{"id":8203,"date":"2025-12-08T15:17:44","date_gmt":"2025-12-08T13:17:44","guid":{"rendered":"https:\/\/heliview.com\/identity-access-management\/?page_id=8203"},"modified":"2026-05-01T10:38:40","modified_gmt":"2026-05-01T08:38:40","slug":"programma","status":"publish","type":"page","link":"https:\/\/heliview.com\/identity-access-management\/programma\/","title":{"rendered":"Programma"},"content":{"rendered":"
[vc_row][vc_column][vc_row_inner][vc_column_inner][vc_empty_space][vc_column_text css=””]Ontdek de toekomst van Identity & Access Management met thema\u2019s als PBAC<\/strong>, modern PAM & Secret Management<\/strong>, en IGA-transformaties<\/strong>. Van de basis van iAAA<\/strong> tot Decentralized Identities (eIDAS)<\/strong>, CIAM<\/strong> en Non-Human Identities<\/strong>. Daarnaast aandacht voor AI in IAM<\/strong>, Data Access Governance<\/strong> en grip op de cloud met CIEM<\/strong>. Alles wat je nodig hebt om samen met jouw vakgenoten voorop te blijven lopen.<\/p>\n

Bezoek het congres gratis!<\/strong><\/p>\n

Ben jij (mede)verantwoordelijk voor Identity & Acces Management, (AI-gedreven) Security en\/of Governance, Risk & Compliance binnen jouw organisatie? En sta je open voor drie korte 1-op-1 gesprekken op het netwerkplein? Dan kun je gratis deelnemen! Het congres is volledig verzorgd, inclusief lunch, parkeerticket, versnaperingen en een bruisende borrel.[\/vc_column_text]

\r\n \r\n Inschrijven<\/span><\/a>\r\n \r\n <\/div>[\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=”stretch_row” el_class=”custom-programma”][vc_column][vc_empty_space height=”64px”][vc_tta_tabs style=”outline” active_section=”1″][vc_tta_section title=”Programma” tab_id=”1744187490395-c983b1ed-3b50″][vc_row_inner][vc_column_inner width=”1\/6″ offset=”vc_hidden-xs”][vc_single_image image=”8438″ img_size=”” css=””][\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

Ontvangst & Registratie<\/h2>\r\n

<\/h3> \r\n <\/div>[vc_column_text css=””]\n
\n
\n
\n
\n
\n
\n
\n
\n

Het Heliview-team heet je van harte welkom in het Postillion Hotel & Convention Centre Utrecht, Bunnik<\/strong>.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n

<\/div>\n
\n
<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/article>\n<\/div>\n
<\/div>\n[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″ offset=”vc_hidden-xs”][vc_single_image image=”8439″ img_size=”” css=””][vc_btn title=”9.15 – 10.00″ css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n
\r\n
\r\n \r\n \"Meike\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/i><\/a> <\/div>\r\n
\r\n

Meike de Jong<\/a><\/h3>\r\n

Dagvoorzitter van RTL Nederland B.V.<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

Opening van de dagvoorzitter<\/h2>\r\n

Meike de Jong, Dagvoorzitter van RTL Nederland B.V.<\/h3> \r\n <\/div>[vc_column_text css=””]Dagvoorzitter Meike de Jong zal de 21e editie van het Identity & Access Management congres inluiden.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″ offset=”vc_hidden-xs”][vc_single_image image=”8420″ img_size=”” css=””][vc_btn title=”10.00 -10.10″ css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner el_id=”aholdsessie”][vc_column_inner width=”1\/6″]\r\n\r\n
\r\n
\r\n \r\n \"Vikash\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/i><\/a> <\/div>\r\n
\r\n

Vikash Singh<\/a><\/h3>\r\n

Global Director IAM Platform Engineering & Experience van Ahold Delhaize<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

Beyond the Hype: Mastering IAM Fundamentals in an Era of Innovation<\/h2>\r\n

Vikash Singh, Global Director IAM Platform Engineering & Experience van Ahold Delhaize<\/h3> \r\n <\/div>[vc_column_text css=””]In an age dominated by buzzwords like Zero Trust, AI-driven security, and passwordless authentication, it\u2019s easy to lose sight of the basics that truly keep identities secure. Beyond the Hype is a practical, no-nonsense exploration of Identity and Access Management (IAM) fundamentals that remain critical even as technology rapidly evolves.<\/p>\n

This session revisits the core building blocks of IAM: identities, authentication, authorization, lifecycle management, and governance. It highlights that real security often comes from doing the \u201cboring\u201d work well repeatable processes, disciplined execution, and operational hygiene rather than large budgets or constant reinvention. Through real-world enterprise examples, the talk shows how innovation should strengthen, not distract from, these foundations.<\/p>\n

Whether modernizing legacy systems or adopting next-gen IAM platforms, attendees will learn how mastering the fundamentals builds trust, reduces risk, and creates IAM programs that scale reliably and sustainably.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″ offset=”vc_hidden-xs”][vc_single_image image=”8380″ img_size=”” css=””][vc_btn title=”10.10 – 10.35″ css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n

\r\n
\r\n \r\n \"Alexander\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/i><\/a> <\/div>\r\n
\r\n

Alexander van den Wall Bake<\/a><\/h3>\r\n

Operational Excellence Manager<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

Zonder Identiteit Ben Je Niemand.<\/h2>\r\n

Alexander van den Wall Bake, Operational Excellence Manager van TNO<\/h3> \r\n <\/div>[vc_column_text css=””]Van onzichtbaar bestaan naar digitale identiteit: een confronterend wereldwijd perspectief op identiteit<\/strong><\/p>\n

