IDM UK 2017

Posted in Company News on .

Website IDM Background image

On the 8th of November IAM professionals from across Europe head to London for the 15th IDM UK. Creator and organizer Whitehall Media announces the conference as:

“The UK’s Leading event for risk-driven business centric IAM luminaries, practitioners and end-users from across government and large enterprise organisations”

 

Why attend?

Whitehall Media’s 15th IDM UK conference will offer a platform for IAM specialists, thought leaders and companies keen to learn more across Europe to discuss the infrastructural challenges and opportunities associated with managing and securing identity within the enterprise. This all day event is the perfect opportunities to review the state of Identity management across governments to large enterprises and how they secure their business.

 

The conference will explore how IAM can become a key enabler to organisations. Through cross-sector case studies and industry perspectives we charter key IAM imperatives including accountability, transparency, user experience and managing trust, privileges and entitlements. The sessions will also explore:
 

 

Identity Methods

Identity Methods is a leading provider of identity access management & identity governance and administration solutions in the UK. With a consultancy-led approach, that delivers complete solutions, using best-of-breed products, Identity Methods offers clients end-to-end services, covering every aspect of the identity and information lifecycle.

Using a combination of consulting, software and cloud services, Identity Methods ensures that clients can exploit their data securely, using the cloud and analytics to drive their business, through valuable intelligence and data access control across an interconnected enterprise infrastructure.

Register here

Featured Topics

  • Analytics insights
  • Authentication
  • Authorisation
  • Cloud Computing
  • Data Governance
  • Data Protection
  • Encryption techniques
  • Mobility and BYOD risks
  • Federated AM
  • Identity Administration
  • Identity Intelligence
  • Identity as a Service
  • Managing User Entitlements
  • Managing User Privileges
  • Password Management
  • Risk Management
  • Information Security
  • Server and Network Security
  • Single Sign-On (SSO)
  • Security Policy and Planning
  • Threat Intelligence
  • Two-factor Authentication
  • Credential Management
  • User Self-Service
  • Security Intelligence and Analytics
  • Incident Handling and Reporting
  • Provisioning and
    De-Provisioning
  • IAM and Disruptive Technologies