Cloud, Mobile & IAM

Cloud, Mobile & IAM

In recent years there has been a cultural shift supporting an increasingly mobile and flexible workforce enabled by technologies such as Cloud. This has not only made having a robust IAM strategy more essential but also increasingly more challenging. This theater provides tips for best practice when setting your strategy and examples of mistakes to avoid.

Cloud, Mobile & IAM Speakers

Adrienne McEwan
Adrienne McEwan

Cloud Security CSE Cisco

View

Adrienne McEwan

Adrienne McEwan is a Consulting Systems Engineer at Cisco with several years worth of product knowledge pertaining to Internet based threats.  She worked on the Content Security team solidifying her knowledge with Web and Email based threats before transitioning to the Cloud Security team where she now focuses on DNS, Web, and Cloud application based threats. Adrienne is passionate about teaching endusers how to protect themselves from malware, ransomware, phishing, and Oauth attacks. Adrienne lives in the United States where she enjoys hiking, kayaking, and worldwide travel with her daughter.

Bryan Christ
Bryan Christ

IAM Sales Engineer Hitachi ID

View

Bryan Christ
Chris Stoneff
Chris Stoneff

VP, Security Solutions  Bomgar

View

Chris Stoneff

Chris Stoneff came to Bomgar through the acquisition of Lieberman Software where he oversaw product management, quality assurance and technical support, and was responsible for meeting the real-world needs of the company’s customers. Mr. Stoneff has over 20 years of systems administration, consulting, training, and product management experience. An accomplished consultant and technical trainer, he has taught thousands of administrators on fundamental and advanced cybersecurity concepts and technologies.

David Dingwall
David Dingwall

Senior Cybersecurity Strategist HelpSystems

View

David Dingwall

David has been embedded for three decades within the Identity and Access Management (IAM) marketplace, and with other cybersecurity infrastructures to support multi-national organizations’ business operations and audit requirements. His roles have previously included Consulting Architect, Business Development and Product Marketing. His industry experience includes working with Hi-Tech, Healthcare, Energy, Oil & Gas, FMCG, Manufacturing, Financial Services, Mining organizations and Government police and national security departments.

At HelpSystems David is part of our team of cybersecurity experts. David presents and writes on a variety of topics including cybersecurity industry trends, thought leadership and practical tips for organizations looking to improve their security posture and improve efficiency of security and system operations teams.

David van Schravendijk
David van Schravendijk

Product Marketing Manager Cisco Meraki

View

David van Schravendijk
Otavio Freire
Otavio Freire

CTO/President & Co-Founder SafeGuard Cyber

View

Otavio Freire
Tim Otis
Tim Otis

Incident Response Leader Check Point

View

Tim Otis
Todd Bursch
Todd Bursch

Manager, Solution Architects Forcepoint

View

Todd Bursch

Cloud, Mobile & IAM Seminars

  • Wed 26th Sep 09:30 - 10:00
  • In Cyberwarfare, Speed Heals Chris Stoneff  |   Bomgar  |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Wed 26th Sep 09:30 to 10:00

    In Cyberwarfare, Speed Heals

    It’s been said that speed kills. But in cyber warfare, speed heals. That’s because with today’s advanced cyberattacks, you need to move faster than the attackers to minimize damage. You can’t stop every threat. Intruders will get in. But once they’re in, the right cybersecurity solution can stop them in their tracks. Think about what usually happens in a cyberattack. Someone breaks in, steals a credential, and sets up shop. What if that attacker came back just one day later and all your passwords were changed and he no longer had access? Attend this presentation to learn how it’s done.

    Speaker

    Photo Speaker Name Profile
    Chris Stoneff Chris Stoneff View Profile
  • Wed 26th Sep 10:10 - 10:40
  • Cisco Cloud Security: Stepping Into the Cloud with Confidence Adrienne McEwan  |   Cisco  |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Wed 26th Sep 10:10 to 10:40

    Cisco Cloud Security: Stepping Into the Cloud with Confidence

    Learn how Cisco’s Cloud Security Solutions can help secure your environment from the network to the cloud protecting everything from end-devices to content stored within sanctioned SaaS applications. Also, find out how attacks are staged and deployed during The Anatomy of An Attack and how Cisco’s Cloud Security Solutions can help you investigate and remediate attacks your environment may face.

    Speaker

    Photo Speaker Name Profile
    Adrienne McEwan Adrienne McEwan View Profile
  • Wed 26th Sep 10:50 - 11:20
  • Incident Response Orchestration & Beyond: The CISO and Senior Leadership’s Best Approach to Cyber Defense Tim Otis  |   Check Point   |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Wed 26th Sep 10:50 to 11:20

  • Wed 26th Sep 11:30 - 12:00
  • When cloud migrations become an annual event, what does it mean for IAM, PAM and audit? David Dingwall  |   HelpSystems  |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Wed 26th Sep 11:30 to 12:00

    When cloud migrations become an annual event, what does it mean for IAM, PAM and audit?

