Analyst, Gartner
This Hype Cycle for Digital Identity emphasizes the maturation of innovations that enable and deliver digital identity services.
Monday, 06 March, 2023 / 12:30 PM - 01:15 PM GMT
Mary Ruddy, VP Analyst, Gartner
Customer identity and access management (CIAM) is key to enabling your digital transformation and the foundation of your customers' digital experiences. This session gives you an opportunity to ask questions about CIAM platform features, vendors' complementary tools and best practices. Attendees should come prepared to ask questions about IAM for external users.
Monday, 06 March, 2023 / 02:00 PM - 02:20 PM GMT
Stuart Wells, CHIEF TECHNOLOGY OFFICER, JUMIO
Deep fakes have been a looming fraud risk over the past few years, but as technology continues to become more sophisticated, so do fraud attempts that can hurt your business. Implementing and maintaining the latest security measures while also providing a positive end-user experience for good customers can be challenging.
In this session, attendees will learn about:
The evolution of fraud attempts used to circumvent the verification process
The latest fraud trends and techniques such as manipulating document microprints, watermarks and holograms, and duping biometric authentication using AI/ML
Monday, 06 March, 2023 / 02:30 PM - 03:00 PM GMT
Abhyuday Data, Director Analyst, Gartner
Demand for customer IAM has increased, due to its importance in converging UX, security and privacy for high-assurance interactions. How is CIAM technology continuing to evolve to meet these new challenges? We will talk about what is available today, and what kinds of things can you expect to take advantage of in the near future.
Monday, 06 March, 2023 / 03:15 PM - 03:45 PM GMT
Matthew Berzinski, SENIOR DIRECTOR, PRODUCT MANAGEMENT, ForgeRock
Alex Laurie, Solution Architecture, Forgerock
Passwordless authentication is gaining momentum with good reason. Users love it and would-be intruders hate it. So why hasn’t it caught on more quickly? Many enterprises are saddled with legacy technology, identity silos, and complex policies. But now you can orchestrate passwordless journeys for your workforce and customers using contextual factors, such as user location, behaviour, and device — driven by continuous AI-powered orchestration. Join this session to explore the evolution to passwordless and how to enable it for your legitimate users while reducing the risk of unauthorised access.
Tuesday, 07 March, 2023 / 09:50 AM - 10:10 AM GMT
Bojan Simic, CEO, HYPR Corp.
Best-in-class authentication has been on everyone’s mind; and it’s no surprise. The vast majority of recent breaches can be traced back to the failure of passwords and legacy MFA. With recent guidance for phishing-resistant MFA, organisations have become Passwordless Curious, but may be hesitant to move forward until they can quantify the business case. Join us for this exciting session where we will outline the benefits of implementing phishing-resistant MFA and discuss the quantifiable value drivers which you can champion within your organisation.
Tuesday, 07 March, 2023 / 12:00 PM - 12:30 PM GMT
Akif Khan, VP Analyst, Gartner
A typical digital user journey may involve a broad range of IAM tools from identity proofing to authentication to access management to fraud detection. Getting all of these instruments to play in harmony is an increasingly complex challenge. Organizations are buying or building orchestration layers to conduct the symphony. Learn how such orchestration can reduce complexity and improve UX.
Tuesday, 07 March, 2023 / 01:05 PM - 01:25 PM GMT
Travis Spencer, CEO, Curity
Security is never a simple task; the same applies to APIs. And even more challenging at scale. It’s naturally easier to protect a few endpoints and microservices than hundreds. As the API ecosystem grows, just starting to use OAuth may not be enough. Proper handling of OAuth tokens, utilising different features, and other non-trivial implementation details must be overcome. To help with these, this talk will describe:
- The different perspectives that should be viewed when assessing the size of an API ecosystem; Common security issues; and
- How to address these security challenges.
Tuesday, 07 March, 2023 / 01:30 PM - 01:50 PM GMT
Frank Hamerlinck, CEO, Trustbuilder
Streamline your B2B2X digital ecosystem with identity-centric personas and policy-based access control. As customers, workforce, partners, suppliers,… become increasingly intertwined, companies face the challenge of managing access for multiple mandates. Combining different personas into a single user profile and allowing users to always authenticate with a single set of credentials enhances user experience. It also allows for effective management of customer, workforce, and partner data, ensuring compliance and security, while reducing complexity and automating data removal when mandates end.
