{"id":722,"date":"2018-09-11T08:23:05","date_gmt":"2018-09-11T06:23:05","guid":{"rendered":"http:\/\/logichunt.net\/demo\/wordpress\/emeet\/?page_id=722"},"modified":"2025-05-22T10:48:02","modified_gmt":"2025-05-22T08:48:02","slug":"programma-2025","status":"publish","type":"page","link":"https:\/\/heliview.com\/identity-access-management\/programma-2025\/","title":{"rendered":"Programma 2025"},"content":{"rendered":"
We are entering the age of agentic commerce, and that means we need identity, authentication and authorisation infrastructures for bots as well as for people: what might know your agent (KYA) look like in that world? What might the value network look like? Who can win in this new world of AI to AI transactions?<\/p>\n
David will cover 3 main points:<\/p>\n
David Birch, a globally recognized expert and author in digital identity, has written extensively about the role of identity in digital transactions. He will share his vision on these developments and bring you to new insights on the identity, authentication, and authorisation infrastructures needed in this emerging world.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”7905″ img_size=”” css=””][vc_btn title=”9:45 – 10:10″ color=”violet” i_icon_fontawesome=”fa fa-regular fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n
It\u2019s a continuing challenge for organizations to protect customers and systems from attacks and fraud while balancing customer experience. This session will discuss an approach to not only safeguard customers but also enhance their experience by providing secure, reliable, and frictionless interactions. We\u2019ll address how to strengthen the security of consumer data and accounts, protect against current and emerging internet-based threats, and ensure security right at the point of log-in. Importantly, having a secure and frictionless experience is crucial for customer retention, as it builds trust and loyalty.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”6798″ img_size=”” css=””][vc_btn title=”10:10 – 10:35″ color=”violet” i_icon_fontawesome=”fa fa-regular fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″][vc_single_image image=”6504″ img_size=”” css=””][\/vc_column_inner][vc_column_inner width=”2\/3″]
When authorisation becomes overly complex, it can create bottlenecks for product and engineering teams, slowing down development and innovation. But what if managing permissions didn\u2019t have to be such a challenge? Join this session to uncover the real-world hurdles of authorisation, explore strategies for streamlining access control, and gain expert insights into how fine-grained authorisation can help organisations strike the right balance between security and agility.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”7133″ img_size=”” css=””][vc_btn title=”11:20 – 11:45″ color=”violet” i_icon_fontawesome=”fa fa-regular fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n
Traditional Workforce and CIAM silos have left B2B and third-party identity management fragmented and vulnerable. With 98% of organisations connected to at least one breached third party, securing B2B interactions is critical. A Trust by Design approach enables a seamless, scalable B2B IAM framework that mitigates risk while ensuring trusted collaboration.<\/p>\n
This session demonstrates solutions for managing complex B2B relationships, including adaptive authentication, real-time fraud detection, lifecycle management, and orchestration across the entire B2B ecosystem.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”6642″ img_size=”” css=””][vc_btn title=”11:20 – 11:45″ color=”violet” i_icon_fontawesome=”fa fa-regular fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n
Hoe realiseren we een digitale dienstverlening van topkwaliteit die naadloos aansluit op de behoeften van onze klanten en partners? Een helder overzicht van wie toegang heeft tot onze digitale diensten en hoe die toegang wordt beheerd, is cruciaal voor een toekomstbestendige organisatie. Maar is het simpelweg vervangen van legacy-systemen door nieuwe tools voldoende?<\/p>\n
