JOIN US AT CONVERGE ’19
Where Identity Meets Security
ARIA LAS VEGAS DECEMBER 8-9, 2019
REASON TO ATTEND
Saviynt Converge ’19?
The future of identity and security requires continual convergence of people, process and technology. We must manage the innovation of AI/ML, new types of identity, automation capabilities, and ever-increasing regulatory compliance requirements. Come explore these themes with organizational leadership, technical professionals, and domain experts at Saviynt’s third annual gathering of identity-focused security professionals, Converge 2019. Since our announcement at Converge 2018 of Cloud PAM—intelligent identity-driven privileged access management—Saviynt has continued to drive identity innovation in the pursuit of smarter security, and we want you to be a part of the innovation conversation.Register Now
CONVERGE ’19 PROGRAM
Converge 2019 includes an expanded roster of innovative presentations, real-world case studies, and technical bootcamp sessions. Explore the agenda below:
December 8, 2019
|1:00PM – 4:30PM||Identity Governance & Administration (IGA) Bootcamp Agenda||Mariposa 1|
|1:00PM – 4:30PM||Cloud Security Bootcamp Agenda||Mariposa 2|
December 9, 2019
SAVIYNT CONVERGE EXPERTS
Meet The Speakers
These 2019 speakers have inspired Saviynt to push boundaries and create exceptional customer experiences.
PMI-PMP Certified since 2008
CREATE YOUR STORY
Experience a New Approach to
Converge in 2019
Converge ’19 is all about being in the action, making those authentic connections that inspire new approaches and different solutions that make big things happen! This year we’ve created an immersive environment, one where you can connect and engage with your peers and our sponsors through a dynamically different Converge experience. Get ready to make your impact on this year’s memorable story.
CONVERGE ’18 Highlights
Bellagio Hotel, Las Vegas
In 2018, this forward-thinking group of identity-focused risk and security professionals gathered to discuss paradigm shifts in identity governance and what organizations can do to implement continuous, risk-mitigating controls across hybrid IT environments.
An effective Identity program should access risk at all levels in order to better govern cyber risk. Technologies such as Saviynt blend these capabilities into a unified solution, which aligns with where we see many of our clients headed.– Chirag Patel, Principal – Saviynt Solution Leader
Deloitte & Touch LLP
- Get clean and stay clean with Identity Analytics
- How to improve end-user experience and increase adoption
- Frictionless integration with your ITSM platform
- Expand the footprint of your IGA Implementation
- Key upcoming features to simplify your implementation
- Challenges in securing and governing multi-cloud ecosystem (IaaS, SaaS and PaaS platforms)
- Strategic themes in securing multi-cloud environments
- Saviynt’s solution for IaaS and PaaS risk visibility and compliance
- Unique challenges in managing privileged access in the Cloud
- Keyless and Password-less PAM for Linux and Windows workloads in AWS
- PAM for Database as a Service
- PAM for Salesforce
Saviynt’s leadership will kick us off with an exciting look at the evolution of identity and the future ahead of us. Converge means a coming together from different areas to meet at a central point, and that point is here and now. They’ll discuss the exciting waves Saviynt has been creating with our innovation, and unveil where we are headed to bring intelligent identity to everyone and have smarter security. With this converged solution, Saviynt delivers true #GovernanceForAll.
Sue Bohn from Microsoft Identity and Chris Richter from Avanade Security discover they are long lost cousins and share a common identity. Come with them on their journey. Their ancestors had to build trust through social connection and reputation but today it is much more complex as organizations grapple with digital transformation and the need for identity governance. They are partners working with customers on identity platform, governance solutions, and guidance on implementation. Learn how the combination of Avanade, Microsoft, and Saviynt allows customers to govern their identities and reduce cost and complexity, increase the speed of doing business, and reduce risk in this digital age.
For organizations with complex and overlapping identity personas, it is a constant struggle trying to correlate information silos to create one identity for each individual and provide contextual information for access and risk-based decisions. However, our panelists are solving this challenge with Saviynt. Come and hear our customers discuss how they are achieving One Identity for Life and streamlining their governance for users who occupy many different roles and relationships in their organization.
Organizations face a growing challenge interacting with partners and suppliers outside of the organization. With the dispersed nature of working with non-employees, no single department is responsible for defining and managing a centralized process. In this panel, you’ll discuss:
- The security consequences of not addressing an outdated business process
- How to manage business process and data effectively to deliver actionable decisions
- The benefits of an identity and business-process first approach to managing non-employees
Organizations have long viewed security as a business barrier, but it can be a business enabler when identity is placed at the core of business processes. Our panelists are weaving Identity Governance through their security fabric to facilitate digital transformation and streamline cloud adoption. They will discuss implementing IGA as the foundation to launch new initiatives.
Organizations are faced with an explosion of new, collaboration-focused SaaS apps and services, where it is increasingly becoming as easy to share resources with business partners as with employees. It is more challenging than ever to ensure timely access and productive collaboration while maintaining data security and access compliance. Attend this session to learn about what Azure Active Directory provides and what Azure Active Directory and Saviynt working together can provide to your organization.
With IGA as the foundation of identity-based security, organizations can take advantage of automation to bring applications and new functionality to the market with unprecedented speed and fine-tuned agility, gaining incremental ROI every time the governance landscape expands. Our panelists will discuss the growing speed of application integration and exponential increase in ROI that comes with broadening their IGA footprint.
As of last year 81 percent of enterprises already had a multi-cloud strategy in place, but there is a knowledge gap in how to ensure security in this new ecosystem. Data breaches dominate the press, proving that organizations need to do more to secure their digital transformation. Saviynt approaches cloud security, treating workloads, serverless functions, cloud databases and other cloud assets as identities to which policies could be applied to secure and govern. We also recognize how critical it is to control privilege access in an ephemeral environment , where controlling drift is so difficult. Come hear our panelists talk about how they are implementing cloud security with Saviynt.
A healthcare organization used Microsoft Teams and Saviynt to manage collaboration across geographies. This session explains how this organization how physicians and medical teams were able to collaborate securely through advanced collaboration and identity governance tools.
The three benefits we hear most often from our customers of Azure Active Directory are to reduce costs, improve security, and enhance user productivity. Come learn the top reasons why customers use Azure AD to gain greater visibility and control over users, apps, devices, and data. Hear the latest on how we’ve been building governance into Azure Active Directory to meet all your access and compliance requirements. Our customers’ solutions are very much complemented by partners who integrate with our platform and deploy our technology.
As organizations move critical workloads to cloud, the attack surface and risk exposure increases multi-fold. Learn how Saviynt is redefining PAM, by converging IGA with PAM, providing frictionless user experience with key-less or password-less and just-in-time privileged access . Also, learn how Saviynt builds a consolidated user and asset risk from all sources into a centralized identity hub, and extending the same to PAM workflows making the processes risk-aware. Built on cloud native technologies Saviynt’s next-gen PAM architecture is designed for scale and elasticity
Financial services organizations strive to ensure regulatory compliance to protect customer information while delivering exceptional, frictionless customer experience. Discover how Investors Bank, BNY Mellon, and Jefferies implemented and adopted Simeio’s IAM solutions to create positive customer experiences and foster a future-proofed IT environment.
Maintaining compliance and driving out risk is challenging in the dynamic cloud and hybrid ecosystems. Organizations need to pursue continuous controls and the AI/ML analytical capabilities of IGA to assist. Once an organization has a strong identity-based security foundation and continuous controls in place, it can achieve that pinnacle of Assured-Compliance-as-a-Service. Panelists already on this journey will discuss the challenges, benefits, lessons learned and progress toward reducing risk in digital transformation through implementing continuous compliance.
Insider attacks, these insidious threats, are the hardest to spot and the most damaging because they spring from trusted individuals and credentials. Access reviews don’t always reveal inappropriate insider activity, so modern solutions must be focused on analyzing user identity and user behavior. Identity Analytics and Intelligence (IAI) delivers near-real-time evaluation of anomalous behavior. This gives organizations the edge they need to stop insider attacks in their tracks. Infosys’s experience at understanding customer environments and risk couples with Saviynt’s Identity 3.0 to focus IAI on insider threats and help our panelists reduce the risk of a breach by an inside resource. Our customers and partners will explore the value of this converged solution, and we’ll discuss our roadmap for the future.
To simplify governance and ensure efficiency and security we must employ automation. We will show you how to automate review functions for segregation of duties, sensitive data, and firefighter during standard provisioning processes for applications and ERPs. You can speed up the process and lower your cost of compliance. Come learn how Saviynt’s latest addition to their solution, Cloud PAM, can help by managing and monitoring real-time access in your organization. We’ll look at integration between Saviynt Security Manager and other toolsets and share our implementation experiences with this and Legion Star’s accelerator toolkit, as well as sharing some view of upcoming capabilities to help your organization secure and govern while keeping the user in mind.
Network perimeter-based security is no longer effective because identity is the new attack vector. Given that organizations in 2019 have a 29% chance of experiencing a breach, the possibility exists that attackers are already inside your network and more than likely using legitimate credentials and known devices. Identity is the new perimeter and implementing IAM best practices significantly improves an organization’s security posture. Deploying Saviynt’s solution and integrating it with existing and new products allows companies to know not only “who has access to what” but also what they are doing with that access, helping them to implement smarter security.
The quality of identity data coming from directories is crucial to the governance process. Adding federated identity and virtualization facilitates more complete integration, increasing the value and efficiency of your IGA infrastructure. Using a federated identity and directory service with your governance solution enables you to:
- Virtualize the identity and security warehouse
- Curate and govern federated identity data to meet audit and compliance requirements
- Pre-integrate access data for quicker IGA deployment
Many enterprise leaders are adopting a hybrid cloud approach to help scale their organization efficiently. The benefits are clear, but the challenges are real. How do you automate tools across multiple tools and teams? What role does application intelligence play in maintaining a holistic approach across the cloud architecture? Join Jason Berland, Director of Fishtech Group’s Identity practice, to discuss the latest winning tech solutions in PMA, IGA, and more.
We don’t have a choice on whether we digitally transform, the choice is how well we do it. Leaders in this digital decade are made—not born. The key is not only understanding social media, IoT, mobile, AI, blockchain, but, more importantly, understanding how they work together. This session will give you tips and tricks on how to implement current and future digital trends to maximize your organization’s impact on the world.
