In an increasingly mobile world, a security transformation is taking place, with identity and access management and identity governance at its heart. At our Digital Identity and Cybersecurity Technical Forum in New York City on May 11th, you’ll learn how identity is the key to today’s new approaches to cybersecurity.
A Learning and Networking Event
You’ll hear about the best business and technical approaches to cybersecurity. You’ll get practical tips on how you can improve your security status right now and keep your data secure. And you’ll find out what other organizations are doing to improve security and streamline identity management.
Join us at our Forum at Microsoft’s HQ in New York for insightful presentations from expert speakers, great discussions, networking, and more. This event is perfect for IT Directors/Managers, CSO/CISO staff and members of IT teams.
More about the sessions (and more info coming SOON!)
Overview of the Security Transformation
With the breakdown of the traditional perimeter, the ubiquity of machine learning and massive signal collection have enabled an identity-centric approach to security. The use of modern approaches to security, based on these signals and machine learning, enhances existing security approaches, transforming an organization’s ability to respond to the changing attack landscape. In this session, James Cowling will discuss how this security transformation is affecting businesses.
Key Features of Microsoft Identity Manager and Azure AD Connect
Combining emerging cloud technologies with existing on premise investments can be daunting challenge! A hybrid approach is a good fit for many with extensive on premise systems and a desire to utilize cloud technologies to enable business objectives. This session will cover Microsoft Identity Manager, Azure AD as a cloud identity control plane, and features of Azure AD Connect.
A look at an end-to-end security solution and what you can do to improve your security posture
In this session, we will discuss the advantages of dynamic security approaches, and show how Microsoft’s platform provides a range of such dynamic approaches across the enterprise landscape – from Mobile Device to Workstation to Server, from data at rest to data in Transit.