The event included dozens of sessions categorized into five learning tracks (Security, Active Directory Management, Access Management (OneLogin), Identity Governance and Administration (IGA) and Privileged Access Management (PAM)), as well as mainstage, partner, CAB and Technical Deep Dive sessions. Attendees had the opportunity to mix and match sessions from each category to create the perfect agenda to meet their personal goals for the conference.
Benefits to customer and partner attendees:
CEO Keynote: Mark Logan
Listen to Mark explain the future vision of the organization and hear why
we’re the identity security company to partner with.
Think
like a hacker: Secure your brand
Are you struggling to understanding how hackers think, how they operate, how
they break systems, and how to keep pace as they evolve? Do you need to know
how to defend accordingly? Listen to this keynote to address the seemingly
overwhelming collection of security concerns with which today’s leaders
contend.
Industry experts
roundtable
Why do we do what we do? What are the
experts seeing in the market place? What are the latest issues that need to
be addressed? Hear from our panel.
Customer Perspectives - Two different paths on the IAM journey
Hear from Amy Morris, Senior Director of Cybersecurity at Dayforce and Tod
Stott, Head of Cloud Infrastructure at AMN Healthcare on their IAM journey and
top-of-mind security strategies.
Why
Traditional IAM Tools Are Now Obsolete
In our world we cannot sit on the fence, we have to pick a side and we have
to lead the fight against the hackers. Find out what One Identity is doing to
aid you in that battle.
Customer story:
Kodak
Real world examples of how One Identity solutions have been implemented to
solve identity security problems.
Navigating
the Security and Compliance landscape at SAP
SAP and One Identity are working closely together to help our mutual
customers secure their organization's identity security posture.
The
One
Managing cybersecurity in today's world in increasingly challenging and
emerging technologies along with regulatory compliance continue to add
complexity to the problem. Brian will take you through our vision for now and
the future where we plan to address the complexity by taking a fresh look at
the problems, and delivering smarter answers to them. Simplifying your
security models making them easier to design, maintain, and respond to.
Slaying
the many-headed hydra of data privacy and protection
With data traveling the world through borderless networks, data privacy and protection laws have never been as important as they are today. Over 120 global jurisdictions now have data privacy and protection laws. California to China are implementing legislation that mirrors Europe’s GDPR, while the EU has turned its attention to a new EU Data Act as well as regulating the use of AI. Where once organizations were always ahead of regulators, now they struggle to keep up with compliance requirements across multiple jurisdictions. In this session, we will discuss the current state of compliance regulations, what’s coming next and how you can stay ahead.
ADM Track: Roadmap and new releases
This session will focus on the roadmap for Active Roles, future release
cycles and the features/functions that will be included or enhanced in each
release.
AM Track: Charting the course:
OneLogin product roadmap revealed
Join us for a concise session unveiling the roadmap for our OneLogin
solutions. Explore upcoming features and enhancements, and learn how they
align with your organization's needs and goals. Whether you're an IT
professional, security expert, or business leader, this session offers
valuable insights into the future of OneLogin.
IGA
Track: Latest updates and roadmap for Identity Manager
This session will focus on the roadmap for Identity Manager, future release
cycles and the features/functions that will be included or enhanced in each
release.
PAM Track: State of our PAM
universe
This session will focus on the roadmap for Safeguard, future release cycles
and the features/functions that will be included or enhanced in each release.
ADM Track: Designing the perfect
lifecycle process
One of the most common use cases for Active Roles is managing the lifecycle
process of Active Directory and Entra ID accounts for employees, service
accounts or other users – from creation, throughout their use at the
company, to eventual de-provisioning and potential reactivation. Active Roles
offers an array of features that work in tandem and build upon each other to
provide a highly controlled, streamlined, secure lifecycle process for your IT
or HR staff. Learn how you can apply all the components, tricks and best
practices to build your ideal lifecycle process.
AM
Track: Protecting the new enterprise edge with OneLogin
Discover how OneLogin safeguards the new enterprise edge. Learn about our
comprehensive protection, including secure access management and adaptive
authentication. Explore innovative strategies for defending against emerging
threats and ensuring compliance. Whether you're an IT leader or security
professional, this session provides essential insights for securing your
organization's digital assets effectively.
