&

Non-Human / Machine Identity Mgmt

In Partnership with:

CYBERSYMPOSIUMS HOSTS

Sponsors

Non-Human / Machine Identity Mgmt PROGRAM HOSTS

Lalit Choda

Non-Human Identity Management Group

Lalit Choda

Matthias Reinwarth

Director Practice IAM

Kuppinger Cole

Matthias Reinwarth

Mark Kraynak

Founding Partner

Acrew Capital

Mark Kraynak

Martin Sandren

IAM Product Leader

IKEA

Martin Sandren

Steven Rennick

IAM Architect

Cienna

Steven Rennick

Larry Whiteside

Co-Founder & President

Confide & CISO Society

Larry Whiteside

Adam Ochayon

Director of Product Strategy & GTM

Oasis Security

Adam Ochayon

Sebastian Rohr

Member

Umbrella Security Operations GmbH

Sebastian Rohr

Moriah Hara

CISO

Vigilance Cyber Security

Moriah Hara

Confidence Staveley

Founder

CyberSafe + AI Cyber Magazine

Confidence Staveley

Daniel Cohen

SVP Enterprise Security Architecture

Paramount

Daniel Cohen

Lisa Kuo

Sr. Product Manager

Rabobank

Lisa Kuo

Jesse Minor

Identity Security Expert

KPMG US

Jesse Minor

Eli Erlikhman

CISO - VP Of Cyber Security

Sprinklr

Eli Erlikhman

Andrew Hindle

Co-Founder

The Identity Salon

Andrew Hindle

Morey Haber

Chief Security Advisor

BeyondTrust

Morey Haber

Sarah Villarmarzo

Senior Manager

Easy Dynamics Corp

Sarah Villarmarzo

Matthias Geselle

SVP IT Infrastructure Technology

Merck Group

Matthias Geselle

Andrew Hughes

Secretary Board of Directors

Kantara Initiative

Andrew Hughes

James Bonifield

Managing Partner

Anthropic Identity

James Bonifield

Chetan Jha

Head of Identity Security

Marqeta

Chetan Jha

Paul Lanzi

Founder & Principal Consultant | IDEnovate

Forgepoint Capital

Paul Lanzi

Edlira Martiri

Co-Founder

Cyber Morfosis

Edlira Martiri

Jon Shamah

Co-Founder

Global Trust Foundation

Jon Shamah

Robert Garskamp

Founder

IDnext association

Robert Garskamp

Noa Hen

Director of Strategy

Team8

Noa Hen

Eidan Siniver

Cyber, Data&AI CTO

Team8

Eidan Siniver

Aditya Vats

Principal Marketing Consultant

MARKIVIS

Aditya Vats

James Hauswirth

Global Managing Director - PAM

Cyderes

James Hauswirth

Joshua Wilson

Lead Security Architect

PRA Group

Joshua Wilson

Rahul Godha

Staff Software Engineer

LinkedIn

Rahul Godha

Sameer Bhanushali

Member

Lead- Identity & Collaboration Enterprise Solutions

Sameer Bhanushali

Sanjeev Ojha

Practice Director - ZeroTrust, PAM, IAM & IGA

Cyderes

Sanjeev Ojha

Omar Ahmed

Managing Director

PRIVSecure Solutions

Omar Ahmed

Anthony Viggiano

Identity and Access Management Leader

Anthony Viggiano

Kévin Kisoka

Lead Architect

Goverment

Kévin Kisoka

Kavita Gandhi

Sr. Director, Security Engineering: Global IAM

PwC

Kavita Gandhi

Jon G Shende

Cloud, AI/LLM Technology & Security Leader

Sutherland

Jon G Shende

Gagan Mathur

Program Manager Enterprise Technology

Shell

Gagan Mathur

Amit Karp

Partner

Bessemer Venture Partners

Amit Karp

Deepak Jeevankumar

Managing Director

Dell Technologies Capital

Deepak Jeevankumar

Guru Chahal

General Partner

Lightspeed Venture Partners

Guru Chahal

Jake Seid

Co-Founder and Managing Director

Ballistic Ventures

Jake Seid

Mark Hatfield

Founding Partner

Ten Eleven Ventures

Mark Hatfield

Mary D'Onofrio

Partner

Bessemer Venture Partners

Mary D'Onofrio

Matt Bigge

Partner

Crosslink Capital

Matt Bigge

Oren Yunger

Managing Partner

Notable Capital

Oren Yunger

Ping Li

General Partner

Accel

Ping Li

Praveen Akkiraju

Managing Director

Insight Partners

Praveen Akkiraju

Rama Sekhar

Partner

Norwest Venture Partners

