Workforce IAM
Facebook Twitter LinkedIn

Workforce IAM

Combined Session
Thursday, May 12, 2022 14:30—15:30
Location: B07-08

Panel: Turning (Distributed) Workforce Challenges into Productivity Gains

Customer Identity & Access Management (CIAM) has made us learn about reducing friction in the way customers access and consume our services, and to add value to the relationship. It is time now to apply CIAM learnings to workforce identity. 

Roland Baum
Roland Baum
umbrella.associates GmbH
Roland Baum is Founder of German Start-Up umbrella.associates and architect of several enterprise ID and IGA environments. As a tech savvy wizard of OpenSource tools and data analysis, he combines...
Vittorio Bertocci
Vittorio Bertocci
Auth0
Vittorio Bertocci is a Principal Architect for Auth0. Before Auth0, he had a lengthy career with Microsoft, where Vittorio worked with Fortune 100 and Global 100 companies, including working on...
Allan Foster
Allan Foster
Emeritus
Allan Foster has helped build ForgeRock into a multinational identity software vendor with offices on four continents. Allan’s deep technical knowledge has been well used in all aspects of...
Sebastian Rohr
Sebastian Rohr
umbrella.associates GmbH
While Sebastian has been known as author of multiple articles, reviews and essays on all kinds of Identity and Security topics, he has more recently made a name for himself as being the...

Friends don’t let Friends Centralize Authorization Enforcement

Achieving an identity-centric security model is no small feat. The composable enterprise needs to be secured across multiple clouds, while providing end-users with delightful experiences, yet still maintain high levels of assurance. Oh yea… it has to scale too. This presentation shares lessons learned from our journey towards automating the distributed enforcement of access control rules, and how leveraging a symbiotic relationship between identity management and runtime API security infrastructure enables an identity mesh that spans across applications.

Friends don’t let Friends Centralize Authorization Enforcement
Event Recording
Friends don’t let Friends Centralize Authorization Enforcement
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Friends don’t let Friends Centralize Authorization Enforcement
Presentation deck
Friends don’t let Friends Centralize Authorization Enforcement
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Francois Lascelles
Francois Lascelles
Broadcom Software
Francois is Distinguished Engineer and CTO for API Management at Broadcom Software. Previously, Francois was a member of the Ping Identity Office of the CTO. An early adopter of service...

Identity is the New Perimeter: How to Discover, Mitigate and Protect Identity Risks

Two decades of digital transformation and cloud migration have been slowly eroding the traditional network perimeter and with the past two years of transition to more remote work, the walls have come tumbling down. Privileged credentials from access tools (like VPN and RDP) that have been left on endpoints are a valuable target for attack. SAAS applications and Cloud access further expand the proliferation of potentially exposed identities. Once an attacker establishes initial access it becomes trivial for lateral attack movement to take control over critical systems or the entire network. The network perimeter is obsolete. Identity is the new perimeter. Organizations must discover, mitigate and protect their identity risks.

Identity is the New Perimeter: How to Discover, Mitigate and Protect Identity Risks
Event Recording
Identity is the New Perimeter: How to Discover, Mitigate and Protect Identity Risks
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Identity is the New Perimeter: How to Discover, Mitigate and Protect Identity Risks
Presentation deck
Identity is the New Perimeter: How to Discover, Mitigate and Protect Identity Risks
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Wolfgang Halbartschlager
Wolfgang Halbartschlager
Illusive Networks
Wolfgang is a Senior Technical Sales Engineer with over 15 years of experience as a security engineer and consultant. He is responsible for Illusive Networks’ technical activities and...

Tickets

On-Demand Access
Re-live EIC 2022
€300
 
Watch 200 sessions on-demand
Download all available presentations
Subscribe for updates
Please provide your email address