Discover Security Events in Iam
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
21 hours ago
Identity-first security is reshaping how organizations protect access, users, and data in a distributed work environment. This webinar examines five key trends CISOs need to understand as identity becomes the foundation of modern security, from authentication and access control to entitlement governance and detection of identity-driven threats.
The discussion explains why traditional IAM approaches struggle in cloud-native, AI-enabled, and remote-first environments, and outlines how a unified identity-first strategy can improve resilience without adding friction for employees. Attendees will walk away with practical guidance on strengthening identity security and taking the first steps toward an identity-first future of work.
2 hours from now
See how Fastpath is evolving its roadmap to help organizations manage application access governance and reduce identity related risk in 2026 and beyond. This webinar outlines upcoming Fastpath capabilities focused on simplifying compliance, strengthening internal controls, and automating access risk management across complex application environments.
The session also looks at how access governance is expanding beyond traditional boundaries and how Fastpath is adapting to secure identities across both internal and external interactions. Attendees will gain insight into how Fastpath and Delinea work together to support a stronger identity and access management strategy that scales with emerging security and compliance demands.
2 hours from now
Access reviews are designed to reduce risk, yet in many enterprises they gradually become a compliance formality instead of an effective security control. This session examines how unclear visibility, limited application context and pressure to complete reviews quickly lead to excessive access and overlooked exposure. As access accumulates and accountability weakens, the review process often fails to surface the risks it was meant to address.
The discussion focuses on why access reviews break down in real world environments and what changes when structure, ownership and clear decision context are introduced. Attendees will see how stronger governance, better visibility and defined accountability can turn reviews into a meaningful control that identifies real risk for security teams, auditors and leadership.
2 hours from now
A walkthrough of the expanded 1Password Partner Program, focused on how the new performance based model supports partner growth and engagement. This webinar outlines what has changed across partner tiers, certifications, incentives, and deal registration, and explains how the updated structure creates clearer roles, stronger alignment between enablement and earnings, and a more consistent partner experience.
The session also covers how partners can work more effectively with the 1Password sales team, activate quickly within the program, and take advantage of new certification paths. It is designed for MSPs, solution providers, and distributors who want a clear understanding of how the evolved program works and how to unlock value through participation.
2 hours from now
Access reviews often fail to reduce risk when reviewers lack visibility, context, and the time needed to make informed decisions. This webinar examines how access certifications turn into a compliance checkbox as excessive and outdated permissions accumulate across regulated systems, increasing exposure and weakening governance.
The discussion focuses on why access reviews break down in real enterprise environments and what changes when accountability, risk, and decision context are built into the process. Attendees will see how fragmented reviews create hidden security gaps and how a unified, risk based approach strengthens access governance and holds up under audit scrutiny.
1 day from now
Agentic AI is forcing a rethink of how identity and access control work across modern infrastructure. This webinar examines why autonomous, non deterministic AI systems break legacy identity models that were designed for humans, static workloads, and long lived credentials. The discussion focuses on how agents, copilots, and AI driven workflows introduce new risks such as credential sprawl, uncontrolled privilege, weak auditability, and expanded blast radius.
Speakers will explain why this is not an LLM issue, but an infrastructure identity problem. The session outlines how traditional IAM, PAM, and network based controls fall short in AI driven environments and what infrastructure leaders must do to prepare for secure AI adoption. Attendees will gain practical insight into building identity frameworks that support autonomy while maintaining security, governance, and operational control.
6 days from now
Organizations planning the transition away from SAP Identity Management will get a practical look at how to migrate to One Identity Manager using ASCONSIT FastLane. The webinar focuses on preparing for SAP IDM’s end of use by showing how identity data, workflows, and access controls can be moved efficiently while maintaining security from day one.
The session highlights proven migration workflows, ways to reduce business disruption, and how to maintain continuity of identity operations throughout the process. Attendees will gain insight into securing access to critical data immediately after migration and ensuring the identity environment remains stable, compliant, and ready for long term use.
6 days from now
Autonomous AI agents are quickly becoming one of the most overlooked attack surfaces inside modern organizations. This webinar focuses on how shadow AI emerges when agents operate without visibility, ownership, or proper access controls, and why long lived credentials and unmanaged identities create real breach risk. Okta and Zscaler examine how these hidden agents interact with sensitive systems and data outside traditional IT oversight.
The discussion covers practical ways to identify unknown or unmanaged agents, continuously assess their risk, and bring autonomous identities under a unified security model. Attendees will gain a clearer understanding of how attackers can exploit shadow AI and what steps security teams can take to close those gaps before they are abused.
6 days from now
Balancing security and productivity becomes possible when least privilege is enforced through identity-first controls that limit access without disrupting daily work. This session focuses on removing unnecessary local admin rights while allowing trusted applications to run with appropriate elevation. It shows how policy driven controls, application containment and adaptive, phishing resistant MFA help ensure users receive only the access required for specific tasks, with full visibility and auditability.
The discussion also covers just in time administrative access for time boxed tasks, complete audit trails and how these controls integrate with existing EDR and XDR tools to reduce overall attack surface. Live demonstrations highlight common workflows across HR, development and IT teams, offering practical guidance for improving endpoint security, meeting audit requirements and advancing a Zero Trust strategy without slowing business operations.
6 days from now
Shared identity infrastructure can turn a single breach into a widespread outage that affects every customer at once. This webinar examines the security risks of traditional multi tenant identity models and why identity has become a critical single point of failure for modern enterprises.
The discussion dives into resilience first identity architecture, comparing shared and isolated deployments from both a security and operational perspective. Attendees will gain insight into how isolated identity infrastructure reduces blast radius, supports compliance, and avoids hidden costs tied to legacy providers. Real world examples show how organizations are deploying identity across cloud, private, and air gapped environments without sacrificing control or portability.
1 week from now
Security leaders are under pressure to justify stronger authentication with clear business outcomes, not just security improvements. This webinar focuses on the findings of a Forrester Total Economic Impact study that examines the real world value of phishing resistant, hardware backed authentication using YubiKeys. The session breaks down how organizations measure ROI, reduce credential based attack exposure, and achieve faster payback when moving away from traditional authentication methods.
The discussion walks through key results from the study, including cost savings, risk reduction, and long term financial impact for a global enterprise model. Attendees will gain practical insight into how phishing resistant authentication delivers measurable value and what these findings mean for teams evaluating or deploying YubiKeys across their organization.
1 week from now
High risk account recovery remains one of the most vulnerable points in enterprise identity security, especially when manual processes and help desk workflows slow users down and increase fraud exposure. This webinar focuses on how organizations can automate and secure account recovery within Microsoft Entra by combining self service recovery with high assurance identity verification.
The session explains how AU10TIX integrates with Microsoft Entra to verify users during recovery through government ID and biometric checks, ensuring only the rightful account owner can regain access. Attendees will see how this approach reduces account takeover risk, lowers help desk volume, and improves user experience while maintaining strong security controls at the moment recovery matters most.