Programme

Programme overview

The sessions below are part of the online event Identity & Access Management 2021. The videotalks, interviews and talkshows are available on demand, so you can watch them when and where it suits you from the comfort of your home. If you would like to attend a LIVE session, register for the event and you will receive an invitation from us to compile your programme and register for one or more LIVE sessions. Please note that the number of places in the LIVE sessions is limited!

Lode Van Brabandt

Lode Van Brabandt

Senior Information Security Officer at KBC

Mark Vermeulen

Mark Vermeulen

Director, Benelux at Omada

LIVE ROUNDTABLE: CHALLENGES IN MANAGING CLOUD IDENTIES AND ACCESS AND THE EVOLUTION OF IAM AS-A-SERVICE

Lode van Brabandt | Senior Information Security Officer | KBC & Mark Vermeulen | Director | Omada & Richard van Es | Sales Engineer | Omada

Daniel Du Seuil

Daniel Du Seuil

Convenor at European Self Sovereign Identity Framework (ESSIF)

LIVE WEBINAR: SELF SOVEREIGN IDENTITY - AN UPMCOMING SEISMIC IDENTITY SHIFT?

Daniel Du Seuil | Convenor | European Self Sovereign Identity Framework (ESSIF) & Erik R. van Zuuren | founder | Trustcore

Prof. dr. ir. Bart Preneel

Prof. dr. ir. Bart Preneel

ESAT/COSIC at KU Leuven

LIVE VIDEOTALK: CORONA APP - IS THIS APP WORKING? LESSONS LEARNED

BART PRENEEL | ESAT/COSIC | KU LEUVEN

Claudio Bolla

Claudio Bolla

Group Information Security Director at INEOS

LIVE ROUND TABLE: THE IMPORTANCE OF ACCESS MANAGEMENT IN GOVERNANCE, RISK, COMPLIANCE

Claudio Bolla | Boardmember | ISACA & Egide Nzabonimana | VP | ISACA

Tobias Mackie

Tobias Mackie

senior expert, retail financial services at DG Fisma

LIVE WEBINAR: ENABLING TRUSTWORTHY CROSS-BORDER EXCHANGES - LESSONS LEARNED IN THE FINANCIAL SERVICES DOMAIN

TOBIAS MACKIE, SENIOR EXPERT, RETAIL FINANCIAL SERVICES, DG FISMA

Johan van Hove

Johan van Hove

Regional Vice President at Forgerock Northern Europe

LIVE ROUNDTABLE: ONLINE IDENTITY IN A ZERO TRUST WORLD

Johan van Hove | Regional Vice President Northern Europe | Forgerock & Chairman Erik R. van Zuuren | founder | Trustcore

logo Forgerock
Marc Lainez

Marc Lainez

VP API Marketplace Group at Isabel Group

LIVE ROUNDTABLE: API ACCESS MANAGEMENT STRATEGIES - DO'S AND DON'TS

MARC LAINEZ | VP API MARKETPLACE GROUP | ISABEL GROUP

Marc Lainez

Marc Lainez

VP API Marketplace Group at Isabel Group

LIVE WEBINAR: The complexity of effective access enforcement in API eco-systems

MARC LAINEZ | VP API MARKETPLACE GROUP | ISABEL GROUP

Max Faun

Max Faun

HEAD OF EMEA CONSULTING at OKTA

VIDEOTALK: DIGITAL TRANSFORMATIONS THROUGH OUR CAREERS AND HOW ZERO TRUST THINKING CAN HELP

MAX FAUN | HEAD OF EMEA CONSULTING | OKTA

Okta
Mark Vermeulen

Mark Vermeulen

Director, Benelux at Omada

VIDEOTALK: WHY ON PREMISE IGA IS THE NEW LEGACY

MARK VERMEULEN | DIRECTOR BENELUX | OMADA

Jacques Forster

Jacques Forster

CTO at OPNS

VIDEOTALK: SUCCEEDING THROUGHOUT YOUR IAM JOURNEY: TIPS, TRICKS & LESSONS LEARNED

JACQUES FORSTER | CTO & SENIOR IAM ARCHITECT | MICROFOCUS/OPNS

Joshua Kroeze

Joshua Kroeze

DIRECTOR OF SOLUTIONS ENGINEERING BIJ OKTA EMEA

VIDEOTALK: SECURITY AND THE CLOUD: THE MISSING INGREDIENT? IDENTITY

JOSHUA KROEZE | DIRECTOR OF SOLUTIONS ENGINEERING | OKTA EMEA

Okta
Wendy Nather

Wendy Nather

Head of Advisory CISOs, Duo Security at Cisco

A Surprise Trip to Zero-Trust Land

Wendy Nather | Head of Advisory CISOs | Duo Security at Cisco

Alan Radford

Alan Radford

Regional CTO at One Identity

VIDEOTALK: PRIVILEGED ACCESS IN A WORLD OF NON-HUMAN RESOURCES

ALAN RADFORD | REGIONAL CTO | ONE IDENTITY

logo One Identity
Hans Zandbelt

Hans Zandbelt

on behalf of OpenID

INTERVIEW: Open Standards and Open Source replacing legacy IAM software

Hans Zandbelt | on behalf of OpenID

OpenID
Scott Shields

Scott Shields

Sales Engineer, Thycotic

Videotalk: Why IAM starts with PAM

Scott Shields | Sales Engineer | Thycotic

Prof. dr. ir. Bart Preneel

Prof. dr. ir. Bart Preneel

ESAT/COSIC at KU Leuven

LIVE VIDEOTALK: CORONA APP - IS THIS APP WORKING? LESSONS LEARNED

BART PRENEEL | ESAT/COSIC | KU LEUVEN

Bart Preneel will talk about how to protect the privacy and human rights that are protected by EU law whilst technologies are deployed at a large scale to support a trace/quarantine/test/isolate strategy in order to contain a pandemic.

Claudio Bolla

Claudio Bolla

Group Information Security Director at INEOS

LIVE Roundtable: The importance of Access Management in Governance, Risk and Compliance

Claudio Bolla | Boardmember | ISACA & Egide Nzabonimana | VP | ISACA

Enterprises expect security not to be compromised while requiring a higher level of speed and transformation. How does IAM play in the ever-changing footprint of solution and services? Discuss with other attendees what is most important in getting the job done, gain insight on how to adapt or adjust your strategy to meet your IAM goals in an era of constant change.

We will start with a few topics guided by Claudio Bolla and Egide Nzabonimana of ISACA

Daniel Du Seuil

Daniel Du Seuil

Convenor at European Self Sovereign Identity Framework (ESSIF)

Erik R. van Zuuren

Erik R. van Zuuren

Chairman of the event

LIVE Videotalk on Self Sovereign Identity - an Upmcoming Seismic Identity Shift?

Daniel Du Seuil | Convenor | European Self Sovereign Identity Framework (ESSIF) & Erik R. van Zuuren | founder | Trustcore

Join this live and interactive session to get updated on the European Self-Sovereign Identity Framework (ESSIF) which aims at advancing the broad uptake of Self-Sovereign Identities (SSI) as a next-generation, open and trusted digital identity solution for faster and safer electronic transactions via the Internet and in real life.

Lode Van Brabandt

Lode Van Brabandt

Senior Information Security Officer at KBC

Mark Vermeulen

Mark Vermeulen

Director, Benelux at Omada

Richard van Es

Richard van Es

Sales Consultant at Omada

LIVE ROUNDTABLE: CHALLENGES IN MANAGING CLOUD IDENTIES AND ACCESS AND THE EVOLUTION OF IAM AS-A-SERVICE

Lode van Brabandt | Senior Information Security Officer | KBC & Mark Vermeulen | Director | Omada & Richard van Es | Sales Engineer | Omada

No longer used for secondary use cases and less important applications, cloud-applications (both SaaS and those internally developed and deployed on IaaS/PaaS platforms) serve essential business functions; in fact, 52% of business-critical apps are today cloud-based. The move to the cloud has challenged traditional castle and moat approaches to securing the physical perimeter with many organizations experiencing that their increased usage of cloud services for business-critical purposes has complicated their IAM programme. This roundtable is a great opportunity to get in touch with other professionals in your field and exchange ideas with them around the topic of IAMaaS and Identity Governance.
In this roundtable we will discuss:
• With more and more services in the cloud how do you address these challenges?
• How to securely handle identities in the cloud according to data privacy requirements?
• From legacy to cloud – how do you measure business success

Johan van Hove

Johan van Hove

Regional Vice President at Forgerock Northern Europe

Erik R. van Zuuren

Erik R. van Zuuren

Chairman of the event

LIVE ROUNDTABLE: ONLINE IDENTITY IN A ZERO TRUST WORLD

Johan van Hove | Regional Vice President Northern Europe | Forgerock & Chairman Erik R. van Zuuren | founder | Trustcore

