In September 2023, identity security customers, partners and product experts from around the world gathered in Madrid to drive strategy and product development into the future, all while accelerating their own identity security and strengthening their overall cybersecurity posture.
The event included dozens of sessions categorized into five learning tracks (Security, Active Directory Management, Access Management (OneLogin), Identity Governance and Administration (IGA) and Privileged Access Management (PAM)), as well as mainstage, partner, CAB and Technical Deep Dive sessions. Attendees had the opportunity to mix and match sessions from each category to create the perfect agenda to meet their personal goals for the conference.
Gained valuable identity security industry insights
Learned best practices, tips and tricks to improve their technical proficiency and knowledge
Received direct access to product development, product managers, product marketing and subject matter experts
Offered the opportunity to provide input on future product enhancements
Networked with peers
Mark Logan: CEO and President, One Identity
Come hear from Mark on how One Identity is uniquely positioned to help companies address the rapid proliferation of identity-based threats targeting their business and adapt to an ever-changing threat landscape.
Keynote: Paula JanuszkiewiczPaula Januszkiewicz: CQURE Founder and CEO, Microsoft Regional Director, MVP, MCT CQURE
Top 10 Mistakes by Administrators About Remote Work
The sudden shift to remote working has left businesses at a far higher risk of cyberattacks, largely due to their corporate infrastructure being exposed to new external attack vectors and threats. However, although cybercriminals worldwide used the global crisis to spread their wings on an unprecedented scale, there are possibilities and ideas that administrators and regular users can also come up within 10 minutes – for this is the time that allows a hacker to attack your infrastructure. For real! And that often includes a coffee break.
During this session, you will learn the top 10 mistakes related to remote work security, adopt the hacker’s perspective on home office, gain an understanding of different situations hackers can create to gain access to a company’s information by abusing the situation and find out what solutions and approaches companies can implement to make the home office a safe workplace. You will also become familiar with attacks on the company's resources through users connected to a VPN, watch a demonstration of how hackers can attack a user's workstation and learn many more things related to the technical challenges of remote work, including mobile devices.
The presentation includes a demonstration of vulnerabilities found by Paula and the relevant mitigation. This topic is crucial for all cloud/identity admins, as it showcases problems with identity that can be found in almost every organization. And these problems will probably be a part of the IT reality for many years. Paula would like to present the most up-to-date security solutions and share the entire experience she gathered last year so that you don’t become the next perfect target for hackers!
Industry Experts RoundtableIan Sutherland: VP of Sales, EMEA, One Identity
Rajiv Sagar: Global Cybersecurity Consulting Lead, Avanade
Aiert Azueta: Global IAM Director, Devoteam Group
Fernando Mediavilla Basabe: Head of Big Data & Security, Iberia, Eviden
Join a panel of industry experts to hear insights and best practice guidance from executive leadership from across our customer and partner landscape.
Neurotechnology: From Science Fiction to RealityRudy de Sousa : Director of PreSales, One Identiy
Neurotechnology is moving from the realms of Science Fiction to Reality. In this session, we will discuss what neurotechnology is, its current state and the identity security challenges it introduces.
Industry Trends and the Importance of Unified Identity SecurityDarren Thomson: Vice President of Product Marketing, One Identity
Enterprise attack surfaces continue to evolve through cloud-based infrastructure, the proliferation of connected devices, and reliance on third-party solutions. New vulnerabilities are emerging every day from security gaps in the software supply chain to use of AI and cybercriminals are being proactive in exploiting them. Comprehensive Identity Security is a critical element to containing these new risks but maintaining best practices for a robust IAM strategy using multiple security tools has never been more challenging.
This session will address how to reduce human error, avoid gaps and overlaps of your different IAM tools, and bring your security strategy in-line with the challenges of today and tomorrow's cyber threats.
Customer Story: INGWim Beems: Change Expert Global IAM, ING/Tech/CISO
Ciro Guariglia: Identity & Access Management Consultant, AspisID
Back to the FutureBrian Chappell: Head of Product, One Identity
You will be subjected to 1.21 gigawatts of precisely timed information as Brian Chappell, Head of Product, explores the now and the future of identity. This session promises to give a glimpse into how One Identity is planning to journey with you, back to the future!
