View By:

Agenda / Topic

Thursday, 12 March, 2020 / 01:45 PM - 02:30 PM GMT

Ask the Expert: Modern Authorization Solutions

Homan Farahmand, Sr Director Analyst, Gartner

Authorization architecture is constantly evolving as organizations digitize their assets and run more workload in hybrid-IT and/or multicloud environments. This is while automation technologies that orchestrate access to business and infrastructure services increasingly require a dynamic authorization decision making. In this session we discuss how ABAC can be applied to address these requirements.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 09:00 AM - 09:30 AM GMT

TrustBuilder: BYOA (Bring Your Own Authentication) in Practice @Allianz

Kurt Berghs, Sales Manager Benelux, TrustBuilder

Philippe Mermuys, Information Security Manager, Allianz Benelux

Whether you are an insurance broker, an end customer or an employee, insurance company Allianz Benelux offers secure and seamless access to information and applications through a strong authentication method of your own choice. TrustBuilder’s support for SSO, Federated Authentication and Consumer IAM proves invaluable in the digital transformation at Allianz Benelux.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 09:00 AM - 09:30 AM GMT

Thales: Extending Passwordless Authentication with Passwordless Secure Single-Sign On

Francois Lasnier, VP- Identity and Access Management, Thales

Passwordless authentication can be implemented in many ways ensuring a seamless hassle-free login experience. Extending the value of passwordless frameworks to distributed/hybrid cloud environments offers benefits and optimizes security and convenience. Combining different assurance levels at the access point and continuous in-app detection mechanisms form a foundation for secure passwordless SSO

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 11:00 AM - 11:45 AM GMT

The Technical Evaluation Criteria for Access Management Solutions

Erik Wahlstrom, Sr Director Analyst, Gartner

Access management is an essential part of the identity landscape. It includes single sign-on, session management, authentication and authorization to both cloud and on-premises applications. This technical session presents the criteria to use when defining your requirement and making product decisions to ensure deployed solutions meet security, privacy, usability and integration demands.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 12:00 PM - 12:30 PM GMT

Duo Security: Zero Trust - The Key to IAM Success

Richard Archdeacon, Advisory CISO, Duo

Nearly every section of the security industry is talking about Zero Trust. The concepts are readily understood. But the same questions are often asked; where and do I start and what are the issues I will face?

We'll provide a practical toolkit to help you begin your Zero Trust journey beginning with Multifactor Authentication and moving to device identification and adaptive access.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 10:45 AM - 11:30 AM GMT

Top Trends in CIAM Solution Design

Mary Ruddy, VP Analyst, Gartner

The imperative to streamline operations, unify customer experience and enable digital transformation requires continual improvements to consumer identity and access management systems. Technical professionals designing CIAM solutions must understand key trends, features and evolving vendor offerings.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 11:45 AM - 12:30 PM GMT

Leveraging CARTA and CIAM to Prevent Fraud and Protect Privacy

Michael Kelley, Sr Director Analyst, Gartner

Abhyuday Data, Sr Principal Analyst, Gartner

After Facebook privacy scandals, and publicity around so many data breaches, consumers and the public opinion have pushed the industry to do the inconceivable: to entertain the idea that #thefutureisprivate. How continuous adaptive risk and trust assessment (CARTA) for CIAM can help prevent internal fraud, and achieve a more private future. Includes contexts for CIAM, and Internal Fraud. Based on "Implications of Facebook’s Privacy Scandal: Key Takeaways and Next Steps" — using this in the context of CIAM, to leverage CARTA to prevent *internal* fraud.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 02:00 PM - 02:30 PM GMT

Okta: Q&A Panel - Practical Considerations When Implementing Cloud IAM and IDaaS

James Fletcher, Group Head of Information Security, Odeon Cinemas Group

Hosted by Sami Laine of Okta, leader in the Gartner Magic Quadrant for Access Management, this Q&A session will provide delegates with the opportunity to hear direct from Okta customers, how they selected and implemented their Cloud Identity Strategy. As well as discussing these real life examples of Cloud Identity in action, delegates will be able to put their own questions to the panel.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 03:30 PM - 04:00 PM GMT

ForgeRock: A Winning Strategy - Leverage Digital Identity and AI to Transform and Secure Business

Peter Barker, Executive Vice President & Chief Product Officer, ForgeRock

Most organizations struggle with competing priorities of security, compliance, user experience and cost, while managing the pain of legacy, disparate systems. Now you can take a strategic, modern approach to Digital Identity, leveraging the power of AI, to improve numerous aspects of your business. Looking to drive digital transformation across your enterprise? Join this ForgeRock chat to see how.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 03:30 PM - 04:00 PM GMT

Ping Identity & Capita: Great Customer Experience Starts with Identity

Capita’s CTO, Daniel Reeve, and Ping Identity’s CCIO, Richard Bird, will discuss the evolution of the Customer Journey and the increasing importance of Identity as a key role in helping businesses meet the ever changing expectations of their customers. Learn about Capita’s own case study and how Ping Identity helped them deliver secure and frictionless digital experiences to their Customers.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 12:40 PM - 01:00 PM GMT

Onfido: How Digital Identity Verification Can Support Hypergrowth

Neo-bank Revolut reported an average growth rate of 48,477% in the last three years. Driving this growth is international expansion. But such growth can pose challenges. Digital onboarding requires a scalable solution that balances international requirements, customer experience and risk exposure.

This session explores how working with Onfido helped Revlout overcome these challenges.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 01:00 PM - 02:30 PM GMT

Workshop: Selecting the Right CIAM Solution

Mary Ruddy, VP Analyst, Gartner

The right customer identity and access management solution is key to providing a great user experience, and securing customer data and privacy. In this workshop, we will discuss what factors and features to consider, and which vendors to shortlist when looking for your new CIAM solution.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 09:00 AM - 09:30 AM GMT

OneLogin: Identity at the Core of Security Automation

Stuart Sharp, VP of Solution Engineering, OneLogin

Harnessing ML and AI to Reduce Risk & Increase Compliance
With the rise of remote working & BYOD, the maxim “Identity is the New Perimeter” is now firmly established. Verifying identity is inexorably linked to end user behaviour, & reducing risk therefore involves managing that behaviour. Security professionals have to manage competing demands of an increasingly diverse population of end users

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 11:00 AM - 11:45 AM GMT

The Technical Evaluation Criteria for Access Management Solutions

Erik Wahlstrom, Sr Director Analyst, Gartner

Access management is an essential part of the identity landscape. It includes single sign-on, session management, authentication and authorization to both cloud and on-premises applications. This technical session presents the criteria to use when defining your requirement and making product decisions to ensure deployed solutions meet security, privacy, usability and integration demands.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 12:00 PM - 12:30 PM GMT

SSH: Innovating Access to Critical, Hybrid IT Infrastructures

Markku Rossi, CTO, SSH COMMUNICATIONS SECURITY - FINLAND

Markku discusses why forgetting always-on privileges mitigates risks and saves time. Learn how to:

● federate identities & their authorizations with ease

● automate privileged access management

● auto-discover global cloud inventories

● provide just-in-time access

● deploy the solution fast & scalably**

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 02:30 PM - 03:15 PM GMT

Best Practices for Mobile Identity

Rob Smith, Sr Director Analyst, Gartner

Mobility brings constant chaos with users trying to access applications and data from new and potentially unknown devices and locations. This session will cover how this chaos impacts identity and what organizations should be doing as best practices to ensure proper authentication.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 08:00 AM - 08:45 AM GMT

Tutorial: Identity and Access Management (IAM) 101

Brent Predovich, Assoc Principal Analyst, Gartner

As is the case with practically every domain, identity and access management (IAM) has its own jargon that can be difficult for newcomers to understand. This session provides newcomers with an introduction to the IAM territory and its vocabulary.
Key Issues:

● What is the definition and purpose of IAM?

