live-events.sailpoint.com Open in urlscan Pro
13.32.121.47  Public Scan

Submitted URL: http://view.sailpoint.com/NjI2LUxUTy0xNzcAAAGVHVTj07SSdCFiSCm3fad1TPokV7O8wGvrlBPPRNsJjp7rA0wGAnY5j77suplqX2PzURCYvHE=
Effective URL: https://live-events.sailpoint.com/event/d0e97d73-2b11-4aa5-94f8-631cd669dfdd/websitePage:1223a4db-49c5-418e-a45d-c4ebc4084cd3?mkt_...
Submission: On August 23 via manual from IN — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Skip to main content
Agenda tab
Register Now
Already Registered?



AGENDA

Here's what's scheduled for the event. Click on session titles to learn more.

All Dates 
19/11-21/11 


Tuesday 
19/11 

Wednesday 
20/11 

Thursday 
21/11 

Filters


Search

19 November 2024
12:00 GMT
REGISTRATION AND INFORMATION

12:00-17:00
Registration
Registration will be open daily. Please keep in mind your conference badge will
be required to enter any activity on or off property.

17:30 GMT
WELCOME RECEPTION

17:30-19:00
Reception

Please join the SailPoint team in the Expo hall for drinks, canapes and
networking with your peers.


20 November 2024
08:00 GMT
BREAKFAST AND EXPO

08:00-09:00
Meals
REGISTRATION AND INFORMATION

08:00-17:00
Registration
Registration will be open daily. Please keep in mind your conference badge will
be required to enter any activity on or off property.

09:00 GMT
WEDNESDAY GENERAL SESSION KEYNOTE: IDENTITY SECURITY: INNOVATION REALISED

09:00-09:25
Keynote

Innovation cannot be a buzz word. It must deliver real business value and drive
significant impact. In identity security, realised innovation is tablestakes.
The velocity, volume and variety of changes impacting today’s enterprise and
their digital identities is monumental and the cost of inaction far too great.
With innovation that exceeds these market dynamics, this session reveals how
“bending the curve” in identity security can totally transform today’s
enterprise– faster, at scale, and with utmost security in mind.


MATT MILLS

President, Worldwide Field Operations 
SailPoint 
09:25 GMT
WEDNESDAY GENERAL SESSION KEYNOTE: REWRITING THE ENTERPRISE SECURITY PLAYBOOK
WITH IDENTITY SECURITY

09:25-09:50
Keynote

Identity has become the new frontier of security in today’s world of digital
interconnectedness. While the new era of identity security with AI presents
opportunities to elevate efficiencies, it also shows new sets of unknowns and
risks. To address these growing risks, we will present a vision for the future
where identity is not just protected but empowered. This session will explore
how we are rewriting the enterprise security playbook with identity security and
creating new opportunities in this new era, delivering innovations in identity
security, and enabling organisations to secure and grow with new capabilities
for the future.


BEN CODY

SVP, Product Management 
SailPoint 
10:00 GMT
WEDNESDAY GENERAL SESSION KEYNOTE: THE IDENTITY SECURITY JOURNEY – VIEW THE
HORIZONS

10:00-10:25
Keynote

The identity security landscape is rapidly evolving, driven by factors such as
digital transformation, cloud adoption, remote work, and increasing cyber
threats. The fast-moving identity security journey includes identifying gaps,
access risk exposure, understanding business needs and capabilities, monitoring
and assessing effectiveness and fostering a security culture for the future.
This session dives into the status of identity security today and what the
future holds with the new 2024 Horizons of Identity Security report. We will
walk through our own exciting implementation of moving to a higher horizon,
share best practices and insights.


WENDY WU

Chief Marketing Officer 
SailPoint 
10:25 GMT
NETWORKING BREAK AND EXPO

10:25-10:55
Expo
11:00 GMT
DEMYSTIFYING CIEM: ENHANCING IDENTITY SECURITY CLOUD TO SECURE AWS, AZURE, AND
GCP IAAS ENTITLEMENTS

11:00-11:40
Breakout
Infrastructure-as-a-service (IaaS) is engrained in every organization’s
ecosystem. However, most organizations do not have a clear understanding of who
or what is accessing their cloud resources. This lack of visibility into cloud
entitlements creates governance and organization challenges for IAM teams. Join
us to learn how SailPoint Cloud Infrastructure Entitlement Management (CIEM)
solves this problem by bringing cloud entitlements information into SailPoint
Identity Security Cloud. In addition, you will learn about common IaaS access
models, see how Identity Security Cloud capabilities enable governance of cloud
complexity with CIEM data, and get a glimpse into the future of SailPoint CIEM.