Customer Story: Extending Privilege Access Management to SAPSamuel Lopez: User Lifecycle Supervisor, Holcim
Holcim is the Global leader in innovation and sustainable building solutions. We have an extensive SAP landscape that is a challenge to manage and keep under control, specifically the privileged operations. During this session, we will go through the drivers and requirements that triggered the need to modernize the Privilege Access Management approach. We will detail how we addressed them, explain the technical solutions implemented, and most importantly the lessons learnt along the way.
Closing Keynote: Slaying the Many-Headed Hydra of Data Privacy and ProtectionBruce Esposito: Field Strategist, NAM, One Identity
With data traveling the world through borderless networks data privacy and protection laws have never been as important as they are today . Over 120 global jurisdictions now have data privacy and protection laws. California to China are implementing legislation that mirrors Europe’s GDPR, while the EU has turned its attention to a new EU Data Act as well as regulating the use of AI. Where once organizations were always ahead of regulators, now they struggle to keep up with compliance requirements across multiple jurisdictions. In this session, we will discuss the current state of compliance regulations, what’s coming next and how you can stay ahead.
Identity Threat Detection and Response (ITDR) Explained
Maurizio Ostinet: Solutions Architect, One Identity
Based on Gartner, the current IAM and Security preventive controls cannot protect effectively Identity Systems from attack. Attend this session to see an overview of what ITDR is and why it is relevant in the Identity Security field. We will look at Sharelock technology and the integrations currently available with One Identity.
Roadmap & New Releases
Frederic Courtois: Principal Solutions Architect EMEA, One Identity
Alan Radford: Field Strategist, EMEA, One Identity
Hear about new features and development plans for Active Roles, and how your company can benefit from them. In this session Frederic Courtois will walk you through the roadmap and use cases.
Master Class: Advanced Authentication in Your Organization
Mark Cockbill: Senior Manager, Access Management Solutions Engineering, One Identity
Solenne Le Guernic: Solution Engineer, One Identity
Join us to learn more about best practices when deploying advanced authentication within your organisation. How can you ensure that you are at the top of your game with your security posture, whilst also giving end-users the best possible experience?
Latest Updates and Roadmap for Identity Manager
Ted Ernst: Senior Product Manager, One Identity
Matthias Bauer: Senior Manager of Product Development, One Identity
Hear about the latest releases of Identity Manager, LTS option, roadmap and use cases with product management and development.
Privileged Access Management today: Safeguard Roadmap
Brian Chappell: Head of Product, One Identity
Taylor Cochrane: Product Manager - PAM Portfolio, One Identity
Hear about the latest releases of our privileged solution family, product roadmap and use cases, presented by members of our product management and development teams. In this session, our experts will highlight how the One Identity PAM portfolio provides next-gen PAM capabilities and features. Plus, get the latest info about innovations and integrations that ensure your PAM program can quickly adapt to evolving technologies and emerging cybersecurity threats.
The Role of AI in Cybersecurity
Abdullah Ahmad: Senior Solutions Architect, One Identity
The number of attempted cyber-attacks is rapidly increasing. Human cybersecurity professionals are finding it increasingly difficult to respond to all attacks and potential risks, or to predict where the next dangerous attacks will come from. This is where AI can help. Machine learning algorithms can examine the huge amounts of data in real time and much more effectively than humans and identify new patterns that indicate threats.
How Active Roles Solves MS Tiering Model Issues
Frederic Courtois: Principal Solutions Architect EMEA, One Identity
Raul Dopazo: Solutions Architect, One Identity
The Microsoft Tiering model is secure but can quickly become complex and expensive to implement, manage and comply with. In this session, we will discuss different implementation scenarios and the impact of Active Roles in each use case.
OneLogin Roadmap
Stuart Sharp: VP of Product Strategy, One Identity
Come learn about OneLogin’s product roadmap and most recent product innovations. We will showcase how these technological investments can be applied in key use cases and how they can benefit your organization.
Identify Risk Automatically with enhanced integration between Identity Manager, OneLogin and Safeguard
Ted Ernst: Senior Product Manager, One Identity
Identify risky behavior patterns and automatically reduce vulnerability through an enhanced integration between Identity Manager, OneLogin and Safeguard.
Safeguard Privilege Access Management: Best Practices
Josef Pernecky: Technical Sales Engineer, One Identity
Holger Weihe: PAM Principal, One Identity
PAM is one of the most important security controls you can implement. This session is focused on PAM best practices. Learn from experts in the field on the pathway to a successful implementation and operational excellence.
Safeguard Privilege Access Management: Security and Compliance
Alan Radford: Field Strategist, EMEA, One Identity
Security and compliance are 2 of the main driving forces behind the deployment of a PAM solution. Attend this session to see how a PAM solution is a critical component of achieving compliance, we will look at controls across some of the industry standard compliance requirements (eg SOCS, PCIDSS, NIS2 etc)
Common Active Directory Identity Attacks and How to Prevent Them
Hicham Bouali: EMEA Pre Sales Manager, One Identity
Since its rollout right after the Y2K scare, Active Directory has been providing SSO authentication for enterprises of all sizes, shapes and geographies. Since nearly every organization uses AD, it is by far the most attacked identity system simply because of what it controls and the resources it protects. In this session, Hicham Bouali will walk through common Active Directory attacks, such as LDAP Recon, password spraying, and Kerberoasting, to show how enterprises are vulnerable to these attacks, how they operate and discuss mitigation steps.
Utilizing OneLogin IDaaS to Enhance Your Future IAM Estate
Brian Chappell: Head of Product, One Identity
Stuart Sharp: VP of Product Strategy, One Identity
Join us to discover how adopting IDaaS (OneLogin) within your IAM deployment can supercharge your security posture, processes and user experience.
Identity Manager Hidden Gems
Matthias Bauer: Senior Manager of Product Development, One Identity
Robert Byrne: Field Strategist, EMEA, One Identity
Ted Ernst: Senior Product Manager, One Identity
Dr Stephan Hausmann: IGA Principal, One Identity
We all know the major things that One Identity Manager is capable of. There are many capabilities that already exist OOTB, but not initially used. This session will dig into some of the “hidden gems” that are very cool and useful, but oftentimes forgotten.
Secure your Critical Secrets with Frictionless DevOps Integration
Holger Weihe PAM Principal, One Identity
Josef Pernecky: Technical Sales Engineer, One Identity
Building your applications, products, and processes requires access to critical resources and information. Learn how Safeguard can securely integrate with your existing infrastructure, tools, technologies, and architecture without requiring your developers to change the way they work. Proper credential management in DevOps processes protects against supply chain risk.
Women in Cybersecurity UNITE
Dr. Ina Nikolova: Marketing Manager, PATECCO
Carola Schwinn-Hartmann: Principal Consultant/Architect, Identity-Team GmbH
Allison Main: Sr. Product Marketing Manager, One Identity
Elisabeth Strom Gullberg: Regional Sales Director, One Identity
Join us as we discuss the gender gap in the STEM fields and real ideas for how we can help. Plus, enjoy networking opportunities with a community of professionals who support advancing women in the cybersecurity field. Share your voice and join us today!
The (R)evolution of Authentication: Passwordless Authentication
Brian Chappell: Head of Product, One Identity
Authentication is the act of proving an assertion. In contrast with identification, authentication is the process of verifying an identity. Authentication has undergone an evolution over a long period of time, during which factors and types have evolved. Now the time has come for a revolution in authentication. The era of passwordless authentication is dawning.
