For the best web experience, please use IE11+, Chrome, Firefox, or Safari

One Identity Resilience User and Partner Conference

29 November - 1 December 2022 | Barcelona, Spain

One Identity Resilience 2022 Highlights 03:02

 

 

In fall 2022, identity security customers, partners and product experts from around the world gathered in Barcelona to drive strategy and product development into the future, all while accelerating their own identity security and strengthening their overall cybersecurity posture.

Event Schedule Breakdown

The event included dozens of sessions categorized into five learning tracks (Active Directory Management, Access Management, Identity Governance & Administration, Privileged Access Management and Executive Business), as well as mainstage, partner, CAB and Technical Deep Dive sessions. Attendees could mix and match sessions from each category to create the perfect agenda to meet their personal goals for the conference.

 

Benefits to customer and partner attendees:

  • Gained valuable identity security industry insights
  • Learned best practices, tips and tricks to improve their technical proficiency and knowledge
  • Got direct access to product development, product managers, product marketing and subject matter experts
  • Networking opportunities with their peers
  • The opportunity to provide their input on future product enhancements

Agenda

29 November - 2 December 2022

9:00 a.m. - 5:00 p.m. each day

Tuesday

Tuesday, 29 November
  • CEO Keynote: Mark Logan

    The evolution of identity security is now! Hear from Mark on how One Identity is uniquely positioned to help companies address the rapid proliferation of identity-based threats targeting their business and adapt to an ever-changing threat landscape.

    Presenters: Mark Logan, CEO, One Identity

    Intragen Sponsored Keynote: What Can We Do Today with IAM to Make Sure We’re Safe in the Future?

    Identity Is The Heart Of Digital Transformation and Digital Business

    Presenters: Martin Kuppinger, Founder and Principal Analyst, KuppingerCole Analysts

    Industry Experts Roundtable

    Hear insights and best practice guidance from executive leadership from across our EMEA partner landscape.

    Presenters: Ian Sutherland, VP of Sales, EMEA, One Identity

    Alex Fagioli, CEO, Intragen

    David Lello, CISO, Burning Tree

    Eelco Veltenaar, Cofounder and Co-Owner, Aspisid

    Metaverse, Quantum Computing and Robots, Oh My!

    Learn about digital trends and how they impact you. How do you secure the exploding number of identities?

    Presenters: Rudy de Sousa, Director of PreSales, One Identity

    One Identity: Strategy and Future

    Learn about our future strategies, emerging technologies and how we can help you conquer identity sprawl.

    Presenters: Darren Thomson, VP of Product Marketing, One Identity

    Robert Kraczek, Field Strategist, NAM, One Identity

    Are You in Firm Control of Your External Identities?

    As an organization, you’re in firm control: Your employees’ digital identities are in the HRM system and they’re given the correct roles, rights and access to the IT environment through your Access Management solution. But does it work the same way if you use external help?

    In many organizations, we see that it is difficult to process data from these external identities in an efficient, secure and controlled way. Can you manage the entire lifecycle of those identities?

    Together with our customer, Jumbo Supermarkten, we discuss the challenges in managing and controlling the data of external identities:

    Presenters: Sicko van der Brug, RE RA, Product Owner, IAM, Jumbo Supermarkten

    Jos Groenewegen, CTO, The Identity Managers

    Digital Identity: The Good, the Bad and the Ugly

    Digital identities are here to stay. Our personal data is stored practically everywhere. The average person would probably struggle to even remember them all, be they credit cards, cell phones, online accounts, social media or corporate accounts. In a way, these digital identities have become part of the fabric of society, and it’s hard to imagine them going away. Is now the time to look at implementing a single unified digital identity that would cross between commercial, governmental, enterprise and personal use? How could this be done? What benefits and dangers does this present? This session looks into what is being done today to move toward a singular digital identity and how this may impact the future.

    Presenters: Bruce Esposito, Field Strategist, NAM, One Identity

    Connect and Empower Our People at ADEO!

    Hear how we do it. It starts with bringing our people an exceptional digital experience, which means designing work environments that are completely secured. It also includes offering digital equipment adapted to the needs of our collaborators, which are different in the stores from internal services. Being a platform means also improving collaboration toward more transparency, easy access to information and connected communities.

    New ways of working is also a domain taking in charge the implementation of robots to automate our processes in order to simplify our lives and improve productivity.

    Presenters: Albina Muzyka, Business Leader of New Ways of Working, ADEO

    Mark Logan – A Fireside Chat

    Mark and his team answer questions from the audience on all topics relating to their business.

    Presenters: Mark Logan, CEO and President, One Identity

    Avanade Sponsored Keynote: It Wasn’t Me, It Was Bennett Arron

    Hear a real-life identity theft story. Several years ago, comedian Bennett Arron was in serious debt. He owed thousands to phone companies, banks and department stores. Only it wasn’t him. Bennett had become the first major victim of identity theft in the UK. It left him penniless and homeless.

    Presenters: Bennett Arron, Comedian/Identity Theft Speaker, BennetArron.com

Wednesday

Wednesday, 30 November
  • Women in Cybersecurity UNITE

    We discuss the gender gap in the STEM fields and real ideas for how we can help.

    Presenters: Rima Pawar, VP of Product Management, One Identity

    Stacey Blanchard, Senior Director of Sales Engineering, NAM, One Identity

    Allison Main, Senior Product Marketing Manager, One Identity

    Active Roles Roadmap and Use Cases

    Hear about the latest releases of Active Roles, roadmap and use cases with product management and development.

    Presenters: Dan Conrad, PreSales Manager, One Identity

    Frederic Courtois, Principal Solutions Architect, EMEA, One Identity

    Master Class: Getting the Most Out of OneLogin

    Are you using all the features available to you? Did you know that OneLogin has supported Passwordless Authentication for over two years now? How about that we now support Desktop MFA or can augment attributes for a user by synchronizing from multiple directories?

    We take you on a tour of the complete OneLogin offering and help you understand new offerings to leverage the platform for better security and greater automation.

    Presenters: Mark Cockbill, Senior Access Management Solutions Engineering Manager, One Identity

    Daniel Gordon, Senior Solutions Engineer, One Identity

    Identity Manager Today

    Hear about the latest releases of Identity Manager, LTS option, roadmap and use cases with product management and development.

    Presenters: Matthias Bauer Senior Manager of Product Development, One Identity

    Ted Ernst, Senior Product Manager, One Identity

    Privileged Access Management Today

    Hear about the latest releases of the privileged solution family, our product roadmap and use cases, presented by members of our product management and development teams. In this session, our experts highlight how the One Identity PAM portfolio provides Next-Gen PAM capabilities and features. Plus, get the latest info about innovations and integrations that ensure your PAM program can quickly adapt to evolving technologies and emerging cybersecurity threats.

    Presenters: Dan Peterson, Software Architect, One Identity

    Alan Radford, Field Strategist, EMEA, One Identity

    The Future Evolution of ID Security: A Converged Identity Security Model is Coming; Are You Ready?

    “Convergence, fabrics, unified;” just a few of the many terms used to describe the current trend in managing identities in today’s complex threat landscape. What should you be doing to create and implement this type of security model for your own organization’s unique environment?

    Presenters: Robert Kraczek, Field Strategist, NAM, One Identity

    Microsoft AD Security: Preventing Pass-the-Hash Privilege Escalation with Active Roles and Safeguard

    Active Directory is still the well-known attack vector for bad actors attempting to exploit large organizations. Since AD touches almost everything, and privileged accounts in AD can have far reaching impact, it becomes an obvious target. When an attacker compromises a user account or workstation, the next step is to elevate privileges. In this session, we will demonstrate a Pass-the-Hash breach against privileged accounts in Active Directory using common exploit methods and walk through an Active Roles implementation specifically designed to mitigate this vulnerability using Just-In-Time Privilege elevation. This Active Roles/Safeguard integration is specifically designed to reduce the vulnerabilities related to privilege escalation attacks and adds a Zero Trust security layer to Active Directory.

    Presenters: Dan Conrad, Presales Manager, One Identity

    AJ Lindner, Solutions Architect, One Identity

    OneLogin: The Future of Access Management

    Learn about OneLogin’s product roadmap and most recent product innovations. We showcase how these technology investments can be applied in key use cases and how they can benefit your organization, including custom authentication factors, dynamic responses to risk insights and application-level branding controls.

    Presenters: Mark Cockbill, Senior Access Management Solutions Engineering Manager, One Identity

    Stuart Sharp, VP of Product Strategy, One Identity

    Customizing the Identity Manager Web UI

    From simple configuration changes to fully customized applications, Identity Manager’s new customization architecture is based on established web development technologies. In this session, we will take a look at how to set up a custom app and address some questions that can arise over the lifetime of an application. Learn how the new HTML5-based UI stack helps to ensure the success of your Access Management project by benefiting developers and users alike.

