&

Identity

CYBERSYMPOSIUMS HOSTS

Discussion Panelists

  • Ankush Chowdhary, SVP & CISO, HP Enterprise
  • Don Cox, CISO, American Public Education
  • Zaheer Shaikh, CISO, Al Maryah Community Bank
  • Jim Rutt, CIO/CISO, The Dana Foundation
  • Ashish Atri, CISO, InvestCloud
  • Merlin Namuth, CISO, City and County of Denver
  • Sam Rehman, CISO and SVP, Epam Systems
  • Dean Sapp, CISO, Filevine
  • Omar Khawaja, CISO, Databricks
  • Timothy Amerson, Founder/CEO/CISO, CASMO
  • Andrew Otashen, CISO, Marketplace
  • Patrick Angel, CISO, WGroup
  • Mark Butler, CISO, Trace3
  • Greg Rogers, CISO, GuidePoint Security
  • Curtis Blais, CISO, Cybera
  • Asish Atri, CISO, InvestCloud

Sponsors

TOPICS

DATE
TIME
TOPIC
July
LIVE NOW
View Panel
TBD

Panel: Zero Trust and Identity: Reinventing Security Postures in Modern Organizations
  • Morey Haber
  • Bill Willis
  • Matthew Dreher
  • Jim Rutt

PANEL:

Zero Trust and Identity: Reinventing Security Postures in Modern Organizations

Explore how Zero Trust and modern identity strategies—passwordless authentication, least‑privilege lifecycle for human and non‑human identities, and strict data governance—redefine security for 2026. Panelists unpack supply‑chain risks, agentic AI, identity as the new perimeter and practical playbooks (deprecate legacy AD, automate audits, red‑teaming) so leaders can reduce attack surface, boost resilience and win executive buy‑in.

Related Solutions

Secretless, Zero‑Trust Workload IAM for Machine‑to‑Machine Access

Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets

Read more..

Innovative Security for Cloud Access

PO Security addresses the challenges of managing privileged access in modern cloud environments, focusing on ensuring short-lived, least privileged and auditable access to enhance security. This demo showcases their product’s innovative approach to operationalize least privilege and eliminate reliance on static credentials, aiming to improve security and compliance for organizations.

Read more..

Control of NHI Security through Detection and Governance

This demo shows how GitGuardian’s NHI Security Platform manages and governs NHIs by detecting hard-coded secrets across various environments, ensuring compliance, and preventing security breaches by providing comprehensive visibility into secret management. By leveraging advanced detection technologies, GitGuardian empowers teams to maintain secure access while streamlining their development processes

Read more..

Unified Approach to Modern PAM & NHI Management

In an insightful interview, Shashwat Sehgal, CEO & Founder of P0 Security, discusses the evolving landscape of identity management, emphasizing the need for modern PAM solutions to address the complexities of non-human identities (NHIs) and AI agents. He highlights P0 Security’s approach to providing a unified platform for managing privileged access across diverse environments, ensuring short-lived, least-privileged and auditable access for all identities.

Read more..
COLLAPSE
July
LIVE NOW
View Panel
TBD

Panel: The Future of Identity: Trends Shaping Identity Management in the Digital Age
  • Andrew Hindle
  • Dean Sapp
  • Jim Rutt
  • Vladislav Shapiro

PANEL:

The Future of Identity: Trends Shaping Identity Management in the Digital Age

Join identity leaders as they unpack trends shaping digital identity, human centric design, passkeys and zero trust, workload NHI challenges and the business case for identity as a product or service. Learn practical real world steps to align IAM with business goals, boost executive buy in, manage credential lifecycles and scale for AI agents while reducing profit volatility and operational risk.

Related Solutions

Control of NHI Security through Detection and Governance

This demo shows how GitGuardian’s NHI Security Platform manages and governs NHIs by detecting hard-coded secrets across various environments, ensuring compliance, and preventing security breaches by providing comprehensive visibility into secret management. By leveraging advanced detection technologies, GitGuardian empowers teams to maintain secure access while streamlining their development processes

Read more..

Unified Approach to Modern PAM & NHI Management

In an insightful interview, Shashwat Sehgal, CEO & Founder of P0 Security, discusses the evolving landscape of identity management, emphasizing the need for modern PAM solutions to address the complexities of non-human identities (NHIs) and AI agents. He highlights P0 Security’s approach to providing a unified platform for managing privileged access across diverse environments, ensuring short-lived, least-privileged and auditable access for all identities.

Read more..

Innovative Security for Cloud Access

PO Security addresses the challenges of managing privileged access in modern cloud environments, focusing on ensuring short-lived, least privileged and auditable access to enhance security. This demo showcases their product’s innovative approach to operationalize least privilege and eliminate reliance on static credentials, aiming to improve security and compliance for organizations.

Read more..

Secretless, Zero‑Trust Workload IAM for Machine‑to‑Machine Access

Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets

Read more..
COLLAPSE
NOV
LIVE NOW
View Panel
TBD
AI Icon
The Future of Identity: Trends Shaping Identity Management in the Digital Age
NOV
LIVE NOW
View Panel
TBD
AI Icon
Identity Verification vs. Identity Authentication: Understanding the Key Differences
NOV
LIVE NOW
View Panel
TBD
AI Icon
Navigating the Complexity of Identity Strategy Implementation
NOV
LIVE NOW
View Panel
TBD
AI Icon
The Role of AI in Enhancing Identity Verification Processes
AI SESSION
DIC
LIVE NOW
View Panel
TBD
AI Icon
Zero Trust and Identity: Reinventing Security Postures in Modern Organizations
DIC
LIVE NOW
View Panel
TBD
AI Icon
The Importance of Multi-Factor Authentication (MFA) in Modern Identity Management
DIC
LIVE NOW
View Panel
TBD
AI Icon
Challenges of Identity Management in a Remote Work Environment
DIC
LIVE NOW
View Panel
TBD
AI Icon
AI-Powered Identity Analytics: Predicting and Preventing Identity Fraud
AI SESSION
JAN
LIVE NOW
View Panel
TBD
AI Icon
The Intersection of Identity and Customer Experience: Balancing Security and Usability
JAN
LIVE NOW
View Panel
TBD
AI Icon
Identity Governance: Ensuring Compliance and Risk Management through Effective Oversight
JAN
LIVE NOW
View Panel
TBD
AI Icon
Emerging Standard: Disrupting the Marketability of Stolen Browser Cookies
JAN
LIVE NOW
View Panel
TBD
AI Icon
Using AI and Otel to Capture Unknown-Unknown Authentication Flows
AI SESSION
FEB
LIVE NOW
View Panel
TBD
AI Icon
The Rise of Biometric Authentication: Opportunities and Privacy Concerns
FEB
LIVE NOW
View Panel
TBD
AI Icon
Managing Third-Party Identities: Strategies for Secure Vendor and Partner Access
FEB
LIVE NOW
View Panel
TBD
AI Icon
Identity and Access Management (IAM) in the Cloud: Best Practices for Security
FEB
LIVE NOW
View Panel
TBD
AI Icon
AI and Machine Learning in Identity Threat Detection: Transforming Security Posture
AI SESSION
FEB
LIVE NOW
View Panel
TBD
AI Icon
Identity Lifecycle Management: Automating Provisioning and De-Provisioning Processes
FEB
LIVE NOW
View Panel
TBD
AI Icon
Future-Proofing Identity Management: Preparing for Emerging Technologies and Threats
FEB
LIVE NOW
View Panel
TBD
AI Icon
AI-Driven Identity Governance: Automating Compliance and Risk Assessment Processes
AI SESSION