Add value to your organization’s servicenow investment by integrating with Saviynt’s Identity Governance platform to create a unified user access request solution. Maximizing the strength of each platform effectively addresses the common challenges of implementing a comprehensive self-service user access request solution — challenges like poor end user experience, confusing/incomplete approval process, lack of closed-loop provisioning process, risk of approving and granting inappropriate access, and cumbersome regulatory audit reporting. Saviynt and Integral Partners have teamed up to overcome these common challenges through world-class technology and expert consulting services. Brent Andrewson, Senior Manager, Integral Partners LLC
Principal Solution Strategist – Saviynt
Adam Barngrover is an accomplished IdM Consultant and Sr. Solutions Architect with demonstrated success architecting and implementing high-level, corporate-wide IT initiatives for international organizations, education, healthcare, financial, and government agencies. He has over 8 years of IT experience encompassing the sale, design, implementation, and management of complex information system infrastructures in the identity and security management space. He has a track record for delivering quality solutions that leverage the right technology to achieve improved performance, reduced infrastructure and support costs, and an overall positive impact on the bottom line. He is accomplished at translating complex technical concepts into business friendly terms and business value.
Chief Executive Officer – Saviynt
Amit brings over two decades of industry expertise of helping organizations address identity, security and compliance challenges. As CEO of Saviynt, Amit provides strategic leadership to ensure that the mission and core values of Saviynt are put into practice. He also manages strategic customer and partner relationships. Previously, Amit served as COO of Saviynt, where he led sales, business development, alliances and go-to-market strategy. Prior to joining Saviynt, Amit held leadership positions at Infosys and HCL.
General Manager & Practice Head, Cybersecurity and Risk Services – Wipro Limited
Ashish Chandra is a seasoned Cybersecurity professional with over 21 years of global industry experience in consulting, advisory, pre-sales, business development, business process definition, solution architecture, design, implementation and production support. In his current role as Associate Partner & Consulting Leader, he leads 3 sub-practices – SSRC (Security Strategy and Risk Consulting), CSAR (Cyber Security Assessment and Response) and DAS (Data and Application Security) for India/South Asia market. He advises customers on their enterprise security needs, helps them build their security strategy and roadmaps and oversees delivery for large security programs. In his last role as Consulting Partner at Wipro, he was heading the Domain Security Solutions & Consulting Group for global markets. He led large Application security outsourcing deals and builds security solutions for different industry verticals. Some of the other key roles played at Wipro – Pre-sales Head, Solution Architect, Principal Consultant, Architect & Lead Designer.
North America Security Lead – Avanade Inc.
Chris Richter is Avanade’s Executive North America Security Lead. Most recently Chris was CenturyLink’s vice president of global security services, and was responsible for the company’s global managed and professional security services business. Prior to that he served as senior vice president, security services, at Level 3. With over 25 years of experience in IT, Chris has held a number of leadership positions in managed security, IT consulting, and sales with several technology product and services organizations. By helping organizations re-architect their risk management programs and security controls to outsourced, virtualized, and shared-infrastructure services, Chris has assisted numerous IT organizations lower their cybersecurity costs, while improving their overall defense posture. He has acted as both a board member and technical advisor for technology firms, and is a sought-after author and speaker on cybersecurity, risk management, security digital-transformation and IT outsourcing. He most recently contributed to the book “The Digital Big Bang,” published by Wiley & Sons, released in September 2019. Chris is a member of ISSA and ISACA, and holds Certified Information Systems Security Professional (CISSP) and Certified Information Security Manager (CISM) certifications.
Assistant Director – Shared Computing Services – Washington University in St. Louis
Dan brings over a decade of expertise in architecting and supporting identity, security and compliance solutions for Washington University in St. Louis. As Director of an engineering and architecture team, Dan provides strategic leadership to ensure that the mission and goals of the University are supported through the Identity Governance and Administration program. He also is responsible for delivery of Office 365 services for the University.
Vice President of Products – Saviynt
Dave Culbertson is the VP of Products at Saviynt. With over two and a half decades in IT, his career in the IAM space has spanned 19 years and throughout that time Dave has helped hundreds of clients achieve their goals of better regulatory compliance and increased security postures. At Saviynt, Dave is responsible for analyst relations, product positioning and strategy, and provides the customer voice for product management.
Technical Account Director – Oil & Gas – Saviynt
Dave thrives on building teams to meet challenging business goals. He enjoys the challenge of deadlines, building motivating teams, and delivering value to customers. He is well versed in all aspects of project delivery and has a strong technical background that allows him to manage a diverse set of technologies. He has a broad, and in some areas, a deep understanding of the oil and gas industry.
Senior Manager, Identity Governance & Access Management – University of California Los Angeles
For the last seven years Dawn has been the Senior Manager for Identity Governance and Access Management at UCLA. She is passionate about creating a valuable user experience with the strongest possible security controls. Dawn directs the IT Security Identity Governance and Access Management (IGAM) program for UCLA Health Sciences and David Geffen School of Medicine. This includes implementing security controls for identities, developing standard operating procedures for identity governance, provisioning and de-provisioning user access, and defining processes that protect organization identities while ensuring the best possible user experience. Prior to UCLA Dawn worked at Rockford Health System in Rockford, IL for 17 years as a desktop support supervisor where she was passionate about providing quality desktop support so clinicians could focus on treating patients. She successfully implemented a single sign-on solution for clinicians to improve clinical access and protect patient identities in preparation for the Epic rollout. At UCLA Dawn successfully provisioned over 18,000 users for access to Epic as part of the largest Epic go live in Epic’s history. Other rollouts include multi-factor authentication (MFA) for access to UCLA’s most valued applications including Office 365, Global Protect VPN and Epic within a few months for 30,000 users. The implementation of a Vendor Access Management solution that provides MFA for vendor access and records all activity performed by the vendor. She is currently leading the project to architect, engineer and implement Okta and Saviynt for Identity Governance and Access Management at UCLA.