● How do IAM practitioners think about IAM?

● What should newcomers to IAM know before they go?

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 09:00 AM - 10:00 AM GMT

Keynote: Learn to Be a Better Communicator — A Play in Four Acts

Jeffrey Wheatman, VP Analyst, Gartner

One of the biggest challenges for IAM leaders and practitioners is how to more effectively communicate with a range of stakeholders. Stop using acronyms, jargon and technobabble and get more traction, align with business goals and be viewed as a strategic leader.
1 - What are the benefits of better communication?
2 - What are the top causes of miscommunication?
3 - How can IAM leaders and practitioners be more effective risk communicators?

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 10:45 AM - 11:30 AM GMT

IT Leaders' Guide to IAM Program Management

David Collinson, Sr Director Analyst, Gartner

IT leaders often struggle to know where to begin and how to initiate a well-run IAM program. This session will help you by taking you through the initial steps, best practice and learnings from organisations that have been through this process before.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 11:45 AM - 12:30 PM GMT

IAM Program Perspectives Survey

Kevin Kampman, Sr Director Analyst, Gartner

In 2019, Gartner conducted a survey of IAM practitioners to gauge adoption, investment and priorities. This session will present our findings about how your peers are accomplishing their objectives and the priorities that are influencing their program activities.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 12:45 PM - 01:45 PM GMT

Women in Identity Luncheon and Panel

Mary Ruddy, VP Analyst, Gartner

Colette D’Alessandro, Co-Founder of Women in Identity,

Join our luncheon to network with successful women who are driving identity innovation into and throughout their companies. This luncheon will feature a panel discussion about some of the challenges and opportunities faced by women in IT today and how to address them. Panelists include Pam Dingle and Colette D'Alessandro from WomenInIDentity.org. Seats are limited.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 02:00 PM - 02:30 PM GMT

Okta: Q&A Panel - Practical Considerations When Implementing Cloud IAM and IDaaS

James Fletcher, Group Head of Information Security, Odeon Cinemas Group

Hosted by Sami Laine of Okta, leader in the Gartner Magic Quadrant for Access Management, this Q&A session will provide delegates with the opportunity to hear direct from Okta customers, how they selected and implemented their Cloud Identity Strategy. As well as discussing these real life examples of Cloud Identity in action, delegates will be able to put their own questions to the panel.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 02:00 PM - 02:30 PM GMT

Saviynt: Racing Ahead of the Curve — How to Leverage Saviynt's IGA for Business Transformation

Amit Saha, CEO, Saviynt Inc.

You want to stay ahead of compliance regulations, new types of identity, changing business models and emerging technology? Saviynt pioneers the way with our cloud-born solution and the largest cloud IGA data lake in existence—our Intelligent Identity Hub. Saviynt CEO, Amit Saha, and global customers Maersk and Wienerberger will discuss rapid transformation with Saviynt’s innovative platform.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 03:30 PM - 04:15 PM GMT

Omada: How to Approach the Migration From Legacy IAM to Next-Gen IGA as-a-Service?

Martin Kuhlmann, Lead Solution Consultant, Omada A/S

Many organizations started the IAM journey more than 15 years ago with the key goal to implement an automated user administration. Today those IAM systems are often difficult to maintain. They do not meet security standards or compliance requirements, and they are neither user-friendly nor future proof. What is the right strategy for a replacement of a legacy system, with low risk and effort?

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 12:40 PM - 01:00 PM GMT

Onfido: How Digital Identity Verification Can Support Hypergrowth

Neo-bank Revolut reported an average growth rate of 48,477% in the last three years. Driving this growth is international expansion. But such growth can pose challenges. Digital onboarding requires a scalable solution that balances international requirements, customer experience and risk exposure.

This session explores how working with Onfido helped Revlout overcome these challenges.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 01:45 PM - 02:30 PM GMT

Ask the Expert: Modern Authorization Solutions

Homan Farahmand, Sr Director Analyst, Gartner

Authorization architecture is constantly evolving as organizations digitize their assets and run more workload in hybrid-IT and/or multicloud environments. This is while automation technologies that orchestrate access to business and infrastructure services increasingly require a dynamic authorization decision making. In this session we discuss how ABAC can be applied to address these requirements.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 03:30 PM - 04:00 PM GMT

Radiant Logic: Creating a Foundation for IAM as a Business Enabler at Marriott

With over 3,700 properties worldwide, Marriott Intl is one of the world’s leading hoteliers. This session will discuss how they are using a Federated Identity & Directory Service to integrate and modernize their IAM infrastructure, enable business initiatives, minimize proliferation of PII, and mitigate risk.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 03:30 PM - 04:00 PM GMT

Radiant Logic: Creating a Foundation for IAM as a Business Enabler at Marriott

With over 3,700 properties worldwide, Marriott Intl is one of the world’s leading hoteliers. This session will discuss how they are using a Federated Identity & Directory Service to integrate and modernize their IAM infrastructure, enable business initiatives, minimize proliferation of PII, and mitigate risk.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 09:00 AM - 09:30 AM GMT

TrustBuilder: BYOA (Bring Your Own Authentication) in Practice @Allianz

Kurt Berghs, Sales Manager Benelux, TrustBuilder

Philippe Mermuys, Information Security Manager, Allianz Benelux

Whether you are an insurance broker, an end customer or an employee, insurance company Allianz Benelux offers secure and seamless access to information and applications through a strong authentication method of your own choice. TrustBuilder’s support for SSO, Federated Authentication and Consumer IAM proves invaluable in the digital transformation at Allianz Benelux.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 11:00 AM - 11:45 AM GMT

The Technical Evaluation Criteria for Access Management Solutions

Erik Wahlstrom, Sr Director Analyst, Gartner

Access management is an essential part of the identity landscape. It includes single sign-on, session management, authentication and authorization to both cloud and on-premises applications. This technical session presents the criteria to use when defining your requirement and making product decisions to ensure deployed solutions meet security, privacy, usability and integration demands.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 02:45 PM - 03:15 PM GMT

Creating Trust and Safety on the Internet

Jonathan Care, Sr Director Analyst, Gartner

The Internet, like any other society, is plagued with the kind of jerks who enjoy the electronic equivalent of writing on other people's walls with spraypaint, tearing their mailboxes off, or just sitting in the street blowing their car horns. Some people try to get real work done over the Internet, and others have sensitive or proprietary data they must protect." Successful e-business - whether retail, financial (or other) services, social platforms, sharing economy all make use of this untrustworthy medium.
What does trust and safety mean?
Where is it applicable?
How do we know where it is being applied?
What can we observe?
What can we measure? Since mulling this idea on client inquiries we have seen the industry start to gain traction around this idea in 2019. .
What does trust and safety mean?
Where is it applicable?
How do we know where it is being applied?
What can we observe? What can we measure?

