Melbourne Identity, Authentication and Access Management Summit 2024
Join us at the Identity and Access Management Summit in Melbourne to explore the latest in security and compliance with expert-led sessions and interactive discussions. Connect with peers, tackle real-world IAM challenges, and leave with practical insights to strengthen your organisation’s digital identity strategy.
Welcome to the Identity and Access Management Summit in Melbourne, a premier gathering for professionals dedicated to advancing security and compliance.
Attendees will engage in a series of expert-led sessions and interactive activities designed to tackle current challenges and future opportunities in identity and access management.
Highlights include:
- Implementing the Australian Digital Identity Bill
- Managing security with access controls
- Demonstration sessions showcasing real-world solutions to industry challenges
- A dynamic debate on centralised versus decentralised IAM solutions
- Unifying identity management across hybrid and multi-cloud environments
This summit promises to equip attendees with the insights and tools needed to navigate the complexities of modern identity management.
Join us in Melbourne on Wednesday 16th October 2024 to connect with peers, enhance your IAM strategies, and lead your organisation towards a secure digital future.
Step into the forefront of identity evolution, and register today!
Program Highlights
Speakers
Sessions
IAAM Leaders
Conference Track
Our Speakers
Agenda
Explore how evolving legislation, including the Australian Digital Identity Act and updates to the Australian Privacy Act, will shape the future of identity and access management.
- Understanding the impact of the Australian Digital Identity Act and proposed reforms to the Australian Privacy Act on digital identity frameworks
- Preparing for compliance: Key strategies to align IAM practices with emerging legislative requirements
- Balancing security, privacy, and accessibility in response to new regulations
- Navigating the complexities of ensuring privacy protections for individuals while enabling seamless digital identity experiences under new laws
Sixty per cent of adult Australians have their personal data on the dark web. $2,7bn in scams last year. $60bn of fraud. Hack after hack, excuse after excuse. We’ve had enough - it’s time for Australian citizens to demand more. We should be in control of our own Identity. Well that time is now...
The Digital ID Law is enacted on the 1st December and the Trusted Exchange will go live shortly after. This lays the foundation for a better future - but what exactly does a better future look like
Join our expert panelists to embark on a journey of what is possible with Digital ID. Fast forward 10 years, how will citizens and consumers interact with enterprises and government services? What other countries have built something similar and what can we learn? And more importantly, how do we get there? What are the tangible outcomes of this. Well, the theory suggests that it’s win / win. The citizen gets to control their own identity - Less identity theft - Easier interactions. All whilst the Enterprise reduces cost to verify - reduces liability of holding data - reduces cost to protect data - increases user experience and increases conversion rates…It all sounds too good to be true, is it?
Join us for our panel discussion on The Digital ID Revolution and all will be revealed!
IAM leaders and engineers delve into the technical challenges and best practices in building scalable, secure identity and access management solutions.
- Designing scalable IAM architectures that accommodate evolving security requirements
- Balancing security, performance, and user experience in engineering IAM solutions
- Implementing automation and AI in IAM workflows for enhanced efficiency and security
- Addressing the challenges of integrating IAM solutions with legacy systems and modern applications
In this innovative session, attendees will be faced with a series of scenarios that they may face in their roles. Attendees will discuss the possible courses of action with their peers to consider the ramifications of each option before logging their own course of action.
Results will be tallied and analysed by our session facilitator and results will impact the way the group moves through the activity.
Will we collectively choose the right course of action?
This 15 minute demonstration session will uncover privacy enhancing technologies (PET) that are helping enhance IAM practices. Take a tour of the trends and tools that are changing the game.
This session will uncover best practice to take IAM programs from strategy to execution. Learn how transformative identity programs can strengthen your security posture while bolstering your CX.
In this digital landscape, data serves as the essential foundation for organisations fuelling both decision-making processes and innovative advancements. However, managing and securing data is becoming increasingly complex. This is where the integration of Artificial Intelligence (AI) and Identity and Access Management (IAM) comes into play, offering groundbreaking solutions to these challenges. Join us to explore how AI and IAM are revolutionising data management and security, enhancing data access, and protecting vital information.
- Enhanced Data Security: Help prevent unauthorised access and potential data breaches, ensuring that sensitive information remains secure
- Streamlined Data Access: Improve efficiency and enhance the user experience by reducing friction in accessing critical information
- Adaptive Authentication: Provide seamless access from trusted devices and locations, while suspicious activities trigger additional verification steps
- Compliance and Auditability: Ensure access to data is controlled and monitored, providing detailed audit trails that help organisations meet regulatory requirements and avoid penalties
- Data Integrity and Accountability: Ensure that only authorised users can modify data, maintaining its integrity and providing a clear audit trail essential for accountability and transparency
- Future-Proofing Data Management: Offer scalable solutions that can adapt to the growing and changing needs of organisations, ensuring that data management and security practices remain effective and relevant in the face of emerging threats and challenges
Choose 1 topic to join on the day!
- Empowering Users, Securing Data with Self-Sovereign Identity
- The Future of Identity
- Creating Access Protocols that Enable Workflows While Protecting Sensitive Data
- Preparing for the Digital Identity Act
- Zero trust in action: Implement and Measure its Impact on Your Business
- Enhanced Fraud Detection and Compliance with Innovative Digital Identity Management
- The Future of Passwordless Authentication
- How to Recruit and Upskill to Ensure You Have the Talent You Need
Experts explore strategies for creating secure, user-centric identity services by balancing innovation, security, and user experience.
- Balancing innovation with security to enhance user experience in identity services
- Implementing user-centric identity applications that integrate seamlessly with existing systems
- Collaborating across teams to integrate security into the design process
- Using adaptive and cutting-edge technologies like biometrics to create flexible, scalable, and secure identity solutions
- Addressing industry-specific challenges in implementing robust and innovative IAM services
Recent legislative changes, the emergence of more sophisticated data attacks and heightened reliance on data driven decisioning are transforming Australia’s digital identity landscape, prompting debate over their impact on privacy, security, and innovation.
- Are recent legislative changes strengthening data security, or simply adding bureaucratic hurdles?
- Should data laws be even more stringent in Australia to protect privacy?
- Are Australians ready to embrace a unified digital identity, or is distrust a bigger barrier?
- Is it possible to maintain privacy as an Australian citizen anymore?
Who Attends?
Chief Information Security Officer
Chief Technology Officer
Chief Risk Officer
Chief Information Officer
Chief Compliance Officer
Heads of IAM
Cybersecurity Directors
Head of Cybersecurity GRC
Head of Know-Your-Customer (KYC)
Head of Anti-Money Laundering
Senior IAM Managers
Senior Cybersecurity Managers
Senior Authentication Managers
Senior GRC Managers
Senior PAM Managers
Access Control Managers
UX & Digital Product Managers
Senior CIAM Managers
Directory Services Manager
Access Management Lead
IDaaS Manager
Benefits For Attendees
Event Location
Metropolis Events Melbourne
FAQs
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique.
Get In Touch
Contact our event team for any enquiry
Danny Perry
For sponsorship opportunities.
Lili Munar
For guest and attendee enquiries.
Ben Turner
For speaking opportunities & content enquiries.
Taylor Stanyon
For event-related enquiries.