Authentication
Services Track: Introduction to Safeguard Authentication Services
Authentication Services and the importance of securing authentication across platforms. We will discuss:
IGA Track: Integrating One Identity Identity Manager with
Azure PIM
for enhanced governance
In this session, we will explore the seamless integration of One Identity's Identity Manager (IDM) with Cloud Infrastructure Entitlement Management (CIEM) to extend governance capabilities to privileged identity management (PIM) roles within Microsoft Azure. We will discuss the benefits of this integration, including enhanced security, streamlined access management and improved compliance. Join us to discover practical strategies and best practices for effectively governing PIM roles in Azure within your organization.
PAM Track: Certificate vaulting
TLS certificates play an important role in keeping IT infrastructures secure
and as such it's imperative that corresponding private keys are protected
adequately. Please join us for the introduction of a newly added SPP feature
to support the vaulting of TLS certificates. We will cover how to add
certificates to the vault, set entitlements, and seamlessly and securely work
with certificates and keys in applications.
Security
Track: Reporting with Power BI
Privilege Access Management, Active Directory Management and Identity
Management are three critical components of an organization’s
cybersecurity strategy, ensuring that the right individuals have appropriate
access to resources while protecting sensitive data from unauthorized
access.
Power BI can help by providing detailed and
interactive dashboards that visualize access control data making it easier to
monitor and analyze privilege access across the organization. By integrating
with One Identity solutions, Power BI can:
ADM Track: Active Directory Penetration Testing
Active Directory is used in 95% of the Fortune 500 companies today and is a
primary target for attackers. In this session, AJ Lindner will explore and
demonstrate some common attack methods used against Active Directory such as
password spray, pass-the-hash, hash cracking and kerberoasting. When these
types of attacks are understood, the methods, tools and solution to protect AD
become more relatable.
Authentication Services Track:
Explore the benefits of Implementing Safeguard Authentication Services
Real-world scenarios where Safeguard Authentication Services is essential
and examples of industries and businesses that benefit. We will dive
into:
IGA Track: Unlocking XIAM: Governing access for someone else's
workforce
Explore the power of eXternal identity & access management (XIAM) in
governing access for external user populations. Learn how XIAM combines access
management (AM) with identity governance and administration (IGA)
functionalities to tackle challenges like role-based access control, dynamic
user detection and account governance. Discover the significance of Trusted
Identity Providers (IDPs) in enabling cost-effective solutions for large-scale
IGA. Join us as we unlock the potential of XIAM and streamline access
management for 'someone else's workforce.
PAM Track:
Secure and Centralized Management of Corporate Credentials: An In-Depth Look
at Enterprise Password Vault
The increasing frequency of cyber attacks on traditional password managers,
which are often SaaS-based consumer products, has raised concerns about their
ability to keep corporate credentials secure. In fact, recent data indicates
that three out of five consumer password managers have experienced breaches in
the last two years alone. As a result, many cybersecurity insurance companies
are now mandating organizations to implement corporate-sanctioned password
manager solutions by 2024-2025.
To address this growing challenge,
we invite you to attend our breakout session and learn how Safeguard
Privileged Passwords can provide a secure On-Prem/SaaS-based solution for
managing corporate credentials across your entire organization. Our solution
is designed to meet the highest standards of security and compliance, ensuring
that your sensitive data remains protected at all times.
Security
Track: AT&T Cybersecurity Services identifies threats with Syslog-ng
Premium
Learn how AT&T Cybersecurity Services leverages One Identity’s
Syslog-ng Premium solution as part of their network threat detection service
to parse the maximum amount of usable data in order to expedite discovery and
identification of vulnerabilities in their customers’ network.
ADM
Track: Active Roles AD Group Management and Attestation
Most organizations use Active Directory for authentication and authorization
to resources. This is usually (and correctly) done with AD group memberships
through the concept of role-based access control. Did you know Active Roles
can assist with controlling and validating AD groups? In this session, Eric
Hibar will walk through ways to control access to resources automatically as
well as introduce AD attestation functionality. This Active Roles add-on will
allow group managers to not only control the group membership but creates an
attestation workflow requiring periodic group membership validation. Eric
will walk through this add-on and provide insight into the future of this
functionality.
