ISMG Events
  • Summits
  • Roundtables
  • Faculty
  • About ISMG Events
  • Contact us

Virtual Cybersecurity Summit: Identity & Access Management

February 16-17, 2021

View Session Recordings

WELCOME / Summit Overview

With enterprises globally now supporting a 100% remote workforce and customer base, global organizations may be forever changed. Layers of security are rendered useless if you inadvertantly give permission for the threat actor to access your data. Controlling who has access to the right data at the right time seems simple, but is offset by making sure it is safe from outside (and inside) interests.

Join experts in the field at our virtual summit to learn how to walk the line between convenience, accessibility and security.

Details

Free Registration

Feb. 16th & 17th @ 9am ET

View Session Recordings

Registering For a Group?
Call + 1 (609)-356-1499

   Members of the ISMG Community

  • Event Gallery

Gen. Greg Touhill, Ret.

First US Federal CISO

Jeremy Grant

former NIST Sr. Executive Advisor; Managing Director of Technology Business Strategy, Venable

Eugene Liderman

Director of Mobile Security Strategy, Google

Rohit Ghai

President, RSA

Tom Field

SVP - Editorial, ISMG

Michael Chertoff

Executive Chairman, The Chertoff Group

Gen. Keith Alexander (retired)

Art Coviello

former CEO, RSA Security; Venture Partner, Rally Ventures

Speakers / Featured Identity Speakers

Jeremy Grant

former Sr. Executive Advisor NIST; Managing Director, Technology Business Strategy, Venable

Ian Thornton-Trump

CISO, Cyjax Limited

Janet Lin

Senior Director, Customer Engagement Technology, Loblaw Companies Ltd

Andre Bromes

CIO and CISO, Goodwill Industries of Greater New York and New Jersey

Tamika Bass

CISO, Georgia Department of Revenue

Bernardo Vasquez

CISO, Hudson News

Thomas Malta

Head of Identity and Access Management, Navy Federal Credit Union

Gretchen Hiley

CISO & SVP - Global Information Security, Crawford and Company

Sean Ryan

Senior Analyst, Security & Risk, Forrester

David Britton

VP Industry Solutions, Global Fraud and ID, Experian

Patty Ryan

Sr. Director, CISO, Global Information Services, Ortho Clinical Diagnostics

Rob Hornbuckle

CISO Allegiant Air

Rod Simmons

VP of Product Strategy, Omada

Bassam Al-Khalidi

Co-CEO, Axiad

Allan Foster

Chief Evangelist Officer, ForgeRock

Dan Conrad

IAM Strategist, One Identity

Alex Corstorphine

Lead Security Solutions Engineer, Rapid7

Jeremy Snyder

Senior Director of Business Development and Solutions Engineering, DivvyCloud by Rapid7

Dave Wilner

Chief Revenue Officer, Auth0

Suresh Thiru

Chief Product Officer, Yubico

Arun De Souza

CISO+ CPO, Nexteer Automotive

Kent Browne

Global Director Stealth Identity GTM & Innovation Lead, Unisys Security

Hed Kovetz

CEO & Co-founder, Silverfort

Colin Duffy

Senior Vice President, Corporate Sales & Channel, Hitachi ID

Richard Bird

Chief Customer Information Officer, Ping Identity

Gray Mitchell

CISO and VP of Advisory Services, IDMWORKS

Agenda / Session Date & Times (ET)



  • Tuesday, February 16th

  • Wednesday, February 17th

  • Hall A
  • Hall B
  • Hall C
  • Hall D
9:00 am -
9:30 am
9:00 am - 9:30 am

Registration & Exhibit Browsing

9:30 am -
10:00 am
9:30 am - 10:00 am

CISO View: The Real-Time Evolution of IAM

Speakers:
Gretchen Hiley, CISO & SVP - Global Information Security, Crawford and Company
Patty Ryan, Sr. Director, CISO, Global Information Services, Ortho Clinical Diagnostics
Tamika Bass, CISO, Georgia Department of Revenue

People, applications, devices - they all have digital identities, and in today's transformed environment they all demand new approaches to identity and access management. In this exclusive panel, three CISOs discuss their unique IAM challenges, including:

  • Protecting medical devices
  • Managing user (and identity) sprawl
  • Granting and validating access - without automation
10:00 am -
10:30 am
10:00 am - 10:30 am Track A

Black Box Thinking: Adopting a Human Centric Approach to Cybersecurity

Speaker:
Dr Kevin Jones, Group CISO, Airbus

In this fireside chat, Dr Kevin Jones, Group CISO, Airbus, explains why the age-old expression, “Humans are the weakest link”, is a myth that must be broken. Instead, we need to adopt human centric approaches to cybersecurity that make humans the last line of defense.

In this session, Jones will discuss:

  • How to create a human centric cybersecurity program that makes humans the last line of defense
  • What capabilities and priorities are needed to create and weave a culture of security into your organization
  • How threat intelligence fits into a mature security practice and how to use it effectively
10:00 am - 10:30 am Track B

CIAM in Action: Lessons Learned from the Trenches

Speakers:
Janet Lin, Senior Director, Customer Engagement Technology, Loblaw Companies Ltd
Thomas Malta, Head of Identity and Access Management, Navy Federal Credit Union

Customer Identity and Access Management – increasingly, enterprises are undertaking CIAM initiatives to maximize, secure and improve their customer relationships across multiple channels. Join these hands-on security leaders to discuss:

  • The role of CIAM
  • Business benefits to be achieved
  • Myths and realities of the “frictionless” customer experience
10:30 am -
11:00 am
10:30 am - 11:00 am Track A

IAM as a Catalyst for Transformation: How Siemens and others drove scale and efficiency by modernizing their identity stack

Speaker:
Dave Wilner, Chief Revenue Officer, Auth0

As companies accelerate their digital transformation timelines, many are finding that identity and access management is essential to the speed and success of their endeavors. Discover how four brands--Babylon, Naranja, Siemens, and Kiva--approached their digital transformation and how they handled the identity portion of their transformation journey. We'll discuss

  • How and why managing identity is a critical step in your digital transformation journey
  • How your identity solution can scale with your digital transformation goals
  • Why invest in a dedicated IAM solution so your digital transformation investments will pay off
10:30 am - 11:00 am Track B

Cloud IAM: Enlightenment or #%$^?!?

Speakers:
Alex Corstorphine, Lead Security Solutions Engineer, Rapid7
Jeremy Snyder, Senior Director of Business Development and Solutions Engineering, DivvyCloud by Rapid7

Strong identity and access management (IAM) is one key to preventing data breaches and limiting the blast radius should a security incident occur. But cloud IAM presents a new set of constructs for organizations to build and manage. Is cloud IAM the best identity and access control ever, or yet one more reason to tear your hair out in frustration? Join Jeremy Snyder, Senior Director of Solutions Engineering, and Alex Corstorphine, Senior Solutions Engineer, from DivvyCloud by Rapid7 for an active discussion and debate. Topics will include why managing cloud IAM is so complex, what challenges this creates for IT and cybersecurity professionals, and how leading organizations governing cloud IAM to reduce risk and the chance of a data breach.

Key takeaways include understanding how to:

  • Gain visibility to assess, prioritize and remediate improper permission combinations that grant unintended or overly permissive access.
  • Reduce access down to least privilege
  • Work to minimize cloud security blast radius.
"
11:00 am -
11:15 am
11:00 am - 11:15 am Track A

Democratization of Data Control

Speaker:
Allan Foster, Chief Evangelist Officer, ForgeRock

In this talk, Allan will look at how the enterprise thinks of user data, and how the old paradigm is failing. He will talk about the new realities of consent, often dictated by law, and how they are failing badly. And through a security lens, the trends are not getting better, and in fact are getting worse. He will look at how making the user part of the data management process gives control, and authority to the end user, leading to higher levels of trust, and new ways of being able to use the data..

11:00 am - 11:15 am Track B

Making Zero Trust Real

Speaker:
Dan Conrad, IAM Strategist, One Identity

Establishing zero trust and least privileged access is key to securing privileged accounts. The Zero Trust model involves eliminating shared admin passwords so that every administrative action is authenticated uniquely, dynamically and specifically. The Least Privilege approach involves delegating to give each admin only the permissions they need - nothing more, nothing less.

