{"id":8203,"date":"2025-12-08T15:17:44","date_gmt":"2025-12-08T13:17:44","guid":{"rendered":"https:\/\/heliview.com\/identity-access-management\/?page_id=8203"},"modified":"2026-04-10T16:07:01","modified_gmt":"2026-04-10T14:07:01","slug":"programma","status":"publish","type":"page","link":"https:\/\/heliview.com\/identity-access-management\/programma\/","title":{"rendered":"Programma"},"content":{"rendered":"<div class=\"wpb-content-wrapper\">[vc_row][vc_column][vc_empty_space][vc_row_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\"><\/h2>\r\n                    <h3 class=\"subheading\">Programma #IAM2026<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Met onderwerpen zoals Policy Based Access \u2013 PBAC, Modern PAM\/ Secret Management, IGA Tranformations, iAAA = identification, authentication, authorization, Decentralized Identities (eIDAS), CIAM\/B2B\/B2C, Non-Human Identities, AI in IAM in practice, Data Access Governance, Cloud Infrastructure Entitlement Management \u2013 CIEM.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;custom-programma&#8221;][vc_column][vc_empty_space height=&#8221;64px&#8221;][vc_tta_tabs style=&#8221;outline&#8221; active_section=&#8221;1&#8243;][vc_tta_section title=&#8221;Programma&#8221; tab_id=&#8221;1744187490395-c983b1ed-3b50&#8243;][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;8438&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Ontvangst &amp; Registratie<\/h2>\r\n                    <h3 class=\"subheading\"><\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]\n<div class=\"flex flex-col text-sm pb-25\">\n<article class=\"text-token-text-primary w-full focus:outline-none [--shadow-height:45px] has-data-writing-block:pointer-events-none has-data-writing-block:-mt-(--shadow-height) has-data-writing-block:pt-(--shadow-height) [&amp;:has([data-writing-block])&gt;*]:pointer-events-auto scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]\" dir=\"auto\" data-turn-id=\"request-WEB:196b612b-438a-448e-8e2d-5a00d960c997-3\" data-testid=\"conversation-turn-8\" data-scroll-anchor=\"true\" data-turn=\"assistant\">\n<div class=\"text-base my-auto mx-auto pb-10 [--thread-content-margin:--spacing(4)] @w-sm\/main:[--thread-content-margin:--spacing(6)] @w-lg\/main:[--thread-content-margin:--spacing(16)] px-(--thread-content-margin)\">\n<div class=\"[--thread-content-max-width:40rem] @w-lg\/main:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group\/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn\">\n<div class=\"flex max-w-full flex-col grow\">\n<div class=\"min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal [.text-message+&amp;]:mt-1\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"217feaea-4059-43e4-9969-e487dccf9541\" data-message-model-slug=\"gpt-5-2\">\n<div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[1px]\">\n<div class=\"markdown prose dark:prose-invert w-full wrap-break-word dark markdown-new-styling\">\n<p data-start=\"0\" data-end=\"107\" data-is-last-node=\"\" data-is-only-node=\"\">Het Heliview-team heet je van harte welkom in het <strong data-start=\"50\" data-end=\"106\">Postillion Hotel &amp; Convention Centre Utrecht, Bunnik<\/strong>.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"z-0 flex min-h-[46px] justify-start\"><\/div>\n<div class=\"mt-3 w-full empty:hidden\">\n<div class=\"text-center\"><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/article>\n<\/div>\n<div class=\"pointer-events-none h-px w-px absolute bottom-0\" aria-hidden=\"true\" data-edge=\"true\"><\/div>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;8439&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;8:30&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/identity-access-management\/speaker\/meike-de-jong\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/identity-access-management\/wp-content\/uploads\/sites\/21\/2026\/03\/Meike-de-Jong.png\" alt=\"Meike de Jong\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/meikedejongmedia\/\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/identity-access-management\/speaker\/meike-de-jong\/\">Meike de Jong<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Dagvoorzitter van RTL Nederland B.V.<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Opening van de dagvoorzitter<\/h2>\r\n                    <h3 class=\"subheading\">Meike de Jong, Dagvoorzitter van RTL Nederland B.V.<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Dagvoorzitter Meike de Jong zal de 21e editie van het Identity &amp; Access Management congres inluiden.