The event included dozens of sessions categorized into five learning tracks (Active Directory Management, Access Management, Identity Governance & Administration, Privileged Access Management and Executive Business), as well as mainstage, partner, CAB and Technical Deep Dive sessions. Attendees could mix and match sessions from each category to create the perfect agenda to meet their personal goals for the conference.
Gained valuable identity security industry insights
Learned best practices, tips and tricks to improve their technical proficiency and knowledge
Got direct access to product development, product managers, product marketing and subject matter experts
Networking opportunities with their peers
The opportunity to provide their input on future product enhancements
The evolution of identity security is now! Hear from Mark on how One Identity is uniquely positioned to help companies address the rapid proliferation of identity-based threats targeting their business and adapt to an ever-changing threat landscape.
Presenters: Mark Logan, CEO, One Identity
Identity Is The Heart Of Digital Transformation and Digital Business
Amidst the confluence of crises, such as inflation, interest rates, inventory, infection and inflation, organizations understand that identity is the heart of digital transformation and digital business. Organizations embracing unified identity will achieve more meaningful and profitable engagement. Learn what buyers and prospects expect from their identity vendors. Discover the next big trends in unified identity impacting the enterprise and how to win over the right accounts at the right time.
Join best-selling author, global media celebrity and Constellation Research CEO R “Ray” Wang to put these trends into your sales strategy.
Presenters: Ray Wang, Founder, Chairman and Principal Analyst, Constellation Research Inc.
Hear insights and best practice guidance from executive leadership from across our customer and partner landscape.
Presenters: Lydia Payne-Johnson, Director of IT Security, Identity Management and Risk, One Identity
Alex Fagioli, CEO, Intragen
Rob Forbes, Director of Zero Trust and Identity Services, Stratascale
Chris Ostler, President and CEO, Immersion Technology Services
Ian Sutherland, VP of Sales, EMEA, One Identity
What is Quantum Computing and How Will it Impact Identity Security?Learn about digital trends and how they impact you. How do you secure the exploding number of identities?
Presenters: Rudy de Sousa, Director of Presales, One Identity
One Identity: Strategy and FutureLearn about our future strategies, emerging technologies and how we can help you conquer identity sprawl.
Presenters: Darren Thomson, VP of Product Marketing, One Identity
Robert Kraczek, Field Strategist, NAM, One Identity
Customer Story: George Washington UniversityPresenters: Chuck Mance, Identity and Access Management Manager, The George Washington University
Sheema Begum, Senior Identity and Access Management Developer, The George Washington University
Digital Identity: The Good, the Bad and the UglyDigital identities are here to stay. Our personal data is stored practically everywhere. The average person would probably struggle to even remember them all, be they credit cards, cell phones, online accounts, social media or corporate accounts. In a way, these digital identities have become part of the fabric of society, and it’s hard to imagine them going away. Is now the time to look at implementing a single unified digital identity that would cross between commercial, governmental, enterprise and personal use? How could this be done? What benefits and dangers does this present? This session looks into what is being done today to move toward a singular digital identity and how this may impact the future.
Presenters: Bruce Esposito, Field Strategist, NAM, One Identity
Customer Story: Aflac and Their Identity Security JourneyYou are not alone. Hear tales of woe and success from long-time One Identity customers as they move to a unified identity security strategy.
Presenters: Jay Coull, Senior Identity and Access Management Manager, Global Security, Aflac
Larry Chinski, Senior Customer Success Director, One Identity
Closing Keynote: AWS – An Identity PerspectivePresenters: Guy Farber, Security & Networking ISV Partner Leader, Amazon Web Services (AWS)
Steve Vinsik, Senior Product Management Manager, Amazon Web Services (AWS)
Hear about the latest releases of Active Roles, roadmap and use cases with product management and development.
Presenters: Dan Conrad, Presales Manager, One Identity
Vipin Jain, Principal Product Manager, One Identity
OneLogin: The Future of Access ManagementLearn about OneLogin’s product roadmap and most recent product innovations. We will showcase how these technology investments can be applied in key use cases and how they can benefit your organization, including custom authentication factors, dynamic responses to risk insights and application-level branding controls.