Privileged Access in AD
Viktor Varga: Sales Engineer, One Identity
Join us for this joint session in the Neptuno room. The core of Active Roles is an AD delegation engine that provides very granular and dynamic delegation of AD and AAD objects, allowing a range of delegation from simple tasks that any user may need to accomplish (user self-service) to highly privileged administrative tasks on critical AD objects. With protecting privileged access at the core of this conversation, Viktor Varga and Frederic Courtois will present a privileged access management discussion focused on identifying privilege in AD and protecting it from compromise with Active Roles and Safeguard.
Passwordless Authentication for Your Workforce and Customers
Solenne Le Guernic : Solution Engineer, One Identity
Marc Maguire: Solution Architect, One Identity
Passwordless is a major buzzword in the IAM industry today, but what does it actually look like, and how can you really deploy and utilize it effectively? Join our team of experts to gain some insight into what's actually possible today.
Secure Configuration and Operations for On-Prem Identity Manager
Matthias Bauer: Senior Manager of Product Development, One Identity
Hanno Bunjes: Product Development Team Lead, One Identity
Markus Weiss-Ehlers: Program Manager Consultant, One Identity
Learn :
How to autenticate application servers (avoid SQL server injection, etc)
How to authenticatieob service logs and remote connection plugin
How to store sync passwords in Safeguard
About IIS settings and FIPS Mode
How encryption works
How to run fat clients in a safe way with Safeguard
Privileged Access in AD
Frederic Courtois: Principal Solutions Architect EMEA, One Identity
The core of Active Roles is an AD delegation engine that provides very granular and dynamic delegation of AD and AAD objects, allowing a range of delegation from simple tasks that any user may need to accomplish (user self-service) to highly privileged administrative tasks on critical AD objects. With protecting privileged access at the core of this conversation, Viktor Varga and Frederic Courtois will present a privileged access management discussion focused on identifying privilege in AD and protecting it from compromise with Active Roles and Safeguard.
Cloud Security
Don Edwards: Global Tech Leader, Amazon Web Services
Developments in recent years are forcing companies to rely more and more on the use of cloud-based technologies to enable communication and collaboration. Cloud-based services are thus increasingly moving up the list of potential targets for hackers. They are particularly vulnerable to cybersecurity risks. Whether it's misconfiguration or inadequate security policies, costly security issues with cloud-based systems pave the way to data breaches, unauthorized access to corporate networks and account takeover.
Meet Certification and Attestation for Groups Using Native Functionality in Self-Serve Manager
Frederic Courtois: Principal Solutions Architect EMEA, One Identity
Hicham Bouali: EMEA Pre Sales Manager, One Identity
Group management in Active Directory is at the core of enterprise access control. When AD group membership isn’t right, then access isn’t right. Some users from one department may still have access to a resource from a previous role. Figuring out what their appropriate access should be sometimes falls to the person at the help desk making uniform department resource access decisions. In this session Hicham Bouali and Frederic Courtois will walk through the Active Roles Add-In for Group Access and Attestation showing the functionality and relating it to real-world use cases.
Don't Compromise on Your CIAM Solution: Protect Customer Identities
Mark Cockbill: Senior Manager, Access Management Solutions Engineering, One Identity
Marc Maguire: Solution Architect, One Identity
User experience is key when it comes to delivering a CIAM solution. Learn how you can use OneLogin to deliver a best of breed customer facing platform that's both easy to deploy and makes your customers want to return.
Technical Alliance Partnerships: Enhancing Identity Manager with Integrations
Robert Byrne: Field Strategist, EMEA, One Identity
Robert Kraczek: Field Strategist, NAM, One Identity
One Identity has arguably the most extensive portfolio of any vendor focused on identity security. However, identity security is only a subset of Cybersecurity and a broad spectrum of tools are needed to provide a full end-end security model. One Identity can accelerate customers into a modern identity security model thanks to its technical alliance partnership program. This program helps customers across the globe meet identity management and Cybersecurity requirements by developing relationships with class leading vendors to create an ecosystem of capabilities that can be added to One Identity solutions.
Come see how our technical partnerships enhance our portfolio’s capabilities for today’s ever changing identity security landscape by leveraging the technical capabilities of ITDR, RPA and Darkweb search products, as well as many others.
