<img alt="" src="https://secure.norm0care.com/164647.png" style="display:none;">
Breaking News: Onegini and iWelcome are now OneWelcome | READ PRESS RELEASE  


IDM Europe conference 2016

March 23, 2016

Meet & Greet iWelcome at Whitehall Media’s IDM Europe conference

The global IAM market is forecast to grow 15% by 2018 as organisations look to secure their infrastructure, improve efficiency and achieve compliance. IAM is the centrepiece of IT and information security for most enterprises given that it is the first line of defense for protecting systems, applications and data along with confidentiality, integrity and privacy.
The IAM sector is poised for major growth as businesses of all sizes look to develop strategies that are aligned to the needs of their business but also consider people, processes and technology.

Whitehall Media’s IDM Europe conference

Whitehall Media’s IDM Europe conference will offer a high-level platform for thought leaders, practitioners and IAM specialists across Europe to discuss the infrastructural challenges and opportunities associated with managing and securing identity within the enterprise. This must-attend all-day event will review policies, processes, standards and emerging technologies being utilised by government and large enterprise organisations to balance the need to secure their business with the imperative to grow. iWelcome is silver sponsor at the IDM Europe conference in Mövenpick Hotel Amsterdam.

Read more about the conference. Or register here.

Is your modern CIAM strategy agile and innovative? Discover our customer cases.

  • Featured topics at the IDM Conference
  • Consumer Identity Access Management (CIAM)
  • e-Government initiatives and trends
  • Data Protection Directives and Regulation
  • eID and electronic Trust Services (eTS)
  • Authentication, Authorisation, Access
  • Cloud Computing Challenges
  • Identity as a Service (IaaS)(IDaaS)
  • Single Sign-On (SSO)
  • Implementing an Identity Management Architecture
  • Governance, Compliance, Regulatory Requirements
  • Proactive Monitoring of Systems
  • Risk Management and Information Security
  • Data Loss Prevention
  • Enterprise Mobility and BYOD risks
  • Identity Administration
  • Federated Access Management
  • Future IAM trends