PAST EVENTS
Identity Access Management (IAM) – Reducing Risk and Giving Better CX to Users: Chicago (Rosemont/O’Hare), Illinois
July 11, 2024
9:00am-5:00pm
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois
Overview
Identity continues to be foundational to cybersecurity and the running of your business from hybrid work to customer access. Conventional approaches to identity and access management (IAM) are no longer sufficient as organizations operate in an escalating threat environment where zero trust is a must-have.
What You Will Learn
In this one day conference attendees will learn:
- Stop Screwing Up IDAM, Some Practical Tips From My Failures
- How to Tie Identity to Business Outcomes and Continuity
- The Impact of AI on Identity and Access Management – Best Practices
- How to Implement an Identity Governance and Access Center of Excellence
- How to Build and Identity First Security Architecture
- How to Partner with Business Stakeholders to Ensure Success of Your Identity Program (Panel Discussion)
CONFERENCE AGENDA
8:00am – 9:00am: Registration and Continental Breakfast
9:00am – 10:00am: Stop Screwing Up IDAM, Some Practical Tips From My Failures
Ricardo Lafosse, CISO, KraftHeinz
In this session, thought leader and prominent CISO, Ricardo Lafosse will detail KraftHeinz’s Identity Transformation and how it empowered the business.
LaFosse
10:00am – 10:30am: Refreshment & Exhibit Break
10:30am – 11:30am: How to Build and Identity First Security Architecture
In this session, we will discuss how to protect and put limits on identities, and why identity security should be the first step in securing the enterprise. The discussion will also focus on being: Consistent, Context-Aware and Continuous.
11:30am – 12:30pm: The Impact of AI on Identity and Access Management – Best Practices
With each passing week, AI is changing the way individuals and organizations work and interact with each other, having a profound impact on every aspect of our lives. Identity and Access Management is no exception.
In this session, we will cover best practices including:
- Identifying the use cases
- Data collection and preparation
- Implementing a phased approach
- IAM systems monitoring and management
- Developing a data governance framework
12:30pm – 1:30pm: Lunch & Exhibit Break
1:30pm – 2:30pm: How to Tie Identity to Business Outcomes and Continuity
In this session, we will discuss how we need to shift the focus to measuring, reporting, and investing in business outcomes as it relates to Identity and Security.
2:30pm – 3:00pm: Refreshment & Exhibit Break
3:00pm – 4:00pm: How to Implement an Identity Governance and Access Center of Excellence
There is a critical gap that exists today in IGA’s time-to-value, and many programs fall at risk, end up failing, or do not instill business confidence.
4:00pm – 5:00pm: How to Partner with Business Stakeholders to Ensure Success of Your Identity Program (Panel Discussion)
The main mistake most organizations make when rolling out an IAM strategy is failing to secure support and sponsorship from the company’s executive leadership team. Identity security should never rely on the CISO or CIO to manage and communicate. All business leaders must share the same strategic vision around IAM and drive it within the organization to succeed.
Panelists will include:
- Rob Civitello, Sr. Director, Identity & Access Management, Alight Solutions
- Michelle Hames, Identity & Access Administrator, Corporate, Group O
- Additional Identity & Access Management Executives sharing strategies, tactics and lessons learned
Civitello Hames
Conference Price: $299.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
Exhibits
As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.
CONFERENCE SPONSORS
[/vc_column_text][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”64px” image_repeat=”no-repeat”][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column width=”1/3″][/vc_column][vc_column width=”1/3″][vc_single_image image=”366484″ img_size=”medium” alignment=”center” onclick=”custom_link” img_link_target=”_blank” css=”” link=”https://saviynt.com/”][vc_single_image image=”367240″ img_size=”medium” alignment=”center” onclick=”custom_link” img_link_target=”_blank” css=”” link=”https://www.guidepointsecurity.com/”][/vc_column][vc_column width=”1/3″][/vc_column][/vc_row][vc_row row_type=”row” use_row_as_full_screen_section=”no” type=”full_width” text_align=”left” box_shadow_on_row=”no”][vc_column][vc_empty_space height=”64px” image_repeat=”no-repeat”][/vc_column][/vc_row]