From ensuring security to enabling digital transformation

Inaugural e-Crime & IdAM Forum
London, 18th October 2018

How next gen IdAM improves security, compliance and the bottom line

 

Securing digital identities, boosting compliance

Identity and access management is a critical part of any enterprise security plan. But much more than that, it is increasingly the key to successful digital transformation, as businesses strive to adapt to the new economy and start to use IdAM to drive both employee productivity and customer engagement. 

Compromised user credentials and poorly managed access frameworks have long been identified as a critical security weakness. And this weakness is exacerbated by the new commercial and customer engagement models that have extended the identity boundary of today's digital businesses. 

So which IdAM solutions best satisfy the needs of security professionals who now need to manage identities and access across a huge variety of employees, partners, and customers, device access methods, and hosting models? 

And how can IdAM help with the increasing regulatory burden of initiatives such as GDPR?

 

Supporting new business initiatives

Conventional IdAM strategies and solutions have tended to be tactical: they have been viewed as the answer to a discrete security and/or compliance issue. However, is this enough?

Companies now realise that their IdAM programmes have to cope with new partnership and customer engagement models and the extended identity boundary of today's digital businesses. Unless employees can operate with the technology they need, in the locations they want at the speed they need, the business suffers. And if customer journeys are too complex or annoying, the business suffers. 

Good IdAM strategies and technologies are critical to the success of these new internal and external business models. So what should CISOs be doing in the IdAM space to maximise benefits to the business and how can they use IdAM metrics to get senior management buy-in?

And what about the future of IdAM? From single-sign-on to multi-factor authentication to biometrics, security professionals need to future-proof their IdAM infrastructure. What are the key priorities? 

 

The e-Crime & IdAM Forum will cover these and other key subjects for its audience of professionals tasked with safeguarding digital assets and sensitive data. There will be real-life case studies, strategic talks and technical break-out sessions to help end-users understand how these new technologies can be cost-effectively deployed in real-life business situations.

  • Securing digital identity

    • Compromised credentials as a key entry point: reduce the risk
    • Improving privileged user account controls
    • Managing identities cost effectively
  • Implementing a successful IdAM strategy

    • Setting out clear objectives and getting stakeholder buy-in
    • Demonstrating the security and monetary benefits of IdAM
    • Ensuring agility and scalability
  • IdAM as a business enabler in the digital economy

    • Balancing greater user access control with business agility and productivity
    • Ensuring that IdAM protects customers without disrupting their experience 
    • Identity competence as a competitive advantage 
  • Metrics and KPIs in IdAM

    • Identifying and monitoring IdAM numbers
    • Separating the significant from the noise with behavioural analysis
    • Predicting risk from IdAM KPIs
  • Identity as a service

    • Better security and cost savings too – what’s the catch?
    • Adaptive multi-factor authentication, single sign-on, universal directories – what is the best way to use IdaaS?
    • Choosing an IdaaS provider
  • Managing IoT and mobile device authorization

    • Mobile and IoT devices are critical to digital transformation – but how well do current IdAM solutions cope?
    • The privacy problem of IoT IdAM
  • What’s next for IdAM? New technologies and techniques

    • Geolocation, biometrics, multi-factor authentication, mobile push authentication, adaptive access control – help!!
    • Identity analytics and ‘Smart IdAM’
    • AI’s role in optimizing IdAM programmes

Who attends?

Job titles

Technical Service Engineer, Identity and Access Management
Identity Fraud
Manager - Logical Access
Identity Protection & Verification Technical Consultant
Identity Security Specialist
Identity and Access Manager
Senior Associate - Identity & Access Management, Technology Operations
Identity, Risk & Governance Sales Manager
CISO APAC Access Control
Director of Customer Access and Experience
Head for Global Identity and Access Management
Identity Fraud
Identity & Access Management Subject Matter Expert
Identity Protection & Verification Technical Consultant
Identity Access Management
Director, Information Security - Global Head of Identity & Access Management
Identity & Access Management
Identity Protection & Verification Technical Consultant
Director, Experian Identity and Fraud
Conditional Access System Specialist
Chief Architect & Group CTO, Application Security & Identity Products
Digital Private Banking - Access & Security
Identity and Security
Identity & Access Management
Fraud & Identity Solutions Manager
Security Operations & Identity Management Consultant
Identity & Access Management
Identity, Access & Security Sales Consultant
Identity & Access Management
Identity & Access Management
Identity & Access Manager - CISO office
Security Operations & Identity Management Consultant
Senior Associate - Identity & Access Management, Technology Operations
Identity & Access Management
Identity & Access Management
Identity Protection & Verification Technical Consultant
Project Manager - IT Privilege Access Management
Identity & Access Management
Global Fraud & Identity
Regional Sales Manager - Identity & Data Protection
Identity Protection & Verification Technical Consultant
Chief Information Security Officer
Chief Information Security Officer
Chief Information Security Officer
CISO
CISO
CISO
CISO
CISO, Head of Digital Security & Risk
CISO, Head of Information Security
Director , Technical Investigations
Global IS Manager
Chief of Cybercrime Section
Head of Technical Support
Director Enterprise Technology
Head of Group I.T.
Chief Risk Officer
Head of Cybercrime Unit
Global Head of IT Security
CIO
Head of Cybercrime Investigations
Head of Information Security
Head of Information Security
Director Global Investigations
Group I.T. Security Officer
Head of Risk & Resilience
Head of I.T. Security Operations
Director
Group I.T. Audit Manager
Head of Information Security
Group CISO
Global Head of Fraud Investigations
Head of Information Security
Group Infrastructure Manager
Head of I.T.
Global Head of Cyber Intelligence
Head of Payment & Financial Crime
Head of Internal Audit
Head of Fraud Oversight
Group Finance & Compliance Director
Head of Business Risk
Head of Operational Risk Management
Group Data Security Manager
Global Security Manager
Head of I.T. Security
Head of Customer Security
Chief Information Officer
Director of Security
Head of Payments
Head of I.T. Security
Head of Cyber & Investigations
Head of Information Security
Head of Penetration Testing
Global Manager, Service Continuity
Global Head I.T. Governance
Director, Information Security
Chief, Cyber Crimes
Head of Investigations
Chief Executive
Group I.S. Manager
Head of Information Security Risk
Head of Global I.T. Security
Head of Digital Risk
CIO Risk Manager
Head of IT Risk & Control
Director of Risk & Compliance
Head of Emergency Response
Head of Business Controls
Director Of Information Security
Director of Security
Chief Security Officer
Director, Global Security
Global IS Risk Manager
Head of Data Protection
Head of ISAG
Group Fraud Manager
Director
Head of Information Security
Global Security Supervisor
Director Group Risk Management
Global Fraud Risk Controller
Head of I.T. Security
Head of I.T. Security Risk Management
Group Information Security Manager
Head of Informantion Security Risk
Head of Payments & Fraud
Head Cybersecurity Operations
Director Cybercrimes
Global I.T. Security & Compliance
Chief Technology Risk Officer
Head of Specialist Crime
Group IT Security Analyst
Head of Policy & Performance
Head of Internal Audit
Head of Operational Security
Head of Operations & Infrastructure
Head of Cyber Threat Intelligence

