
Richard
Stiennon
CYBERSYMPOSIUMS
&
Lalit Choda
Non-Human Identity Management Group
Matthias Reinwarth
Director Practice IAM
Kuppinger Cole
Mark Kraynak
Founding Partner
Acrew Capital
Martin Sandren
IAM Product Leader
IKEA
Steven Rennick
IAM Architect
Cienna
Larry Whiteside
Co-Founder & President
Confide & CISO Society
Adam Ochayon
Director of Product Strategy & GTM
Oasis Security
Sebastian Rohr
Member
Umbrella Security Operations GmbH
Moriah Hara
CISO
Vigilance Cyber Security
Confidence Staveley
Founder
CyberSafe + AI Cyber Magazine
Daniel Cohen
SVP Enterprise Security Architecture
Paramount
Lisa Kuo
Sr. Product Manager
Rabobank
Jesse Minor
Identity Security Expert
KPMG US
Eli Erlikhman
CISO - VP Of Cyber Security
Sprinklr
Andrew Hindle
Co-Founder
The Identity Salon
Morey Haber
Chief Security Advisor
BeyondTrust
Sarah Villarmarzo
Senior Manager
Easy Dynamics Corp
Matthias Geselle
SVP IT Infrastructure Technology
Merck Group
Andrew Hughes
Secretary Board of Directors
Kantara Initiative
James Bonifield
Managing Partner
Anthropic Identity
Chetan Jha
Head of Identity Security
Marqeta
Paul Lanzi
Founder & Principal Consultant | IDEnovate
Forgepoint Capital
Edlira Martiri
Co-Founder
Cyber Morfosis
Jon Shamah
Co-Founder
Global Trust Foundation
Robert Garskamp
Founder
IDnext association
Noa Hen
Director of Strategy
Team8
Eidan Siniver
Cyber, Data&AI CTO
Team8
Aditya Vats
Principal Marketing Consultant
MARKIVIS
James Hauswirth
Global Managing Director - PAM
Cyderes
Joshua Wilson
Lead Security Architect
PRA Group
Rahul Godha
Staff Software Engineer
Sameer Bhanushali
Member
Lead- Identity & Collaboration Enterprise Solutions
Sanjeev Ojha
Practice Director - ZeroTrust, PAM, IAM & IGA
Cyderes
Omar Ahmed
Managing Director
PRIVSecure Solutions
Anthony Viggiano
Identity and Access Management Leader
Kévin Kisoka
Lead Architect
Goverment
Kavita Gandhi
Sr. Director, Security Engineering: Global IAM
PwC
Jon G Shende
Cloud, AI/LLM Technology & Security Leader
Sutherland
Gagan Mathur
Program Manager Enterprise Technology
Shell
Amit Karp
Partner
Bessemer Venture Partners
Deepak Jeevankumar
Managing Director
Dell Technologies Capital
Guru Chahal
General Partner
Lightspeed Venture Partners
Jake Seid
Co-Founder and Managing Director
Ballistic Ventures
Mark Hatfield
Founding Partner
Ten Eleven Ventures
Mary D'Onofrio
Partner
Bessemer Venture Partners
Matt Bigge
Partner
Crosslink Capital
Oren Yunger
Managing Partner
Notable Capital
Ping Li
General Partner
Accel
Praveen Akkiraju
Managing Director
Insight Partners
Rama Sekhar
Partner
Norwest Venture Partners
Raviraj Jain
Partner
Lightspeed Venture Partners
This panel explores the critical role of NHIs in modern cybersecurity, addressing their significance, challenges and the evolving landscape around NHIs. Experts delve into the complexities of managing NHIs amidst the rise of APIs, microservices, and automation, emphasizing the need for robust governance, adaptive authentication, and the integration of identity management practices to mitigate risks and enhance security in increasingly interconnected environments.
PO Security addresses the challenges of managing privileged access in modern cloud environments, focusing on ensuring short-lived, least privileged and auditable access to enhance security. This demo showcases their product’s innovative approach to operationalize least privilege and eliminate reliance on static credentials, aiming to improve security and compliance for organizations.
This demo shows how GitGuardian’s NHI Security Platform manages and governs NHIs by detecting hard-coded secrets across various environments, ensuring compliance, and preventing security breaches by providing comprehensive visibility into secret management. By leveraging advanced detection technologies, GitGuardian empowers teams to maintain secure access while streamlining their development processes
In an insightful interview, Shashwat Sehgal, CEO & Founder of P0 Security, discusses the evolving landscape of identity management, emphasizing the need for modern PAM solutions to address the complexities of non-human identities (NHIs) and AI agents. He highlights P0 Security’s approach to providing a unified platform for managing privileged access across diverse environments, ensuring short-lived, least-privileged and auditable access for all identities.
Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets
This panel focuses on securing NHIs in cloud environments, emphasizing their growing prevalence and associated risks. Experts explore strategies for governance, visibility, and management of NHIs, and the importance of adopting best practices such as just-in-time access and ephemeral credentials. The conversation underscores the necessity of integrating these practices into broader security frameworks to mitigate risks and enhance organizational resilience.
This demo shows how GitGuardian’s NHI Security Platform manages and governs NHIs by detecting hard-coded secrets across various environments, ensuring compliance, and preventing security breaches by providing comprehensive visibility into secret management. By leveraging advanced detection technologies, GitGuardian empowers teams to maintain secure access while streamlining their development processes
PO Security addresses the challenges of managing privileged access in modern cloud environments, focusing on ensuring short-lived, least privileged and auditable access to enhance security. This demo showcases their product’s innovative approach to operationalize least privilege and eliminate reliance on static credentials, aiming to improve security and compliance for organizations.
Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets
In an insightful interview, Shashwat Sehgal, CEO & Founder of P0 Security, discusses the evolving landscape of identity management, emphasizing the need for modern PAM solutions to address the complexities of non-human identities (NHIs) and AI agents. He highlights P0 Security’s approach to providing a unified platform for managing privileged access across diverse environments, ensuring short-lived, least-privileged and auditable access for all identities.
This panel discussion explores the complexities of securing non-human identities (NHIs) in a rapidly evolving digital landscape. Experts delve into the rise of machine identities, the challenges of governance, and the need for robust security measures. They emphasize the importance of discovery, education, and collaboration across organizations to effectively manage NHIs and mitigate associated risks in a connected world.
This demo shows how GitGuardian’s NHI Security Platform manages and governs NHIs by detecting hard-coded secrets across various environments, ensuring compliance, and preventing security breaches by providing comprehensive visibility into secret management. By leveraging advanced detection technologies, GitGuardian empowers teams to maintain secure access while streamlining their development processes
PO Security addresses the challenges of managing privileged access in modern cloud environments, focusing on ensuring short-lived, least privileged and auditable access to enhance security. This demo showcases their product’s innovative approach to operationalize least privilege and eliminate reliance on static credentials, aiming to improve security and compliance for organizations.
Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets
In an insightful interview, Shashwat Sehgal, CEO & Founder of P0 Security, discusses the evolving landscape of identity management, emphasizing the need for modern PAM solutions to address the complexities of non-human identities (NHIs) and AI agents. He highlights P0 Security’s approach to providing a unified platform for managing privileged access across diverse environments, ensuring short-lived, least-privileged and auditable access for all identities.
This panel discussion delves into the critical topic of non-human machine identities (NHIs), exploring their historical context, current challenges and the urgency of addressing security concerns in an increasingly automated landscape. Experts share insights on the risks associated with NHIs, including their appeal to attackers and the necessity for improved governance and situational awareness, ultimately advocating for collaborative solutions to mitigate technical debt and enhance security measures.
This demo shows how GitGuardian’s NHI Security Platform manages and governs NHIs by detecting hard-coded secrets across various environments, ensuring compliance, and preventing security breaches by providing comprehensive visibility into secret management. By leveraging advanced detection technologies, GitGuardian empowers teams to maintain secure access while streamlining their development processes
PO Security addresses the challenges of managing privileged access in modern cloud environments, focusing on ensuring short-lived, least privileged and auditable access to enhance security. This demo showcases their product’s innovative approach to operationalize least privilege and eliminate reliance on static credentials, aiming to improve security and compliance for organizations.
Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets
In an insightful interview, Shashwat Sehgal, CEO & Founder of P0 Security, discusses the evolving landscape of identity management, emphasizing the need for modern PAM solutions to address the complexities of non-human identities (NHIs) and AI agents. He highlights P0 Security’s approach to providing a unified platform for managing privileged access across diverse environments, ensuring short-lived, least-privileged and auditable access for all identities.
Harnessing AI for Non-Human Identity Threat Detection - This panel explores how AI can be harnessed to detect and mitigate threats targeting non-human identities such as bots, APIs, IoT devices, and machine accounts. Experts discuss the AI driven approaches for anomaly detection and behavioral analytics that can transform how to deal with identifying and detecting inappropropriate use of non-human identities.
This demo shows how GitGuardian’s NHI Security Platform manages and governs NHIs by detecting hard-coded secrets across various environments, ensuring compliance, and preventing security breaches by providing comprehensive visibility into secret management. By leveraging advanced detection technologies, GitGuardian empowers teams to maintain secure access while streamlining their development processes
PO Security addresses the challenges of managing privileged access in modern cloud environments, focusing on ensuring short-lived, least privileged and auditable access to enhance security. This demo showcases their product’s innovative approach to operationalize least privilege and eliminate reliance on static credentials, aiming to improve security and compliance for organizations.
Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets
In an insightful interview, Shashwat Sehgal, CEO & Founder of P0 Security, discusses the evolving landscape of identity management, emphasizing the need for modern PAM solutions to address the complexities of non-human identities (NHIs) and AI agents. He highlights P0 Security’s approach to providing a unified platform for managing privileged access across diverse environments, ensuring short-lived, least-privileged and auditable access for all identities.
The OWASP Non-Human Identity Top-10 - This panel covers the OWASP Non-Human Identity Top-10, a comprehensive list of the most pressing security risks and vulnerabilities that non-human identities present to organizations. Experts share insights on these risks, many of which are related to weak lifecycle processes and controls from improper offboarding, secret leakage, overprivileged NHIs, sharing of NHIs, human use NHIs to long-lived secrets. The experts also share guidance on how to mitigate these risks.
This demo shows how GitGuardian’s NHI Security Platform manages and governs NHIs by detecting hard-coded secrets across various environments, ensuring compliance, and preventing security breaches by providing comprehensive visibility into secret management. By leveraging advanced detection technologies, GitGuardian empowers teams to maintain secure access while streamlining their development processes
PO Security addresses the challenges of managing privileged access in modern cloud environments, focusing on ensuring short-lived, least privileged and auditable access to enhance security. This demo showcases their product’s innovative approach to operationalize least privilege and eliminate reliance on static credentials, aiming to improve security and compliance for organizations.
Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets
In an insightful interview, Shashwat Sehgal, CEO & Founder of P0 Security, discusses the evolving landscape of identity management, emphasizing the need for modern PAM solutions to address the complexities of non-human identities (NHIs) and AI agents. He highlights P0 Security’s approach to providing a unified platform for managing privileged access across diverse environments, ensuring short-lived, least-privileged and auditable access for all identities.