Monday, October 2nd
|2:00 – 3:00 p.m.||Registration|
|3:00 – 3:15 p.m.||Welcome & Session Overview|
|3:15 – 3:55 p.m.||One Identity – Company Update and Outlook|
|3:55 – 4:30 p.m.||One Identity – Technology Direction and Vision|
|4:30 – 4:45 p.m.||Break|
|4:45 – 5:05 p.m.||Making it work in the field|
|5:05 – 5:20 p.m.||Supporting Your Success – Pre-Sales|
|5:20 – 5:35 p.m.||Supporting Your Success – Professional Services|
|5:35 – 5:50 p.m.||Supporting Your Success – Marketing|
|5:50 – 6:00+||Q&A |
|6:30 – 9:00 p.m.||Cocktails/Networking and Awards Dinner|
Tuesday, October 3rd
|8:30 – 8:45 am||Welcome back and Day Two overview|
|8:45 – 9:15 am ||Keynote: Identity In Depth, the evolution of defense|
|9:15 – 9:45 am||Moving to the Cloud – One Identity Starling|
|9:45 – 10:30 am||Next Generation PAM – One Identity Safeguard|
|10:30 – 11:00 am||Break|
|11:00 – 11:30 am||AD management in a hybrid environment - Active Roles|
|11:30 – 12:15 p.m.||Identity Manager 8.0|
|12:15 – 12:30 p.m. ||Bringing things together and opportunities from these solutions|
|12:30 – 2:00 p.m.||Lunch break and time for networking|
|2:00 – 4:30 p.m. ||Breakout tracks (sales and technical)|
|4:45 – 5:00 p.m.||Panel Discussion/Q&A Session Networking dinner|
|2:00 – 2:55 p.m.||Winning in the field|
|2:55 – 3:30 p.m.||Break|
|3:30 – 4:25 p.m.||Increasing your profits through One Identity Partner Circle|
|4:45 p.m.||Q&A/Panel discussion|
|2:00 – 3:15 p.m.||Identity Manager Deployment Best Practices|
|3:15 – 3:30 p.m.||Break|
|3:30 – 4:45 p.m.||One Identity Safeguard technical insights|
|4:45 p.m.||Transition to Q&A/Panel discussion|
User Conference – General Session
Wednesday, October 4th
|7:30 – 8:30 am||Breakfast|
|8:00 – 9:00 am||Registration|
|9:00 – 9:30 am||Welcome and John Milburn’s Industry Insights|
|9:30 – 10:30 am||From Here to Security: Trends Shaping Infosec in 2017 and Beyond with Scott Crawford from 451 Research
- The story of information security has taken some dramatic turns in recent years – and will continue to do so. Threats have become more efficient (ransomware, anyone?), while data breaches continue to set new records in scale and impact. Will the transformative changes sweeping IT have an equally positive impact on remaking security? In this talk, we look at four key themes shaping security’s journey into the future - the impact of threat evolution, the gravitational pull of “new IT,” the powerful forces that oppose it, and outcomes we expect to see regardless – with identity’s role in this evolution highlighted at key points along the way.
|10:30 – 10:45 am||Break|
|10:45 – 11:30 am||Intragen and Radboud University
- Looking at the organisational change aspects of implementing IDM within higher education. Gaining business buy in from the business, compliance, audit and IT. Identifying the business benefits ranging from identifying and mitigating organisation risks to automating on-boarding as well as request and approval. Also, how Radboud University is looking to migrate their Identity Manager version and what’s next on the horizon for them in the Privileged Management world.
|11:30 – 12:00 p.m.||Update from Support|
|12:00 – 1:00 p.m.||Lunch & Expo|
|1:00 – 1:30 p.m.||One Identity: The Road Ahead
- In this session, Jackson Shaw, Senior Director of Product Management will review One Identity’s development priorities, how those priorities were arrived at relative to solving business issues and how the roadmap will positively affect IAM professionals. He will be exploring the growth of IDaaS and privileged access management in the IAM market and the effect these trends have had on our development activities. Come prepared to ask your tough questions about the market and One Identity’s direction.
|1:30 – 2:15 p.m.||Immersion & Western Carolina University – How they improved security while saving money.|
|2:15 – 2:45 p.m.||Break|
|2:45 – 3:30 p.m.||Mythbusters: AuthN/AuthZ edition
- Busting the myths of Authentication and Authorization. You have allowed people onto your network… Are you really sure who they are? Your security team has assured you ‘the path is secure’. Is it? Simple tools that anyone can execute can find fatal flaws in what you believed you had correct. One question… Why lower the drawbridge when a simple portal will work?
|3:30 – 4:15 p.m.||GDPR -An insider’s view of Quest’s compliance
- In this session, Melanie Kacerek, from Quest’s legal department, will highlight the five (5) Ps of compliance: the processes, procedures, penalties, partners and products Quest is using to ensure compliance with this important piece of European legislation that impacts any organization in the world that comes in contact with private information of any EU citizen.
|4:15 – 4:30 p.m.||One Identity Safeguard: 15 minute Snapshot|
|4:30 – 4:45 p.m.||Identity Manager: 15 minute Snapshot|
|5:15 – 6:45 p.m.||Cocktails and Expo|
|6:45 – Late p.m.||Dinner Event at Newport Dunes|
Thursday, October 5th
One Identity Manager Breakout
|9:00 – 10:00 am||Next Generation of One Identity Manager
- The process of ensuring that access is correct and provable across the entire enterprise, is the pinnacle of IAM. An end-to-end approach to governance that is built in from the start, includes not only user access but also access to data and privileged accounts. Placing the visibility and control of that access in the hands of the line-of-business is not only possible but easily achievable.