Presenters: Stuart Sharp, VP of Product Strategy, One Identity
Identity Manager TodayHear about the latest releases of Identity Manager, LTS option, roadmap and use cases with product management and development.
Presenters: Hanno Bunjes, Product Development Team Lead, One Identity
Ted Ernst, Senior Product Manager, One Identity
Privileged Access Management TodayHear about the latest releases of the privileged solution family, our product roadmap and use cases, presented by members of our product management and development teams. In this session, our experts highlight how the One Identity PAM portfolio provides Next-Gen PAM capabilities and features. Plus, get the latest info about innovations and integrations that ensure your PAM program can quickly adapt to evolving technologies and emerging cybersecurity threats.
Presenters: Dan Peterson, Lead R&D Architect, PAM, One Identity
Alan Radford, Field Strategist, EMEA, One Identity
The Heritage of PAMPresenters: Kris Zupan, Director of Security Services, Novacoast
Microsoft AD Security: Preventing Pass-the-Hash Privilege Escalation with Active Roles and SafeguardActive Directory is still the well-known attack vector for bad actors attempting to exploit large organizations. Since AD touches almost everything, and privileged accounts in AD can have far reaching impact, it becomes an obvious target. When an attacker compromises a user account or workstation, the next step is to elevate privileges. In this session, we will demonstrate a Pass-the-Hash breach against privileged accounts in Active Directory using common exploit methods and walk through an Active Roles implementation specifically designed to mitigate this vulnerability using Just-In-Time Privilege elevation. This Active Roles/Safeguard integration is specifically designed to reduce the vulnerabilities related to privilege escalation attacks and adds a Zero Trust security layer to Active Directory.
Presenters: Dan Conrad, Presales Manager, One Identity
Eric Hibar Jr., Sales Engineer, Quest/One Identity
Master Class: Getting the Most Out of OneLoginAre you using all the features available to you? Did you know that OneLogin has supported Passwordless Authentication for over two years now? How about that we now support Desktop MFA, or can augment attributes for a user by synchronizing from multiple directories?
We’ll take you on a tour of the complete OneLogin offering and help you understand new offerings to leverage the platform for better security and greater automation.
Presenters: Mark Cockbill, Senior Access Management Solutions Engineering Manager, One Identity
Jason Loveday, Solution Engineer, One Identity
Customizing the Identity Manager Web UIFrom simple configuration changes to fully customized applications, Identity Manager’s new customization architecture is based on established web development technologies. In this session, we will take a look at how to set up a custom app and address some questions that can arise over the lifetime of an application. Learn how the new HTML5-based UI stack helps to ensure the success of your Access Management project by benefiting developers and users alike.
Presenters: Hanno Bunjes, Product Development Team Lead, One Identity
Starling Services for SafeguardJoin us for an overview of how One Identity’s Starling Cloud services can extend your Safeguard deployments. The following Starling components will be covered during this session:
Presenters: Richard Hosgood, PAM Principal Presales Engineer, One Identity Ferenc Sipos, Director of Sales Engineering, One Identity
The Future Evolution of ID Security: A Converged Identity Security Model is Coming: Are You Ready?“Convergence, fabrics, unified;” just a few of the many terms used to describe the current trend in managing identities in today’s complex threat landscape. What should you be doing to create and implement this type of security model for your own organization’s unique environment?
Presenters: Robert Kraczek, Field Strategist, NAM, One Identity
Multi-Factor Authentication to the Active Roles MMC and Web UIsMulti-Factor Authentication is becoming a common security layer across all levels of access control – because it works. It just makes sense to add MFA to our critical enterprise applications, like Active Roles. Removing system-provided delegation points in AD and setting up a true least privilege delegation model is the core functionality of Active Roles, so adding MFA to the admin interfaces ensures strong authentication to the administration of the organization’s most critical asset: Active Directory. In this session, we will walk you through setting up the Active Roles web interfaces to use MFA and show how to implement MFA to the Active Roles MMC (or any type of admin interface) using Safeguard for Privileged Sessions.