Tuesday, 07 March, 2023 / 02:45 PM - 03:15 PM GMT
Sebastian Stranieri, CEO, VU
Insert AbstractIt's not only about balancing User Experience, Compliance, and Organizational Needs while building a unified online identity. It's about maximizing all of them.
Everyone demands a seamless and consistent user experience while also complying with industry regulations and meeting business goals. At the same time, individuals need to protect their personal information and manage their online reputation.
This talk will explore the challenges and alternatives for addressing these problems. Where are we today? Where do we need to go? Digital identity beyond current needs.
Tuesday, 07 March, 2023 / 02:45 PM - 03:15 PM GMT
Simon Wood, CEO, Ubisecure Ltd
IAM has evolved to secure and protect transactions, from the smallest interaction to the largest global contract. Individuals have a plethora of technology available to identify themselves. However, organisations are underserved and under-identified with no standard ability for individuals to express their verified relationship to various organisations. Learn how to achieve true B2B IAM - only made possible by combining strongly authenticated individuals with highly assured organisation identities to allow them to express who they are, who they represent and the rights they have when doing so.
Tuesday, 07 March, 2023 / 02:45 PM - 03:15 PM GMT
Aizo Krikke, SENIOR PRODUCT OWNER, a.s.r.
a.s.r. has a long history of providing customer-friendly insurance products on the Dutch market. Over the years, the company has grown into a merger organisation offering a wide range of brands and products, with different go to market approaches, backend systems and processes. Join this session to understand how a.s.r. streamlined the user experience for their B2C and B2B channel and business customers, by leveraging a CIAM platform and delivered a frictionless and consistent user journey across all brands and products.
Tuesday, 07 March, 2023 / 03:45 PM - 04:15 PM GMT
Abhyuday Data, Director Analyst, Gartner
What is Customer IAM (CIAM)? What are the key considerations for an effective CIAM strategy? We will discuss recommended top practices around CIAM, how to take your CIAM strategy to the next level and how to plan for the best user experience to achieve your goals.
Monday, 06 March, 2023 / 09:30 AM - 10:15 AM GMT
Tina Nunno, Distinguished VP Analyst, Gartner
As a leader, are you a predator or prey, and what should you aspire to be? Technology executives are more visible now than ever before, this can be both an opportunity and a challenge. This session will explore how being a wolf can make you a better leader for your team and a great asset for your organization. Before this session find out yours at Gartner.com/wolfcio and learn more about what your results mean during the keynote.
Monday, 06 March, 2023 / 11:00 AM - 12:00 PM GMT
Jo Ann Rosenberger, Distinguished VP, Advisory, Gartner
This session will demonstrate and guide IT and IAM leaders involved in the negotiation planning process how to incorporate ten “must know” tips, tactics and “tricks” into the negotiation plan to optimize pricing, discounts and contract terms. Attendees will receive ready-to-use checklists, templates, and worksheets for optimizing future negotiations with existing, new and emerging vendors.
Monday, 06 March, 2023 / 11:00 AM - 12:30 PM GMT
Rebecca Archambault, Sr Director Analyst, Gartner
During this workshop, IAM leaders will learn the importance and steps required for defining a well-crafted IAM program. The session will include exercises to help leaders create their own IAM vision.
Monday, 06 March, 2023 / 11:45 AM - 12:15 PM GMT
Steve Bradford, SENIOR VICE PRESIDENT, EMEA, SailPoint
Richard Wareham, IAM ANALYST, Legal and General
John Heal, IDENTITY & ACCESS MANAGEMENT PLATFORM LE, Legal and General
In today’s complex digital environment, a mature approach to governing identity is key to maintaining productivity and security. Companies must have full visibility into user access to stay ahead of security risks. Automating and streamlining identity processes is essential to boosting productivity and to the business itself. Modernizing your identity security can help boost operational efficiency, comply with privacy regulations, and reduce cybersecurity risks. See how Legal & General leverages SailPoint to provide their workforce with the right user access without compromising security.
