Identity Management eSummit
Event Agenda

Registration is free!
Watch this space for updates and announcements!

SEPTEMBER 14, 2017

12:00 PM ET eSummit opens!

12:10 PM - 12:55 PM ET
KEYNOTE: 
Transformative Trends and Leading Practices in Digital Identity
Dan Blum, Managing Partner and Principal Consultant, Security Architects LLC

Digital identity is central to the digital transformation of modern business. Mobile, cloud, IoT, machine learning, Privacy-by-Design, agile delivery, and other technology trends are evolving at incredible speed – each bearing business opportunity and risk. Major growth opportunities require skillful management of identity lifecycles and relationships with customers, partners, and other constituents.

Industry has responded with an innovative wave of identity standards, products, and cloud-based services. However, the IAM systems many organizations have in place don’t yet scale to growing volumes of people, things, data, and relationships. Others have not yet adapted to new regulatory realities, such as the European Union’s General Data Privacy Regulation (GDPR).

If privacy-related issues such as obtaining consent for use of personal data in marketing are mishandled, companies face heavy penalties. But “checklist compliance” alone doesn’t enable the business to continue to expand its customer base and retain permission to market to international customers covered by privacy regulations. In this virtual keynote, Security Architects Partners Principal Consultant Dan Blum will further explain identity industry trends, challenges, and opportunities. He will identify leading practices and provide actionable recommendations on how to:
• Govern identity and access management (IAM) in the enterprise
• Architect and Integrate across critical data protection, IT service management, and key management touch points
• Embed identity services in the application infrastructure and development process
• Communicate identity knowledge and awareness between stakeholders to maximize operational effectiveness
• Mitigate risks of breach using identity controls to prevent or detect adversaries in the cybersecurity kill chain To fuel the business in the second golden age of identity, we must all be innovators.

12:55 - 1:00 PM ET
BREAK

1:00 - 1:45 PM ET
WEBCAST: Hackers vs. IAM Professional—Who Comes Out on Top?
Franz Wolfhagen
, Senior Management Consultant, IBM Security Services
Rune Espensen, Managing Security Consultant, IBM X-Force

Identity and Access Management is one of your best security controls against cybercrime. But it can’t be an afterthought, it must be the primary weapon in your arsenal. Join IBM for this thought-provoking session, which will pair an ethical hacker with an IAM professional. The ethical hacker will describe how he exploits IAM weaknesses to hack into his clients' organizations, and the IAM pro will discuss how to narrow the attack vector and make his life as difficult as possible. You’ll learn practical real-world advise to use and beat the bad guys.

1:45 - 1:50 PM ET
BREAK

1:50 - 2:30 PM ET
WEBCAST: Digital Identity Management: Moving Beyond Employees and Customers to

the Internet of Things
Ken Wattana, Strategic Content and Market Research Manager, ForgeRock

Identity and access management (IAM) has long been a foundational element of enterprise security. Then, customer identity and access management (CIAM) appeared on the scene and moved things beyond the firewall, gaining traction as a solution for delivering omnichannel customer experiences, protecting personal data privacy, and building trusted customer relationships. Where do we go from here? With Gartner expecting over 20.5 billion devices to be online by 2020, the internet of things (IoT) is the next big challenge and digital identity management is the solution The ability to extend identity to support not only employees and customers but devices and things as well will be critical in all industries. In this webcast, you'll learn:
• What is driving the shift to digital identity management
• Why an IAM or CIAM platform is not the right solution for IoT
• How to identify a future ready digital identity management platform

2:30 - 2:35 PM ET
BREAK

2:35 - 3:25 PM ET
WEBCAST: Top Considerations When Selecting an IDaaS Vendor

Martin Kuppinger, Founder and Principal Analyst, KuppingerCole
Teresa Chen, Director of Product Marketing, Centrify

Cloud Identity and Access Management (IAM), or Identity and Access Management as a Service (IDaaS), is one of the fastest growing segments in the Security and Identity markets. By 2020, it is predicted that 40% of IAM purchases will use the IDaaS delivery model, a two-fold increase from less than 20% today. This explosive growth is fueled by the need to protect identities for hybrid enterprises, operational advantages and integration of business partners and consumers in the age of digital transformation. As businesses continue to move their data and application functions into the cloud, choosing the right IDaaS vendor is a critical decision to make. Join Martin Kuppinger, Founder and Principal Analyst at KuppingerCole, a leading global analyst focusing on Information Security, to discuss critical criteria for evaluation when it comes to choosing the right IdaaS vendor. Attendees of this webcast will take away the following:
• Key criteria for selecting an IDaaS vendor
• Best practices in protecting all of your enterprise identities
• Consideration strategies for hybrid enterprises


3:25 - 3:30 PM ET
BREAK

3:30 - 4:15 PM ET
WEBCAST: Privileged Attack Vectors - Building Effective Defense Strategies to Protect Organizations
Morey Haber, VP of Technology, BeyondTrust

Cyber-attacks continue to increase in volume and sophistication. As a result, data breaches are no longer surprising or even news worthy. It’s not a matter of if, but a  matter of when you will be successfully breached. This session will provide a comprehensive view of how privileges, passwords, and vulnerabilities are being leveraged as attack vectors and how you can properly take measurable steps to defend against them.

4:15 - 4:30 PM ET
BREAK

4:30 PM ET
eSummit closes

(ISC)² members: (ISC)² members who attend MISTI virtual events or eSummits may be eligible for one CPE credit each applicable webcast subject to (ISC)² approval. Please refer to (ISC)² Guidelines before reporting CPE activity directly on www.ISC2.org