Early-bird Discount
expires in
Register Now


Rethinking IAM

Rethinking IAM

Combined Session
Wednesday, June 05, 2024 11:00—12:00
Location: B 07-08
Log in to download presentations

Decentralized Identity Comes of Age: How Identity Forces Are Making Enterprises Rethink Identity

Watch the video


A significant trend in cybersecurity breaches is the shift from targeting endpoints to hijacking user identities. This evolution marks a significant change in attack vectors, emphasizing the need for robust Identity Threat Detection and Response (ITDR). The presentation will dig into the dynamics of this trend, explaining the mechanisms through which attackers infiltrate systems by exploiting identity vulnerabilities instead of traditional hardware or software loopholes.

In response to the increasing focus on identity-based threats, there has been a paradigm shift in organizational structures and workflows. Identity & Access Management (IAM) teams are no longer siloed entities; they are increasingly integrated with Security Operations Centers (SOC). This presentation will explore the multifaceted implications of this integration. Attendees will gain insight into how the fusion of IAM and SOC functions is reshaping security strategies, fostering a more resilient, proactive defense against identity-based attacks.

Topics covered will include the evolution of ITDR tools and techniques, the role of artificial intelligence in predicting and mitigating identity threats, and the critical importance of fostering a culture of security awareness throughout the organization.


Martin Kuppinger
Principal Analyst
Martin Kuppinger is Founder and Principal Analyst at KuppingerCole, a leading analyst company for identity focused information security, both in classical and in cloud environments. Prior to...
Mike Neuenschwander
VP KuppingerCole US and Global Head of Research Strategy
KuppingerCole Analysts AG
Mike has 25 years of experience in identity, access management, privacy, and security technologies, stemming from his time at Novell (now OpenText) where he introduced some of the first identity...
IAM Teams Always Seem To Be Stressed, Over-budgeted or Lagging Behind

Watch the video


This session will examine the nuances of running an effective IAM program and explore how to strike the perfect balance between business, security and audit requirements, keeping the employees engaged and thus laying the foundation for a resilient and agile IAM.

Rohit Agnihotri
Sr. Director IAM
Northwestern Mutual
With over 15 years of deep-seated expertise in Identity and Access Management (IAM), Rohit has cultivated a reputation as an authority in both product development, consulting, thought leadership...
Identity Convergence & Integration Among Platforms

Watch the video


Holcim is a global leader in innovation and sustainable building solutions and has been running its Identity Management program in EMEA for the past eight years.  The program had reached a high level of maturity, but the time came to improve the connectivity between the different IAM platforms so that they could be combined into an Identity Fabric. This session will share in a practical and tangible manner how this was approached, the lessons learned, and the challenges faced along the way

Samuel López Trenado
User Lifecycle Supervisor
Holcim Emea Digital Center
Samuel is a cybersecurity professional passionate about the Identity and access management subjects. During his professional career in Holcim, he worked several years in the directories...
Almost Ready to Join EIC 2024?
Reach out to our team with any remaining questions
Get in touch