Skip to content

UPCOMING EVENTS


Identity Access Management (IAM) – Reducing Risk and Giving Better CX to Users: Chicago (Rosemont/O’Hare), Illinois

Strategies to ensure your IAM program enhances the customer experience.

April 1, 2025

9:00am-5:00pm

7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded

Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois

  


Overview

Identity continues to be foundational to cybersecurity and the running of your business from hybrid work to customer access. Conventional approaches to identity and access management (IAM) are no longer sufficient as organizations operate in an escalating threat environment where zero trust is a must-have.


What You Will Learn

  • Identity Leadership is a Marathon, Not a Sprint – Here’s the Map
  • Actionable Tips to Make Customer Identity a Business Enabler
  • Agentic AI for Identity: Smarter, Faster, and More Secure
  • Improving User Experience While Strengthening IAM Security
  • Beyond the Shadows: Securing the Next Frontier of Non-Human Identities
  • Dynamic Fraud Prevention Strategies – Grow Your Organization’s Bottom-Line Through Dynamic Fraud Prevention
  • Balancing Security, Compliance, and User Experience in IAM (Panel Discussion)

Conference Price: $349.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.


CONFERENCE AGENDA


8:00am – 9:00am: Registration and Continental Breakfast


9:00am – 9:50am: Improving User Experience While Strengthening IAM Security

George Roberts, Director, Global Identity and Access Engineering, McDonald’s Corp

As organizations implement IAM strategies to protect their systems and data, enhancing user experience often takes a back seat. This session will explore how to strike the right balance between security and usability. Attendees will learn about the latest IAM tools and techniques that not only reduce security risks but also create seamless, user-friendly experiences. Key topics will include frictionless multi-factor authentication (MFA), single sign-on (SSO), and adaptive authentication solutions that adjust to user behavior.

Roberts


9:50am – 10:20am: Refreshment & Exhibit Break


10:20am – 11:10am: Identity Leadership is a Marathon, Not a Sprint – Here’s the Map

David Lee, Field CTO, Saviynt

So, you’re leading an IAM program… Now what? Whether you were voluntold into this role or have been championing identity for years, one thing is clear—identity leadership isn’t about technology alone; it’s about influence, strategy, and execution. In this session, we’ll break down the three stages of IAM leadership—The New Guardian, The IAM Strategist, and The Identity Visionary—and what it takes to succeed at each level. Expect real-world insights, practical takeaways, and a roadmap to ensure your IAM program doesn’t just survive, but thrives.

Lee


11:10am – 12:00pm: Actionable Tips to Make Customer Identity a Business Enabler

Karim Dhanji, Sr. Solutions Engineer, Descope

Customer identity management can make or break a business. Adding undue friction can lead to churn as users struggle with passwords, long login forms, or high-friction MFA. At the same time, not adding secure authentication controls can lead to credential theft and loss of customer trust.

In this session, get insights from 100s of CIAM deployments to see how going passwordless impacts user conversion, how users are responding to methods like passkeys, social login, and One Tap, and how adding security controls at the right time is better than adding them every time.

Dhanji


12:00pm – 12:40pm: Lunch and Exhibit Break


12:40pm – 1:30pm:  Dynamic Fraud Prevention Strategies – Grow Your Organization’s Bottom-Line Through Dynamic Fraud Prevention | Reduce the cost of fraud with dynamic security solutions that don’t sacrifice user experience or operational efficiency.

Zee Alsayag, Sr. Sales Engineer, Ping Identity

New account fraud and account takeover are persistent problems for CIOs and CISOs because fraudsters are constantly evolving their tactics, requiring security teams to adapt rapidly while maintaining user-friendly experiences. The cost of fraud is high. The fear of data breaches and the potential financial and reputational damage they cause keep CIOs and CISOs awake at night, as does the pressure to balance stringent security measures with smooth customer experiences. CIOs and CISOs might cite budget constraints, legacy infrastructure complexities, and the potential for negative customer experience impacts as reasons for not fully achieving fraud prevention initiatives. This highlights the tension between security needs and organizational priorities.

Key Takeaways –

At this session we will review how you can differentiate genuine users from potential fraudsters and prevent account takeover attempts while minimizing friction for legitimate users by:

  • Strengthen security during account creation by validating government-issued IDs and using liveness detection to verify user identities.
  • Analyze user behavior, device information, network signals, and more to detect anomalies.
  • Assign risk scores that trigger security measures when necessary.
  • Integrate with existing fraud prevention systems and security tools for a comprehensive approach to fraud detection and mitigation.

Alsayag


1:30pm – 2:20pm: Agentic AI for Identity: Smarter, Faster, and More Secure

Matt Chiodi, Chief Trust Officer, Cerby

Agentic AI is emerging as the next big shift in identity security, but what’s hype and what’s real? Today’s tools still rely on manual work and standards-based integrations, leaving gaps that attackers exploit and IT teams struggle to manage. This is where AI-driven solutions step in to automate workflows, secure access to any app, and adapt to threats in real time. But where can it add the most value, and what should IT and security leaders be watching for? In this session, we’ll break it down in clear, practical terms—what’s possible today, what’s coming next, and how to prepare for the future of identity security.

Chiodi


2:20pm – 2:50pm: Refreshment & Exhibit Break


2:50pm – 3:40pm: Beyond the Shadows: Securing the Next Frontier of Non-Human Identities

Alex Flores, Senior Solutions Engineer, Astrix Security

The identity security landscape has evolved, but are we keeping up with the new attack vectors? Organizations have made significant progress in securing human identities with MFA, passwordless authentication, and behavior-based policies, but non-human identities (NHIs) remain a critical blind spot. As NHIs—from service accounts to API keys to ephemeral cloud resources—become more embedded in modern infrastructure, they are increasingly exploited by attackers who recognize their weak security posture.

  • This session will move beyond defining NHIs and instead focus on:
    • Real-world breaches where NHIs were the attack vector
    • The shifting role of NHIs—from technical oversight to business risk
    • How NHIs evade traditional IAM frameworks and why existing controls fall short
    • A proactive approach: Adaptive access controls, behavior-based anomaly detection, and automation strategies to mitigate NHI risk
    • The future of NHI security and what practitioners need to prioritize in 2025

Flores


3:40pm – 4:30pm: Balancing Security, Compliance, and User Experience in IAM (Panel Discussion)

In this interactive panel discussion, experts from the IAM field will address the challenges of balancing security, regulatory compliance, and user experience. With increasing pressure to safeguard data while adhering to privacy laws and industry regulations, how can organizations ensure their IAM solutions meet all these demands? The panel will cover topics such as compliance-driven IAM implementations, reducing friction in user authentication, and the role of IAM in building trust with customers. Attendees will have the opportunity to ask questions and learn from the panelists’ real-world experiences in various industries.

Moderated by David Lee, Field CTO, Saviynt


Panelists will include:

  • Stephen Mai, Director, Identity Security, Clarios
  • Shan Moosa, Enterprise Security Leader of Cybersecurity & GRC, West Monroe
  • Troy Stairwalt, CISO and Adjunct Faculty, State of Wisconsin and University of Akron
  • Piotr Topor, Director of Information Security and Governance, LSC Communications 
  • Bill Verzal, Principal Cybersecurity Engineer, Discover Financial Services
  • Other Identity Executives and Practitioners sharing strategies, tactics, and lessons learned

 

    

Lee                                            Mai                         Moosa           Stairwalt             Topor                  Verzal


Conference Price: $349.00 per person

Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.

Exhibits

As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.


CONFERENCE SPONSORS