Presenters: Richard Hosgood, PAM Principal Presales Engineer, One Identity
AJ Linder, Solutions Architect, One Identity
Leveraging Adaptive Risk Technologies to Enhance Security PostureGiven the increased risk associated with the rise of ‘access anywhere’ and the growth of targeted attacks, more and more organizations are looking to maximizing the use of adaptive risk engines. More specifically, they are looking for ways to incorporate additional information in their risk management systems, for example by integrating signals from PAM and IGA solutions or via richer signals from endpoints. A key purpose of these external signals is to inform the risk analysis driving dynamic authentication flows.
Join us to find out what we have done to enable organizations to incorporate the widest possible set of external signals and support a broader range of authentication factors. External signals include ID Proofing, third-party authentication factors, such as MFA, and a wide variety of threat intelligence.
Presenters: Mark Cockbill, Senior Access Management Solutions Engineering Manager, One Identity
Stuart Sharp, VP of Product Strategy, One Identity
Access Management Governance with OneLoginSee how Access Management and Identity Governance & Administration (IGA) together are essential to protect all classes of users throughout the identity lifecycle, including the authentication and authorization needed when users access critical resources.
Presenters: Josh Karnes, Principal IAM Product Architect, One Identity
Robert Kraczek, Field Strategist, NAM, One Identity
Unleash the True Power of SafeguardEnterprise IT environments can be extremely heterogenous, comprised of technologies from legacy to cutting edge, but they all have one thing in common: they all have privileged accounts that need to be protected. Given this level of diversity, it is impossible to find a single PAM solution that supports every system out of the box. That is why it is imperative to pick a platform that provides users with the flexibility to define how system-provided assets that are not supported should be managed.
Join us for an overview of how Safeguard, through its extension interfaces (Custom Platforms and Privileged App Auto-logon), can help you enroll virtually any asset type into your PAM program.
Presenters: Ferenc Sipos, Director of Sales Engineering, One Identity
Please, No More Security! We Fear Change!We’ve all seen the effects well planned security “enhancements” have on our workforce. These effects range from minor complaints to hostile workers refusing to comply with new procedures. When our goal was to provide better physical protection for the employees or protect work product and intellectual property, we must be aware of how the end consumers of change understand and perceive the change.
Dan Conrad and Rob Forbes share their experience as users, sysadmins and security solution vendors the impacts security enhancements have on populations. How the consumer of security accepts the change is critical to the organizational and technical success of the change. We can install a new lock on the door, but if the occupants prop it open, the lock has failed. Dan and Rob discuss some of the reasons improving security posture goes wrong or is avoided, as well as share some advice for steering things in the right direction to minimize push back to stronger security.
Presenters: Rob Forbes, Director of Zero Trust and Identity Services, Stratascale
Dan Conrad, Presales Manager, One Identity
Women in CybersecurityWe discuss the gender gap in the STEM fields and real ideas for how we can help.
Presenters: Denise Collison, SVP, Public Sector, SHI
Lydia Payne-Johnson, Director of IT Security and Identity Management and Risk, The George Washington University
Stacey Blanchard, Senior Director of Sales Engineering, NAM, One Identity
Allison Main, Senior Product Marketing Manager, One Identity
Think Like a Security Officer: Strategies to Protect Against AD BreachesLearn how a security officer approaches protection strategies to remain vigilant and cut off the angles of potential attacks. Strong policies must be implemented consistently and automated to mitigate risk in your Active Directory and Azure AD strategy.
Presenters: Dan Conrad, Presales Manager, One Identity
OneLogin’s Vital Role in Your Unified Identity PlatformLearn how you can enhance your IGA, PAM and ADMgmt implementation with OneLogin solutions.
As part of the One Identity Unified Identity Platform, OneLogin seamlessly integrates with Identity Manager (IGA), Safeguard (PAM) and Active Roles (AD Mgmt), including behavior driven governance and integrated risk flows to dynamically set a user's security policy based on both governance and authentication risk, and step-up authentication via OneLogin MFA.
Presenters: Robert Kraczek, Field Strategist, NAM, One Identity
Behavior-Driven Risk MitigationIdentify risky behavior patterns and automatically reduce vulnerability through an enhanced integration between Identity Manager, OneLogin and Safeguard.
