Early-bird Discount
expires in
Register Now


Enterprise Identity III

Enterprise Identity III

Thursday, June 06, 2024 11:00—13:00
Location: B 07-08

In the evolving tapestry of the AI driven digital realm, Enterprise Digital Identity stands as a linchpin, central to both operational efficacy and security. As businesses soar to new digital heights, understanding and innovating within this sphere becomes imperative. This session stream at EIC 2024 delves into the nuances, challenges, and innovations that are shaping the identity landscape for modern enterprises. With a blend of cutting-edge trends and foundational strategies, this stream addresses the future-ready requirements and the transformative potential of digital identity management within organizations.

Each topic within this session stream promises a combination of expert insights, real-world case studies, and forward-looking strategies, ensuring that attendees are well-equipped to navigate the challenges and harness the opportunities within the enterprise digital identity sphere.

Receive Continuing Professional Education Credits

KuppingerCole Analysts AG is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: nasbaregistry.org.

Participants will earn 2 CPE Credits for this track.

After attending this track, participants will be able to:

  • Determine the critical role of Enterprise Digital Identity
  • Recognize how an identity-first approach amplifies security measures, ensuring robust defenses against evolving threats
  • Determine why adaptive and scalable architectures are crucial for future-proofing Identity and Access Management (IAM)
  • Discuss strategies for optimal IAM hygiene, reducing vulnerabilities, and optimizing user experience
  • Recognize the tools and technologies that enable cohesive identity management across diverse user bases
  • Identify the increasing and evolving nature of threats targeting IAM systems
  • Recognize the power of data strategies in enhancing identity management protocols
  • Discuss how generative AI applications and analytics can revolutionize IAM

Field of Study: Information technology
Prerequisites: Experience in the field of Information Security
Advance Preparation: None
Program Level: Intermediate
Delivery Method: Group Live (on-site attendance only)

To register for this session, book your Conference Ticket here.
In order to be awarded the full credit hours, you must attend the whole track on-site, which will be controlled after the Conference.
To redeem your CPE credits, please fill and submit the CPE application form after the conference.
After we have checked your attendance, you will receive your CPE certificate.

Refunds and Cancellations:
There will be no fees for cancellations up to 30 days before the beginning of the event. For cancellations between 30 and 14 days before the conference, we will charge an administration fee of 50% of the participation fee. For cancellations later than this, we will charge the total conference fee. The cancellation must be in writing.  
For more information regarding refunds, complaints, and/or program cancellation policies please contact our Events team via eventsteam@kuppingercole.com


Digital identity futurist and strategist
Venn Factory
Research Analyst


June 06, 2024
11:00 - 11:20
Facilitating Ownership in External Authorization
In a world where authorization is externalised, ownership often still relies with decentralised application teams to allow for organisational scalability. Autonomy of these teams is important so that they can move fast. Zalando has 2000+ inhouse applications owned by 100s of engineering teams who will use externalised authorization. Each of these teams will write their own authorization policies as code using Open Policy Agent.This talk will share insights into how we started treating...

June 06, 2024
11:20 - 11:40
Appropriate Level of Assurance - A Foundation for Proper CIAM
There is no good or bad Level of Assurance to root any CIAM upon. It all depends on the business and the risks. A unique mix of business, legal, IT security, technical, and CX skills is required to discover, define, and communicate requirements for customer authentication methods. The correct balance between these factors brings peace of mind and enablement to the business. Hear some highlights of If P&C Insurance's journey of defining and enforcing a Level of Assurance aligned with...

If P&C Insurance

June 06, 2024
11:40 - 12:00
Automate Disconnected Apps for IGA Deployments - Automate the Non-Automated
Do you find yourself chasing down data files for disconnected apps? Yes, we all want fully bidirectional apps…But what about those “file” apps. Learn how to modernize the file collection and ingestion for your IGA Solution by empowering disconnected app owners to upload and pre-validate user and entitlement data on recurring schedules. Don’t fool yourself that your deployment will be the exception. Join Aquera, a 2022 Gartner “Cool Vendor” in...


June 06, 2024
12:00 - 12:20
IAM With - or Against ITSM
Everyone wants to integrate their access request processes into ITSM, but what is the reality behind this? What kind of integrations are required, what are the pros and cons of requesting access through the ITSM solution instead of the IAM solution. This talk is based on several (long) discussions with several clients

PwC Denmark

June 06, 2024
12:20 - 12:40
To SaaS or Not to SaaS
This talk will share lessons learned from migrations to SaaS based IAM… and what best in class tech looks like if you need to stay-on premises but want the benefits of SaaS.Outline:1. Trends in the market, crossroads our clients our on and the adoption/relevance of SaaS based IAM.2. All SaaS-IAM is equal, but some are more equal than others (differences in maturity across AM, IGA and PAM).3. How maturity and these differences impact implementations and success.4. What can you do about...

June 06, 2024
12:40 - 13:00
Implementing Access Certification
This session will explain how Philips implements access certification, how it helped to improve security, and why they have not got tired yet.


Secure your ticket
Be quick before the Early-bird Discount expires in
00d 00h 00m 00 s
Get a ticket
Almost Ready to Join EIC 2024?
Reach out to our team with any remaining questions
Get in touch