Rama Sekhar

Raviraj Jain

Partner

Lightspeed Venture Partners

Raviraj Jain

TOPICS

DATE
TIME
TOPIC
July
LIVE NOW
View Panel
TBD

Panel: What Are Non-Human / Machine Identities
  • Anthony Viggiano
  • Jim Rutt
  • Steven Rennick
  • Anusha Iyer
  • Mark Kraynak

PANEL:

What Are Non-Human / Machine Identities

This panel explores the critical role of NHIs in modern cybersecurity, addressing their significance, challenges and the evolving landscape around NHIs. Experts delve into the complexities of managing NHIs amidst the rise of APIs, microservices, and automation, emphasizing the need for robust governance, adaptive authentication, and the integration of identity management practices to mitigate risks and enhance security in increasingly interconnected environments.

Related Solutions

Innovative Security for Cloud Access

PO Security addresses the challenges of managing privileged access in modern cloud environments, focusing on ensuring short-lived, least privileged and auditable access to enhance security. This demo showcases their product’s innovative approach to operationalize least privilege and eliminate reliance on static credentials, aiming to improve security and compliance for organizations.

Read more..

Control of NHI Security through Detection and Governance

This demo shows how GitGuardian’s NHI Security Platform manages and governs NHIs by detecting hard-coded secrets across various environments, ensuring compliance, and preventing security breaches by providing comprehensive visibility into secret management. By leveraging advanced detection technologies, GitGuardian empowers teams to maintain secure access while streamlining their development processes

Read more..

Unified Approach to Modern PAM & NHI Management

In an insightful interview, Shashwat Sehgal, CEO & Founder of P0 Security, discusses the evolving landscape of identity management, emphasizing the need for modern PAM solutions to address the complexities of non-human identities (NHIs) and AI agents. He highlights P0 Security’s approach to providing a unified platform for managing privileged access across diverse environments, ensuring short-lived, least-privileged and auditable access for all identities.

Read more..

Secretless, Zero‑Trust Workload IAM for Machine‑to‑Machine Access

Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets

Read more..
COLLAPSE
July
LIVE NOW
View Panel
TBD

Panel: Securing Non-Human Identities In The Cloud
  • Omar Ahmed
  • Jon Shende
  • Sameer Bhanushali

PANEL:

Securing Non-Human Identities In The Cloud

This panel focuses on securing NHIs in cloud environments, emphasizing their growing prevalence and associated risks. Experts explore strategies for governance, visibility, and management of NHIs, and the importance of adopting best practices such as just-in-time access and ephemeral credentials. The conversation underscores the necessity of integrating these practices into broader security frameworks to mitigate risks and enhance organizational resilience.

Related Solutions

Control of NHI Security through Detection and Governance

This demo shows how GitGuardian’s NHI Security Platform manages and governs NHIs by detecting hard-coded secrets across various environments, ensuring compliance, and preventing security breaches by providing comprehensive visibility into secret management. By leveraging advanced detection technologies, GitGuardian empowers teams to maintain secure access while streamlining their development processes

Read more..

Innovative Security for Cloud Access

PO Security addresses the challenges of managing privileged access in modern cloud environments, focusing on ensuring short-lived, least privileged and auditable access to enhance security. This demo showcases their product’s innovative approach to operationalize least privilege and eliminate reliance on static credentials, aiming to improve security and compliance for organizations.

Read more..

Secretless, Zero‑Trust Workload IAM for Machine‑to‑Machine Access

Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets

Read more..

Unified Approach to Modern PAM & NHI Management

In an insightful interview, Shashwat Sehgal, CEO & Founder of P0 Security, discusses the evolving landscape of identity management, emphasizing the need for modern PAM solutions to address the complexities of non-human identities (NHIs) and AI agents. He highlights P0 Security’s approach to providing a unified platform for managing privileged access across diverse environments, ensuring short-lived, least-privileged and auditable access for all identities.

Read more..
COLLAPSE
July
LIVE NOW
View Panel
TBD

Panel: The Rise Of Machines: Securing Non-Human Identities In A Connected World
  • Daniel Cohen
  • Steven Rennick
  • Mathias Reinwarth
  • Paul Lanzi
  • Joshua Wilson

PANEL:

The Rise Of Machines: Securing Non-Human Identities In A Connected World

This panel discussion explores the complexities of securing non-human identities (NHIs) in a rapidly evolving digital landscape. Experts delve into the rise of machine identities, the challenges of governance, and the need for robust security measures. They emphasize the importance of discovery, education, and collaboration across organizations to effectively manage NHIs and mitigate associated risks in a connected world.

Related Solutions

Control of NHI Security through Detection and Governance

This demo shows how GitGuardian’s NHI Security Platform manages and governs NHIs by detecting hard-coded secrets across various environments, ensuring compliance, and preventing security breaches by providing comprehensive visibility into secret management. By leveraging advanced detection technologies, GitGuardian empowers teams to maintain secure access while streamlining their development processes

Read more..

Innovative Security for Cloud Access

PO Security addresses the challenges of managing privileged access in modern cloud environments, focusing on ensuring short-lived, least privileged and auditable access to enhance security. This demo showcases their product’s innovative approach to operationalize least privilege and eliminate reliance on static credentials, aiming to improve security and compliance for organizations.

Read more..

Secretless, Zero‑Trust Workload IAM for Machine‑to‑Machine Access

Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets

Read more..

Unified Approach to Modern PAM & NHI Management

In an insightful interview, Shashwat Sehgal, CEO & Founder of P0 Security, discusses the evolving landscape of identity management, emphasizing the need for modern PAM solutions to address the complexities of non-human identities (NHIs) and AI agents. He highlights P0 Security’s approach to providing a unified platform for managing privileged access across diverse environments, ensuring short-lived, least-privileged and auditable access for all identities.

Read more..
COLLAPSE
July
LIVE NOW
View Panel
TBD

Panel: Non-Human / Machine Identities - Why Now – Why Should You Be Concerned
  • Anthony Viggiano
  • Anusha Iyer
  • James Hauswirth
  • Sebastian RohrS
  • Joshua Wilson

PANEL:

Non-Human / Machine Identities - Why Now – Why Should You Be Concerned

This panel discussion delves into the critical topic of non-human machine identities (NHIs), exploring their historical context, current challenges and the urgency of addressing security concerns in an increasingly automated landscape. Experts share insights on the risks associated with NHIs, including their appeal to attackers and the necessity for improved governance and situational awareness, ultimately advocating for collaborative solutions to mitigate technical debt and enhance security measures.

Control of NHI Security through Detection and Governance

This demo shows how GitGuardian’s NHI Security Platform manages and governs NHIs by detecting hard-coded secrets across various environments, ensuring compliance, and preventing security breaches by providing comprehensive visibility into secret management. By leveraging advanced detection technologies, GitGuardian empowers teams to maintain secure access while streamlining their development processes

Read more..