In these times, when networking is very difficult, this Round Table is a great opportunity to get in touch with other professionals in your field and exchange ideas with them. In these times, when networking is very difficult, this Roundtable is a great opportunity to get in touch with other professionals in your field.
Join this session to get in touch with your identity peers and discuss challenges, exchange ideas and insights into how challenges have been overcome.
In this Roundtable we will discuss the following statements:
• Legacy IAM is no longer enough. Whatever companies expose, everything is under attack. Businesses are having problems adapting and evolving to meet new threats. Relying on – what has till now – been seen as strong authentication and standard (federated) access control management alone is no longer enough.
• In the case of customer access, we have practically no control over the (unpatched) devices they use, so context-based / behaviour-based IAM is a must.
• More and more applications are based on APIs, but in general, IAM solution providers do not really understand and/or secure the specifics of APIs and how these are evolving.
• Since employees nowadays work remotely, access control requires add-ons such as endpoint security. But endpoint security and access control aren’t really well integrated.
• In a B2B environment, suppliers must prove that they are secure backdoors to the organization. Access control in a B2B environment needs to be strengthened to reduce ‘back door attacks’.

logo Forgerock
Heliview
Tobias Mackie

Tobias Mackie

senior expert, retail financial services at DG Fisma

LIVE WEBINAR: ENABLING TRUSTWORTHY CROSS-BORDER EXCHANGES IN EUROPE - LESSONS LEARNED IN THE FINANCIAL SERVICES DOMAIN

TOBIAS MACKIE, SENIOR EXPERT, RETAIL FINANCIAL SERVICES, DG FISMA

The Commission is exploring what can be done to facilitate the uptake of digital identity solutions. This with a focus on the financial services industry, but which might also be quite inspirational across other industries. The development of digital identity solutions which are interoperable across borders would represent (especially in this era of COVID) a significant boost to the development of an internal market, while at the same time they can be an important and powerful tool to fight cybercrime and fraud and to improve regulatory compliance. The upcoming review of the eIDAS regulation and the planned revision of AML rules represent important opportunities as they would provide further clarity and standardisation wrt digital onboarding and identity proofing.

European Commission
Marc Lainez

Marc Lainez

VP API Marketplace Group at Isabel Group

LIVE ROUNDTABLE: API Access Management Strategies and the Do's and Dont's

MARC LAINEZ | VP API MARKETPLACE GROUP | ISABEL GROUP

In a world where IT systems are more and more interconnected, it becomes critical to assess the complete chain of systems connected and not to look at a single link. However, mapping that ecosystem can be quite difficult if not impossible for the consumer. How can we approach this issue in our respective industries to be able to guarantee optimal compliance with the consent that was given by our data subjects?

In this roundtable, we will first share different experiences, discuss how we make use of APIs and how we are managing access to them. We will also have an open discussion about the issues we see currently in API ecosystems and elaborate on potential solutions.

Marc Lainez

Marc Lainez

VP API Marketplace Group at Isabel Group

LIVE WEBINAR: The Complexity of Effective Access Enforcement in API Eco-systems

MARC LAINEZ | VP API MARKETPLACE GROUP | ISABEL GROUP

Marc Lainez  will discuss the role of consent in an API ecosystem and what the challenges are, especially in relation to identification/authentication and authorization enforcement. Marc will share his insights based on his broad experience in software and product development.

Max Faun

Max Faun

HEAD OF EMEA CONSULTING at OKTA

VIDEOTALK: Digital Transformations Through our Careers and how Zero Trust Thinking can Help

MAX FAUN | HEAD OF EMEA CONSULTING | OKTA

This videotalk will give you insights in:

• How digital transformations and IT modernisation has occurred over the last 15 years and how it relates to our working lives
• What that means for security
• What we can do to be best placed for the future

Okta
Mark Vermeulen

Mark Vermeulen

Director, Benelux at Omada

VIDEOTALK: WHY ON PREMISE IGA IS THE NEW LEGACY

MARK VERMEULEN | DIRECTOR BENELUX | OMADA

In this videotalk Mark Vermeulen, Director of Omada Benelux, will share his insights about the evolving IGA market and why companies today choose an enterprise IGA SAAS platform over an on-premise solution. Learn in this session how to transform your legacy or home-grown solution to a modern IGA solution without the hassle of long and cumbersome implementation and high maintenance costs. Based on best practices, we will demonstrate to you how organizations today can deliver fast value to their business to mitigate risk and increase efficiency. Join this interesting speech by Omada, a global market leader in Identity Governance and Administration (IGA).

