Tuesday, March 26, 2024 | |||
---|---|---|---|
Opening remarks and introductory presentation: Constructing an identity mousetrap | Our sponsor talks to Ed Moore, AVP of Security - Identity and Access Management, Carnival Corp., about how to construct the better identity mousetrap he touched upon during the opening presentation. | Ed Moore - Carnival Corp | |
Breakout Session | A Better Way to IGA | We'll focus on how to think about Identity Governance as more than just a compliance tool. It’s imperative in building out an enterprise-ready security strategy. We highlight the pitfalls of DIY approaches and traditional solutions, and present Okta as a unified platform that helps to accelerate governance needs for IT and GRC teams. | Andrei Velicanu - Okta | |
Breakout Session | Cyberwar and Theft: Attacker Methods, Motivations and Building a Strategic Defense | Get in the minds of Criminals, Nation States and Hacktivists. Join us to explore the motivation, and cutting-edge tactics of today’s threat actors. Our resident experts, Andy Thompson, and Brandon McCaffrey will unravel the intricacies of recent attacks and evolving threat methods that jeopardize your organization. McCaffrey and Thompson are your guides to a robust defense, sharing strategies tailored for the modern battlefield. Discover actionable steps to fortify your defenses, ensuring enhanced security without compromising user experience or productivity. Don't just stay secure; stay ahead. | Andy Thompson - CyberArk Labs Brandon McCaffrey - CyberArk Labs | |
Breakout Session | Identity Orchestration: Where Zero Trust Security Meets Usability | Zero trust architecture has become more actionable than ever thanks to evolving NIST and CISA guidance, yet many organizations still have fundamental problems advancing maturity when it comes to incorporating the right vendors at the right time in their journey to zero trust. Join this session to learn how identity orchestration makes it possible for anyone -- not just coding experts -- to create and deploy secure user experiences.Identity Orchestration: Where Zero Trust Security Meets Usability | Max Fathauer - Ping | |
War stories in identity: A panel discussion | IAM specialists share compelling narratives and firsthand experiences from the front lines of identity security: from battling evolving cyber threats to navigating the complexities of user access and authentication. Panelists will offer valuable insights and lessons learned. Explore the strategies employed to safeguard digital identities, mitigate risks, and ensure seamless user experiences in the face of adversity. | Ed Moore - Carnival Corp Akira Brand - Resilia Chul Choi - Okta | |
CRA Business Intelligence study takeaways: Identity and access | Join Daniel Thomas for a look at where security teams continue to struggle/succeed, and where respondents plan to make investments in the coming year. | Daniel Thomas - CyberRisk Alliance | |
Defining & Building an Identity Graph | In today’s world, there is no single source of truth for workforce identity. The traditional corporate directory is now just one of many components in a complex identity synchronization process that spans on-premises and cloud-based directories, HR systems, a multitude of SaaS applications, and directories for public cloud credentials. The blurring of definitional lines between internal, external, and consumer identities and the complications arising from mergers, acquisitions, and contract work all compound the issue. | Alex Zaslavsky - Cisco Identity Intelligence Didi Dotan - Cisco Identity Intelligence | |
Constructing an identity mousetrap and wrap-up | Our sponsor talks to Ed Moore, AVP of Security - Identity and Access Management, Carnival Corp., about how to construct the better identity mousetrap he touched upon during the opening presentation. | Khizar Sultan - CyberArk |