Skip to content

PAST EVENTS


Identity Access Management (IAM) – Reducing Risk and Giving Better CX to Users: Chicago (Rosemont/O’Hare), Illinois

July 11, 2024

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois


Overview

Identity continues to be foundational to cybersecurity and the running of your business from hybrid work to customer access. Conventional approaches to identity and access management (IAM) are no longer sufficient as organizations operate in an escalating threat environment where zero trust is a must-have.


What You Will Learn

In this one day conference attendees will learn:

  • Stop Screwing Up IDAM, Some Practical Tips From My Failures
  • How to Tie Identity to Business Outcomes and Continuity
  • The Impact of AI on Identity and Access Management – Best Practices
  • How to Implement an Identity Governance and Access Center of Excellence
  • How to Build and Identity First Security Architecture
  • How to Partner with Business Stakeholders to Ensure Success of Your Identity Program (Panel Discussion)

CONFERENCE AGENDA


8:00am – 9:00am: Registration and Continental Breakfast


9:00am – 10:00am: Stop Screwing Up IDAM, Some Practical Tips From My Failures

Ricardo Lafosse, CISO, KraftHeinz

In this session, thought leader and prominent CISO, Ricardo Lafosse will detail KraftHeinz’s Identity Transformation and how it empowered the business.

LaFosse

 


10:00am – 10:30am: Refreshment & Exhibit Break


10:30am – 11:30am: Building a Strong IGA Foundation – Preparation, Build and Maintenance

Brian Cap, Practice Director, IGA, Guidepoint Security

Paramita Chakraborty, Practice Lead, IGA, Guidepoint Security

Building a strong IGA foundation is crucial for a successful IAM program in the long term. Identity serves as the core of any IAM initiative, highlighting the need for proactive measures in preparation for automation. Involving the right stakeholders from the outset and ensuring good data hygiene are essential steps in this process. Effective automation hinges on robust inter-departmental communication and executive sponsorship to drive the adoption of improved processes. Post-automation, tailored efforts are required to oversee daily operations while maintaining a focus on continuous enhancements and optimization.

Cap                  Chakraborty

 


11:30am – 12:30pm: Fireside Chat: How to Deliver a Delightful Identity User Experience

Adam Cole, Founder, Extra Security; Director of Security Operations, Fountain Life

Will Schneider, Manager, Identity & Access Management Operations, Delta Dental Ins.

Matt Stiak, Director Cyber Risk Management, Delta Dental Ins.

 

Cole                      Schneider              Stiak


12:30pm – 1:30pm: Lunch & Exhibit Break


1:30pm – 2:30pm: Why Your Zero Trust Journey Should Start with Identity Security

David Morimanno, Director of IAM Technologies, Integral Partners

Many organizations are now embarking on a Zero Trust journey to help them move towards a more secure framework. This shift involves rethinking the Identity, Networking, and Security domains through a Zero Trust lens. Success relies on finding the optimal integration of these domains.

This presentation will provide you with a clear understanding of how Identity and Access Management is the cornerstone of a successful Zero Trust strategy, enabling organizations to enhance their security posture and minimize the risk of data breaches and unauthorized access.

Key takeaways:

  • Understand the core principles and benefits of Zero Trust and the critical role Identity plays
  • How building strong Identity practices contribute to a robust security posture
  • Learn what an integrated Zero Trust program looks like
  • Discover tools and strategies you can use to improve your Identity program

Morimanno


2:30pm – 3:00pm: Refreshment & Exhibit Break


3:00pm – 4:00pm: How to Implement an Identity Governance and Access Center of Excellence (Breakout Session)

There is a critical gap that exists today in IGA’s time-to-value, and many programs fall at risk, end up failing, or do not instill business confidence.


4:00pm – 5:00pm: How to Partner with Business Stakeholders to Ensure Success of Your Identity Program (Panel Discussion)

The main mistake most organizations make when rolling out an IAM strategy is failing to secure support and sponsorship from the company’s executive leadership team. Identity security should never rely on the CISO or CIO to manage and communicate. All business leaders must share the same strategic vision around IAM and drive it within the organization to succeed.

Moderated by: Paramita Chakraborty, Managing Security Advisor, IAM, GuidePoint

Panelists will include:

  • Greg Carlson, Identity and Access Manager, Milwaukee Tool
  • Rob Civitello, Sr. Director, Identity & Access Management, Alight Solutions
  • Paul Glidden, Security Architect, Procore Technologies
  • Michelle Hames, Identity & Access Administrator, Corporate, Group O
  • Additional Identity & Access Management Executives sharing strategies, tactics and lessons learned

Carlson               Civitello              Glidden                Hames

 


Conference Price: $299.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.


CONFERENCE SPONSORS