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;8420&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/identity-access-management\/speaker\/ulrik-skadhauge-jensen\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/identity-access-management\/wp-content\/uploads\/sites\/21\/2025\/12\/Ulrik-Skadhauge-Jesen.png\" alt=\"Ulrik Skadhauge Jensen\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/ulrik-skadhauge-jensen\/\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/identity-access-management\/speaker\/ulrik-skadhauge-jensen\/\">Ulrik Skadhauge Jensen<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">IAM - Senior Engineering Manager - The LEGO Group<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">The LEGO\u00ae Group&#039;s PBAC Journey Brick by Brick<\/h2>\r\n                    <h3 class=\"subheading\">Ulrik Skadhauge Jensen, Lead Engineer IAM van The LEGO Group<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]As our business evolves, so does our approach to permissions. Moving beyond traditional RBAC for data governance, the LEGO\u00ae\u00a0Group is adopting a strategy where access is determined by a user&#8217;s relationship to the data and their specific role. Ulrik Skadhauge Jensen,\u00a0Lead Engineer IAM, will present the necessary changes for the IAM platform and the applications in scope, plus highlight areas where full PBAC implementation remains a challenge.<\/p>\n<p>This keynote provides an insight into the journey and transformational process within the LEGO\u00ae Group.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;8187&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_id=&#8221;aholdsessie&#8221;][vc_column_inner width=&#8221;1\/6&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/identity-access-management\/speaker\/vikash-singh-2\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/identity-access-management\/wp-content\/uploads\/sites\/21\/2026\/02\/Vikash-Singh.png\" alt=\"Vikash Singh\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"http:\/\/www.linkedin.com\/in\/vikasshh%20\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/identity-access-management\/speaker\/vikash-singh-2\/\">Vikash Singh<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Global Director IAM Platform Engineering & Experience van Ahold Delhaize<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Beyond the Hype: Mastering IAM Fundamentals in an Era of Innovation<\/h2>\r\n                    <h3 class=\"subheading\">Vikash Singh, Global Director IAM Platform Engineering &amp; Experience van Ahold Delhaize<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]In an age dominated by buzzwords like Zero Trust, AI-driven security, and passwordless authentication, it\u2019s easy to lose sight of the basics that truly keep identities secure. Beyond the Hype is a practical, no-nonsense exploration of Identity and Access Management (IAM) fundamentals that remain critical even as technology rapidly evolves.<\/p>\n<p>This session revisits the core building blocks of IAM: identities, authentication, authorization, lifecycle management, and governance. It highlights that real security often comes from doing the \u201cboring\u201d work well repeatable processes, disciplined execution, and operational hygiene rather than large budgets or constant reinvention. Through real-world enterprise examples, the talk shows how innovation should strengthen, not distract from, these foundations.<\/p>\n<p>Whether modernizing legacy systems or adopting next-gen IAM platforms, attendees will learn how mastering the fundamentals builds trust, reduces risk, and creates IAM programs that scale reliably and sustainably.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;8380&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/identity-access-management\/speaker\/marcin-kucharski\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/identity-access-management\/wp-content\/uploads\/sites\/21\/2026\/03\/Marcin-Kucharski.png\" alt=\"Marcin Kucharski\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"http:\/\/www.linkedin.com\/in\/marcin-kucharski-5ba2123%20\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/identity-access-management\/speaker\/marcin-kucharski\/\">Marcin Kucharski<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Solutions Engineer van BeyondTrust<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Breakout sessie: Beyond Privilege: Modern PAM for a Dynamic, Fragmented Digital World<\/h2>\r\n                    <h3 class=\"subheading\">Marcin Kucharski, Solutions Engineer van BeyondTrust<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Despite growing budgets and tighter compliance mandates, cyber risk continues to rise. Identities remain a prime target, with attackers exploiting hidden Paths to Privilege\u2122 to gain access. Managing elevated permissions across hybrid environments is complex, and traditional Privileged Access Management (PAM) tools \u2013 focused solely on privileged accounts \u2013 leave dangerous gaps. This session explores how modern, identity\u2011centric PAM reduces risk, streamlines access, and secures all credentials \u2013 human, machine, and agentic AI.