SIGS Special Interest Group
3rd IAM Forum

Save the DateClick on the .ics file to save the date

Target Audience Professionals which are interested in the topic Identity & Access Management

From Consultancies and Resellers/ Integrators are only technical peoples (which are involved in this topic in their daily job) allowed to take part – max. one participant per company. Vendors and people with a Sales/Marketing role are not authorized as participants.

CPE Credits Earn 4 CPE (Continuing Professional Education) for attending this SIGS forum. Please request a confirmation.
Location Hilton Zurich Airport Hotel
Hohenbuehlstrasse 10
8152 Opfikon-Glattbrugg

There are a lot of free park places available.
Train: railway station Zurich Airport – take the hotel shuttle

Date of Event 26th November 2019
Further planned date for 2020: 4th February, 9th June, 22nd October 2020
Language English
Participation Costs Fr. 55.— per participants
Organization, presentations, beverages and apéro riche included



1:30 – 2:00 Registration & Coffee
2:00 – 2:45 Mario Rösch, Leiter Information Security bei PostFinance AG

Weiterentwicklung IAM bei PostFinance AG (Referat in Deutsch)
Im Rahmen der Präsentation wird aufgezeigt wie die PostFinance im Jahr 2015 ein IAM aufgebaut und anschliessend weiterentwickelt hat. Sie erfahren einiges über die Stolpersteine und Challenges aus dieser Zeit sowie wie diese gelöst werden konnten. Des Weiteren wird aufgezeigt, was die aktuellen Herausforderungen sind und in welche Richtung sich die Lösung entwickelt, sprich was es noch zu tun gibt.

2:45 – 3:30 David Doret, IAM & PAM Manager at BNP Baribas

Revisiting IAM Foundations
The IAM (and derived acronyms) industry is innovating at a steady pace and we feel excited about fancy buzzwords and new products reaching the market with enchanted promises. Meanwhile, we – CISOs / IAM managers – must confront a tough reality. That reality is made of fractal information systems, archeological layers of obsolete technologies piling up, an elusive perimeter and a multifold regulatory environment. Still, as each day goes by, we protect our companies with our IAM processes and deliver enhanced productivity, assured compliance and strengthened security.

But how do we do that?

First and foremost, by laying robust IAM foundations. In this talk, we will revisit basic IAM concepts with a fresh eye and ask ourselves whether we are investing our money and efforts on the right initiatives.

3:30 – 4:15 Coffee Break
4:15 – 4:45 Maurice Luizink, Principal Solution Architect Information at Transmit Security
Maurice Luizink is responsible for successfully implementing security solutions for organisations in Financial Services, Telco, and Public sector. He has over 18 years experience, as a specialist, in the Information Security domain. Maurice has a strong and broad knowledge foundation building on cross industry experience in IT gained in various roles as consultant, information security architect, solution architect, software designer/developer, coach, and manager.

Identity Orchestration, the next generation identity platform?
The growth of digital channels forced many organisations to invest in identity and risk solutions to combat fraud, cyber risks, compliance issues while extending identity capabilities. Unfortunately, for most of these organisations this leads to a rapidly increasing Total Cost of Identity (TCId) but more importantly a suffering Return on eXperience (RoX).

Many organisations now turn to Identity Orchestration to counter these effects. In this talk I’ll explain the theory behind Identity Orchestration, and explain how these organisations make use of Identity Orchestrating for addressing their identity challenges.

4:45 – 6:00 Rountable
moderated by Andreas Fuhrman, on behalf of SIGS

Can you solve the “Role Mining” puzzle using the right methodology?
In general there are two approaches that a organization can use looking for the optimal roles: top-down or buttom-up. The top-down approach uses a pre-defined method of organizing user access based upon known organizational structures. With the buttom-up approach you examine what access people currently have and assign roles based upon what rights users already have.

Both of these approaches have merits and drawbacks associated with their use. Therefore maybe the hybrid approach using both methodologies and their strength could be the best. Let’s discuss…


The Sponsor of this event is:

Main Sponsor Co-Sponsor


This is a ‘must attend’ event for all security professionals! We are confident that the relationships you develop here will prove to be crucial to your continuing success.

Register here!

With the registration for this event you accept, that SIGS may use the data entered for its own purposes and may share for use it with its event partners and event sponsors of this platform. In addition, we share the contacts as well with the community itself.

Earn CPE Credits for
attending SIGS Events

Registration here!