MOVING FROM IDENTITY GOVERNANCE TO IDENTITY SECURITY

11:00-11:40
Breakout
The landscape of identity management has evolved significantly, moving beyond
traditional governance frameworks towards a more dynamic approach focused on
identity security. This transition reflects a paradigm shift from static
processes and compliance checks to proactive measures that safeguard identities
across an ever-changing digital landscape. By embracing AI and automation
organizations can benefit from these predictive and proactive approaches. This
session will demonstrate how AI-driven insights and automated responses can
enhance an organization’s ability to anticipate and mitigate identity threats
before they impact their business.

REVOLUTIONISING PRIVILEGED ACCESS WITH SAILPOINT GPAM AND PRIVILEGED TASK
AUTOMATION

11:00-11:40
Breakout

All IT processes involve an IT expert interacting with a shared system or device
using admin rights. Many of these tasks are repetitive and often lack a complete
audit trail. In cases where scripts are used to accelerate execution, the
privileged credentials needed could be hard-coded and potentially at risk of
compromise. 

Privileged Task Automation helps you enhance accuracy, efficiency, and
governance by automating and delegating the execution of repeatable privileged
tasks without handing out privileged credentials. It integrates with several
credential vaults and leverages the Identity Security Cloud workflows engine to
remove friction and improve security. 

This session covers SailPoint’s approach to enabling authorized individuals to
execute privileged activities while maintaining least privilege. Learn how to
empower your teams while securing privileged credentials and applying identity
lifecycle and governance controls to the entitlements used to execute privileged
tasks.


SECURE YOUR ORGANISATION’S SENSITIVE INFORMATION WITH DATA ACCESS SECURITY

11:00-11:40
Breakout
This session will provide an overview of Data Access Security’s core data
governance capabilities with a focus on the integrated Identity Security Cloud
features. The speakers will discuss key governance functionality for identity
security teams and actionable next steps to help current SailPoint customers and
prospects keep their sensitive data safe. This session will also include a
review of our vision and product roadmap for securing both unstructured and
structured data. Attendees will walk away with a thorough understanding of how
to leverage SailPoint’s integrated data governance capabilities to minimize
sensitive data risks and reduce over-provisioning.

11:50 GMT
ACCELERATING APPLICATION ONBOARDING IN IDENTITY SECURITY CLOUD WITH AI

11:50-12:30
Breakout

Expediting time-to-value is a critical requirement for a successful identity
security program.  Scalable application onboarding Is a major step towards
achieving value from your identity security solution.Without effective tools and
processes, customers may be presented with unplanned challenges and speedbumps
that prolong both time-to-value and the return on their investment.

In this session, we will discuss SailPoint application onboarding, an Identity
Security Cloud capability to streamline and accelerate the customer application
onboarding process. SailPoint application onboarding is powered by the infusion
of artificial intelligence into the process, beginning with the discovery of
applications all the way through the configurations required to ensure
applications are subject to the full array of SailPoint identity security
capabilities.


FROM PAST TO FUTURE: A COMPREHENSIVE GUIDE TO MACHINE IDENTITY SECURITY

11:50-12:30
Breakout
In this session, we will explore the complex issue of machine identities,
examining historical solutions, pitfalls, and lessons that have influenced
current best practices. Our discussion will include a detailed look at the
evolution of machine identity security, highlighting how organizations have
managed and protected these identities in the past. We'll delve into the
security challenges and vulnerabilities that have emerged, and how they've
shaped the development of identity management frameworks. We’ll also focus on
SailPoint’s Machine Identity Security, and our thinking about machine identity
lifecycle management, secure provisioning, and the role of automation in
maintaining their integrity. By the end of the session, participants will gain a
comprehensive understanding of machine identity security, from its historical
context to its current implementation and future trajectory.