<\/p>\n<p>We\u2019ll also touch on how emerging AI capabilities can augment how you discover, govern, and respond to threats \u2013 so your organization stays both protected and productive in an ever\u2011changing landscape.<\/p>\n<p>&nbsp;<\/p>\n<p>Takeaways:<\/p>\n<ul class=\"checklist\">\n<li>Identify blind spots created by legacy PAM solutions that focus only on privileged accounts<\/li>\n<li>Improve visibility &amp; governance over elevated permissions across hybrid &amp; multi-cloud environments<\/li>\n<li>How identity-focused PAM secures privileges across human, machine, and agentic AI identities.<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;7510&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/identity-access-management\/speaker\/sadrick-widmann\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/identity-access-management\/wp-content\/uploads\/sites\/21\/2026\/01\/Sadrick-Widmann.png\" alt=\"Sadrick Widmann\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/sadrickwidmann\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/identity-access-management\/speaker\/sadrick-widmann\/\">Sadrick Widmann<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">CEO van Cidaas by Widas ID<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Identity Management: The European love story you didn\u2019t know you needed<\/h2>\r\n                    <h3 class=\"subheading\">Sadrick Widmann, CEO van Cidaas by Widas ID<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Every great love story has a twist \u2014 and in Europe\u2019s pursuit of digital sovereignty, the unexpected hero is Identity &amp; Access Management (IAM). Sovereignty isn\u2019t just about data location or control; it\u2019s about who defines trust in your digital ecosystem. While companies focus on features, scalability, and UX, they often overlook the heart of it all: identity. This session explores why IAM is not just a tool but the foundation of security, trust, and resilience. In the era of digital sovereignty, IAM becomes the beating heart of innovation \u2014 and the start of a true digital love story.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;8241&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/identity-access-management\/speaker\/george-pay\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/identity-access-management\/wp-content\/uploads\/sites\/21\/2026\/04\/George-Pay.png\" alt=\"George Pay\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/identity-access-management\/speaker\/george-pay\/\">George Pay<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Strategic Account Executive - PAM EMEA van Saviynt<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Break-out sessie: AI Is Changing Security. Why PAM Matters More Than Ever<\/h2>\r\n                    <h3 class=\"subheading\">George Pay, Strategic Account Executive - PAM EMEA van Saviynt<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Privileged Access Management (PAM) is undergoing a major shift as organizations adopt AI, automate workflows, and face an explosion of non-human identities across cloud environments. Traditional PAM tools were designed for human users and static privilege models, leaving critical gaps that attackers increasingly exploit.<\/p>\n<p>In this session we explore the new reality of privileged access, how AI is reshaping risk, and why organizations must rethink their PAM strategy. We\u2019ll share Saviynt\u2019s latest analyst recognition, including highlights from the Gartner Magic Quadrant, and walk through how Saviynt is redefining PAM to secure both human and non-human privileges in the AI era.<\/p>\n<p>Whether you\u2019re leading identity, cloud, or security initiatives, this session will help you understand where PAM is heading and how Saviynt can strengthen your organization\u2019s privileged access strategy.