For the best web experience, please use IE11+, Chrome, Firefox, or Safari

One Identity UNITE User and Partner Conference

September 18-22, 2023 | Madrid, Spain

UNITE 2023 Highlights from Madrid 03:45

 

 

In September 2023, identity security customers, partners and product experts from around the world gathered in Madrid to drive strategy and product development into the future, all while accelerating their own identity security and strengthening their overall cybersecurity posture.

Event Schedule Breakdown

The event included dozens of sessions categorized into five learning tracks (Security, Active Directory Management, Access Management (OneLogin), Identity Governance and Administration (IGA) and Privileged Access Management (PAM)), as well as mainstage, partner, CAB and Technical Deep Dive sessions. Attendees had the opportunity to mix and match sessions from each category to create the perfect agenda to meet their personal goals for the conference.

 

Benefits to customer and partner attendees:

Gained valuable identity security industry insights

Learned best practices, tips and tricks to improve their technical proficiency and knowledge

Received direct access to product development, product managers, product marketing and subject matter experts

Offered the opportunity to provide input on future product enhancements

Networked with peers

Agenda

September 19-22, 2023

9:00 a.m. - 5:00 p.m. each day

Tuesday

Tuesday, September 19
  • CEO Keynote: Mark Logan

    Mark Logan: CEO and President, One Identity

    Come hear from Mark on how One Identity is uniquely positioned to help companies address the rapid proliferation of identity-based threats targeting their business and adapt to an ever-changing threat landscape.

    Keynote: Paula Januszkiewicz

    Paula Januszkiewicz: CQURE Founder and CEO, Microsoft Regional Director, MVP, MCT CQURE

    Top 10 Mistakes by Administrators About Remote Work

    The sudden shift to remote working has left businesses at a far higher risk of cyberattacks, largely due to their corporate infrastructure being exposed to new external attack vectors and threats. However, although cybercriminals worldwide used the global crisis to spread their wings on an unprecedented scale, there are possibilities and ideas that administrators and regular users can also come up within 10 minutes – for this is the time that allows a hacker to attack your infrastructure. For real! And that often includes a coffee break.

    During this session, you will learn the top 10 mistakes related to remote work security, adopt the hacker’s perspective on home office, gain an understanding of different situations hackers can create to gain access to a company’s information by abusing the situation and find out what solutions and approaches companies can implement to make the home office a safe workplace. You will also become familiar with attacks on the company's resources through users connected to a VPN, watch a demonstration of how hackers can attack a user's workstation and learn many more things related to the technical challenges of remote work, including mobile devices.

    The presentation includes a demonstration of vulnerabilities found by Paula and the relevant mitigation. This topic is crucial for all cloud/identity admins, as it showcases problems with identity that can be found in almost every organization. And these problems will probably be a part of the IT reality for many years. Paula would like to present the most up-to-date security solutions and share the entire experience she gathered last year so that you don’t become the next perfect target for hackers!

    Industry Experts Roundtable

    Ian Sutherland: VP of Sales, EMEA, One Identity

    Rajiv Sagar: Global Cybersecurity Consulting Lead, Avanade

    Aiert Azueta: Global IAM Director, Devoteam Group

    Fernando Mediavilla Basabe: Head of Big Data & Security, Iberia, Eviden

    Join a panel of industry experts to hear insights and best practice guidance from executive leadership from across our customer and partner landscape.

    Neurotechnology: From Science Fiction to Reality

    Rudy de Sousa : Director of PreSales, One Identiy

    Neurotechnology is moving from the realms of Science Fiction to Reality. In this session, we will discuss what neurotechnology is, its current state and the identity security challenges it introduces.

    Industry Trends and the Importance of Unified Identity Security

    Darren Thomson: Vice President of Product Marketing, One Identity

    Enterprise attack surfaces continue to evolve through cloud-based infrastructure, the proliferation of connected devices, and reliance on third-party solutions. New vulnerabilities are emerging every day from security gaps in the software supply chain to use of AI and cybercriminals are being proactive in exploiting them. Comprehensive Identity Security is a critical element to containing these new risks but maintaining best practices for a robust IAM strategy using multiple security tools has never been more challenging.

    This session will address how to reduce human error, avoid gaps and overlaps of your different IAM tools, and bring your security strategy in-line with the challenges of today and tomorrow's cyber threats.