Tijdens een exclusieve ronde tafel sessie met ervaren vakgenoten duiken we in de uitdagingen en kansen rondom het moderniseren van (C)IAM-omgevingen. Hoe kun je ruimte cre\u00ebren binnen een bestaande infrastructuur om op een verantwoorde manier te vernieuwen, zonder de continu\u00efteit van de organisatie in gevaar te brengen? We bespreken hoe je niet alleen technologie, maar ook processen en visie kunt transformeren, zodat je (C)IAM \u00e9cht naar een hoger niveau tilt.\u00a0Deze sessie is d\u00e9 kans om inzichten te delen en samen met experts de ontbrekende puzzelstukken van modernisering te vinden.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”7745″ img_size=”” css=””][vc_btn title=”11:20 – 12:20″ color=”violet” i_icon_fontawesome=”fa fa-regular fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n
This roundtable session will provide a practitioner’s view to managing Non-Human Identity risks, from an industry veteran who has managed global NHI programs for over 25 years.\u00a0Lalit Choda founder of the Non-Human Identity Management Group, will talk about why this is probably the most complex and challenging technology risk exposure to address, given most organisations currently have little or no controls in place for managing NHIs, further complicated by Multi Hybrid Cloud, SaaS and On-Prem environments and the fact that NHIs typically outnumber human identities by a factor of 25x – 50x.\u00a0The session will cover the key risks around hard-coded credentials in source code, lack of inventory and ownership, stale\/inactive accounts, lack of credential cycling\/rotation, lack of environment segregation, sharing of credentials and humans inappropriately using NHIs.\u00a0Lalit will share real-life examples of how he dealt with over 100k NHIs, the pitfalls\/challenges, best practices, lessons learned and how to take a risk based approach.\u00a0Attendees will walk away with an appreciation of the risks and complexities of managing NHIs, why you need to tackle this risk now and how to take a risk based approach to tackling this ‘huge elephant in the room’.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”7971″ img_size=”” css=””][vc_btn title=”11:20 – 12:20″ color=”violet” i_icon_fontawesome=”fa fa-regular fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n
In een wereld waar technologie zich razendsnel ontwikkelt, staan organisaties voor de uitdaging om hun Identity and Access Management (IAM)-processen effici\u00ebnt en effectief te transformeren. Hoewel accelerators zoals tools en methodologie\u00ebn vaak worden gepresenteerd als de oplossing voor snelle resultaten, blijft de sleutel tot een duurzame en succesvolle transformatie hard en doordacht werken. In een interactieve sessie bespreken we de voordelen en beperkingen van accelerators om tot praktische handvatten te komen voor langdurig succes.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”7718″ img_size=”” css=””][vc_btn title=”11:20 – 12:20″ color=”violet” i_icon_fontawesome=”fa fa-regular fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n
Within IAM we seek to help ensure the right people have the right access at the right time for the right reasons. We used to be able to tackle this per application ensuring we managed silo\u2019s and the access therein. However in the modern world with clouds and platforms applications are no longer monolithic silo\u2019s but instead comprised of microservices, sprawling across a wide technical array\u2019s with pipelines, API gateways, repository\u2019s, IDP\u2019s and so much more. The traditional application has shifted from a technical monolith to a functional purpose. This session focuses on the practical steps we are taking at Rabobank to deal with this changing landscape to ensure we remain in control in future years.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”7556″ img_size=”” css=””][vc_btn title=”11:20 – 12:20″ color=”violet” i_icon_fontawesome=”fa fa-regular fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″][vc_single_image image=”7804″ img_size=”200x 200″ css=””][\/vc_column_inner][vc_column_inner width=”2\/3″]
Ontdekt onder begeleiding van een professionele gids de dieren van Ouwehands Dierenpark.<\/p>\n