Veel kinderen worden geboren zonder dat hun identiteit officieel wordt vastgelegd. Dat lijkt een administratief detail, maar het heeft directe en ingrijpende gevolgen: zonder erkende identiteit wordt toegang tot onderwijs, zorg en bescherming aanzienlijk moeilijker. Het bepaalt in grote mate de kansen die iemand krijgt of juist misloopt vanaf de eerste dag.<\/p>\n

In deze keynote laten UNICEF Nederland en TNO zien waarom identiteit een fundamentele voorwaarde is om volwaardig deel te kunnen nemen aan de samenleving. Aan de hand van concrete praktijkvoorbeelden wordt inzichtelijk hoe UNICEF wereldwijd werkt aan het registreren en beschermen van de identiteit van kinderen, en welke impact dit heeft op hun toekomst.<\/p>\n

Tegelijkertijd trekken de sprekers de lijn door naar de digitale wereld in het Westen. Want ook hier staat identiteit onder druk. Het fundament van vertrouwen in identiteit in de digitale samenleveving ontbreekt waardoor de I in IAM onzeker is. Wat betekent het om je identiteit te kunnen bewijzen in een digitale samenleving? En hoe waarborgen we daarbij kernwaarden als privacy, veiligheid en autonomie?<\/p>\n

Samen bieden zij een scherp en toekomstgericht perspectief op identiteit\u2014van geboorteakte tot digitale identiteit\u2014en laten ze zien waarom dit onderwerp relevanter is dan ooit.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″ offset=”vc_hidden-xs”][vc_single_image image=”6831″ img_size=”” css=””][vc_single_image image=”8613″ img_size=”” css=””][vc_btn title=”10.35 – 11.00″ css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″][vc_single_image image=”6504″ img_size=”” css=””][\/vc_column_inner][vc_column_inner width=”2\/3″]

\r\n

Ochtendpauze met 1-op-1 gesprekken<\/h2>\r\n

<\/h3> \r\n <\/div>[vc_column_text css=””]Verse koffie, thee, fruitwater, mineraalwater en brainfoods staan voor je klaar. De eerste 1-op-1 gesprekken vinden plaats. Netwerk met collega\u2019s, sprekers, vakgenoten en oplossingsaanbieders.\u00a0Je vindt je persoonlijke afspraken terug in de EventManager.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″ offset=”vc_hidden-xs”][vc_btn title=”11.00 – 11.40″ css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n
\r\n
\r\n \r\n \"Frans\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/div>\r\n
\r\n

Frans Schouten<\/a><\/h3>\r\n

Strategic Account Executive EMEA - PAM van Saviynt<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

Break-out sessie: AI Is Changing Security. Why PAM Matters More Than Ever<\/h2>\r\n

Frans Schouten, Strategic Account Executive EMEA - PAM van Saviynt<\/h3> \r\n <\/div>[vc_column_text css=””]Privileged Access Management (PAM) is undergoing a major shift as organizations adopt AI, automate workflows, and face an explosion of non-human identities across cloud environments. Traditional PAM tools were designed for human users and static privilege models, leaving critical gaps that attackers increasingly exploit.<\/p>\n

In this session we explore the new reality of privileged access, how AI is reshaping risk, and why organizations must rethink their PAM strategy. We\u2019ll share Saviynt\u2019s latest analyst recognition, including highlights from the Gartner Magic Quadrant, and walk through how Saviynt is redefining PAM to secure both human and non-human privileges in the AI era.<\/p>\n

Whether you\u2019re leading identity, cloud, or security initiatives, this session will help you understand where PAM is heading and how Saviynt can strengthen your organization\u2019s privileged access strategy.[\/vc_column_text][\/vc_column_inner][vc_column_inner width=”1\/6″ offset=”vc_hidden-xs”][vc_single_image image=”8374″ img_size=”” css=””][vc_btn title=”11.45 – 12.10″ css=””][\/vc_column_inner][\/vc_row_inner][vc_row_inner][vc_column_inner width=”1\/6″]\r\n\r\n

\r\n
\r\n \r\n \"Dennis\r\n <\/a>\r\n\r\n
\r\n
\r\n <\/i><\/a> <\/div>\r\n
\r\n

Dennis Verhoeven<\/a><\/h3>\r\n

Senior Solutions Engineer - North Europe van CyberArk<\/h4> <\/div>\r\n <\/figcaption>\r\n <\/figure>\r\n <\/div>\r\n\r\n\r\n\r\n [\/vc_column_inner][vc_column_inner width=”2\/3″]
\r\n

Break-out sessie: Identity is the New Control Plane: Securing Human, AI, and Machine Access in Modern Enterprises<\/h2>\r\n

Dennis Verhoeven , Senior Solutions Engineer - North Europe van CyberArk<\/h3> \r\n <\/div>[vc_column_text css=””]As human, machine, and AI identities multiply, and attackers increasingly weaponize AI, the consequences of a single identity breach are escalating at unprecedented speed.
\nFragmented IAM, PAM, and IGA approaches were not designed for this reality. The industry has reached a pivotal inflection point in cybersecurity.<\/p>\n

This session highlights the advantages of shifting from fragmented tools to a unified platform that aligns with CISO and SOC priorities while enabling a new approach to visibility, control and trust.<\/p>\n

Key learnings:<\/strong><\/p>\n