Using Identity to Shape Cyber Security

Join us on 11th February to discover why user identity has become the new security perimeter and how identity plays a key role in any organisation’s security strategy.

Hear from Chris Parker MBE, an expert in international strategy and the delivery of modern high-risk operations who will provide a comprehensive update on current cybersecurity threats and the importance of implementing the correct identity security solutions. Chris will draw on his own experiences in planning large, complex operations both in the military and in the private sector.


Join us on Tuesday 11th February 2020 at The Victorian Bath House, London and discover the key to securing your complete identity strategy. Hear from Okta, Thycotic and Saviynt who will cover:

  • Identity Access: Adopting Zero Trust - Learn how to enable secure access for the various users regardless of their location, device or network and better secure Office 365 & Active Directory.

  • Privileged Access Management: Privileged accounts are pervasive and act as the “keys to the IT kingdom”. Discover how to strengthen privileged access management (PAM) practices to prevent breaches.

  • Identity Governance: Ensure only the right people get entitlements to the right resources at the right time for the right reasons.

 

Who should attend?
This event is for IT professionals who are responsible for IT security within their organisation.

 

We hope you can join us at this beautiful venue hidden beneath the streets of Bishopsgate to gain a deeper understanding of how solve business challenges around identity and map out the next steps to success.

 

Please register for this event using the form below.




Book your place today

11
Feb

The Victorian Bath House

Tuesday 11th February
9:00am - 2:00pm
7-8 Bishopsgate. London. EC2M 3TJ

Agenda

  • 09:00    Registrations and breakfast
  • 09:30    Bytes Welcome and Intro
  • 09:45    Identity is the New Perimeter
  • 10:30    The Importance of Identity Governance and Administration
  • 11:15    Break  
  • 11:35    Privileged Access Management Uncovered
  • 12:30    Identity and Access Management: Adopting a Zero Trust Approach
  • 13:15    Bytes Security Services          
  • 13:30    Lunch and networking

Speakers:

chris parker.jpg

Chris Parker MBE MA CMgr FICM
Founding Director, Cyberplus Ltd.

Joseph Carson - Thycotic.png

Joseph Carson
Chief Security Scientist & Advisory CISO, Thycotic

DVolere HeadShot Saviynt.jpg

Diana Volere, CISSP, CCSP
Chief Evangelist / Director of Product Marketing
Saviynt

Register for the Using Identity to Shape Cyber Security event here:

By submitting your information, we will use it to communicate with you regarding this event and our other events, webinars and services. For further detail, please read our privacy policy.

Want a Quote? Just tell us what you need

Email Call

Need Advice? We can help with your next project

Email Call

Email Call