In this session you will learn how to enable Zero Trust for Active Directory and everything that depends on AD. Elevated privileges in AD don't usually fit into a Zero Trust Architecture but with some simple policies and strong security procedures we can make AD conform, at least in part, to a ZTA.

11:15 am -
11:45 am
11:15 am - 11:45 am Track A

The Zero Trust Journey: Stepping Ahead with Identity and Privilege Access Management

Speaker:
Colin Duffy, Senior Vice President, Corporate Sales & Channel, Hitachi ID

Migrating to Zero Trust is a journey not often easily achieved. Zero Trust and legacy workflows can coexist as you tackle one business process at a time as your organization aspires for a higher level of operational maturity and greater cybersecurity resilience. Join Hitachi ID as we discuss how to create a Zero Trust security model starting with reducing identity as your attack vector. We will explore the layers of identity and privileged access management a singular security fabric can offer from square one or integrated with existing solutions to build a Zero Trust security model that protects your organization from cyberattacks.

11:15 am - 11:45 am Track B

How to Plan Your 2021 Identity Governance Administration Project

Speaker:
Rod Simmons, VP of Product Strategy, Omada

Each business unit has its unique policies that need to be incorporated into any IGA project, increasing complexity, and requiring a single mindset between all business leaders. In this session, we will break down the fundamental building blocks of identity governance and detail how to deploy to the cloud successfully.

Learn:

  • The foundation of IGA and the different levels of maturity
  • Key success factors for an IGA project and how SaaS improves TCO and TTV
  • What a modern IGA architecture looks like"
11:45 pm -
12:15 pm
11:45 pm - 12:15 pm Track A

Conveying the Business Value of Customer Identity

Speakers:
Gray Mitchell, CISO and VP of Advisory Services, IDMWORKS
Richard Bird, Chief Customer Information Officer, Ping Identity

Join this session to learn from Richard Bird, Chief Customer Information Officer, Ping Identity. And Gray Mitchell, CISO + VP of Advisory and IDMWORKS, how to communicate the value of customer identity and ensure that it is recognized, funded and prioritized like the revenue-generating behemoth that it is. We’ll end the session with a walkthrough example of a Fortune 500 Financial Services company and their Customer Identity business value journey.

11:45 pm - 12:15 pm Track B

The Future of IAM: Use-Case-Driven Authentication for 2021 and Beyond

Speaker: Bassam Al-Khalidi, Co-CEO, Axiad

In today’s digital climate there’s no single identity credential to meet all your business’s use cases. IT leaders must protect their dispersed workforce with multiple credentials, which can often be complex to manage. How can you keep employees top of mind while introducing new IAM solutions? What solutions can authenticate the variety of devices and users on your network? And can cloud-based authentication be as secure, or more so, than on-premise authentication? 

Join our session to answer these questions and more:
• Take a holistic approach with use-case-driven authentication for devices, privileged and non-privileged users
• Ensure your users and data are protected in a virtual private cloud, not open to attack in a mutualized system
• Protect every entity as traditional security perimeters disappear
• Empower the remote workforce to take charge of their credentials and manage their lifecycles “

12:15 pm -
12:30 pm
12:15 pm - 12:30 pm

Exhibition and Networking Break

12:30 pm -
1:00 pm
12:30 pm - 1:00 pm Track A

Zero trust and the Critical Role for Strong Authentication

Speakers:
Bernardo Vasquez, CISO, Hudson News
Rob Hornbuckle, CISO Allegiant Air
Suresh Thiru, Chief Product Officer, Yubico

Zero trust has truly come of age in the last 12 months, but there are many misconceptions relating to what it is, where to start on the journey and how to manage user privileges in a zero trust environment. One of the fundamentals for zero trust is strong authentication to ensure that the right assets are connecting to your network and that these privileges can be expanded or retracted as needed.