Presenters: Josh Karnes, Principal IAM Product Architect, One Identity
Secure Your Critical Secrets with Frictionless DevOps IntegrationBuilding your applications, products and processes requires access to critical resources and information. Learn how Safeguard can securely integrate with your existing infrastructure, tools, technologies and architecture without requiring your developers to change the way they work. Proper credential management in DevOps processes protects against supply chain risk.
Presenters: Dan Peterson, Lead R&D Architect, PAM, One Identity
A Journey into Cyber Maturity: A Story About How a Nonprofit Discovered its Cyber ImperativeMany of the conversations we have with customers are centered around how to expand, extend or enhance their cyber program. We infer that our customers “know” security, are technology-savvy at an organizational level and have a clear understanding of what, where and how to defend their organization.
The reality, however, is that many organizations do not have a defined cyber defense strategy. Thanks to many of the sales folks at events like One Identity UNITE, they will likely have several point products in play, with no clear vision of why they have them, what they do for cyber capability or if they are adding business value.
Such was the case for a large not-for-profit in Australia. Over the years, they had all but purchased "one of everything" in terms of security tools, having been convinced to do so by various "experts" and consultants. Then the inevitable happened - a cyber event… and everything changed.
In this session, Jason Loveday shares how we defined our cyber program from scratch. Told from a practitioner's perspective, he walks through how we used a risk-based approach to explain the problem to the business and then continuously measured the value of the program in terms of the reduction of that risk. He describes the selection of a framework, the subsequent selection of key defenses and the ongoing measurement of cyber maturity.
Presenters: Jason Loveday, Solution Engineer, One Identity
Active Roles Sync Service: Automated Provisioning Do’s and Don’tsProvisioning in all forms can be a complex task with combinations of connectors, scripts and workflows in any organization. The Active Roles Sync Service simplifies the complex provisioning tasks between many sources to provide stronger security in the end systems and flexibility to configure rules to meet unique organizational needs. In this session, Rich Lambert provides a detailed overview of the Active Roles Sync Service and reviews its use cases. He dives into some terminology and provisioning concepts to enable organizations to use a simplified approach to provisioning, deprovisioning and reprovisioning using the Sync Service. He covers concepts such as:
Presenters: Richard Lambert, Presales Product Architect, One Identity
OneLogin CIAM: Protect Customer Identities and Deliver a Frictionless Customer ExperienceLearn how to use OneLogin to centralize and secure your customer's access to applications. We also discuss what strategies you should follow to define and implement your Customer Identity and Access Management (CIAM) program.
Presenters: Mark Cockbill, Senior Access Management Solutions Engineering Manager, One Identity
Philip Hayes, Senior Sales Engineering Manager, One Identity
One Identity Manager: Hidden GemsWe all know the major things that One Identity Manager is capable of. There are many capabilities that already exist OOTB but not initially used. This session takes some time to dig into some of the “hidden gems” that are very cool and useful, but oftentimes forgotten.
Presenters: Ted Ernst, Senior Product Manager, One Identity
Robert Kraczek, Field Strategist, NAM, One Identity
VPN-Less Privileged Access ManagementWork is no longer contained within the traditional corporate network. Learn how to deliver safe and secure privileged access without the hassles and overhead of a VPN, all within a browser. Learn how Safeguard can manage credentials on systems that never connect to the corporate network.
Presenters: Dan Peterson, Lead R&D Architect, PAM, One Identity
Aren’t You Forgetting the Key to Observability? No Logs? No Breach?Expanding your visibility is a core concept to everything we do. The reason is simple: there is real business value to knowledge and information, from closing security gaps to tightening operational efficiencies. But outside the hardened shell of identity, there is a whole jungle of IT infrastructure that needs the same. A central log management platform can help optimize costs, bring you performance and customer data and offer you deep insights on your security posture. Join this session and see why logs and log management is a critical piece of every observability pipeline.
