
9:00 am - 9:30 am

Registration & Exhibit Browsing

With enterprises globally now supporting a 100% remote workforce and customer base, global organizations may be forever changed. Layers of security are rendered useless if you inadvertantly give permission for the threat actor to access your data. Controlling who has access to the right data at the right time seems simple, but is offset by making sure it is safe from outside (and inside) interests.
Join experts in the field at our virtual summit to learn how to walk the line between convenience, accessibility and security.
Mar. 30th & 31st @ 9am ET
Registering For a Group?
Call + 1 (609)-356-1499
Speakers:
Dr. Suzanne Schwartz, MD, Director, Office of Strategic Partnerships and Technology Innovation (OST) at FDA’s Center for Devices & Radiological Health (CDRH)Mitch Parker, CISO, Indiana University Health SystemRob Suárez, VP, CISO, BD (Becton, Dickinson and Company)
What’s the status of FDA’s latest guidance and other efforts to help strengthen the cybersecurity of medical devices – especially amid the surge in COVID-19 remote patient monitoring and shortages of certain critical medical equipment? How are medical device makers implementing better security controls and best practices, and what are healthcare delivery organizations doing to keep their patients and data safe from the latest threats facing devices? Our panel will discuss these issues, plus:
Speaker:
General Gregory Touhill, Retired, First US CISO & President, Appgate Federal
Speaker:
Mathias Conradt, Senior Solutions Engineer, Auth0
Speaker:
Wade Ellery, Director of Solutions Architects, Radiant Logic
According to Gartner's 2019 IGA Magic Quadrant Strategic Planning Assumptions, identity governance and administration (IGA) implementations that start with cleanup analytics will show TWICE the ROI as ones that don't.
What if you could double the ROI of your IGA deployment? Get the project back on schedule and budget, while extending functionality 100% deeper into your environment? Cut your deployment budget in HALF?
Join Radiant Logic for a look at cleanup analytics - and see how this step-by-step process quickly transforms your identity data from chaos to clarity.
Speaker:
Sami Laine, Principal Security Architect, Okta
Speaker:
Bil Harmer, CISO and Chief Evangelist, SecureAuth
Speaker:
Christopher Hills, Deputy Chief Technology Officer, BeyondTrust
Speaker:
John Bennett, SVP & General Manager, Identity & Access Management at LogMeIn
Speaker:
Niamh Muldoon, Senior Director of Trust and Security, OneLogin
Speaker:
Loren Russon, VP of Product Management & Design, Ping Identity
Speaker:
Rolf Lindemann, Vice President, Products, Nok Nok Labs
Consumers hate passwords, criminals love them. Most organizations today have an initiative to replace passwords with a modern approach that is both more convenient, and more secure. Completely eliminating password authentication across any channel and any device is a journey that takes time. Like major global organizations who have started the journey, you can accelerate your path to scalable, passwordless authentication with a standards-based approach.
In this session we will review how global organizations including Alfac, BBVA, Intuit, NTT DOCOMO and T-Mobile have accelerated their path to passwordless authentication and transformed the user experience. After investigating various approaches, they became convinced that the FIDO standard was the most cost effective and future-proof solution.
Their impressive results include:
Speaker:
Chuck Brooks, Cybersecurity Evangelist
This rising threat trend of remote work, along with the rapid growth of sophistication in malware, ransomware, DDoS and social engineering attacks has created a conundrum. How do we protect ourselves in an increasingly connected world? Nothing is completely unhackable, but there are a myriad of emerging technologies that impact Identity and Access Management that can help us navigate the increasingly malicious cyber threat landscape. Join cybersecurity thought leader Chuck Brooks for an overview of these cutting-edge technologies, including:
Speaker:
David Temoshok, Senior Policy Advisor - Applied Cybersecurity, NIST IT Laboratory
In this exclusive session, David Temoshok, Senior Policy Advisor at the National Institute of Standards and Technology, will outline the current status of online identity as an attack vector and identity theft, as well as NIST Guidelines for Digital Identity Management. Included in this talk:
Speaker:
Jeremy Grant, former Sr. Executive Advisor NIST; Managing Director, Technology Business Strategy, Venable
Jeremy Grant, who led the public/private National Strategy for Trusted Identities in Cyberspace during the Obama administration, has spent more than two decades championing the cause of secure identity systems. Enter the COVID-19 pandemic, which created a remote workforce of unprecedented scale seemingly overnight. Are current approaches to securing the identity management and attestation practice up to the challenge?
In this exclusive session, Grant discusses:
Speaker:
General Gregory Touhill, Retired, First US CISO & President, Appgate Federal
Speaker:
Gal Helemski, Co-Founder & Chief Innovation & Product (CIPO), PlainID
Many businesses have new and emerging financial and reputational risks with data access controls. The complexity of digitalization and newfound data science capabilities drive greater demand for data democratization. The diversity of data consumers, data assets and data access tools continue to grow. Businesses are challenged to improve data accessibility without compromising usability, remain compliant, implement effective and efficient governance processes, and actively monitor the consumption of data.
In this session, you will learn:
Speaker:
Mathias Conradt, Senior Solutions Engineer, Auth0
Speaker:
Wade Ellery, Director of Solutions Architects, Radiant Logic
According to Gartner's 2019 IGA Magic Quadrant Strategic Planning Assumptions, identity governance and administration (IGA) implementations that start with cleanup analytics will show TWICE the ROI as ones that don't.
What if you could double the ROI of your IGA deployment? Get the project back on schedule and budget, while extending functionality 100% deeper into your environment? Cut your deployment budget in HALF?
Join Radiant Logic for a look at cleanup analytics - and see how this step-by-step process quickly transforms your identity data from chaos to clarity.
Speaker:
Sami Laine, Principal Security Architect, Okta
Speaker:
Bil Harmer, CISO and Chief Evangelist, SecureAuth
Speaker:
Christopher Hills, Deputy Chief Technology Officer, BeyondTrust
Speaker:
John Bennett, SVP & General Manager, Identity & Access Management at LogMeIn
Speaker:
Niamh Muldoon, Senior Director of Trust and Security, OneLogin
Speaker:
Loren Russon, VP of Product Management & Design, Ping Identity
Speaker:
Rolf Lindemann, Vice President, Products, Nok Nok Labs
Consumers hate passwords, criminals love them. Most organizations today have an initiative to replace passwords with a modern approach that is both more convenient, and more secure. Completely eliminating password authentication across any channel and any device is a journey that takes time. Like major global organizations who have started the journey, you can accelerate your path to scalable, passwordless authentication with a standards-based approach.
In this session we will review how global organizations including Alfac, BBVA, Intuit, NTT DOCOMO and T-Mobile have accelerated their path to passwordless authentication and transformed the user experience. After investigating various approaches, they became convinced that the FIDO standard was the most cost effective and future-proof solution.
Their impressive results include:
Speaker:
Chuck Brooks, Cybersecurity Evangelist
This rising threat trend of remote work, along with the rapid growth of sophistication in malware, ransomware, DDoS and social engineering attacks has created a conundrum. How do we protect ourselves in an increasingly connected world? Nothing is completely unhackable, but there are a myriad of emerging technologies that impact Identity and Access Management that can help us navigate the increasingly malicious cyber threat landscape. Join cybersecurity thought leader Chuck Brooks for an overview of these cutting-edge technologies, including:
Speaker:
David Temoshok, Senior Policy Advisor - Applied Cybersecurity, NIST IT Laboratory
In this exclusive session, David Temoshok, Senior Policy Advisor at the National Institute of Standards and Technology, will outline the current status of online identity as an attack vector and identity theft, as well as NIST Guidelines for Digital Identity Management. Included in this talk:
Speaker:
Jeremy Grant, former Sr. Executive Advisor NIST; Managing Director, Technology Business Strategy, Venable
Jeremy Grant, who led the public/private National Strategy for Trusted Identities in Cyberspace during the Obama administration, has spent more than two decades championing the cause of secure identity systems. Enter the COVID-19 pandemic, which created a remote workforce of unprecedented scale seemingly overnight. Are current approaches to securing the identity management and attestation practice up to the challenge?
In this exclusive session, Grant discusses:
View sessions, chat with speakers and technology experts in our Interactive Exhibit & Networking Experience, and browse our Resource Center to download educational assets to review post-summit.
If you miss any live sessions, feel free to log in and view on demand at your own pace. Session recordings will be available in our virtual environment after the agenda has ended.
ISMG Virtual Summit Attendee Guide
For more information please download our ISMG Virtual Summit Attendee Guide.
To earn CPE credits, hear from industry influencers, join ISMG’s global community and meet with leaders of technology register today.
Registering For a Group?
Call + 1 (609)-356-1499 or email at events@ismgcorp.com