Join this panel of experts to explore the following topics -

  • Where do you begin to assess where you are on your Zero Trust journey?
  • What is strong authentication and why is it a critical part of Zero Trust?
  • How can I ensure that my authentication is dynamic enough to meet the changing workforce and expanding attack surface?
12:30 pm - 1:00 pm Track B

Unified Identity Protection

Speaker:
Hed Kovetz, CEO & Co-founder, Silverfort

In this session, Hed Kovetz of Silverfort, will discuss the growing need for extending modern authentication and access policies in a more holistic and unified manner to block identity-based attacks. He will explain how Unified Identity Protection can consolidate security controls across corporate networks and cloud environments to monitor access of users and service accounts across both cloud and on-premise infrastructure, analyzes risk in real time, and enforce adaptive authentication and access policies.
1:00 pm -
1:30 pm
1:00 pm - 1:30 pm

IAM: Are you all in or just dipping your toes?

Speakers:
Andre Bromes, CIO and CISO, Goodwill Industries of Greater New York and New Jersey
Arun De Souza, CISO+ CPO, Nexteer Automotive
Kent Browne, Global Director Stealth Identity GTM & Innovation Lead, Unisys Security

In this panel session we talk to three security veterans about how their IAM challenges have been compounded since going remote and what security controls they’ve put in place to assist this change. We also discuss the importance of adopting a holistic identity strategy and how to get the business on side to support this.

Join this exclusive panel for unique insight into:

  • IAM risks organizations have accepted this year;
  • The importance of adopting a holistic IAM strategy and how to do it;
  • Emerging IAM trends and technologies.
1:30 pm -
2:00 pm
1:30 pm - 2:00 pm Track A

IAM in a Multi/Hybrid Cloud Environment - Can We Do it Better This Time?

Speaker:
Thomas Malta, Head of Identity and Access Management, Navy Federal Credit Union

Multi-cloud and hybrid cloud solutions are great enablers for organizations, but managing IAM across multiple entities that are ever expanding in capability and use? Big challenges. But here's an opportunity to re-do enterprise IAM. Join Tom Malta of Navy Federal Credit Union for insight on:

  • Business requirements;
  • Next-gen IAM architectures;
  • A roadmap for success.
1:30 pm - 2:00 pm Track B

Making the Case for IAM Agility

Speaker:
Sean Ryan, Senior Analyst, Security & Risk, Forrester

A accelerated digital world calls for greater protection of identity and access - as well as greater agility in doing so. In this exclusive session, Sean Ryan of Forrester Research makes the case for IAM agility, focusing on:

  • Identity governance
  • Going passwordless
  • Machine identities and non-human identities
2:00 pm -
2:30 pm
2:00 pm - 2:30 pm

2021: A Chance to Refine Cybersecurity Approaches

Speaker:
Christian Toon, CISO, Pinsent Masons

In this fireside conversation, Christian Toon, CISO, Pinsent Masons LLP, reflects on what it takes to secure the digital workforce and keep up with the speed of change, refining cloud security approaches and the nuances of buying cyber insurance.

In this session, Toon will discuss:

  • Security transformation: What’s important today and how do we create ‘custom frameworks’ to guide us?
  • Tackling misconfiguration and visibility in the cloud: Where should our priorities lie?
  • Cyber insurance: What are the nuances of buying policy? Is it a good or bad thing in the event of ransomware?
2:30 pm -
3:00 pm
2:30 pm - 3:00 pm

Customer IAM – and the path to making identity better

Speaker:
Jeremy Grant, former Sr. Executive Advisor NIST; Managing Director, Technology Business Strategy, Venable

In both the public and private sectors, Jeremy Grant has long been a leading force in shaping how government and enterprises respond to the evolving needs of identity security.

