
9:00 am - 9:30 am

Registration & Exhibit Browsing

With enterprises globally now supporting a 100% remote workforce and customer base, global organizations may be forever changed. Layers of security are rendered useless if you inadvertantly give permission for the threat actor to access your data. Controlling who has access to the right data at the right time seems simple, but is offset by making sure it is safe from outside (and inside) interests.
Join experts in the field at our virtual summit to learn how to walk the line between convenience, accessibility and security.
Feb. 16th & 17th @ 9am ET
Registering For a Group?
Call + 1 (609)-356-1499
Speakers:
Gretchen Hiley, CISO & SVP - Global Information Security, Crawford and CompanyPatty Ryan, Sr. Director, CISO, Global Information Services, Ortho Clinical DiagnosticsTamika Bass, CISO, Georgia Department of Revenue
People, applications, devices - they all have digital identities, and in today's transformed environment they all demand new approaches to identity and access management. In this exclusive panel, three CISOs discuss their unique IAM challenges, including:
Speaker:
Dr Kevin Jones, Group CISO, Airbus
In this fireside chat, Dr Kevin Jones, Group CISO, Airbus, explains why the age-old expression, “Humans are the weakest link”, is a myth that must be broken. Instead, we need to adopt human centric approaches to cybersecurity that make humans the last line of defense.
In this session, Jones will discuss:
Speakers:
Janet Lin, Senior Director, Customer Engagement Technology, Loblaw Companies LtdThomas Malta, Head of Identity and Access Management, Navy Federal Credit Union
Customer Identity and Access Management – increasingly, enterprises are undertaking CIAM initiatives to maximize, secure and improve their customer relationships across multiple channels. Join these hands-on security leaders to discuss:
Speaker:
Dave Wilner, Chief Revenue Officer, Auth0
As companies accelerate their digital transformation timelines, many are finding that identity and access management is essential to the speed and success of their endeavors. Discover how four brands--Babylon, Naranja, Siemens, and Kiva--approached their digital transformation and how they handled the identity portion of their transformation journey. We'll discuss
Speakers:
Alex Corstorphine, Lead Security Solutions Engineer, Rapid7Jeremy Snyder, Senior Director of Business Development and Solutions Engineering, DivvyCloud by Rapid7
Strong identity and access management (IAM) is one key to preventing data breaches and limiting the blast radius should a security incident occur. But cloud IAM presents a new set of constructs for organizations to build and manage. Is cloud IAM the best identity and access control ever, or yet one more reason to tear your hair out in frustration? Join Jeremy Snyder, Senior Director of Solutions Engineering, and Alex Corstorphine, Senior Solutions Engineer, from DivvyCloud by Rapid7 for an active discussion and debate. Topics will include why managing cloud IAM is so complex, what challenges this creates for IT and cybersecurity professionals, and how leading organizations governing cloud IAM to reduce risk and the chance of a data breach.
Key takeaways include understanding how to:
Speaker:
Allan Foster, Chief Evangelist Officer, ForgeRock
In this talk, Allan will look at how the enterprise thinks of user data, and how the old paradigm is failing. He will talk about the new realities of consent, often dictated by law, and how they are failing badly. And through a security lens, the trends are not getting better, and in fact are getting worse. He will look at how making the user part of the data management process gives control, and authority to the end user, leading to higher levels of trust, and new ways of being able to use the data..
Speaker:
Dan Conrad, IAM Strategist, One Identity
Establishing zero trust and least privileged access is key to securing privileged accounts. The Zero Trust model involves eliminating shared admin passwords so that every administrative action is authenticated uniquely, dynamically and specifically. The Least Privilege approach involves delegating to give each admin only the permissions they need - nothing more, nothing less.
In this session you will learn how to enable Zero Trust for Active Directory and everything that depends on AD. Elevated privileges in AD don't usually fit into a Zero Trust Architecture but with some simple policies and strong security procedures we can make AD conform, at least in part, to a ZTA.
Speaker:
Colin Duffy, Senior Vice President, Corporate Sales & Channel, Hitachi ID
Migrating to Zero Trust is a journey not often easily achieved. Zero Trust and legacy workflows can coexist as you tackle one business process at a time as your organization aspires for a higher level of operational maturity and greater cybersecurity resilience. Join Hitachi ID as we discuss how to create a Zero Trust security model starting with reducing identity as your attack vector. We will explore the layers of identity and privileged access management a singular security fabric can offer from square one or integrated with existing solutions to build a Zero Trust security model that protects your organization from cyberattacks.
Speaker:
Rod Simmons, VP of Product Strategy, Omada
Each business unit has its unique policies that need to be incorporated into any IGA project, increasing complexity, and requiring a single mindset between all business leaders. In this session, we will break down the fundamental building blocks of identity governance and detail how to deploy to the cloud successfully.
Learn:
Speakers:
Gray Mitchell, CISO and VP of Advisory Services, IDMWORKSRichard Bird, Chief Customer Information Officer, Ping Identity
Join this session to learn from Richard Bird, Chief Customer Information Officer, Ping Identity. And Gray Mitchell, CISO + VP of Advisory and IDMWORKS, how to communicate the value of customer identity and ensure that it is recognized, funded and prioritized like the revenue-generating behemoth that it is. We’ll end the session with a walkthrough example of a Fortune 500 Financial Services company and their Customer Identity business value journey.
Speaker: Bassam Al-Khalidi, Co-CEO, Axiad
In today’s digital climate there’s no single identity credential to meet all your business’s use cases. IT leaders must protect their dispersed workforce with multiple credentials, which can often be complex to manage. How can you keep employees top of mind while introducing new IAM solutions? What solutions can authenticate the variety of devices and users on your network? And can cloud-based authentication be as secure, or more so, than on-premise authentication?
Join our session to answer these questions and more:
• Take a holistic approach with use-case-driven authentication for devices, privileged and non-privileged users
• Ensure your users and data are protected in a virtual private cloud, not open to attack in a mutualized system
• Protect every entity as traditional security perimeters disappear
• Empower the remote workforce to take charge of their credentials and manage their lifecycles “
Speakers:
Bernardo Vasquez, CISO, Hudson NewsRob Hornbuckle, CISO Allegiant AirSuresh Thiru, Chief Product Officer, Yubico
Zero trust has truly come of age in the last 12 months, but there are many misconceptions relating to what it is, where to start on the journey and how to manage user privileges in a zero trust environment. One of the fundamentals for zero trust is strong authentication to ensure that the right assets are connecting to your network and that these privileges can be expanded or retracted as needed.
Join this panel of experts to explore the following topics -
Speaker:
Hed Kovetz, CEO & Co-founder, Silverfort
Speakers:
Andre Bromes, CIO and CISO, Goodwill Industries of Greater New York and New JerseyArun De Souza, CISO+ CPO, Nexteer AutomotiveKent Browne, Global Director Stealth Identity GTM & Innovation Lead, Unisys Security
In this panel session we talk to three security veterans about how their IAM challenges have been compounded since going remote and what security controls they’ve put in place to assist this change. We also discuss the importance of adopting a holistic identity strategy and how to get the business on side to support this.
Join this exclusive panel for unique insight into:
Speaker:
Thomas Malta, Head of Identity and Access Management, Navy Federal Credit Union
Multi-cloud and hybrid cloud solutions are great enablers for organizations, but managing IAM across multiple entities that are ever expanding in capability and use? Big challenges. But here's an opportunity to re-do enterprise IAM. Join Tom Malta of Navy Federal Credit Union for insight on:
Speaker:
Sean Ryan, Senior Analyst, Security & Risk, Forrester
A accelerated digital world calls for greater protection of identity and access - as well as greater agility in doing so. In this exclusive session, Sean Ryan of Forrester Research makes the case for IAM agility, focusing on:
Speaker:
Christian Toon, CISO, Pinsent Masons
In this fireside conversation, Christian Toon, CISO, Pinsent Masons LLP, reflects on what it takes to secure the digital workforce and keep up with the speed of change, refining cloud security approaches and the nuances of buying cyber insurance.
In this session, Toon will discuss:
Speaker:
Jeremy Grant, former Sr. Executive Advisor NIST; Managing Director, Technology Business Strategy, Venable
In both the public and private sectors, Jeremy Grant has long been a leading force in shaping how government and enterprises respond to the evolving needs of identity security.
