IDENTIFY San Francisco | Ping Identity

Tomorrow's Secure Enterprise Starts Today

IDENTIFY is uniquely designed for IT leaders, Security Experts and Enterprise Architects alike. Whether you’re a current customer, a partner, or a friend of Ping Identity, you’ll benefit from the opportunity to network with hundreds of your peers. You will also have unlimited access to Ping experts and a full day of new and valuable content to leverage within your organization.


Venue & Location

Contemporary Jewish Museum
736 Mission Street
San Francisco, CA 94103



8:00 am - 9:00 am | Check-In/Breakfast
9:00 am - 5:00 pm | Keynotes & Sessions
4:35 pm - 6:00 pm | Reception - Drinks & Apps



Hearst Parking Center: 45 Third St. (at Stevenson St.)
Jessie Square Garage: 223 Stevenson St., directly below the Museum
Fifth & Mission Yerba Buena Garage: 833 Mission St. (between 4th St. and 5th St.)


Don't miss this event! Fill out the form to join us on October 21st in San Francisco.

Register for IDENTIFY 2015 San Francisco

8:00 am - 9:00 am Registration and Breakfast  
9:00 am - 10:15 am Welcome & Keynote Address:
  • Andre Durand, CEO, Ping Identity, "Security without Borders. Taming the Cloud and Mobile Frontier"
  • Patrick Harding, CTO, Ping Identity, "Our Vision: Identity Defined Security"
10:15 am - 10:30 am Break  
  Track 1 | Identity Defined Security Capabilities: Building Blocks of Ping Identity Platform    Track 2 | Identity Defined Security Solutions: Enterprise Insights into Customer, Partner, and Workforce Identity
10:30 am - 11:15 am Track 1 | Session 1
Federated Access Management: Migration Off Legacy WAM 
Track 2 | Session 1
Partner Identity: Securing and Streamlining Your Partner Ecosystem
11:25 am - 12:10 pm Track 1 | Session 2
Federated Access Management: Contextual Authentication – Outsmarting Fraudsters
Track 2 | Session 2
Security by Design: How Customer Identity Solutions Can Help You Win the Customer Experience Battle
12:10 pm - 1:00 pm Networking Lunch  
1:00 pm - 1:45pm Identity Thought Leaders Panel | Moderator, Brian Bell, Chief Marketing Officer, Ping Identity
  • The Future of Workforce Identity
  • Customer Experience and Identity
  • Cloud Governance
1:45 pm - 2:00 pm Break  
2:00 pm - 2:45 pm Track 1 | Session 3
Federated Identity Administration: Identity Orchestration – A New Cloud Agnostic Solution for User Provisioning
Track 2 | Session 3
Workforce Identity: Making the Clouds Work Together – The Value of Standards in Your Identity Project
2:55 pm - 3:40 pm Track 1 | Session 4
OpenID Connect: An Overview and Best Practices
Track 2 | Session 4
Expanding Your Enterprise IAM to the Cloud – The Ping Way
3:50 pm - 4:35 pm Closing Keynote: The Cutting Edge: Standards at Work in Google's Mobile-Focused Future, Eric Sachs, Product Manager, Identity, Google and Pam Dingle, Senior Technical Architect, Ping Identity
Closing Remarks: Andre Durand, CEO, Ping Identity
4:35 pm - 6:00 pm Cocktail Reception  

Session 1 | Federated Access Management: Migration Off Legacy WAM

Scott Tomilson, Technical Product Management, Ping Identity

Kevin Shanley, Associate Director and Practice Lead, Aurionpro


The word ‘migration’ often sends shivers down spines. Luckily, migrating to the Ping Identity Federated Access Management solution can be a non-disruptive process for your end users. Our products can co-exist with your existing identity and access management (IAM) infrastructure to reduce friction during a migration - avoiding any risky ‘rip and replace’ approaches. The end result of your planning and work will be a simpler, more agile access management infrastructure supporting your WAM needs of yesterday and API security needs of today, all using modern open standards like OAuth and OpenID Connect to plan for the future.


In this session customers will learn:

  • Architecture of the Ping Identity Federated Access Management solution
  • Strategies for migrating Access Control and Session Management Policies
  • Customer testimonial of the challenges of legacy WAM and the benefits derived from Ping Identity


Session 2 | Federated Access Management: Contextual Authentication - Outsmarting Fraudsters

Paul Madsen, Senior Technical Architect, Ping Identity

Mark Batchelor, Senior Director - Regional Solution Architects , Ping Identity


The world of cyber threats continues to evolve and as more sophisticated threats emerge and rise, you must verify that you are ready to outsmart the attackers.  In this session we’ll discuss:

  • What contextual authentication is and why it is a must in order to defend your organization and not burden your users. 
  • What Ping is doing today and how we can help you. Case studies will be highlighted.
  • The future at Ping - intelligent authentication takes a further step-up.  