Diana Volere, CISSP, CCSP
Chief Evangelist / Director of Product Marketing – Saviynt
Diana is a strategist, architect and communicator on digital identity, governance and cybersecurity, with a passion for organizational digital transformation. She has helped global Fortune 500 companies with digital transformation, with an emphasis on healthcare and financial verticals. In her role as Saviynt’s Chief Evangelist, she delivers Saviynt’s vision to the community, partners, and customers, addressing how to solve present and future business challenges around identity. Her past twenty years have been spent in product and services organizations in the IAM space. Outside of work she enjoys travel, gastronomy, sci-fi, and most other activities associated with being a geek.
Global Director, Solution Strategy – Saviynt
Jamie is the Director of Solution Strategy for Saviynt. She is a veteran Identity & Access Management consultant with 15+ years of IAM professional services and product experience helping Fortune 1000 companies to architect identity governance and cloud security solutions. She was previously the Vice President of IAM Strategy at Identropy and has held a variety of global enterprise leadership and consulting roles, guiding clients through workshops, program formulation and development of IAM roadmaps.
Principal Solutions Strategist – Saviynt
Joe Raschke is a systematic, pragmatic and consultative IT business executive with more than 20 years’ experience driving profound results through strategic IT initiatives. His specific expertise centers on enterprise management within the healthcare, legal, financial services and manufacturing industries. He excels at analyzing and understanding business drivers and then delivering functional, scalable business solutions that align with key corporate objectives. A natural leader, he is an expert at building, developing and motivating high performing technology teams whose members perform to a shared vision. He has strong knowledge of international governance, information security, risk and compliance, and their integration. And he holds a few Risk Management based certifications including Certified Information Systems Security Professionals (CISSP), Certified in Risk and Information Systems Control (CRISC), and now specializing in Certified Information Privacy Professional (CIPP).
Chief Information Security Officer & Vice President of Information Systems – Intermountain Healthcare
Karl West is the Chief Information Security Officer and Assistant Vice President of Information Systems at Intermountain Healthcare, an integrated delivery network of 22 hospitals and 185 clinics in Utah and Southern Idaho. Karl is a well-respected speaker and security expert who is often sought after by other organizations that want to embed his holistic solutions in their security strategies. At Intermountain, Karl is responsible for all aspects of the organization’s security strategy. Karl’s leadership—throughout the planning, development, implementation, and maintenance of an excellent security program—has earned Intermountain national recognition as a leader in health information security. The teams Karl inspires cover a wide range of security specialties—governance, architecture, risk and compliance, Identity and Access, eDiscovery, forensics, and incident management. Protecting and defending against unauthorized access to patient and employee information, clinical systems, networks and data is Karl’s vocation. He’s keenly interested in innovation as well, especially the development of new technologies that improve care and lower costs. For more than 30 years, Karl has been involved in information technology and security. Prior to his role at Intermountain, Karl was Vice President and Managing Partner at AT&T Consulting Services. Karl is a member of the Utah Health Information Network (UHIN) Privacy and Security Board. He’s also a board member of the Association for Executives in Healthcare Information Security (AEHIS), a part of the College of Health Information Management Executives (CHIME), and Weber State College’s Computer Science department. Karl received a bachelor’s degree in Computer Science from Brigham Young University and later a master’s degree in Business Administration.
Cybersecurity Services – KPMG
Dr. Karla Clarke is a Manager with KPMG’s Cyber practice. Karla has 8 years of experience in the information security with strong backgrounds in: Identity and Access Management, Privileged Access Management, Security Architecture, Insider Threat Detection, Security Information and Event Management, Threat and Vulnerability Management, Risk Assessments, as well as Project and Program Management. She holds a Ph.D. in Information Systems from Nova Southeastern University, a Master of Science in Information Systems from Boston University, and a Bachelor of Arts in Anthropology from the University of Florida. Prior to joining KPMG Karla work for an international consulting firm, as well as in industry. Karla is a member of ISC2, ISACA, ACM, and IEEE.
Security Architect – VMware
Krishna Athur, currently the Lead Security Architect (IAM) at VMware, is a Technology Leader with over 14 years’ experience across enterprise applications and cloud platforms. He has a strong ability to work on multiple opportunities and present value proposition of complex solutions to stakeholders. He has provided technical direction and leadership on technologies and open source frameworks. As an experienced Security Architect, he is also passionate about making security technologies deliver on their promise. His main focuses include Identity, Security, and User Experience. He is also a member of FIDO Alliance.
Kum Chai Shin
Global Director – Western Digital
Kum Chai Shin is the director of Information Security at Western Digital. She has over 15 years in Information Security leadership with quite extensive experiences on IAM strategy, architecture, implementation and support for Enterprise. At Western Digital, she is responsible for all IT compliance management and Identity and Access Governance.