Monday, 06 March, 2023 / 12:30 PM - 01:00 PM GMT
Henrique Teixeira, Sr Director Analyst, Gartner
Preventive mechanisms offered by emerging technologies like cloud infrastructure entitlement management (CIEM) include security posture principles to handle misconfiguration, vulnerabilities, and general exposure of entitlements in cloud infrastructures. Hygiene and security posture is a must have complement to run time threat detection and response disciplines. Join this session to learn how CIEM is paving the way to smarter strategies for enabling identity fabric immunity.
Monday, 06 March, 2023 / 01:35 PM - 01:55 PM GMT
Mario Platt, DIRECTOR OF GRC - SECURITY AND PRIVACY, LastPass
How Security professionals can Support Engineers and Dev in developing Secure Code - making sure that the systems and processes we implement are integrated and aligned with the compliance requirements (less shadow IT and unsecure environments).
Audit in the context of IAM - Why should IAM professionals know about Auditing and Compliance.
Modern Compliance Programs
- Integrated (mention how that integrates with Security and IAM)
- Automated - how automation increases the sync between different teams
- Employee Experience - streamlining the process to improve user experience = less time to audit and more cost savings
Monday, 06 March, 2023 / 02:30 PM - 03:00 PM GMT
James Hoover, Principal Analyst, Gartner
Security and risk leaders struggle to deliver demonstrable business value from their IAM investments. Maturity Assessment approaches hold promise for improving business value delivery, but realization of this improved business value is inconsistent. This session will outline Gartner's IT Score for IAM and practical steps for applying it effectively to increase business value delivery.
Monday, 06 March, 2023 / 03:15 PM - 03:45 PM GMT
Jonathan Neal, Technical Director, Saviynt
David Queen, HEAD OF CLOUD IDENTITY, Lloyds Banking Group
Lloyds Banking Group is the largest UK retail and commercial financial services provider, with 26 million customers, 58000 employees and a heritage that goes back 250 years.
Learn about the key part that implementing Cloud Privilege Access Management (CPAM) is playing in the bank’s cloud transformation strategy.
Head of Cloud Identity for Lloyds Banking Group, David Queen, will talk about the journey to implementation and you will have the opportunity to ask questions and learn from David’s experience.
Tuesday, 07 March, 2023 / 10:30 AM - 11:00 AM GMT
Rebecca Archambault, Sr Director Analyst, Gartner
The establishment and delivery of an IAM Program is vital to delivering Identity First security. Whether you are new to identity or delivering identity and access management currently, you need to understand and communicate the role that identity plays within your organization to enable your workforce, customers and business partners to deliver their strategic initiatives.
Tuesday, 07 March, 2023 / 10:30 AM - 11:00 AM GMT
Jo Ann Rosenberger, Distinguished VP, Advisory, Gartner
Inflationary times create added complexity when negotiating with vendors. Gartner's four-step approach to proactively plan for new and renewal deals can help assess the fairness of increases as well as use data points from economic indicators such as CPI and ECI to customize "should cost" models to use during vendor negotiations. This session will demonstrate these steps by walking through two case study scenarios.
Tuesday, 07 March, 2023 / 10:30 AM - 11:00 AM GMT
Mary Ruddy, VP Analyst, Gartner
Many organizations are reimplementing identity and access management. This session will show how organizations can use the principles of Identity-First Security to guide the prioritization and design of their best practice IAM reimplementations.
Tuesday, 07 March, 2023 / 10:30 AM - 11:15 AM GMT
David Chase, Sr Director Analyst, Gartner
A chance to ask an analyst your questions on implementing identity first, zero trust, and ITDR (identity threat detection and response).
Tuesday, 07 March, 2023 / 10:30 AM - 12:00 PM GMT
David Collinson, Sr Director Analyst, Gartner
Knowing what metrics matter to your IAM stakeholders is critical to prioritizing, developing and monitoring IAM features. Metrics identify the success of individual projects, and where attention and improvements must take place. To succeed, they must be terms that the stakeholders recognize and understand. They should also align with or influence other initiatives. This workshop will enable you to learn how to set proper expectations.
