Many identity programs operate across the core pillars of Identity Governance & Administration (IGA), Privileged Access Management (PAM), and Access Management (AM). At the same time, identity has become both the most important perimeter for cyber defense and one of the most targeted attack surfaces for threat actors.
To address evolving threats, new identity security disciplines have emerged — including Identity Threat Detection & Response (ITDR) and Identity Security Posture Management (ISPM) — alongside new capabilities from hyperscalers and the broader cybersecurity ecosystem. These approaches vary widely in architecture and scope, making it difficult to choose the right strategy and prioritize investment.
This masterclass focuses not on products but on concrete capabilities and the architectural patterns used by different solutions. Participants will get an overview of identity security features, learn how to map them to the NIST Cybersecurity Framework 2.0 and Zero Trust principles, and how to apply a repeatable assessment method to:
Attendees will leave with a structured approach to modernizing their identity security posture.