IDENTIFY 2015 - New York | Ping Identity

Tomorrow's Secure Enterprise Starts Today

IDENTIFY is uniquely designed for IT leaders, Security Experts and Enterprise Architects alike. Whether you’re a current customer, a partner, or a friend of Ping Identity, you’ll benefit from the opportunity to network with hundreds of your peers. You will also have unlimited access to Ping experts and a full day of new and valuable content to leverage within your organization.


Venue & Location

New York Marriott East Side
525 Lexington Avenue at 49th Street
New York, NY 10017



8:00 am - 9:00 am | Check-In/Breakfast
9:00 am - 5:00 pm | Keynotes & Sessions
5:00 pm - 6:00 pm | Reception - Drinks & Apps


Don't miss this event! Fill out the form to join us on October 15th in New York.


Register for IDENTIFY 2015 New York

8:00 am - 9:00 am Registration and Breakfast  
9:00 am - 10:00 am Welcome & Keynote Address:
  • Andre Durand, CEO, Ping Identity, "Security without Borders. Taming the Cloud and Mobile Frontier"
  • Patrick Harding, CTO, Ping Identity, "Our Vision: Identity Defined Security"
10:00 am - 10:15 am Break
  Track 1 | Identity Defined Security Capabilities: Building Blocks of Ping Identity Platform Track 2 | Identity Defined Security Solutions: Enterprise Insights into Customer, Partner, and Workforce Identity  
10:15 am - 11:00 am Track 1 | Session 1
Federated Access Management: Migration Off Legacy WAM
Track 2 | Session 1
Partner Identity: Securing and Streamlining Your Partner Ecosystem
11:10 am - 11:55 am Track 1 | Session 2
Federated Access Management: Contextual Authentication – Outsmarting Fraudsters
Track 2 | Session 2
Security by Design: How Customer Identity Solutions Can Help You Win the Customer Experience Battle
12:00 pm - 1:00 pm Networking Lunch  
1:00 pm - 1:30 pm Keynote | The Cutting Edge: Standards at Work in Google's Mobile-Focused Future | Eric Sachs, Product Manager, Identity, Google
1:30 pm - 2:15 pm Identity Thought Leaders Panel | Moderator, Brian Bell, Chief Marketing Officer, Ping Identity

- The Future of Workforce Identity
- Customer Experience and Identity
- Cloud Governance
2:15 pm - 2:30 pm Break  
2:30 pm - 3:15 pm Track 1 | Session 3
Federated Identity Administration: Identity Orchestration – A New Cloud Agnostic Solution for User Provisioning
Track 2 | Session 3
Workforce Identity: Making the Clouds Work Together – The Value of Standards in Your Identity Project
3:25 pm - 4:10 pm Track 1 | Session 4
OpenID Connect: An Overview and Best Practices
Track 2 | Session 4
Expanding Your Enterprise IAM to the Cloud –
The Ping Way
Healthcare Session
Is Your Healthcare Identity Management Sick?
4:20 pm - 4:50 pm Closing Keynote: Enterprise Identity: 2016 and Beyond, Mark Diodati, Gartner
Closing Remarks: Andre Durand, CEO, Ping Identity
5:00 pm - 6:00 pm Cocktail Reception  

Session 1 | Migration Off Legacy WAM

Scott Tomilson, Technical Product Management, Ping Identity
Rob Davis, Director - Security Services, TIAA-CREF


The word ‘migration’ often sends shivers down spines. Luckily, migrating to the Ping Identity Federated Access Management solution can be a non-disruptive process for your end users. Our products can co-exist with your existing identity and access management (IAM) infrastructure to reduce friction during a migration - avoiding any risky ‘rip and replace’ approaches. The end result of your planning and work will be a simpler, more agile access management infrastructure supporting your WAM needs of yesterday and API security needs of today, all using modern open standards like OAuth and OpenID Connect to plan for the future.


In this session customers will learn:

  • Architecture of the Ping Identity Federated Access Management solution
  • Strategies for migrating Access Control and Session Management Policies
  • Customer testimonial of the challenges of legacy WAM and the benefits derived from Ping Identity


Session 2 | Contextual Authentication: Outsmarting Fraudsters

Paul Madsen, Senior Technical Architect, Ping Identity
Mark Batchelor, Sales Director, Ping Identity


The world of cyber threats continues to evolve and as more sophisticated threats emerge and rise, you must verify that you are ready to outsmart the attackers.  In this session we’ll discuss:

  • What contextual authentication is and why it is a must in order to defend your organization and not burden your users. 
  • What Ping is doing today and how we can help you. Case studies will be highlighted.
  • The future at Ping - intelligent authentication takes a further step-up.  


