Identity Access Management (IAM) – Reducing Risk and Giving Better CX to Users: Chicago (Rosemont/O’Hare), Illinois



April 4, 2024




7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded


Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois




Identity continues to be foundational to cybersecurity and the running of your business from hybrid work to customer access. Conventional approaches to identity and access management (IAM) are no longer sufficient as organizations operate in an escalating threat environment where zero trust is a must-have.

What You Will Learn


In this one day conference attendees will learn:

  • Maximizing Business Value with IAM Maturity Assessment
  • Security, Identity, Operations- Sharpening the Value of IT
  • Sharpening IT Influence in the Board Room With Risk, Value, and Cost
  • Architecting Identity-First Security and Zero Trust Implementations
  • Reducing Risk & Giving Better User Experience to Their Customers
  • How to Streamline Internal IT Processes

Conference Price: $299.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.




8:00am – 9:00am: Registration and Continental Breakfast

9:00am – 9:50am: How to Build a World Class Identity Program

Jigar Shah, Global Head of Identity, Access and Application Security, Tenet Healthcare 




9:50am – 10:20am: Refreshment Break

10:20am – 11:10am: Pivot! – How to Achieve Identity Centric Cybersecurity

Joe Raschke, Business Value Advisor, Saviynt


As cybersecurity technologies evolve, so does your attack surface. This session will discuss fixing broken processes and pivoting from network, device, and application security into an identity-based approach.

Joe will show you how to leverage past approaches to risk-based analysis and tie it to program value and specific outcomes—not just outputs. Topic includes:

• History of cybersecurity – patching holes!
• Standards-based rules of the road
• Compliance and audit programs
• Devil’s Details: identity is the heart of the matter
• Approach and align business enablement through people, processed, and then technology
• Document the value of your program

Call to action:
Get engaged – Identity and show value – Show impact – tell a complete story – be a real hero!




11:10am – 12:00pm: How to Be Successful With Privileged Access Management (PAM)


Privilege access management is a cybersecurity strategy to control, monitor, secure and audit all identities across an IT environment.

In this session, attendees will learn:

How to integrated PAM into any security program
How to leverage PAM
How to raise your security posture with PAM


12:00pm – 12:50pm: Authentication and User Experience: Hot to Avoid Pitfalls


Authentication is one of the first interactions a customer has with your service or product. While authentication security is paramount in terms of importance, all security and customer facing teams must understand that CX can make or break the relationships with consumers of your product.

In this session attendees will learn:

The benefits of optimizing the user experience

The characteristics of a seamless authentication experience

How internal teams should work together to achieve this

12:50pm – 1:30pm: Lunch and Exhibit Break

1:30pm – 2:20pm: Best Practices in Communicating the Business Value of Identity & Cybersecurity to the Business


For many information security executives ROI has been a challenging topic to address, but nonetheless it is essential to speak in terms the business can understand as it relates to their day to day activities

This session will cover these areas and more as it related to Identity and Security overall:


2:20pm – 2:50pm: Refreshment Break


2:50pm – 3:40pm: How to Build a Robust IAM Program Management COE

The establishment and delivery of an IAM Program is essential to delivering Identity First security. Identity teams need to understand and communicate the role that identity plays within your enterprise to enable your employees, customers and business partners to deliver on their goals.



3:40pm – 4:30pm:


How Identity Leaders Build Robust Relationships with other Partners like InfoSec, EA, IT Operations and the Business (Panel Discussion)



In this session, attendees will from a panel of Identity leaders as to how they build relationships with other IT and business units.
They will discuss strategies, tactics and pitfalls to be avoided.



As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.