This one-day forum is free to attend, and places are limited, so register now!
- Hear about the latest approaches to cybersecurity from expert speakers.
- Get practical tips on what you can do right now to improve your security posture.
- Learn how other organizations are placing identity-driven security at the heart of their strategy.
- Network with speakers and other delegates.
- OCG Architect’s are available for one-on-one meetings during the forum. Pick an expert’s brain about any identity or security issues your organization faces, and walk away with ideas for solutions.
Who should attend?
If you are an IT Director or Manager, a CSO or CISO, or staff on an IT team, there’s something for you.
Where: 8 City Blvd, Suite 403, Nashville, TN, 37209
When: October 4, 2017 | 9:00am – 4:00pm
Lunch will be provided
Full details will be announced soon – here are is a sampling of the sessions you’ll see at the forum.
Identity, Access, Governance, and Security in a Hybrid Environment
Cloud technologies are here and they are enabling greater capabilities to productivity and collaboration. But which hybrid identity model is right for you? What are the security implications? How can you enable collaboration and consumer services? With the breakdown of the traditional perimeter, the ubiquity of machine learning, and massive signal collection have enabled an identity-centric approach to security. The use of modern approaches to governance and security, based on these signals and machine learning, enhances existing security approaches, transforming an organization’s ability to respond to the changing attack landscape. This session will explore common issues organizations face in securing and enabling their organization, and some paths forward.
Microsoft Identity & Security Strategies and Products
This session will cover the available technologies available for enterprise organizations to secure their business. Learn about Windows 10’s identity and security capabilities, Conditional Access, Mobile Device Security, Mobile Application Management, and more.
A Better Way to Identity & Data Governance and How to Get There
As insider threat management and cloud-first initiatives take center stage in organizations’ IT road map, identity has emerged as the new perimeter. However, organizations struggle to manage access to applications, remove the burden from helpdesks, and empower users to request access rights. With identity analytics, enterprises can leverage data about identities, access, and usage to derive actionable intelligence to improve various processes. In this boardroom discussion you’ll gain insight on how identity analytics can improve governance and efficiencies and reduce the attack surface for your enterprise.