Discover Security Events in Iam
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
4 days from now
This session focuses on building durable and secure identity models as AI agents become part of everyday business systems. As organizations accelerate AI adoption, the discussion looks at the risks of short term identity decisions and why future ready approaches are needed to keep identity ethical, resilient and aligned with human oversight. Futurist Heather Vescent outlines how identity must evolve as digital employees, digital twins and autonomous agents become more common.
The webinar examines practical questions around verifying AI identities, assigning accountability and understanding new attack surfaces that may emerge in 2026. Through a guided exercise, attendees will explore the long term impact of the agentic web and how to prepare for future security and governance challenges. The session is relevant for security professionals, technologists and product leaders who want to build AI identity systems that remain effective over time.
4 days from now
This discussion examines how AI agents will reshape identity security in 2026 and why organizations must be ready for a dramatic shift in how access and trust are managed. As enterprises begin operating alongside hundreds of autonomous AI agents, the session highlights the growing challenge of understanding their behavior, controlling their permissions and ensuring they cannot act without proper safeguards.
Okta and Accenture experts walk through key predictions for AI driven identity, focusing on the need for stronger visibility, adaptive governance and modern security controls that keep pace with rapidly evolving automation. The talk explains how identity strategies must adjust as AI becomes an active participant in the enterprise ecosystem and offers clear guidance for leaders preparing for this next stage of security transformation.
5 days from now
Cryptomining attacks in AWS often begin with abused permissions, long before workloads appear or costs spike. This webinar focuses on a real cryptomining campaign disclosed by AWS and explains how attackers use compromised credentials and legitimate but highly privileged API calls to gain control. The session centers on stopping these attacks at the permission layer, before any resources are deployed.
Sonrai Security presents a technical walkthrough of the attack kill chain, followed by a live demonstration showing how controlling excessive privileges can block the attack entirely. Attendees will see why traditional detection happens too late and how permission level controls change the outcome. This webinar is designed for cloud security teams looking to prevent financial loss and reduce risk by securing AWS identities and access paths early.
6 days from now
Zero Trust is a security model centered on the idea that data access should not be solely based on network location. It requires users and systems to strongly prove their identities and trustworthiness and enforces fine-grained identity-based authorization rules before allowing them to access applications, data, and other systems. But, implementing Zero Trust for cloud environments hasn’t always been straightforward.
With StrongDM’s Zero Trust Privileged Access Management platform, you can ensure that identities operate within highly flexible identity-aware networks that reduce surface area, eliminate unneeded pathways to data, and provide straightforward outer security guardrails.
Moving to a Zero Trust security model starts with evaluating your workload portfolio and determining where the enhanced flexibility and security of Zero Trust would provide the greatest benefits.
Join StrongDM and AWS for this 90 minute technical workshop. You’ll get hands-on experience with the product and learn how to use StrongDM to achieve Zero Trust access patterns across different AWS services and the management console. Our technical experts will be there every step of the way! You’ll receive instructions prior to the webinar to get set up and then you'll work through the learning objectives together (refer to the technical requirements here).
Learning Objectives:
How to apply Zero Trust patterns to managed AWS database services, including setting up Just-In-Time access workflows How to apply Zero Trust patterns for access to SSH resources
Get registered today - signup will end 24hrs before the start of the workshop.
1 week from now
Securing autonomous AI workloads is becoming a core requirement as organizations expand the use of AI agents, APIs and dynamic cloud environments. This webinar focuses on how AppGate applies Zero Trust Network Access to protect AI workloads using identity driven, headless security that supports performance and innovation rather than slowing it down.
The discussion explains how ZTNA can be applied across AI agents, servers, virtual machines and Kubernetes workloads to reduce lateral movement and protect exposed APIs. Attendees will also hear how organizations are deploying autonomous AI systems while maintaining compliance and operational efficiency. This table talk session is designed for teams looking to secure modern AI environments without relying on legacy perimeter based security models.
1 week from now
Identity security is entering a new phase as organizations deal with a growing mix of users, devices, SaaS platforms, and AI agents operating across the enterprise. This webinar focuses on how security leaders can manage that complexity by adopting a unified framework for securing access across all identities and environments. The discussion centers on the challenges organizations are facing as identity sprawl increases and control becomes more distributed outside traditional IT boundaries.