Tuesday, 07 March, 2023 / 11:15 AM - 11:45 AM GMT
Steve Barker, MODERN WORKPLACE ARCHITECT, Dominos PLC
Over the past several years, Domino’s Pizza has undergone a major digital transformation, including transitioning fully to the cloud and instituting a Zero Trust strategy throughout the organization. In this session, you will hear how Domino’s leveraged an IGA as a Service solution to not only bolster security and compliance, but delivering value by enabling the entire workforce, including employees, third party contractors, and more. They will also discuss how they avoided common deployment and scaling pitfalls by engaging people across the organization including HR and executive leadership.
Tuesday, 07 March, 2023 / 11:15 AM - 12:00 PM GMT
Paul Squires, LEAD IDENTITY STRATEGIST, SailPoint
In an era of hyper innovation and rising cyber threats, it’s imperative that identity security evolve to meet today’s needs and future demands. How do you know if your program is mature enough? What does the future entail? Research has uncovered 5 horizons of identity security, showing that those further along the journey see identity as a strategic enabler to business innovation and security realizing the benefits of an advanced identity program. Hear the latest findings on the horizons of identity security, insights on digital trends, and ways to capture the full value of identity security.
Tuesday, 07 March, 2023 / 12:00 PM - 12:45 PM GMT
Rebecca Archambault, Sr Director Analyst, Gartner
Organizations understand the important role that identity plays in their cybersecurity program, however security and risk management leaders aren't clear on where to begin. For those who have a defined IAM program, their efforts often stall, limiting their ability to mature their IAM capabilities. Bring your questions to this session, where we can talk about initiating or enhancing your IAM program.
Tuesday, 07 March, 2023 / 01:30 PM - 01:50 PM GMT
Tomas Gustavsson, CTO, PrimeKey Solutions AB
Join Keyfactor's Chief PKI Officer, Tomas Gustavsson, for a strategic discussion on the potential impact of quantum computing on IAM and the shift towards post-quantum cryptography.
Tomas will explore the current state of PQC research and standardization, the steps organizations can take to prepare for the transition to these new security protocols as well as some of the pitfalls that we know we can expect on the way. Don't miss this opportunity to gain valuable insights and a head start on the future of IAM from the perspective of a leading PKI expert.
Tuesday, 07 March, 2023 / 02:45 PM - 03:15 PM GMT
Bob Pruett, CISO, SecurEnds, Inc.
Managing identities and permissions across all applications is a tough job. It’s getting tougher every day. SecurEnds CEM will give you a consolidated view of all your identities and allow you to perform automated and meaningful user access reviews without weeks of preparation. SecurEnds can turn a compliance checkbox into a powerful tool to protect your enterprise with additional features such as SOD and service account management, simplifying your identity tasks quickly.
Monday, 06 March, 2023 / 10:20 AM - 10:40 AM GMT
Anil Bhandari, Chief Mentor, Arcon Techsolutions
An increase in the types of digital identities, coupled with multi-cloud adoption, has added complexity to managing identities and privileges. How does one get future-ready, to address these new-age challenges? An Identity-centric security strategy centers on effective governance with zero trust, that simplifies and unifies critical aspects of Access Management (AM), Identity Governance Administration (IGA) and Privileged Access Management (PAM). Join us to explore the benefits of a Converged Identity security approach that is outcome-driven, and looks to ditch the silos of key IAM components.
Monday, 06 March, 2023 / 11:45 AM - 12:15 PM GMT
Steve Bradford, SENIOR VICE PRESIDENT, EMEA, SailPoint
Richard Wareham, IAM ANALYST, Legal and General
John Heal, IDENTITY & ACCESS MANAGEMENT PLATFORM LE, Legal and General
In today’s complex digital environment, a mature approach to governing identity is key to maintaining productivity and security. Companies must have full visibility into user access to stay ahead of security risks. Automating and streamlining identity processes is essential to boosting productivity and to the business itself. Modernizing your identity security can help boost operational efficiency, comply with privacy regulations, and reduce cybersecurity risks. See how Legal & General leverages SailPoint to provide their workforce with the right user access without compromising security.