IDENTITY MODERNISATION - A HITCHHIKERS GUIDE TO GETTING THE JOURNEY STARTED

11:50-12:30
Breakout

From assessment to production, what are the steps and phases of a journey from
IdentityIQ to Identity Security Cloud.


UNLOCKING DELEGATED ADMINISTRATION IN IDENTITY SECURITY CLOUD: SAILPOINT'S NEW
SEGMENTATION

11:50-12:30
Breakout
Maintaining least privilege is something that should not only happen with the
identities and access you manage, but should extend to the tools and controls
that manage the management of that access. By adding strong management controls
to identity systems organizations can improve privacy, add domain
sub-administration, and deliver least privilege best practices across their
entire solution. Join us to learn more about this new capability in SailPoint
Identity Security Cloud.

12:30 GMT
CONFERENCE LUNCH

12:30-14:20
Meals
14:30 GMT
DRIVING SUPERIOR GOVERNANCE DECISIONS WITH CLEAR DATA AND AI

14:30-15:10
Breakout
The quality of decisions made by your business users when they request, approve,
and certify access depends largely on the richness and usefulness of the
information available to them. Identity Security Cloud’s features, from GenAI
descriptions to automated identity filtering to AI recommendations, can guide
them in the right direction. Having quality data in the right places also
matters. Learn key steps you can take to set your users up for success in
helping you achieve exceptional security outcomes.

WHAT'S NEW AND UPCOMING IN IDENTITYIQ - ROADMAP SESSION

14:30-15:10
Breakout
SailPoint continues to invest and drive innovations in IdentityIQ to help
customers in their identity security journey. Come check out what is upcoming in
the IdentityIQ 8.5 release and our future vision.

15:10 GMT
NETWORKING BREAK AND EXPO

15:10-15:40
Expo
15:45 GMT
WEDNESDAY GENERAL SESSION CUSTOMER KEYNOTE: BECOMING THE BEST-CONNECTED BREWER
WITH IDENTITY AT THE CORE OF THE ENTERPRISE SECURITY

15:45-16:15
Keynote

Coming soon


16:15 GMT
WEDNESDAY GENERAL SESSION. GUEST KEYNOTE: IDC

16:15-16:45
Keynote

Coming soon.


19:00 GMT
CONFERENCE PARTY

19:00-22:00
Conference party

Please join the SailPoint team in the expo hall for an evening of drinks, food,
music and networking with your peers.


21 November 2024
08:00 GMT
REGISTRATION AND INFORMATION

08:00-16:00
Registration
Registration will be open daily. Please keep in mind your conference badge will
be required to enter any activity on or off property.

08:30 GMT
BREAKFAST AND EXPO

08:30-09:20
Meals
09:30 GMT
THURSDAY GENERAL SESSION KEYNOTE: IDENTITY SECURITY: TRANSFORMED

09:30-09:55
Keynote

Enterprise security is in the middle of a fundamental shift. From protecting the
perimeter to protecting the core. That core today is all about identity. The
reason? It only takes one compromised identity to unravel the security of
today’s enterprise. That single identity “thread” has forced enterprise leaders
to rethink their entire security strategy. And it’s those leaders who embrace
the inside-out – or identity-centric – approach to security who are rewarded.
With secure business operations. With empowered workforces. With confidence that
not a single identity thread is left unattended – no matter what kind of
identity, no matter what type of access. Walk away from this session armed and
ready to transform your business with the next evolution in identity security,
driven by SailPoint as your trusted partner.


MARK MCCLAIN

Chief Executive Officer & Founder 
SailPoint 
10:00 GMT
THURSDAY GENERAL SESSION KEYNOTE: CUSTOMER AWARDS AT NAVIGATE LONDON 2024

10:00-10:30
Keynote

At SailPoint, we know that when our customers succeed, we succeed. That’s why we
value their stories and journeys as much as ours, and love when they raise their
hands to share their expertise and success. Every year we honour a select number
of global customers who represent SailPoint’s core values and who demonstrate
that identity security is essential to their business. This year we will being
giving awards in the following categories: Identity Security Champion, Digital
Transformation MVP, and Admiral of the Year. Navigate wouldn’t be complete
without our customer awards program and we look forward to celebrating with the
winners!