Safeguard Privileged Access Management: Tips and Tricks
Eric Parietti: Solutions Architect, One Identity
Ian Stimpson: Principal Engineer, PreSales, One Identity
This session is aimed at providing a transfer of knowledge of some of the tips and tricks with Safeguard. Covering topics, such as:
Configure SAML authentication to your SPS portal
Discover and manage accounts in AWS using TOTP
Provide Just in Time access to AD credentials with Active Roles integration
Internet of Things (IoT) IAM
Fernando Garcia Vegas: EMEA Pre Sales, Quest
IDC predicts that more than 41 billion IoT devices will be in use by 2025. The rapid increase in devices is leading to new cybersecurity threats. The sheer number of devices being put into circulation is increasing the opportunities for cyberattacks at a pace that businesses are struggling to keep up with. What possibilities do companies have to face up to the growing threat?
Azure AD Security: How Active Roles Can Help
Raul Dopazo: Solutions Architect, One Identity
Frederic Courtois: Principal Solutions Architect EMEA, One Identity
Nearly every organization that uses on-prem Active Directory has blended their AD with Azure AD and M365. Whether an organization has fully embraced a hybrid Active Directory or set up part of their user population as Azure-only AD, the security challenges created to enable management of the Azure AD environment must be acknowledged. In this session Raul D'Opazo and Frederic Courtois will discuss some of the challenges and show how Active Roles enables the secure management of Azure AD, whether hybrid or Azure native.
Using Decentralized Identity to Build a Robust Employee Joiner-Mover-Leaver (JML) Process
Robert Byrne: Field Strategist, EMEA, One Identity
Marc Maguire: Solution Architect, One Identity
How can you ensure that your new starters are who they say they are, as well as make the whole offboarding process both quick and easy? Join us to learn how you can utilize One Identity products to make your onboarding and offboarding processes more robust.
One Identity Manager in The Cloud: What Are My Options?
Bruce Esposito: Field Strategist, NAM, One Identity
Learn more about the options for running One Identity Manager in the Cloud. We will discuss private cloud options AWS and Azure along with One Identity SaaS product- Identity Manager On Demand.
Safeguard Privileged Access Management: The Core Capabilities
Ian Stimpson: Principal Engineer, PreSales, One Identity
Eric Parietti: Solutions Architect, One Identity
This session will provide an overview and demonstration of the core capabilities from Safeguard. You will learn some of the core use cases and how Safeguard can help improve your security posture.
Closing Keynote: Identity Governance Project on (Digital) Transformation for CNPVita Assicurazione
Giovanni Motta: BL Manager Identity Security Governance, S2E
Luca Magnoni: Chief Information Officer, CNP VITA Assicurazione
Lost in the Red Forest? How Active Roles Helps Customers
Reto Bachmann: Senior Principal Solution Architect, One Identity
Raul Dopazo: Solutions Architect, One Identity
Learn how to migrate from Microsoft Enhanced Security Admin Environment (ESEA – Red Forest) architecture which is using Microsoft Identity Manager (MIM) for management to Active Roles. Red Forest has been a quite complex architecture to secure a multi-forest environment which is managed using Microsoft Identity Manager. Microsoft Identity Manager Service Pack 2 is announced EOL for 2026 and also Microsoft’s ESEA recommendation has changed. Going forward the Shadow Principal Permissions handled by MIM can no longer fully be managed including approval workflows. Therefore, companies are looking at easier ways to secure and manage their Microsoft on-premises and Cloud environments.
Behavior Driven Governance
Dr Stephan Hausmann: IGA Principal, One Identity
Markus Weiss-Ehlers: Program Manager Consultant, One Identity
Learn how event data from other One Identity solutions can trigger attestation campaigns and detect policy violations.