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;8374&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/identity-access-management\/speaker\/stefan-malovic\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/identity-access-management\/wp-content\/uploads\/sites\/21\/2026\/02\/Stafan-MalovicMolendijk.png\" alt=\"Stefan Malovic\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/stefan-malovic-a3b23a63\/\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/identity-access-management\/speaker\/stefan-malovic\/\">Stefan Malovic<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Enterprise Customer Success Manager bij OKTA Identity Netherlands<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Break-out sessie: Beyond the Bot: Securing Identity in the Agentic Enterprise<\/h2>\r\n                    <h3 class=\"subheading\">Stefan Malovic, Enterprise Customer Success Manager van Okta Identity Netherlands<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Abstract of presentation: As organizations transition from simple chatbots to autonomous AI agents, the traditional security perimeter is shifting. These agentic systems often operate with high levels of access and minimal oversight, creating a new frontier of risk known as Shadow AI.<\/p>\n<p>This session explores how to bring these autonomous actors under a unified identity control plane. We will discuss practical strategies for discovering unmanaged agents, assigning human owners, enforcing least-privilege permissions, and maintaining auditability.<\/p>\n<p>Attendees will learn how to effectively govern their agentic workforce while enabling the next wave of AI-driven innovation.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;8497&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/identity-access-management\/speaker\/stefan-matena-2\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/identity-access-management\/wp-content\/uploads\/sites\/21\/2026\/04\/Stefan-Matena.png\" alt=\"Stefan Matena\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/identity-access-management\/speaker\/stefan-matena-2\/\">Stefan Matena<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Product Owner HR & IAM van AS Watson Health & Beauty<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Break-out sessie: IAM op de winkelvloer: waarom \u2018even snel toegang regelen\u2019 geen optie meer is<\/h2>\r\n                    <h3 class=\"subheading\">Stefan Matena, Product Owner HR &amp; IAM van AS Watson Health &amp; Beauty<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Waarom \u2018even snel toegang regelen\u2019 geen optie meer is \u2014 en hoe centrale governance juist snelheid bracht.<br \/>\nIn retail is IAM geen IT-thema, maar een randvoorwaarde\u00a0om de winkels open te houden. Met meer dan 1.500 winkels, 35.000 medewerkers en grote aantallen joiners, movers en leavers heeft iedere keuze rond toegang direct impact op de winkelvloer. In deze sessie deel ik hoe we de koppeling tussen IAM en het kassasysteem hebben ingericht in een omgeving waar onboarding snel moet, de operatie niet stil mag vallen en uitzonderingen niet langer lokaal konden worden opgelost. Juist de stap naar centrale governance zorgde voor snellere onboarding, minder fouten en meer rust in de operatie.<\/p>\n<p>In deze sessie ontdek je:<\/p>\n<ul class=\"checklist\">\n<li>waarom IAM in retail direct raakt aan continu\u00efteit op de winkelvloer<\/li>\n<li>welke risico\u2019s ontstonden door lokale uitzonderingen en handmatig beheer<\/li>\n<li>hoe centrale governance in onze decentrale organisatie juist snelheid gebracht heeft<\/li>\n<li>welke keuzes we moesten maken om onboarding schaalbaar en beheersbaar te maken<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;8501&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/identity-access-management\/speaker\/edwin-grimminck\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/identity-access-management\/wp-content\/uploads\/sites\/21\/2026\/03\/Edwin-Grimminck.png\" alt=\"Edwin Grimminck\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/identity-access-management\/speaker\/edwin-grimminck\/\">Edwin Grimminck<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Identity Advisor van SailPoint<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Break-out sessie: Identity Security in the age of autonomous AI<\/h2>\r\n                    <h3 class=\"subheading\">Edwin Grimminck, Identity Advisor van SailPoint<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Autonomous AI is reshaping the digital landscape, but how do you ensure it operates responsibly? Learn how Identity Security serves as the control plane for managing AI agents, providing the visibility and governance needed to align AI with your business objectives.