"Help me, Identity Verification; you're my only hope." For years, IAM programs have promised seamless, secure user journeys, yet many practitioners find themselves trapped in a "data swamp." We've talked about "Identity-First" incessantly for years, but the realization of that vision remains elusive due to "asteroid fields" of messy HCM integrations, unverified human attributes, and a neglected fleet of automated actors.
If your organization is still struggling to make the dream of automated IAM a reality, this session is your rebellion against the chaos. It will address the pain points that stall progress across both human and non-human actors:
This session moves beyond the "why" of transformation and focuses on the how of realization. It will demonstrate how moving verification to the front of the lifecycle acts as the ultimate catalyst—turning identity data from a liability into a high-fidelity asset.
Beyond the organic, this session will explore why machine identities (Droids) need identification just as much as their organic counterparts. Realizing this vision requires tight partnerships with engineering teams, embracing a DevOps mindset so that identity is embedded as Infrastructure as Code (IaC). Next, the session will showcase how to identify and verify these droids using modern standards like SPIFFE with SVIDs, enabling teams to bake verifiable workload identities directly into the CI/CD pipelines and maintain a unified, cryptographically-verifiable registry.
By joining this rebellion, attendees will gain the tactical schematics for:
Join the rebellion to discover how building verified identities from the start is the only hope to move your IAM program out of the planning phase and into a high-speed realization of modern security—faster than the ship that made the Kessel Run in 12 parsecs!