BI Logo

ABOUT  AGENDA  |  TRAVEL  |  FAQ

BeyondCon LP (2000 x 400 px) (3)
BeyondCon LP (2000 x 400 px) (600 x 400 px) (1)

Agenda

Join us at Beyond Identity's premier event, BeyondCon 2024. Designed for senior-level cybersecurity leaders to discuss, share, and learn innovations about the growing impacts of Identity and Access Management, BeyondCon will be held in person only at Beyond Identity’s Headquarters. 

Register Now

   
Wednesday, September 11
6:00pm Registation & Welcome Reception
7:00pm Welcome Dinner
9:00pm Soft ending to the night
Thursday, September 12
8:00am Breakfast & Registration
9:00am Welcome & Kickoff Jasson Casey, CEO - Beyond Identity
9:30am Beyond Identity Product Roadmap and Vision Joy Chen, VP of Product and Growth
11:00am Break
11:15am Ecosystem Panel: Featuring TBD
11:45pm The State of Identity
12:30pm Birds-of-a-feather Lunch
1:30pm Case Study #1
2:15pm Case Study #2
3:00pm Break
3:30pm Case Study #3
4:30pm Wrap Up Jasson Casey, Beyond Identity
5:00pm Reception and Farewell

 

   
Wednesday, September 11
6:00pm  Dinner and a Private Experience with the Hamilton Cast 
Thursday, September 12
8:00am Breakfast & Registration
9:00am Welcome Address and Product Display
9:45am IAM Monsters
10:45am Putting the Four Components of Modern Identity to Work
11:30am ZeroTrust in the Contemporary Cyber World
12:15pm Lunch + Technology Showcase
1:30pm The Fifth Horseman of the Apocalypse, Cyber
2:15pm Beyond Identity Customer Panel
3:00pm Making Sense of the Identity Puzzle
4:00pm AMA (Ask Me Anything) Session

 

Agenda

Join us at Beyond Identity's premier event, BeyondCon 2024. Designed for senior-level cybersecurity leaders to discuss, share, and learn innovations about the growing impacts of Identity and Access Management, BeyondCon will be held in person only at Beyond Identity’s Headquarters. 

Register Now
beyondcon-hamilton

Welcome dinner the night before - Bond 45 at 6:00 PM

Dinner and Private Experience with the Hamilton Cast


Members of the original cast of Hamilton will be in attendance at dinner the night before the conference to welcome you in true NYC style.

 

BeyondCon headshots video (8)

9:00 AM

Welcome Address and Product Display

  • Jasson Casey, Co-founder & CEO
  • Jing Gu, Sr. Product Marketing Manager
  • Louis Marascio, Sr. Product Architect
  • Sarah Cacchetti, Director of Platform Product

Welcome to BeyondCon! Join our CEO and the Beyond Identity team as we share our product vision and roadmap that doesn’t just address the Identity and Access Management challenges of today, it anticipates and conquers the risks and complexities of tomorrow. This session will outline our strategic platform direction, oriented around our three core product principles – secure by design, simple to administer, and easy to use. Beyond a roadmap, our opening session will present a blueprint for a future where identity is a keystone security component and the foundation of your defense against adversaries. Welcome to the future of identity! 

3-1

9:45 AM

IAM Monsters

Jonathan Sander: Security Expert, Former Snowflake Field CTO

Focus on IAM risk has never been higher with the emergence of ITDR. But Identity still doesn’t have enemies with cool names like ransomware or phishing to scare executives. Based on the idea of “ghost logins”, we will attempt to build a list of IAM Monsters that can be used to stick in the minds of management and give us shortcuts to attention and funding. We’ll explore why this is useful, how to tell the scary stories about our monsters, and ways to connect these beasts to the solutions we all know we need in place to defend our organizations.

2

10:45 AM

Putting the Four Components of Modern Identity to Work

Ian Glazer: Identity Expert, Weave Identity

The definitions we use to describe identity markets creak with age and no longer serve us well. Meanwhile, our identity infrastructure landscape is only getting more cluttered, making the understanding of what components an enterprise can use in which use cases, harder to achieve. In this talk, Ian Glazer will offer up an alternate way of describing the capabilities of identity infrastructure using the four major components of modern identity: policy, orchestration, execution, and data. He will discuss what these components are, how they fit together, and how different kinds of identity systems provide these components. He will talk about how to use these components to evaluate your identity landscape to better bring to bear the right tools for the jobs ahead.

4

11:30 AM

ZeroTrust in the Contemporary Cyber World

Sam Curry: Sam Curry, Field CISO, Zscaler 

For nearly a decade, ZeroTurst has been bandied about as a marketing term, used and abused by many. As we enter an era of AI-assisted offense, we can no longer default to open and connected standards and IT stacks. Instead, we must embrace ZeroTrust and only enable what the business needs when it needs it in architecting IT services. It’s time for the plumbing to commoditize, for the attack surface to shrink and for fine grained authorization at scale, truly leveraging the power of the connected world, to become the order of the day. This is what will ultimately make the greatest strides in cyber defense, in future readiness and in resilience in a world of accelerating disruption.

In this session, we will cover some basic principles of ZT and current and expected technology disruption and move on to advanced topics in a structured, open discussion format and an AMA session. Bring your ideas, your critical thinking, your tough questions and more. Chatham House Rules apply.

