Identity Access Management (IAM) – Reducing Risk and Giving Better CX to Users: Chicago (Rosemont/O’Hare), Illinois
April 4, 2024
9:00am-5:00pm
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois
Overview
Identity continues to be foundational to cybersecurity and the running of your business from hybrid work to customer access. Conventional approaches to identity and access management (IAM) are no longer sufficient as organizations operate in an escalating threat environment where zero trust is a must-have.
What You Will Learn
In this one day conference attendees will learn:
Conference Price: $299.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
8:00am – 9:00am: Registration and Continental Breakfast
9:00am – 9:50am: How to Build a World Class Identity Program – KEYNOTE
Jigar Shah, Global Head of Identity, Access and Application Security, Tenet Healthcare
In today’s fast-moving world where the only thing constant is the change. In this transformation – ‘digital and AI centric business’ is the new business, and the business relies on digital trust which is in turn enabled by IAM. IAM programs are at the core of achieving critical business objectives and relevant to every high-performing organization. In this interconnected digital landscape, establishment of robust Identity program is paramount for organizations striving to navigate complexities of modern cybersecurity threats, regulatory compliance & user experience. Context is important in today’s world and modern IAM programs are shifting their focus from just access and provisioning to strategic Identity first security programs. This keynote delves into the essential components of developing world class Identity program to meet evolving needs of today’s business.
Topics include:
Shah
9:50am – 10:20am: Refreshment Break
10:20am – 11:10am: Pivot! – How to Achieve Identity Centric Cybersecurity
Joe Raschke, Business Value Advisor, Saviynt
As cybersecurity technologies evolve, so does your attack surface. This session will discuss fixing broken processes and pivoting from network, device, and application security into an identity-based approach.
Joe will show you how to leverage past approaches to risk-based analysis and tie it to program value and specific outcomes—not just outputs.
Topics include:
Get engaged – Identity and show value – Show impact – tell a complete story – be a real hero!
Raschke
11:10am – 12:00pm: Security Renaissance: Why it’s Time to Break with Old-School PAM Solutions
Martin Cannard, VP, Product Strategy, Netwrix Corporation
In the last twenty years, privileged access management (PAM) has gone through many evolutions to keep pace with the ever-changing cyberthreat landscape. Still, a vital risk remains front and center: Privileged accounts are crucial for the day-to-day work of admins, but they are usually needed for only short periods of time — the rest of the day, they can be compromised by attackers and misused by insiders.
Old-school PAM solutions reduce this risk only to some extent, while being costly and time-consuming to deploy. But it doesn’t have to be this way! In this session, we’ll explore a modern, easy-to-adopt approach that deals with this core problem head-on.
Join this session to learn how you can:
Cannard
12:00pm – 12:50pm: Eliminating Cyberattacks Without User’s Involvement!
Thi Nguyen-Huu, Founder and CEO, WinMagic Corp.
WinMagic has raised the bar in disk encryption for over 25 years with continuous innovation and worldwide adoption. When extending our concepts from endpoint to online access, we have uncovered shortcomings, and even fundamental flaws in Zero Trust, Federated Authentication, FIDO and TLS. Our new ways of thinking presented at this conference will help you recognize the current misconceptions and embrace the true possibility of eliminating cyberattacks with NO USER ACTION.
Nguyen-Huu
12:50pm – 1:30pm: Lunch and Exhibit Break
1:30pm – 2:20pm: Shedding Light to the Shadow Identities of Modern Security
Alex Flores, Principal Security Architect, Astrix Security
Identity has become the central focus of security, but are all identities considered? The rise of biometric MFA, passwordless authentication, and impossible travel policies are reshaping the landscape for user access control. However, the challenge persists with non-human identities like service accounts and API keys, which often remain unmonitored and ungoverned. This oversight has not gone unnoticed by cyber attackers.
The upcoming session will delve into the realm of non-human identities, exploring:
Flores
2:20pm – 2:50pm: Refreshment Break
2:50pm – 3:40pm: How to Build a Robust IAM Program Management COE
Johnny Shin, Managing Director US, KeyData
The establishment and delivery of an IAM Program is essential to delivering Identity First security. Identity teams need to understand and communicate the role that identity plays within your enterprise to enable your employees, customers and business partners to deliver on their goals.
Shin
3:40pm – 4:30pm: How Identity Leaders Build Robust Relationships with other Partners like InfoSec, EA, IT Operations and the Business (Panel Discussion)
In this session, attendees will learn from a panel of Identity leaders as to how they build relationships with other IT and business units.
They will discuss strategies, tactics and pitfalls to be avoided.
Moderated by: Joe Raschke, Business Value Advisor, Saviynt
Panelists will include:
Raschke D’Silva Hames Schneider Kubik Jing
Conference Price: $299.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
Exhibits
As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.