Identity Management & Cloud Security

  •  TYPE: Track    START DATE:  Thursday, October 10, 2019     START TIME: 11:00  
Parent Track


Distributed nature of the cloud-based platforms makes them fairly complex and requires a shift from traditional, perimeter-based cybersecurity approaches. Putting Identity Management as a central point of the security models is more suitable. This, in turn, requires a fundamental change of the thinking and strategic planning from security experts, as well as the proper technological shift. In this session, we will talk about identity management as a way of enhancing cybersecurity posture. 


The Journey Towards a Passwordless Enterprise

Date: Thursday, October 10, 2019 Time: 11:00-12:00

The Journey Towards a Passwordless Enterprise
Alexei Balaganski, KuppingerCole

Everyone knows that the password is dead, yet most companies are still struggling with them. With such a broad choice of strong authentication products on the market, what can possibly prevent their broader adoption? If you are still thinking about finding the right balance between security and user experience, you’re doing it wrong. Even more, if you are still thinking about password replacement as just a matter of introducing strong authentication into your company, you really...

Privileged Access Management: Approach, Phases and Lessons Learned
Reena Parekh, KPMG

How to Move from Always-on Privileged Access to Just-in-Time Administration and Drastically Reduce Your IT Security Risk
Morey J. Haber, BeyondTrust

A true least-privilege security model requires users, processes, applications, and systems, to have just enough rights and access—and for no longer than necessary—to perform a necessary action or task. While organizations are increasingly effective at applying the “just enough” piece using privileged access management (PAM) solutions, they have largely neglected the time-limited part of the equation. Today, powerful accounts with always-on (24x7) privileged access...

Date: Thursday, October 10, 2019 Time: 12:00-13:00

Identity in Local Government - Case Study of How Fairfax County Bridges Enterprise and Resident Identity
Robert Barr, Fairfax County, VA

Fairfax County, VA needed the ability to register residents to pay their taxes online and provide management for applications in the courts used by both residents and county employees. These needs needed to be met in a way that didn't sacrifice security for usability and recognized that some of the most important tasks for security required automation. The county also wanted to build a solution that avoided vendor lock-in by supporting standard protocols. Finally, the system had to work...

Panel - The Movement of Security Controls to the Cloud - How Far Can We Go?
Matthew Gardiner, Mimecast • Morey J. Haber, BeyondTrust • Robert Barr, Fairfax County, VA

Quick Links

Book together with Borderless Cyber

And get your early bird discount

Stay Connected


Washington, D.C. - USA


CyberNext Summit 2019

Registration fee:
€700.00 till 15.09.2019
$875.00 till 15.09.2019
S$1120.00 till 15.09.2019
11000.00 kr
7700.00 kr till 15.09.2019
Mastercard Visa American Express PayPal
Contact person:

Mr. Levent Kara
+49 211 23707710
  • Oct 08 - 10, 2019 Washington, D.C. - USA
Register now!

How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00