AM Track: Convenience
meets security: Embracing passwordless authentication
Explore the marriage of convenience and security with passwordless
authentication. Learn how it transforms access, enhancing security while
ditching passwords. Discover seamless user experiences and robust security
features. Embrace passwordless authentication to streamline operations, boost
satisfaction, and fortify defenses. Whether in IT, security, or leadership,
this session unveils the authentication future.
Authentication
Services Track: Safeguard Authentication Services Deployment and
Integration
We will discuss the integration of Authentication Services with other One
Identity solutions and existing infrastructure.
IGA
Track: Unveiling hidden gems: Exploring the advanced features of Identity
Manager
Unlock the full potential of our Identity Manager product by uncovering its
hidden gems. In this session, we'll dive deep into the advanced features and
functionalities that often go overlooked. From powerful automation
capabilities to innovative integration options, you'll discover how these
hidden gems can streamline workflows, enhance security, and optimize your
identity management processes.
PAM
Track: Behavior Driven Privileged Access Governance
One Identity's very own Identity Manager and Safeguard add a layer to
digital oversight with its Behavior Driven Governance, available through the
Privileged Account Governance Module. This feature efficiently monitors the
use of user groups and entitlements, identifying any that are underutilized.
It automatically initiates recertification or removal processes for these
inactive accounts or permissions, keeping your system streamlined. By
simplifying governance, this approach not only tidies up unused digital access
but also ensures active engagement from decision-makers. Experience a more
organized and proactive approach to managing your digital environment!
Security
Track: Revolutionizing Just-In-Time Access: Innovative Approaches to Secure,
On-Demand Access Control
Gaining zero-standing privilege for privileged users has traditionally been
a significant challenge for many organizations. However, Safeguard's
innovative solution can help simplify this process. With Safeguard, IT
administrators and other privileged users can natively access their own
service accounts with elevated permissions upon request, ensuring secure and
efficient workflows while minimizing the risk of standing privilege threats.
Join us in this breakout session to learn how the latest version of Safeguard
has the native ability to access Just In Time out of the box.
ADM
Track: Active Roles/OneLogin/PAM Essentials Integration
With the recent release of One Identity PAM Essentials and the strong ties
of this solution to OneLogin, it only makes sense to show how Active Roles
integrates and interacts with both solutions. In this session we will discuss
the integration points of each solution, show how the connections make each
solution stronger and easier to manage, and walk through the simplicity and
security PAM Essentials with the Active Roles integration.
AM
Track: Master class: Advanced Authentication in your organization
Advanced authentication is a modern cybersecurity approach that elevates
access management beyond traditional username-password models by integrating
strong authentication factors and adaptive methods. In this session, we will
explore advanced authentication best practices and share ways in which you can
bolster your organization's security posture and optimize the end-user
experience.
Authentication Services
Track: Ask the Experts on Safeguard Authentication Services
Open floor discussion for questions from attendees and addressing specific
concerns and clarifications
IGA Track:
Insights from Product Management
One Identity has stellar solutions in each of the primary IAM areas:
Privilege,
Access, AD Management and Identity Governance. Plus, there is the product
that helps in many areas: syslog-NG. You may know what each does within their
area, but do you know how they benefit each other? In this session, our
product managers will describe the primary cross-product benefits that our
customers experience when integrating these products together.
We
will also look at a new area called “One Identity Cloud” which I
know each of you will find interesting.
PAM
Track: DevOps and Ops Integrations - Seamless credential management in
complex IT environments
Safeguard has been known for its extensive API and
versatility whether it be custom platform modules, credential store or
authentication and authorization plugins, or Remote Desktop application
launchers for credential injection.
In this session, we will
take a closer look at the various possibilities in which Safeguard supports
DevOps and Operations workloads via API integrations including the Secrets
Broker service and its plugins, a custom credential provider for systemd, and
other scripting resources. These tools were designed to improve security
posture by easing the introduction of a credential management into an
existing heterogenous IT environment.