In this exclusive session, Grant discusses:

  • The “State of Identity” and what COVID-19 has taught us about the inadequacies of the digital identity infrastructure
  • What’s needed to advance identity proofing and authentication
  • CIAM: where it’s taking root, what’s driving it, and security’s best role to enable it.
3:00 pm -
5:00 pm
3:00 pm - 5:00 pm

On Demand Viewing, Resource Center & Expo Hall

View Schedule
  • Hall A
  • Hall B
  • Hall C
  • Hall D
9:00 am -
9:30 am
9:00 am - 9:30 am

Registration & Exhibit Browsing

9:30 am -
10:00 am
9:30 am - 10:00 am

CISO View: The Real-Time Evolution of IAM

Speakers:
Gretchen Hiley, CISO & SVP - Global Information Security, Crawford and Company
Patty Ryan, Sr. Director, CISO, Global Information Services, Ortho Clinical Diagnostics
Tamika Bass, CISO, Georgia Department of Revenue

People, applications, devices - they all have digital identities, and in today's transformed environment they all demand new approaches to identity and access management. In this exclusive panel, three CISOs discuss their unique IAM challenges, including:

  • Protecting medical devices
  • Managing user (and identity) sprawl
  • Granting and validating access - without automation
10:00 am -
10:30 am
10:00 am - 10:30 am Track A

Black Box Thinking: Adopting a Human Centric Approach to Cybersecurity

Speaker:
Dr Kevin Jones, Group CISO, Airbus

In this fireside chat, Dr Kevin Jones, Group CISO, Airbus, explains why the age-old expression, “Humans are the weakest link”, is a myth that must be broken. Instead, we need to adopt human centric approaches to cybersecurity that make humans the last line of defense.

In this session, Jones will discuss:

  • How to create a human centric cybersecurity program that makes humans the last line of defense
  • What capabilities and priorities are needed to create and weave a culture of security into your organization
  • How threat intelligence fits into a mature security practice and how to use it effectively
10:00 am - 10:30 am Track B

CIAM in Action: Lessons Learned from the Trenches

Speakers:
Janet Lin, Senior Director, Customer Engagement Technology, Loblaw Companies Ltd
Thomas Malta, Head of Identity and Access Management, Navy Federal Credit Union

Customer Identity and Access Management – increasingly, enterprises are undertaking CIAM initiatives to maximize, secure and improve their customer relationships across multiple channels. Join these hands-on security leaders to discuss:

  • The role of CIAM
  • Business benefits to be achieved
  • Myths and realities of the “frictionless” customer experience
10:30 am -
11:00 am
10:30 am - 11:00 am Track A

IAM as a Catalyst for Transformation: How Siemens and others drove scale and efficiency by modernizing their identity stack

Speaker:
Dave Wilner, Chief Revenue Officer, Auth0

As companies accelerate their digital transformation timelines, many are finding that identity and access management is essential to the speed and success of their endeavors. Discover how four brands--Babylon, Naranja, Siemens, and Kiva--approached their digital transformation and how they handled the identity portion of their transformation journey. We'll discuss

  • How and why managing identity is a critical step in your digital transformation journey
  • How your identity solution can scale with your digital transformation goals
  • Why invest in a dedicated IAM solution so your digital transformation investments will pay off
10:30 am - 11:00 am Track B

Cloud IAM: Enlightenment or #%$^?!?

Speakers:
Alex Corstorphine, Lead Security Solutions Engineer, Rapid7
Jeremy Snyder, Senior Director of Business Development and Solutions Engineering, DivvyCloud by Rapid7

Strong identity and access management (IAM) is one key to preventing data breaches and limiting the blast radius should a security incident occur. But cloud IAM presents a new set of constructs for organizations to build and manage. Is cloud IAM the best identity and access control ever, or yet one more reason to tear your hair out in frustration? Join Jeremy Snyder, Senior Director of Solutions Engineering, and Alex Corstorphine, Senior Solutions Engineer, from DivvyCloud by Rapid7 for an active discussion and debate. Topics will include why managing cloud IAM is so complex, what challenges this creates for IT and cybersecurity professionals, and how leading organizations governing cloud IAM to reduce risk and the chance of a data breach.

Key takeaways include understanding how to:

  • Gain visibility to assess, prioritize and remediate improper permission combinations that grant unintended or overly permissive access.
  • Reduce access down to least privilege
  • Work to minimize cloud security blast radius.
"
11:00 am -
11:15 am
11:00 am - 11:15 am Track A

Democratization of Data Control

Speaker:
Allan Foster, Chief Evangelist Officer, ForgeRock

In this talk, Allan will look at how the enterprise thinks of user data, and how the old paradigm is failing. He will talk about the new realities of consent, often dictated by law, and how they are failing badly. And through a security lens, the trends are not getting better, and in fact are getting worse. He will look at how making the user part of the data management process gives control, and authority to the end user, leading to higher levels of trust, and new ways of being able to use the data..

