Securing Environments with Identity & Access Management
February 5-6, 2025
Mastering IAM is crucial for safeguarding your digital assets. Uncover innovative approaches to mitigate identity risks and enhance user experience with the latest in IAM.
IAM is fast becoming a top business priority. With more transactions and services based online, businesses’ attack surfaces are growing fast. This risk is exacerbated by the rise of AI in identity-based attacks. Meanwhile, as regulators tighten requirements around protecting identities, getting visibility on user access and controls is fundamental to achieving compliance in the face of new regulations.
Join this Summit to get practical tips and insights to design scalable identity security strategies that give you full visibility and control over data, streamline user access and prevent unauthorized access.
You will shortly be able to register for free and gain access to live webinars and keynote presentations from leading innovators, vendors and evangelists.
Securing Environments with Identity & Access Management
February 5-6, 2025
Tracks
Managing Identity Sprawl
February 5, 2025
Hosting a multitude of users and credentials across siloes leaves you exposed to crucial vulnerabilities that attackers love. Learn how to reduce fragmentation and centralize your IAM systems with single sign-on, role-based access control and more.
Content to follow shortly
Development in Privileged Access Management
February 6, 2025
Unsecured privileged access accounts are prime attack targets, posing severe risks to your systems and data. Learn how advanced PAM solutions like just-in-time access and AI-driven monitoring can fortify your defenses and ensure compliance.
Content to follow shortly
Audience
CISOs, CIOs, CTOs, MDs, Heads, EVPs, SVPs, VPs, Directors, Managers, Practitioners, and Consultants within:
IT / IT Security / IT Operations
Network Security / Systems Engineering
Internal Audit / Compliance
Incident Response
Security / Information Security / Information Assurance
Data Privacy / Data Security
Cloud Security / Solutions Architecture
Identity Management
Breach Detection / Threat Detection
Threat Management
Cybersecurity / Cyber Intelligence
IT Risk Managers
Previous Attending Companies
Abbvie, Aera Energy, AgResearch, American Red Cross, Amerijet International Inc., Aon Corporation, AstraZeneca, ATB Financial, Australia and New Zealand (ANZ) Banking Group, Averhealth, BAE Systems, Ball Corporation, Banda Health, Bank of America, BBVA, BCBS, Bestel, BMO, BNP Paribas, Boeing, Booz Allen Hamilton, Bosch, British Telecom Group, CACI International Inc, Capital One, CapTech Ventures, CBT Company, CFAO Group, Challenger Stone
Chevron, CIGNA, Claranet, Cobra Trading, Cogent International, Cox Communications, Credit Suisse, CVS Corporation, DaVita Inc, DBS Bank, Deutsche Bank, Dow Jones, Dubai Airports, Duke Energy, Energy Transfer, Engen Petroleum Ltd, Evolutio, Farmers Mutual, FedEx, Federal Reserve, General Dynamics, General Motors, Goldman Sachs, Heluna Health, Hilton Hotels, HSBC plc, Inertial Labs, Jacobs Corporation, Johnson & Johnson, Kiewit, Kyndryl
Leeds Building Society, LinkedIn, Lockheed Martin, Logtek USA Inc, Marsh Inc, Modern Industries Inc., Mondo, Morgan Stanley, MUFG, Netflix, Nomura, Northrop Grumman, Northwell Health, Novuna, Optum, Pacira Pharmaceuticals, Palomar Health, Panasonic, Paystack, PepsiCo, PETROBEL, Pfizer, QBE Insurance Group, Refinitiv, Repsol, SAIC, Saudi Telecom, Schellman, Schneider Electric, Scotiabank, Select Sires, Societe Generale SA, Splunk
Taliworks Corporation, TD Bank, Teladoc Health, Telenet, Tencent, The Madison Square Garden Company, Tigermar Global, TotalEnergies, UBS AG, Union Pacific Railroad, USAA, US Air Force, U.S. Bancorp, U.S. Coast Guard, US Department of Health & Human Services, US DOJ, US Government, Universal Computer Center, Vesta Corp, Visa, Volkswagen AG, Volvo, Walt Disney, Wells Fargo, Westlake Chemical Corporation, WeWork, YETI, Zenith Bank, and more.