Innovative Security for Cloud Access

PO Security addresses the challenges of managing privileged access in modern cloud environments, focusing on ensuring short-lived, least privileged and auditable access to enhance security. This demo showcases their product’s innovative approach to operationalize least privilege and eliminate reliance on static credentials, aiming to improve security and compliance for organizations.

Read more..

Secretless, Zero‑Trust Workload IAM for Machine‑to‑Machine Access

Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets

Read more..

Unified Approach to Modern PAM & NHI Management

In an insightful interview, Shashwat Sehgal, CEO & Founder of P0 Security, discusses the evolving landscape of identity management, emphasizing the need for modern PAM solutions to address the complexities of non-human identities (NHIs) and AI agents. He highlights P0 Security’s approach to providing a unified platform for managing privileged access across diverse environments, ensuring short-lived, least-privileged and auditable access for all identities.

Read more..
COLLAPSE
July
LIVE NOW
View Panel
TBD

Panel: Harnessing AI for Non-Human Identity Threat Detection
  • Sanjeev Ojha
  • Jon Shende
  • James Hauswirth
  • Timm Lotter

PANEL:

Harnessing AI for Non-Human Identity Threat Detection

Harnessing AI for Non-Human Identity Threat Detection - This panel explores how AI can be harnessed to detect and mitigate threats targeting non-human identities such as bots, APIs, IoT devices, and machine accounts. Experts discuss the AI driven approaches for anomaly detection and behavioral analytics that can transform how to deal with identifying and detecting inappropropriate use of non-human identities.

Related Solutions

Control of NHI Security through Detection and Governance

This demo shows how GitGuardian’s NHI Security Platform manages and governs NHIs by detecting hard-coded secrets across various environments, ensuring compliance, and preventing security breaches by providing comprehensive visibility into secret management. By leveraging advanced detection technologies, GitGuardian empowers teams to maintain secure access while streamlining their development processes

Read more..

Innovative Security for Cloud Access

PO Security addresses the challenges of managing privileged access in modern cloud environments, focusing on ensuring short-lived, least privileged and auditable access to enhance security. This demo showcases their product’s innovative approach to operationalize least privilege and eliminate reliance on static credentials, aiming to improve security and compliance for organizations.

Read more..

Secretless, Zero‑Trust Workload IAM for Machine‑to‑Machine Access

Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets

Read more..

Unified Approach to Modern PAM & NHI Management

In an insightful interview, Shashwat Sehgal, CEO & Founder of P0 Security, discusses the evolving landscape of identity management, emphasizing the need for modern PAM solutions to address the complexities of non-human identities (NHIs) and AI agents. He highlights P0 Security’s approach to providing a unified platform for managing privileged access across diverse environments, ensuring short-lived, least-privileged and auditable access for all identities.

Read more..
COLLAPSE
July
LIVE NOW
View Panel
TBD

Panel: The OWASP Non-Human Identity Top 10
  • Lalit (Mr NHI) Choda
  • Andrew McCormick
  • Sameer Bhanushali
  • Anthony Viggiano

PANEL:

The OWASP Non-Human Identity Top 10

The OWASP Non-Human Identity Top-10 - This panel covers the OWASP Non-Human Identity Top-10, a comprehensive list of the most pressing security risks and vulnerabilities that non-human identities present to organizations. Experts share insights on these risks, many of which are related to weak lifecycle processes and controls from improper offboarding, secret leakage, overprivileged NHIs, sharing of NHIs, human use NHIs to long-lived secrets. The experts also share guidance on how to mitigate these risks.

Related Solutions

Control of NHI Security through Detection and Governance

This demo shows how GitGuardian’s NHI Security Platform manages and governs NHIs by detecting hard-coded secrets across various environments, ensuring compliance, and preventing security breaches by providing comprehensive visibility into secret management. By leveraging advanced detection technologies, GitGuardian empowers teams to maintain secure access while streamlining their development processes

Read more..