<\/p>\n<p>Key Take Aways from this session:<\/p>\n<ul class=\"checklist\">\n<li>Why privilege controls for all identities (human, machine and AI) will give you the upper hand<\/li>\n<li>Understanding the role of Identity Security in AI governance<\/li>\n<li>Achieving visibility and control over AI agents<\/li>\n<li>Aligning autonomous AI with business goals<\/li>\n<\/ul>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;7071&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_id=&#8221;dsw&#8221;][vc_column_inner width=&#8221;1\/6&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/identity-access-management\/speaker\/anouk-smits\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/identity-access-management\/wp-content\/uploads\/sites\/21\/2025\/12\/Anouk-Smits.png\" alt=\"Anouk Smits\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/anouksmits\/?locale=nl_NL\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/identity-access-management\/speaker\/anouk-smits\/\">Anouk Smits<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Teamleider ICT en Product Owner van DSW Zorgverzekeraar<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">DSW&#039;s IAM-reis \u2013 Architectuurkeuzes gedreven door een unieke ICT-filosofie<\/h2>\r\n                    <h3 class=\"subheading\">Anouk Smits, Teamleider ICT en Product Owner van DSW Zorgverzekeraar<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]In een IAM-landschap dat wordt gedomineerd door marktoplossingen, koos DSW Zorgverzekeraar voor de ongebruikelijke weg van volledige in-house ontwikkeling van haar Identity &amp; Access Management applicatie. Een logische en passende architectonische stap, gedreven door een fundamenteel andere en zeer specifieke interne ICT-filosofie: alles in eigen beheer. Dit leidt tot een unieke interne aanpak, waarbij de IT-organisatie niet alleen strategisch, maar ook architectonisch diep verankerd is in de bedrijfsvoering.<\/p>\n<p>Anouk Smits deelt het verhaal achter deze strategische beslissing. Zij legt uit hoe de visie op interne ICT-bouw de enige basis was voor de realisatie van hun eigen IAM en hoe dit hen volledige regie geeft over hun digitale identiteitslandschap.<\/p>\n<p>Laat u inspireren en ontdek hoe u, door vast te houden aan een heldere interne visie, de optimale technologische beslissing voor uw unieke omgeving kunt nemen.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;8407&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_id=&#8221;postnlsessie&#8221;][vc_column_inner width=&#8221;1\/6&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/identity-access-management\/speaker\/jaap-pol\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/identity-access-management\/wp-content\/uploads\/sites\/21\/2026\/01\/Jaap-Pol.png\" alt=\"Jaap Pol\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/identity-access-management\/speaker\/jaap-pol\/\">Jaap Pol<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">IAM-solution consultant IAM & Tech lead IDS van PostNL<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Asset Management als sleutel tot schaalbaar IAM<\/h2>\r\n                    <h3 class=\"subheading\">IAM-solution consultant IAM &amp; Tech lead IDS van PostNL<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]Zonder goed asset management komt IAM niet verder. Toegangsrechten zijn alleen beheersbaar als duidelijk is welke applicaties er zijn, waar ze geregistreerd staan en wie eigenaar is.<\/p>\n<p>In deze interactieve IAM Caf\u00e9-sessie deelt PostNL hoe asset management, CMDB en ownership zijn ingericht als fundament onder IAM.<\/p>\n<p>Jaap Pol laat zien waarom applicatie-eigenaarschap cruciaal is voor het automatiseren van JML-processen, autorisaties en onboarding van nieuwe applicaties in een volledig cloud-geori\u00ebnteerd landschap.<\/p>\n<p>De sessie is nadrukkelijk bedoeld voor uitwisseling met vakgenoten: hoe pak je dit aan, waar lopen organisaties vast en welke keuzes zijn bepalend om IAM schaalbaar en audit-proof te maken.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;8351&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/identity-access-management\/speaker\/diederik-lemkes\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/identity-access-management\/wp-content\/uploads\/sites\/21\/2026\/02\/Diederik-Lemkes.png\" alt=\"Diederik Lemkes\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                <a class=\"sp-in\" target=\"_blank\" href=\"https:\/\/www.linkedin.com\/in\/diederik-jan-lemkes-aba8952a\/\"><i class=\"fa fa-linkedin\"><\/i><\/a>                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/identity-access-management\/speaker\/diederik-lemkes\/\">Diederik