11:00 am - 11:15 am Track B

Making Zero Trust Real

Speaker:
Dan Conrad, IAM Strategist, One Identity

Establishing zero trust and least privileged access is key to securing privileged accounts. The Zero Trust model involves eliminating shared admin passwords so that every administrative action is authenticated uniquely, dynamically and specifically. The Least Privilege approach involves delegating to give each admin only the permissions they need - nothing more, nothing less.

In this session you will learn how to enable Zero Trust for Active Directory and everything that depends on AD. Elevated privileges in AD don't usually fit into a Zero Trust Architecture but with some simple policies and strong security procedures we can make AD conform, at least in part, to a ZTA.

11:00 am - 11:15 am Track C

Unified Identity Protection

Speaker:
Hed Kovetz, CEO & Co-founder, Silverfort

In this session, Hed Kovetz of Silverfort, will discuss the growing need for extending modern authentication and access policies in a more holistic and unified manner to block identity-based attacks. He will explain how Unified Identity Protection can consolidate security controls across corporate networks and cloud environments to monitor access of users and service accounts across both cloud and on-premise infrastructure, analyzes risk in real time, and enforce adaptive authentication and access policies.
11:15 am -
11:45 am
11:15 am - 11:45 am Track A

The Zero Trust Journey: Stepping Ahead with Identity and Privilege Access Management

Speaker:
Colin Duffy, Senior Vice President, Corporate Sales & Channel, Hitachi ID

Migrating to Zero Trust is a journey not often easily achieved. Zero Trust and legacy workflows can coexist as you tackle one business process at a time as your organization aspires for a higher level of operational maturity and greater cybersecurity resilience. Join Hitachi ID as we discuss how to create a Zero Trust security model starting with reducing identity as your attack vector. We will explore the layers of identity and privileged access management a singular security fabric can offer from square one or integrated with existing solutions to build a Zero Trust security model that protects your organization from cyberattacks.

11:15 am - 11:45 am Track B

How to Plan Your 2021 Identity Governance Administration Project

Speaker:
Rod Simmons, VP of Product Strategy, Omada

Each business unit has its unique policies that need to be incorporated into any IGA project, increasing complexity, and requiring a single mindset between all business leaders. In this session, we will break down the fundamental building blocks of identity governance and detail how to deploy to the cloud successfully.

Learn:

  • The foundation of IGA and the different levels of maturity
  • Key success factors for an IGA project and how SaaS improves TCO and TTV
  • What a modern IGA architecture looks like"
11:45 am -
12:15 pm
11:45 am - 12:15 pm Track A

Conveying the Business Value of Customer Identity

Speakers:
Gray Mitchell, CISO and VP of Advisory Services, IDMWORKS
Richard Bird, Chief Customer Information Officer, Ping Identity

Join this session to learn from Richard Bird, Chief Customer Information Officer, Ping Identity. And Gray Mitchell, CISO + VP of Advisory and IDMWORKS, how to communicate the value of customer identity and ensure that it is recognized, funded and prioritized like the revenue-generating behemoth that it is. We’ll end the session with a walkthrough example of a Fortune 500 Financial Services company and their Customer Identity business value journey.

11:45 am - 12:15 pm Track B

The Future of IAM: Use-Case-Driven Authentication for 2021 and Beyond

Speaker: Bassam Al-Khalidi, Co-CEO, Axiad

In today’s digital climate there’s no single identity credential to meet all your business’s use cases. IT leaders must protect their dispersed workforce with multiple credentials, which can often be complex to manage. How can you keep employees top of mind while introducing new IAM solutions? What solutions can authenticate the variety of devices and users on your network? And can cloud-based authentication be as secure, or more so, than on-premise authentication? 