    Customer Story: ING

    Wim Beems: Change Expert Global IAM, ING/Tech/CISO

    Ciro Guariglia: Identity & Access Management Consultant, AspisID

    Back to the Future

    Brian Chappell: Head of Product, One Identity

    You will be subjected to 1.21 gigawatts of precisely timed information as Brian Chappell, Head of Product, explores the now and the future of identity. This session promises to give a glimpse into how One Identity is planning to journey with you, back to the future!

    Customer Story: Extending Privilege Access Management to SAP

    Samuel Lopez: User Lifecycle Supervisor, Holcim

    Holcim is the Global leader in innovation and sustainable building solutions. We have an extensive SAP landscape that is a challenge to manage and keep under control, specifically the privileged operations. During this session, we will go through the drivers and requirements that triggered the need to modernize the Privilege Access Management approach. We will detail how we addressed them, explain the technical solutions implemented, and most importantly the lessons learnt along the way.

    Closing Keynote: Slaying the Many-Headed Hydra of Data Privacy and Protection

    Bruce Esposito: Field Strategist, NAM, One Identity

    With data traveling the world through borderless networks data privacy and protection laws have never been as important as they are today . Over 120 global jurisdictions now have data privacy and protection laws. California to China are implementing legislation that mirrors Europe’s GDPR, while the EU has turned its attention to a new EU Data Act as well as regulating the use of AI. Where once organizations were always ahead of regulators, now they struggle to keep up with compliance requirements across multiple jurisdictions. In this session, we will discuss the current state of compliance regulations, what’s coming next and how you can stay ahead.

Wednesday

Wednesday, September 20
  • Identity Threat Detection and Response (ITDR) Explained

    Maurizio Ostinet: Solutions Architect, One Identity

    Based on Gartner, the current IAM and Security preventive controls cannot protect effectively Identity Systems from attack. Attend this session to see an overview of what ITDR is and why it is relevant in the Identity Security field. We will look at Sharelock technology and the integrations currently available with One Identity.

    Roadmap & New Releases

    Frederic Courtois: Principal Solutions Architect EMEA, One Identity

    Alan Radford: Field Strategist, EMEA, One Identity

    Hear about new features and development plans for Active Roles, and how your company can benefit from them. In this session Frederic Courtois will walk you through the roadmap and use cases.

    Master Class: Advanced Authentication in Your Organization

    Mark Cockbill: Senior Manager, Access Management Solutions Engineering, One Identity

    Solenne Le Guernic: Solution Engineer, One Identity

    Join us to learn more about best practices when deploying advanced authentication within your organisation. How can you ensure that you are at the top of your game with your security posture, whilst also giving end-users the best possible experience?

    Latest Updates and Roadmap for Identity Manager

    Ted Ernst: Senior Product Manager, One Identity

    Matthias Bauer: Senior Manager of Product Development, One Identity

    Hear about the latest releases of Identity Manager, LTS option, roadmap and use cases with product management and development.

    Privileged Access Management today: Safeguard Roadmap

    Brian Chappell: Head of Product, One Identity

    Taylor Cochrane: Product Manager - PAM Portfolio, One Identity

    Hear about the latest releases of our privileged solution family, product roadmap and use cases, presented by members of our product management and development teams. In this session, our experts will highlight how the One Identity PAM portfolio provides next-gen PAM capabilities and features. Plus, get the latest info about innovations and integrations that ensure your PAM program can quickly adapt to evolving technologies and emerging cybersecurity threats.

    The Role of AI in Cybersecurity

    Abdullah Ahmad: Senior Solutions Architect, One Identity

    The number of attempted cyber-attacks is rapidly increasing. Human cybersecurity professionals are finding it increasingly difficult to respond to all attacks and potential risks, or to predict where the next dangerous attacks will come from. This is where AI can help. Machine learning algorithms can examine the huge amounts of data in real time and much more effectively than humans and identify new patterns that indicate threats.

    How Active Roles Solves MS Tiering Model Issues

    Frederic Courtois: Principal Solutions Architect EMEA, One Identity

    Raul Dopazo: Solutions Architect, One Identity

    The Microsoft Tiering model is secure but can quickly become complex and expensive to implement, manage and comply with. In this session, we will discuss different implementation scenarios and the impact of Active Roles in each use case.

