Discover Security Events in Iam
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
14 hours ago
This session examines the growing security challenges created by decentralized SaaS adoption and shows how IT teams can regain control through better visibility, automation and credential management. The discussion focuses on how distributed applications expand the attack surface, how AI is changing adversary behavior and why traditional governance methods struggle to keep pace.
Attendees will hear practical guidance on achieving the right level of SaaS visibility, managing lateral movement risks driven by AI and deciding when automation can effectively replace manual oversight. The webinar also addresses whether decentralization should be viewed as a problem or a reality that can be managed with the right strategy.
14 hours ago
A streamlined approach to deploying phishing resistant MFA is the focus of this webinar, highlighting how Versasec and Yubico enable faster and more secure user enrollment with pre registered YubiKeys. The session explains how integrating Yubico FIDO pre registration with Versasec lifecycle management simplifies large scale rollouts while strengthening enterprise identity security.
The discussion covers how organizations can reduce onboarding effort, eliminate manual key handling and lower operational costs tied to helpdesk support. Attendees will see how centralized lifecycle management improves audit readiness and compliance while supporting passwordless and Zero Trust initiatives. This webinar is designed for organizations deploying YubiKeys at scale, especially in hybrid and remote environments where secure identity management is critical.
14 hours ago
Identity security is being reshaped by AI driven automation, cloud native systems, and autonomous agents that operate at machine speed with privileged access. This webinar focuses on how enterprise identity models must evolve as machine identities, service accounts, and AI agents outscale human users and introduce new risk that traditional IAM and PAM approaches were not built to handle.
The discussion examines how Delinea’s planned acquisition of StrongDM brings just in time, runtime authorization into the center of identity security. Speakers will explain how combining privileged access management with real time authorization improves visibility, enforcement, and response across cloud, DevOps, and AI powered environments. Attendees will gain clarity on securing autonomous agents, reducing persistent credentials, and modernizing identity controls without disrupting existing operations.
14 hours ago
This webinar examines how organizations can strengthen authentication security by combining FIDO pre registered YubiKeys with full enterprise lifecycle management. The session introduces the new integration between Yubico FIDO Pre Reg and Versasec vSEC:CMS and vSEC:CLOUD, showing how this approach streamlines deployment of phishing resistant MFA at scale. Attendees will see how pre registered YubiKeys can be delivered directly to users and how this reduces onboarding delays and strengthens overall security posture.
The discussion highlights the operational benefits of lifecycle management, including lower administrative overhead, fewer helpdesk tickets and clearer audit trails for compliance. The session is designed for teams working toward passwordless MFA or Zero Trust initiatives, managing large YubiKey rollouts or supporting hybrid workforces that rely on efficient and centralized key management.
9 hours from now
Identity governance is being reshaped by the rapid growth of non human identities, autonomous agents, and expanding cloud environments. This webinar breaks down key findings from the State of IGA 2026 report and shows how organizations can regain control as identity sprawl increases and visibility declines. The discussion focuses on why ownership is often fragmented across teams and how that fragmentation creates measurable security risk.
The session highlights what effective identity governance looks like when service accounts, secrets, and AI agents are clearly owned and governed. Attendees will hear which identity metrics are missing from executive dashboards, why those gaps matter, and how leading organizations are modernizing credential management without slowing innovation. The webinar also explains how mature identity programs are turning governance into a strategic security advantage rather than a compliance exercise.
9 hours from now
Part 2 looks at how continuous compliance can be operationalized across major cloud platforms and transformed into a long term advantage. The session walks through real strategies for applying consistent controls across AWS, Azure, and GCP, showing how teams can maintain reliable oversight as environments scale. Speakers explain how automation and policy as code reduce audit burden and make evidence collection more predictable and efficient.
The webinar also explores how unified identity security across PAM, cloud roles, and IGA workflows supports stronger and more future proof compliance programs. Attendees will gain a practical view of how dynamic controls help reduce risk while improving overall organizational resilience.
9 hours from now
Identity security is becoming the primary attack surface for modern organizations, and this session focuses on how security leaders should prepare for 2026. The discussion centers on moving from fragmented identity controls to a platform first approach that strengthens privilege management, access enforcement, and adoption across teams. The webinar outlines why identity remains a top target and how organizations can reduce risk through consolidation and clearer strategy.
The session features expert insight into how identity platforms are evolving, including the role of AI in simplifying decisions and improving program maturity. Attendees will gain practical guidance on modernizing PAM strategies, anticipating key shifts in identity security, and prioritizing actions that drive measurable progress heading into 2026.
1 day from now
AI driven phishing is accelerating fast, making passwords one of the weakest points in enterprise security. This webinar focuses on how passkeys can stop modern phishing attacks and why eliminating passwords is becoming essential as generative AI enables higher quality attacks at massive scale.
The session highlights Yubico’s self service approach to deploying passkeys across large organizations, with a focus on secure onboarding and ease of use. Attendees will see how passkeys can be implemented at enterprise scale to reduce risk, strengthen authentication and move away from password based security as organizations prepare for the threat landscape of 2026.
5 days from now
Rising costs, manual processes, and growing certificate volumes are putting increasing strain on Public Key Infrastructure programs. This webinar examines new global research from the Ponemon Institute that highlights why legacy PKI has become a major operational and security challenge, including heavy reliance on ad hoc tools and limited visibility that lead to outages and higher risk. The discussion connects these findings to real world pressures security teams are facing today.
CyberArk and Ponemon experts walk through the research results and translate them into practical guidance for 2026 planning. Attendees will hear how leading organizations reduce manual effort, improve governance, and prepare for rapid certificate growth and cryptographic change. The session provides a clear framework for modernizing PKI to lower costs, strengthen consistency, and build a more resilient security foundation.
6 days from now
AI agents are changing how authorization works, and many teams are relying on flawed assumptions that will not hold as agents scale across products and organizations. This webinar examines common misconceptions about agent authorization, including why agents are rarely just extensions of users and why existing mental models fail when applied to autonomous systems.
Jake Moshenko, CEO of AuthZed, joins host Sohan Maheshwar to discuss how agents differ from people, how they stress test permission systems, and why complexity grows quickly when agents are introduced. The session highlights what organizations need to understand about authorization at scale and why preparing for agent driven access is critical for anyone building or deploying AI agents in modern environments.
1 week from now
This session focuses on how identity security must evolve as human, machine and AI identities expand and attackers increasingly use AI to amplify identity based attacks. The discussion explains why traditional IAM, PAM and IGA tools operating in isolation can no longer keep pace with the scale and speed of modern threats, and why many organizations are reaching a breaking point in their current approach.
The webinar looks at how a unified identity security platform improves visibility across environments, speeds up breach response through shared intelligence and enables more proactive threat detection using AI. It also covers how consistent privilege controls across all identity types help reduce risk and support CISO and SOC priorities. The goal is to show how moving away from fragmented tools creates stronger trust, control and resilience in an AI driven threat landscape.
1 week from now
Real AWS privilege escalation attacks are demonstrated live in this webinar, showing how common cloud environments remain vulnerable even without zero day exploits or unusual misconfigurations. Independent security researchers execute multiple real world attack paths, including IAM escalation chains, service based lateral movement across AWS services and AI driven abuse of Bedrock and AgentCore. The session makes it clear why these attacks continue to succeed in typical AWS setups.
The discussion then shifts to what actually works. Attendees see the same attacks fail once effective preventative controls are applied, highlighting practical defenses rather than theory. This webinar is designed for cloud security, IAM, and platform teams who need clear visibility into real attack behavior and proven controls that reduce risk in AWS environments.