PAST EVENTS

Identity Access Management (IAM) – Reducing Risk and Giving Better CX to Users: Chicago (Rosemont/O’Hare), Illinois

 

April 4, 2024

 

9:00am-5:00pm

 

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

 

Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois


Overview

 

Identity continues to be foundational to cybersecurity and the running of your business from hybrid work to customer access. Conventional approaches to identity and access management (IAM) are no longer sufficient as organizations operate in an escalating threat environment where zero trust is a must-have.


What You Will Learn

 

In this one day conference attendees will learn:

  • Shedding Light to the Shadow Identities of Modern Security
  • Pivot! – How to Achieve Identity Centric Cybersecurity
  • How to Build a Robust IAM Program Management COE
  • Eliminating Cyberattacks Without User’s Involvement
  • Security Renaissance: Why it’s Time to Break with Old-School PAM Solutions
  • How to Build a World Class Identity Program
  • How Identity Leaders Build Robust Relationships with other Partners like InfoSec, EA, IT Operations and the Business (Panel Discussion)

Conference Price: $299.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.


CONFERENCE AGENDA


8:00am – 9:00am: Registration and Continental Breakfast


9:00am – 9:50am: How to Build a World Class Identity Program – KEYNOTE

 

Jigar Shah, Global Head of Identity, Access and Application Security, Tenet Healthcare 

 

In today’s fast-moving world where the only thing constant is the change. In this transformation – ‘digital and AI centric business’ is the new business, and the business relies on digital trust which is in turn enabled by IAM. IAM programs are at the core of achieving critical business objectives and relevant to every high-performing organization. In this interconnected digital landscape, establishment of robust Identity program is paramount for organizations striving to navigate complexities of modern cybersecurity threats, regulatory compliance & user experience. Context is important in today’s world and modern IAM programs are shifting their focus from just access and provisioning to strategic Identity first security programs. This keynote delves into the essential components of developing world class Identity program to meet evolving needs of today’s business.

 

Topics include:

  • IAM as a catalyst to deliver direct business value
  • IAM program to focus beyond tooling and become outcome and risk-based program
  • Build a high performing IAM function
  • IAM operational model
  • IAM focused on user journeys
  • IAM value realization

 

 

Shah

 


9:50am – 10:20am: Refreshment Break


10:20am – 11:10am: Pivot! – How to Achieve Identity Centric Cybersecurity

 

Joe Raschke, Business Value Advisor, Saviynt

 

As cybersecurity technologies evolve, so does your attack surface. This session will discuss fixing broken processes and pivoting from network, device, and application security into an identity-based approach.

 

Joe will show you how to leverage past approaches to risk-based analysis and tie it to program value and specific outcomes—not just outputs.

 

Topics include:

  • History of cybersecurity – patching holes!
  • Standards-based rules of the road
  • Compliance and audit programs
  • Devil’s Details: identity is the heart of the matter
  • Approach and align business enablement through people, processed, and then technology
  • Document the value of your program

 

 

Get engaged – Identity and show value – Show impact – tell a complete story – be a real hero!

 

 

Raschke

 


11:10am – 12:00pm: Security Renaissance: Why it’s Time to Break with Old-School PAM Solutions

 

Martin Cannard, VP, Product Strategy, Netwrix Corporation

 

In the last twenty years, privileged access management (PAM) has gone through many evolutions to keep pace with the ever-changing cyberthreat landscape. Still, a vital risk remains front and center: Privileged accounts are crucial for the day-to-day work of admins, but they are usually needed for only short periods of time — the rest of the day, they can be compromised by attackers and misused by insiders.

 

Old-school PAM solutions reduce this risk only to some extent, while being costly and time-consuming to deploy. But it doesn’t have to be this way! In this session, we’ll explore a modern, easy-to-adopt approach that deals with this core problem head-on.

 

Join this session to learn how you can:

 

  1. Leverage privilege orchestration to remove known attack surfaces when at rest
  2. Dynamically delegate access according to use case without impeding admin efficiency
  3. Quickly adopt modern PAM tools to centrally control and audit access

 

 

Cannard

 


12:00pm – 12:50pm: Eliminating Cyberattacks Without User’s Involvement!

 

Thi Nguyen-Huu, Founder and CEO, WinMagic Corp.

 

WinMagic has raised the bar in disk encryption for over 25 years with continuous innovation and worldwide adoption. When extending our concepts from endpoint to online access, we have uncovered shortcomings, and even fundamental flaws in Zero Trust, Federated Authentication, FIDO and TLS. Our new ways of thinking presented at this conference will help you recognize the current misconceptions and embrace the true possibility of eliminating cyberattacks with NO USER ACTION.

 

 

Nguyen-Huu

 


12:50pm – 1:30pm: Lunch and Exhibit Break


1:30pm – 2:20pm: Shedding Light to the Shadow Identities of Modern Security

 

Alex Flores, Principal Security Architect, Astrix Security

 

Identity has become the central focus of security, but are all identities considered? The rise of biometric MFA, passwordless authentication, and impossible travel policies are reshaping the landscape for user access control. However, the challenge persists with non-human identities like service accounts and API keys, which often remain unmonitored and ungoverned. This oversight has not gone unnoticed by cyber attackers.

 

The upcoming session will delve into the realm of non-human identities, exploring:

 

  • The definition and nature of non-human identities
  • The transition of these identities from a technical issue to a broader organizational concern
  • The ways in which cyber attackers exploit these overlooked access points
  • Strategies that cybersecurity professionals can implement to address this vulnerability.

 

Flores

 


2:20pm – 2:50pm: Refreshment Break


2:50pm – 3:40pm: How to Build a Robust IAM Program Management COE

 

Johnny Shin, Managing Director US, KeyData

 

The establishment and delivery of an IAM Program is essential to delivering Identity First security. Identity teams need to understand and communicate the role that identity plays within your enterprise to enable your employees, customers and business partners to deliver on their goals.

 

 

Shin

 


3:40pm – 4:30pm: How Identity Leaders Build Robust Relationships with other Partners like InfoSec, EA, IT Operations and the Business (Panel Discussion)

 

In this session, attendees will learn from a panel of Identity leaders as to how they build relationships with other IT and business units.
They will discuss strategies, tactics and pitfalls to be avoided.

 

Moderated by: Joe Raschke, Business Value Advisor, Saviynt

 

Panelists will include:

  • Devan D’Silva, Manager Identity & Access Management, Vice President, Risk Management, Robert W. Baird & Co.
  • Michelle Hames, Identity & Access Administrator, Corporate, Group O
  • Will Schneider, Manager, Identity and Access Management Operations, Delta Dental Insurance
  • Jeremy P. Kubik, Director of Managed IT and Security Operations, STIGroup Ltd.
  • Judy Jing, Lead IT Security Analyst – Global IAM, Ingredion Incorporated
  • Other Enterprise IT Identity Leaders sharing experiences and lessons learned

 

 

Raschke                D’Silva               Hames                Schneider              Kubik                  Jing

 


Conference Price: $299.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

 

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.