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 04:30 PM - 05:00 PM GMT

Enabling the Customer Experience With Fraud Management

Akif Khan, Sr Director Analyst, Gartner

Consumers have unrelenting expectations for smooth and friction-free experiences when dealing with retailers and financial institutions. This is often at odds with the various antifraud mechanisms that security leaders have implemented. A new approach is required to reduce tension between CX and fraud management, and instead blend a spectrum of technologies to deliver the fluid experience that most customers want and deserve.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 09:00 AM - 09:30 AM GMT

Entrust Datacard: Cashplus — Fighting Off the Pirates With Stronger Authentication!

Richard Bastin, CTO, Cashplus

Rajan Barara, Global Senior Product Manager, Entrust Datacard

Financial services are prime targets for organized cybercriminals. This session highlights how a digital bank challenger successfully dealt with a sustained payment fraud attack, that reached new levels of sophistication and industrialization. The solution, migrating nearly 200,000 customers to Secure Customer Authentication for PSD2 compliance, ustilising soft and hard tokens for IAM.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 10:45 AM - 11:30 AM GMT

Ask the Expert: How Can You Validate Consumer Identity?

Akif Khan, Sr Director Analyst, Gartner

Carrying out identity proofing of consumers in B2C interactions remains a constant challenge, with uses cases ranging from account sign-up to meeting industry regulation. The pressure in digital channels to maintain a competitive, smooth CX during this process adds further complexity. Find out what options are available and how best they can be deployed for your business.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 12:00 PM - 12:30 PM GMT

HID Global: Integrating Digital Identification and Authentication — The Benefits for the Customers

OLIVIER THIRION DE BRIEL, Global solution marketing director, HID GLOBAL

The digital world is rapidly expanding, cybercrime continues to grow and regulations are becoming more stringent—all while end-users demand a frictionless user experience. Digital identity is the key and it becomes critical when balancing usability and security. We’ll discuss why organizations need a holistic solution to better protect customer digital identities and to customize services.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 01:45 PM - 02:15 PM GMT

The Evolution of Digital Identity in a B2C World

Jonathan Care, Sr Director Analyst, Gartner

Not all B2C interactions involve formal authentication of identity using credentials and tokens.
How has the concept of digital identity evolved? How do businesses today identify customers in digital interactions for the purposes of fraud detection, advertising and improving customer experience?
How can combinations of attributes (name, email, IP address, phone number), device telemetry, behavioral biometrics, public records data and verification of physical documents be combined to create digital identities with sufficient trust levels for use cases ranging from e-commerce to banking? Introducing the concept of the identity graph. Taking a Zachman approach this pitch will focus on the conceptual/logical aspects of identity, looking at how identity is used, how it is a multi faceted jewel, and how identity verification on a graph is two nodes measuring the quality of the interstices.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 02:30 PM - 03:15 PM GMT

Building a B2C Identity Proofing Strategy

Akif Khan, Sr Director Analyst, Gartner

Authenticating the identity of new users in the B2C environment is a significant business challenge.A range of techniques are available - checking against credit data; looking up in public records; checking social media history; authenticating government ID plus selfie. What vendors and capabilities exist in this space, and how can they be weaved together to give an assurance of identity appropriate to different use cases?

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 12:40 PM - 01:00 PM GMT

Auth0: Monolith to Microservices - Identity Helps Dunelm With Digital Transformation

Antony Sohal, Head of Data Platforms, Dunelm

Digital transformation doesn’t always go to your original plan. But if you’re flexible and embrace new challenges, you can create value for your employees, customers, and partners. Join Antony Sohal, Dunelm Head of Data Platforms, as he discusses Dunelm’s strategy for transformation in the midst of the UK retail crisis – and how a new consumer website led them to a universal approach to identity.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 01:35 PM - 01:55 PM GMT

Silverfort: Achieving Continuous Adaptive Risk-Based Authentication without Agents or Proxies

Hed Kovetz, CEO & Co-Founder, Silverfort

With countless devices connected to each other without clear perimeters, verifying user identities and controlling access to sensitive resources becomes more important than ever, but also far more difficult to achieve.
Learn how customers use Silverfort’s agentless authentication platform to enable continuous risk assessment and enforce adaptive authentication policies – without agents or proxies.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 03:30 PM - 04:00 PM GMT

Radiant Logic: Creating a Foundation for IAM as a Business Enabler at Marriott

With over 3,700 properties worldwide, Marriott Intl is one of the world’s leading hoteliers. This session will discuss how they are using a Federated Identity & Directory Service to integrate and modernize their IAM infrastructure, enable business initiatives, minimize proliferation of PII, and mitigate risk.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 05:15 PM - 06:00 PM GMT

Keynote: Insights From the IAM Magic Quadrants

Felix Gaehtgens, VP Analyst, Gartner

Henrique Teixeira, Sr Director Analyst, Gartner

Abhyuday Data, Sr Principal Analyst, Gartner

Through a selection of relevant Gartner insights and complementary methodologies, Gartner analysts will discuss players and capabilities in the identity governance and administration and access management Magic Quadrants, and will provide insight into latest updates in the privileged access management market.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 09:45 AM - 10:30 AM GMT

The Future of Device Management in the Digital Workplace

Rob Smith, Sr Director Analyst, Gartner

This session will cover how device management has evolved from separate tools to a new single unified endpoint management (UEM) console. It will examine the challenges faced by newly formed end-user computing groups from issues such as BYOD and the ever exploding diversity of devices in the digital workplace.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 12:40 PM - 01:00 PM GMT

Auth0: Monolith to Microservices - Identity Helps Dunelm With Digital Transformation

Antony Sohal, Head of Data Platforms, Dunelm

Digital transformation doesn’t always go to your original plan. But if you’re flexible and embrace new challenges, you can create value for your employees, customers, and partners. Join Antony Sohal, Dunelm Head of Data Platforms, as he discusses Dunelm’s strategy for transformation in the midst of the UK retail crisis – and how a new consumer website led them to a universal approach to identity.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 02:00 PM - 02:30 PM GMT

Okta: Q&A Panel - Practical Considerations When Implementing Cloud IAM and IDaaS

James Fletcher, Group Head of Information Security, Odeon Cinemas Group

Hosted by Sami Laine of Okta, leader in the Gartner Magic Quadrant for Access Management, this Q&A session will provide delegates with the opportunity to hear direct from Okta customers, how they selected and implemented their Cloud Identity Strategy. As well as discussing these real life examples of Cloud Identity in action, delegates will be able to put their own questions to the panel.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 02:00 PM - 02:30 PM GMT

Omada: Moving Services to the Cloud — Key Take-aways from the IGA Project at Praktikertjänst

Praktikertjänst is an organization that provides IT services to most of Sweden's health care practitioners, physiotherapists, dentist, and hospitals. To be able to meet today’s and future demands from the business, Praktikertjänst from Sweden has launched a digitalization program where the IGA platform plays an essential role in moving its many services to the cloud efficiently and securely.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 03:30 PM - 04:15 PM GMT

Omada: How to Approach the Migration From Legacy IAM to Next-Gen IGA as-a-Service?

