Mitigating Cyber Risks

  • TYPE: Combined Session DATE: Wednesday, May 15, 2019 TIME: 15:30-16:30 LOCATION: CHIEMSEE


In this presentation, SailPoint’s CTO & CISO will discuss why Identity and Access Management has evolved to become a key control at the center of security operations. He will present the anatomy of a typical cyber breach, and will highlight how the “IAM Cyber Kill Chain” plays its part in a modern attack. From this viewpoint, Mr. Rolls make a clear case for putting Identity at the center of cyber defense and creating an integrated approach to governing privileged access.

Key takeaways:

  • Attendees will learn the role insufficient IAM controls play in many of today's cyber attacks and how to mitigate this risk.
  • Attendees will learn how to set up monitoring and alerts to track user behavior and the state of systems and data access, and how to integrate those alerts into the broader security and incident response ecosystem. They will learn what to look for, including rogue accounts, access anomalies and unusual file patterns.
  • Attendees will understand how to put identity at the center of their cyber defense strategy to secure the entirety of today's enterprise.


14 years typing letters and numbers into a computer screen and waiting for the magic to happen. Most of that time the magic was helping enterprises figure out how to manage all the accounts and access they have in a reasonable manner, by yelling at software created by a number of companies....

Hacking into a Power Station is something that is a scary thought about the possibility of someone being able to turn off the power or damage systems. We have seen major incidents in previous years in which the Ukrainian energy sector was hit by a cyber-attack that caused a power outage for more than 86,000 homes.
This session is a real-world hack into a power station that explains the process on planning and preparation, the major challenges of hacking into a power station, adapting to the risks, the perimeter security, engines and SCADA controls. The session will reveal some of the amazing security as well as some of the most shocking findings that will surely see people put hands on their face. It will share the challenges on reporting the findings to the board and the lessons learned.
It is critically important to know how cybercriminals target their victims, what you can do to reduce the risk and make it more challenging for the attackers who steal your information, your identity or your money or even turn off the power. This session explains how outside attackers or malicious insiders can exploit vulnerabilities using examples such as a compromised email account password that escalates into a full-blown breach of network security.

Key takeaways
1. Insights into hacking a power station 
2. This session describes the anatomy of a privileged account hack
3. How cybercriminals target their victims
4. Reporting Risks to the board
5. What you can do to reduce your risk and prevent abuse of your critical information assets


Speed, ease, intelligence and security are differentiating the next wave of identity and access management solutions in the market. Organizations are counting on APIs for broader access to increasingly sensitive data and services. They’re also using a variety of disruptive technologies to secure and scale their API infrastructures, ensuring customer data and sensitive IP are never at risk. Join us for a presentation around some of the modern and innovative technologies coming out of Ping Identity that intersect both IAM, API and cyber security practices, and how modern solutions are leveraging AI and machine learning to monitor your API transactions, help secure customer data, manage customer consent, enforce data access governance, and achieve regulatory compliance while simultaneously improving customer engagement.


Loren has spent his career working in Taiwan, Utah, California, Boston and Colorado building high-performing teams that plan, develop and deliver some of the best software and cloud services in the world. His broad functional expertise spans product lifecycle management, program management,...

Log in to download presentations:  


Session Links

Munich, Germany


European Identity & Cloud Conference 2019

Registration fee:
€2100.00 $2625.00 S$3360.00 23100.00 kr
Mastercard Visa American Express PayPal INVOICE
Contact person:

Mr. Levent Kara
+49 211 23707710
  • May 14 - 17, 2019 Munich, Germany