BeyondCon headshots video (9)

12:15 PM

Lunch + Technology Showcase

Join us for an interactive lunch at BeyondCon's Technology Showcase! This is your chance to see live product demos, ask questions, provide input, and meet the product managers and engineers behind our cutting-edge solutions. 

  • Platform Support:
    • Desktop Login & ChromeOS: See a demo of the latest features we’ve shipped to expand our platform support and learn about upcoming features and enhancements.
  • Integrations: Learn about the architectural improvements we’ve made to enable you to fully leverage the risk telemetry your tech stack provides. From Azure to Zscaler, there’s something here for every environment.
  • Secure SSO: As the newest addition to our platform, Secure SSO provides the first secure-by-design SSO on the market that provides a simple admin experience and fine-grained authorization policies.
  • Adaptive Policy Engine:Check out the latest updates to our policy engine including the ability to define custom attributes, enforce biometrics even on devices that don’t support biometrics or in clamshell mode, the ability to sequence authentication factors, and more.
  • Data & Analytics: See a demo and deep dive into new Risk Dashboards and learn more about the upcoming data and analytics improvements we’re making to help you simplify risk assessment, reporting, and continuous policy optimization.
  • Device360: Go deep into your device risk posture with a customizable SQL-based device query capabilities seamlessly integrated with our access policies. Learn more about the improvements coming up and let us know how we can tailor it for your use cases.
  • Access360: See your current risky authentication paths configured in your production Okta or Entra ID environment and learn more about our initiative to leverage these insights to simplify SSO migration.
  • RealityCheck: Learn more about our newest product designed to provide deterministic signals, simply visualized for end-users as a badge over their Zoom tile, to prevent deepfake fraud. See how it works and let us know how we can better support your use case.
  • General Demo: Want to see a platform demo of Beyond Identity including an overview of our risk assessment, phishing-resistant MFA, and SSO capabilities? This is the station for you to get an overview and ask questions to our experts. 
5

1:30 PM

The Fifth Horseman of the Apocalypse, Cyber

Chase Cunningham: Dr. Zero Trust

In the realm of national security and global stability, the traditional four horsemen of the apocalypse—war, famine, pestilence, and death—have long been harbingers of chaos. Now, a new and formidable adversary has emerged: Cyber.

  • The rise of Cyber as a game-changer in global security.
  • State-sponsored cyber warfare and sophisticated cybercriminal networks.
  • The borderless nature of cyber threats and their potential to destabilize nations and disrupt economies.
  • The fundamental struggle to preserve our way of life in the face of cyber threats.

Join Chase as he delves into the unprecedented implications of Cyber as the fifth horseman of the apocalypse and explores the urgent need for collective action to mitigate its devastating impact on our world.

9

2:15 PM

Beyond Identity Customer Panel

Hear firsthand from our customers as they share their experiences and success stories. Discover how Beyond Identity tackled their toughest identity security challenges, enhanced their security posture, and seamlessly integrated with their IT and security tools. Engage with our panelists, ask questions, and gain valuable insights into how their successes can help you achieve your organization's goals.

7

3:00 PM

Making Sense of the Identity Puzzle

Sarah Cecchetti: Director of Platform Product

Dean Saxe: Principal Engineer

Sometimes it seems like the topics in IAM innovation are complicated and distinct - device telemetry, phishing resistance, account recovery, fine-grained authorization, zero standing privilege. These topics intersect with a wide range of standards for authentication, authorization, identification, cryptography, and browser APIs. There are so many things for identity professionals to keep track of. The fact is that these puzzle pieces, which appear abstract and disconnected when viewed individually, all combine to create a beautiful, cohesive image. Beyond Identity is working on a future where users don’t need anti-phishing training because they don’t have passwords to be phished. They don’t need to keep track of their own credentials because they don’t have any standing privilege. Employees are free to do what they do best without needing constant vigilance and endless cybersecurity training because they work in an environment that is secure by design. Dean and Sarah will assemble the identity puzzle piece by piece and help you understand how all of these distinct areas of expertise come together to create a more vibrant, secure, and productive future.

BeyondCon headshots

4:00 PM

AMA (Ask Me Anything) Session: Beyond Identity’s Product and Engineering Team

Bob Burke: VP of Security and Infrastructure 

Sarah Cecchetti: Director of Platform Product

As we wrap up the day, join our “Ask Me Anything” session with the Beyond Identity product and engineering team! This is your chance to ask questions and get insights directly from the experts who develop our solutions. Learn about the challenges they’ve tackled, the technologies they’re excited about, and how our platform can meet your needs. Don’t miss this opportunity to connect and learn!

BeyondCon headshots video (6)

Meet BeyondCon's Emcee

Sam Huckaby: Senior Engineer

Sam has been trying to be a good developer for twenty years, and someday he hopes to make it. Prior to Beyond Identity, Sam worked in just about every other field of software from eCommerce to Journey Analytics to Advertising building a wheelhouse of (hopefully) useful skills along the way. At Beyond Identity, Sam is a senior engineer working to build the next generation of secure SSO along with a team of other experienced developers. In his off hours, Sam enjoys indie hacking with new and interesting languages like OCaml and going on adventures with his wife and two kids either in Minecraft or across the globe.