Martin Kuhlmann, Lead Solution Consultant, Omada A/S

Many organizations started the IAM journey more than 15 years ago with the key goal to implement an automated user administration. Today those IAM systems are often difficult to maintain. They do not meet security standards or compliance requirements, and they are neither user-friendly nor future proof. What is the right strategy for a replacement of a legacy system, with low risk and effort?

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 09:00 AM - 09:30 AM GMT

IBM: Smart Identity for a Hybrid Multicloud World

Jason A. Keenaghan, Director, Offering Management, IAM & Fra, IBM

Bert Vanspauwen, European Competence Leader IAM, IBM

Identity should be smarter and smart identity adapts.Learn how multicloud identity and access management can securely connect every user,API,and device to every application.Identity Analytics manage identities and behavior of privileged users.Learn about the disruptive technologies and comprehensive services that make identity smart; Adaptive Access, Identity Analytics, and Decentralized Identity.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 09:00 AM - 09:30 AM GMT

OneLogin: Identity at the Core of Security Automation

Stuart Sharp, VP of Solution Engineering, OneLogin

Harnessing ML and AI to Reduce Risk & Increase Compliance
With the rise of remote working & BYOD, the maxim “Identity is the New Perimeter” is now firmly established. Verifying identity is inexorably linked to end user behaviour, & reducing risk therefore involves managing that behaviour. Security professionals have to manage competing demands of an increasingly diverse population of end users

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 09:00 AM - 09:30 AM GMT

Thales: Extending Passwordless Authentication with Passwordless Secure Single-Sign On

Francois Lasnier, VP- Identity and Access Management, Thales

Passwordless authentication can be implemented in many ways ensuring a seamless hassle-free login experience. Extending the value of passwordless frameworks to distributed/hybrid cloud environments offers benefits and optimizes security and convenience. Combining different assurance levels at the access point and continuous in-app detection mechanisms form a foundation for secure passwordless SSO

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 09:00 AM - 09:45 AM GMT

iC Consult: Globalise IAM with IDaaS — All About Challenges, Customer Insights & Best Practices

Heiko Klarl, CMO, iC Consult Group GmbH

Andre Priebe, Chief Technology Officer, iC Consult Group

IAM is crucial for managing employees, partners, customers, things and APIs in a secure and reliable way. Distributed IT systems and regulations in the US, EU, China and Russia increase the complexity of doing so.

We will outline:
- Challenges for a globally distributed IAM
- How DevOps and cloud services support IAM projects
- Success factors for IAM deployment and operations in a global scale

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 10:35 AM - 10:55 AM GMT

Keyless Technologies: From Passwordless Authentication to The Future of Identity

Fabian Eberle, Co-Founder, Keyless Technologies

Passwordless is just the beginning.

Pioneering zero-knowledge biometrics, Keyless is eliminating shared secrets, while unifying user experience across all channels, platforms and devices.

There is nothing to remember, steal, lose, type or forget. Keyless enables anyone to seamlessly access any digital service from any device, while keeping personal credentials safe, private and under control.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 11:00 AM - 11:45 AM GMT

Identity Analytics, Machine Learning and AI Are Changing the Game

Mary Ruddy, VP Analyst, Gartner

Our digital environment has become too complex for humans to control system access without the help of smarter analytics. Advancements in identity analytics can help simplify and improve multiple identity and access management activities. Identity analytics, including machine learning, can process vast amounts of data to detect and respond to risks in a more automated and timely fashion. In this session, we will discuss how machine learning can be applied to many IAM use cases .

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 12:00 PM - 12:30 PM GMT

HID Global: Integrating Digital Identification and Authentication — The Benefits for the Customers

OLIVIER THIRION DE BRIEL, Global solution marketing director, HID GLOBAL

The digital world is rapidly expanding, cybercrime continues to grow and regulations are becoming more stringent—all while end-users demand a frictionless user experience. Digital identity is the key and it becomes critical when balancing usability and security. We’ll discuss why organizations need a holistic solution to better protect customer digital identities and to customize services.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 12:40 PM - 01:00 PM GMT

Onfido: How Digital Identity Verification Can Support Hypergrowth

Neo-bank Revolut reported an average growth rate of 48,477% in the last three years. Driving this growth is international expansion. But such growth can pose challenges. Digital onboarding requires a scalable solution that balances international requirements, customer experience and risk exposure.

This session explores how working with Onfido helped Revlout overcome these challenges.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 08:00 AM - 08:45 AM GMT

Tutorial: IAM Leaders Guide to IGA

Henrique Teixeira, Sr Director Analyst, Gartner

An introduction to identity governance and administration. What value does IGA bring today? What are the main challenges? What is the outlook for the future?

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 10:05 AM - 10:25 AM GMT

Thycotic: PAM Uncovered - Your Privileged Access Management Journey Starts Here

Joseph Carson, Chief Security Scientist | Advisory CISO, Thycotic

With so many high-profile breaches achieved through compromising passwords on privileged accounts, Privileged Access Management is now a top priority. But where do you start and what is the path to success?
This session will:
Share best practices for evaluating your current PAM solution, as well as real-world use cases.
Share best practices to discover and manage credentials across your network.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 10:30 AM - 11:15 AM GMT

Ask the Expert: Preparing for Future IGA Technologies

Homan Farahmand, Sr Director Analyst, Gartner

IGA requirements are changing rapidly. Organizations are often mandated to address competing requirements such as increasing IGA coverage while reducing the cost and enhancing user experience. There are also emerging requirements in the cloud for dynamic identity governance and user management. In this session, we discuss the art of possible to handle these requirements in short- and long-term.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 10:45 AM - 11:30 AM GMT

Guidance and Best Practices for Successful IGA Deployments

Paul Mezzera, Sr Director Analyst, Gartner

IGA platforms are complex and have been traditionally difficult to implement, yet the demand is increasing both for new deployments and reimplementations. Organizations can increase their likelihood of success by following a more structured approach to deployment and ongoing management of their IGA platforms. This session provides guidance on, best practices, and common pitfalls to be avoided when selecting and implementing IGA platforms.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 11:45 AM - 12:30 PM GMT

Mastering the Art of the Political Discussion

Security and risk management leaders often find themselves in political discussions, which can be high stakes, and challenging to successfully navigate. This session helps you know when you are in a political conversation, and provides practical techniques for managing the potential conflict and reaching a successful outcome.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 02:00 PM - 02:30 PM GMT

Omada: Moving Services to the Cloud — Key Take-aways from the IGA Project at Praktikertjänst

Praktikertjänst is an organization that provides IT services to most of Sweden's health care practitioners, physiotherapists, dentist, and hospitals. To be able to meet today’s and future demands from the business, Praktikertjänst from Sweden has launched a digitalization program where the IGA platform plays an essential role in moving its many services to the cloud efficiently and securely.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 02:00 PM - 02:30 PM GMT

Saviynt: Racing Ahead of the Curve — How to Leverage Saviynt's IGA for Business Transformation

Amit Saha, CEO, Saviynt Inc.