Lemkes<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Product Manager IAM van Rabobank<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Break-out sessie: Rabobank&#039;s Journey to Machine Identity Governance and Agentic AI<\/h2>\r\n                    <h3 class=\"subheading\">Diederik Lemkes, Product Manager IAM van Rabobank<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]\n<div class=\"mt-5px font-italic paragraph-without-bottom\">\n<p>Like most enterprises today, Rabobank faces a growing challenge in governing machine identities driven by their volume, variety, and velocity. In this session, we&#8217;ll walk you through our journey of bootstrapping an IGA solution for machines, covering both the technical implementation and the organizational change required to make it work.<\/p>\n<p>We&#8217;ll also look ahead at how we&#8217;re preparing for the newest non-human identity on the block: AI Agents.<\/p>\n<\/div>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;8416&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_id=&#8221;abnamrosessie&#8221;][vc_column_inner width=&#8221;1\/6&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/identity-access-management\/speaker\/priya-kesar\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/identity-access-management\/wp-content\/uploads\/sites\/21\/2026\/02\/Priya-Kesar.png\" alt=\"Priya Kesar\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/identity-access-management\/speaker\/priya-kesar\/\">Priya Kesar<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Domain Architect IAM van ABN Amro Bank<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Break-out sessie: Architecting Without a Clean Slate: Staying on Top of IAM in a World of Constant Change<\/h2>\r\n                    <h3 class=\"subheading\">Priya Kesar, Domain Architect IAM van ABN Amro Bank N.V.<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]\n<div class=\"mt-5px font-italic paragraph-without-bottom\">\n<p>IAM architecture in financial institutions evolves under continuous pressure: legacy systems remain critical while new technologies and expectations keep emerging. In this interactive session, we\u2019ll collectively explore how organizations stay on top of change without losing architectural coherence.<\/p>\n<p>The discussion will draw on participants\u2019 experiences to examine decision\u2011making approaches, architectural principles, and the practical value\u2014and limits\u2014of architecture frameworks.<\/p>\n<\/div>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;8445&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;]\r\n\r\n    <div class=\"lgx-single-speaker lgx-single-speaker-five \">\r\n        <figure>\r\n            <a class=\"profile-img\" href=\"https:\/\/heliview.com\/identity-access-management\/speaker\/danny-molendijk\/\">\r\n                <img decoding=\"async\" src=\"https:\/\/heliview.com\/identity-access-management\/wp-content\/uploads\/sites\/21\/2026\/02\/Danny-Molendijk.png\" alt=\"Danny Molendijk\"\/>\r\n            <\/a>\r\n\r\n            <figcaption>\r\n                <div class=\"social-group\">\r\n                                                                                                                                                            <\/div>\r\n                <div class=\"speaker-info\">\r\n                    <h3 class=\"title\"><a href=\"https:\/\/heliview.com\/identity-access-management\/speaker\/danny-molendijk\/\">Danny Molendijk<\/a><\/h3>\r\n                    <h4 class=\"subtitle\">Strategisch ICT Adviseur van Maaskoepel, Federatie van Woningcorporaties<\/h4>                <\/div>\r\n            <\/figcaption>\r\n        <\/figure>\r\n    <\/div>\r\n\r\n\r\n\r\n    [\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Van Inloggen naar Interactie: IAM in een Wereld van e-Wallets<\/h2>\r\n                    <h3 class=\"subheading\">Danny Molendijk, Strategisch ICT Adviseur van Maaskoepel, Federatie van Woningcorporaties<\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;]\n<div class=\"mt-5px font-italic paragraph-without-bottom\">\n<p>Identity &amp; Access Management staat aan de vooravond van een fundamentele verandering. Met de opkomst van e-wallets verschuift digitale identiteit steeds meer van systemen naar mensen. In plaats van inloggen op applicaties, ontstaan interacties waarin gebruikers per moment en met expliciete toestemming gegevens delen via hun wallet.<\/p>\n<p>Deze ontwikkeling heeft grote impact op de wereld van IAM, met name in interacties met overheidsdiensten waar vertrouwen, zorgvuldigheid en de menselijke maat centraal staan. Klassieke IAM-principes zoals accounts, sessies en rollen komen onder druk te staan en maken plaats voor een meer transactie- en attribuutgedreven benadering.