Discover Security Events in Iam
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
16 hours ago
Ephemeral authorization is becoming critical as cloud, CI/CD, and AI driven workflows replace static infrastructure and long lived credentials. This technical deep dive focuses on how Delinea and StrongDM approach just in time, passwordless access that reduces credential theft and supply chain risk while supporting continuous delivery environments. The session outlines why traditional access models no longer fit modern engineering teams and how ephemeral permissions limit exposure without slowing development.
The discussion covers enforcing least privilege at the moment of action, directly within CI/CD pipelines and runtime environments. Speakers explain how ephemeral authorization secures access to cloud infrastructure, databases, containers, and AI driven workloads, while maintaining auditability and governance. The webinar is aimed at engineering and DevOps teams looking to apply strong identity security controls that align with how modern systems are built and operated.
16 hours ago
Social engineering attacks are increasingly targeting identity workflows, especially help desk interactions and remote onboarding, where traditional MFA often falls short. This webinar focuses on how Duo Identity Verification strengthens identity assurance at these vulnerable touchpoints by adding high confidence verification without creating friction for users or added complexity for administrators.
The session highlights real world use cases showing how Duo Identity Verification helps prevent fraudulent support requests and unauthorized employee enrollments. Attendees will see how identity checks can be embedded directly into existing workflows to stop social engineering attempts before damage occurs. The discussion also includes customer insights on deployment, benefits, and lessons learned, offering practical guidance for organizations looking to reduce identity based risk while maintaining a smooth user experience.
7 hours from now
This session examines the growing security challenges created by decentralized SaaS adoption and shows how IT teams can regain control through better visibility, automation and credential management. The discussion focuses on how distributed applications expand the attack surface, how AI is changing adversary behavior and why traditional governance methods struggle to keep pace.
Attendees will hear practical guidance on achieving the right level of SaaS visibility, managing lateral movement risks driven by AI and deciding when automation can effectively replace manual oversight. The webinar also addresses whether decentralization should be viewed as a problem or a reality that can be managed with the right strategy.
7 hours from now
A streamlined approach to deploying phishing resistant MFA is the focus of this webinar, highlighting how Versasec and Yubico enable faster and more secure user enrollment with pre registered YubiKeys. The session explains how integrating Yubico FIDO pre registration with Versasec lifecycle management simplifies large scale rollouts while strengthening enterprise identity security.
The discussion covers how organizations can reduce onboarding effort, eliminate manual key handling and lower operational costs tied to helpdesk support. Attendees will see how centralized lifecycle management improves audit readiness and compliance while supporting passwordless and Zero Trust initiatives. This webinar is designed for organizations deploying YubiKeys at scale, especially in hybrid and remote environments where secure identity management is critical.
7 hours from now
This webinar examines how organizations can strengthen authentication security by combining FIDO pre registered YubiKeys with full enterprise lifecycle management. The session introduces the new integration between Yubico FIDO Pre Reg and Versasec vSEC:CMS and vSEC:CLOUD, showing how this approach streamlines deployment of phishing resistant MFA at scale. Attendees will see how pre registered YubiKeys can be delivered directly to users and how this reduces onboarding delays and strengthens overall security posture.
The discussion highlights the operational benefits of lifecycle management, including lower administrative overhead, fewer helpdesk tickets and clearer audit trails for compliance. The session is designed for teams working toward passwordless MFA or Zero Trust initiatives, managing large YubiKey rollouts or supporting hybrid workforces that rely on efficient and centralized key management.
7 hours from now
Identity security is being reshaped by AI driven automation, cloud native systems, and autonomous agents that operate at machine speed with privileged access. This webinar focuses on how enterprise identity models must evolve as machine identities, service accounts, and AI agents outscale human users and introduce new risk that traditional IAM and PAM approaches were not built to handle.