You want to stay ahead of compliance regulations, new types of identity, changing business models and emerging technology? Saviynt pioneers the way with our cloud-born solution and the largest cloud IGA data lake in existence—our Intelligent Identity Hub. Saviynt CEO, Amit Saha, and global customers Maersk and Wienerberger will discuss rapid transformation with Saviynt’s innovative platform.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 02:00 PM - 02:30 PM GMT

One Identity: Safeguard your RPA: Real-world Experience Securing Robotic Processing Automation

PRASANNA KUMAR BALLEPALLI, IT Architect, PROSEGUR

Alan Radford, Field Strategist, One Identity

Devices, applications and even robots can be the non-human ‘user’ behind privileged accounts. Attend this panel-discussion session to hear from systems integrators and leaders in the robotic process automation (RPA) market about how you can safely leverage the efficiency of automated services and RPA with privileged accounts.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 03:30 PM - 04:00 PM GMT

ForgeRock: A Winning Strategy - Leverage Digital Identity and AI to Transform and Secure Business

Peter Barker, Executive Vice President & Chief Product Officer, ForgeRock

Most organizations struggle with competing priorities of security, compliance, user experience and cost, while managing the pain of legacy, disparate systems. Now you can take a strategic, modern approach to Digital Identity, leveraging the power of AI, to improve numerous aspects of your business. Looking to drive digital transformation across your enterprise? Join this ForgeRock chat to see how.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 03:30 PM - 04:00 PM GMT

SailPoint: Royal FloraHolland’s Cloud Identity Journey with SailPoint

Peter Waleboer, Business Service Manager, Royal FloraHolland

Marc de Koos, IAM Program Manager, Royal FloraHolland

Organizations of all sizes are leveraging the flexibility of the cloud to deliver identity programs. Marc de Koos, IAM Program Manager will share Royal FloraHolland’s cloud-first strategy for building a flexible and scalable identity program to enable their business and combat risk.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 03:30 PM - 04:00 PM GMT

BeyondTrust: PAM: The Solid Foundation of Your Identity Strategy

Karl Lankford, Director, Solutions Engineering, BeyondTrust

Extended enterprise architectures and the proliferation of privileged accounts present an ever growing security challenge.

This session will discuss today’s complex privilege environments and how a PAM solution mitigates these, providing a solid foundation for your identity strategy. Learn top tips on how to successfully implement a PAM solution as part of your identity governance programme.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 03:30 PM - 04:15 PM GMT

Omada: How to Approach the Migration From Legacy IAM to Next-Gen IGA as-a-Service?

Martin Kuhlmann, Lead Solution Consultant, Omada A/S

Many organizations started the IAM journey more than 15 years ago with the key goal to implement an automated user administration. Today those IAM systems are often difficult to maintain. They do not meet security standards or compliance requirements, and they are neither user-friendly nor future proof. What is the right strategy for a replacement of a legacy system, with low risk and effort?

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 04:15 PM - 05:45 PM GMT

Workshop: Applying the Four Phase IGA Guidance Framework

Paul Mezzera, Sr Director Analyst, Gartner

This workshop provides an opportunity for participants to learn about IGA program best practices for planning, expanding, and managing IGA deployments. Attendees will be presented with key information related to each phase of the IGA framework and handouts with exercises to apply the information along with other peers using Gartner’s IGA guidance framework.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 08:00 AM - 08:45 AM GMT

Modernize Your IGA Solution Architecture

Paul Mezzera, Sr Director Analyst, Gartner

Identity governance and administration (IGA) systems have existed for several decades, but many IGA deployments are struggling to keep pace with new digital business demands. Organizations need to evaluate and adopt next-generation technologies that support cloud, mobile, DevOps, AI, analytics, and cybersecurity initiatives. In this session, Gartner will explore IGA technology trends and modern IGA architectures.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 09:45 AM - 10:30 AM GMT

Identity Multiverse: See Your Role Management Process in 3D

Henrique Teixeira, Sr Director Analyst, Gartner

Enterprise role management is not only about the tools. Learn how to combine a traditional bi-dimensional enterprise role management framework with three parallel universes of identities, accounts and entitlements to unlock a tridimensional approach for role management. A combination of the hats and buckets approach with the three planes of identities.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 10:45 AM - 12:15 PM GMT

Workshop: Selecting the Right IGA Solution

Paul Mezzera, Sr Director Analyst, Gartner

The digital transformation and the cloud are placing additional demands on IGA solutions for managing identity and access rights. This workshop will review key IGA concepts and provide an opportunity for participants to review and discuss the core features in the IGA Solution Criteria guidelines to better understand and prioritize the essential capabilities needed to evaluate an IGA solution.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 12:00 PM - 12:30 PM GMT

SSH: Innovating Access to Critical, Hybrid IT Infrastructures

Markku Rossi, CTO, SSH COMMUNICATIONS SECURITY - FINLAND

Markku discusses why forgetting always-on privileges mitigates risks and saves time. Learn how to:

● federate identities & their authorizations with ease

● automate privileged access management

● auto-discover global cloud inventories

● provide just-in-time access

● deploy the solution fast & scalably**

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 01:45 PM - 02:15 PM GMT

Demystify Analytics and Enable Governance on the Fly

Henrique Teixeira, Sr Director Analyst, Gartner

Use analytics to optimize IGA deployments by applying continuous monitoring capabilities to add real-time insight and risk-mitigation capabilities to IGA initiatives. IGA deployments need to shift from administering compliance to a real-time identity and access risk management dashboard.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 02:30 PM - 03:15 PM GMT

Ask the Expert: Establish an Agile Model for IGA App Onboarding

Felix Gaehtgens, VP Analyst, Gartner

Application onboarding continues to be a challenging activity of IGA projects. It can be time consuming and expensive. How to leverage an agile continuous delivery approach for creating a best-practices-driven factory model for integrating new apps to your IGA infrastructure. How small prototyping and frequent improvement sprints can help you achieve continuous value when onboarding apps?