<\/p>\n<p>In dit conversation caf\u00e9 verkennen we gezamenlijk:<\/p>\n<ul class=\"checklist\">\n<li>welke impact e-wallets hebben op IAM,<\/li>\n<li>wat dit betekent voor de toekomst van IAM,<\/li>\n<li>welke stappen organisaties nu al kunnen zetten om deze transitie mensgericht en beheerst vorm te geven.<\/li>\n<\/ul>\n<\/div>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;8448&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;8442&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Netwerkborrel<\/h2>\r\n                    <h3 class=\"subheading\"><\/h3>              \r\n              <\/div>[vc_column_text css=&#8221;&#8221;][\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;8439&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][vc_btn title=&#8221;16:30&#8243; css=&#8221;&#8221;][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;]<div class=\"lgx-heading  \" >\r\n                    <h2 class=\"heading\">Meer sessies komen binnenkort...<\/h2>\r\n                    <h3 class=\"subheading\">Wordt aangekondigd<\/h3>              \r\n              <\/div>[\/vc_column_inner][vc_column_inner width=&#8221;1\/6&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_tta_section][\/vc_tta_tabs][\/vc_column][\/vc_row]\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_empty_space][vc_row_inner][vc_column_inner width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;&#8221;]Met onderwerpen zoals Policy Based Access \u2013 PBAC, Modern PAM\/ Secret Management, IGA Tranformations, iAAA = identification, authentication, authorization, Decentralized Identities (eIDAS), CIAM\/B2B\/B2C, Non-Human Identities, AI in IAM in practice, Data Access Governance, Cloud Infrastructure Entitlement Management \u2013 CIEM.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/3&#8243;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8221;stretch_row&#8221; el_class=&#8221;custom-programma&#8221;][vc_column][vc_empty_space height=&#8221;64px&#8221;][vc_tta_tabs style=&#8221;outline&#8221; active_section=&#8221;1&#8243;][vc_tta_section title=&#8221;Programma&#8221; tab_id=&#8221;1744187490395-c983b1ed-3b50&#8243;][vc_row_inner][vc_column_inner width=&#8221;1\/6&#8243;][vc_single_image image=&#8221;8438&#8243; img_size=&#8221;&#8221; css=&#8221;&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;2\/3&#8243;][vc_column_text css=&#8221;&#8221;] [&hellip;]<\/p>\n","protected":false},"author":16,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-8203","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Bekijk het volledige programma | Identity &amp; Access Management<\/title>\r\n<meta name=\"description\" content=\"Bekijk het programma met alle diverse sessies over identiteitsbeheer, Access Control, Cloud en meer. Laat u informeren tijdens IAM.\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/heliview.com\/identity-access-management\/programma\/\" \/>\r\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Bekijk hier het programma\" \/>\r\n<meta property=\"og:description\" content=\"Bekijk het programma met alle diverse sessies over identiteitsbeheer, Access Control, Cloud en meer. Laat u informeren tijdens IAM.\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/heliview.com\/identity-access-management\/programma\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Identity &amp; Access Management\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/HeliviewCT\" \/>\r\n<meta property=\"article:modified_time\" content=\"2026-04-10T14:07:01+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/heliview.com\/identity-access-management\/wp-content\/uploads\/sites\/21\/2023\/01\/04822292-IAM_achtergrond-met-logo-en-tekst.png\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\r\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:image\" content=\"https:\/\/heliview.com\/identity-access-management\/wp-content\/uploads\/sites\/21\/2023\/01\/04822292-IAM_achtergrond-met-logo-en-tekst.png\" \/>\r\n<meta name=\"twitter:site\" content=\"@HeliviewConf\" \/>\r\n<meta name=\"twitter:label1\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data1\" content=\"14 minuten\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/heliview.com\/identity-access-management\/programma\/\",\"url\":\"https:\/\/heliview.com\/identity-access-management\/programma\/\",\"name\":\"Bekijk het volledige programma | Identity & Access Management\",\"isPartOf\":{\"@id\":\"https:\/\/heliview.com\/identity-access-management\/#website\"},\"datePublished\":\"2025-12-08T13:17:44+00:00\",\"dateModified\":\"2026-04-10T14:07:01+00:00\",\"description\":\"Bekijk het programma met alle diverse sessies over identiteitsbeheer, Access Control, Cloud en meer. Laat u informeren tijdens IAM.