    OneLogin Roadmap

    Stuart Sharp: VP of Product Strategy, One Identity

    Come learn about OneLogin’s product roadmap and most recent product innovations. We will showcase how these technological investments can be applied in key use cases and how they can benefit your organization.

    Identify Risk Automatically with enhanced integration between Identity Manager, OneLogin and Safeguard

    Ted Ernst: Senior Product Manager, One Identity

    Identify risky behavior patterns and automatically reduce vulnerability through an enhanced integration between Identity Manager, OneLogin and Safeguard.

    Safeguard Privilege Access Management: Best Practices

    Josef Pernecky: Technical Sales Engineer, One Identity

    Holger Weihe: PAM Principal, One Identity

    PAM is one of the most important security controls you can implement. This session is focused on PAM best practices. Learn from experts in the field on the pathway to a successful implementation and operational excellence.

    Safeguard Privilege Access Management: Security and Compliance

    Alan Radford: Field Strategist, EMEA, One Identity

    Security and compliance are 2 of the main driving forces behind the deployment of a PAM solution. Attend this session to see how a PAM solution is a critical component of achieving compliance, we will look at controls across some of the industry standard compliance requirements (eg SOCS, PCIDSS, NIS2 etc)

    Common Active Directory Identity Attacks and How to Prevent Them

    Hicham Bouali: EMEA Pre Sales Manager, One Identity

    Since its rollout right after the Y2K scare, Active Directory has been providing SSO authentication for enterprises of all sizes, shapes and geographies. Since nearly every organization uses AD, it is by far the most attacked identity system simply because of what it controls and the resources it protects. In this session, Hicham Bouali will walk through common Active Directory attacks, such as LDAP Recon, password spraying, and Kerberoasting, to show how enterprises are vulnerable to these attacks, how they operate and discuss mitigation steps.

    Utilizing OneLogin IDaaS to Enhance Your Future IAM Estate

    Brian Chappell: Head of Product, One Identity

    Stuart Sharp: VP of Product Strategy, One Identity

    Join us to discover how adopting IDaaS (OneLogin) within your IAM deployment can supercharge your security posture, processes and user experience.

    Identity Manager Hidden Gems

    Matthias Bauer: Senior Manager of Product Development, One Identity

    Robert Byrne: Field Strategist, EMEA, One Identity

    Ted Ernst: Senior Product Manager, One Identity

    Dr Stephan Hausmann: IGA Principal, One Identity

    We all know the major things that One Identity Manager is capable of. There are many capabilities that already exist OOTB, but not initially used. This session will dig into some of the “hidden gems” that are very cool and useful, but oftentimes forgotten.

    Secure your Critical Secrets with Frictionless DevOps Integration

    Holger Weihe PAM Principal, One Identity

    Josef Pernecky: Technical Sales Engineer, One Identity

    Building your applications, products, and processes requires access to critical resources and information. Learn how Safeguard can securely integrate with your existing infrastructure, tools, technologies, and architecture without requiring your developers to change the way they work. Proper credential management in DevOps processes protects against supply chain risk.

    Women in Cybersecurity UNITE

    Dr. Ina Nikolova: Marketing Manager, PATECCO

    Carola Schwinn-Hartmann: Principal Consultant/Architect, Identity-Team GmbH

    Allison Main: Sr. Product Marketing Manager, One Identity

    Elisabeth Strom Gullberg: Regional Sales Director, One Identity

    Join us as we discuss the gender gap in the STEM fields and real ideas for how we can help. Plus, enjoy networking opportunities with a community of professionals who support advancing women in the cybersecurity field. Share your voice and join us today! 

    The (R)evolution of Authentication: Passwordless Authentication

    Brian Chappell: Head of Product, One Identity

    Authentication is the act of proving an assertion. In contrast with identification, authentication is the process of verifying an identity. Authentication has undergone an evolution over a long period of time, during which factors and types have evolved. Now the time has come for a revolution in authentication. The era of passwordless authentication is dawning.

