Our two-day programme is jam-packed with presentations and workshops, with keynotes from leading figures shaping Microsoft’s identity and security strategy.
Please note: the agenda is still being finalised and all sessions are subject to change.
Choose ONE workshop between the 1:40 - 3:10 PM time slot. Spaces are limited so preferences will be offered on a first come, first served basis.
Azure AD can form the heart of your identity strategy. It can control access to your Office 365 environment, cloud-based services such as ServiceNow, Concur and Salesforce – and also control access to internal, web-based apps. Linking this to your partners and customers can provide a firm foundation for access in the future.
In this session, we will try to cover as much of this as we can (in 90 minutes) – focusing on:
Love Microsoft Identity Manager, but want more? Looking for ways to bring your other identity systems to life? We can help.
Users and admins love MIM’s powerful sync engine, user provisioning features and the resilience of a state-based identity solution – but even for one of our all-time favourite identity platforms, there are big gains to be made.
Come to this workshop to understand how Software IDM enhances managing your identity management solution, enabling you to:
Microsoft Azure AD B2C can both increase your level of customer or member engagement (normally measured in user registrations, user logins, etc.) and better protect your users and your website, along with a host of other benefits.
With scalable state-of-the-art security on tap, from securing your user credentials, to the use of modern protocols that guard against known attack vectors, to detecting suspicious user activity – you’re covered.
In this workshop we will:
You should come away with a good understanding of whether implementing B2C would be a useful step for your organisation.
Over 55% of IT leaders believe end users have more access than is required to do their jobs, and 44% are not confident in the compliance of their user access practices.
If you have holes in your identity governance and administration (IGA) policies and are concerned about compliance risks then join us for this deep dive into Saviynt’s IGA solution.
It’s your chance to learn:
Choose ONE workshop between the 3:30 – 5:00 PM time slot. Spaces are limited so preferences will be offered on a first come, first served basis.
We know from industry analysts that 81% of successful cyber attacks begin with a compromised username and password. Protecting your identities has never been of more importance, but many customers still show low-adoption rates of traditional services like MFA, especially on privileged accounts.
In this session, we’ll learn how to plug the gaps in your secure identity strategy – utilising built-in tools and services to improve your posture and limit the attack surface.
We will cover:
Administration is a necessary evil. Some tasks need to be completed by users with a high level of access, but do they need that access all the time?
Do they meet the relevant criteria:
Organisations often make the mistake of assuming they can manage privileged access in the same way they manage regular access. A better method may be to provide Just-in-Time (JIT) elevated access giving the relevant users Just Enough (JE) access. Providing this both on-premises and in the Cloud can reduce an attack surface and keep you more secure.
In this session, we’ll discuss PIM and PAM technologies in depth working through common scenarios and use cases.
Keeping privileged access to a minimum and managing the lifecycles of external users are critical processes for securing data in any large organisation.
In this workshop we will cover:
We will be available to answer technical questions on the above and help you to plan your next steps in taming your IAM ecosystem.
Imagine a world where users no longer need to set, forget and reset multiple passwords.
Passwords are known as the weakest link for enterprise security and are an obstacle to streamlined customer journeys and internal processes.
In this workshop, we’ll discuss the future of the FIDO2 authentication standard and the benefits of a truly passwordless approach to managing your user identities. We’ll share a range of industry use cases where FIDO2 authentication really can be a game changer.
Do you have what it takes to serve and smash your way to the coveted ThirdSpace Summit Ping Pong Legend title? Our leading architects are in full training ready to take on all challengers!
If competition isn’t your thing, then don’t worry – we’re not that good really.
This is your chance to unwind and have a bit of fun with the ThirdSpace team and your fellow delegates.
Plus, there will be pizza!
We are expecting this year’s free-to-attend event to be another sell-out, so save your place today to ensure you don’t miss out.Save my place
Eight-time winner of the Microsoft Partner of the Year Award for Identity Management, Enterprise Mobility, and Security and Compliance.
You are seeing this because you are using a browser that is not supported. The ThirdSpace website is built using modern technology and standards. We recommend upgrading your browser with one of the following to properly view our website:Windows
Please note that this is not an exhaustive list of browsers. We also do not intend to recommend a particular manufacturer's browser over another's; only to suggest upgrading to a browser version that is compliant with current standards to give you the best and most secure browsing experience.