Cybersecurity Director, Identity and Access Management – Intermountain Healthcare
Michale Allred is a results oriented leader skilled in information security and risk management, with progressive responsibility in all aspects of information technology. He has the ability to develop security strategy and then work with management, business units, and technical staff to execute it. He has technical expertise in establishing programs for the cost-effective delivery of essential security services. He is experienced in managing technical projects and motivating technical teams. He possesses an in-depth understanding of a variety of existing and emerging technologies. His specialties are in information security management, risk management, intrusion detection, intrusion protection, security architecture, and strategy planning.
Managing Director: Chief Information Security Officer & CTO – Jefferies
Ramin Safai is the first Chief Information Security Officer at Jefferies & Company. As CISO, Ramin is responsible for Jefferies global cyber security and IT risk management programs. Prior to joining Jefferies, ramin was Americas’ CISO at Barclays and had global responsibilities for rollout of application security and identity management programs. For the past 15 years, Ramin has worked as an information Security officer at large banks including: Credit Suisse, Lehman Brothers, JP Morgan and Barclays.
Executive Chairman of the Board & Founder – Saviynt
Sachin is responsible for creating the overall vision and strategy for the company. Prior to Saviynt, Sachin was the Founder and CEO of Vaau, where he took the company from conception to acquisition by Sun Microsystems. While at Sun, he held the role of Chief Identity Strategist, responsible for the vision and direction of Sun’s security portfolio. As a thought leader and entrepreneur, Sachin has pioneered the field of identity & access governance, cloud security, risk management, continuous compliance, security analytics for over two decades. Sachin is also an acclaimed speaker and frequently speaks at industry conferences and seminars.
Partner Director of Program Management in the Identity Division – Microsoft
Sue Bohn is a Partner Director of Program Management in the Identity Division at Microsoft. She leads the Identity Customer and Partner Success Team, which drives deep engineering relationships with customers and partners. Sue is a diversity and inclusion executive sponsor at Microsoft and has recently earned a diversity and inclusion certification from eCornell, Cornell University’s online learning platform. Sue has spent twenty-six years in various marketing, evangelism, and engineering roles across the Developer, Business Solutions, Windows, and Cloud + AI divisions in Microsoft. Sue has a B.S degree in Computer Science from the University of Minnesota Moorhead. In her spare time, Sue is a classically-trained pianist and organist.
Chief Cloud Officer – Saviynt
Vibhuti Sinha, leads the Cloud Solutions and Services at Saviynt and is responsible for the strategy, architecture and development of next generation solutions for securing various Cloud providers and platforms. He has 12+ years of experience in defining security architecture, IAM strategy and implementing large scale security platforms for Fortune 500 organizations. Prior to Saviynt, he was a Senior IAM Architect with Infosys responsible for partnering with large financial institutions in addressing their compliance and security needs including FFIEC, risk-based authentication and access life-cycle management. Vibhuti brings a wealth of experience in addressing Cloud Security Architecture, Design and Strategy. He enjoys running and photography in his spare time.
Team Lead – Identity and Access Management – Suncor Energy Inc.
Chris Hoy got his start in the IAM world in early 2005, with Hitachi-ID Systems (M-Tech) working behind the scenes as a QA Specialist. Chris transitioned to Project Management and Customer Engagement for IAM/PAM implementation projects with customers in the Health Care and Banking industries. In 2011 Chris moved on to Suncor Energy Inc., as an Identity Management Analyst. Chris now leads the Identity Management teams at Suncor.
Senior Manager, Identity & Access Management – Origin Energy
Vanessa Gale is an accomplished IT Risk, Assurance & Compliance senior manager, who helps Organisations optimise performance and deliver outcomes using risk. She has worked for Origin Energy for almost 10 years, in a range of roles, with her most current being Senior Manager, Identity & Access Management.
Before her time at Origin Energy, Vanessa has worked across the Oil & Gas sector both within Australia and internationally for Shell, BP and a range of consultancies. Vanessa holds a Bachelor of Environmental Engineering.
Vanessa was awarded McAfee 2017 Cyber Women of the Year and has recently gained her CISM certification.
In her spare time, she loves playing sport and likes spending time with her Family including her 3 cats.
Vice President, Risk Management & Information Security, Head of IAM – Investors Bank
Richard is a results focused technology manager with quantifiable contributions in financial services and banking. He is a strategic and tactical leader who has implemented tangible, measurable projects delivering Identity Access Management, Data Governance, Application Privilege Management, Audit and Regulatory Compliance, Quality Management, Systems Development Life Cycle, and Change Management process improvements while reducing costs and mitigating risk. His specialties are: Identity & Access Management, IT Governance, Release & Change Management, Project Management, Quality Assurance & Testing, Process Maturity, SDLC, Data Management, and Talent Development
Senior Cyber & Physical Security Executive – SecZetta
With nearly 15 years of experience in physical security, consulting and cybersecurity roles, most recently Senior Director, Client Solutions at Optiv, as well as Senior Manager, Advisory in Security & Risk Consulting at KPMG. As a successful thought leader and executive in the identity and access management space Jeremy has accelerated existing technology relationships, opened up new avenues for partnerships and driven the ability to help partners identify ways to build a business around our products and joint offerings. He is a former Special Agent with the United States Secret Service.
Managing Director/ Identity Governance and Administration Architect – Edgile
Seasoned technology thought leader and executive with 20 years’ experience of leading information security transformation programs, with an emphasis on Identity & Access Management (IAM), Data Privacy & Governance, Regulatory Compliance, and Privileged Access Management (PAM).
