PAST EVENTS
Identity Access Management (IAM) – Reducing Risk and Giving Better CX to Users: Chicago (Rosemont/O’Hare), Illinois
April 4, 2024
9:00am-5:00pm
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illino
is
Overview
Identity continues to be foundational to cybersecurity and the running of your business from hybrid work to customer access. Conventional approaches to identity and access management (IAM) are no longer sufficient as organizations operate in an escalating threat environment where zero trust is a must-have.
What You Will Learn
In this one day conference attendees will learn:
- Shedding Light to the Shadow Identities of Modern Security
- Pivot! – How to Achieve Identity Centric Cybersecurity
- How to Build a Robust IAM Program Management COE
- Eliminating Cyberattacks Without User’s Involvement
- Security Renaissance: Why it’s Time to Break with Old-School PAM Solutions
- How to Build a World Class Identity Program
- How Identity Leaders Build Robust Relationships with other Partners like InfoSec, EA, IT Operations and the Business (Panel Discussion)
Conference Price: $299.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
CONFERENCE AGENDA
8:00am – 9:00am: Registration and Continental Breakfast
9:00am – 9:50am: How to Build a World Class Identity Program – KEYNOTE
Jigar Shah, Global Head of Identity, Access and Application Security, Tenet Healthcare
In today’s fast-moving world where the only thing constant is the change. In this transformation – ‘digital and AI centric business’ is the new business, and the business relies on digital trust which is in turn enabled by IAM. IAM programs are at the core of achieving critical business objectives and relevant to every high-performing organization. In this interconnected digital landscape, establishment of robust Identity program is paramount for organizations striving to navigate complexities of modern cybersecurity threats, regulatory compliance & user experience. Context is important in today’s world and modern IAM programs are shifting their focus from just access and provisioning to strategic Identity first security programs. This keynote delves into the essential components of developing world class Identity program to meet evolving needs of today’s business.
Topics include:
- IAM as a catalyst to deliver direct business value
- IAM program to focus beyond tooling and become outcome and risk-based program
- Build a high performing IAM function
- IAM operational model
- IAM focused on user journeys
- IAM value realization
Shah
9:50am – 10:20am: Refreshment Break
10:20am – 11:10am: Pivot! – How to Achieve Identity Centric Cybersecurity
Joe Raschke, Business Value Advisor, Saviynt
As cybersecurity technologies evolve, so does your attack surface. This session will discuss fixing broken processes and pivoting from network, device, and application security into an identity-based approach.
Joe will show you how to leverage past approaches to risk-based analysis and tie it to program value and specific outcomes—not just outputs.
Topics include:
- History of cybersecurity – patching holes!
- Standards-based rules of the road
- Compliance and audit programs
- Devil’s Details: identity is the heart of the matter
- Approach and align business enablement through people, processed, and then technology
- Document the value of your program
Get engaged – Identity and show value – Show impact – tell a complete story – be a real hero!
Raschke
11:10am – 12:00pm: Security Renaissance: Why it’s Time to Break with Old-School PAM Solutions
Martin Cannard, VP, Product Strategy, Netwrix Corporation
In the last twenty years, privileged access management (PAM) has gone through many evolutions to keep pace with the ever-changing cyberthreat landscape. Still, a vital risk remains front and center: Privileged accounts are crucial for the day-to-day work of admins, but they are usually needed for only short periods of time — the rest of the day, they can be compromised by attackers and misused by insiders.
Old-school PAM solutions reduce this risk only to some extent, while being costly and time-consuming to deploy. But it doesn’t have to be this way! In this session, we’ll explore a modern, easy-to-adopt approach that deals with this core problem head-on.
Join this session to learn how you can:
- Leverage privilege orchestration to remove known attack surfaces when at rest
- Dynamically delegate access according to use case without impeding admin efficiency
- Quickly adopt modern PAM tools to centrally control and audit access
Cannard
12:00pm – 12:50pm: Eliminating Cyberattacks Without User’s Involvement!
Thi Nguyen-Huu, Founder and CEO, WinMagic Corp.
WinMagic has raised the bar in disk encryption for over 25 years with continuous innovation and worldwide adoption. When extending our concepts from endpoint to online access, we have uncovered shortcomings, and even fundamental flaws in Zero Trust, Federated Authentication, FIDO and TLS. Our new ways of thinking presented at this conference will help you recognize the current misconceptions and embrace the true possibility of eliminating cyberattacks with NO USER ACTION.
Nguyen-Huu
12:50pm – 1:30pm: Lunch and Exhibit Break
1:30pm – 2:20pm: Shedding Light to the Shadow Identities of Modern Security
Alex Flores, Principal Security Architect, Astrix Security
Identity has become the central focus of security, but are all identities considered? The rise of biometric MFA, passwordless authentication, and impossible travel policies are reshaping the landscape for user access control. However, the challenge persists with non-human identities like service accounts and API keys, which often remain unmonitored and ungoverned. This oversight has not gone unnoticed by cyber attackers.
The upcoming session will delve into the realm of non-human identities, exploring:
- The definition and nature of non-human identities
- The transition of these identities from a technical issue to a broader organizational concern
- The ways in which cyber attackers exploit these overlooked access points
- Strategies that cybersecurity professionals can implement to address this vulnerability.
Flores
2:20pm – 2:50pm: Refreshment Break
2:50pm – 3:40pm: How to Build a Robust IAM Program Management COE
Johnny Shin, Managing Director US, KeyData
The establishment and delivery of an IAM Program is essential to delivering Identity First security. Identity teams need to understand and communicate the role that identity plays within your enterprise to enable your employees, customers and business partners to deliver on their goals.
Shin
3:40pm – 4:30pm: How Identity Leaders Build Robust Relationships with other Partners like InfoSec, EA, IT Operations and the Business (Panel Discussion)
In this session, attendees will learn from a panel of Identity leaders as to how they build relationships with other IT and business units.
They will discuss strategies, tactics and pitfalls to be avoided.
Moderated by: Joe Raschke, Business Value Advisor, Saviynt
Panelists will include:
- Devan D’Silva, Manager Identity & Access Management, Vice President, Risk Management, Robert W. Baird & Co.
- Michelle Hames, Identity & Access Administrator, Corporate, Group O
- Will Schneider, Manager, Identity and Access Management Operations, Delta Dental Insurance
- Jeremy P. Kubik, Director of Managed IT and Security Operations, STIGroup Ltd.
- Judy Jing, Lead IT Security Analyst – Global IAM, Ingredion Incorporated
- Other Enterprise IT Identity Leaders sharing experiences and lessons learned
Raschke D’Silva Hames Schneider Kubik Jing
Conference Price: $299.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
Exhibits
As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.
[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”64px” image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/2″][vc_single_image image=”366239″ img_size=”medium” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://astrix.security/”][/vc_column][vc_column width=”1/2″][vc_single_image image=”366787″ img_size=”medium” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://keydata.ca/”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”64px” image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_single_image image=”366431″ img_size=”full” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://www.netwrix.com/”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”64px” image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”grid” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/2″][vc_single_image image=”366484″ img_size=”medium” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://saviynt.com/”][vc_empty_space height=”16px” image_repeat=”no-repeat”][vc_single_image image=”366796″ img_size=”medium” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”http://https://www.guidepointsecurity.com/”][/vc_column][vc_column width=”1/2″][vc_single_image image=”366650″ img_size=”large” alignment=”center” onclick=”custom_link” img_link_target=”_blank” link=”https://winmagic.com/en/home/”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”64px” image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][/vc_column][/vc_row]