\",\"breadcrumb\":{\"@id\":\"https:\/\/heliview.com\/identity-access-management\/programma\/#breadcrumb\"},\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/heliview.com\/identity-access-management\/programma\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/heliview.com\/identity-access-management\/programma\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/heliview.com\/identity-access-management\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Programma\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/heliview.com\/identity-access-management\/#website\",\"url\":\"https:\/\/heliview.com\/identity-access-management\/\",\"name\":\"Identity &amp; Access Management\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/heliview.com\/identity-access-management\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bekijk het volledige programma | Identity & Access Management","description":"Bekijk het programma met alle diverse sessies over identiteitsbeheer, Access Control, Cloud en meer. Laat u informeren tijdens IAM.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/heliview.com\/identity-access-management\/programma\/","og_locale":"nl_NL","og_type":"article","og_title":"Bekijk hier het programma","og_description":"Bekijk het programma met alle diverse sessies over identiteitsbeheer, Access Control, Cloud en meer. Laat u informeren tijdens IAM.","og_url":"https:\/\/heliview.com\/identity-access-management\/programma\/","og_site_name":"Identity &amp; Access Management","article_publisher":"https:\/\/www.facebook.com\/HeliviewCT","article_modified_time":"2026-04-10T14:07:01+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/heliview.com\/identity-access-management\/wp-content\/uploads\/sites\/21\/2023\/01\/04822292-IAM_achtergrond-met-logo-en-tekst.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_image":"https:\/\/heliview.com\/identity-access-management\/wp-content\/uploads\/sites\/21\/2023\/01\/04822292-IAM_achtergrond-met-logo-en-tekst.png","twitter_site":"@HeliviewConf","twitter_misc":{"Geschatte leestijd":"14 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/heliview.com\/identity-access-management\/programma\/","url":"https:\/\/heliview.com\/identity-access-management\/programma\/","name":"Bekijk het volledige programma | Identity & Access Management","isPartOf":{"@id":"https:\/\/heliview.com\/identity-access-management\/#website"},"datePublished":"2025-12-08T13:17:44+00:00","dateModified":"2026-04-10T14:07:01+00:00","description":"Bekijk het programma met alle diverse sessies over identiteitsbeheer, Access Control, Cloud en meer. Laat u informeren tijdens IAM.","breadcrumb":{"@id":"https:\/\/heliview.com\/identity-access-management\/programma\/#breadcrumb"},"inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/heliview.com\/identity-access-management\/programma\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/heliview.com\/identity-access-management\/programma\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/heliview.com\/identity-access-management\/"},{"@type":"ListItem","position":2,"name":"Programma"}]},{"@type":"WebSite","@id":"https:\/\/heliview.com\/identity-access-management\/#website","url":"https:\/\/heliview.com\/identity-access-management\/","name":"Identity &amp; Access Management","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/heliview.com\/identity-access-management\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/heliview.com\/identity-access-management\/wp-json\/wp\/v2\/pages\/8203","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/heliview.com\/identity-access-management\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/heliview.com\/identity-access-management\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/heliview.com\/identity-access-management\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/heliview.com\/identity-access-management\/wp-json\/wp\/v2\/comments?post=8203"}],"version-history":[{"count":5,"href":"https:\/\/heliview.com\/identity-access-management\/wp-json\/wp\/v2\/pages\/8203\/revisions"}],"predecessor-version":[{"id":8522,"href":"https:\/\/heliview.com\/identity-access-management\/wp-json\/wp\/v2\/pages\/8203\/revisions\/8522"}],"wp:attachment":[{"href":"https:\/\/heliview.com\/identity-access-management\/wp-json\/wp\/v2\/media?parent=8203"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}