Proven track record in a diverse range of environments, including a Fortune 50 financial services company, a Silicon Valley start-up, a Big 4 consulting organization, and currently for a leading cybersecurity consulting boutique.
As part of the founding team for a cybersecurity consulting start-up, was instrumental in helping to grow the business to more than 150 employees, which led to a successful acquisition by a Big 4 consulting firm after just five years.
Have provided business-focused strategic advisory services and led enterprise-grade implementations for some of the world’s largest public and private institutions. Deep technical and business expertise, having worked on or led over 100 successful Cyber programs globally.
- Identity and Access Management
- Role Based and Attribute Based Access Controls (RBAC / ABAC)
- Business Development
- Engagement Management
- Security architecture and design
- Application Security
- Information security management
- Data privacy and governance
- Developing go-to-market strategies
- Customer and vendor relationship management
- People management, mentoring and development
- Board-level expert advisory services
- Project scoping and estimation
- Cloud security
- Identifying disruptive technology trends
- Technology Framework development
- Developing service offerings and innovative delivery frameworks
- Practice development and leadership
- Public speaking on topics related to information security and emerging threats
Senior Vice President of Solutions and Strategy – Saviynt
As Senior Vice President of Solutions and Strategy, Nabeel Nizar leads the Worldwide Technical Solutions and Partner Engineering teams at Saviynt. His responsibilities include go-to-market messaging and enablement for field and channel sales, system integrators and strategic technology alliance partners. With more than 20 years of experience in the Identity & Access Management space, Nabeel has helped organizations develop their Identity and Security strategy to support Governance and Compliance frameworks. Prior to joining Saviynt, Nabeel was the Chief Evangelist and Identity Strategist for Novell, NetIQ and Microfocus, while working with Fortune 500 companies on the development of their IAM strategy.
Manager of Identity and Access Management – Northeastern University
Tracy LaMantia joined Northeastern University in March 2019 as the Manager, Identity and Access Management. She has responsibility for the University’s authentication and access management services, Identity Governance solutions, LDAP services, and password management.
Under her leadership, the Northeastern IAM team is currently undertaking a multi-year strategic initiative to transform their entire platform and services. Phase 1 includes migrating their entire student, alumni and parent population to the Saviynt cloud solution and integrating with the top 5 mostly used applications. Following in quick succession are their faculty, staff, and affiliates populations.
This is Tracy’s second implementation of Saviynt. She also led cross-functional team to create the strategy and foundation for Identity Governance at WPI. Tracy and her team were awarded the 2018 Time to Value award by Saviynt for deployment and independent adoption within 5 months.
Prior to entering the higher education sector, Tracy spent many years delivering strategic projects in the corporate sector, most notably with EMC/Dell and Monster.com.
Deputy Chief Information Security Officer – Toyota Connected
Arnold is a Cyber Security technologist leader with over 20 years of Cyber Security and programming experience. He has a strong background building and maturing Cyber Security programs, both as a Chief Information Security Officer and as a consultant. These Cyber Security programs span enterprise, product and cloud focuses. AS a CISO, he has a proven track record of driving innovation within traditional security capabilities (e.g. security event capture and monitoring). As a consulting leader and Practice Director, he has significant experience managing large implementation and strategy services engagements.
AVP- Practice Head, Cyber Security PMI – PMP Certified since 2008 – Infosys
Shambhu is leading Cyber Security Practice for Infosys Ltd, Global IT solution provider with 200K employees across 35+ countries. Infosys Cyber Security practice is one of the fast growing unit Infosys with Cyber services delivered through Infosys “Platform Next” solutions & IPs and through state of the Cyber Defense Centers.
Shambhu has 25+ years of industry experience and accomplished multiple leadership roles like leading Enterprise Infra transportation practice @ Infosys, heading Professional services group at Dimension Data, Global delivery NetSec practice etc.
Shambhu is responsible for Global Cyber Security Practice solutions, Presales, Go-to-Market, Alliance and Cyber CoE. As Cyber Security professional, Shambhu, along with his team of experts, creating unique platform, offerings & IPs and delivering Cyber Security Services through Infosys Cyber Defense Centers (CDC).
SAP Compliance, Identity and Access Management – Wienerberger AG
Andree Niebuhr is the lead at Wienerberger AG for SAP Compliance, IT Auditing and Identity Access Management. Wienerberger with more than 16,000 employees operates in 33 countries and is a publicly listed supplier of building materials and infrastructure solutions. Andree has more than 20 years of experience in IT Auditing, SAP Compliance, Finance Management and deployment of SAP solutions for large enterprises.
Director of Identity & Access Management – Royal Carribean Cruises Ltd.
Jenn Aguinaga leads the Identity Access Management program at Royal Caribbean Cruise Lines. She is responsible for defining and executing on Royals vision for IAM and overseeing the IAM operations for both ship and shore side. Jenn is a security leader with 15 years in GRC, SecOps, IAM, and SecDevOps. Jenn is a graduate of Nova Southeastern University and holds a Master’s in Business Administration. A native of Florida and when not in the office, can be found lounging by her pool on the weekends.
Chief Executive Officer – SecZetta
With nearly two decades of experience in application, network and data security, David founded SecZetta in 2006, putting together a highly experienced team and securing strategic partnerships to address a growing need for better business process, IT security and identity and access management in the market.
