Early-bird Discount
expires in
Register Now

Agenda

Enterprise Identity III

Enterprise Identity III

Track
Thursday, June 06, 2024 11:00—13:00
Location: B 07-08

In the evolving tapestry of the AI driven digital realm, Enterprise Digital Identity stands as a linchpin, central to both operational efficacy and security. As businesses soar to new digital heights, understanding and innovating within this sphere becomes imperative. This session stream at EIC 2024 delves into the nuances, challenges, and innovations that are shaping the identity landscape for modern enterprises. With a blend of cutting-edge trends and foundational strategies, this stream addresses the future-ready requirements and the transformative potential of digital identity management within organizations.

Each topic within this session stream promises a combination of expert insights, real-world case studies, and forward-looking strategies, ensuring that attendees are well-equipped to navigate the challenges and harness the opportunities within the enterprise digital identity sphere.

Receive Continuing Professional Education Credits

KuppingerCole Analysts AG is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing education on the National Registry of CPE Sponsors. State Boards of accountancy have final authority on the acceptance of individual courses for CPE credits. Complaints regarding registered sponsors may be submitted to the National Registry through its website: nasbaregistry.org.

Participants will earn 2 CPE Credits for this track.

After attending this track, participants will be able to:

  • Determine the critical role of Enterprise Digital Identity
  • Recognize how an identity-first approach amplifies security measures, ensuring robust defenses against evolving threats
  • Determine why adaptive and scalable architectures are crucial for future-proofing Identity and Access Management (IAM)
  • Discuss strategies for optimal IAM hygiene, reducing vulnerabilities, and optimizing user experience
  • Recognize the tools and technologies that enable cohesive identity management across diverse user bases
  • Identify the increasing and evolving nature of threats targeting IAM systems
  • Recognize the power of data strategies in enhancing identity management protocols
  • Discuss how generative AI applications and analytics can revolutionize IAM

Field of Study: Information technology
Prerequisites: Experience in the field of Information Security
Advance Preparation: None
Program Level: Intermediate
Delivery Method: Group Live (on-site attendance only)

To register for this session, book your Conference Ticket here.
In order to be awarded the full credit hours, you must attend the whole track on-site, which will be controlled after the Conference.
To redeem your CPE credits, please fill and submit the CPE application form after the conference.
After we have checked your attendance, you will receive your CPE certificate.

Refunds and Cancellations:
There will be no fees for cancellations up to 30 days before the beginning of the event. For cancellations between 30 and 14 days before the conference, we will charge an administration fee of 50% of the participation fee. For cancellations later than this, we will charge the total conference fee. The cancellation must be in writing.  
For more information regarding refunds, complaints, and/or program cancellation policies please contact our Events team via eventsteam@kuppingercole.com


Moderation

Digital identity futurist and strategist
Venn Factory
Research Analyst
KuppingerCole

Sessions

June 06, 2024
11:00 - 11:20
Securing Workload Identities: Best Practices for Tokenizing Third-Party API Keys and Access Tokens
Stolen secrets and credentials are one of the most common ways for attackers to move laterally and maintain persistence in cloud environments. Modern cloud deployments employ secrets management systems such as KMS to protect key materials at rest and avoid leaking keys or credentials in source code or other build artifacts. However, secrets are unprotected at runtime, so any vulnerability or compromise of a service could lead to credential theft. This talk will propose an architecture that,...

SlashID


June 06, 2024
11:20 - 11:40
Facilitating Ownership in External Authorization
In a world where authorization is externalised, ownership often still relies with decentralised application teams to allow for organisational scalability. Autonomy of these teams is important so that they can move fast. Zalando has 2000+ inhouse applications owned by 100s of engineering teams who will use externalised authorization. Each of these teams will write their own authorization policies as code using Open Policy Agent. This talk will share insights into how we started treating...



June 06, 2024
11:40 - 12:00
Appropriate Level of Assurance - A Foundation for Proper CIAM
There is no good or bad Level of Assurance to root any CIAM upon. It all depends on the business and the risks. A unique mix of business, legal, IT security, technical, and CX skills is required to discover, define, and communicate requirements for customer authentication methods. The correct balance between these factors brings peace of mind and enablement to the business. Hear some highlights of If P&C Insurance's journey of defining and enforcing a Level of Assurance aligned with...

If P&C Insurance


June 06, 2024
12:00 - 12:20
IAM With - or Against ITSM
Everyone wants to integrate their access request processes into ITSM, but what is the reality behind this? What kind of integrations are required, what are the pros and cons of requesting access through the ITSM solution instead of the IAM solution. This talk is based on several (long) discussions with several clients

PwC Denmark


June 06, 2024
12:20 - 12:40
To SaaS or Not to SaaS
This talk will share lessons learned from migrations to SaaS based IAM… and what best in class tech looks like if you need to stay-on premises but want the benefits of SaaS.Outline:1. Trends in the market, crossroads our clients our on and the adoption/relevance of SaaS based IAM.2. All SaaS-IAM is equal, but some are more equal than others (differences in maturity across AM, IGA and PAM).3. How maturity and these differences impact implementations and success.4. What can you do about...



June 06, 2024
12:40 - 13:00
Implementing Access Certification
This session will explain how Philips implements access certification, how it helped to improve security, and why they have not got tired yet.

Philips


Secure your ticket
Be quick before the Early-bird Discount expires in
00d 00h 00m 00 s
Get a ticket
Almost Ready to Join EIC 2024?
Reach out to our team with any remaining questions
Get in touch