UPCOMING EVENTS
Identity Access Management (IAM) – Reducing Risk and Giving Better CX to Users: Chicago (Rosemont/O’Hare), Illinois
July 10, 2025
9:00am-5:00pm
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois
Overview
Identity continues to be foundational to cybersecurity and the running of your business from hybrid work to customer access. Conventional approaches to identity and access management (IAM) are no longer sufficient as organizations operate in an escalating threat environment where zero trust is a must-have.
What You Will Learn
In this one day conference attendees will learn:
- Redefining Trust: Building a Strategic Identity Framework for the Modern Enterprise
- Integrating IAM with DevOps: Securing the Software Development Lifecycle
- IAM in the Era of Remote Work: Strategies for Managing Distributed Identities
- Leveraging Artificial Intelligence in IAM: Enhancing Threat Detection and Response
- Regulatory Compliance and IAM: Navigating the Complex Landscape
- Customer Identity and Access Management (CIAM): Balancing Security with Seamless User Experience
Conference Price: $349.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
Exhibits
As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.
CONFERENCE AGENDA
9:00am – 10:00am: Redefining Trust: Building a Strategic Identity Framework for the Modern Enterprise
Rob Civitello, Sr. Director, Identity & Access Management, Alight Solutions
As digital ecosystems expand and organizations accelerate cloud adoption, Identity and Access Management (IAM) is no longer a tactical IT function—it’s a strategic pillar of business resilience, customer trust, and digital innovation. In this opening keynote, we’ll explore how IAM can move beyond compliance and operational efficiency to become a strategic enabler of secure digital transformation.
The session will cover:
- How evolving threats, remote work, and regulatory demands are reshaping the identity landscape
- A strategic blueprint for modern IAM: aligning people, processes, and platforms
- The role of Zero Trust, decentralized identity, and identity fabric models in future-proofing your enterprise
- How to bridge the gap between security and user experience, balancing frictionless access with strong protection
- Lessons learned from leading organizations that have embedded IAM into their digital and business strategies
Join us for a forward-looking discussion on how to elevate IAM from a backend concern to a boardroom conversation—and how your identity strategy today will define your competitive edge tomorrow.
Civitello
10:00am – 10:30am: Refreshment Break
10:30am – 11:00am: Integrating IAM with DevOps: Securing the Software Development Lifecycle
As organizations adopt DevOps practices, integrating IAM into the software development lifecycle becomes crucial. This session delves into strategies for embedding IAM controls within CI/CD pipelines, managing developer access, and securing code repositories. Attendees will gain insights into balancing agility with security, ensuring that rapid development does not compromise identity governance.
11:30am – 12:30pm: IAM in the Era of Remote Work: Strategies for Managing Distributed Identities
Erik Erpenbeck, Lead Field Architect, Identities, Axonius
The shift to remote and hybrid work models has expanded the identity perimeter. This session addresses the challenges of managing identities across diverse locations and devices. Topics include implementing adaptive authentication, ensuring secure access to cloud resources, and maintaining compliance. Attendees will learn how to adapt IAM strategies to support a flexible workforce without increasing risk.
Erpenback
12:30pm – 1:30pm: Lunch and Exhibit Break
1:30pm – 2:30pm: Leveraging Artificial Intelligence in IAM: Enhancing Threat Detection and Response
Artificial Intelligence (AI) offers powerful tools for enhancing IAM systems. This session explores how AI can be utilized for anomaly detection, risk-based authentication, and automated response to identity threats. Attendees will understand the benefits and limitations of AI in IAM, and how to implement AI-driven solutions to proactively manage identity-related risks.
2:30pm – 3:00pm: Refreshment Break
3:00pm – 4:00pm: Dynamic Fraud Prevention Strategies – Grow Your Organization’s Bottom-Line Through Dynamic Fraud Prevention
Zee Alsayag, Sr. Sales Engineer, Ping Identity
New account fraud and account takeover are persistent problems for CIOs and CISOs because fraudsters are constantly evolving their tactics, requiring security teams to adapt rapidly while maintaining user-friendly experiences. The cost of fraud is high. The fear of data breaches and the potential financial and reputational damage they cause keep CIOs and CISOs awake at night, as does the pressure to balance stringent security measures with smooth customer experiences. CIOs and CISOs might cite budget constraints, legacy infrastructure complexities, and the potential for negative customer experience impacts as reasons for not fully achieving fraud prevention initiatives. This highlights the tension between security needs and organizational priorities.
Key Takeaways –
At this session we will review how you can differentiate genuine users from potential fraudsters and prevent account takeover attempts while minimizing friction for legitimate users by:
• Strengthen security during account creation by validating government-issued IDs and using liveness detection to verify user identities.
• Analyze user behavior, device information, network signals, and more to detect anomalies.
• Assign risk scores that trigger security measures when necessary.
• Integrate with existing fraud prevention systems and security tools for a comprehensive approach to fraud detection and mitigation.
Alsayag
4:00pm – 5:00pm: Identity and Access Management: Balancing Security with Seamless User Experience (Panel Discussion)
Moderated by: TBD
Panelists will include:
- La Tanja Bradley, BCU Analyst, Security IAM, BCU
- Peleg Holzmann, Senior Cybersecurity Supervision Specialist, Federal Reserve Bank of Chicago
- Umer Khan, Senior Cybersecurity Engineer, TIDI Products
- Zeeshan Khan, CISSP, Information Security Lead, City of Chicago
- Additional Identity Executives and Practitioners sharing strategies, tactics, and lessons learned
Bradley Holzmann Khan Khan