Behavior Driven Governance in Identity Manager for SAP
Abdullah Ahmad: Senior Solutions Architect, One Identity
Cengiz Tuztas: EMEA Presales Manager, One Identity
In this session, we will apply the topic of Behavior Driven Governance to the target system SAP ABAP (ERP, S/4HANA, HCM, CRM, ...). We will no longer only look at whether a user has used the SAP ABAP application in general but at the actual use of transaction codes. A user can have many authorizations assigned in an SAP system. To reduce the risk, we take the transaction usage data (ST03N) as a basis and see if the user has executed transactions that he has access to via the assigned ABAP roles. If no transactions of an assigned role are not used in a certain period, the attestor can reject the assignment of the ABAP role and this assignment will be automatically removed from the user. This streamlines the number of rights assigned and reduces risk.
Just-in-Time Privilege for Safeguard and Active Roles
Reto Bachmann: Senior Principal Solution Architect, One Identity
Josef Pernecky: Technical Sales Engineer, One Identity
This session will take you step-by-step through the configuration of Just-in-Time provisioning for Safeguard using Active Roles. Another section of this session will show the automated provisioning and linking of Active Directory admin accounts to Safeguardapplications. This session will show you how it can be achieved.
One Identity Products Deployed on Azure
Gert-Jan de Jong: Presales Engineer, One Identity
Michiel Simon: Sales Engineer, One Identity
This session will focus on the considerations for and deployment of Identity Manager and other One Identity products on Azure. You will get tips and advice if you think about deploying Identity Manager in your own Azure tenant. You will learn about features that are part of Azure which can be useful for Identity Manager deployments, like load balancing, redundancy, managed database instances, running containers etc. Apart from Azure as infrastructure you will learn about the Azure integration as a target system that goes beyond the standard connector.
Beginner Guide to Identity Manager Angular Portal Customizations
Serdar Tuztas: Sales Engineer, One Identity
Arthur Wandersman: Sales Engineer, One Identity
Introduction of the Identity Manager Angular web portal has changed the way we do customizations.
Now customizations require some knowledge of Angular, TypeScript, JavaScript, Node JS, Git, .Net (for API server). It is also helpful to have some familiarity with Visual Studio and VS Code.
In this session we’ll present step-by-step instructions on the following topics:
Creating work environment including installations
Overview of generic Debug/Modify/Deploy steps
Overview of work with Api Server REST Api
Simple modifications
Advanced Api Server modifications
Advanced Web Portal modifications:
Complete code of the topics will also be provided for further study.
Enhancing Authentication Flows Through SmartHooks
Marc Maguire: Solution Architect, One Identity
Torsten Westphal: Sales Engineer, One Identity
Out of the box authentication flows are great; but what if you want to take it to the next level of customisation and build truly unique flows that work for your business? Join us to dive into how you can use the OneLogin pre-authentication Smart Hooks to build bespoke user authentication journey's for your employees and customers - taking device heuristics, geolocation and other factors into account.
Safeguard and Azure From Managing Accounts to Single-Sign On
Josef Pernecky: Technical Sales Engineer, One Identity
Holger Weihe: PAM Principal, One Identity
Learn about the Azure integration into Safeguard for Privileged Passwords and Safeguard for Privileged Sessions. See how we can manage accounts and users in Azure and enable seamless Single-Sign on via Safeguard Remote App Launcher. A sneak peak of other Cloud services like AWS S3 and Google Workspace will also be part of this Deep Dive.
Starling Connect for Safeguard Assets
Josef Pernecky: Technical Sales Engineer, One Identity
Holger Weihe: PAM Principal, One Identity
This session is focusing on managing disconnected Assets in the Cloud with Starling Connect for Safeguard Assets. Learn how to deploy and configure Starling Connect for Safeguard Assets
Beyond HR-Driven Identity
Marc Maguire: Solution Architect, One Identity
Torsten Westphal: Sales Engineer, One Identity
HR data is both a valuable and reliable source of information for onboarding users, but how do you take this to the next level and ensure users are who they say they are? How can you take advantage of utilising next-generation technologies to build a robust and secure environment? Join us for this deep dive to discover how you can onboard beyond the HR Identity and integrate technologies such as identity verification and self-soverign identity in your environment.
Please wait...