Let op<\/strong>: Maximaal 15 mensen per tour. Mensen met een voorregistratie in Eventmanager krijgen voorrang.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_btn title=”11:20 – 12:20″ color=”violet” i_icon_fontawesome=”fa fa-regular fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n Vorige keer op Heliview hebben we verteld hoe belangrijk stakeholders zijn bij het slagen van je IAM project. In deze sessie gaan we daar op door. Dat IAM nooit succesvol kan zijn zonder te kijken naar de gebruikerskant en hoe we dit onderdeel moeten maken van het programma. Inclusief praktische tips rond onboarding, awareness en governance.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”8122″ img_size=”” css=””][vc_btn title=”11:55 – 12:20″ color=”violet” i_icon_fontawesome=”fa fa-regular fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n Despite compliance mandates, new technologies and ever increasing budgets, the risk of cyber-attack continues to increase. In this session we will take a look at the technology, structural and historic identity security challenges that lead organizations to be vulnerable to modern cyberthreats. We will explore how identities are at the heart of breaches and how attackers exploit paths to privilege to win. Finally looking at how modern approaches to Identity Security and Privilege Access Management can help you fight back.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”7174″ img_size=”” css=””][vc_btn title=”11:55 – 12:20″ color=”violet” i_icon_fontawesome=”fa fa-regular fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″][vc_single_image image=”6501″ img_size=”” css=””][\/vc_column_inner][vc_column_inner width=”2\/3″] Tijdens deze interactieve sessie gaat Nick in op:<\/p>\n De ronde tafel biedt een interactieve setting waarin je actief kunt deelnemen, je uitdagingen kunt delen en samen met vakgenoten praktische oplossingen kunt bespreken.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”7724″ img_size=”” css=””][vc_btn title=”13:40 – 14:40″ color=”violet” i_icon_fontawesome=”fa fa-regular fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n This roundtable session will provide a practitioner’s view to managing Non-Human Identity risks, from an industry veteran who has managed global NHI programs for over 25 years.\u00a0Lalit Choda founder of the Non-Human Identity Management Group, will talk about why this is probably the most complex and challenging technology risk exposure to address, given most organisations currently have little or no controls in place for managing NHIs, further complicated by Multi Hybrid Cloud, SaaS and On-Prem environments and the fact that NHIs typically outnumber human identities by a factor of 25x – 50x.\u00a0The session will cover the key risks around hard-coded credentials in source code, lack of inventory and ownership, stale\/inactive accounts, lack of credential cycling\/rotation, lack of environment segregation, sharing of credentials and humans inappropriately using NHIs.\u00a0Lalit will share real-life examples of how he dealt with over 100k NHIs, the pitfalls\/challenges, best practices, lessons learned and how to take a risk based approach.\u00a0Attendees will walk away with an appreciation of the risks and complexities of managing NHIs, why you need to tackle this risk now and how to take a risk based approach to tackling this ‘huge elephant in the room’.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”7971″ img_size=”” css=””][vc_btn title=”13:40 – 14:40″ color=”violet” i_icon_fontawesome=”fa fa-regular fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n eIDAS 2.0 verandert het landschap van digitale identiteiten drastisch, met belangrijke gevolgen \u00e9n kansen voor de manier waarop organisaties in Nederland omgaan met Identity & Access Management (IAM). Wat betekent deze nieuwe regelgeving voor jouw organisatie, en hoe kunnen we deze veranderingen benutten om sterker en innovatiever te worden? Tijdens dit interactieve rondetafelgesprek bespreekt Andr\u00e9 de Kok, werkzaam bij de Rijksdienst voor Identiteitsgegevens, de impact van eIDAS 2.0 en andere recente verordeningen specifiek voor de Nederlandse context.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”7732″ img_size=”” css=””][vc_btn title=”13:40 – 14:40″ color=”violet” i_icon_fontawesome=”fa fa-regular fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n Key Takeaways:<\/p>\n As the regulatory landscape tightens across the EU, organizations must adapt swiftly to meet the robust cybersecurity and operational resilience requirements of NIS2 and DORA. But compliance isn\u2019t a one-time fix, it\u2019s a continuous challenge.\r\n <\/a>\r\n\r\n
Jeroen Remie<\/a><\/h3>\r\n
Principal Consultant van Traxion<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
De menselijke kant van IAM: hoe gebruikersadoptie je security maakt of breekt<\/h2>\r\n
