UPCOMING EVENTS
Identity Access Management (IAM) – Reducing Risk and Giving Better CX to Users: Chicago (Rosemont/O’Hare), Illinois
Strategies to ensure your IAM program enhances the customer experience.
April 14, 2026
9:00am-5:00pm
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois
Overview
Identity continues to be foundational to cybersecurity and the running of your business from hybrid work to customer access. Conventional approaches to identity and access management (IAM) are no longer sufficient as organizations operate in an escalating threat environment where zero trust is a must-have.
What You Will Learn
In this one day conference attendees will learn:
- Redefining Trust: Building a Strategic Identity Framework for the Modern Enterprise
- Integrating IAM with DevOps: Securing the Software Development Lifecycle
- IAM in the Era of Remote Work: Strategies for Managing Distributed Identities
- Leveraging Artificial Intelligence in IAM: Enhancing Threat Detection and Response
- Regulatory Compliance and IAM: Navigating the Complex Landscape
- Customer Identity and Access Management (CIAM): Balancing Security with Seamless User Experience
Conference Price: $349.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
CONFERENCE AGENDA
8:00am – 9:00am: Registration and Continental Breakfast
9:00am – 10:00am: Opening Keynote — Identity Is the New Control Plane
Identity has become the foundation of modern security as organizations shift to cloud, hybrid work, and Zero Trust models. This keynote sets the stage for the day by exploring how IAM now drives risk reduction, business agility, and security strategy.
Includes:
- Evolving identity-driven threat landscape
- IAM’s role in cloud and hybrid environments
- Strategic priorities for IAM leaders
10:00am – 10:30am: Sponsor & Refreshment Break
10:30am – 11:30am: Zero Trust Starts with Identity
Zero Trust depends on continuous verification, and identity is at its core. This session explores how organizations are using IAM to enable Zero Trust architectures while avoiding common implementation pitfalls.
Includes:
- Identity-centric Zero Trust design
- Continuous authentication and authorization
- Real-world implementation lessons
11:30am – 12:30pm: Modern Identity Governance & Administration (IGA)
Managing access at scale requires governance that is both effective and efficient. This session focuses on modern IGA approaches that simplify access lifecycle management while meeting compliance and audit expectations.
Includes:
- Automated joiner, mover, leaver processes
- Smarter access reviews and certifications
- Reducing audit fatigue and operational overhead
12:30pm – 1:30pm: Lunch and Exhibit Break
1:30pm – 2:30pm: Securing Privileged Access in a Cloud-First World
Privileged access now extends far beyond traditional administrator accounts. This session examines how organizations are adapting PAM strategies to secure cloud, SaaS, and DevOps environments.
Includes:
- Managing privilege in cloud and SaaS platforms
- Just-in-time and least-privilege access
- Reducing standing access and privilege sprawl
2:30pm – 3:00pm: Refreshment Break
3:00pm – 4:00pm: Managing Machine & Non-Human Identities
Non-human identities such as service accounts, APIs, and workloads are rapidly increasing and often poorly governed. This session highlights the risks they introduce and how to secure them effectively.
Includes:
- Service account and API identity management
- Secrets management and credential rotation
- Visibility and governance for non-human access
4:00pm – 5:00pm: The Future of Identity & Access Management- Executive Panel Session
Panelists will include Enterprise Identity Executives sharing the strategies, tactics, and lessons learned.
IAM is evolving quickly as new technologies and threats emerge. This interactive panel brings together industry experts to discuss what’s next and how organizations can prepare.
Includes:
- Passwordless adoption realities
- AI’s role in identity decision-making
- Skills and capabilities IAM teams will need
Exhibits
As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.