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 04:30 PM - 05:00 PM GMT

Building Modern Identity Into Your Apps (TechDemo)

Erik Wahlstrom, Sr Director Analyst, Gartner

There are many ways modern identity protocols such as OAuth 2.0 and OpenID Connect can be built into mobile applications, services and SPAs (single-page applications). In this TechDemo we will look how common best practices for integrating modern identity protocols are built into applications and services.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 11:00 AM - 11:45 AM GMT

The Technical Evaluation Criteria for Access Management Solutions

Erik Wahlstrom, Sr Director Analyst, Gartner

Access management is an essential part of the identity landscape. It includes single sign-on, session management, authentication and authorization to both cloud and on-premises applications. This technical session presents the criteria to use when defining your requirement and making product decisions to ensure deployed solutions meet security, privacy, usability and integration demands.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 11:00 AM - 11:45 AM GMT

Guidance for Decentralized Identity Adoption

Homan Farahmand, Sr Director Analyst, Gartner

In this session, we provide a quick overview of decentralized identity architecture, including key components such as identity networks and blockchain, services, protocols, and agents. Then we provide example use cases and solutions for B2E (workforce), B2B (business entities), and B2C (consumers) scenarios. We conclude by discussing lessons learned to adopt decentralized identity based on our research.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 10:35 AM - 10:55 AM GMT

Keyless Technologies: From Passwordless Authentication to The Future of Identity

Fabian Eberle, Co-Founder, Keyless Technologies

Passwordless is just the beginning.

Pioneering zero-knowledge biometrics, Keyless is eliminating shared secrets, while unifying user experience across all channels, platforms and devices.

There is nothing to remember, steal, lose, type or forget. Keyless enables anyone to seamlessly access any digital service from any device, while keeping personal credentials safe, private and under control.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 02:30 PM - 03:15 PM GMT

Building a B2C Identity Proofing Strategy

Akif Khan, Sr Director Analyst, Gartner

Authenticating the identity of new users in the B2C environment is a significant business challenge.A range of techniques are available - checking against credit data; looking up in public records; checking social media history; authenticating government ID plus selfie. What vendors and capabilities exist in this space, and how can they be weaved together to give an assurance of identity appropriate to different use cases?

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 04:30 PM - 05:00 PM GMT

Model Your Risk Assessment on the Digital Business Runway

Jie Zhang, VP Analyst, Gartner

Digital transformation relies heavily on new technology adoptions. While organizations innovate and create values through digital business, a set of new risks emerging. These emerging risks require security and risk leaders' special attention. This session equips you a model to assess the emerging risks.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 08:00 AM - 08:45 AM GMT

Top Challenges Security and Risk Leaders Face in China

Jie Zhang, VP Analyst, Gartner

As the second largest economy, China continues to attract businesses to enter the market and expand as these businesses grow. But, security and risk leaders face a set of unique challenges. How to understand these challenges and apply best practices will enable CISOs and risk leaders to assure business successes.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 10:45 AM - 11:30 AM GMT

Passwordless Authentication Is Already Here, It's Just Unevenly Distributed

Ant Allan, VP Analyst, Gartner

There are many different ways to eliminate passwords to significantly improve UX/CX, enhance security, or both, but technology constraints make a universal approach elusive. IAM must take pains to craft a cohesive strategy across key use cases.
- What are the key drivers for passwordless authentication?
- What options are available and what value do they provide?
- Is it possible to completely eliminate passwords – and if it is, is it always desirable?

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 12:40 PM - 01:00 PM GMT

Auth0: Monolith to Microservices - Identity Helps Dunelm With Digital Transformation

Antony Sohal, Head of Data Platforms, Dunelm

Digital transformation doesn’t always go to your original plan. But if you’re flexible and embrace new challenges, you can create value for your employees, customers, and partners. Join Antony Sohal, Dunelm Head of Data Platforms, as he discusses Dunelm’s strategy for transformation in the midst of the UK retail crisis – and how a new consumer website led them to a universal approach to identity.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 01:35 PM - 01:55 PM GMT

Silverfort: Achieving Continuous Adaptive Risk-Based Authentication without Agents or Proxies

Hed Kovetz, CEO & Co-Founder, Silverfort

With countless devices connected to each other without clear perimeters, verifying user identities and controlling access to sensitive resources becomes more important than ever, but also far more difficult to achieve.
Learn how customers use Silverfort’s agentless authentication platform to enable continuous risk assessment and enforce adaptive authentication policies – without agents or proxies.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 03:30 PM - 04:00 PM GMT

ForgeRock: A Winning Strategy - Leverage Digital Identity and AI to Transform and Secure Business

Peter Barker, Executive Vice President & Chief Product Officer, ForgeRock

Most organizations struggle with competing priorities of security, compliance, user experience and cost, while managing the pain of legacy, disparate systems. Now you can take a strategic, modern approach to Digital Identity, leveraging the power of AI, to improve numerous aspects of your business. Looking to drive digital transformation across your enterprise? Join this ForgeRock chat to see how.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 08:00 AM - 08:45 AM GMT

To MFA for Office 365 ... and Beyond!

Ant Allan, VP Analyst, Gartner

What’s the best option for MFA for O365? This is a recurring question — typically (sadly) after an O365 phishing attack or actual breach. But it’s often a lead-in to a broader discussion about the choice of MFA to support broader SaaS and legacy use cases.

● What are the best MFA and access management approaches for SaaS and legacy use cases?

● Is it best to stick with Microsoft or choose a third-party tool?

● Why might a discrete authentication vendor be indicated?

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 09:00 AM - 09:30 AM GMT

Thales: Extending Passwordless Authentication with Passwordless Secure Single-Sign On

Francois Lasnier, VP- Identity and Access Management, Thales

Passwordless authentication can be implemented in many ways ensuring a seamless hassle-free login experience. Extending the value of passwordless frameworks to distributed/hybrid cloud environments offers benefits and optimizes security and convenience. Combining different assurance levels at the access point and continuous in-app detection mechanisms form a foundation for secure passwordless SSO

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 10:35 AM - 10:55 AM GMT

Keyless Technologies: From Passwordless Authentication to The Future of Identity

Fabian Eberle, Co-Founder, Keyless Technologies

Passwordless is just the beginning.

Pioneering zero-knowledge biometrics, Keyless is eliminating shared secrets, while unifying user experience across all channels, platforms and devices.

There is nothing to remember, steal, lose, type or forget. Keyless enables anyone to seamlessly access any digital service from any device, while keeping personal credentials safe, private and under control.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 12:00 PM - 12:30 PM GMT

MobileIron: Your Path to Zero Passwords

Simon Biddiscombe, CEO, Mobileiron

Passwords continue to be the number one cause of data breaches. Join Simon Biddiscombe, CEO, as he discusses a strategy to eliminate passwords using the world’s most ubiquitous product – the mobile phone. Learn how to implement a “never trust, always verify” mobile-centric zero trust security approach – a must for the modern enterprise.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 12:00 PM - 12:30 PM GMT

HID Global: Integrating Digital Identification and Authentication — The Benefits for the Customers

OLIVIER THIRION DE BRIEL, Global solution marketing director, HID GLOBAL

The digital world is rapidly expanding, cybercrime continues to grow and regulations are becoming more stringent—all while end-users demand a frictionless user experience. Digital identity is the key and it becomes critical when balancing usability and security. We’ll discuss why organizations need a holistic solution to better protect customer digital identities and to customize services.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 12:00 PM - 12:30 PM GMT

Duo Security: Zero Trust - The Key to IAM Success

Richard Archdeacon, Advisory CISO, Duo

Nearly every section of the security industry is talking about Zero Trust. The concepts are readily understood. But the same questions are often asked; where and do I start and what are the issues I will face?