Join our session to answer these questions and more:
• Take a holistic approach with use-case-driven authentication for devices, privileged and non-privileged users
• Ensure your users and data are protected in a virtual private cloud, not open to attack in a mutualized system
• Protect every entity as traditional security perimeters disappear
• Empower the remote workforce to take charge of their credentials and manage their lifecycles “

12:15 pm -
12:30 pm
12:15 pm - 12:30 pm

Exhibition and Networking Break

12:00 pm -
12:15 pm
12:00 pm - 12:15 pm

Conveying the Business Value of Customer Identity

Speakers:
Gray Mitchell, CISO and VP of Advisory Services, IDMWORKS
Richard Bird, Chief Customer Information Officer, Ping Identity

Join this session to learn from Richard Bird, Chief Customer Information Officer, Ping Identity. And Gray Mitchell, CISO + VP of Advisory and IDMWORKS, how to communicate the value of customer identity and ensure that it is recognized, funded and prioritized like the revenue-generating behemoth that it is. We’ll end the session with a walkthrough example of a Fortune 500 Financial Services company and their Customer Identity business value journey.

12:15 pm -
12:30 pm
12:15 pm - 12:30 pm

Exhibition and Networking Break

12:30 pm -
1:00 pm
12:30 pm - 1:00 pm Track A

Zero trust and the Critical Role for Strong Authentication

Speakers:
Bernardo Vasquez, CISO, Hudson News
Rob Hornbuckle, CISO Allegiant Air
Suresh Thiru, Chief Product Officer, Yubico

Zero trust has truly come of age in the last 12 months, but there are many misconceptions relating to what it is, where to start on the journey and how to manage user privileges in a zero trust environment. One of the fundamentals for zero trust is strong authentication to ensure that the right assets are connecting to your network and that these privileges can be expanded or retracted as needed.

Join this panel of experts to explore the following topics -

  • Where do you begin to assess where you are on your Zero Trust journey?
  • What is strong authentication and why is it a critical part of Zero Trust?
  • How can I ensure that my authentication is dynamic enough to meet the changing workforce and expanding attack surface?
12:30 pm - 1:00 pm Track B

Unified Identity Protection

Speaker:
Hed Kovetz, CEO & Co-founder, Silverfort

In this session, Hed Kovetz of Silverfort, will discuss the growing need for extending modern authentication and access policies in a more holistic and unified manner to block identity-based attacks. He will explain how Unified Identity Protection can consolidate security controls across corporate networks and cloud environments to monitor access of users and service accounts across both cloud and on-premise infrastructure, analyzes risk in real time, and enforce adaptive authentication and access policies.
1:00 pm -
1:30 pm
1:00 pm - 1:30 pm

IAM: Are you all in or just dipping your toes?

Speakers:
Andre Bromes, CIO and CISO, Goodwill Industries of Greater New York and New Jersey
Arun De Souza, CISO+ CPO, Nexteer Automotive
Kent Browne, Global Director Stealth Identity GTM & Innovation Lead, Unisys Security

In this panel session we talk to three security veterans about how their IAM challenges have been compounded since going remote and what security controls they’ve put in place to assist this change. We also discuss the importance of adopting a holistic identity strategy and how to get the business on side to support this.

Join this exclusive panel for unique insight into:

  • IAM risks organizations have accepted this year;
  • The importance of adopting a holistic IAM strategy and how to do it;
  • Emerging IAM trends and technologies.
1:30 pm -
2:00 pm
1:30 pm - 2:00 pm Track A

IAM in a Multi/Hybrid Cloud Environment - Can We Do it Better This Time?