In this exclusive session, Grant discusses:
Speakers:
Gretchen Hiley, CISO & SVP - Global Information Security, Crawford and CompanyPatty Ryan, Sr. Director, CISO, Global Information Services, Ortho Clinical DiagnosticsTamika Bass, CISO, Georgia Department of Revenue
People, applications, devices - they all have digital identities, and in today's transformed environment they all demand new approaches to identity and access management. In this exclusive panel, three CISOs discuss their unique IAM challenges, including:
Speaker:
Dr Kevin Jones, Group CISO, Airbus
In this fireside chat, Dr Kevin Jones, Group CISO, Airbus, explains why the age-old expression, “Humans are the weakest link”, is a myth that must be broken. Instead, we need to adopt human centric approaches to cybersecurity that make humans the last line of defense.
In this session, Jones will discuss:
Speakers:
Janet Lin, Senior Director, Customer Engagement Technology, Loblaw Companies LtdThomas Malta, Head of Identity and Access Management, Navy Federal Credit Union
Customer Identity and Access Management – increasingly, enterprises are undertaking CIAM initiatives to maximize, secure and improve their customer relationships across multiple channels. Join these hands-on security leaders to discuss:
Speaker:
Dave Wilner, Chief Revenue Officer, Auth0
As companies accelerate their digital transformation timelines, many are finding that identity and access management is essential to the speed and success of their endeavors. Discover how four brands--Babylon, Naranja, Siemens, and Kiva--approached their digital transformation and how they handled the identity portion of their transformation journey. We'll discuss
Speakers:
Alex Corstorphine, Lead Security Solutions Engineer, Rapid7Jeremy Snyder, Senior Director of Business Development and Solutions Engineering, DivvyCloud by Rapid7
Strong identity and access management (IAM) is one key to preventing data breaches and limiting the blast radius should a security incident occur. But cloud IAM presents a new set of constructs for organizations to build and manage. Is cloud IAM the best identity and access control ever, or yet one more reason to tear your hair out in frustration? Join Jeremy Snyder, Senior Director of Solutions Engineering, and Alex Corstorphine, Senior Solutions Engineer, from DivvyCloud by Rapid7 for an active discussion and debate. Topics will include why managing cloud IAM is so complex, what challenges this creates for IT and cybersecurity professionals, and how leading organizations governing cloud IAM to reduce risk and the chance of a data breach.
Key takeaways include understanding how to:
Speaker:
Allan Foster, Chief Evangelist Officer, ForgeRock
In this talk, Allan will look at how the enterprise thinks of user data, and how the old paradigm is failing. He will talk about the new realities of consent, often dictated by law, and how they are failing badly. And through a security lens, the trends are not getting better, and in fact are getting worse. He will look at how making the user part of the data management process gives control, and authority to the end user, leading to higher levels of trust, and new ways of being able to use the data..
Speaker:
Dan Conrad, IAM Strategist, One Identity
Establishing zero trust and least privileged access is key to securing privileged accounts. The Zero Trust model involves eliminating shared admin passwords so that every administrative action is authenticated uniquely, dynamically and specifically. The Least Privilege approach involves delegating to give each admin only the permissions they need - nothing more, nothing less.
In this session you will learn how to enable Zero Trust for Active Directory and everything that depends on AD. Elevated privileges in AD don't usually fit into a Zero Trust Architecture but with some simple policies and strong security procedures we can make AD conform, at least in part, to a ZTA.
Speaker:
Hed Kovetz, CEO & Co-founder, Silverfort
Speaker:
Colin Duffy, Senior Vice President, Corporate Sales & Channel, Hitachi ID
Migrating to Zero Trust is a journey not often easily achieved. Zero Trust and legacy workflows can coexist as you tackle one business process at a time as your organization aspires for a higher level of operational maturity and greater cybersecurity resilience. Join Hitachi ID as we discuss how to create a Zero Trust security model starting with reducing identity as your attack vector. We will explore the layers of identity and privileged access management a singular security fabric can offer from square one or integrated with existing solutions to build a Zero Trust security model that protects your organization from cyberattacks.
Speaker:
Rod Simmons, VP of Product Strategy, Omada
Each business unit has its unique policies that need to be incorporated into any IGA project, increasing complexity, and requiring a single mindset between all business leaders. In this session, we will break down the fundamental building blocks of identity governance and detail how to deploy to the cloud successfully.
Learn:
Speakers:
Gray Mitchell, CISO and VP of Advisory Services, IDMWORKSRichard Bird, Chief Customer Information Officer, Ping Identity
Join this session to learn from Richard Bird, Chief Customer Information Officer, Ping Identity. And Gray Mitchell, CISO + VP of Advisory and IDMWORKS, how to communicate the value of customer identity and ensure that it is recognized, funded and prioritized like the revenue-generating behemoth that it is. We’ll end the session with a walkthrough example of a Fortune 500 Financial Services company and their Customer Identity business value journey.