    With the fast pace of development, companies are continually re-assessing which cloud infrastructures provide the most dynamic provisioning for their business units. Both enterprises and SMBs must constantly review how to balance cost and efficiency when choosing how to best manage their cloud.

    With public cloud price plans moving quickly, the technology for live migrations is also tantalizingly close to becoming frictionless. Keeping control of this shifting sand of technology stacks while keeping your business units under control poses new challenges for all who are involved in IAM, PAM, cloud provisioning, or audit.

    Speaker

    Photo Speaker Name Profile
    David Dingwall David Dingwall View Profile
  • Wed 26th Sep 13:40 - 14:10
  • Adopting an Automation-First Strategy for Identity and Access Management Bryan Christ  |   Hitachi ID   |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Wed 26th Sep 13:40 to 14:10

    Adopting an Automation-First Strategy for Identity and Access Management

    Process automation within an IAM environment can be challenging. Many systems that excel at governance and certification tasks are simply not well suited for automation. Many organizations believe their requirements are simply too unique to be automated and/or their existing home grown solutions will suffice. A thorough data cleanup is often advocated for before automation technologies are deployed however this is the wrong approach as such technologies can actually help with the data cleansing effort. In this session we will explore many aspects of IAM automation and deliver concrete recommendations towards achieving the goal of identity management automation.

    Speaker

    Photo Speaker Name Profile
    Bryan Christ Bryan Christ View Profile
  • Thu 27th Sep 09:30 - 10:00
  • Microsoft Office 365 – Make it a Secure Journey for Digital Transformation Todd Bursch  |   Forcepoint   |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Thu 27th Sep 09:30 to 10:00

    Microsoft Office 365 – Make it a Secure Journey for Digital Transformation

    Office 365 adoption is continuing at a strong pace, and is often the corner stone for a company’s digital transformation journey.  The decision to implement Office 365 is often a top-down decision, resulting in lack of awareness in terms of security and capabilities when the platform is initially rolled out.  However, this rapid change puts pressure on departments to adapt, exposes weaknesses, and creates new security challenges as IT remodels its security posture to protect the new ecosystem.

    This session will provide insights into how only Forcepoint can secure Office 365 and all your other SaaS applications.

    Speaker

    Photo Speaker Name Profile
    Todd Bursch Todd Bursch View Profile
  • Thu 27th Sep 10:10 - 10:40
  • Cisco Cloud Security: Stepping Into the Cloud with Confidence Adrienne McEwan  |   Cisco  |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Thu 27th Sep 10:10 to 10:40

    Cisco Cloud Security: Stepping Into the Cloud with Confidence

    Learn how Cisco’s Cloud Security Solutions can help secure your environment from the network to the cloud protecting everything from end-devices to content stored within sanctioned SaaS applications. Also, find out how attacks are staged and deployed during The Anatomy of An Attack and how Cisco’s Cloud Security Solutions can help you investigate and remediate attacks your environment may face.

    Speaker

    Photo Speaker Name Profile
    Adrienne McEwan Adrienne McEwan View Profile
  • Thu 27th Sep 10:50 - 11:20
  • Empower Your Workforce by Securing Mobile Technology Otavio Freire  |   SafeGuard Cyber   |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Thu 27th Sep 10:50 to 11:20

    Empower Your Workforce by Securing Mobile Technology

    The reality is enterprise employees are using mobile apps on their own to do their work more efficiently, especially with international clients. This discussion will present ways in which management can secure these new technologies and align cybersecurity protocols with employee realities

    Speaker

    Photo Speaker Name Profile
    Otavio Freire Otavio Freire View Profile
  • Thu 27th Sep 11:30 - 12:00
  • Preparing for the Unthinkable by Cisco Meraki David van Schravendijk  |   Cisco Meraki   |   Cloud, Mobile & IAM

    Cloud, Mobile & IAM Theatre

    Thu 27th Sep 11:30 to 12:00

    Preparing for the Unthinkable by Cisco Meraki

    Past performance is no guarantee of future results. There are many trends in the cybersecurity landscape, that will be different tomorrow. Security professionals can effectively prepare themselves for unknown future events by delivering high-power Cisco security technologies via an all-inclusive, unique cloud-managed platform. This session will show you how new threats can be prevented dynamically without needing to configure or modify a network.

    Speaker

    Speaker Name Profile
    David van Schravendijk View Profile
Top