    Presenters: Hanno Bunjes, Product Development Team Lead, One Identity

    How Bosch Maintains a Worldwide Distributed Safeguard Environment and Implements Changes/Extensions

    In this session, we present an approach we use at Bosch Cyber Defense Center to automate our environment in a scalable way.

    Presenters: Robin Großnick, Cybersecurity Engineer, ETAS, Bosch Cyber Defense Center Robin Rietgraf, Cybersecurity Engineer, ETAS, Bosch Cyber Defense Center

    Understanding Cyber Insurance: Who Needs It and What Will You Need to Do to Qualify

    Over the last few years, ransomware and other attacks have brought many household names to our news headlines and boardroom discussions. These companies have incurred extremely damaging costs, both in actual financial currency and in brand and confidence. With the number of cyberattacks increasing, an emerging industry, Cyber Insurance, or Cyber Liability, has become important for CISOs and CEOs to explore, evaluate and understand. In this discussion, we come to understand the fundamentals of Cyber Insurance, explore who needs it and dig into some of the requirements you will need to fulfill to qualify for Cyber Insurance.

    Presenters: Stacey Blanchard, Senior Director of Sales Engineering, NAM, One Identity

    Multi-Factor Authentication to the Active Roles MMC and Web UIs

    Multi-Factor Authentication is becoming a common security layer across all levels of access control – because it works. It just makes sense to add MFA to our critical enterprise applications, like Active Roles. Removing system-provided delegation points in AD and setting up a true least privilege delegation model is the core functionality of Active Roles, so adding MFA to the admin interfaces ensures strong authentication to the administration of the organization’s most critical asset: Active Directory. In this session, we will walk you through setting up the Active Roles web interfaces to use MFA and show how to implement MFA to the Active Roles MMC (or any type of admin interface) using Safeguard for Privileged Sessions.

    Presenters: Richard Hosgood, PAM Principal PreSales Engineer, One Identity

    AJ Linder, Solutions Architect, One Identity

    Leveraging OneLogin in Your Unified Identity Platform

    Learn how you can enhance your IGA, PAM and AD Mgmt implementation with OneLogin solutions.

    As part of the One Identity Unified Identity Security Platform, OneLogin seamlessly integrates with Identity Manager (IGA), Safeguard (PAM) and Active Roles (AD Mgmt), including behavior-driven governance and integrated risk flows to dynamically set a user's security policy based on both governance and authentication risk, and step-up authentication via OneLogin MFA.

    Presenters: Robert Byrne, Field Strategist, EMEA, One Identity

    Stuart Sharp, VP of Product Strategy, One Identity

    Access Management Governance with OneLogin

    See how Access Management and Identity Governance & Administration (IGA) together are essential to protect all classes of users throughout the identity lifecycle, including the authentication and authorization needed when users access critical resources.

    Presenters: Robert Kraczek, Field Strategist, NAM, One Identity

    Markus Weiss-Ehlers, Program Manager Consultant, One Identity

    VPN-Less Privileged Access Management

    See how to deliver safe and secure privilege access without the hassles and overhead of a VPN and all within a browser. Get the latest news, capabilities and plans for upcoming features of Safeguard Remote Access with a demo of current functionality.

    Presenters: Dan Peterson, Lead R&D Architect, PAM, One Identity

    Workshop: Unified Identity Platform: What Does it Mean to Your Business?

    Attendees workshop with our top technical executives to provide their input on how One Identity’s solutions will affect their organization and make it safer.

    Presenters: Darren Thomson, VP of Product Marketing, One Identity

    Rima Pawar, VP of Product Management, One Identity

    Think Like a Security Officer: Strategies to Protect Against AD Breaches

    Learn how a security officer approaches protection strategies to remain vigilant and cut off the angles of potential attacks. Strong policies must be implemented consistently and automated to mitigate risk in your Active Directory strategy.

    Presenters: Ian Stimpson, Principal Engineer, Presales, One Identity

    Enhancing Your Security Posture with Adaptive Risk Technologies

    Given the increased risk associated with the rise of ‘access anywhere’ and the growth of targeted attacks, more and more organizations are looking to maximizing the use of adaptive risk engines. More specifically, they are looking for ways to incorporate additional information in their risk management systems, for example, by integrating signals from PAM and IGA solutions or via richer signals from endpoints. A key purpose of these external signals is to inform the risk analysis driving dynamic authentication flows.

