Understanding and addressing the emerging risks of Non-Human Identities (NHIs) is essential in an era of increasing cyber threats and evolving technologies.
This workshop explores the critical importance of Non-Human Identities (NHIs) and the risks and challenges they present in today’s evolving cybersecurity landscape. Participants will delve into the urgency of addressing NHI-related breaches, including their connection to generative AI and the top risks faced by CISOs. A live demo will showcase the real-world implications of an NHI compromise, with insights on how to manage and respond to such attacks. The session will also introduce the NHI Maturity Model and a risk-based approach to managing these identities, while addressing the evolving regulatory landscape and market positioning. Industry thought leaders, including CISOs, will share their expertise, offering practical insights to help organizations safeguard their environments.
the speakers
Ehud Amiri
VP of Product Management
Saviynt
Jobson Andrade
Senior Manager, Identity Operations
Mars, Incorporated
Paresh Bhaya
Co-Founder and Head of GTM
Natoma
Danny Brickman
CEO and Co-Founder
Oasis Security
Rom Carmel
Co-Founder and CEO
Apono
Lalit Choda
Founder
Non-Human Identity Management Group
Rich Dandliker
Chief Strategist
Veza
Eli Erlikhman
VP of Cyber Security
Sprinklr
Kirby Fitch
Sr. Product Manager
Sailpoint
Idan Gour
CTO
Astrix Security
Nirit Icekson
CMO
Entro Security
Anusha Iyer
CEO
Corsha
Vincenzo Iozzo
CEO
SlashID
Dwayne McDaniel
Sr. Developer Advocate
GitGuardian
Jesse Minor
Identity Security Consultant
Independent
Kamal Muralidharan
Chief Technologist
Andromeda Security
Steven Rennick
IAM Architect
Ciena
Sriram Santhanam
Sr Director - Information Security Engineering
Gap Inc.
Shashwat Sehgal
Co-Founder and CEO
P0 Security
Michael Silva
Director Solution Engineering
Astrix Security
Ido Shlomo
Co-Founder & CTO
Token Security
Henrique Teixeira
SVP of Strategy
Saviynt
Anthony Viggiano
Identity Governance Director
Cigna
Troy Wilkinson
Global CISO
9:00 AM – 9:10 AM
Opening Remarks
Lalit Choda
9:10 AM – 9:30 AM
What are Non-Human Identities – Why They Are So Critical, the Key Risks and Challenges
Panel/Fireside Session
9:30 AM – 9:50 AM
Why the Urgency Now?
Panel Session
9:50 AM – 10:10 AM
How Attackers Compromise NHIs (Including Demo)
Presentation + Demo
10:10 AM – 10:25 AM
Coffee Break
10:25 AM – 10:45 AM
The NHI Maturity Model: A Risk-Based Approach to Implementing an NHI Program
Panel Session
10:45 AM – 11:05 AM
Agentic AI and the Intersection with NHIs
Panel Session
11:05 AM – 11:25 AM
How To Convince C-Level Decisions Makers To Invest in an NHI Program
Panel Session
11:25 AM – 11:45 AM
The Market Landscape – Solutions to Manage NHI Risks and Market Trends
Panel Session
11:45 AM – 11:50 AM
Closing Remarks
Lalit Choda
11:50 AM – 12:00 PM
Q&A + Open Discussion
Understanding the critical role of Non-Human Identities (NHIs) in security and the associated risks
Insights into why NHI-related breaches are urgent and how they tie to emerging technologies like Generative AI
A real-world demonstration of an NHI compromise and strategies for responding to NHI attacks
An introduction to the NHI Maturity Model and how to implement a risk-based approach to NHI management
Awareness of the regulatory landscape, standards, and the latest developments in NHI security
A roundtable discussion on the market landscape and the role of different security approaches, including static vs. dynamic secrets and the transition to a zero-trust model
CISOs and Security Executives
looking to enhance their organization’s security posture against evolving NHI-related risks
Risk Managers and IT Security Professionals
seeking to understand the practical implications of NHI breaches and effective response strategies
Compliance Officers
wanting to stay ahead of regulatory requirements and standards for NHI security
Security Architects and Engineers
focused on implementing risk-based approaches and adapting to zero-trust models
Vendors and Industry Leaders
interested in discussing the positioning of various solutions and market trends without promoting specific products
Large Language Models (LLMs) are rapidly transforming the IAM landscape, but how do they actually work, and how can they be applied effectively?
Traditional identity systems are under pressure from outdated architectures that over-collect and retain data, leading to inaccurate decisions and increased risk.
This website uses cookies to improve your experience, provide social media features and deliver advertising offers that are relevant to you. If you continue without changing your settings, you consent to our use of cookies in accordance with our privacy policy. You may disable cookies.