{"id":4917,"date":"2019-12-09T21:50:59","date_gmt":"2019-12-09T21:50:59","guid":{"rendered":"https:\/\/heliview.be\/data-driven-business\/?page_id=4917"},"modified":"2024-10-21T08:44:51","modified_gmt":"2024-10-21T08:44:51","slug":"programme","status":"publish","type":"page","link":"https:\/\/heliview.com\/digital-identity-trust-belgium\/programme\/","title":{"rendered":"Programme"},"content":{"rendered":"
[vc_row css=”.vc_custom_1576017595207{padding-top: 30px !important;}”][vc_column][vc_row_inner][vc_column_inner]
\r\n

<\/h2>\r\n

YOUR GUIDE IN TRUST SERVICES, DIGITAL IDENTITIES, ACCESS MANAGEMENT AND API SECURITY<\/h3> \r\n <\/div>[vc_column_text css=””]The Digital Identity & Trust Conference 2024 promises an exceptional program that brings together Europe’s leading experts in security standards with compelling local stories from Belgium. This year’s event offers a unique blend of top-tier European speakers, including pioneers like Daniel Fett and Torsten Loddersted, alongside influential Belgian voices, making it an unmissable opportunity for professionals seeking to deepen their understanding of digital identity and trust. Attendees will gain invaluable insights into the latest trends, challenges, and innovations shaping the field, all within a dynamic and interactive setting tailored to the needs of the Belgian market.<\/strong>[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][vc_empty_space][\/vc_column][\/vc_row][vc_row el_class=”custom-programma”][vc_column][vc_tta_tabs style=”outline” active_section=”1″][vc_tta_section title=”Program overview” tab_id=”1728990114222-19d73e1c-ee53″][vc_single_image image=”6279″ img_size=”” css=””][\/vc_tta_section][vc_tta_section title=”Full programme” tab_id=”1721646502021-ce55c565-2e25″][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n
\r\n
\r\n \r\n \"Erik\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/i><\/a> <\/div>\r\n
\r\n

Erik R. van Zuuren<\/a><\/h3>\r\n

CHAIRMAN OF THE CONFERENCE<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

Opening by chairman of the day<\/h2>\r\n

Erik van Zuuren, Chair of TrustCore<\/h3> \r\n <\/div>[vc_column_text css=””]\n
\n

Chairman of the day Erik van Zuuren will open the programma and walk you trough what the day will bring.<\/p>\n<\/div>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_btn title=”9:30 – 9:45″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n

\r\n
\r\n \r\n \"Michiel\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/i><\/a> <\/div>\r\n
\r\n

Michiel Van Cauwenberge<\/a><\/h3>\r\n

Product Manager ACM-IDM-VMS, Digitaal Vlaanderen<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n \r\n\r\n
\r\n
\r\n \r\n \"Wim\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/div>\r\n
\r\n

Wim Martens<\/a><\/h3>\r\n

Strategiebeheerder ICT of Digitaal Vlaanderen<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

Unlocking Identity and Access Management at Monumental Scale<\/h2>\r\n

Michiel Van Cauwenberge | Product Manager ACM-IDM-VMS & Wim Martens | Strategy Manager ICT | Digitaal Vlaanderen<\/h3> \r\n <\/div>[vc_column_text css=””]In this session, we will delve into the intricate world of identity and access management (IAM), and, more specifically, how identity and access management systems can be leveraged within large organisations to cater to millions of users. The point of focus of this session will be two security building blocks from the Digitalization Agency of the Flemish Government: the Flemish Access Management System (ACM) and the Flemish Identity Management System (IDM). How has the Flemish Government managed to integrate over 2.000 applications with these building blocks and how do we manage to successfully authenticate over 15 million users every single month? Furthermore, how have we managed to achieve this feat within the well-known constraints of the public sector, i.e. with a small, dedicated team and limited resources? Join us as we uncover the origins, history and evolution of our building blocks, along with the various challenges we encountered along the way.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”6015″ img_size=”” css=””][vc_btn title=”9:45 – 10:10″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n
\r\n
\r\n \r\n \"Tom\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/div>\r\n
\r\n

Tom Bruggeman<\/a><\/h3>\r\n

Area Manager, DPG Media<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

Lessons learned with respect to API access authorization<\/h2>\r\n

Tom Bruggeman, Area Manager, DPG Media<\/h3> \r\n <\/div>[vc_column_text css=””]As an international media company we\u2019ve been dealing with rapid digital transformation for a bunch of years now. One of the cornerstones of our strategy is authorization management in order to control access to our customer identity services for millions of users and customers. Over the last 6 years we\u2019ve gone through many iterations of our customer identity authorization management platform; from a fully managed SaaS platform to our own custom-built solution. In this talk we\u2019ll share our journey with you and highlight some of the challenges we\u2019ve faced, how we\u2019ve dealt with them and why we believe our homegrown platform has been the right choice for our company.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”6119″ img_size=”” css=””][vc_btn title=”10:10 – 10:35″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″][vc_single_image image=”6247″ img_size=”” css=””][\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