    Find out what we have done to enable organizations to incorporate the widest possible set of external signals and support a broader range of authentication factors. External signals include ID Proofing, third-party authentication factors, such as MFA, and a wide variety of threat intelligence.

    Presenters: Ted Ernst, Senior Product Manager, One Identity

    Daniel Gordon, Senior Solutions Engineer, One Identity

    Stuart Sharp, VP of Product Strategy, One Identity

    CIEM

    One Identity addresses Cloud Infrastructure Entitlement Management (CIEM) at the intersection of IGA and PAM. IGA capabilities enhance governance of cloud-platform authorizations and deliver crystal clear visibility of cloud-infrastructure objects.

    Presenters: Robert Byrne, Field Strategist, EMEA, One Identity

    Dr. Stephan Hausmann, IGA Principal, One Identity

    Privileged Access Management On Demand SaaS Isn’t Just for Teenagers

    The race to the cloud is driving everything and must include your PAM strategy. Unfortunately, most traditional approaches to PAM don't easily support cloud strategies. Will Mitchell discusses how a PAM program supports cloud targets and digital transformation priorities. He also demonstrates how it can be delivered in the ideal deployment for your business – on-prem, hybrid or private cloud – to execute your strategy efficiently and securely.

    Presenters: Bruce Esposito, Field Strategist, NAM, One Identity

    Will Mitchell, Product Manager, One Identity

    Using Artificial Intelligence to Mitigate and Reduce Risk Exposure Brought by an Identity

    Identity is the new attack surface. As you have seen with cyberattacks in the last few years, including sophisticated supply chain attacks, ransomware attacks and others, the common denominator is targeting identity.

    Presenters: Hitcham Bouali, Sales Engineering Senior Manager, One Identity

    Getting the Most from Active Roles Implementation

    Implementing Active Roles to provide stronger security and Zero Trust requires a delicate balance of technology and artistry. You need build a robust solution to grow with your organization but have policies and procedures in place to make sure you don’t deviate from its intended purpose. Since Active Roles allows you to implement security policies and delegation at scale, it’s critical to follow some guidelines to make sure it will support your growing organization.

    In this session, we address this balance and how to optimize Active Roles architecture, as well as features and functions to use (or not use) to eliminate bottlenecks and ensure a secure and functional implementation.

    Presenters: Frederic Courtois, Principal Solutions Architect, EMEA, One Identity

    Zero Trust: Best Practices for Securing the Enterprise

    You would be hard-pressed to find an IT or security leader who has not heard of Zero Trust, not to mention the plethora of different vendors in the security space claiming to be your one-stop shop for all things Zero Trust.

    The problem? Zero Trust is not a single product or solution, but rather a mindset that includes a set of guiding principles for a modern security strategy in today’s hyper digital world.

    Join us as we delve into what Zero Trust really means, describe the role Access Management plays in this model and look at strategies and practical solutions for implementing the necessary technologies to help you get started on your journey to Zero Trust.

    Presenters: Mark Cockbill, Senior Access Management Solutions Engineering Manager, One Identity

    Alan Radford, Field Strategist, EMEA, One Identity

    How Risk Fits into IGA

    Learn how you can benefit with knowledge of the broader security ecosystem and increase security.

    Presenters: Ted Ernst, Senior Product Manager, One Identity

    Starling Services for Safeguard

    Get an overview of how One Identity’s Starling Cloud services can extend your Safeguard deployments. The following Starling components will be covered during this session:

    • Starling Connect for Passwords: Discover and manage privileged accounts hosted in cloud-based services, such as Azure AD or AWS
    • Starling Directory Proxy Services: Synchronize end-user identities in Safeguard from Azure Active Directory
    • Starling Remote Access: Provide VPN-less remote privileged access from anywhere in the world, without compromising on security, with the help of only a web browser
    • Starling Connect for Safeguard Assets: Add support for disconnected assets and mobile workstations (planned for Q4/2022)

    Presenters: Richard Hosgood, Principal Systems Consultant, One Identity

    Ferenc Sipos, Director of Sales Engineering, One Identity

    Please, No More Security! We Fear Change!

    We’ve all seen the effects well planned security “enhancements” have on our workforce. These effects range from minor complaints to hostile workers refusing to comply with new procedures. When our goal was to provide better physical protection for the employees or protect work product and intellectual property, we must be aware of how the end consumers of change understand and perceive the change.