SecZetta’s products were built out of experience in seeing hundreds of IAM programs fail to deliver on the promise of making the process of engaging with non-employees easier while managing access more effectively. The realization that it isn’t the systems that are failing organizations but rather the business was a turning point for SecZetta and the creation of its products. SecZetta’s products are built to address the complexity of the non-employee workforce and the collaborative nature in which they need to engage with organizations.
As a successful entrepreneur, David has founded two IT management and security companies working with medium and large enterprises across all industries. He is a former member of the Air Force National Guard, where he specialized in combat communications focusing on encrypted secure communications.
Avanade National Digital Identity Leader & Global Avanade Saviynt Relationship Director
Mike is an Information Security and Risk Management Leader with over 30 years of experience. He has a broad background in Cyber security, risk management, and technology consulting at progressing levels of responsibility. He has a track record of building partnerships with client organizations to balance risk and business performance. He has a strong history of performing all phases of client and vendor relationship management.
Director of Information Security, GIS – Marriott International
Sentil Selliah is responsible for the security strategy and architecture of Marriott International’s Identity and Access Management (IAM) modernization program. In this role Sentil is responsible for leading the team in developing and implementing Identity Governance, Web Access Management, Virtual Directory and Privileged Access Management services to drive Marriott’s digital transformation. Sentil joined Marriott in 2017 and led the efforts to define the vision and roadmap for building an enterprise IAM solution to enable business in a risk acceptable manner. Sentil has over 10 years of experience as an IAM expert, providing strategic and technical advice to build and successfully operationalize IAM solutions and programs.
Senior Manager, Cyber Risk Services – Deloitte
Laxman Tathireddy is a senior Cyber Security leader specialized in bringing cyber security expertise and deep industry experience in advising client executives on cyber strategy and leading large scale cyber security transformation programs in consumer (airlines, restaurants, retail etc.) and technology industries . Successfully led and continues to lead business relationships with innovative product companies in cyber risk space. Laxman has 15 years of experience in partnering with clients in the strategy, deployment and operations related to large scale Identity and Access management programs.
Arun K Singh
Americas Advisory Risk Leader, Cybersecurity Services – Ernst & Young
Arun K Singh is a principal and Americas Advisory Risk Leader at EY. He brings 28+ years of experience in advising, implementing, and managing complex projects for large global organizations across multiple industry verticals. He is currently working as Engagement Partner for a fortune 50 financial organization to drive global multi-cloud security assessment and strategy development program.
Prior to joining EY, Arun worked at Accenture as Managing Director & Global Lead for their Managed Security Services business. As the global leader, he carried P&L responsibilities for sales, revenue, delivery, capability development, and branding. Before Accenture, he worked at Wipro Technologies as Global Business Head for Enterprise Security Services and provided security consulting, implementation and managed services to Wirpo’s clientele worldwide. He also worked at Infosys Technologies and HCL Technologies in the area of eCommerce, Network, and Application Security.
Arun started his career as a cryptographer & security research professional and later moved onto building and driving global security business. He has published 20+ research papers and was invited as a speaker and panelist in numerous security conferences such as HIMSS, SmartGrid Security Conference, CIO Impacts Forum, Oil & Gas Conference, Financial Services Outsourcing Summit, RSA Conference IATA conference on Airline Security, Gartner Security Summit, ISSA CISO Forum, CSO Executive Council, etc.
Director of Cyber Security Delivery and Transitional Service Agreements Governance (M&A) – Brighthouse Financial
Brian LaSala is the Director of Cyber Security Delivery and Transitional Service Agreements Governance (M&A) at Brighthouse Financial. In this dual role, he oversees delivery of cyber security solutions within an entirely cloud based environment. He is also responsible for governing Brighthouse Financials’ divestiture transition strategy for a wide array of technology platforms including Identity and Access Management. He joined Brighthouse in 2016 and has over 20 years’ experience in information technology as a leader of innovative strategies delivering leading-edge technology systems. Prior to joining Brighthouse, he held various roles in solutions delivery and emerging technologies as Director for application development at MetLife. He was also a key member and contributor to several IT governance boards including the Security Steering Committee and Integration Service Oriented Architecture (SOA) Governance Panel. He graduated from Muhlenberg College and holds various industry certifications. In his spare time, he enjoys hiking the Appalachian Trail and spending time with his family.
Global Enterprise Directory Services Manager – Schlumberger
Paul Livingston has over 25 years of experience in IT Operations managing directory service and identity management systems in complex IT environments. He started in government working at Johnson Space Center for a subcontractor Northrop Grumman at NASA and has since spent the past 20 years in the oil & gas industry. Paul has implemented several identity and access management systems over the course of his career which has given him insight into the complex nature of large-scale global identity deployments. He is currently the Global Enterprise Directory Services manager for Schlumberger where he has architected several large-scale IDM, Active Directory, and LDAP integrations with multiple companies with having multiple HR systems. He also has strong cloud-based skills in the Microsoft Azure space where he was part of one of the fastest large-scale deployments of Office 365. Paul has a passion for enabling the business with technology while maintaining security and governance.
Vice President of Identity & Access Management – Jefferies
Andrew Ehrlich heads Identity and Access Management for Jefferies. In this role Andrew is responsible for the overall IAM strategy and technology utilized. This includes traditional IAM functions such as SSO, PAM, Data Governance, Access Management/Provisioning. It also includes oversight of all ITSM/ITOM/Security/GRC/ITBM products and projects.