Security
Track: Secure, seamless hybrid identity management with AWS Managed Microsoft
AD and Active Roles
This
breakout session will explore how the integration of AWS Managed Microsoft AD
and One Identity Active Roles simplifies security and identity management,
including access control, governance, and compliance. The session will also
cover how it can accelerate cloud migration and modernization, particularly
in diverse and dynamic environments. Attendees will learn how Active Roles
enhances AWS Managed Microsoft AD by providing secure, centralized identity
synchronization, dynamic secure delegation, and auditing capabilities.
Learn
how the combination of AWS Managed Microsoft AD and Active Roles can
simplify, secure, and accelerate your organization’s secure identity
management processes, enabling seamless access to resources across hybrid
environments.
ADM Track: Passwords are still
required. So, make them perfect
Although many organizations have successfully implemented a fully passwordless environment, many still depend on passwords, especially to support legacy or bespoke applications that struggle to accommodate modern authentication. As long as passwords are still around, it’s imperative to ensure that their requirements and the processes for managing them are reasonably secure. Learn the best practices for using One Identity Password Manager to create Password Policies and Self-Service Reset Workflows that align with NIST standards and meet all business requirements, and how you can take that even further to provide highly advanced capabilities.
AM Track: PAM
Essentials
Join
us to explore OneLogin's latest offering tailored for small to medium
enterprises seeking simplified privileged access management (PAM). Discover
how PAM Essentials revolutionizes PAM for SMEs, delivering essential features
without the complexity of typical enterprise solutions. Learn how this
SaaS-based solution provides seamless integration and scalability, empowering
SMEs to enhance security and compliance effortlessly. Dive into the future of
PAM, where simplicity meets efficiency in the cloud, catering to the needs of
businesses across the spectrum, from small startups to larger midmarket
enterprises.
IGA Track: Behavior-driven analytics. Ensuring optimal entitlement hygiene
Behavior Driven Governance transforms IT administration by using behavior
analytics to optimize access rights, ensuring only necessary entitlements are
maintained. This method enhances security and compliance, efficiently
streamlining operations. Powered by One Identity Manager, it revolutionizes IT
governance with advanced policies and processes.
PAM
Track: Starling Connect for Safeguard assets
Tired of using LAPS in your environment? Safeguard can manage
and rotate credentials for local accounts not only in Windows but also in MAC
and Linux. Each system account can have its own unique password. Helpdesk
engineers can request access to local accounts for end-users in a secure
manner with password rotation. No longer do you need to reuse passwords for
local system accounts. Attend our session to learn more about how you can
replace LAPS and use the Safeguard Password Vault with Connect for Safeguard
Assets.
Security Track: Real-World
Impact: Customer Success Stories with Safeguard
Join us for an engaging panel discussion where industry leaders and valued
customers of Safeguard comes together to share their experiences, insights,
and successes with the platform.
This interactive session
will delve into real-world applications, highlighting how Safeguard has
transformed operations and empowered organizations to achieve their strategic
goals. Attendees will gain practical knowledge on best practices, discover new
ways to leverage the solution, and engage directly with fellow users and
experts.
Customer story: George Washington University
Join Chuck Mance from George Washington University as he discusses higher
education challenges, top of mind security concerns and journey.
Keynote:
The industry expert session
Hear from experts as they discuss their experiences of solving enterprise and global level identity security concerns. Will you pick a side?
Automating risk response with Identity Manager
Leverage the power of our unified identity platform by using Identity
Manager to detect behavior patterns that may signal increased risk originating
from OneLogin and Safeguard. Automate risk responses and remediation when
these signals are detected to elevate security.
This session
goes beyond out-of-the-box behavior driven governance, delving into leveraging
custom processes within Identity Manager to detect threat patterns in event
logs and trigger governance responses accordingly.
Creative
uses for Active Roles: An ideas session
Active Roles has an incredibly powerful toolset, enabling users to customize
it for their unique needs. When you take advantage of its advanced scripting
capabilities, explore lesser-known features, and adopt a creative mindset, you
can transcend practical limitations.
This session will
showcase some incredibly technical customizations to show just how much you
can do with Active Roles, even if maybe you shouldn’t.