Jacques Forster

Jacques Forster

CTO at OPNS

VIDEOTALK: SUCCEEDING THROUGHOUT YOUR IAM JOURNEY: TIPS, TRICKS & LESSONS LEARNED

JACQUES FORSTER | CTO & SENIOR IAM ARCHITECT | MICROFOCUS/OPNS

Most analysts agree to say that 1/3 of IAM projects miserably fail, another third never reached initial goals missing at least one major KPI, and the last third can be considered as successful.

There are multiple root causes, and this session will share our experience, in small, medium, large and very large projects, covering several dimensions like technology, project approach, roles & responsibilities and more, helping you being part of the 33% of successful IAM leaders.

Wendy Nather

Wendy Nather

Head of Advisory CISOs, Duo Security at Cisco

VIDEOTALK: A Surprise Trip to Zero-Trust Land

Wendy Nather | Head of Advisory CISOs | DUO Security at Cisco

Wendy Nather, will take you on an adventure where you find out that what you were expecting and prepared for, is not what you need.
Some organizations have been embracing the “Zero Trust” security model, and others are still trying to decide what it means and whether it makes sense for them to try it. With the sudden need for more flexibility, scalability and remote access, many of these enterprises have found themselves in unfamiliar territory without a map.

In this session, we’ll talk about how adopting this security “design pattern” can actually help address current needs, and why it makes sense to build in Zero Trust to deal with future challenges beyond attacks.

Joshua Kroeze

Joshua Kroeze

DIRECTOR OF SOLUTIONS ENGINEERING BIJ OKTA EMEA

VIDEOTALK: SECURITY AND THE CLOUD: THE MISSING INGREDIENT? IDENTITY

JOSHUA KROEZE | DIRECTOR OF SOLUTIONS ENGINEERING | OKTA EMEA

Mobile and cloud proliferation has exposed organisations to much higher risks for potential hacks and attacks. The traditional perimeter is crumbling under the weight of these threats, making it imperative to re-examine traditional security approaches. IAM must now take centre stage to defend against identity-based security breaches. This session will discuss the best practices and success factors to dramatically reduce attack surfaces and vectors. Topics include Credential theft and compromise; Gaps in the security landscape; The missing ingredient, Identity; Adaptive Multi-Factor Authentication; Strategic direction for identity-driven security.

Okta
Alan Radford

Alan Radford

Regional CTO at One Identity

VIDEOTALK: PRIVILEGED ACCESS IN A WORLD OF NON-HUMAN RESOURCES

ALAN RADFORD | REGIONAL CTO | ONE IDENTITY

How many of the entities in your HR system are actual human beings? The need to increase our agility through automation adds weight to the balancing act against risk. This session talks about key challenges in automation that go overlooked and the importance of confronting them.

logo One Identity
Hans Zandbelt

Hans Zandbelt

on behalf of OpenID

Peter Tetteroo

Peter Tetteroo

Journalist and Filmmaker

INTERVIEW: Open Standards and Open Source Replacing Legacy of IAM Software

Hans Zandbelt | on behalf of OpenID

A recent trend is the adoption of standards-based software to achieve Single Sign-On in enterprise environments, replacing legacy vendor systems that have been around for decades. This avoids a strong dependency on the vendor and high costs in licensing, infrastructure and professional services. Especially the OpenID Connect standard is increasingly deployed for enterprise SSO, replacing legacy proprietary systems. A large number of experts and volunteer contribute to the latter by means of open-source software. In this session, we will analyse and explore this trend.

OpenID
Scott Shields

Scott Shields

Sales Engineer, Thycotic

Videotalk: Why IAM starts with PAM

Scott Shields | Sales Engineer | Thycotic

In this videotalk, Scott will cover why PAM is critical to ensuring business security and why protecting Privileged Accounts has the greatest impact of any Cyber Security Strategy. He will discuss who Thycotic are and how they can help your organisation as well as give you an overview of our products and a quick demo too.

WHO WILL BE SPEAKING

VIEW OUR CONFIRMED experts

Curious as to who will speak and what experience they bring? Quickly view our complete experts overview!

Stay informed!

Don't miss a single conference update and sign up for our newsletter!