IDC Identity and Privacy Conference The Future of Trust: Adapting to the Privacy Imperative

DIGITAL Event | September 8, 2020

Overview

dae logo

Due to the current global situation, IDC has taken the decision to make the Identity and Privacy Conference on September 8 a Digital Forum. This decision was taken as the safety of our sponsors, delegates and staff is paramount and our community's health should be placed above all else.

Organisations are contending with data privacy and security challenges posed by a complex and rapidly changing global environment of data privacy regulations, compliance requirements and transformative technologies.

This digital forum will introduce the solutions and approaches that can help organisations align their data privacy and protection programmes to this rapidly changing environment, and how privacy and identity will be pivotal in shaping the future of digital trust.

Join IDC on September 8 to learn more and discuss:

  • Privacy & Security: Third-party risk management and assurance
  • Security in a "Covid-19 World"
  • Operationalising Privacy-by-Design
  • Mitigating Data Privacy and Security Risks in the Cloud
  • Turning Data Protection into Data Discovery
  • B2C Identity Management in the Digital Era
  • Identity Governance: A Framework Approach

General Information

 

Hopin Conference

 

September 8, 2020

 

09:30 - 14:00 BST

 

Agenda

Time Event & Speakers
9:15

Join Hopin

9:30

Chair's Opening Remarks

Dan Timberlake

Group Vice President & Country Manager, IDC UK
9:40

IDC Keynote - The Future of Trust: Adapting to the Privacy Imperative

Ralf Helkenberg

Research Manager - Privacy & Data Security, IDC UK
10:10

Platinum Keynote: Harnessing Identity to Position Security as a Business Enabler

Barry McMahon

Senior Manager, IAM, LastPass by LogMeIn

In a recently published IDC European wide report sponsored by LastPass, the research findings are clear: business leaders want security to demonstrate greater value-add in areas such as operational excellence, user experience and compliance. Yet, with 60% projects kicked off without security involved, it’s almost impossible for security leaders to stop being perceived as blockers.

In this session, Barry will share key insights and guidance on how security leaders can leverage Identity and Access Management (IAM) to turn the challenges they face from within their own teams, and from across the business, into opportunities to deliver on key business priorities that will enable the business to grow and operate securely.

There is also guidance on how to best to position the benefits of IAM by speaking the language of the board.

 

10:35

Coffee Break ¦ Solution Zone

11:00

End User Keynote: Third Party Cyber-Risk, how do you Manage your Vendors?

Tom Stewart

Head of Information Security - Ryanair

With many companies focusing their cyber defence efforts on their own organizations there is increasing concern about third party risks. An increasing number of recent data breaches involve third party compromise what is best practise in Third party risk management to identify and manage your Vendor Risk?

11:25

Platinum Keynote: Top 5 Emerging Trends in Vendor Risk Management

Vipul Asher

Privacy Consulting Manager, OneTrust

The world of vendor risk management is rapidly changing. Each day brings new security, privacy, and compliance threats when working with third (and fourth, and fifth...) parties. In this session, we'll share the top 5 emerging trends in vendor risk management – including exchanges, new approaches to data transfers, and business resilience – and what you need to do today to get your program ahead of the curve.

11:50

Coffee Break ¦ Solution Zone

12:10

Gold Tech Talk: A Different Approach to Processor Security

Lee-Martin King

Datacenter/Enterprise Sales Manager EMEA

Modern microprocessors offer hardware-based solutions for better protection against side channel attacks. Modern security technology can protect data located in system memory and cryptographically isolate a considerable number of virtual machines. Attend our session to learn more about the implementation details, usage scenarios and the required ecosystem to protect one of your biggest business assets, data.

12:25

IDC Key Takeaways and Future Predictions

Mark Child

Research Manager, European Security, IDC CEMA
12:35

End of Online Conference ¦ One to One Meetings With Sponsors

12:40

IDC Security Report

Partners

Platinum Partner
Platinum Partner
Gold Partner

Who Will Be There?

We will be bringing together a select group of over 80 IT professionals. The primary job titles in attendance on the day include:

  • CISOs/CTOs/CIOs
  • VP/Heads/Directors/Managers of:
    • Security
    • Risk
    • Digital
    • Operations
    • Cloud
    • IT
    • Procurement
    • Architecture

2019 Highlight Video

Highlights from IDC's Identity and Privacy Conference 2019! We look forward to seeing you in 2020!

 

Why Sponsor?

By sponsoring an IDC event you can:

  • Demonstrate your products and services through virtual exhibition stands and/or demos in the interactive networking zone where all delegates will be directed to during coffee and lunch breaks
  • Educate your prospects through plenary keynotes

With a clear understanding of your overall marketing strategy, we will work in partnership with you to develop a bespoke sponsorship package to meet your objectives.

Proceedings

IDC Keynote - The Future of Trust: Adapting to the Privacy Imperative

Ralf Helkenberg

Research Manager - Privacy & Data Security, IDC UK

Download
End User Keynote: Third Party Cyber-Risk, how do you Manage your Vendors?

Tom Stewart

Head of Information Security - Ryanair

Download
Platinum Keynote: Top 5 Emerging Trends in Vendor Risk Management

Vipul Asher

Privacy Consulting Manager, OneTrust

Download
Gold Tech Talk: A Different Approach to Processor Security

Lee-Martin King

Datacenter/Enterprise Sales Manager EMEA

Download
IDC Key Takeaways and Future Predictions

Mark Child

Research Manager, European Security, IDC CEMA

Download

Knowledge Hub

AMD

  • AMD EPYC™ 7002 SERIES PROCESSORS: LEADERSHIP SECURITY FEATURES FOR THE MODERN DATA CENTER

    AMD EPYCTM processors boast a set of advanced security features called AMD Infinity Guard. AMD Infinity Guard includes the AMD Secure Processor, Secure Memory Encryption and Secure Encrypted Virtualization, which together help decrease potential attack surfaces as software is booted, executed, and accesses your critical data. The AMD Secure Processor is a dedicated security processor providing foundation platform security helping protect against malicious firmware and BIOS modification and enable secure boot without corruption. AMD Infinity Guard also delivers Secure Memory Encryption (SME) to help defend against certain cold-boot and direct memory attacks where an intruder has physical server access and Secure Encrypted Virtualization (SEV) which encrypts and isolates vms helping protect from admin tampering and untrusted hypervisors.

     Read More

 

Contact Us

Hannah Dowie

Event Producer - Conferences, IDC UK

+442089877169

Helena Chappell

Senior Business Development Director, European Event Sales, IDC UK

+44(0)208 987 7161

About IDC

56 Years | 1100 Analysts | 110 Countries

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,100 analysts worldwide, IDC offers global, regional, and local expertise on technology and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly-owned subsidiary of International Data Group (IDG), the world's leading media, data and marketing services company. To learn more about IDC, please visit www.idc.com.