PAST EVENTS

Identity Access Management (IAM) – Reducing Risk and Giving Better CX to Users: Chicago (Rosemont/O’Hare), Illinois

 

July 11, 2024

 

9:00am-5:00pm

 

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

 

Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois


Overview

 

Identity continues to be foundational to cybersecurity and the running of your business from hybrid work to customer access. Conventional approaches to identity and access management (IAM) are no longer sufficient as organizations operate in an escalating threat environment where zero trust is a must-have.


What You Will Learn

 

In this one day conference attendees will learn:

  • Stop Screwing Up IDAM, Some Practical Tips From My Failures
  • How to Implement an Identity Governance and Access Center of Excellence
  • Why Your Zero Trust Journey Should Start with Identity Security
  • Building a Strong IGA Foundation – Preparation, Build and Maintenance
  • Fireside Chat: How to Deliver a Delightful Identity User Experience
  • How to Partner with Business Stakeholders to Ensure Success of Your Identity Program (Panel Discussion)

CONFERENCE AGENDA


8:00am – 9:00am: Registration and Continental Breakfast


9:00am – 10:00am: Stop Screwing Up IDAM, Some Practical Tips From My Failures

 

Ricardo Lafosse, CISO, KraftHeinz

 

In this session, thought leader and prominent CISO, Ricardo Lafosse will detail KraftHeinz’s Identity Transformation and how it empowered the business.

 

 

LaFosse

 


10:00am – 10:30am: Refreshment & Exhibit Break


10:30am – 11:30am: Building a Strong IGA Foundation – Preparation, Build and Maintenance

 

Brian Cap, Practice Director, IGA, Guidepoint Security
Paramita Chakraborty, Practice Lead, IGA, Guidepoint Security

 

Building a strong IGA foundation is crucial for a successful IAM program in the long term. Identity serves as the core of any IAM initiative, highlighting the need for proactive measures in preparation for automation. Involving the right stakeholders from the outset and ensuring good data hygiene are essential steps in this process. Effective automation hinges on robust inter-departmental communication and executive sponsorship to drive the adoption of improved processes. Post-automation, tailored efforts are required to oversee daily operations while maintaining a focus on continuous enhancements and optimization.

 

 

Cap                                   Chakraborty

 

 


11:30am – 12:30pm: Fireside Chat: How to Deliver a Delightful Identity User Experience

 

Adam Cole, Founder, Extra Security; Director of Security Operations, Fountain Life

Will Schneider, Manager, Identity & Access Management Operations, Delta Dental of California

Matt Stiak, Director Cyber Risk Management, Delta Dental of California

 

 

Cole                          Schneider                   Stiak

 

 


12:30pm – 1:30pm: Lunch & Exhibit Break


1:30pm – 2:30pm: Why Your Zero Trust Journey Should Start with Identity Security

 

David Morimanno, Director of IAM Technologies, Integral Partners

 

Many organizations are now embarking on a Zero Trust journey to help them move towards a more secure framework. This shift involves rethinking the Identity, Networking, and Security domains through a Zero Trust lens. Success relies on finding the optimal integration of these domains.

 

This presentation will provide you with a clear understanding of how Identity and Access Management is the cornerstone of a successful Zero Trust strategy, enabling organizations to enhance their security posture and minimize the risk of data breaches and unauthorized access.

 

Key takeaways:

  • Understand the core principles and benefits of Zero Trust and the critical role Identity plays
  • How building strong Identity practices contribute to a robust security posture
  • Learn what an integrated Zero Trust program looks like
  • Discover tools and strategies you can use to improve your Identity program

 

 

Morimanno

 


2:30pm – 3:00pm: Refreshment & Exhibit Break


3:00pm – 4:00pm: Breakout Session: How to Implement an Identity Governance and Access Center of Excellence

 


4:00pm – 5:00pm: How to Partner with Business Stakeholders to Ensure Success of Your Identity Program (Panel Discussion)

 

The main mistake most organizations make when rolling out an IAM strategy is failing to secure support and sponsorship from the company’s executive leadership team. Identity security should never rely on the CISO or CIO to manage and communicate. All business leaders must share the same strategic vision around IAM and drive it within the organization to succeed.

 

Moderated by Paramita Chakraborty, Managing Security Advisor, IAM, GuidePoint

 

Panelists will include:

  • Greg Carlson, Identity and Access Manager, Milwaukee Tool
  • Rob Civitello, Sr. Director, Identity & Access Management at Alight Solutions
  • Paul Glidden, Security Architect, Procore Technologies
  • Michelle Hames, Identity & Access Administrator, Corporate, Group O
  • Additional Identity & Access Management Executives sharing strategies, tactics and lessons learned

 

 

 

     

Chakraborty                            Carlson                     Civitello                  Glidden                     Hames

 

 


Conference Price: $299.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

 

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.


CONFERENCE SPONSORS