Monday, 06 March, 2023 / 11:45 AM - 12:15 PM GMT
Alan Radford, SOLUTIONS ARCHITECT, One Identity
Insert abstractMost large organisations attempt to manage thousands – and hundreds of thousands – of customer, partner and employee identities across multiple applications and data silos. Each system has a unique user-permissions provisioning and approval process. This leads to operational inefficiencies and cybersecurity gaps that threat actors can take advantage of to wreak havoc on your organisation. Join this session, led by Alan Radford, Technical Strategist at One Identity, to discover how to unify your identity and security strategies, thus saving time, money and strengthening security.
Monday, 06 March, 2023 / 11:45 AM - 12:15 PM GMT
Richard Owen, SECURITY ARCHITECT, Cazoo
Philip Hoyer, FIELD CTO EMEA, Okta
Okta's customers no longer need to make a trade-off between delivering a great user experience and strong security. In less than 3 years since launch, Okta customer Cazoo is now the UK's largest independent used car retailer and it's workforce expanded to match pace, growing to over 3,500 employees now.
In our session, we talk to Richard Owen, Security Architect about how Okta provides seamless IT experiences for Cazoo employees through Lifecycle Management while boosting security with SSO and MFA; resulting in time and money saved and peace of mind for Cazoo and its employees and customers.
Monday, 06 March, 2023 / 11:45 AM - 12:30 PM GMT
Heiko Klarl, Chief Marketing and Sales Officer, iC Consult Group GmbH
Andre Priebe, Chief Technology Officer, iC Consult GmbH
Liam Hogan, DIRECTOR IT, Jaguar Land Rover
chris patrick, Managing Director, iC Consult
Digital Identities are the core of every Zero Trust strategy. Managed Services and BPO for IAM are an efficient approach to implement this strategy with consistent levels of security within the enterprise. Central governance, a high grade of automation and the flexibility to support DevOps and agile teams are not a contradiction when implemented in a smart way.
Join our discussion on:
- The role of Managed Services in Zero Trust
- How to benefit from Business Process Outsourcing for IAM
- How this supports a Zero Trust Strategy at a global scale
Monday, 06 March, 2023 / 12:30 PM - 01:00 PM GMT
Henrique Teixeira, Sr Director Analyst, Gartner
Preventive mechanisms offered by emerging technologies like cloud infrastructure entitlement management (CIEM) include security posture principles to handle misconfiguration, vulnerabilities, and general exposure of entitlements in cloud infrastructures. Hygiene and security posture is a must have complement to run time threat detection and response disciplines. Join this session to learn how CIEM is paving the way to smarter strategies for enabling identity fabric immunity.
Monday, 06 March, 2023 / 12:30 PM - 01:00 PM GMT
David Collinson, Sr Director Analyst, Gartner
This is a session to introduce what IGA is and is not, and how it differs and interacts with access management tools. Ideal for individuals that are being asked to take on responsibilities in this area or for senior leaders to be given a high-level introduction in to these capabilities.
Monday, 06 March, 2023 / 01:10 PM - 01:30 PM GMT
Graham Francis, HEAD OF DIGITAL SECURITY NORTHERN EUROPE, Atos
Today, in order to fulfil the requirements of a Zero Trust strategy, businesses’ global ecosystem needs to define a source of trust. Identity-first is the single transportable constant making this journey possible. Identities can come from anywhere in the ecosystem, making identity the new perimeter, and access the attack surface changing the threat landscape. Join Graham Francis, Head of digital security at Atos, as he describes the journey to a converged IAM and Governance Solution with a Zero trust strategy at its core.
Monday, 06 March, 2023 / 01:35 PM - 01:55 PM GMT
Mario Platt, DIRECTOR OF GRC - SECURITY AND PRIVACY, LastPass
How Security professionals can Support Engineers and Dev in developing Secure Code - making sure that the systems and processes we implement are integrated and aligned with the compliance requirements (less shadow IT and unsecure environments).
Audit in the context of IAM - Why should IAM professionals know about Auditing and Compliance.
Modern Compliance Programs
- Integrated (mention how that integrates with Security and IAM)
- Automated - how automation increases the sync between different teams
- Employee Experience - streamlining the process to improve user experience = less time to audit and more cost savings
Monday, 06 March, 2023 / 02:30 PM - 03:00 PM GMT
Nat Krishnan, Sr Director Analyst, Gartner
Light alternatives to IGA suites can be used for reducing costs or to augment an existing IGA suite to add niche capabilities. This session will discuss whether light IGA tools can be considered as the primary IGA solution for an organization.
