Tuesday, March 26, 2024
Opening remarks and introductory presentation: Constructing an identity mousetrap

Our sponsor talks to Ed Moore, AVP of Security - Identity and Access Management, Carnival Corp., about how to construct the better identity mousetrap he touched upon during the opening presentation.

Ed Moore
Breakout Session | A Better Way to IGA

We'll focus on how to think about Identity Governance as more than just a compliance tool. It’s imperative in building out an enterprise-ready security strategy. We highlight the pitfalls of DIY approaches and traditional solutions, and present Okta as a unified platform that helps to accelerate governance needs for IT and GRC teams.

Andrei Velicanu
Breakout Session | Cyberwar and Theft: Attacker Methods, Motivations and Building a Strategic Defense

Get in the minds of Criminals, Nation States and Hacktivists.  Join us to explore the motivation, and cutting-edge tactics of today’s threat actors.  Our resident experts, Andy Thompson, and Brandon McCaffrey will unravel the intricacies of recent attacks and evolving threat methods that jeopardize your organization. 

McCaffrey and Thompson are your guides to a robust defense, sharing strategies tailored for the modern battlefield.  Discover actionable steps to fortify your defenses, ensuring enhanced security without compromising user experience or productivity. Don't just stay secure; stay ahead.

Andy Thompson Brandon McCaffrey
Breakout Session | Identity Orchestration: Where Zero Trust Security Meets Usability

Zero trust architecture has become more actionable than ever thanks to evolving NIST and CISA guidance, yet many organizations still have fundamental problems advancing maturity when it comes to incorporating the right vendors at the right time in their journey to zero trust. Join this session to learn how identity orchestration makes it possible for anyone -- not just coding experts -- to create and deploy secure user experiences.Identity Orchestration: Where Zero Trust Security Meets Usability

Max Fathauer
War stories in identity: A panel discussion

IAM specialists share compelling narratives and firsthand experiences from the front lines of identity security: from battling evolving cyber threats to navigating the complexities of user access and authentication. Panelists will offer valuable insights and lessons learned. Explore the strategies employed to safeguard digital identities, mitigate risks, and ensure seamless user experiences in the face of adversity.

Ed Moore Akira Brand Chul Choi
CRA Business Intelligence study takeaways: Identity and access

Join Daniel Thomas for a look at where security teams continue to struggle/succeed, and where respondents plan to make investments in the coming year.

Daniel Thomas
Defining & Building an Identity Graph

In today’s world, there is no single source of truth for workforce identity. The traditional corporate directory is now just one of many components in a complex identity synchronization process that spans on-premises and cloud-based directories, HR systems, a multitude of SaaS applications, and directories for public cloud credentials. The blurring of definitional lines between internal, external, and consumer identities and the complications arising from mergers, acquisitions, and contract work all compound the issue. 
 How do we make sense of identity in the modern environment? And, more importantly, how do transform identity from a tangled mess into a powerful tool that can inform our access and security decisions? The answer lies in building an identity graph. 
In this workshop, you will learn about the concept and value of an identity graph – but also how to approach building one. The content will cover key architectural and data concepts to consider in attempting to reconcile, organize, and distill identity data into valuable, actionable insight.

Alex Zaslavsky Didi Dotan
Constructing an identity mousetrap and wrap-up

Our sponsor talks to Ed Moore, AVP of Security - Identity and Access Management, Carnival Corp., about how to construct the better identity mousetrap he touched upon during the opening presentation.

Khizar Sultan