Jeroen Remie, Principal Consultant van Traxion<\/h3> \r\n <\/div>[vc_column_text css=””]\n
\r\n <\/a>\r\n\r\n
James Maude<\/a><\/h3>\r\n
Field CTO of BeyondTrust<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
Are we having an identity crisis?<\/h2>\r\n
James Maude, Field CTO van BeyondTrust<\/h3> \r\n <\/div>[vc_column_text css=””]\n
Lunchpauze met 1-op-1 gesprekken<\/h2>\r\n
<\/h3> \r\n <\/div>[\/vc_column_inner][vc_column_inner width=”1\/6″][vc_btn title=”12:25 – 13:35″ color=”violet” i_icon_fontawesome=”fa fa-regular fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n
\r\n <\/a>\r\n\r\n
Nick Baring<\/a><\/h3>\r\n
Lead IAM Engineer van PGGM N.V.<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
How to automate the hell out of your PAM<\/h2>\r\n
Nick Baring, Lead IAM Engineer van PGGM<\/h3> \r\n <\/div>[vc_column_text css=””]Met bijna een decennium ervaring in Identity & Access Management, deelt Nick Baring zijn inzichten en praktische tips over hoe je Privileged Access Management (PAM) effici\u00ebnter en veiliger kunt maken door slimme automatisering en de kracht van Identity Governance & Administration (IGA).<\/p>\n
\n
\r\n <\/a>\r\n\r\n
Lalit Choda<\/a><\/h3>\r\n
Founder & CEO van Non Human Identities Group<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
A Practitioners Guide to Managing Non-Human Identity Risks<\/h2>\r\n
Lalit Choda, Founder & CEO van Non Human Identities Group<\/h3> \r\n <\/div>[vc_column_text css=””]\n
\r\n <\/a>\r\n\r\n
Andr\u00e9 de Kok<\/a><\/h3>\r\n
Researcher & Stelsel Architect van Rijksdienst voor Identiteitsgegevens<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
eIDAS 2.0 in Nederland: Kansen en Impact op IAM<\/h2>\r\n
Andr\u00e9 de Kok, Researcher & Stelsel Architect van Rijksdienst voor Identiteitsgegevens<\/h3> \r\n <\/div>[vc_column_text css=””]\n
\r\n <\/a>\r\n\r\n
Ratan Shetty<\/a><\/h3>\r\n
Senior IAM Product Lead bij Odido<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
IGA Transformation Journey - Boosting Efficiency and Driving Continuous Compliance<\/h2>\r\n
Ratan Shetty, Senior IAM Product Lead van Odido<\/h3> \r\n <\/div>[vc_column_text css=””]In this session, Odido’s approach to modernizing Identity Governance and Administration (IGA) will be explored, highlighting key milestones and features like Joiner-Mover-Leaver (JML) management, Role-Based Access Control (RBAC), User Access Reviews, and SIEM integration. Discover how these enhancements boost efficiency and ensure continuous compliance, offering practical insights to strengthen your IGA processes and security posture.<\/p>\n
\n
\r\n <\/a>\r\n\r\n
Maurice Bijkerk<\/a><\/h3>\r\n
IAM Domein Architect, Royal Schiphol Group<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
All Aboard: Uw vlucht richting veilige digitale samenwerking met B2B partners is klaar voor vertrek<\/h2>\r\n
Maurice Bijkerk, IAM Domein Architect van Royal Schiphol Group<\/h3> \r\n <\/div>[vc_column_text css=””]Samenwerking met partners is essentieel voor veel organisaties, maar hoe richt je B2B Identity & Access Management (IAM) zo in dat het zowel veilig als bestendig is? In deze interactieve rondetafelsessie leidt Maurice Bijkerk, IAM Domein Architect bij Schiphol, het gesprek over de strategische en governance-aspecten van B2B IAM. We gaan in op vragen zoals:<\/p>\n
\n
\r\n <\/a>\r\n\r\n
Alan Radford<\/a><\/h3>\r\n
Technology Strategist van One Identity Software Netherlands B.V.<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
Tying up loose ends: Why a Strong Identity Fabric is required for NIS2 & DORA<\/h2>\r\n
Alan Radford, Technology Strategist van One Identity Software Netherlands B.V.<\/h3> \r\n <\/div>[vc_column_text css=””]\n
\nIn this session, we demystify both the Network and Information Security Directive (NIS2) and the Digital Operational Resilience Act (DORA), with a focus on the critical role of identity security. We\u2019ll explore how a strong, adaptable identity fabric is essential for today\u2019s regulatory demands while staying ready for what\u2019s next.
\nLearn how to future-proof your compliance posture in a constantly shifting threat and regulatory environment.<\/p>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″][vc_single_image image=”8081″ img_size=”” css=””][vc_btn title=”13:40 – 14:05″ color=”violet” i_icon_fontawesome=”fa fa-regular fa-clock” css=”” add_icon=”true”][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n