    In this session, Dan Conrad shares from experience as a user, a sysadmin and a security solution vendor the impacts security enhancements have on populations. How the consumer of security accepts the change is critical to the organizational and technical success of the change. We can install a new lock on the door, but if the occupants prop it open, the lock has failed. Dan discusses some of the reasons improving security posture goes wrong or is avoided, as well as shares some advice for steering things in the right direction to minimize push back to stronger security.

    Presenters: Dan Conrad, Presales Manager, One Identity

    Integrating Desktop Authentication and Cloud MFA for Strong Device Security

    Protecting identities and accounts is obviously critical to protect the data they hold within them. Adding Multi-Factor Authentication ensures a better security posture and reduces the likelihood of successful account breach. If an organization has not implemented MFA for their user population, it’s a bit like leaving your wallet or purse on a park bench and expecting it to not be stolen.

    Many organizations protect their cloud and on-premise applications using MFA today, but what about MS Windows devices? By combining Defender and OneLogin, cloud-based MFA can be used to further protect desktop devices.

    In this session, we show how to use OneLogin within your Defender implementation to provide strong desktop authentication to AD and authentication to cloud applications, while creating a seamless user experience.

    Presenters: Frederic Courtois, Principal Solutions Architect, EMEA, One Identity

    AJ Lindner, Solutions Architect, One Identity

    OneLogin for CIAM: Protecting Customer Identities with a Seamless Customer Experience

    Learn how to use OneLogin to centralize and secure your customers’ access to applications. We also discuss what strategies you should follow to define and implement your customer identity and access management (CIAM) program.

    Presenters: Mark Cockbill, Senior Access Management Solutions Engineering Manager, One Identity

    Stuart Sharp, VP of Product Strategy, One Identity

    IGA + SaaS = Cloud Your Way

    Learn what approaches to take to modernize your existing IGA program and what you need to consider when developing a modern IGA strategy with full identity governance capabilities.

    Presenters: Bruce Esposito, Field Strategist, NAM, One Identity

    Will Mitchell, Product Manager, One Identity

    Unleash the True Power of Safeguard

    Enterprise IT environments can be extremely heterogenous, comprising of technologies from legacy to cutting edge, but they all have one thing in common: they all have privileged accounts that need to be protected. Given this level of diversity, it is impossible to find a single PAM solution that supports every system out of the box. That is why it is imperative to pick a platform that provides users with the flexibility to define how system-provided assets that are not supported should be managed.

    Join us for an overview of how Safeguard, through its extension interfaces (Custom Platforms and Privileged App Auto-logon), can help you enroll virtually any asset type into your PAM program.

    Presenters: Ferenc Sipos, Director of Sales Engineering, One Identity

    People, They Deserve Governance Too

    The actors in an enterprise are people. There may be internal, external, temporary or other types of people. However, they all participate in the processes and business operations of the enterprise in different capacities. In this context, a person can occupy different personas. As such, they need to be considered in the security architecture of the enterprise. What are personas? How are they defined? And above all, how must they be managed?

    Presenters: Cengiz Tuztas, EMEA Presales Manager, One Identity

    Move from a Product-Focused Implementation to a Value-Driven AM Service

    Learn how to streamline process, reduce errors and minimize complexity associated with managing digital identities.

    Presenters: Artur Jozefiak, Managing Director – Security Lead for Poland/CEE & Digital Identity Delivery Lead for Europe, Accenture

    Bert Vanspauwen, Managing Director, Digital Identity Lead Europe, Accenture

Thursday

Thursday, 1 December
  • Enablement, Engagement and Collaboration

    Pre-Sales Enablement: Pump-up your skills with boot camps, TechTalks and more partner marketing initiatives. Delivery enablement: Expert services and training.

    Improving One Identity Business Success

    One Identity: Value-added distribution

    New market opportunities

    Building global alliances developing

    Customer success stories

    Working with Supporting Teams

    Support services

    Identity Manager and ServiceNow – Business Consideration and Step-by-Step Configuration

    This Deep Dive session outlines and discusses the possible business requirements of customers regarding a deeper integration and interaction with ServiceNow. Customers may ask: Is ServiceNow the only end-user portal enabling employees to request Web Portal items from Identity Manager, should Identity Manager be able to create requests in ServiceNow or is it both? Where should approval workflows take place? The second part of this session will show you how to implement an integration step by step.

