Event Recording

Vickus Meyer: Nedbank Identity & Access Governance Fundamentals in Action

Vickus Meyer
Executive Group Technology Function
Vickus Meyer
Vickus is an information/cyber security professional  with over 18 years’ experience spanning business leadership, security transformation, architecture, design and implementation of technology enabled security capabilities to meet business objectives. Vickus leads the identity and...
View profile
Enterprise Identity Success
Event Recording
Matthias Reinwarth: The Three Fundamentals of Enterprise Identity Success - My Take
Sep 08, 2020
Event Recording
Mike Kiser: 13 Treasures in 81 Minutes: The Isabella Stewart Gardner Heist and Identity as the New Vermeer
Sep 08, 2020

In the early hours of March 18th, 1990, two men entered the Gardner Museum. They left 81 minutes later with 13 artworks, including two Rembrandts, a Vermeer, a Degas, and ancient Chinese vase.  The heist remains unsolved today, with no leads and no suspects — and the museum is offering a $10 million prize for the safe return of the pieces.

Given that background, you might assume that this was another session about zero trust. It’s not.

Recently, a growing emphasis on data privacy has sought to treat identities and their associated data as valuable works of art as well, worthy of protection and compensation for use. Through the lens of the Gardner Theft, we’ll evaluate the current proposals and concepts around user-owned data and explore the benefits and pitfalls of each.

We'll step through the heist, recreate those 81 minutes, and discover how identity data is the new Vermeer. Note: If we somehow crack the case together, we'll split the $10 million between us all.

Event Recording
Neeme Vool: Implementing IAM in the Enterprise: 3 Takeaway Gems from Engineer
Sep 08, 2020

IAM implementations are not all same, but for sure there is not as many implementations as there are situations.I have selected 3 major factors which defined our IAM project. Of course, final result was a consequence of lot more things.

And yes, we succeeded to implement full Identity lifecycle in the enterprise where starting point is a complex matrix of requirements like multiple legal entities, multiple contracts, kinds of work relationships, several account directories, manual processes.

Just name any situation, we had it. We were on the edge of failure and almost ready to add yet another failed IAM project to the list. But we made it and if I had to do it yet again in another place, in another situation, I would take these 3 with me.


-Correct data is vital for every IT project, IAM is not special. But where to exactly look in the IAM project? Which issues with the data are toxic?

-The analysis of the system drives implementation architecture and design. Thereby the steering must be correct.

-And finally, how to bring it out in the enterprise scale if you cannot do big bang but same time you cannot left anybody behind?

Event Recording
Morey J. Haber: 10 Steps to Universal Privilege Management
Sep 08, 2020

Virtually every cybersecurity breach today involves the exploitation of privileged access. Privileges are initially exploited to infiltrate an IT environment; once compromised by threat actors, privileges are further leveraged to move laterally, access assets, install malware, and inflict damage.

In this session, learn 10 key steps to achieving Universal Privilege Management, and how it is used to secure every user, session, and asset across your IT environment. Covered topics include: 

  • Why relying on password management alone leaves dangerous gaps in protection
  • Disrupting the cyberattack chain with privileged access security controls
  • Essential steps to achieving rapid leaps in risk reduction
  • Keys to a frictionless PAM solution that is invisible to end users

We will also share how the BeyondTrust Privileged Access Management (PAM) platform enables absolute control over every privilege in your environment to drastically reduce your attack surface and windows of exposure, while boosting business productivity.

Event Recording
Henk Marsman: Moving From the Dark Age of Legacy to the Era of Enlightenment
Sep 08, 2020

In this presentation Henk will share the journey that Rabobank made from a situation in 2017 with two solutions and infrastructural environments for IAM and two teams, that merged and went on a journey to become one, as well as overcoming the legacy environments that delivered the service. The presentation details especially the management of this journey and how to move from A to B to C to D to Enlightenment. And perhaps we're not even there yet.

The presentation will detail our specific journey, but general key takeaways can be identified that apply to any IAM department and service.

Event Recording
Loren Russon: Good Enough is Never Enough When Protecting Your Business Resources & Customer’s Data
Sep 08, 2020

Technology is evolving quickly and keeping pace requires deep knowledge and experience. Enterprises are also evolving quickly and demand advanced but simple identity solutions to successfully fast track digital transformation, cloud adoption and Zero Trust initiatives. By utilizing “Best of Breed” solutions, organizations can take advantage of the key benefits that only a multi-vendor solution can offer. Join this session to learn about the core principle of best of breed solutions and hear about some examples of what organizations have done to build the right foundation for Enterprise Identity Success.