Richard
Stiennon
CYBERSYMPOSIUMS
&
Explore how Zero Trust and modern identity strategies—passwordless authentication, least‑privilege lifecycle for human and non‑human identities, and strict data governance—redefine security for 2026. Panelists unpack supply‑chain risks, agentic AI, identity as the new perimeter and practical playbooks (deprecate legacy AD, automate audits, red‑teaming) so leaders can reduce attack surface, boost resilience and win executive buy‑in.
Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets
PO Security addresses the challenges of managing privileged access in modern cloud environments, focusing on ensuring short-lived, least privileged and auditable access to enhance security. This demo showcases their product’s innovative approach to operationalize least privilege and eliminate reliance on static credentials, aiming to improve security and compliance for organizations.
This demo shows how GitGuardian’s NHI Security Platform manages and governs NHIs by detecting hard-coded secrets across various environments, ensuring compliance, and preventing security breaches by providing comprehensive visibility into secret management. By leveraging advanced detection technologies, GitGuardian empowers teams to maintain secure access while streamlining their development processes
In an insightful interview, Shashwat Sehgal, CEO & Founder of P0 Security, discusses the evolving landscape of identity management, emphasizing the need for modern PAM solutions to address the complexities of non-human identities (NHIs) and AI agents. He highlights P0 Security’s approach to providing a unified platform for managing privileged access across diverse environments, ensuring short-lived, least-privileged and auditable access for all identities.
Join identity leaders as they unpack trends shaping digital identity, human centric design, passkeys and zero trust, workload NHI challenges and the business case for identity as a product or service. Learn practical real world steps to align IAM with business goals, boost executive buy in, manage credential lifecycles and scale for AI agents while reducing profit volatility and operational risk.
This demo shows how GitGuardian’s NHI Security Platform manages and governs NHIs by detecting hard-coded secrets across various environments, ensuring compliance, and preventing security breaches by providing comprehensive visibility into secret management. By leveraging advanced detection technologies, GitGuardian empowers teams to maintain secure access while streamlining their development processes
In an insightful interview, Shashwat Sehgal, CEO & Founder of P0 Security, discusses the evolving landscape of identity management, emphasizing the need for modern PAM solutions to address the complexities of non-human identities (NHIs) and AI agents. He highlights P0 Security’s approach to providing a unified platform for managing privileged access across diverse environments, ensuring short-lived, least-privileged and auditable access for all identities.
PO Security addresses the challenges of managing privileged access in modern cloud environments, focusing on ensuring short-lived, least privileged and auditable access to enhance security. This demo showcases their product’s innovative approach to operationalize least privilege and eliminate reliance on static credentials, aiming to improve security and compliance for organizations.
Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets