UPCOMING EVENTS
Identity Access Management (IAM) – Reducing Risk and Giving Better CX to Users: Chicago (Rosemont/O’Hare), Illinois
Strategies to ensure your IAM program enhances the customer experience.
July 9, 2026
9:00am-5:00pm
7 CPE / 0.7 CEU / CISSP / 7 PDU Credits Awarded
Conference location: Donald E. Stephens Convention Center Rosemont (O’Hare) Illinois
Overview
Identity continues to be foundational to cybersecurity and the running of your business from hybrid work to customer access. Conventional approaches to identity and access management (IAM) are no longer sufficient as organizations operate in an escalating threat environment where zero trust is a must-have.
What You Will Learn
In this one day conference attendees will learn:
- Redefining Trust: Building a Strategic Identity Framework for the Modern Enterprise
- Integrating IAM with DevOps: Securing the Software Development Lifecycle
- IAM in the Era of Remote Work: Strategies for Managing Distributed Identities
- Leveraging Artificial Intelligence in IAM: Enhancing Threat Detection and Response
- Regulatory Compliance and IAM: Navigating the Complex Landscape
- Customer Identity and Access Management (CIAM): Balancing Security with Seamless User Experience
CONFERENCE AGENDA
8:00am – 9:00am: Registration and Continental Breakfast
9:00am – 10:00am: IAM as a Business Enabler: Balancing Security and Experience
IAM is no longer just a control function — it’s a strategic tool that protects the enterprise while enabling seamless user experience. This opening session explores how organizations can reduce risk without burdening users.
Includes:
- Aligning IAM with business priorities
- Balancing security controls with user convenience
- Avoiding friction while maintaining compliance
10:00 AM – 10:30 AM — Sponsor & Networking Break
10:30 AM – 11:30 AM: Modern Identity Governance: Streamlining Access Across the Enterprise
As organizations grow, managing access for employees, contractors, and systems becomes complex. This session covers modern Identity Governance & Administration (IGA) practices to reduce risk while improving operational efficiency.
Includes:
- Automated access lifecycle management (joiner, mover, leaver)
- Role-based and attribute-based access controls
- Simplifying certifications and compliance reporting
11:30 AM – 12:30 PM: The Fatal Silo: Why Separating Identity and Data Security Is Your Next Breach Waiting to Happen
Ammar Faheem, Product Marketing Director for Customer Identity & Access Management, Thales
The perimeter is dead, and the firewall has become irrelevant to the modern attacker. Yet, most organizations continue to treat Identity Access Management (IAM) and Data Security as distant cousins, operating in isolated silos with separate tools and strategies. This disconnect creates the ultimate blind spot for the enterprise: “Shadow Access” to “Shadow Data.” This session will confront the uncomfortable reality that while you are busy watching the network gate, attackers are already inside, using valid credentials to exploit data you didn’t even know was exposed.
Dissect the critical convergence of these two domains with Ammar, analyzing why “Identity-First Security” is the new mandate for survival. Moving beyond the buzzwords of Zero Trust, plus explore the tactical intersection of Data Security Posture Management (DSPM) and Identity Security Posture Management (ISPM). We will speak about why the most dangerous threat today isn’t the hacker breaking in, but the over-permissioned user—human or machine—who has seamless, unmonitored access to your organization’s crown jewels.
Join industry leaders as we map out the blueprint for a unified future. We will debate the necessary death of the silo, discuss how to operationalize the “Cybersecurity Mesh,” and provide actionable steps to build a context-aware security fabric. Don’t just manage identities and lock down data; learn how to fuse them into a single, intelligent shield that stops the breach before exfiltration begins.

Faheem
12:30 PM – 1:30 PM — Lunch & Exhibits
1:30 PM – 2:30 PM: IAM for the Modern Workforce: Supporting Hybrid and Cloud Environments
Hybrid work and multi-cloud environments require flexible, secure identity solutions. This session focuses on IAM strategies that reduce risk while ensuring users can work seamlessly from anywhere.
Includes:
- Cloud IAM vs. on-prem solutions
- Single Sign-On (SSO) and federation strategies
- Reducing shadow IT and improving access visibility
2:30 PM – 3:00 PM — Sponsor Break
3:00 PM – 4:00 PM: Managing Non-Human Identities and Privileged Access
Non-human identities, APIs, and privileged accounts introduce significant risk. This session covers best practices for governing these accounts without slowing innovation.
Includes:
- Privileged Access Management (PAM) for humans and systems
- Lifecycle and credential management for non-human identities
- Reducing risk in automated and service accounts
4:00 PM – 5:00 PM: Panel: IAM That Works for Both Security and Users
This interactive panel brings together IAM leaders to discuss balancing risk, compliance, and usability. Attendees will hear practical strategies, pitfalls to avoid, and lessons learned from real deployments.
Includes:
- Strategies for improving user adoption and experience
- Communicating IAM value to business stakeholders
- Real-world success stories and lessons learned
- Audience Q&A
Conference Price: $349.00 per person
Each attendee will receive a certificate awarding 7 CPE credits for CISSP continuing education, in addition to 0.7 CEUs and 7 PDUs. CISSP is a registered certification mark of (ISC)², Inc.
Exhibits
As is always the case at CAMP IT Conferences events, the talks will not include product presentations. During the continental breakfast, coffee breaks, and the luncheon break you will have the opportunity to informally meet representatives from the following sponsoring companies, who have solutions in the area of the conference.