Companies

Trafigura
GE Capital
Babcock International Group
Scotia Gas Networks
Telefónica O2
Bank of America Merrill Lynch
ING
Catella Bank
Channel 4
H&M
BP
John Lewis Partnership
Royal Canadian Mounted Police
Experian
Jordan Cyber Crime Project
Zamir Telecom
John Wiley & Sons
Halma
Zurich Financial Services
Security Service of Ukraine
HSBC
British Medical Association
Romanian Directorate
TUI Travel
Markit
Western Union
Pennant International Group
TSL Education
Liverpool Victoria
The Finance Practice
Camelot Group
Capital One
Noble Group
HSBC
Dixons Carphone
Halma
Ghana International Bank
British American Tobacco
First Rate Exchange Services
Unum Provident
Santander
Rexam
Matalan
John Lewis Partnership
Home Retail Group
Allen & Overy LLP
ITV
Virgin Money
Spamhaus
Rank Group
EveryMatrix
Shop Direct
Sky
QVC
Lloyds Banking Group
General Motors Corporation
Tullett Prebon
Atcore Technology
Department of Homeland Security
Aviva
CIFAS
Premier Oil
HSBC
Rothschild
HSBC
Liverpool Victoria
Permanent TSB
Auto Trader
Public Health England
Selfridges
NBC Universal
Office of Civil Nuclear Security
UBM
Citigroup
SABMiller
Legal & General
Post Office
JD Sports
CERT-UK
Eurostar
Mayer Brown LLP
Swiss Re
UBS
Open University
The Bank of Tokyo - Mitsubishi UFJ
Dixons Carphone
Post Office
JustGiving
Bank of America Merrill Lynch
FIA Pakistan
Norgren
GE Capital
City of London Police
Unipart Group
Heathrow
Inmarsat
Modern Times Group
Ocado
Capital One

Industries

Banking
Industrial Engineering
Industrial Engineering
Oil/Gas
Telecommunications
Banking
Banking
Banking
Media
Retail
Oil/Gas
Retail
National Law Enforcement
Banking
National Law Enforcement
Telecommunications
Retail
Electronic/Electrical Equipment
Insurance
Central Government
Banking
Healthcare
National Law Enforcement
Travel/Leisure/Hospitality
Media
Banking
Aerospace/Defence
Media
Insurance
Banking
Casinos/Gaming
Banking
Mining/Metals
Banking
Retail
Electronic/Electrical Equipment
Banking
Food/Beverage/Tobacco
Banking
Insurance
Banking
Household/Personal Products
Retail
Retail
Retail
Legal
Media
Banking
Charity
Casinos/Gaming
Software
Retail
Media
Retail
Banking
Automobiles/Parts
Banking
Banking
Central Government
Insurance
Central Government
Oil/Gas
Banking
Banking
Banking
Insurance
Banking
Media
Central Government
Retail
Media
Central Government
Healthcare Services
Banking
Food/Beverage/Tobacco
Insurance
Transportation/Shipping
Retail
National CERT
Transportation/Shipping
Legal
Insurance
Banking
Education
Banking
Retail
Transportation/Shipping
Charity
Banking
National Law Enforcement
Industrial Engineering
Industrial Engineering
Regional Law Enforcement
Transportation/Shipping
Transportation/Shipping
Telecommunications
Media
Transportation/Shipping
Banking


Venue

Park Plaza Victoria, London

vpp

Location:
Park Plaza Victoria
239 Vauxhall Bridge Road, London, SW1V 1EQ. UK
Telephone: 0844 415 6752
 

Directions:
Please click here