Monday, 06 March, 2023 / 03:15 PM - 03:45 PM GMT
John Pritchard, CHIEF PRODUCT OFFICER, Radiant Logic
Sebastien Faivre, CTO, Brainwave
Data is foundational to business intelligence-but how do you translate that into identity governance? Today’s enterprise has unprecedented levels of real-time, rich identity data across multiple parallel sources. More data leads to more predictive power in machine learning algorithms. These runtime data driven insights can become a central component to a systematic compliance and risk management strategy. This session will highlight how identity data can be used to uncover patterns, anomalies, and outliers and radically improve decision making, supporting your Identity First Security strategy.
Monday, 06 March, 2023 / 03:15 PM - 03:45 PM GMT
Jonathan Neal, Technical Director, Saviynt
David Queen, HEAD OF CLOUD IDENTITY, Lloyds Banking Group
Lloyds Banking Group is the largest UK retail and commercial financial services provider, with 26 million customers, 58000 employees and a heritage that goes back 250 years.
Learn about the key part that implementing Cloud Privilege Access Management (CPAM) is playing in the bank’s cloud transformation strategy.
Head of Cloud Identity for Lloyds Banking Group, David Queen, will talk about the journey to implementation and you will have the opportunity to ask questions and learn from David’s experience.
Monday, 06 March, 2023 / 04:40 PM - 05:00 PM GMT
Tom Ammirati, CRO, PlainID
Static and inflexible policies through traditional access control methods have failed to address security risk in real-time. Enterprises are expanding on an Identity-First Security strategy to better support Zero Trust initiatives and address their complex, distributed environments. In this session we cover how enterprises can deliver dynamic controls for Identity-First Security in a consistent, continuous, and contextual manner by externalizing Authorization.
Tuesday, 07 March, 2023 / 11:15 AM - 11:45 AM GMT
Steve Barker, MODERN WORKPLACE ARCHITECT, Dominos PLC
Over the past several years, Domino’s Pizza has undergone a major digital transformation, including transitioning fully to the cloud and instituting a Zero Trust strategy throughout the organization. In this session, you will hear how Domino’s leveraged an IGA as a Service solution to not only bolster security and compliance, but delivering value by enabling the entire workforce, including employees, third party contractors, and more. They will also discuss how they avoided common deployment and scaling pitfalls by engaging people across the organization including HR and executive leadership.
Tuesday, 07 March, 2023 / 11:15 AM - 11:45 AM GMT
Angelika Steinacker, CTO IAM , IBM SECURITY EUROPE, IBM Global Security
Controlling identities and access rights in cloud environments is a challenge. Although every large enterprise has an IAM framework, it sometimes seems impossible to integrate IAM in the cloud with the enterprise framework. CIAG (Cloud Identity & Access Governance) is the orchestration layer between cloud and enterprise framework and provides the methods and assets to achieve the integration. This session will show how an organization can leverage the CIAG assets to keep their clouds clean and making identity and access governance in and across cloud environments maintainable and sustainable.
Tuesday, 07 March, 2023 / 11:15 AM - 12:00 PM GMT
Paul Squires, LEAD IDENTITY STRATEGIST, SailPoint
In an era of hyper innovation and rising cyber threats, it’s imperative that identity security evolve to meet today’s needs and future demands. How do you know if your program is mature enough? What does the future entail? Research has uncovered 5 horizons of identity security, showing that those further along the journey see identity as a strategic enabler to business innovation and security realizing the benefits of an advanced identity program. Hear the latest findings on the horizons of identity security, insights on digital trends, and ways to capture the full value of identity security.
Tuesday, 07 March, 2023 / 12:00 PM - 12:30 PM GMT
Nat Krishnan, Sr Director Analyst, Gartner
Identity governance and administration systems is one of the most expensive IAM components an organization will ever purchase. It is a foundational component of an IAM program. However, it is extremely complex and one of the costliest when considering the total cost of ownership. This session will cover IGA deployment methodology to ensure your project stays on time, within professional services budget and avoid lengthy overruns.
