Our two-day programme is jam-packed with presentations and workshops, with keynotes from leading figures shaping Microsoft’s identity and security strategy.
Please note: the agenda is still being finalised and all sessions are subject to change.
Choose ONE workshop between the 1:40 - 3:10 PM time slot. Spaces are limited so preferences will be offered on a first come, first served basis.
Love Microsoft Identity Manager, but want more? Looking for ways to bring your other identity systems to life? We can help.
Users and admins love MIM’s powerful sync engine, user provisioning features and the resilience of a state-based identity solution – but even for one of our all-time favourite identity platforms, there are big gains to be made.
Come to this workshop to understand how Software IDM enhances managing your identity management solution, enabling you to:
Microsoft Azure AD B2C can both increase your level of customer or member engagement (normally measured in user registrations, user logins, etc.) and better protect your users and your website, along with a host of other benefits.
With scalable state-of-the-art security on tap, from securing your user credentials, to the use of modern protocols that guard against known attack vectors, to detecting suspicious user activity – you’re covered.
In this workshop we will:
You should come away with a good understanding of whether implementing B2C would be a useful step for your organisation.
Over 55% of IT leaders believe end users have more access than is required to do their jobs, and 44% are not confident in the compliance of their user access practices.
If you have holes in your identity governance and administration (IGA) policies and are concerned about compliance risks then join us for this deep dive into Saviynt’s IGA solution.
It’s your chance to learn:
Choose ONE workshop between the 3:30 – 5:00 PM time slot. Spaces are limited so preferences will be offered on a first come, first served basis.
We know from industry analysts that 81% of successful cyber attacks begin with a compromised username and password. Protecting your identities has never been of more importance, but many customers still show low-adoption rates of traditional services like MFA, especially on privileged accounts.
In this session, we’ll learn how to plug the gaps in your secure identity strategy – utilising built-in tools and services to improve your posture and limit the attack surface.
We will cover:
Do you have what it takes to serve and smash your way to the coveted ThirdSpace Summit Ping Pong Legend title? Our leading architects are in full training ready to take on all challengers!
If competition isn’t your thing, then don’t worry – we’re not that good really.
This is your chance to unwind and have a bit of fun with the ThirdSpace team and your fellow delegates.
Plus, there will be pizza!
Eight-time winner of the Microsoft Partner of the Year Award for Identity Management, Enterprise Mobility, and Security and Compliance.
You are seeing this because you are using a browser that is not supported. The ThirdSpace website is built using modern technology and standards. We recommend upgrading your browser with one of the following to properly view our website:Windows
Please note that this is not an exhaustive list of browsers. We also do not intend to recommend a particular manufacturer's browser over another's; only to suggest upgrading to a browser version that is compliant with current standards to give you the best and most secure browsing experience.