Discover Security Events in Iam
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
Identity and Access Management has evolved from basic user provisioning into a comprehensive security discipline that governs digital identities, controls access to resources, and serves as the foundation for zero-trust architectures. As organizations embrace cloud services, remote work, and partner ecosystems, IAM has become critical for securing the modern, perimeter-less enterprise.
IAM has shifted from perimeter-based access control to identity-centric security models where identity serves as the new security perimeter. Zero-trust architectures mandate continuous verification of user identity, device posture, and contextual factors before granting access to resources. Organizations are implementing sophisticated authentication mechanisms including multi-factor authentication (MFA), passwordless authentication, biometrics, and risk-based adaptive authentication that adjusts security requirements based on access context and behavior patterns.
IAM supports governance, risk, and compliance objectives by providing auditable access controls, separation of duties enforcement, and automated access reviews (wwt.com). The relationship between GRC and IAM creates synergy enabling organizations to align access policies with governance frameworks while demonstrating regulatory compliance (identitymanagementinstitute.org).
Organizations struggle with managing identities across hybrid environments, reconciling disparate identity stores, and governing non-human identities including service accounts and API keys. Privileged access management, identity lifecycle automation, and access governance remain complex undertakings requiring specialized platforms and expertise. The proliferation of SaaS applications has created identity sprawl, while legacy systems complicate integration efforts.
All security events are automatically streamed into this table on a daily basis.
13th January 2026 | What’s next for AI identity in 2026
This discussion examines how AI agents will reshape identity security in 2026 and why organizations must be ready for a dramatic shift in how access and trust are managed. As enterprises begin operating alongside hundreds of autonomous AI agents, the session highlights the growing challenge of understanding their behavior, controlling their permissions and ensuring they cannot act without proper safeguards.
Okta and Accenture experts walk through key predictions for AI driven identity, focusing on the need for stronger visibility, adaptive governance and modern security controls that keep pace with rapidly evolving automation. The talk explains how identity strategies must adjust as AI becomes an active participant in the enterprise ecosystem and offers clear guidance for leaders preparing for this next stage of security transformation.
Company_Webinar • Part of Okta
22nd January 2026 | In Control: The 2026 Compliance Series: Part 1: Compliance at Cloud Speed
Part 1 focuses on how organizations can stay audit ready while operating in fast moving cloud environments. The session examines how new mandates such as NIS2, DORA, and PCI DSS v4.0 are changing expectations around identity governance, access reviews, and overall compliance posture. Speakers highlight the pressure these evolving rules place on teams and outline practical ways to modernize privileged access through approaches like Just in Time access and Zero Standing Privileges.
Attendees will see how continuous visibility and least privilege controls help maintain agility across hybrid and multi cloud setups. The discussion offers clear guidance for teams that want to strengthen compliance without slowing development or operations.
Company_Webinar • Part of CyberArk
28th January 2026 | SaaS Risk Visibility & AI-Driven Threats - Reclaiming Control in a Decentralized World
This session examines the growing security challenges created by decentralized SaaS adoption and shows how IT teams can regain control through better visibility, automation and credential management. The discussion focuses on how distributed applications expand the attack surface, how AI is changing adversary behavior and why traditional governance methods struggle to keep pace.
Attendees will hear practical guidance on achieving the right level of SaaS visibility, managing lateral movement risks driven by AI and deciding when automation can effectively replace manual oversight. The webinar also addresses whether decentralization should be viewed as a problem or a reality that can be managed with the right strategy.
Company_Webinar • Part of LastPass
28th January 2026 | Secure Your Enterprise with FIDO Pre-registered YubiKeys and Complete Enterprise Lifecycle Management
This webinar examines how organizations can strengthen authentication security by combining FIDO pre registered YubiKeys with full enterprise lifecycle management. The session introduces the new integration between Yubico FIDO Pre Reg and Versasec vSEC:CMS and vSEC:CLOUD, showing how this approach streamlines deployment of phishing resistant MFA at scale. Attendees will see how pre registered YubiKeys can be delivered directly to users and how this reduces onboarding delays and strengthens overall security posture.
The discussion highlights the operational benefits of lifecycle management, including lower administrative overhead, fewer helpdesk tickets and clearer audit trails for compliance. The session is designed for teams working toward passwordless MFA or Zero Trust initiatives, managing large YubiKey rollouts or supporting hybrid workforces that rely on efficient and centralized key management.
Company_Webinar • Part of Yubico
29th January 2026 | In Control: The 2026 Compliance Series: Part 2: Continuous Compliance in Action
Part 2 looks at how continuous compliance can be operationalized across major cloud platforms and transformed into a long term advantage. The session walks through real strategies for applying consistent controls across AWS, Azure, and GCP, showing how teams can maintain reliable oversight as environments scale. Speakers explain how automation and policy as code reduce audit burden and make evidence collection more predictable and efficient.
The webinar also explores how unified identity security across PAM, cloud roles, and IGA workflows supports stronger and more future proof compliance programs. Attendees will gain a practical view of how dynamic controls help reduce risk while improving overall organizational resilience.
Company_Webinar • Part of CyberArk