    Presenters: Abdullah Ahmad, Senior Solutions Architect, One Identity

    Hicham Bouali, Sales Engineering Senior Manager, One Identity

    Integrating Active Roles with HR Using Starling Connect

    In this session, you will learn how to automate identity lifecycle management in Active Directory by integrating Active Roles with an HR solution using Starling Connect. This session will provide insight into what needs to be done to integrate Active Roles with HR, including what needs to be prepared, who needs to be involved and what the configuration looks like.

    Presenters: Raul Dopazo, Solutions Architect, One Identity

    Chris Rudd, Principal Engineer, Presales, One Identity

    Integrating SAP Governance Risk and Compliance (GRC) with Identity Manager

    SAP GRC is a hot topic for many customers and partners. What are the typical use cases and how can Identity Manager interact with SAP GRC? Typical scenarios are the following:

    • SAP GRC as workflow and provisioning engine
    • SAP GRC as workflow engine only
    • SAP GRC as SoD information system

    Learn how you can configure the integration with SAP GRC in Identity Manager.

    Presenters: Abdullah Ahmad, Senior Solutions Architect, One Identity

    Hicham Bouali, Sales Engineering Senior Manager, One Identity

    Active Roles and OneLogin: More than MFA and SSO. Provision Access to SaaS Systems Using OneLogin

    Active Roles and OneLogin are a natural fit. Active Roles offers mechanisms to guarantee clean data in Active Directory and OneLogin offers another way to connect to SaaS applications. Attend this session to see how Active Roles and OneLogin, together, offer more security and ease of administration for Microsoft-based systems and SaaS applications.

    Presenters: Raul Dopazo, Solutions Architect, One Identity

    Solenne Le Guernic, Solution Engineer, One Identity

Friday

Friday, 2 December
  • OneLogin in an AD-Centric Environment: Configuring AD to Orchestrate Provisioning Access in OneLogin

    Learn how OneLogin integrates with Active Directory, how it syncs and authenticates users and how you can leverage any user attribute information and AD group memberships to:

    • Secure and control access to applications, both authentication and authorization
    • Assign OneLogin security policies, including Multi-Factor Authentication
    • Grant granular administrative privileges in OneLogin
    • Automate user lifecycle (JML) within OneLogin and integrated applications

    We also talk about how OneLogin connects to Active Directory and discuss operational topics like deployment, high availability, load balancing and how to create an even more seamless Single Sign-On experience for the end-user by leveraging Windows Domain Authentication and offering self-service password reset.

    Presenters: Daniel Gordon, Senior Solutions Engineer, One Identity

    Solenne Le Guernic, Solution Engineer, One Identity

    Unleash the Power of Safeguard: Privileged Application Auto Logon and Custom Platform Integration

    Enterprise IT environments can be extremely heterogenous, comprising of technologies from legacy to cutting edge, but they all have one thing in common: they all have privileged accounts that need to be protected. Given this level of diversity, it is impossible to find a single PAM solution that supports every system out of the box. That is why it is imperative to pick platform that provides users with the flexibility to define how natively not supported assets should be managed.

    One Identity Safeguard defines two extension interfaces:

    • Custom Platform modules describe the logic needed to perform operations on target systems, such as checking and changing of credentials or account discovery
    • Auto-logon wrappers orchestrate credential injection into applications to provide a secure and seamless end-user experience (no more copying and pasting of passwords)

    During the first session of this two-module training, we learn about the expression language used to describe the steps needed to perform credential management operations. Then, we create custom platform modules to manage a few pre-selected asset types.

    In the second session, we take a look at the credential fetching mechanism provided by Safeguard for privileged app auto-logon, get familiar with the programming interfaces and create a wrapper to demonstrate the credential injection workflow.

    A general understanding of Safeguard and PAM concepts is recommended for these sessions.

    Presenters: Ferenc Sipos, Director of Sales Engineering, One Identity

    Holger Weihe, PAM Principal, One Identity

    OneLogin & Defender & More: Discover How the Integration Proceeds at Great Speed

    OneLogin makes MFA deployment easy. You need to secure your domain-based Windows systems with MFA, allowing easy integration into the existing Windows Domain Infrastructure. We cover the needs, setup and integration options between Defender MFA and OneLogin MFA. In addition, we take a look at the progress on the integration between the One Identity solutions with OneLogin for a smoother deployment and more secure access.

    Presenters: Solenne Le Guernic, Solution Engineer, One Identity

    Torsten Westphal, Sales Engineer, One Identity

Highlights from Resilience Barcelona 2022