Session 3 | Federated Identity Administration:  Identity Orchestration – A New Cloud Agnostic Solution for User Provisioning

Jason Arrington, Product Management, Ping Identity


Provisioning user accounts to SaaS and on-premises systems remains a challenge using existing tools. Legacy IDM products are powerful but complex, and were never designed for the cloud. Provisioning features of IDaaS products lack needed power and flexibility. Ping's upcoming Identity Orchestration product was designed from the ground up to give customers the tools they need to keep their cloud and on-premises user stores consistent in a flexible, extensible way. In this session we’ll discuss:

  • The challenges with existing approaches for provisioning and de-provisioning
  • High-level features and architecture for Identity Orchestration
  • Timelines for the product launch and future roadmap features from Ping Identity


Session 4 | OpenID Connect: An Overview and Best Practices

Allyn Fay, Product Marketing, Ping Identity
David Chase, Senior Software Architect, Ping Labs, Ping Identity


In order to meet the challenges presented by enterprise use of mobile apps and cloud services, a new generation of identity protocols has been developed using the same building blocks as the modern application architectures they must secure: REST APIs and JSON.


OpenID Connect 1.0 profiles and extends OAuth 2.0 to add an identity layer, creating a single framework that promises to secure APIs, native mobile applications and browser applications in a single, cohesive architecture.


In this session you will learn:

  • The differences between OAuth 2.0 and OpenID Connect
  • The advantages of using Connect in your applications
  • Best practices and examples for using OpenID Connect

Session 1 | Partner Identity: Securing and Streamlining Your Partner Ecosystem

Matt Klassen, Director of Solutions Marketing, Ping Identity

Ranjan Jain, Security Architect (Enterprise IT), Cisco


Giving suppliers or channel partners simple access to critical applications is imperative to the business ecosystem in most enterprises, but maintaining partner logins and passwords is expensive and a major security risk. Learn how leading global enterprises are innovating with identity management solutions to solve this challenge for large and small partner entities alike.


Join us for this session to learn:

  • Key challenges in solving the supply chain identity challenge
  • Insights into architecting an identity solution for small, medium and large partners - case studies will be discussed
  • How you can connect partners quickly and securely using federation standards


Session 2 | Security by Design: How Customer Identity Solutions Can Help You Win the Customer Experience Battle

Rob Davis, Director - Security Services, TIAA-CREF

David Keiper, Sr. Director, OSS (Operations Support Systems), Mediacom Communications Corporation


Over the last 5 years, there has been a major shift in the demands on how enterprises secure customer identities and offer access to critical applications. Hyper-connected customers are blurring the lines of customer interactions as they adopt new patterns of engagement that spread the customer journey across multiple channels. Marketing and lines of business must now partner with IAM teams to address these new customer behaviors and deliver the right solution.


Join us in this session as we discuss:

  • Why customer identity and access management (CIAM) solution demands a different approach than enterprise IAM
  • A blueprint for delivering identity-centric customer experiences across channels
  • Lessons learned from your peers who have implemented successful CIAM solutions


Session 3 | Workforce Identity: Making the Clouds Work Together – The Value of Standards in Your Identity Project

Justin Slaten, Netflix


Netflix lives in the cloud. From their leading Internet television network, to all of their internal applications – everything is in the cloud.  When their existing single sign-on solution was proving hard to integrate with their core business applications, they looked to implement a standards-based approach to integrate applications with their identity stores.


In this session you’ll learn:

  • How Netflix was able to deploy 100% in the cloud
  • Why it is important to work with standards
  • Lessons learned along the way (and pitfalls to watch out for)


Session 4 | Expanding Your Enterprise IAM to the Cloud – The Ping Way

Loren Russon, VP Product Management, Ping Identity


Over the past several years, one of the most significant advancements in IT has been the shift to cloud-based Identity and Access Management solutions (IAM). The transformation that the cloud brings to identity has been massive as it spans across multiple use cases and deployment models to support a wide variety of legacy and cloud applications, services and devices. In this session, we will discuss:

  • How Ping's products and services allow you to embrace IDaaS and private/public clouds to securely manage your workforce, partners and consumers
  • How to expand your enterprise IAM to embrace the Internet of Things (IoT)
  • How our customers and partners are already using Ping's products to take advantage of these opportunities


Healthcare Session  | Is Your Healthcare Identity Management Sick?

Chip Ach, Senior Architect, Athena Health


The world of healthcare is complex when it comes to security and identity. So many identity types to deal with including patients, providers, caregivers and partners. In addition, there are many authentication and authorization hurdles due to stringent compliance of electronic medical and health records (EHR/EMR) as well as EPCS.


In this session Chip Ach, Senior Architect at Athena Health and Patrick Harding CTO at Ping Identity will discuss many of the most relevant identity and access management challenges regarding types of identities, compliance standards, authentication, credentialing, and authorization. They will share practical solutions to solving many of these challenges and where the identity is going for healthcare.



Closing Keynote | Enterprise Identity: 2016 and Beyond

Mark Diodati, Research Vice President, Gartner


IT organizations are experiencing challenges due to the expansion of user constituencies, the push to leverage SaaS and IaaS providers, device-anywhere access, developer-first focus, unmet compliance expectations and the weakening of traditional authentication systems. Mark will explore these challenges as seen through the perspective of Gartner’s clients, who constitute 80% of the Global 500 and 65% of the Fortune 1000. Mark will use this information as the foundation for the discussion of key trends for 2016 and beyond.

Our Sponsors

IDENTIFY 2015 - New York | Ping Identity