Workforce IAM
Facebook Twitter LinkedIn

Workforce IAM

Combined Session
Thursday, May 12, 2022 14:30—15:30
Location: B07-08

Panel: Turning (Distributed) Workforce Challenges into Productivity Gains

Customer Identity & Access Management (CIAM) has made us learn about reducing friction in the way customers access and consume our services, and to add value to the relationship. It is time now to apply CIAM learnings to workforce identity. 

Roland Baum
Roland Baum GmbH
Roland Baum is Founder of German Start-Up and architect of several enterprise ID and IGA environments. As a tech savvy wizard of OpenSource tools and data analysis, he combines...
Vittorio Bertocci
Vittorio Bertocci
Vittorio Bertocci is a Principal Architect for Auth0. Before Auth0, he had a lengthy career with Microsoft, where Vittorio worked with Fortune 100 and Global 100 companies, including working on...
Allan Foster
Allan Foster
Chief Evangelist
Allan Foster has helped build ForgeRock into a multinational identity software vendor with offices on four continents. Allan’s deep technical knowledge has been well used in all aspects of...
Sebastian Rohr
Sebastian Rohr GmbH
While Sebastian has been known as author of multiple articles, reviews and essays on all kinds of Identity and Security topics, he has more recently made a name for himself as being the...

Friends don’t let Friends Centralize Authorization Enforcement

Achieving an identity-centric security model is no small feat. The composable enterprise needs to be secured across multiple clouds, while providing end-users with delightful experiences, yet still maintain high levels of assurance. Oh yea… it has to scale too. This presentation shares lessons learned from our journey towards automating the distributed enforcement of access control rules, and how leveraging a symbiotic relationship between identity management and runtime API security infrastructure enables an identity mesh that spans across applications.

Francois Lascelles
Francois Lascelles
Broadcom Software
Francois is Distinguished Engineer and CTO for API Management at Broadcom Software. Previously, Francois was a member of the Ping Identity Office of the CTO. An early adopter of service...

Identity is the New Perimeter: How to Discover, Mitigate and Protect Identity Risks

Two decades of digital transformation and cloud migration have been slowly eroding the traditional network perimeter and with the past two years of transition to more remote work, the walls have come tumbling down. Privileged credentials from access tools (like VPN and RDP) that have been left on endpoints are a valuable target for attack. SAAS applications and Cloud access further expand the proliferation of potentially exposed identities. Once an attacker establishes initial access it becomes trivial for lateral attack movement to take control over critical systems or the entire network. The network perimeter is obsolete. Identity is the new perimeter. Organizations must discover, mitigate and protect their identity risks.

Wolfgang Halbartschlager
Wolfgang Halbartschlager
Illusive Networks
Wolfgang is a Senior Technical Sales Engineer with over 15 years of experience as a security engineer and consultant. He is responsible for Illusive Networks’ technical activities and...


On-Demand Access
Re-live EIC 2022
Watch 200 sessions on-demand
Download all available presentations
Subscribe for updates
Please provide your email address