Speaker: Bassam Al-Khalidi, Co-CEO, Axiad
In today’s digital climate there’s no single identity credential to meet all your business’s use cases. IT leaders must protect their dispersed workforce with multiple credentials, which can often be complex to manage. How can you keep employees top of mind while introducing new IAM solutions? What solutions can authenticate the variety of devices and users on your network? And can cloud-based authentication be as secure, or more so, than on-premise authentication?
Join our session to answer these questions and more:
• Take a holistic approach with use-case-driven authentication for devices, privileged and non-privileged users
• Ensure your users and data are protected in a virtual private cloud, not open to attack in a mutualized system
• Protect every entity as traditional security perimeters disappear
• Empower the remote workforce to take charge of their credentials and manage their lifecycles “
Speakers:
Gray Mitchell, CISO and VP of Advisory Services, IDMWORKSRichard Bird, Chief Customer Information Officer, Ping Identity
Join this session to learn from Richard Bird, Chief Customer Information Officer, Ping Identity. And Gray Mitchell, CISO + VP of Advisory and IDMWORKS, how to communicate the value of customer identity and ensure that it is recognized, funded and prioritized like the revenue-generating behemoth that it is. We’ll end the session with a walkthrough example of a Fortune 500 Financial Services company and their Customer Identity business value journey.
Speakers:
Bernardo Vasquez, CISO, Hudson NewsRob Hornbuckle, CISO Allegiant AirSuresh Thiru, Chief Product Officer, Yubico
Zero trust has truly come of age in the last 12 months, but there are many misconceptions relating to what it is, where to start on the journey and how to manage user privileges in a zero trust environment. One of the fundamentals for zero trust is strong authentication to ensure that the right assets are connecting to your network and that these privileges can be expanded or retracted as needed.
Join this panel of experts to explore the following topics -
Speaker:
Hed Kovetz, CEO & Co-founder, Silverfort
Speakers:
Andre Bromes, CIO and CISO, Goodwill Industries of Greater New York and New JerseyArun De Souza, CISO+ CPO, Nexteer AutomotiveKent Browne, Global Director Stealth Identity GTM & Innovation Lead, Unisys Security
In this panel session we talk to three security veterans about how their IAM challenges have been compounded since going remote and what security controls they’ve put in place to assist this change. We also discuss the importance of adopting a holistic identity strategy and how to get the business on side to support this.
Join this exclusive panel for unique insight into:
Speaker:
Thomas Malta, Head of Identity and Access Management, Navy Federal Credit Union
Multi-cloud and hybrid cloud solutions are great enablers for organizations, but managing IAM across multiple entities that are ever expanding in capability and use? Big challenges. But here's an opportunity to re-do enterprise IAM. Join Tom Malta of Navy Federal Credit Union for insight on:
Speaker:
Sean Ryan, Senior Analyst, Security & Risk, Forrester
A accelerated digital world calls for greater protection of identity and access - as well as greater agility in doing so. In this exclusive session, Sean Ryan of Forrester Research makes the case for IAM agility, focusing on:
Speaker:
Christian Toon, CISO, Pinsent Masons
In this fireside conversation, Christian Toon, CISO, Pinsent Masons LLP, reflects on what it takes to secure the digital workforce and keep up with the speed of change, refining cloud security approaches and the nuances of buying cyber insurance.
In this session, Toon will discuss:
Speaker:
Jeremy Grant, former Sr. Executive Advisor NIST; Managing Director, Technology Business Strategy, Venable
In both the public and private sectors, Jeremy Grant has long been a leading force in shaping how government and enterprises respond to the evolving needs of identity security.
In this exclusive session, Grant discusses:
View sessions, chat with speakers and technology experts in our Interactive Exhibit & Networking Experience, and browse our Resource Center to download educational assets to review post-summit.
If you miss any live sessions, feel free to log in and view on demand at your own pace. Session recordings will be available in our virtual environment after the agenda has ended.
ISMG Virtual Summit Attendee Guide
For more information please download our ISMG Virtual Summit Attendee Guide.
To earn CPE credits, hear from industry influencers, join ISMG’s global community and meet with leaders of technology register today.
Registering For a Group?
Call + 1 (609)-356-1499 or email at events@ismgcorp.com