Here is an article I should have published last year, in fact Whitehall Mediainvited me to the 2022 event, but since I didn't take any notes, I wasn't able to provide any feedback on the subject.
Initially, I thought that this type of conference would focus on feedback from companies that use solutions related to IAM (Identity Access Management), PIM (Privileged Identity Management), and PAM (Privileged Access Management), but it turns out that the speakers are relatively diverse, as they include players from theIdentity Management market, such as PingIdentity, Okta, BeyondTrust, and SailPoint, as well as players from other fields, such as ABN AMRO Bank, ROCHE Laboratories, Vodafone (this year), Swisscom, Jumbo Supermarket, and Firmenich (last year).
Are we going to consider internal identity management to define our customer management?
Here is Bruno Falcao fromRoche Laboratories' approach to implementing a CustomerIdentity and Access Management solution: do not approach the customer experience in the same way as the employee experience. During his presentation, he gave two examples that were quite different from each other:
- Patricia's, probably very young and familiar with how MFA authentication works, with a phone provided by the company.
- That of Dr. Hans Fritz, certainly no longer very young, with a relatively old phone that is not compatible with MFA.
This scenario clearly illustrates why the IAM approach is not relevant for implementing CIAM, as customers do not have the same needs as internal company users...all while drawing a parallel with Netflix and their customer policy (relating to account sharing) that was abandoned earlier this year.
Adrift in an ocean of cyberterror: Are you looking for a life jacket or a lifeboat?
Starting his presentation with a photo of his children in swimsuits and the sea in front of them in different conditions is a bold parallel to draw in order to describe the type of protection to choose according to the type of threat we face...This is also the approach that Hans-Robert Vermeulen of Sailpoint chose to illustrate his point: "Among the solutions available on the market, it is essential to decipher the marketing of each distributor, as some offer more features than others and it can sometimes be difficult to navigate."
Introduction to NIS 2 compliance for privileged access
The NIS 2 Directive is finally here, which is good news...but how can we ensure that our information systems comply with it?
This is what Chris Dearden from Ping Identity explains to us. He commented on each important paragraph, some of which contained more technical elements than others, adding that these technical elements can be addressed by Ping Identity (and certainly by others).
Prevent lateral movement by protecting MFA and service accounts in Active Directory
Lateral Movement? These are techniques used by hackers known as Red Team (in other words, offensive hackers) who exploit security flaws to allow them to move freely within an information system once they have gained access.
During this presentation, Frank Leavis from Silverfort explains that it is possible to reduce (but not completely eliminate) the risks arising from security flaws inherent in the services implemented (such as Active Directory) using MFA (multi-factor authentication) and service account mechanisms.
Lessons learned during the migration to MFA
According to Martin Sandren, his team is the most disliked in the entire company. That may be true, but why?
Due to technical constraints inherent to localization, his team was forced to thoroughly revise the MFA policy so that it could be applied to everyone and offer the most appropriate MFA experience in certain circumstances.
For example, if SMS and the application do not allow multi-factor authentication, there are still other methods available, such as certificates or network location.
Mergers and acquisitions: how an identity governance solution can deliver a smooth and efficient process
When several companies merge, their information systems are also bound to undergo the same fate, and the process can become complicated.
During her presentation, Anette Lavu from Valmet revealed that she had harnessed the power of theIdentity Governance and Administration (IGA) tool to make the operation simpler and faster, reducing the time required to around two hours.
During this session, we also learned about some best practices for using Savyint'sIGA solution.