Innovative Security for Cloud Access

PO Security addresses the challenges of managing privileged access in modern cloud environments, focusing on ensuring short-lived, least privileged and auditable access to enhance security. This demo showcases their product’s innovative approach to operationalize least privilege and eliminate reliance on static credentials, aiming to improve security and compliance for organizations.

Read more..

Secretless, Zero‑Trust Workload IAM for Machine‑to‑Machine Access

Aembit demonstrates its workload IAM platform that delivers secretless, policy-driven credentials and zero-trust controls for machine-to-machine access. Aembit’s edge proxy/agent verifies workload identity, applies conditions and injects short‑lived tokens, with rich logging. The platform supports Kubernetes/VMs, SaaS pipelines, multiple credential providers, Terraform/APIs and resource sets

Read more..

Unified Approach to Modern PAM & NHI Management

In an insightful interview, Shashwat Sehgal, CEO & Founder of P0 Security, discusses the evolving landscape of identity management, emphasizing the need for modern PAM solutions to address the complexities of non-human identities (NHIs) and AI agents. He highlights P0 Security’s approach to providing a unified platform for managing privileged access across diverse environments, ensuring short-lived, least-privileged and auditable access for all identities.

Read more..
COLLAPSE
July
LIVE NOW
View Panel
TBD
AI Icon
Securing the Next Generation of Machine Identities: The Role of IAM, Blockchain and Quantum-Safe Cryptography in a Hyper-Automated World
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
The Rise of Non-Human Identity in Critical Sectors: How NHIs Are Reshaping Healthcare, Finance and Infrastructure Security
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Finding and Remediating Orphaned Machine Identities
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Securing Non-Human Identities in Cloud-Native Environments
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
When API Keys Go Rogue: Real Stories of Machine-Identity Breaches
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Access Without Friction: Modern Identity and Secrets Management for DevOps Teams
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Ditching Fixed Credentials and Harnessing the Power of Workload Identity Federation
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Effective Workflow & Goal Setting in NHI Programs
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Prioritizing and Managing NHI as a Multi-Project Initiative
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
What Are Non-Human / Machine Identities, Their Criticality, Risks and Challenges
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Non-Human / Machine Identities - Why Now – Why Should You Be Concerned
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
The Rise Of Machines: Securing Non-Human Identities In A Connected World
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
The OWASP Non-Human Identity Top-10
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
The State of Secrets Sprawl 2025 in Cybersecurity
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Demystfying Non-Human/Machine Identities and Credentials/Secrets
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
NHI Lifecycle Processes
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Who Owns NHI Security in the Enterprise?
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Addressing Static Secrets for Non-Human Identities (NHIs)
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
AI and Non-Human Identity Management: Opportunities and Challenges
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
The Regulatory Impact to Non-Human Identities
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
The NHI Maturity Model
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
A Risk Based Approach to Implementing an NHI Program
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
How to Convince C-Level Execs To Invest in an NHI Program
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
A Practitioners Guide to Managing NHI Risks
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
CISO Alert: Human Identity & NHI Must be Addressed Together
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Integrating NHI Management Info Today's IAM Stack: Challenges and Opportunities
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Securing Non-Human Identities in Critical Infrastructure, Operational Systems, Robotics & Automation
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
AI-Driven Solutions for Tackling the Non-Human Identity Crisis
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Securing Non-Human Identities In The Cloud
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Harnessing AI for Non-Human Identity Threat Detection
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
The Analyst View - Market Trends, Opportunities
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
What is the SPIFFE/SPIRE standard and how it addresses Workload Identity Management
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Standards for managing Non-Human/Machine/Workload Identities
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
The Target State for managing Non-Human/Machine Identities
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
How Attackers Compromise Non-Human/Machine Identities
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
The Types of Solutions for Managing Non-Human/Machine Identity Risks
AI SESSION
July
LIVE NOW
View Panel
TBD
AI Icon
Agentic AI and the Intersection with NHIs
AI SESSION