MEREDITH BLANCHAR

Chief Customer Officer 
SailPoint 
10:30 GMT
NETWORKING BREAK AND EXPO

10:30-11:00
Expo
11:00 GMT
CAEP, RISC, AND SCIM EVENTS— THE SHARED SIGNALS FRAMEWORK AND REAL-TIME IDENTITY
SECURITY

11:00-11:40
Breakout

Identity and security professionals have more choice than ever in how to secure
their environments. At the same time, complexity in integration and
communication has exploded. Security vendors, even if they solve a particular
problem flawlessly, often can’t (or won’t) share their information with other
parts of the environment. This siloed approach limits value, increases security
risk, and slows the adoption of Zero Trust. 

Identity needs a new approach; one that breaks down these siloes and allows
information to be shared in near real-time. We’ll describe the emerging standard
called the “Shared Signals Framework” that seeks to simply, consistently, and
scalably share events, making security easier and more robust.

Come learn about the standard, hear about the ongoing interops proving its
value, and hear how it transports various event types such as Continuous Access
Evaluation Protocol (CAEP), Risk Incident Sharing and Coordination (RISC), and
an event-based approach to SCIM.


MANAGING BUSINESS PARTNERS AND THIRD-PARTY IDENTITIES WITH NON-EMPLOYEE RISK
MANAGEMENT

11:00-11:40
Breakout

Through its collaboration portals, SailPoint Non-Employee Risk Management (NE)
provides an out-of-the-box solution for business partners to initiate the
onboarding of contingent workers to an organisation, easing the burden on HR and
other stakeholders without exposing the organisation to increased risk. 

In this session, we will discuss where business partners (and other third
parties, like vendors, service providers, affiliates, etc.) fit in with Identity
management and governance, and how Non-Employee Risk Management, along with
Identity Security Cloud, can address these use cases.

 * Best practices for managing business partners with Non-Employee Risk
   Management
 * How business partners can leverage NE Portals
 * End-to-end flow from business partner/vendor/self-service contractor
   registration to that contractor’s access being managed in Identity Security
   Cloud.


REIMAGINING TRUSTED ACCESS, SAILPOINT‘S ITDR SOLUTION

11:00-11:40
Breakout

The recent surge in identity-based attacks has created a pressing need for
modern enterprises to adopt solutions that can adapt to the ever-changing nature
of access without causing unnecessary obstacles or operational expenses. As a
result, identity and security teams are required to collaborate more efficiently
to pinpoint, identify, and counter potential threats.

SailPoint's introduction of Identity Threat Detection and Response (ITDR)
exemplifies its ongoing market leadership and redefinition of Identity Security.
In our upcoming session, learn how SailPoint is addressing this challenge by
expanding governance to encompass real-time evaluation of access, allowing for
early detection of potential threats and appropriate response.


SAILPOINT CONNECTIVITY AND INTEGRATIONS ROADMAP

11:00-11:40
Breakout

In this session, we will present the roadmap for SailPoint Connectivity and
Integrations. We will cover connectivity for both IdentityIQ and Identity
Security Cloud, as well as recent and upcoming releases in the areas of:

 * Platform connectivity
 * Strategic integrations
 * SaaS connectivity
 * Extensibility
 * Accelerated application onboarding

Come learn more about how the Atlas platform enables comprehensive identity
security coverage of our customers’ enterprise application landscapes.


11:50 GMT
ACCESS INTELLIGENCE CENTER: BUSINESS INTELLIGENCE ANALYSIS IN IDENTITY SECURITY
CLOUD

11:50-12:30
Breakout
Join us for a deep dive into SailPoint's Access Intelligence Center (AIC), your
key to unlocking valuable insights and optimizing your identity and access
management (IAM) program. We'll guide you through AIC's core functionalities,
from pre-built reports and customizable sheets to advanced machine learning
analysis types for nuanced data visualization. Explore how to identify trends,
conduct granular analysis, and leverage AIC's roadmap to stay ahead of the curve
with upcoming enhancements. By the end, you'll be empowered to transform AIC
into a strategic asset, ensuring the health and efficiency of your
organization's IAM landscape.

ANCHORS AWEIGH: NAVIGATING IDENTITY SECURITY WITH SAILPOINT'S MSP ADVANTAGE

11:50-12:30
Breakout
Discover how SailPoint's Managed Service Provider (MSP) program transforms
identity security. During this session, we will explore SailPoint's MSP program,
explore its value, and highlight key benefits such as enhanced efficiency and
availability of resources and expertise. Hear from customer real-world
experiences and dive into compelling use cases that showcase the program's
success in achieving robust security and compliance. Join us to learn the power
of leveraging SailPoint's MSP program to revolutionize your identity security
strategy.

