Traditional identity systems are under pressure from outdated architectures that over-collect and retain data, leading to inaccurate decisions and increased risk.
This workshop introduces event-driven and continuous identity approaches, exploring standards such as CAEP, RISC, and Shared Signals. Security architectures need to be designed to be more intentional with an “Identity First” perspective and proactive threat detection capabilities. Through discussions on the current limitations and future possibilities, attendees will discover how to prepare their systems for an evolving identity landscape while minimizing risks and improving accuracy.
the speakers
Andrew Cameron
Technical Fellow, IAM
General Motors
Sean O’Dell
Senior Staff Security Engineer, Consumer and Workforce IAM
The Walt Disney Company
- Why identity systems architecture needs to evolve — over-collection and over-retention of data and/or reliance on a single source=staleness/inaccuracy=poor decisions=increased risk.
- Benefits of shared signals, and of event-driven and continuous approaches to Identity
- Standards and technology overview (esp. CAEP, RISC, Shared Signals)
- Current limitations and issues: which parts of this can we do already; which can we at least prepare for; and which pieces will just need to wait?
- How do privileged access methods benefit from these (caep)abilities?
Identity Architects and Engineers
Learn how to design systems that move away from static, stale identity data and towards dynamic, real-time decision-making with standards like CAEP and Shared Signals.
Security Professionals
Discover how event-driven identity can improve threat detection and reduce risks associated with data over-collection.
Policy Makers and Compliance Experts
Understand how these approaches align with privacy regulations and reduce data retention concerns.
Large Language Models (LLMs) are rapidly transforming the IAM landscape, but how do they actually work, and how can they be applied effectively?
Understanding and addressing the emerging risks of Non-Human Identities (NHIs) is essential in an era of increasing cyber threats and evolving technologies.
This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you. If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies.