Skip to content

PAST EVENTS


Identity Access Management (IAM) – Reducing Risk and Giving Better CX to Users: Chicago (Rosemont/O’Hare), Illinois

April 4, 2024

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illino
is


Overview

Identity continues to be foundational to cybersecurity and the running of your business from hybrid work to customer access. Conventional approaches to identity and access management (IAM) are no longer sufficient as organizations operate in an escalating threat environment where zero trust is a must-have.


What You Will Learn

In this one day conference attendees will learn:

  • Shedding Light to the Shadow Identities of Modern Security
  • Pivot! – How to Achieve Identity Centric Cybersecurity
  • How to Build a Robust IAM Program Management COE
  • Eliminating Cyberattacks Without User’s Involvement
  • Security Renaissance: Why it’s Time to Break with Old-School PAM Solutions
  • How to Build a World Class Identity Program
  • How Identity Leaders Build Robust Relationships with other Partners like InfoSec, EA, IT Operations and the Business (Panel Discussion)

Conference Price: $299.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.


CONFERENCE AGENDA


8:00am – 9:00am: Registration and Continental Breakfast


9:00am – 9:50am: How to Build a World Class Identity Program – KEYNOTE

Jigar Shah, Global Head of Identity, Access and Application Security, Tenet Healthcare 

In today’s fast-moving world where the only thing constant is the change. In this transformation – ‘digital and AI centric business’ is the new business, and the business relies on digital trust which is in turn enabled by IAM. IAM programs are at the core of achieving critical business objectives and relevant to every high-performing organization. In this interconnected digital landscape, establishment of robust Identity program is paramount for organizations striving to navigate complexities of modern cybersecurity threats, regulatory compliance & user experience. Context is important in today’s world and modern IAM programs are shifting their focus from just access and provisioning to strategic Identity first security programs. This keynote delves into the essential components of developing world class Identity program to meet evolving needs of today’s business.

Topics include:

  • IAM as a catalyst to deliver direct business value
  • IAM program to focus beyond tooling and become outcome and risk-based program
  • Build a high performing IAM function
  • IAM operational model
  • IAM focused on user journeys
  • IAM value realization

Shah


9:50am – 10:20am: Refreshment Break


10:20am – 11:10am: Pivot! – How to Achieve Identity Centric Cybersecurity

Joe Raschke, Business Value Advisor, Saviynt

As cybersecurity technologies evolve, so does your attack surface. This session will discuss fixing broken processes and pivoting from network, device, and application security into an identity-based approach.

Joe will show you how to leverage past approaches to risk-based analysis and tie it to program value and specific outcomes—not just outputs.

Topics include:

  • History of cybersecurity – patching holes!
  • Standards-based rules of the road
  • Compliance and audit programs
  • Devil’s Details: identity is the heart of the matter
  • Approach and align business enablement through people, processed, and then technology
  • Document the value of your program

Get engaged – Identity and show value – Show impact – tell a complete story – be a real hero

Raschke


11:10am – 12:00pm: Security Renaissance: Why it’s Time to Break with Old-School PAM Solutions

Martin Cannard, VP, Product Strategy, Netwrix Corporation

In the last twenty years, privileged access management (PAM) has gone through many evolutions to keep pace with the ever-changing cyberthreat landscape. Still, a vital risk remains front and center: Privileged accounts are crucial for the day-to-day work of admins, but they are usually needed for only short periods of time — the rest of the day, they can be compromised by attackers and misused by insiders.

Old-school PAM solutions reduce this risk only to some extent, while being costly and time-consuming to deploy. But it doesn’t have to be this way! In this session, we’ll explore a modern, easy-to-adopt approach that deals with this core problem head-on.

Join this session to learn how you can:

  1. Leverage privilege orchestration to remove known attack surfaces when at rest
  2. Dynamically delegate access according to use case without impeding admin efficiency
  3. Quickly adopt modern PAM tools to centrally control and audit access

Cannard


12:00pm – 12:50pm: Eliminating Cyberattacks Without User’s Involvement!

Thi Nguyen-Huu, Founder and CEO, WinMagic Corp.

WinMagic has raised the bar in disk encryption for over 25 years with continuous innovation and worldwide adoption. When extending our concepts from endpoint to online access, we have uncovered shortcomings, and even fundamental flaws in Zero Trust, Federated Authentication, FIDO and TLS. Our new ways of thinking presented at this conference will help you recognize the current misconceptions and embrace the true possibility of eliminating cyberattacks with NO USER ACTION

Nguyen-Huu


12:50pm – 1:30pm: Lunch and Exhibit Break


1:30pm – 2:20pm: Shedding Light to the Shadow Identities of Modern Security

Alex Flores, Principal Security Architect, Astrix Security

Identity has become the central focus of security, but are all identities considered? The rise of biometric MFA, passwordless authentication, and impossible travel policies are reshaping the landscape for user access control. However, the challenge persists with non-human identities like service accounts and API keys, which often remain unmonitored and ungoverned. This oversight has not gone unnoticed by cyber attackers.

The upcoming session will delve into the realm of non-human identities, exploring:

  • The definition and nature of non-human identities
  • The transition of these identities from a technical issue to a broader organizational concern
  • The ways in which cyber attackers exploit these overlooked access points
  • Strategies that cybersecurity professionals can implement to address this vulnerability.

Flores


2:20pm – 2:50pm: Refreshment Break


2:50pm – 3:40pm: How to Build a Robust IAM Program Management COE

Johnny Shin, Managing Director US, KeyData

The establishment and delivery of an IAM Program is essential to delivering Identity First security. Identity teams need to understand and communicate the role that identity plays within your enterprise to enable your employees, customers and business partners to deliver on their goals.

Shin


3:40pm – 4:30pm: How Identity Leaders Build Robust Relationships with other Partners like InfoSec, EA, IT Operations and the Business (Panel Discussion)

In this session, attendees will learn from a panel of Identity leaders as to how they build relationships with other IT and business units.
They will discuss strategies, tactics and pitfalls to be avoided.

Moderated by: Joe Raschke, Business Value Advisor, Saviynt

Panelists will include:

  • Devan D’Silva, Manager Identity & Access Management, Vice President, Risk Management, Robert W. Baird & Co.
  • Michelle Hames, Identity & Access Administrator, Corporate, Group O
  • Will Schneider, Manager, Identity and Access Management Operations, Delta Dental Insurance
  • Jeremy P. Kubik, Director of Managed IT and Security Operations, STIGroup Ltd.
  • Judy Jing, Lead IT Security Analyst – Global IAM, Ingredion Incorporated
  • Other Enterprise IT Identity Leaders sharing experiences and lessons learned

Raschke                D’Silva               Hames                Schneider              Kubik                  Jing


Conference Price: $299.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.