Speaker:
Thomas Malta, Head of Identity and Access Management, Navy Federal Credit Union

Multi-cloud and hybrid cloud solutions are great enablers for organizations, but managing IAM across multiple entities that are ever expanding in capability and use? Big challenges. But here's an opportunity to re-do enterprise IAM. Join Tom Malta of Navy Federal Credit Union for insight on:

  • Business requirements;
  • Next-gen IAM architectures;
  • A roadmap for success.
1:30 pm - 2:00 pm Track B

Making the Case for IAM Agility

Speaker:
Sean Ryan, Senior Analyst, Security & Risk, Forrester

A accelerated digital world calls for greater protection of identity and access - as well as greater agility in doing so. In this exclusive session, Sean Ryan of Forrester Research makes the case for IAM agility, focusing on:

  • Identity governance
  • Going passwordless
  • Machine identities and non-human identities
2:00 pm -
2:30 pm
2:00 pm - 2:30 pm

2021: A Chance to Refine Cybersecurity Approaches

Speaker:
Christian Toon, CISO, Pinsent Masons

In this fireside conversation, Christian Toon, CISO, Pinsent Masons LLP, reflects on what it takes to secure the digital workforce and keep up with the speed of change, refining cloud security approaches and the nuances of buying cyber insurance.

In this session, Toon will discuss:

  • Security transformation: What’s important today and how do we create ‘custom frameworks’ to guide us?
  • Tackling misconfiguration and visibility in the cloud: Where should our priorities lie?
  • Cyber insurance: What are the nuances of buying policy? Is it a good or bad thing in the event of ransomware?
2:30 pm -
3:00 pm
2:30 pm - 3:00 pm

Customer IAM – and the path to making identity better

Speaker:
Jeremy Grant, former Sr. Executive Advisor NIST; Managing Director, Technology Business Strategy, Venable

In both the public and private sectors, Jeremy Grant has long been a leading force in shaping how government and enterprises respond to the evolving needs of identity security.

In this exclusive session, Grant discusses:

  • The “State of Identity” and what COVID-19 has taught us about the inadequacies of the digital identity infrastructure
  • What’s needed to advance identity proofing and authentication
  • CIAM: where it’s taking root, what’s driving it, and security’s best role to enable it.
3:00 pm -
5:00 pm
3:00 pm - 5:00 pm

On Demand Viewing, Resource Center & Expo Hall

View Schedule

SPONSORS / Supporting Organizations

Auth0
Axiad
Forge Rock
Hitachi ID Systems, Inc.
Okta
Omada
Ping Identity
Quest
Rapid7
Silverfort
Unisys
Yubico

VIRTUAL SUMMIT DETAILS / what to expect at our virtual event

View sessions, chat with speakers and technology experts in our Interactive Exhibit & Networking Experience, and browse our Resource Center to download educational assets to review post-summit.

If you miss any live sessions, feel free to log in and view on demand at your own pace. Session recordings will be available in our virtual environment after the agenda has ended.

ISMG Virtual Summit Attendee Guide
For more information please download our ISMG Virtual Summit Attendee Guide.

Meet Our Speakers

ISMG Global Events: 2020 and Beyond

ISMG's SVP of Editorial, VP of Global Events, and Group Director of Custom Events discuss the state of events.

The Critical Importance of Data Integrity

Microsoft's Diana Kelley on How to Keep Data Untampered

Steve Katz on Cybersecurity’s State of the Union

World's First CISO Weighs in on the Technologies and Trends Shaping 2019

The Challenge of Fighting Identity Fraud

IBM's Shaked Vax on Emerging Technologies to Assure Digital IDs

A Common Sense Guide to Mitigating Insider Threats

Randy Trzeciak of CERT Reviews the Latest Research

Register Today

To earn CPE credits, hear from industry influencers, join ISMG’s global community and meet with leaders of technology register today.

Register Now

Registering For a Group?
Call + 1 (609)-356-1499  or email at events@ismgcorp.com

Contact Us

Reach us: Reserve your attendance today to ensure you don’t miss the opportunity to meet, network and learn from the foremost experts in information security and risk management in this interactive environment.

+1 (609) 356-1499
events@ismg.io

Join the Community

Subscribe to get the latest happenings on our Roundtables, Summits, and other Events!

    • BankInfoSecurity
    • CUInfoSecurity
    • GovInfoSecurity
    • HealthcareInfoSecurity
    • InfoRiskToday
    • CareersInfoSecurity
    • DataBreachToday
    • CyberEd
    Home | Summits | Press Releases | Sponsorship
    © 2021 Information Security Media Group, Corp. |
    Privacy & GDPR Statement | CCPA: Do Not Sell My Personal Data