Iam Webinars

Discover Security Events in Iam

Get Iam Event Alerts!

Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!

IAM (Identity and Access Management): Current Status

Identity and Access Management has evolved from basic user provisioning into a comprehensive security discipline that governs digital identities, controls access to resources, and serves as the foundation for zero-trust architectures. As organizations embrace cloud services, remote work, and partner ecosystems, IAM has become critical for securing the modern, perimeter-less enterprise.

Zero Trust and Identity-Centric Security

IAM has shifted from perimeter-based access control to identity-centric security models where identity serves as the new security perimeter. Zero-trust architectures mandate continuous verification of user identity, device posture, and contextual factors before granting access to resources. Organizations are implementing sophisticated authentication mechanisms including multi-factor authentication (MFA), passwordless authentication, biometrics, and risk-based adaptive authentication that adjusts security requirements based on access context and behavior patterns.

IAM as GRC Enabler

IAM supports governance, risk, and compliance objectives by providing auditable access controls, separation of duties enforcement, and automated access reviews (wwt.com). The relationship between GRC and IAM creates synergy enabling organizations to align access policies with governance frameworks while demonstrating regulatory compliance (identitymanagementinstitute.org).

Modern IAM Challenges

Organizations struggle with managing identities across hybrid environments, reconciling disparate identity stores, and governing non-human identities including service accounts and API keys. Privileged access management, identity lifecycle automation, and access governance remain complex undertakings requiring specialized platforms and expertise. The proliferation of SaaS applications has created identity sprawl, while legacy systems complicate integration efforts.

All Upcoming Cybersecurity Events

All security events are automatically streamed into this table on a daily basis.

16th December 2025 | Turning Your Tech Stack into Profit: Market Your MSP to Win Clients

This webinar focuses on helping MSPs bring their security stack to market with a clear and compelling message. CyberFOX experts Wes Spencer and Bill Morgan walk through practical approaches for presenting security services in a way that resonates with business decision makers. The session explains how to position an MSP’s security strategy as essential protection, not an optional add on, and how to frame its value in language prospects immediately understand.

Attendees will hear guidance on strengthening credibility, showcasing expertise and creating messaging that supports confident sales conversations. The webinar also includes access to customizable marketing materials that MSPs can use to promote their services and reinforce the importance of a well built security offering.

Company_Webinar • Part of CyberFOX

_flag

17th December 2025 | When Cyber Threats Feel Human: The 2026 Identity Wake-Up Call

This session examines the growing pressure on digital identity security as credential theft, weak authentication and AI driven phishing continue to dominate attack patterns. The discussion focuses on why identity protection must be strengthened across organizations and how the next wave of cyber threats is becoming more humanlike and harder to detect.

Participants will hear insights from Yubico’s Global State of Authentication research along with practical steps to improve identity resilience. The webinar highlights key trends, regulatory expectations and the actions both individuals and enterprises can take to reduce risk and reinforce trust in a rapidly shifting threat landscape.

Company_Webinar • Part of Yubico

_flag

18th December 2025 | Workload Identity 101: What Every Security Team Needs to Know

This webinar explains why traditional PAM tools designed for human identities fall short when applied to fast moving machine workloads. The session covers real challenges seen in enterprise environments, including static credentials in code, identity silos, overly permissive service accounts and limited visibility into workload activity. Attendees will learn why these gaps grow as machines scale far beyond human users.

The presentation introduces the core concepts of workload identity and explains how the SPIFFE standard supports secure and automated authentication for dynamic environments. The speakers will show how trust domains, attestation and short lived identities reduce the risk of leaked secrets and strengthen access control across on premises and cloud workloads. The session also highlights how automation and standard APIs simplify authentication for developers and improve operational security at scale.

Company_Webinar • Part of CyberArk

_flag

13th January 2026 | What’s next for AI identity in 2026

This discussion examines how AI agents will reshape identity security in 2026 and why organizations must be ready for a dramatic shift in how access and trust are managed. As enterprises begin operating alongside hundreds of autonomous AI agents, the session highlights the growing challenge of understanding their behavior, controlling their permissions and ensuring they cannot act without proper safeguards.

Okta and Accenture experts walk through key predictions for AI driven identity, focusing on the need for stronger visibility, adaptive governance and modern security controls that keep pace with rapidly evolving automation. The talk explains how identity strategies must adjust as AI becomes an active participant in the enterprise ecosystem and offers clear guidance for leaders preparing for this next stage of security transformation.

Company_Webinar • Part of Okta

_flag

13th December 2025 | The Scale-Up Secret: How Keeper Security secured operations and saved time with Yubico

Yubico outlines how Keeper Security achieved a fast, large scale rollout of phishing resistant MFA using YubiKeys and modern deployment capabilities. The session explains how Yubico’s enterprise features enabled Keeper to secure more than 600 employees while cutting significant IT workload and simplifying the logistics of distributing hardware security keys across the organization.

Attendees get a clear look at how Yubico FIDO Pre reg in Microsoft Entra ID and YubiEnterprise Delivery supported a smooth rollout with minimal friction. The webinar provides practical guidance for security leaders who need to accelerate MFA modernization and strengthen authentication with hardware backed protection.

Company_Webinar • Part of Yubico

_flag