Identity Access Management (IAM) – Reducing Risk and Giving Better CX to Users: Chicago (Rosemont/O’Hare), Illinois



April 4, 2024




7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded


Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois




Identity continues to be foundational to cybersecurity and the running of your business from hybrid work to customer access. Conventional approaches to identity and access management (IAM) are no longer sufficient as organizations operate in an escalating threat environment where zero trust is a must-have.

What You Will Learn


In this one day conference attendees will learn:

  • Maximizing Business Value with IAM Maturity Assessment
  • Security, Identity, Operations- Sharpening the Value of IT
  • Sharpening IT Influence in the Board Room With Risk, Value, and Cost
  • Architecting Identity-First Security and Zero Trust Implementations
  • Reducing Risk & Giving Better User Experience to Their Customers
  • How to Streamline Internal IT Processes

Conference Price: $299.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.




8:00am – 9:00am: Registration and Continental Breakfast

9:00am – 9:50am: Identity Governance & Administration vs. Access Management- What is the Difference?


This session will introduce what Identity Governance & Administration is and is not, and how it differs and connects with access management tools.

Attendees will learn:
The true definition of Identity Governance & Administration
The history and evolution of identity governance and administration
Common misconceptions about identity governance
Components of Identity Governance & Administration



9:50am – 10:20am: Refreshment Break

10:20am – 11:10am: How to Be Successful With Privileged Access Management (PAM)


Privilege access management is a cybersecurity strategy to control, monitor, secure and audit all identities across an IT environment.

In this session, attendees will learn:

How to integrated PAM into any security program
How to leverage PAM
How to raise your security posture with PAM



11:10am – 12:00pm: How to Implement the Right Identity Protocol in Your Apps, Services and APIs



There are a variety of modern identity protocols to implement in your services and applications.

But it can be challenging to determine the best for each situation.

In this session attendees will learn to determine which protocol to use for specific situations.


12:00pm – 12:50pm: Authentication and User Experience: Hot to Avoid Pitfalls


Authentication is one of the first interactions a customer has with your service or product. While authentication security is paramount in terms of importance, all security and customer facing teams must understand that CX can make or break the relationships with consumers of your product.

In this session attendees will learn:

The benefits of optimizing the user experience

The characteristics of a seamless authentication experience

How internal teams should work together to achieve this

12:50pm – 1:30pm: Lunch and Exhibit Break

1:30pm – 2:20pm: Best Practices in Communicating the Business Value of Identity & Cybersecurity to the Business


For many information security executives ROI has been a challenging topic to address, but nonetheless it is essential to speak in terms the business can understand as it relates to their day to day activities

This session will cover these areas and more as it related to Identity and Security overall:


2:20pm – 2:50pm: Refreshment Break


2:50pm – 3:40pm: How to Build a Robust IAM Program Management COE

The establishment and delivery of an IAM Program is essential to delivering Identity First security. Identity teams need to understand and communicate the role that identity plays within your enterprise to enable your employees, customers and business partners to deliver on their goals.



3:40pm – 4:30pm:


How Identity Leaders Build Robust Relationships with other Partners like InfoSec, EA, IT Operations and the Business (Panel Discussion)



In this session, attendees will from a panel of Identity leaders as to how they build relationships with other IT and business units.
They will discuss strategies, tactics and pitfalls to be avoided.



As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.