From control to confidence in the age of AI
AI wordt steeds autonomer en verandert daarmee fundamenteel hoe we digitale identiteiten beheren: IAM verschuift van controle naar het bouwen van vertrouwen tussen humans, machines en algorithms. Tegelijkertijd bestrijkt IAM een veel breder domein van data-driven IAM, PBAC en modern PAM tot CIAM, digital wallets, non-human identities, supply-chain governance en identity-centric risk & compliance.
IAM 2026 brengt al deze ontwikkelingen samen in één toekomstgericht programma.
Mis het niet: wees op 2 juni aanwezig en ontmoet de vakgenoten, experts en innovators die het IAM-landschap van morgen vormgeven.
Enkele sprekers voor deze editie
Meike de Jong
Dagvoorzitter van RTL Nederland B.V.
Ulrik Skadhauge Jensen
IAM - Senior Engineering Manager - The LEGO Group
Anouk Smits
Teamleider ICT en Product Owner van DSW Zorgverzekeraar
IAM word mede mogelijk gemaakt door
Laatste nieuws
Blijf op de hoogte
Whitepaper: Whitepaper: Cidaas Auth Manager
In today's digital landscape, it is critical for every organization to have an agile and modern Identity and Access Management (IAM) solution. By providing complete visibility into who accesses what, when and how, modern IAM platforms enable organizations to better manage and mitigate risk. Cidaas offers an IAM platform that is based on a microservices [...]
Lees verder
Whitepaper: Whitepaper: Customer Identity and Access Management – CIAM
This report provides an overview of the Customer Identity and Access Management (CIAM) market and a compass to help you find a solution that best meets your organization’s needs. It examines solutions that allow users to register, associate device and other digital identities, authenticate, authorize, collect, and store information about consumers from across many domains [...]
Lees verder
Whitepaper: Cidaas access management
Identity and Access Management (IAM) solutions are foundational for securing enterprise IT environments. For workforce scenarios, IAM solutions commonly need to be able to provide identity verification at onboarding, user management, identity lifecycle management, device management, strong authentication, secure access controls, access recertifications, adaptive risk assessments, and integration with other Identity Provider (IdP) services. These [...]
Lees verder


