UPCOMING EVENTS

Identity Access Management (IAM) – Reducing Risk and Giving Better CX to Users: Chicago (Rosemont/O’Hare), Illinois

 

 

April 4, 2024

 

9:00am-5:00pm

 

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

 

Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois

  


Overview

 

Identity continues to be foundational to cybersecurity and the running of your business from hybrid work to customer access. Conventional approaches to identity and access management (IAM) are no longer sufficient as organizations operate in an escalating threat environment where zero trust is a must-have.


What You Will Learn

 

In this one day conference attendees will learn:

  • Maximizing Business Value with IAM Maturity Assessment
  • Security, Identity, Operations- Sharpening the Value of IT
  • Sharpening IT Influence in the Board Room With Risk, Value, and Cost
  • Architecting Identity-First Security and Zero Trust Implementations
  • Reducing Risk & Giving Better User Experience to Their Customers
  • How to Streamline Internal IT Processes

Conference Price: $299.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

 

CONFERENCE AGENDA

 


8:00am – 9:00am: Registration and Continental Breakfast


9:00am – 9:50am: How to Build a World Class Identity Program

Jigar Shah, Global Head of Identity, Access and Application Security, Tenet Healthcare 

 

 

Shah


9:50am – 10:20am: Refreshment Break


10:20am – 11:10am: Pivot! – How to Achieve Identity Centric Cybersecurity

Joe Raschke, Business Value Advisor, Saviynt

 

As cybersecurity technologies evolve, so does your attack surface. This session will discuss fixing broken processes and pivoting from network, device, and application security into an identity-based approach.

Joe will show you how to leverage past approaches to risk-based analysis and tie it to program value and specific outcomes—not just outputs. Topic includes:

• History of cybersecurity – patching holes!
• Standards-based rules of the road
• Compliance and audit programs
• Devil’s Details: identity is the heart of the matter
• Approach and align business enablement through people, processed, and then technology
• Document the value of your program

Call to action:
Get engaged – Identity and show value – Show impact – tell a complete story – be a real hero!

 

Raschke


 

11:10am – 12:00pm: How to Be Successful With Privileged Access Management (PAM)

 

Privilege access management is a cybersecurity strategy to control, monitor, secure and audit all identities across an IT environment.

In this session, attendees will learn:

How to integrated PAM into any security program
How to leverage PAM
How to raise your security posture with PAM

 


12:00pm – 12:50pm: Dispelling Myth: Are Users the Weakest Factor? Why Industry Authentication Conventions are the Weakest

 

Thi Nguyen-Huu, Founder and CEO, WinMagic Corp.

What is top of mind with IT executives and hits the boardroom table?  The answer is the ever-present threat of cyberattacks and employees complaining about password policies.  In an era marked by escalating cyber threats targeting not only businesses but also various levels of government and infrastructure in addition to being coupled with password fatigue / friction with traditional authentication methods, the paradigm of passwordless authentication emerges as a beacon of security.  But are we implementing it correctly and have we really optimized the process of providing the correct transactions to the verified authentic user and device in a secure and transparent manner?  Have we really analyzed and dealt with the root cause of the industry’s failure to curb cyber-attacks?

With the benefit of over 25 years of experience in protecting the endpoint and a rich history in continuous innovation, please join Thi Nguyen-Huu – Founder and CEO of WinMagic – in this 60-minute presentation as he unveils a transformative vision for authentication, embarks on a journey that transcends conventional notions of secure authentication, explores revolutionary concepts involving passwordless, and enhances IT standards including FIDO2, Zero Trust, and federated authentication. In addition, Thi Nguyen-Huu will explore what the industry says is secure only to discover a flaw in secure authentication and communications that will force a reset on the IT authentication protocols and standards we rely on today to keep us safe in this cyberworld.

Nguyen-Huu

 


12:50pm – 1:30pm: Lunch and Exhibit Break


1:30pm – 2:20pm: Best Practices in Communicating the Business Value of Identity & Cybersecurity to the Business

 

For many information security executives ROI has been a challenging topic to address, but nonetheless it is essential to speak in terms the business can understand as it relates to their day to day activities

This session will cover these areas and more as it related to Identity and Security overall:
*ROI
*price-performance
*outcomes

 


2:20pm – 2:50pm: Refreshment Break


 


2:50pm – 3:40pm: How to Build a Robust IAM Program Management COE

The establishment and delivery of an IAM Program is essential to delivering Identity First security. Identity teams need to understand and communicate the role that identity plays within your enterprise to enable your employees, customers and business partners to deliver on their goals.

 

 


3:40pm – 4:30pm:

 

How Identity Leaders Build Robust Relationships with other Partners like InfoSec, EA, IT Operations and the Business (Panel Discussion)

 

 

In this session, attendees will from a panel of Identity leaders as to how they build relationships with other IT and business units.
They will discuss strategies, tactics and pitfalls to be avoided.

 

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.