He has been in the Identity Management space for over 5 years with a prior 11 in Software Development and Delivery.
Executive Director – Identity Defined Security Alliance
Julie Smith is the Executive Director of the Identity Defined Security Alliance, responsible for executing the mission on behalf of the membership and the identity and security community. Prior to joining the IDSA, Julie spent 12 years in various leadership roles including product management, product marketing and solutions marketing, in the identity and security industry with leading vendors and solution providers.
Vice President of Channel Development and Operations – Saviynt
Joined Saviynt after an extensive career with Microsoft working with fortune 500 companies on collaboration, identity and security initiatives. With his extensive knowledge of Directory Services, Azure, Security, Governance and Compliance, Chris supports Saviynt’s Channel partners and technical alliances.
Director, Solution Architects – Radiant Logic
Wade has extensive experience in enterprise IT direct and channel software, and services, sales and management. He has in-depth knowledge and experience in enterprise IAM, IAG, risk and compliance and IT security challenges.
Delivery Services (North-East) – Simeio Solutions
Batool leads the Delivery for Simeio Solutions for its North-East and Mid-Atlantic regions. She has over a decade of experience in leading teams focused delivery Identity and Access Management Solutions. She has led Strategy, implementation plans and Managed Services programs for many organizations including financial services, healthcare etc.
Motivational Speaker & Bestselling Author – Equalman
Often called a Digital Dale Carnegie and The Tony Robbins of Tech, Erik Qualman is a #1 Bestselling Author and Motivational Keynote Speaker that has spoken in over 50 countries, and reached 30 million people.
His Socialnomics work has been featured on 60 Minutes to the Wall Street Journal and used by the National Guard to NASA. His book Digital Leader propelled him to be voted the 2nd Most Likeable Author in the World behind Harry Potter’s J.K. Rowling. Qualman was formerly a sitting professor at Harvard & MIT’s edX labs.
Principal PM Manager in the Identity Engineering Division – Microsoft
Ilana Smith is a Principal PM Manager in the Identity engineering division at Microsoft. She is responsible for Azure Active Directory access management, building functionality that ensures that employees and partners can easily get access to the apps and resources they need, but only the ones they need and only for as long as they need it. A twenty-year Microsoft veteran, Ilana has delivered products in the consumer and enterprise spaces, from devices to business applications to major infrastructure and now the cloud. In her free time, she likes to talk to people about how they’re likely already using Azure Active Directory, and that it offers industry-leading security they can use to protect all their apps – she’s a riot at cocktail parties.
Jason E. Berland
Director of IAM – Fishtech
Jason Berland has 15 years’ experience in the delivery and leadership of technology services, program and project management, strategic solutions, business analysis, and application support in the Identity and Access Management Security Space. Jason has a proven track record of developing business efficiencies, business requirements, problem solving, and business process integration.
Previously, Jason served as Senior Manager, Identity and Access Management for United Airlines. He managed strategy, resource allocation, work stream, program budget, and program deliverables for the airline’s IAM program. In that position he created and led the IAM Governance committee with key counterparts. Prior to United, Jason served in leadership positions with Grainger, Schawk Digital Solutions, Citigroup, and SBC Ameritech.
Cybersecurity Consultant – Integral Partners LLC.
Manager with Integral Partners. Over two decades in the identity governance space with the past 7 years focused on implementing modern IGA tools. Four years of experience working with Saviynt across some of their largest clients including deployments in the travel, utility, education, and technology spaces.
Director IT- Cybersecurity, Energy Services & Office of the CIO – First Solar
Director IT- Cybersecurity, Energy Services & Office of the CIO – First Solar
Brent Andrewsen is a Senior Manager with Integral Partners, an IAM Consulting and Integration firm specializing in Identity and Access Management services and solutions. Brent has over 18 years’ experience providing IAM advisory services, IGA implementations, and IT solutions for higher education, health care, energy, non-profit, and high-tech organizations. Brent is also an adjunct professor of IT at Brigham Young University.
Senior Manager – Cybersecurity – EY
Michael Schultz is a cloud security leader with over 15 years of cyber security experience across various industries including consumer products, power and utilities, financial services, technology, government and healthcare. He has led numerous large implementation and security co-source transformations while helping executives understand how to drive value from their cyber investments. Michael assisted in the creation of firm methodology, publications and go-to-market material on cloud governance, cloud and digital trust. He has developed multiple firm point of views on how to build trust in the cloud based on a secure, trusted and audit-ready environment (STAR). Michael is purposeful and prides himself on coaching, mentoring and developing our people while building a better and more secure working world. He also serves on the Cyber Security Advisor Board for Southern Methodist University (SMU) in Dallas, TX.
Information Risk Consultant, Identity & Access Management – MassMutual
Jose DeJesus is the Product Owner for Certifications at MassMutual who oversees the application onboarding and certifications processes. He has over 7 years of experience in Information Technology and came to the Identity and Access Management Team after spending 5 years on MassMutual’s Onboarding Team where he was responsible for streamlining the IT Onboarding process and improving the experience of all new hire’s. His understanding of the Identity landscape helped him adapt to his current role as Product Owner for Certifications. He has since partnered with the different security and audit teams within the company to improve the overall governance process and ensure that MassMutual is meeting its requirements. He is also credited with conducting the largest user access self-review campaign to date which certified access for over 2000 users in one campaign.