Back

IDM EUROPE 2023, the debrief

Image Slider

October 30, 2023

Here is an article that I should have published last year. Whitehall Media invited me to the 2022 event, but since I didn't take any notes, I wasn't able to provide any feedback on the subject.

Here is an article I should have published last year, in fact Whitehall Mediainvited me to the 2022 event, but since I didn't take any notes, I wasn't able to provide any feedback on the subject.

 

Initially, I thought that this type of conference would focus on feedback from companies that use solutions related to IAM (Identity Access Management), PIM (Privileged Identity Management), and PAM (Privileged Access Management), but it turns out that the speakers are relatively diverse, as they include players from theIdentity Management market, such as PingIdentity, Okta, BeyondTrust, and SailPoint, as well as players from other fields, such as ABN AMRO Bank, ROCHE Laboratories, Vodafone (this year), Swisscom, Jumbo Supermarket, and Firmenich (last year).

 

Are we going to consider internal identity management to define our customer management?

Here is Bruno Falcao fromRoche Laboratories' approach to implementing a CustomerIdentity and Access Management solution: do not approach the customer experience in the same way as the employee experience. During his presentation, he gave two examples that were quite different from each other:

 

  • Patricia's, probably very young and familiar with how MFA authentication works, with a phone provided by the company.
  • That of Dr. Hans Fritz, certainly no longer very young, with a relatively old phone that is not compatible with MFA.

 

This scenario clearly illustrates why the IAM approach is not relevant for implementing CIAM, as customers do not have the same needs as internal company users...all while drawing a parallel with Netflix and their customer policy (relating to account sharing) that was abandoned earlier this year.

 

Adrift in an ocean of cyberterror: Are you looking for a life jacket or a lifeboat?

Starting his presentation with a photo of his children in swimsuits and the sea in front of them in different conditions is a bold parallel to draw in order to describe the type of protection to choose according to the type of threat we face...This is also the approach that Hans-Robert Vermeulen of Sailpoint chose to illustrate his point: "Among the solutions available on the market, it is essential to decipher the marketing of each distributor, as some offer more features than others and it can sometimes be difficult to navigate."

 

Introduction to NIS 2 compliance for privileged access

The NIS 2 Directive is finally here, which is good news...but how can we ensure that our information systems comply with it?

 

This is what Chris Dearden from Ping Identity explains to us. He commented on each important paragraph, some of which contained more technical elements than others, adding that these technical elements can be addressed by Ping Identity (and certainly by others).

 

Prevent lateral movement by protecting MFA and service accounts in Active Directory

Lateral Movement? These are techniques used by hackers known as Red Team (in other words, offensive hackers) who exploit security flaws to allow them to move freely within an information system once they have gained access.

During this presentation, Frank Leavis from Silverfort explains that it is possible to reduce (but not completely eliminate) the risks arising from security flaws inherent in the services implemented (such as Active Directory) using MFA (multi-factor authentication) and service account mechanisms.

 

Lessons learned during the migration to MFA

According to Martin Sandren, his team is the most disliked in the entire company. That may be true, but why?

Due to technical constraints inherent to localization, his team was forced to thoroughly revise the MFA policy so that it could be applied to everyone and offer the most appropriate MFA experience in certain circumstances.

For example, if SMS and the application do not allow multi-factor authentication, there are still other methods available, such as certificates or network location.

 

Mergers and acquisitions: how an identity governance solution can deliver a smooth and efficient process

When several companies merge, their information systems are also bound to undergo the same fate, and the process can become complicated.

During her presentation, Anette Lavu from Valmet revealed that she had harnessed the power of theIdentity Governance and Administration (IGA) tool to make the operation simpler and faster, reducing the time required to around two hours.

During this session, we also learned about some best practices for using Savyint'sIGA solution.

 

Mickaël DANGLETERRE

DevOps Architect

A look back at Cloud Expo Europe, DevOps Live, Cloud & Cyber Security Expo cover
December 6, 2023

A look back at Cloud Expo Europe, DevOps Live, Cloud & Cyber Security Expo

A look back at Cloud Expo Europe, DevOps Live, and Cloud & Cyber Security Expo on November 15...
Learn more
AppSec Factory cover inauguration
November 13, 2023

AppSec Factory Inauguration

Squad launches AppSec Factory and strengthens its expertise in application development...
Learn more
ReactJs vs AngularJS cover
October 23, 2023

ReactJs vs AngularJS

Discover a detailed comparison of the different features of React Js and Ang...
Learn more
Red Hat Summit Connect Paris 2023 cover
October 16, 2023

Red Hat Summit Connect Paris 2023

At the Red Hat Summit Connect in Paris in 2023, I had the privilege...
Learn more
LeHack 2023: a look back at a unique event! cover
July 20, 2023

LeHack 2023: a look back at a unique event!

A look back at LeHack 2023, the cybersecurity event dedicated to hacking and challenges...
Learn more