HOW ENHANCED DATA CONTEXT SIMPLIFIES COMPLIANCE AND IMPROVES ACCESS DECISIONS:
REAL-WORLD EXAMPLES

11:50-12:30
Breakout
In this technical session SailPoint’s Principal Solution Consultant for data
security will show you how to easily leverage Identity Security Cloud and Data
Access Security to get better visibility into data access, certify sensitive
data, and remediate risky access. We’ll cover the key benefits of Data Access
Security and walk through three real-world examples of how organizations can
discover and classify regulated data to govern and continuously secure that
sensitive data access across the organization. This will be an ideal session for
existing SailPoint customers and prospects looking to seamlessly extend their
governance of sensitive data as part of a holistic identity security program.

12:30 GMT
CONFERENCE LUNCH

12:30-14:20
Meals
14:25 GMT
MACHINE IDENTITY SECURITY: ONBOARDING YOUR MACHINE ACCOUNTS

14:25-15:05
Breakout
Attend this session to learn how to implement Machine Identity Security. First,
we'll use the Classification tool to tag machine accounts. Next, we'll use the
Mapping tool to set owners and machine identity relationships. Finally, we'll
make a few updates via the Account Management user interface. You'll be ready to
run your first Machine Account Certification by the time we're done!

SECURING SAP CLOUD TRANSFORMATION WITH SAILPOINT CONNECTIVITY

14:25-15:05
Breakout

SailPoint's Identity Security Cloud solutions for securing access to SAP—which
are in strategic partnership with SAP and align with the latest architectural
developments—cater to the specific needs of nearly every SAP-driven
organization. Using our cutting-edge cloud security services, we aspire to guide
and assist customers through this transformative period.

We invite you to engage in a conversation with us to explore the integration
landscape, methodologies, and roadmap that seamlessly harmonize with SAP's
vision. Our solutions are adept at navigating diverse SAP landscapes ensuring
the best value and quick return on your investments aligned with your unique
business, processes, and compliance requirements.

Join us to discuss SailPoint strategies and capabilities that bolster security
and compliance throughout your SAP ecosystem with our solutions that cover
Identity Security for critical SAP systems such as Ariba, S/4HANA, BTP,
SuccessFactors, Cloud Identity Directory, and beyond.


WHAT'S NEW AND UPCOMING FOR THE SAILPOINT IDENTITY SECURITY CLOUD AND
SAILPOINT'S SAAS OFFERINGS - ROADMAP SESSION

14:25-15:05
Breakout
Join us to learn all about the updates and new capabilities coming to the
SailPoint Identity Security Cloud and associated SaaS offerings to help your
enterprise secure and adapt to a changing threat landscape.

15:05 GMT
NETWORKING BREAK AND EXPO

15:05-15:35
Expo
15:45 GMT
THURSDAY GENERAL SESSION KEYNOTE: WHAT I WISH I HAD KNOWN ABOUT IDENTITY

15:45-16:15
Keynote

Some knowledge in life must be learned the hard way—a long slog of learning from
mistakes and dead ends—but identity doesn’t have to be one of them. Our panel of
identity veterans is here to help you unlock the pathway to identity success.
They’ll share their rookie blunders, near-misses, and unexpected
triumphs—experiences that made them into the experienced identity professionals
they are today. Pull up a chair, soak up some hard-earned insight, and be
reminded that even the most experienced identity professionals were once “new to
the game” (and are still learning.) Wit and wisdom intertwine in this
masterclass on identity.


MEREDITH BLANCHAR

Chief Customer Officer 
SailPoint 
16:15 GMT
THURSDAY GENERAL SESSION: CLOSING CEREMONY FOR NAVIGATE LONDON 2024

16:15-16:30
General Session

Please stay and join us as we wrap up Navigate London 2024 and share the details
of Navigate EMEA 2025


MARK MCCLAIN

Chief Executive Officer & Founder 
SailPoint 
STEVE BRADFORD

Sr. Vice President, Sales 
SailPoint