Session 3 | Federated Identity Administration:  Identity Orchestration – A New Cloud Agnostic Solution for User Provisioning

Jason Arrington, Product Management, Ping Identity


Provisioning user accounts to SaaS and on-premises systems remains a challenge using existing tools. Legacy IDM products are powerful but complex, and were never designed for the cloud. Provisioning features of IDaaS products lack needed power and flexibility. Ping's upcoming Identity Orchestration product was designed from the ground up to give customers the tools they need to keep their cloud and on-premises user stores consistent in a flexible, extensible way. In this session we’ll discuss:

  • The challenges with existing approaches for provisioning and de-provisioning
  • High-level features and architecture for Identity Orchestration
  • Timelines for the product launch and future roadmap features from Ping Identity


Session 4 | OpenID Connect: An Overview and Best Practices

Allyn Fay, Product Marketing, Ping Identity
David Chase, Senior Software Architect, Ping Labs, Ping Identity


In order to meet the challenges presented by enterprise use of mobile apps and cloud services, a new generation of identity protocols has been developed using the same building blocks as the modern application architectures they must secure: REST APIs and JSON.


OpenID Connect 1.0 profiles and extends OAuth 2.0 to add an identity layer, creating a single framework that promises to secure APIs, native mobile applications and browser applications in a single, cohesive architecture.


In this session you will learn:

  • The differences between OAuth 2.0 and OpenID Connect
  • The advantages of using Connect in your applications
  • Best practices and examples for using OpenID Connect

Session 1 | Partner Identity: Securing and Streamlining Your Partner Ecosystem

Matt Klassen, Director of Solutions Marketing, Ping Identity

Ranjan Jain, Security Architect (Enterprise IT) , Cisco


Giving suppliers or channel partners simple access to critical applications is imperative to the business ecosystem in most enterprises, but maintaining partner logins and passwords is expensive and a major security risk. Learn how leading global enterprises are innovating with identity management solutions to solve this challenge for large and small partner entities alike.


Join us for this session to learn:

  • Key challenges in solving the supply chain identity challenge
  • Insights into architecting an identity solution for small, medium and large partners - case studies will be discussed
  • How you can connect partners quickly and securely using federation standards


Session 2 | Security by Design: How Customer Identity Solutions Can Help You Win the Customer Experience Battle

Christine Bevilacqua, Solutions Marketing, Ping Identity

Robert Davis, Director Security Services, TIAA CREF


Over the last 5 years, there has been a major shift in the demands on how enterprises secure customer identities and offer access to critical applications. Hyper-connected customers are blurring the lines of customer interactions as they adopt new patterns of engagement that spread the customer journey across multiple channels. Marketing and lines of business must now partner with IAM teams to address these new customer behaviors and deliver the right solution.


Join us in this session as we discuss:

  • Why customer identity and access management (CIAM) solution demands a different approach than enterprise IAM
  • A blueprint for delivering identity-centric customer experiences across channels
  • Lessons learned from your peers who have implemented successful CIAM solutions


Session 3 | Workforce Identity: Making the Clouds Work Together – The Value of Standards in Your Identity Project

Justin Slaten, Manager, Enterprise Technology & Client Systems, Netflix

Jonathan Hurd, Sr Systems Architect, Netflix


Netflix lives in the cloud. From their leading Internet television network, to all of their internal applications – everything is in the cloud.  When their existing single sign-on solution was proving hard to integrate with their core business applications, they looked to implement a standards-based approach to integrate applications with their identity stores.


In this session you’ll learn:

  • How Netflix was able to deploy 100% in the cloud
  • Why it is important to work with standards
  • Lessons learned along the way (and pitfalls to watch out for)


Session 4 | Expanding Your Enterprise IAM to the Cloud – The Ping Way

Loren Russon, VP Product Management, Ping Identity


Over the past several years, one of the most significant advancements in IT has been the shift to cloud-based Identity and Access Management solutions (IAM). The transformation that the cloud brings to identity has been massive as it spans across multiple use cases and deployment models to support a wide variety of legacy and cloud applications, services and devices. In this session, we will discuss:

  • How Ping's products and services allow you to embrace IDaaS and private/public clouds to securely manage your workforce, partners and consumers
  • How to expand your enterprise IAM to embrace the Internet of Things (IoT)
  • How our customers and partners are already using Ping's products to take advantage of these opportunities


Our Sponsors

IDENTIFY San Francisco | Ping Identity