We'll provide a practical toolkit to help you begin your Zero Trust journey beginning with Multifactor Authentication and moving to device identification and adaptive access.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 02:30 PM - 03:15 PM GMT

Me, Myself and I: Is Biometric Authentication Ready for Prime Time?

Ant Allan, VP Analyst, Gartner

Early promises of easy, secure and universal authentication through unique personal traits have been unfulfilled for decades, but in the past 10 years we have seen a surge in interest and adoption.

● How is biometric authentication differ from other orthodox methods?

● Where is biometric authentication adding most value today?

● Are biometric methods the way forward for every enterprise?

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 10:05 AM - 10:25 AM GMT

Thycotic: PAM Uncovered - Your Privileged Access Management Journey Starts Here

Joseph Carson, Chief Security Scientist | Advisory CISO, Thycotic

With so many high-profile breaches achieved through compromising passwords on privileged accounts, Privileged Access Management is now a top priority. But where do you start and what is the path to success?
This session will:
Share best practices for evaluating your current PAM solution, as well as real-world use cases.
Share best practices to discover and manage credentials across your network.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 12:00 PM - 12:30 PM GMT

MobileIron: Your Path to Zero Passwords

Simon Biddiscombe, CEO, Mobileiron

Passwords continue to be the number one cause of data breaches. Join Simon Biddiscombe, CEO, as he discusses a strategy to eliminate passwords using the world’s most ubiquitous product – the mobile phone. Learn how to implement a “never trust, always verify” mobile-centric zero trust security approach – a must for the modern enterprise.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 01:45 PM - 03:15 PM GMT

Workshop: IT Score for Identity and Access Management

Abhyuday Data, Sr Principal Analyst, Gartner

Maturing competency levels require stakeholder's collaboration to identify the optimal alignment with IT and business goals and requirements. This workshop will help IAM leaders learn how to use Gartner's new IT Score Survey and Tool to facilitate for developing maturity roadmaps and action plans.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 02:00 PM - 02:30 PM GMT

Omada: Moving Services to the Cloud — Key Take-aways from the IGA Project at Praktikertjänst

Praktikertjänst is an organization that provides IT services to most of Sweden's health care practitioners, physiotherapists, dentist, and hospitals. To be able to meet today’s and future demands from the business, Praktikertjänst from Sweden has launched a digitalization program where the IGA platform plays an essential role in moving its many services to the cloud efficiently and securely.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 02:00 PM - 02:30 PM GMT

One Identity: Safeguard your RPA: Real-world Experience Securing Robotic Processing Automation

PRASANNA KUMAR BALLEPALLI, IT Architect, PROSEGUR

Alan Radford, Field Strategist, One Identity

Devices, applications and even robots can be the non-human ‘user’ behind privileged accounts. Attend this panel-discussion session to hear from systems integrators and leaders in the robotic process automation (RPA) market about how you can safely leverage the efficiency of automated services and RPA with privileged accounts.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 02:45 PM - 03:15 PM GMT

Lead the Way With Agile for IAM Program Initiatives

David Collinson, Sr Director Analyst, Gartner

How can PAM, AM, IGA and Authentication initiatives benefit from an Agile approach? What are the areas that most lend themselves to Agile, and what are things to be aware of when adopting Agile at a departmental level?

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 03:30 PM - 04:00 PM GMT

SailPoint: Royal FloraHolland’s Cloud Identity Journey with SailPoint

Peter Waleboer, Business Service Manager, Royal FloraHolland

Marc de Koos, IAM Program Manager, Royal FloraHolland

Organizations of all sizes are leveraging the flexibility of the cloud to deliver identity programs. Marc de Koos, IAM Program Manager will share Royal FloraHolland’s cloud-first strategy for building a flexible and scalable identity program to enable their business and combat risk.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 03:30 PM - 04:00 PM GMT

BeyondTrust: PAM: The Solid Foundation of Your Identity Strategy

Karl Lankford, Director, Solutions Engineering, BeyondTrust

Extended enterprise architectures and the proliferation of privileged accounts present an ever growing security challenge.

This session will discuss today’s complex privilege environments and how a PAM solution mitigates these, providing a solid foundation for your identity strategy. Learn top tips on how to successfully implement a PAM solution as part of your identity governance programme.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 04:15 PM - 05:00 PM GMT

Ask the Expert: IAM Program Management

Kevin Kampman, Sr Director Analyst, Gartner

In many organizations, IAM functions are distributed between information security, human resources and other areas, with little coordination, recognition or dedicated funding. In this session, you'll learn how to coordinate these elements and bring them the level of attention they require to contribute to compliance, security, process management and new initiatives in your organization.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 09:00 AM - 09:30 AM GMT

Entrust Datacard: Cashplus — Fighting Off the Pirates With Stronger Authentication!

Richard Bastin, CTO, Cashplus

Rajan Barara, Global Senior Product Manager, Entrust Datacard

Financial services are prime targets for organized cybercriminals. This session highlights how a digital bank challenger successfully dealt with a sustained payment fraud attack, that reached new levels of sophistication and industrialization. The solution, migrating nearly 200,000 customers to Secure Customer Authentication for PSD2 compliance, ustilising soft and hard tokens for IAM.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 02:30 PM - 03:15 PM GMT

Evolving Maturity Models: The New IT Score for IAM

Kevin Kampman, Sr Director Analyst, Gartner

As IAM characteristics keep pace with digital initiatives, so too must the IAM program adapt to change. In this session, learn about Gartner's new IT Score maturity model and how this will help you to organize and align with changes in your business and industry.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 10:05 AM - 10:25 AM GMT

Thycotic: PAM Uncovered - Your Privileged Access Management Journey Starts Here

Joseph Carson, Chief Security Scientist | Advisory CISO, Thycotic

With so many high-profile breaches achieved through compromising passwords on privileged accounts, Privileged Access Management is now a top priority. But where do you start and what is the path to success?
This session will:
Share best practices for evaluating your current PAM solution, as well as real-world use cases.
Share best practices to discover and manage credentials across your network.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 11:45 AM - 12:30 PM GMT

IAM Leaders Guide to PAM

Felix Gaehtgens, VP Analyst, Gartner

An introduction for privileged access management. What value does PAM bring today to reduce your security risk? What do you need to know about PAM to build an outlook for the future? AM vs. IGA vs. PAM. Trending questions about PAM.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 01:35 PM - 01:55 PM GMT

Silverfort: Achieving Continuous Adaptive Risk-Based Authentication without Agents or Proxies