Tuesday, 07 March, 2023 / 02:45 PM - 03:15 PM GMT
Bob Pruett, CISO, SecurEnds, Inc.
Managing identities and permissions across all applications is a tough job. It’s getting tougher every day. SecurEnds CEM will give you a consolidated view of all your identities and allow you to perform automated and meaningful user access reviews without weeks of preparation. SecurEnds can turn a compliance checkbox into a powerful tool to protect your enterprise with additional features such as SOD and service account management, simplifying your identity tasks quickly.
Tuesday, 07 March, 2023 / 02:45 PM - 03:30 PM GMT
Alan Radford, SOLUTIONS ARCHITECT, One Identity
Hear from your peers. Participate in this interactive session, hosted by One Identity, to learn how others have overcome identity challenges such as phishing, stolen credentials, third-party access, credential surfing or compromised privileged access. In this 45-minute session, be prepared to share your IAM successes and setbacks, and to gain insights from industry colleagues. Ultimate objective for this collaborative session is to learn you’re not alone, and to envision a path to a secure and unified approach to identity management.
Tuesday, 07 March, 2023 / 04:30 PM - 05:00 PM GMT
David Collinson, Sr Director Analyst, Gartner
Whilst segregation of duty controls are key to preventing fraud, they can also be used very effectively in the security arena. This session will explore the changing scope and supporting technologies to prevent toxic combinations impacting your organization financially but perhaps more importantly also from a security perspective.
Monday, 06 March, 2023 / 11:45 AM - 12:15 PM GMT
Morey Haber, CSO, BeyondTrust
Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed, and serviced from the cloud.
Attackers have also realigned their efforts, focusing on staying undetected, quickly monetizing exploitations, and publicly shaming organizations after successful breaches.
BeyondTrust Chief Security Officer (CSO), Morey J.Haber will offer best practices for minimizing these increasingly exploited cloud attack vectors. Join him to learn cutting edge strategies for building the optimal cloud defense for your organizations unique cloud environment and identities.
Monday, 06 March, 2023 / 11:45 AM - 12:15 PM GMT
Alan Radford, SOLUTIONS ARCHITECT, One Identity
Insert abstractMost large organisations attempt to manage thousands – and hundreds of thousands – of customer, partner and employee identities across multiple applications and data silos. Each system has a unique user-permissions provisioning and approval process. This leads to operational inefficiencies and cybersecurity gaps that threat actors can take advantage of to wreak havoc on your organisation. Join this session, led by Alan Radford, Technical Strategist at One Identity, to discover how to unify your identity and security strategies, thus saving time, money and strengthening security.
Monday, 06 March, 2023 / 12:30 PM - 01:00 PM GMT
Henrique Teixeira, Sr Director Analyst, Gartner
Preventive mechanisms offered by emerging technologies like cloud infrastructure entitlement management (CIEM) include security posture principles to handle misconfiguration, vulnerabilities, and general exposure of entitlements in cloud infrastructures. Hygiene and security posture is a must have complement to run time threat detection and response disciplines. Join this session to learn how CIEM is paving the way to smarter strategies for enabling identity fabric immunity.
Monday, 06 March, 2023 / 03:15 PM - 03:45 PM GMT
Barak Feldman, MANAGER, SVP, PAM and Identity Security
Every identity is a gateway to your organization’s most valuable resources. Privilege users are no longer just IT admins. Almost any identity can have high-value or high-level access. How can you ensure that the right users securely access the right resources at the right time?
Enter Identity Security, a strategy to enable Zero Trust and enforce least privilege, with dynamic adaptive controls, giving the right level of access, based on risk.
In this panel we will explore:
Rethinking privilege
How organizations are adopting Identity Security
Starting your Identity Security program
Monday, 06 March, 2023 / 03:15 PM - 03:45 PM GMT
Jonathan Neal, Technical Director, Saviynt
David Queen, HEAD OF CLOUD IDENTITY, Lloyds Banking Group
Lloyds Banking Group is the largest UK retail and commercial financial services provider, with 26 million customers, 58000 employees and a heritage that goes back 250 years.
Learn about the key part that implementing Cloud Privilege Access Management (CPAM) is playing in the bank’s cloud transformation strategy.
