IDM UK 2017
On the 8th of November IAM professionals from across Europe head to London for the 15th IDM UK. Creator and organizer Whitehall Media announces the conference as:
“The UK’s Leading event for risk-driven business centric IAM luminaries, practitioners and end-users from across government and large enterprise organisations”
Why attend?
Whitehall Media’s 15th IDM UK conference will offer a platform for IAM specialists, thought leaders and companies keen to learn more across Europe to discuss the infrastructural challenges and opportunities associated with managing and securing identity within the enterprise. This all day event is the perfect opportunities to review the state of Identity management across governments to large enterprises and how they secure their business.
The conference will explore how IAM can become a key enabler to organisations. Through cross-sector case studies and industry perspectives we charter key IAM imperatives including accountability, transparency, user experience and managing trust, privileges and entitlements. The sessions will also explore:
- Why businesses require identity governance
- Examples of successful deployments of comprehensive, customer focused identity management infrastructures
- The impact of identity management investment on top-line revenue
- How to use IAM to achieve business goals and empower digital business
- The changing security landscape and disruptive technologies
- Operationalising identity intelligence for efficiency and risk mitigation
- Identifying future trends in the IAM space
Identity Methods
Identity Methods is a leading provider of identity access management & identity governance and administration solutions in the UK. With a consultancy-led approach, that delivers complete solutions, using best-of-breed products, Identity Methods offers clients end-to-end services, covering every aspect of the identity and information lifecycle.
Using a combination of consulting, software and cloud services, Identity Methods ensures that clients can exploit their data securely, using the cloud and analytics to drive their business, through valuable intelligence and data access control across an interconnected enterprise infrastructure.
Featured Topics
- Analytics insights
- Authentication
- Authorisation
- Cloud Computing
- Data Governance
- Data Protection
- Encryption techniques
- Mobility and BYOD risks
- Federated AM
- Identity Administration
- Identity Intelligence
- Identity as a Service
- Managing User Entitlements
- Managing User Privileges
- Password Management
- Risk Management
- Information Security
- Server and Network Security
- Single Sign-On (SSO)
- Security Policy and Planning
- Threat Intelligence
- Two-factor Authentication
- Credential Management
- User Self-Service
- Security Intelligence and Analytics
- Incident Handling and Reporting
- Provisioning and
De-Provisioning - IAM and Disruptive Technologies