    Privileged Access in AD

    Viktor Varga: Sales Engineer, One Identity

    Join us for this joint session in the Neptuno room. The core of Active Roles is an AD delegation engine that provides very granular and dynamic delegation of AD and AAD objects, allowing a range of delegation from simple tasks that any user may need to accomplish (user self-service) to highly privileged administrative tasks on critical AD objects. With protecting privileged access at the core of this conversation, Viktor Varga and Frederic Courtois will present a privileged access management discussion focused on identifying privilege in AD and protecting it from compromise with Active Roles and Safeguard.

    Passwordless Authentication for Your Workforce and Customers

    Solenne Le Guernic : Solution Engineer, One Identity

    Marc Maguire: Solution Architect, One Identity

    Passwordless is a major buzzword in the IAM industry today, but what does it actually look like, and how can you really deploy and utilize it effectively? Join our team of experts to gain some insight into what's actually possible today.

    Secure Configuration and Operations for On-Prem Identity Manager

    Matthias Bauer: Senior Manager of Product Development, One Identity

    Hanno Bunjes: Product Development Team Lead, One Identity

    Markus Weiss-Ehlers: Program Manager Consultant, One Identity

    Learn :

    How to autenticate application servers (avoid SQL server injection, etc)

    How to authenticatieob service logs and remote connection plugin

    How to store sync passwords in Safeguard

    About IIS settings and FIPS Mode

    How encryption works

    How to run fat clients in a safe way with Safeguard

    Privileged Access in AD

    Frederic Courtois: Principal Solutions Architect EMEA, One Identity

    The core of Active Roles is an AD delegation engine that provides very granular and dynamic delegation of AD and AAD objects, allowing a range of delegation from simple tasks that any user may need to accomplish (user self-service) to highly privileged administrative tasks on critical AD objects. With protecting privileged access at the core of this conversation, Viktor Varga and Frederic Courtois will present a privileged access management discussion focused on identifying privilege in AD and protecting it from compromise with Active Roles and Safeguard.

    Cloud Security

    Don Edwards: Global Tech Leader, Amazon Web Services

    Developments in recent years are forcing companies to rely more and more on the use of cloud-based technologies to enable communication and collaboration. Cloud-based services are thus increasingly moving up the list of potential targets for hackers. They are particularly vulnerable to cybersecurity risks. Whether it's misconfiguration or inadequate security policies, costly security issues with cloud-based systems pave the way to data breaches, unauthorized access to corporate networks and account takeover.

    Meet Certification and Attestation for Groups Using Native Functionality in Self-Serve Manager

    Frederic Courtois: Principal Solutions Architect EMEA, One Identity

    Hicham Bouali: EMEA Pre Sales Manager, One Identity

    Group management in Active Directory is at the core of enterprise access control. When AD group membership isn’t right, then access isn’t right. Some users from one department may still have access to a resource from a previous role. Figuring out what their appropriate access should be sometimes falls to the person at the help desk making uniform department resource access decisions. In this session Hicham Bouali and Frederic Courtois will walk through the Active Roles Add-In for Group Access and Attestation showing the functionality and relating it to real-world use cases.

    Don't Compromise on Your CIAM Solution: Protect Customer Identities

    Mark Cockbill: Senior Manager, Access Management Solutions Engineering, One Identity

    Marc Maguire: Solution Architect, One Identity

    User experience is key when it comes to delivering a CIAM solution. Learn how you can use OneLogin to deliver a best of breed customer facing platform that's both easy to deploy and makes your customers want to return.

    Technical Alliance Partnerships: Enhancing Identity Manager with Integrations

    Robert Byrne: Field Strategist, EMEA, One Identity

    Robert Kraczek: Field Strategist, NAM, One Identity

    One Identity has arguably the most extensive portfolio of any vendor focused on identity security. However, identity security is only a subset of Cybersecurity and a broad spectrum of tools are needed to provide a full end-end security model. One Identity can accelerate customers into a modern identity security model thanks to its technical alliance partnership program. This program helps customers across the globe meet identity management and Cybersecurity requirements by developing relationships with class leading vendors to create an ecosystem of capabilities that can be added to One Identity solutions.

    Come see how our technical partnerships enhance our portfolio’s capabilities for today’s ever changing identity security landscape by leveraging the technical capabilities of ITDR, RPA and Darkweb search products, as well as many others.

