Event closed

This event is now closed, if you would be interested in attending a similar event please contact our team on [email protected] or call us on 01372 418 500.

Using Identity to Shape Cyber Security

Join us on 11th February to discover why user identity has become the new security perimeter and how identity plays a key role in any organisation’s security strategy.

Hear from Chris Parker MBE, an expert in international strategy and the delivery of modern high-risk operations who will provide a comprehensive update on current cybersecurity threats and the importance of implementing the correct identity security solutions. Chris will draw on his own experiences in planning large, complex operations both in the military and in the private sector.


Join us on Tuesday 11th February 2020 at The Victorian Bath House, London and discover the key to securing your complete identity strategy. Hear from Okta, Thycotic and Saviynt who will cover:

  • Identity Access: Adopting Zero Trust - Learn how to enable secure access for the various users regardless of their location, device or network and better secure Office 365 & Active Directory.

  • Privileged Access Management: Privileged accounts are pervasive and act as the “keys to the IT kingdom”. Discover how to strengthen privileged access management (PAM) practices to prevent breaches.

  • Identity Governance: Ensure only the right people get entitlements to the right resources at the right time for the right reasons.

 

Who should attend?
This event is for IT professionals who are responsible for IT security within their organisation.

 

We hope you can join us at this beautiful venue hidden beneath the streets of Bishopsgate to gain a deeper understanding of how solve business challenges around identity and map out the next steps to success.

 

Please register for this event using the form below.




11
Feb

The Victorian Bath House

Tuesday 11th February

7-8 Bishopsgate. London. EC2M 3TJ
Contact us

Agenda

  • 09:00    Registrations and breakfast
  • 09:30    Bytes Welcome and Intro
  • 09:45    Identity is the New Perimeter
  • 10:30    The Importance of Identity Governance and Administration
  • 11:15    Break  
  • 11:35    Privileged Access Management Uncovered
  • 12:30    Identity and Access Management: Adopting a Zero Trust Approach
  • 13:15    Bytes Security Services          
  • 13:30    Lunch and networking drinks

Speakers:

chris parker.jpg

Chris Parker MBE MA CMgr FICM
Founding Director, Cyberplus Ltd.

Joseph Carson - Thycotic.png

Joseph Carson
Chief Security Scientist & Advisory CISO, Thycotic

DVolere HeadShot Saviynt.jpg

Diana Volere, CISSP, CCSP
Chief Evangelist / Director of Product Marketing
Saviynt

Register for the Using Identity to Shape Cyber Security event here:

By submitting your information, you are allowing us and participating vendors to communicate with you about this event and consent to being added to our marketing database. You can update your contact preferences at any time. For further detail, please read our privacy policy.

Connect