Head of Cloud Identity for Lloyds Banking Group, David Queen, will talk about the journey to implementation and you will have the opportunity to ask questions and learn from David’s experience.
Monday, 06 March, 2023 / 04:40 PM - 05:00 PM GMT
Scott Shields, TECHNO KING, Delinea
The cyber insurance industry is evolving fast to help your business mitigate risk. Cyber insurance offers a safety net for businesses threatened by the rapid growth of insider cybercrime and external cyber threats, particularly ransomware. While cyber insurance has been a reliable safety net for years - driven by accelerating insider cybercrime and exploding ransomware attacks - things are changing fast. It’s important to understand the dynamics of the rapidly changing market and consider how well your security controls will stand up to an insurance company’s review.
Tuesday, 07 March, 2023 / 09:50 AM - 10:10 AM GMT
Oded Hareven, CEO & CO-FOUNDER,
The rise of machine identities and DevOps automation has caused “Secrets Sprawl,” due to the increase of database credentials, certificates, API keys, and other machine secrets.
These machine secrets are kept in siloed point solutions, multiple DevOps tools, hardcoded, and saved across on-prem servers or multiple cloud providers. Secrets sprawl is at the root of the difficulty of tracking, securing and managing machine secrets.
Join CEO, Oded Hareven as he explores the rise of machine identities, secrets sprawl, and actionable steps that IAM teams can take to address these challenges.
Tuesday, 07 March, 2023 / 10:30 AM - 11:00 AM GMT
Abhyuday Data, Director Analyst, Gartner
Through a selection of relevant Gartner insights and complementary methodologies, we will provide insight into latest updates in the privileged access management market.
Tuesday, 07 March, 2023 / 11:15 AM - 11:45 AM GMT
Hed Kovetz, CEO & Co-Founder, Silverfort
MFA and other identity security controls are very effective in protecting web apps and modern systems, but until now they couldn't be applied to legacy systems, command-line interfaces, service accounts, OT systems and many other sensitive resources. These 'blind spots' are extensively leveraged in data breaches and ransomware attacks, and also prevent meeting regulatory and cyber insurance requirements. In this session we will show how identity security controls, ranging from the traditional MFA to the emerging ITDR, can now be extended to critical resources that couldn’t be protected before.
Tuesday, 07 March, 2023 / 02:00 PM - 02:30 PM GMT
Felix Gaehtgens, VP Analyst, Gartner
This breakout serves not just as an introduction but is also ideal for those who already have a PAM program and are looking to mature it. The following topics are covered: why is PAM such a crucial piece of any security program? How should you leverage PAM? How can you raise your security posture by using a just-in-time PAM and zero standing privileges approach?
Tuesday, 07 March, 2023 / 02:45 PM - 03:15 PM GMT
Teemu Tunkelo, CEO, SSH Communications Security Oyj
To improve security and ensure compliance, organizations are moving away from static perimeter-based cyber defense to a Zero Trust model, where there are no passwords or keys nor implicitly trusted users, connections, applications, servers, or devices. The increased need for remote work, multi-cloud environments & 3rd party access have created the need for solutions that are passwordless and borderless.
Join this session to learn how you can:
- Get rid of all passwords
- Move past rotating secrets
- Forget SMS-based MFA
- Base your access on identities
- Monitor, verify, and control 24/7
Tuesday, 07 March, 2023 / 02:45 PM - 03:30 PM GMT
Alan Radford, SOLUTIONS ARCHITECT, One Identity
Hear from your peers. Participate in this interactive session, hosted by One Identity, to learn how others have overcome identity challenges such as phishing, stolen credentials, third-party access, credential surfing or compromised privileged access. In this 45-minute session, be prepared to share your IAM successes and setbacks, and to gain insights from industry colleagues. Ultimate objective for this collaborative session is to learn you’re not alone, and to envision a path to a secure and unified approach to identity management.
Tuesday, 07 March, 2023 / 03:45 PM - 04:30 PM GMT
Felix Gaehtgens, VP Analyst, Gartner
Privileged access is the prime cause of breaches, yet more people than ever require it for their work. Requirements for PAM are evolving rapidly to include hybrid-multicloud scenarios and machine identities. Bring your questions about trends and best practices to this session.