    Safeguard Privileged Access Management: Tips and Tricks

    Eric Parietti: Solutions Architect, One Identity

    Ian Stimpson: Principal Engineer, PreSales, One Identity

    This session is aimed at providing a transfer of knowledge of some of the tips and tricks with Safeguard. Covering topics, such as:

    Configure SAML authentication to your SPS portal

    Discover and manage accounts in AWS using TOTP

    Provide Just in Time access to AD credentials with Active Roles integration

    Internet of Things (IoT) IAM

    Fernando Garcia Vegas: EMEA Pre Sales, Quest

    IDC predicts that more than 41 billion IoT devices will be in use by 2025. The rapid increase in devices is leading to new cybersecurity threats. The sheer number of devices being put into circulation is increasing the opportunities for cyberattacks at a pace that businesses are struggling to keep up with.  What possibilities do companies have to face up to the growing threat?

    Azure AD Security: How Active Roles Can Help

    Raul Dopazo: Solutions Architect, One Identity

    Frederic Courtois: Principal Solutions Architect EMEA, One Identity

    Nearly every organization that uses on-prem Active Directory has blended their AD with Azure AD and M365. Whether an organization has fully embraced a hybrid Active Directory or set up part of their user population as Azure-only AD, the security challenges created to enable management of the Azure AD environment must be acknowledged. In this session Raul D'Opazo and Frederic Courtois will discuss some of the challenges and show how Active Roles enables the secure management of Azure AD, whether hybrid or Azure native.

    Using Decentralized Identity to Build a Robust Employee Joiner-Mover-Leaver (JML) Process

    Robert Byrne: Field Strategist, EMEA, One Identity

    Marc Maguire: Solution Architect, One Identity

    How can you ensure that your new starters are who they say they are, as well as make the whole offboarding process both quick and easy? Join us to learn how you can utilize One Identity products to make your onboarding and offboarding processes more robust.

    One Identity Manager in The Cloud: What Are My Options?

    Bruce Esposito: Field Strategist, NAM, One Identity

    Learn more about the options for running One Identity Manager in the Cloud. We will discuss private cloud options AWS and Azure along with One Identity SaaS product- Identity Manager On Demand.

    Safeguard Privileged Access Management: The Core Capabilities

    Ian Stimpson: Principal Engineer, PreSales, One Identity

    Eric Parietti: Solutions Architect, One Identity

    This session will provide an overview and demonstration of the core capabilities from Safeguard. You will learn some of the core use cases and how Safeguard can help improve your security posture.

    Closing Keynote: Identity Governance Project on (Digital) Transformation for CNPVita Assicurazione

    Giovanni Motta: BL Manager Identity Security Governance, S2E

    Luca Magnoni: Chief Information Officer, CNP VITA Assicurazione

Thursday

Thursday, September 21
  • Lost in the Red Forest? How Active Roles Helps Customers

    Reto Bachmann: Senior Principal Solution Architect, One Identity

    Raul Dopazo: Solutions Architect, One Identity

    Learn how to migrate from Microsoft Enhanced Security Admin Environment (ESEA – Red Forest) architecture which is using Microsoft Identity Manager (MIM) for management to Active Roles. Red Forest has been a quite complex architecture to secure a multi-forest environment which is managed using Microsoft Identity Manager. Microsoft Identity Manager Service Pack 2 is announced EOL for 2026 and also Microsoft’s ESEA recommendation has changed. Going forward the Shadow Principal Permissions handled by MIM can no longer fully be managed including approval workflows. Therefore, companies are looking at easier ways to secure and manage their Microsoft on-premises and Cloud environments.

    Behavior Driven Governance

    Dr Stephan Hausmann: IGA Principal, One Identity

    Markus Weiss-Ehlers: Program Manager Consultant, One Identity

    Learn how event data from other One Identity solutions can trigger attestation campaigns and detect policy violations.

    Behavior Driven Governance in Identity Manager for SAP

    Abdullah Ahmad: Senior Solutions Architect, One Identity

    Cengiz Tuztas: EMEA Presales Manager, One Identity

    In this session, we will apply the topic of Behavior Driven Governance to the target system SAP ABAP (ERP, S/4HANA, HCM, CRM, ...). We will no longer only look at whether a user has used the SAP ABAP application in general but at the actual use of transaction codes. A user can have many authorizations assigned in an SAP system. To reduce the risk, we take the transaction usage data (ST03N) as a basis and see if the user has executed transactions that he has access to via the assigned ABAP roles. If no transactions of an assigned role are not used in a certain period, the attestor can reject the assignment of the ABAP role and this assignment will be automatically removed from the user. This streamlines the number of rights assigned and reduces risk.