The discussion examines how Delinea’s planned acquisition of StrongDM brings just in time, runtime authorization into the center of identity security. Speakers will explain how combining privileged access management with real time authorization improves visibility, enforcement, and response across cloud, DevOps, and AI powered environments. Attendees will gain clarity on securing autonomous agents, reducing persistent credentials, and modernizing identity controls without disrupting existing operations.
1 day from now
Identity security is becoming the primary attack surface for modern organizations, and this session focuses on how security leaders should prepare for 2026. The discussion centers on moving from fragmented identity controls to a platform first approach that strengthens privilege management, access enforcement, and adoption across teams. The webinar outlines why identity remains a top target and how organizations can reduce risk through consolidation and clearer strategy.
The session features expert insight into how identity platforms are evolving, including the role of AI in simplifying decisions and improving program maturity. Attendees will gain practical guidance on modernizing PAM strategies, anticipating key shifts in identity security, and prioritizing actions that drive measurable progress heading into 2026.
1 day from now
Part 2 looks at how continuous compliance can be operationalized across major cloud platforms and transformed into a long term advantage. The session walks through real strategies for applying consistent controls across AWS, Azure, and GCP, showing how teams can maintain reliable oversight as environments scale. Speakers explain how automation and policy as code reduce audit burden and make evidence collection more predictable and efficient.
The webinar also explores how unified identity security across PAM, cloud roles, and IGA workflows supports stronger and more future proof compliance programs. Attendees will gain a practical view of how dynamic controls help reduce risk while improving overall organizational resilience.
1 day from now
Identity governance is being reshaped by the rapid growth of non human identities, autonomous agents, and expanding cloud environments. This webinar breaks down key findings from the State of IGA 2026 report and shows how organizations can regain control as identity sprawl increases and visibility declines. The discussion focuses on why ownership is often fragmented across teams and how that fragmentation creates measurable security risk.
The session highlights what effective identity governance looks like when service accounts, secrets, and AI agents are clearly owned and governed. Attendees will hear which identity metrics are missing from executive dashboards, why those gaps matter, and how leading organizations are modernizing credential management without slowing innovation. The webinar also explains how mature identity programs are turning governance into a strategic security advantage rather than a compliance exercise.
2 days from now
AI driven phishing is accelerating fast, making passwords one of the weakest points in enterprise security. This webinar focuses on how passkeys can stop modern phishing attacks and why eliminating passwords is becoming essential as generative AI enables higher quality attacks at massive scale.
The session highlights Yubico’s self service approach to deploying passkeys across large organizations, with a focus on secure onboarding and ease of use. Attendees will see how passkeys can be implemented at enterprise scale to reduce risk, strengthen authentication and move away from password based security as organizations prepare for the threat landscape of 2026.
6 days from now
Rising costs, manual processes, and growing certificate volumes are putting increasing strain on Public Key Infrastructure programs. This webinar examines new global research from the Ponemon Institute that highlights why legacy PKI has become a major operational and security challenge, including heavy reliance on ad hoc tools and limited visibility that lead to outages and higher risk. The discussion connects these findings to real world pressures security teams are facing today.
CyberArk and Ponemon experts walk through the research results and translate them into practical guidance for 2026 planning. Attendees will hear how leading organizations reduce manual effort, improve governance, and prepare for rapid certificate growth and cryptographic change. The session provides a clear framework for modernizing PKI to lower costs, strengthen consistency, and build a more resilient security foundation.
1 week from now
AI agents are changing how authorization works, and many teams are relying on flawed assumptions that will not hold as agents scale across products and organizations. This webinar examines common misconceptions about agent authorization, including why agents are rarely just extensions of users and why existing mental models fail when applied to autonomous systems.
Jake Moshenko, CEO of AuthZed, joins host Sohan Maheshwar to discuss how agents differ from people, how they stress test permission systems, and why complexity grows quickly when agents are introduced. The session highlights what organizations need to understand about authorization at scale and why preparing for agent driven access is critical for anyone building or deploying AI agents in modern environments.