Industry leaders share practical guidance on how AI and Zero Trust principles are shaping identity security in 2026, along with real world approaches for unifying identity, device, and SaaS governance. The session also covers best practices for protecting AI driven workflows and explains how gaps in identity and access governance can be addressed at scale. Attendees will leave with a clear, forward looking framework for securing both human and machine identities while supporting innovation and reducing operational friction.
1 week from now
Part 1 focuses on how organizations can stay audit ready while operating in fast moving cloud environments. The session examines how new mandates such as NIS2, DORA, and PCI DSS v4.0 are changing expectations around identity governance, access reviews, and overall compliance posture. Speakers highlight the pressure these evolving rules place on teams and outline practical ways to modernize privileged access through approaches like Just in Time access and Zero Standing Privileges.
Attendees will see how continuous visibility and least privilege controls help maintain agility across hybrid and multi cloud setups. The discussion offers clear guidance for teams that want to strengthen compliance without slowing development or operations.
2 weeks from now
Join Nishad Sankaranarayanan, Head of IAM at Genuine Parts Company (GPC), and StrongDM to discuss why static credentials can’t survive cloud speed, and how the control plane you build for developers today becomes the security foundation for Agentic AI tomorrow.
Why Join: The "Front Door" is Broken: Discover why modern breaches bypass static credentials and "login-based" security, and why the math of cloud access demands a shift to continuous Runtime Authorization.
Zero Standing Privilege is Possible: See how to eliminate the trade-off between speed and security by authorizing actions in real-time, enforcing policies at the query level rather than the network level.
Prepare for the Agentic Future: Learn why non-deterministic AI agents will break traditional access models, and how to future-proof your architecture to handle machine-speed authorization securely.
When: Monday, January 26, 2026 | 9:00 am PT
2 weeks from now
This session examines the growing security challenges created by decentralized SaaS adoption and shows how IT teams can regain control through better visibility, automation and credential management. The discussion focuses on how distributed applications expand the attack surface, how AI is changing adversary behavior and why traditional governance methods struggle to keep pace.
Attendees will hear practical guidance on achieving the right level of SaaS visibility, managing lateral movement risks driven by AI and deciding when automation can effectively replace manual oversight. The webinar also addresses whether decentralization should be viewed as a problem or a reality that can be managed with the right strategy.
2 weeks from now
This webinar examines how organizations can strengthen authentication security by combining FIDO pre registered YubiKeys with full enterprise lifecycle management. The session introduces the new integration between Yubico FIDO Pre Reg and Versasec vSEC:CMS and vSEC:CLOUD, showing how this approach streamlines deployment of phishing resistant MFA at scale. Attendees will see how pre registered YubiKeys can be delivered directly to users and how this reduces onboarding delays and strengthens overall security posture.
The discussion highlights the operational benefits of lifecycle management, including lower administrative overhead, fewer helpdesk tickets and clearer audit trails for compliance. The session is designed for teams working toward passwordless MFA or Zero Trust initiatives, managing large YubiKey rollouts or supporting hybrid workforces that rely on efficient and centralized key management.
2 weeks from now
Identity governance is being reshaped by the rapid growth of non human identities, autonomous agents, and expanding cloud environments. This webinar breaks down key findings from the State of IGA 2026 report and shows how organizations can regain control as identity sprawl increases and visibility declines. The discussion focuses on why ownership is often fragmented across teams and how that fragmentation creates measurable security risk.
The session highlights what effective identity governance looks like when service accounts, secrets, and AI agents are clearly owned and governed. Attendees will hear which identity metrics are missing from executive dashboards, why those gaps matter, and how leading organizations are modernizing credential management without slowing innovation. The webinar also explains how mature identity programs are turning governance into a strategic security advantage rather than a compliance exercise.
2 weeks from now
Part 2 looks at how continuous compliance can be operationalized across major cloud platforms and transformed into a long term advantage. The session walks through real strategies for applying consistent controls across AWS, Azure, and GCP, showing how teams can maintain reliable oversight as environments scale. Speakers explain how automation and policy as code reduce audit burden and make evidence collection more predictable and efficient.
The webinar also explores how unified identity security across PAM, cloud roles, and IGA workflows supports stronger and more future proof compliance programs. Attendees will gain a practical view of how dynamic controls help reduce risk while improving overall organizational resilience.