    Just-in-Time Privilege for Safeguard and Active Roles

    Reto Bachmann: Senior Principal Solution Architect, One Identity

    Josef Pernecky: Technical Sales Engineer, One Identity

    This session will take you step-by-step through the configuration of Just-in-Time provisioning for Safeguard using Active Roles. Another section of this session will show the automated provisioning and linking of Active Directory admin accounts to Safeguardapplications. This session will show you how it can be achieved.

    One Identity Products Deployed on Azure

    Gert-Jan de Jong: Presales Engineer, One Identity

    Michiel Simon: Sales Engineer, One Identity

    This session will focus on the considerations for and deployment of Identity Manager and other One Identity products on Azure. You will get tips and advice if you think about deploying Identity Manager in your own Azure tenant. You will learn about features that are part of Azure which can be useful for Identity Manager deployments, like load balancing, redundancy, managed database instances, running containers etc. Apart from Azure as infrastructure you will learn about the Azure integration as a target system that goes beyond the standard connector.

Friday

Friday, September 22
  • Beginner Guide to Identity Manager Angular Portal Customizations

    Serdar Tuztas: Sales Engineer, One Identity

    Arthur Wandersman: Sales Engineer, One Identity

    Introduction of the Identity Manager Angular web portal has changed the way we do customizations.

    Now customizations require some knowledge of Angular, TypeScript, JavaScript, Node JS, Git, .Net (for API server). It is also helpful to have some familiarity with Visual Studio and VS Code.

    In this session we’ll present step-by-step instructions on the following topics: 

    Creating work environment including installations 

    Overview of generic Debug/Modify/Deploy steps

    Overview of work with Api Server REST Api

    1. Executing REST methods and viewing data using swagger
    2. Using Postman to execute Api Server methods

    Simple modifications

    1. Change logo color and image
    2. Show additional columns for Dynamic Roles

    Advanced Api Server modifications

    1. Building and deploying custom plugin with methods that use IM script and Predefined SQL.

    Advanced Web Portal modifications:

    1. Adding columns to various pages
    2. Add “Terminate” button
    3. Add base plugin component
    4. Modify base plugin component to display logged in user personal data
    5. Add custom plugin component calling custom Api Server plugin.

    Complete code of the topics will also be provided for further study.

    Enhancing Authentication Flows Through SmartHooks

    Marc Maguire: Solution Architect, One Identity

    Torsten Westphal: Sales Engineer, One Identity

    Out of the box authentication flows are great; but what if you want to take it to the next level of customisation and build truly unique flows that work for your business? Join us to dive into how you can use the OneLogin pre-authentication Smart Hooks to build bespoke user authentication journey's for your employees and customers - taking device heuristics, geolocation and other factors into account.

    Safeguard and Azure From Managing Accounts to Single-Sign On

    Josef Pernecky: Technical Sales Engineer, One Identity

    Holger Weihe: PAM Principal, One Identity

    Learn about the Azure integration into Safeguard for Privileged Passwords and Safeguard for Privileged Sessions. See how we can manage accounts and users in Azure and enable seamless Single-Sign on via Safeguard Remote App Launcher. A sneak peak of other Cloud services like AWS S3 and Google Workspace will also be part of this Deep Dive.

    Starling Connect for Safeguard Assets

    Josef Pernecky: Technical Sales Engineer, One Identity

    Holger Weihe: PAM Principal, One Identity

    This session is focusing on managing disconnected Assets in the Cloud with Starling Connect for Safeguard Assets. Learn how to deploy and configure Starling Connect for Safeguard Assets

    Beyond HR-Driven Identity

    Marc Maguire: Solution Architect, One Identity

    Torsten Westphal: Sales Engineer, One Identity

    HR data is both a valuable and reliable source of information for onboarding users, but how do you take this to the next level and ensure users are who they say they are? How can you take advantage of utilising next-generation technologies to build a robust and secure environment? Join us for this deep dive to discover how you can onboard beyond the HR Identity and integrate technologies such as identity verification and self-soverign identity in your environment.