Presenters: Ferenc Sipos, Director of Sales Engineering, One Identity
Akos Zalavary, Product Management Consultant, One Identity
Getting the Most from Active Roles ImplementationImplementing Active Roles to provide stronger security and Zero Trust requires a delicate balance of technology and artistry. You need build a robust solution to grow with your organization but have policies and procedures in place to make sure you don’t deviate from its intended purpose. Since Active Roles allows you to implement security policies and delegation at scale, it’s critical to follow some guidelines to make sure it will support your growing organization. In this session, we address this balance and how to optimize Active Roles architecture, as well as features and functions to use (or not use) to eliminate bottlenecks and ensure a secure and functional implementation.
Presenters: Richard Lambert, Presales Product Architect, One Identity
Multi-Factor Authentication from Desktop & CloudMulti-Factor Authentication (MFA) provides an additional layer of protection, reducing the likelihood of a breach. While you may use MFA to protect cloud and on-premises applications, how are your protecting your desktops? One Identity MFA protects desktops and cloud applications, offering you a single solution to help prevent breach exposures, given the rise in remote working and shared workstation environments, as well as aid you in meeting increased compliance and regulatory requirements.
Presenters: Philip Hayes, Senior Sales Engineering Manager, One Identity
Jason Loveday, Solution Engineer, One Identity
IGA + SaaS = Cloud Your WayLearn what approaches to take to modernize your existing IGA program and what you need to consider when developing a modern IGA strategy with full identity governance capabilities.
Presenters: Bruce Esposito, Field Strategist, NAM, One Identity
Will Mitchell, Product Manager, One Identity
Safeguard for SudoLearn how Safeguard for Sudo makes administering sudo across the entire enterprise easy, intuitive and consistent, eliminating the box-by-box management of sudo that is the source of so much inefficiency and inconsistency.
Presenters: Wayne Beaudin, PAM Principal, One Identity
Understanding Cyber Insurance: Who Needs It and What Will You Need to Do to QualifyOver the last few years, ransomware and other attacks have brought many household names to our news headlines and boardroom discussions. These companies have incurred extremely damaging costs, both in actual financial currency and in brand and confidence. With the number of cyberattacks increasing, an emerging industry, Cyber Insurance, or Cyber Liability, has become important for CISOs and CEOs to explore, evaluate and understand. In this discussion, we come to understand the fundamentals of Cyber Insurance, explore who needs it and dig into some of the requirements you will need to fulfill to qualify for Cyber Insurance.
Presenters: Stacey Blanchard, Senior Director of Sales Engineering, NAM, One Identity
Presenters: Andrew Clarke, Global Head of Channel & Strategic Alliances, Quest/One Identity
Partner Collaboration – AWSPresenters: Guy Farber, Security & Networking ISV Partner Leader, Amazon Web Services (AWS)
Managed ServicesPresenters: Brent Hardgrave
Enablement and Partner CirclePanelists include:
Panelists include:
Join us on this deep dive into the realm of syslog-ng’s Python API. We look at real world examples of how this type of extendibility can prove invaluable in heterogenous deployments through custom sources, destinations and parsers.
The examples covered include reading from a REST API source, forwarding to a cloud-based messaging service and enriching messages with information pulled from an external data source.
Presenters: Craig Finnan, Senior Sales Engineer, One Identity
Ferenc Sipos, Director of Sales Engineering, One Identity
Active Roles WorkflowsThis session takes an in-depth look at Active Roles Workflows. Workflows are a powerful feature for any Active Roles deployment and can help automate and orchestrate simple to complex use cases. This Deep Dive reviews Automation and Change Workflows, along with Workflow Parameters. Learn how to further extend and complement Workflows with scripts by setting Parameters and accessing Workflow data from within scripts. Also, learn how an underutilized scripting feature of Active Roles, Policy Types, can add custom Workflow Steps to any Workflow.
Presenters: Eric Hibar Jr., Sales Engineer, Quest/One Identity
Richard Lambert, Presales Product Architect, One Identity
Identity Manager and ServiceNow: Business Consideration and Step-by-Step ConfigurationThis Deep Dive session outlines and discusses the possible business requirements of customers regarding a deeper integration and interaction with ServiceNow. A customer may ask, “Is ServiceNow the only end-user portal enabling our employees to request Web Portal items from Identity Manager, or should Identity Manager be able to create requests in ServiceNow, or both? Where should approval workflows take place?” The second part of this session shows you how to implement an integration step by step.