MFA
credential injection with Safeguard
Since its inception, Safeguard has supported privileged auto-logon at the
network level (e.g. RDP, SSH). In response to customer needs to handle logins
at the application layer, we added credential injection capabilities for
Remote Applications (RDP apps). With the widespread adoption of multi-factor
authentication for privileged accounts, we introduced support to orchestrate
logins for applications and websites (e.g. AWS web console) that require
time-based, one-time passwords as their second factor. All secrets (including
TOTP seeds) are securely stored in SPP's vault.
Please join
us for a deep-dive session to learn how these components seamlessly integrate
to create a cohesive user experience. Discover the configuration requirements
and how to customize the application launching mechanism to support custom
use-cases.
Optimizing Active Roles
architecture
As organizations evolve, expand and diversify, so does the complexity
of their Active Directory (AD). Active Role adapts to these changes, growing
in both architecture and complexity along the organization.
This
session will delve into deployment strategies tailored to a diverse range of
organizations, ensuring optimal flexibility and solution performance. We will
focus on deployment types, ensuring availability, managing geographic
dispersion, optimizing web interfaces, eliminating bottlenecks and performance
issues, and navigating upgrade scenarios.
Unlocking
the Potential of OpenAI and Identity Manager: Beginning of the journey
In this session, we will explore a pioneering integration of
OpenAI's advanced artificial intelligence capabilities within Identity
Manager. The integration aims to augment Identity Manager by utilizing natural
language processing, machine learning, and AI-driven insights to boost
security, streamline operations, and enhance ease of use and
productivity.
See how OpenAI's capabilities can be applied to
Identity Manager for analytics, anomaly detection, and intelligent automation.
You will be walked through the integration process, including architecture
design and customization. By the end of the session, attendees will have a
comprehensive understanding of how integrating OpenAI with Identity Manager
can provide significant benefits, from heightened security to improved user
satisfaction. This overview will serve as a foundation for further exploration
and implementation of AI-driven IAM solutions in various organizational
contexts.
Secure DevOps with vaulted credential integration
Uncover how Safeguard's Privileged Passwords Vault seamlessly integrates
into your current DevOps workflows. In today's rapidly evolving threat
landscape, the rotation of vaulted credentials used by DevOps teams has become
a critical task for organizations to ensure robust security. This session will
showcase integrations with AWS Secrets Manager, Azure Key Vault, CircleCI
Secrets, GitHub Secrets, HashiCorp Vault, Jenkins Secrets, Kubernetes Secrets
and Safeguard for Privileged Passwords.
Don't miss this
exclusive opportunity to learn how integrating the Safeguard Privileged
Passwords Vault into your DevOps workflows can strengthen your organization's
security stance.
Strategies and Best
Practices for Identity Security with OneLogin & PAM Essentials
Join us for a deep dive into identity security strategies with OneLogin and
PAM Essentials. This session will cover best practices for user provisioning,
role-based access control (RBAC), identity integration, and privileged access
management (PAM).
You will discover how to automate
provisioning workflows, define access policies, and leverage RBAC for secure
management. We’ll explore integrating directory sources and trusted
Identity Providers (IdPs) with OneLogin, as well as implementing PAM
Essentials to enhance privileged account security. Additionally, we will
discuss Smart Hooks, focusing on the pre-authentication smart hook, which
allows for real-time adjustments to user policies during the login
process.
Through practical demonstrations, learn how
OneLogin’s IAM capabilities and PAM Essentials create a robust security
framework. Whether you’re new to OneLogin or looking to enhance your
deployment, this session will provide actionable insights to optimize identity
security in your organization.
Unleashing
Identity Manager's integration powers
Join us as we unravel the integration power of Identity Manager and
explore how it can revolutionize your identity governance landscape. We will
demonstrate the seamless integration and synchronization capabilities achieved
using our Powershell module and SCIM connector. Learn how these tools can
seamlessly integrate and synchronize with target applications that may not be
readily supported out of the box. We will showcase sample integrations
utilizing REST API through the Powershell connector and leveraging the SCIM
protocol with our built-in SCIM connector.
Gain insights into
practical applications within identity governance processes, explore the
seamless connectivity to directory sources for enhanced data accuracy and
unlock the advanced functionality through integrations with our strategic
technology alliance partnerships.
Please wait...