UPCOMING EVENTS
Identity Access Management (IAM) – Reducing Risk and Giving Better CX to Users: Chicago (Rosemont/O’Hare), Illinois
July 10, 2025
9:00am-5:00pm
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois
Overview
Identity continues to be foundational to cybersecurity and the running of your business from hybrid work to customer access. Conventional approaches to identity and access management (IAM) are no longer sufficient as organizations operate in an escalating threat environment where zero trust is a must-have.
What You Will Learn
In this one day conference attendees will learn:
- Redefining Trust: Building a Strategic Identity Framework for the Modern Enterprise
- Integrating IAM with DevOps: Securing the Software Development Lifecycle
- IAM in the Era of Remote Work: Strategies for Managing Distributed Identities
- Leveraging Artificial Intelligence in IAM: Enhancing Threat Detection and Response
- Regulatory Compliance and IAM: Navigating the Complex Landscape
- Customer Identity and Access Management (CIAM): Balancing Security with Seamless User Experience
Conference Price: $349.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
Exhibits
As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.
CONFERENCE AGENDA
9:00am – 10:00am: Redefining Trust: Building a Strategic Identity Framework for the Modern Enterprise
As digital ecosystems expand and organizations accelerate cloud adoption, Identity and Access Management (IAM) is no longer a tactical IT function—it’s a strategic pillar of business resilience, customer trust, and digital innovation. In this opening keynote, we’ll explore how IAM can move beyond compliance and operational efficiency to become a strategic enabler of secure digital transformation.
The session will cover:
- How evolving threats, remote work, and regulatory demands are reshaping the identity landscape
- A strategic blueprint for modern IAM: aligning people, processes, and platforms
- The role of Zero Trust, decentralized identity, and identity fabric models in future-proofing your enterprise
- How to bridge the gap between security and user experience, balancing frictionless access with strong protection
- Lessons learned from leading organizations that have embedded IAM into their digital and business strategies
Join us for a forward-looking discussion on how to elevate IAM from a backend concern to a boardroom conversation—and how your identity strategy today will define your competitive edge tomorrow.
10:00am – 10:30am: Refreshment Break
10:30am – 11:00am: Integrating IAM with DevOps: Securing the Software Development Lifecycle
As organizations adopt DevOps practices, integrating IAM into the software development lifecycle becomes crucial. This session delves into strategies for embedding IAM controls within CI/CD pipelines, managing developer access, and securing code repositories. Attendees will gain insights into balancing agility with security, ensuring that rapid development does not compromise identity governance.
11:30am – 12:30pm: IAM in the Era of Remote Work: Strategies for Managing Distributed Identities
The shift to remote and hybrid work models has expanded the identity perimeter. This session addresses the challenges of managing identities across diverse locations and devices. Topics include implementing adaptive authentication, ensuring secure access to cloud resources, and maintaining compliance. Attendees will learn how to adapt IAM strategies to support a flexible workforce without increasing risk.
12:30pm – 1:30pm: Lunch and Exhibit Break
1:30pm – 2:30pm: Leveraging Artificial Intelligence in IAM: Enhancing Threat Detection and Response
Artificial Intelligence (AI) offers powerful tools for enhancing IAM systems. This session explores how AI can be utilized for anomaly detection, risk-based authentication, and automated response to identity threats. Attendees will understand the benefits and limitations of AI in IAM, and how to implement AI-driven solutions to proactively manage identity-related risks.
2:30pm – 3:00pm: Refreshment Break
3:00pm – 4:00pm: Regulatory Compliance and IAM: Navigating the Complex Landscape (Panel Discussion)
Compliance with regulations like GDPR, HIPAA, and CCPA is a critical aspect of IAM. This session provides an overview of how IAM solutions can aid in meeting regulatory requirements, including data access controls, audit trails, and user consent management. Attendees will learn best practices for aligning IAM strategies with compliance obligations to mitigate legal and financial risks.
Moderated by: TBD
Panelists will include:
- Identity Executives and Practitioners sharing strategies, tactics, and lessons learned
4:00pm – 5:00pm: Customer Identity and Access Management (CIAM): Balancing Security with Seamless User Experience
Managing customer identities requires a delicate balance between security and user convenience. This session focuses on CIAM strategies that enhance user experience while protecting sensitive data. Topics include single sign-on (SSO), social login integration, and personalized access controls. Attendees will discover how to implement CIAM solutions that foster customer trust and engagement.