Presenters: Abdullah Ahmad, Senior Solutions Architect, One Identity
Jon Linney, Architect, One Identity
Integrating with SAP Governance Risk and Compliance (GRC)SAP GRC is a hot topic for many customers and partners. What are the typical use cases and how can Identity Manager interact with SAP GRC? Typical scenarios are the following:
You will learn how you can configure the integration with SAP GRC in Identity Manager.
Presenters: Abdullah Ahmad, Senior Solutions Architect, One Identity
Jon Linney, Architect, One Identity
Active Roles and OneLogin: More than MFA and SSOActive Roles and OneLogin are a natural fit. Active Roles offers mechanisms to guarantee clean data in Active Directory and OneLogin offers another way to connect to SaaS applications. Attend this session to see how Active Roles and OneLogin, together, offer more security and ease of administration for Microsoft-based systems and SaaS applications.
Presenters: Eric Hibar Jr., Sales Engineer, Quest/One Identity
AJ Lindner, Solutions Architect, One Identity
Performance Tuning syslog-ngEven though syslog-ng provides unparalleled throughput with its default settings and its deployment modes support horizontal scaling naturally, there are situations when squeezing extra performance out of existing instances (scaling up) is preferable over scaling out.
During this workshop, we focus on three main areas of scaling:
Presenters: Craig Finnan, Senior Sales Engineer, One Identity
Ferenc Sipos, Director of Sales Engineering, One Identity
One Identity Safeguard defines two extension interfaces:
During the first session of this two-module training, we first learn about the expression language used to describe the steps needed to perform credential management operations. Afterwards, we create custom platform modules to manage a few pre-selected asset types.
In the second session, we take a look at the credential fetching mechanism provided by Safeguard for privileged app auto-logon, get familiar with the programming interfaces and create a wrapper to demonstrate the credential injection workflow.
A general understanding of Safeguard and PAM concepts is recommended for these sessions.
Presenters: Dan Peterson, Lead R&D Architect, PAM, One Identity
Ferenc Sipos, Director of Sales Engineering, One Identity
OneLogin in an AD-Centric Environment: Configuring AD to Orchestrate Provisioning Access in OneLoginLearn how OneLogin integrates with Active Directory, how it syncs and authenticates users and how you can leverage any user attribute information and AD group memberships to:
We also talk about how OneLogin connects to Active Directory and discuss operational topics like deployment, high availability, load balancing and how to create an even more seamless Single Sign-On experience for the end-user by leveraging Windows Domain Authentication and offering self-service password reset.
Presenters: Donnie Batz, Senior Sales Engineer, One Identity
Ethan Peterson, Software Engineer, One Identity
Beginner Guide to Identity Manager Angular Portal CustomizationsIntroduction of the Identity Manager Angular web portal has changed the way we do customizations. Now customizations require some knowledge of Angular, TypeScript, JavaScript, Node JS, Git and .Net (for API server). It is also helpful to have some familiarity with Visual Studio and VS Code.
In this session, we present step-by-step instructions on the following topics:
Presenters: Paul Sherman, Presales Engineer, One Identity
Viloun Viengluang, Presales Manager, NAM, One Identity
Unleash the True Power of Safeguard: Privileged Application Auto LogonEnterprise IT environments can be extremely heterogenous, comprising of technologies from legacy to cutting edge, but they all have one thing in common: they all have privileged accounts that need to be protected. Given this level of diversity, it is impossible to find a single PAM solution that supports every system out of the box. That is why it is imperative to pick platform that provides users with the flexibility to define how natively not supported assets should be managed.
Presenters: Dan Peterson, Lead R&D Architect, PAM, One Identity Ferenc Sipos, Director of Sales Engineering, One Identity
Going Beyond the Basics: Taking Advantage of the Advanced Features of OneLoginLearn how the advanced features of OneLogin can help minimize risks and strengthen your organization’s overall security posture. We do a deep dive and showcase how the following features of the OneLogin Platform can be beneficial to your organization:
Presenters: Donnie Batz, Senior Sales Engineer, One Identity Ethan Peterson, Software Engineer, One Identity
Please wait...