Hed Kovetz, CEO & Co-Founder, Silverfort

With countless devices connected to each other without clear perimeters, verifying user identities and controlling access to sensitive resources becomes more important than ever, but also far more difficult to achieve.
Learn how customers use Silverfort’s agentless authentication platform to enable continuous risk assessment and enforce adaptive authentication policies – without agents or proxies.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 02:00 PM - 02:30 PM GMT

CyberArk: Retailer’s Journey to Achieve Maximum Protection for Privileged Access

Punita Arora, Technical Business Analyst, Sainsburys

Richard Firth, Senior Delivery Manager, Sainsburys

To address evolving threats and align security controls to digital transformation efforts, leading retailer Sainsbury's Group scaled its PAM program across business functions. By embracing a zero-trust approach and applying the principle of least privilege, they proactively reduced risk while enabling the rapid deployment of new services. We'll explore lessons learned and success factors.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 02:00 PM - 02:30 PM GMT

One Identity: Safeguard your RPA: Real-world Experience Securing Robotic Processing Automation

PRASANNA KUMAR BALLEPALLI, IT Architect, PROSEGUR

Alan Radford, Field Strategist, One Identity

Devices, applications and even robots can be the non-human ‘user’ behind privileged accounts. Attend this panel-discussion session to hear from systems integrators and leaders in the robotic process automation (RPA) market about how you can safely leverage the efficiency of automated services and RPA with privileged accounts.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 03:30 PM - 04:00 PM GMT

BeyondTrust: PAM: The Solid Foundation of Your Identity Strategy

Karl Lankford, Director, Solutions Engineering, BeyondTrust

Extended enterprise architectures and the proliferation of privileged accounts present an ever growing security challenge.

This session will discuss today’s complex privilege environments and how a PAM solution mitigates these, providing a solid foundation for your identity strategy. Learn top tips on how to successfully implement a PAM solution as part of your identity governance programme.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 08:00 AM - 08:45 AM GMT

Evaluation Criteria for PAM Requirements and Vendor Offerings

Homan Farahmand, Sr Director Analyst, Gartner

PAM is an essential, but complex, IAM discipline. It includes privileged credential management, session management (human) and services access management (nonhuman). It also includes privileged elevation and delegation for endpoints, governance, automation, audit and analytics capabilities. This session presents evaluation criteria to use when defining your requirement and making product decisions.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 09:00 AM - 09:30 AM GMT

IBM: Smart Identity for a Hybrid Multicloud World

Jason A. Keenaghan, Director, Offering Management, IAM & Fra, IBM

Bert Vanspauwen, European Competence Leader IAM, IBM

Identity should be smarter and smart identity adapts.Learn how multicloud identity and access management can securely connect every user,API,and device to every application.Identity Analytics manage identities and behavior of privileged users.Learn about the disruptive technologies and comprehensive services that make identity smart; Adaptive Access, Identity Analytics, and Decentralized Identity.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 09:45 AM - 10:30 AM GMT

Managing a Successful PAM Program

Felix Gaehtgens, VP Analyst, Gartner

Success with a PAM program is a mixed bag for most companies, finding PAM a challenging implementation. Before you even purchase a tool, fundamental tasks must be taken on to ensure success later in the process. We will talk about what those basic building blocks are for finding success in managing your PAM risk later on.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 11:00 AM - 11:45 AM GMT

Leverage Just in Time Approaches to Improve PAM

Michael Kelley, Sr Director Analyst, Gartner

While PAM is a mature capability, new approaches for a just in time (JIT) approach hold promise to both increase security around privileged access and simplify the way privileged access is controlled and used.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 12:00 PM - 12:30 PM GMT

SSH: Innovating Access to Critical, Hybrid IT Infrastructures

Markku Rossi, CTO, SSH COMMUNICATIONS SECURITY - FINLAND

Markku discusses why forgetting always-on privileges mitigates risks and saves time. Learn how to:

● federate identities & their authorizations with ease

● automate privileged access management

● auto-discover global cloud inventories

● provide just-in-time access

● deploy the solution fast & scalably**

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 02:30 PM - 03:15 PM GMT

Ask the Expert: Privileged Access Management

Michael Kelley, Sr Director Analyst, Gartner

This session is a discussion about privileged access management (PAM) technologies, implementations, new approaches, and strategies needed to make your PAM efforts successful. Attendees should come prepared to ask questions.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 11:45 AM - 12:30 PM GMT

Mastering the Art of the Political Discussion

Security and risk management leaders often find themselves in political discussions, which can be high stakes, and challenging to successfully navigate. This session helps you know when you are in a political conversation, and provides practical techniques for managing the potential conflict and reaching a successful outcome.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 01:45 PM - 02:30 PM GMT

Ask the Expert: Modern Authorization Solutions

Homan Farahmand, Sr Director Analyst, Gartner

Authorization architecture is constantly evolving as organizations digitize their assets and run more workload in hybrid-IT and/or multicloud environments. This is while automation technologies that orchestrate access to business and infrastructure services increasingly require a dynamic authorization decision making. In this session we discuss how ABAC can be applied to address these requirements.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 09:00 AM - 09:30 AM GMT

OneLogin: Identity at the Core of Security Automation

Stuart Sharp, VP of Solution Engineering, OneLogin

Harnessing ML and AI to Reduce Risk & Increase Compliance
With the rise of remote working & BYOD, the maxim “Identity is the New Perimeter” is now firmly established. Verifying identity is inexorably linked to end user behaviour, & reducing risk therefore involves managing that behaviour. Security professionals have to manage competing demands of an increasingly diverse population of end users

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 09:00 AM - 09:30 AM GMT

TrustBuilder: BYOA (Bring Your Own Authentication) in Practice @Allianz

Kurt Berghs, Sales Manager Benelux, TrustBuilder

Philippe Mermuys, Information Security Manager, Allianz Benelux

Whether you are an insurance broker, an end customer or an employee, insurance company Allianz Benelux offers secure and seamless access to information and applications through a strong authentication method of your own choice. TrustBuilder’s support for SSO, Federated Authentication and Consumer IAM proves invaluable in the digital transformation at Allianz Benelux.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 12:00 PM - 12:30 PM GMT

MobileIron: Your Path to Zero Passwords

Simon Biddiscombe, CEO, Mobileiron

Passwords continue to be the number one cause of data breaches. Join Simon Biddiscombe, CEO, as he discusses a strategy to eliminate passwords using the world’s most ubiquitous product – the mobile phone. Learn how to implement a “never trust, always verify” mobile-centric zero trust security approach – a must for the modern enterprise.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 12:00 PM - 12:30 PM GMT

Duo Security: Zero Trust - The Key to IAM Success

Richard Archdeacon, Advisory CISO, Duo

Nearly every section of the security industry is talking about Zero Trust. The concepts are readily understood. But the same questions are often asked; where and do I start and what are the issues I will face?

We'll provide a practical toolkit to help you begin your Zero Trust journey beginning with Multifactor Authentication and moving to device identification and adaptive access.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.
Registered Attendee
Build Your Agenda

Want to stay informed?

Get conference email updates.
Contact Information

All fields are required.

  • Step 2 of 2