Skip to content

PAST EVENTS


 

 Identity Access Management (IAM) – Reducing Risk and Giving Better CX to Users: Chicago (Rosemont/O’Hare), Illinois

 

July 11, 2024

 

9:00am-5:00pm

 

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

 

Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois


Overview

 

Identity continues to be foundational to cybersecurity and the running of your business from hybrid work to customer access. Conventional approaches to identity and access management (IAM) are no longer sufficient as organizations operate in an escalating threat environment where zero trust is a must-have.


What You Will Learn

 

In this one day conference attendees will learn:

  • Stop Screwing Up IDAM, Some Practical Tips From My Failures
  • How to Tie Identity to Business Outcomes and Continuity
  • The Impact of AI on Identity and Access Management – Best Practices
  • How to Implement an Identity Governance and Access Center of Excellence
  • How to Build and Identity First Security Architecture
  • How to Partner with Business Stakeholders to Ensure Success of Your Identity Program (Panel Discussion)

CONFERENCE AGENDA


8:00am – 9:00am: Registration and Continental Breakfast


9:00am – 10:00am: Stop Screwing Up IDAM, Some Practical Tips From My Failures

 

Ricardo Lafosse, CISO, KraftHeinz

 

In this session, thought leader and prominent CISO, Ricardo Lafosse will detail KraftHeinz’s Identity Transformation and how it empowered the business.

 

 

LaFosse

 


10:00am – 10:30am: Refreshment & Exhibit Break


10:30am – 11:30am:  How to Build and Identity First Security Architecture

 

In this session, we will discuss how to protect and put limits on identities, and why identity security should be the first step in securing the enterprise.  The discussion will also focus on being: Consistent, Context-Aware and Continuous.

 


11:30am – 12:30pm: The Impact of AI on Identity and Access Management – Best Practices

 

With each passing week, AI is changing the way individuals and organizations work and interact with each other, having a profound impact on every aspect of our lives.  Identity and Access Management is no exception.

 

In this session, we will cover best practices including:

  • Identifying the use cases
  • Data collection and preparation
  • Implementing a phased approach
  • IAM systems monitoring and management
  • Developing a data governance framework

 


12:30pm – 1:30pm: Lunch & Exhibit Break


1:30pm – 2:30pm: How to Tie Identity to Business Outcomes and Continuity

 

In this session, we will discuss how we need to shift the focus to measuring, reporting, and investing in business outcomes as it relates to Identity and Security.

 


2:30pm – 3:00pm: Refreshment & Exhibit Break


3:00pm – 4:00pm: How to Implement an Identity Governance and Access Center of Excellence

 

There is a critical gap that exists today in IGA’s time-to-value, and many programs fall at risk, end up failing, or do not instill business confidence.

 


4:00pm – 5:00pm: How to Partner with Business Stakeholders to Ensure Success of Your Identity Program (Panel Discussion)

 

The main mistake most organizations make when rolling out an IAM strategy is failing to secure support and sponsorship from the company’s executive leadership team. Identity security should never rely on the CISO or CIO to manage and communicate. All business leaders must share the same strategic vision around IAM and drive it within the organization to succeed.

 

Panelists will include:

  • Rob Civitello, Sr. Director, Identity & Access Management, Alight Solutions
  • Michelle Hames, Identity & Access Administrator, Corporate, Group O
  • Additional Identity & Access Management Executives sharing strategies, tactics and lessons learned

 

 

Civitello                            Hames

 

 


Conference Price: $299.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

 

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.


CONFERENCE SPONSORS


[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”64px” image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/3″][/vc_column][vc_column width=”1/3″][vc_single_image image=”366484″ img_size=”medium” alignment=”center” onclick=”custom_link” img_link_target=”_blank” css=”” link=”https://saviynt.com/”][vc_single_image image=”367240″ img_size=”medium” alignment=”center” onclick=”custom_link” img_link_target=”_blank” css=”” link=”https://www.guidepointsecurity.com/”][/vc_column][vc_column width=”1/3″][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”64px” image_repeat=”no-repeat”][/vc_column][/vc_row]