Coffee Break with In-Person Meetings<\/h2>\r\n

<\/h3> \r\n <\/div>[vc_column_text css=””]At the network plaza you can meet the partners of this conference while enjoying a cup of coffee or tea. In-person meetings also take place here.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_btn title=”10:40 – 11:10″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n
\r\n
\r\n \r\n \"Jochen\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/i><\/a> <\/div>\r\n
\r\n

Jochen Raymaekers<\/a><\/h3>\r\n

Principal Solution Architect, Ping Identity<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

Transitioning to Decentralized Identity<\/h2>\r\n

Jochen Raymaekers, Principal Solution Architect, Ping Identity<\/h3> \r\n <\/div>[vc_column_text css=””]In a world increasingly plagued by data breaches and identity theft, giving users\u2014including employees and customers\u2014the power to independently manage and share their personal information is transforming the landscape of identity management.<\/p>\n

Join us to delve into the principles of decentralized identity, where we will:
\nEnable users to securely manage and control their personal data, make anonymous identity claims without unnecessary exposure, and selectively authorize data access based on necessity.
\nDecrease vulnerabilities and reduce the risk of breaches associated with centralized systems, thereby enhancing organizational privacy and security.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”5983″ img_size=”” css=””][vc_btn title=”11:15 – 11:40″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n

\r\n
\r\n \r\n \"Kurt\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/i><\/a> <\/div>\r\n
\r\n

Kurt Berghs<\/a><\/h3>\r\n

VP Product Management of TrustBuilder Corporation N.V.<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

How to Successfully Manage Access for External Identities<\/h2>\r\n

Kurt Berghs, VP Product Management, TrustBuilder Corporation N.V.<\/h3> \r\n <\/div>[vc_column_text css=””]Dive into practical examples of using advanced access control and identity management for external users. External users go beyond the extended enterprise and cover employees of customers, outsourcers, suppliers, distributors, brokers, and business partners as well as consumers. Learn how managing user lifecycles in an intuitive way streamlines access governance, and improves user experience. This session, aimed at CIOs and Product Managers, shows how to balance policy-based IAM with dynamic, business-focused CIAM.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”6110″ img_size=”” css=””][vc_btn title=”11:15 – 11:40″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n
\r\n
\r\n \r\n \"Matt\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/i><\/a> <\/div>\r\n
\r\n

Matt Sturman<\/a><\/h3>\r\n

Sr Solutions Engineer at BeyondTrust<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

Hackers don\u2019t Hack In \u2013 They Log In. How to Combat the threat of Credential Theft<\/h2>\r\n

Matt Sturman, Sr Solutions Engineer of BeyondTrust<\/h3> \r\n <\/div>[vc_column_text css=””]The world of cyber security is changing, with more dynamic highly connected systems than ever. With an explosion of apps, accounts and access, the battleground has shifted from traditional perimeter and endpoint security into the world of identity security, effectively meaning the hacker has been replaced by the credentials thief.<\/p>\n

With Identity compromise common to almost every cyber-attack, distinguishing between how a legitimate user is leveraging an identity and the misuse of that identity by an unauthorized user is difficult. This leaves the door open for threat actors to use impersonated identities to access resources, compromise systems, move laterally and achieve their illicit objectives. Today this is effectively making identity the new security perimeter.<\/p>\n

Join this discussion as Matt shares what is driving this paradigm shift, and how attackers are successfully exploiting the gaps in visibility between IAM and security tools.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”6082″ img_size=”” css=””][vc_btn title=”11:45 – 12:10″ i_icon_fontawesome=”far fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n

\r\n
\r\n \r\n \"Alan\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/i><\/a> <\/div>\r\n
\r\n

Alan Radford<\/a><\/h3>\r\n

Field Strategist EMEA, One Identity Software Netherlands<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

Achieving NIS 2 Compliance: Key Identity Security Strategies<\/h2>\r\n

Alan Radford, Field Strategist EMEA, One Identity Software Netherlands<\/h3> \r\n <\/div>[vc_column_text css=””]The updated Network and Information Systems (NIS 2) directive demands stringent cybersecurity measures. This session will focus on practical strategies for achieving NIS 2 compliance through a unified identity security approach.<\/p>\n

What you will learn:<\/p>\n