Discover Security Events in Iam
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
17 hours from now
Many organizations aim to move toward passwordless authentication, yet legacy systems still depend on traditional credentials. This webinar explores how security teams can manage the transition by implementing a hybrid strategy that supports passwordless experiences while continuing to protect systems that require passwords. The session focuses on reducing the risks associated with credential based attacks during this transitional phase.
Attendees will learn how to combine FIDO2 and passkeys with enterprise credential management to support modern authentication workflows. The discussion also addresses methods for securing legacy applications that cannot natively support passwordless login. A demonstration will show end to end passwordless login journeys and practical use cases, along with strategies for reducing MFA fatigue and minimizing password reset requests while improving overall security and productivity.
1 day from now
Autonomous AI agents introduce new security challenges as they move beyond prompts to executing tasks with delegated authority. This shift increases the risk of unauthorized data access without strong identity controls and governance frameworks in place.
The discussion explores approaches to securing AI systems in production environments, including agent-level authorization, protection of RAG pipelines, and enforcing least privilege access. It also covers identity orchestration strategies for managing permissions across evolving AI ecosystems. Attendees will gain practical insight into reducing risk, preventing data leakage, and building scalable security architectures for autonomous AI applications.
2 days from now
Phishing-resistant authentication that verifies both the user and their device. Learn how binding identities to trusted devices prevents stolen credentials from being used against your organization via an attacker's device, stops account takeovers, and strengthens workforce access security. Our security experts explore how organizations can close this identity gap by implementing phishing-resistant authentication that verifies both the user and the device before granting access.
1 week from now
Identity has become a central pillar of modern security strategy, extending beyond IT into broader business risk and growth considerations. As organizations face identity sprawl, evolving threats, and increasing reliance on AI, leaders are reassessing how identity systems support both protection and scalability.
A peer-led discussion brings together security leaders to examine current challenges and shifts in identity management. Topics include the role of Zero Trust, the impact of mergers and acquisitions, and how identity strategies are adapting to new pressures. Attendees will gain perspective on what is changing, where gaps are emerging, and how organizations are redefining identity as a core component of enterprise security.
1 week from now
Rapid AI adoption is exposing gaps in identity security, particularly in governance, visibility, and control over non-human identities. Findings from the 2026 Identity Security Report highlight a growing disconnect between perceived readiness and actual security maturity, with organizations struggling to monitor AI usage and manage unsanctioned tools.
Key challenges include limited visibility into identities, weak governance over AI systems, and insufficient real-time validation of AI and non-human activity. The discussion outlines how these risks impact security posture and where organizations remain vulnerable. It also provides practical steps to strengthen oversight, improve identity controls, and manage AI-driven access at scale, helping security leaders address emerging threats tied to accelerating AI adoption.
2 weeks from now
Identity security continues to evolve as identities become a primary attack surface. This customer only webinar brings Delinea leaders, experts, and customers together to discuss how expectations around access, privilege, and risk are shifting. The session focuses on helping organizations adapt existing Delinea capabilities to meet new security demands without adding unnecessary complexity or disruption.
Attendees will gain insight into changing identity security requirements, hear real world customer perspectives, and receive practical guidance for strengthening deployments. The agenda includes leadership insights, a live customer panel with Q&A, expert best practices, a spotlight on just in time privileged access, and an open discussion with Delinea specialists.
3 weeks from now
Autonomous AI agents are rapidly moving into enterprise environments, where they interact with systems, handle sensitive data, and operate with privileged access. This shift introduces a growing population of machine identities that often lack visibility, governance, and alignment with traditional security controls, expanding the identity attack surface.
The discussion examines how agentic AI reshapes identity security across cloud, APIs, and automated workflows. It highlights how attackers exploit these environments and where new risks emerge around secrets and access management. Practical approaches are outlined to help organizations strengthen control, improve visibility, and manage privilege effectively while continuing to support innovation and the adoption of AI-driven systems.
4 days ago
Zero Trust shifts access control away from network location and toward strong identity verification and fine-grained authorization. Applying this model in cloud environments can be complex, especially when managing access across multiple services and systems.
A hands-on workshop demonstrates how to implement Zero Trust access patterns using a privileged access management platform within AWS environments. It covers applying identity-based controls to managed database services, enabling just-in-time access workflows, and securing SSH resource access. Participants will gain practical experience configuring identity-aware access, reducing unnecessary exposure, and improving control over cloud infrastructure while maintaining flexibility for teams operating across distributed systems.
4 days ago
Public repositories continue to expose sensitive credentials at scale, creating real risks for organizations. This live product demo webinar presents GitGuardian Public Monitoring and shows how it detects secrets such as API keys, cloud credentials, database connection strings, and private certificates exposed on public GitHub. The session highlights how continuous monitoring helps identify past, present, and potential leaks linked to an organization.
During the 20 minute demo, two experts walk through how the platform works and how teams can collaborate with developers to remediate exposed secrets more efficiently. The webinar also introduces a free tool designed to help organizations measure their exposure on public GitHub.
4 days ago
AI agents are increasingly being used to handle customer interactions across industries such as insurance, banking, and digital commerce. While these systems can deliver fast, personalized responses based on customer data, their effectiveness depends on secure identity, API, and data management foundations. This webinar explores how organizations can deploy customer facing AI agents while maintaining strong security and governance.
The session examines how to deliver personalized experiences without exposing sensitive data or increasing fraud risk. Speakers will discuss treating APIs as governed, reusable components that support AI driven services, as well as approaches for maintaining regulatory compliance while scaling AI in customer facing applications. Attendees will gain insight into architectural and governance choices that help organizations expand AI capabilities without compromising security or trust.
5 days ago
Many enterprise identity platforms were designed for on-premises environments with predictable users and limited access patterns. As organizations adopt cloud services, APIs, partner ecosystems, and AI-driven systems, identity infrastructure must support a broader range of use cases. This webinar explores how legacy IAM systems can become operational bottlenecks as identity requirements expand across cloud, SaaS, and customer facing environments.
The session examines practical strategies for modernizing identity by introducing SaaS based capabilities alongside existing platforms instead of performing full system replacements. Speakers will discuss early indicators that identity systems are slowing digital initiatives and outline phased approaches for modernization. Attendees will also learn how organizations maintain security and compliance while transitioning from on-prem IAM architectures to scalable SaaS identity models.
5 days ago
AI agents require access to enterprise systems to operate effectively, but unmanaged or embedded credentials introduce significant security risks. As agentic AI adoption grows, organizations must rethink how identities, permissions, and access controls are applied to non-human actors.
Imprivata’s Agentic Identity Management approach treats AI agents as managed identities, enabling least-privilege, auditable, and revocable access to critical systems. The discussion outlines key risks associated with agentic AI, including uncontrolled access and credential exposure, and explains how structured identity governance can mitigate these challenges. It also provides practical steps for implementing secure, agent-driven workflows while maintaining visibility and control across enterprise environments.