|10:00 – 10:45 am||Attestation to Meet Compliance
- By defining strong policies and deploying adaptable, automated workflows that incorporate compliance features such as separation-of-duties, role-based-access-controls, attestation, and recertification, organizations can not only realize huge cost savings related to periodic audits and compliance but also enhance comprehensive visibility and control. These can also quickly adapt to changing regulatory requirements. This presentation highlights and demonstrates compliance-related features and capabilities to help comply with changing regulations. It also gives you a brief preview of related roadmap items, such as identity analytics and risk intelligence, which offer actionable insights to help meet new cloud computing policy requirements.
|10:45 – 11:15 am||Break|
|11:15 – 12:15 p.m.||Get the Most From Your Identity Manager Deployment
- The session can help you keep focus on what a successful deployment looks like, how to avoid common pitfalls when deploying identity management systems and how to take advantage of One Identity Manager’s capabilities to magnify your investment value. The topics we will cover include the following: Mapping business value to technical functionality: understand which technical functions are working for your business, and the business value they support, as well as which functions you may have overlooked that can increase your business value. Avoiding pitfalls when upgrading to a new release of Identity Manager: understand the technical and operational pitfalls associated with upgrading your Identity Manager solution, and how to avoid them. Best practice deployment scenarios and avoiding the pitfalls: understand the key execution pitfalls that can derail and identity management program, and best practices for avoiding them.
|12:15 – 1:15 p.m.||Lunch|
|1:15 – 2:15 p.m.||Faster Application Deployment (SCIM)
- SCIM (System for Cross Domain Identity Management) is an open standard and REST API that defines schema and protocol for identity management so that enterprises, in a consistent and uniform way, manage identities. The potential of SCIM to impact the digital economy is vast. With its ability to connect infrastructure by speaking the common language of SCIM to each other without the need for custom coding, IT teams can secure data and identities better and faster while focusing their efforts on what matters; digital transformation and innovation. In this session, Alex will discuss why enterprises need SCIM and the importance of interoperability and collaboration in the digital economy.
|2:15 – 3:00 p.m.||Identity Manager, SAP and Great Integration
- Tenant Management – Single and/or multi-tenant, One Identity can handle it. No change required to an existing SAP infrastructure if CUA is used or not. Also for multiple HCM system integration, leveraging employee data from different authoritative sources, One Identity can handle it.
|3:00 – 3:30 p.m.||IT Concepts and Fairfax County: Improved operational efficiency and compliance by migrating from SAP
- Fairfax County’s IT operations are sophisticated and leverage state of the art automation in many divisions which have a direct impact on public services and safety. Business applications include SAP HR, SAP business applications, and Active Directory. The County selected One Identity Manager to replace SAP IDM in 2015, and deployed in 2016. Over the past year of operation, the project has delivered on compliance and efficiency objectives. This presentation dives into how One Identity features and functions supported complex data requirements to make this success possible.
|3:30 – 3:45 p.m.||Break|
|3:45 – 4:15 p.m.||Panel Discussion & Q&A|
Privileged Access Management Breakout
|9:00 – 10:00 am||One Identity Safeguard 2.0 Basics – New Terminology and Features: The Workflow of Getting a New Appliance Ready To Go!
- One Identity Safeguard has been architected to simplify the deployment and use of password vaulting and session management technology. With this new architecture comes new terminology and features. In this session Wayne Beaudin will cover what you need to know to get the solution configured and running including the terminology, workflow and enabling some cool new features.
|10:00 – 10:45 am||Privileged Access and SAP – Get Control
- SAP contains a large amount of an organizations most valuable data, and ensuring only authorized access is critical to protecting your information and achieving compliance. In this session Reto will show you how to secure you SAP data using a two-pronged approach with solutions from One Identity. This includes securing the access to the SAP applications and providing privileged access in a controlled and auditable manner.
|10:45 – 11:15 am||Break|
|11:15 – 12:15 p.m.||One Identity Safeguard: What’s Next in 2.1 and beyond
- With the release of One Identity Safeguard 2.0 in August we made some great strides to transforming the PAM market, but we aren’t done yet. In this session Tyler Reese, product manager for One Identity Safeguard will talk about and demonstrate some of the new features coming in 2.1 including our integration with Identity Analytics and Risk Intelligence.
|12:15 – 1:15 p.m.||Lunch|
|1:15 – 2:15 p.m.||One Identity Safeguard: The API and Advanced Scripting
- Using a solutions API can be a great way to solve business processes but they are often one of the most underutilized resources. In this session, Dan Peterson, lead architect for One Identity Safeguard will demonstrate several advanced PAM use cases that can be accomplished through the One Identity Safeguard API enabling you to unlock the full power of the solution.
|2:15 – 3:00 p.m.||The Journey From TPAM to One Identity Safeguard
- You have heard about all the cool new technology that One Identity Safeguard and you are excited about making the move but where do you start? In this session Kris Zupan, CTO of Rallypoint will talk through items to consider prior to migration and a step by step migration process methodology.
|3:00 – 3:30 p.m.||Tips and Tricks: Securing your Unix, Linux and Mac environments
- Attend this session if you are looking to get more value out of your current Authentication Services deployment. We will cover some cool tips and tricks including using the new features in Certificate Auto-enrollment to manage and deploy certificates in your infrastructure and adding two-factor authentication.
|3:30 – 3:45 p.m.||Break|
|3:45 – 4:15 p.m.||Panel Discussion & Q&A|