Discover Security Events in Iam
Receive industry alerts, sponsorship, speaking opportunities, ticket discounts and a lot more!
All security events are automatically streamed into this table on a daily basis.
3 days from now
Phishing resistant MFA, passwordless authentication and AI driven identity protection take center stage in this live product demonstration of Duo’s security first IAM platform. The session walks through how modern identity attacks such as AI powered phishing and session hijacking bypass traditional MFA, and shows how stronger controls can reduce identity based breach risk.
Attendees will see real time configuration of MFA, device trust policies and passwordless access, along with integration into existing identity providers such as Active Directory, Okta and Entra. The demo also highlights adaptive risk based policies and the Duo AI Assistant for administrative efficiency. A live Q and A follows the walkthrough, giving IT and security teams practical insight into deploying and managing Duo in real environments.
3 days from now
This session addresses identity gaps that leave organizations exposed to account takeover, synthetic identities, and recovery abuse. These threats often emerge when onboarding, login, and post login processes operate in silos, resulting in inconsistent assurance and added friction for legitimate users. The webinar explains how these gaps create risk and why a unified approach is necessary.
Ping Identity’s product leaders will outline how to combine identity verification, passwordless authentication, risk signals, and orchestration across touchpoints. The discussion covers reducing account takeover and new account fraud, applying consistent risk based decisions, orchestrating adaptive identity flows over existing providers, and strengthening assurance while simplifying the user experience.
4 days from now
Machine and agentic identities now outnumber human identities by as much as 144 to 1, reshaping enterprise identity governance. This webinar from Delinea and Turnkey Consulting examines how AI adoption is accelerating this shift and why non human identities with privileged access create new security risks. The session addresses the need to evolve PAM strategies to secure autonomous agents operating at scale.
Speakers will discuss aligning IAM and PAM for lifecycle governance, applying dynamic access controls, and reducing risks such as unmanaged API keys and over permissioned agents. Attendees will gain a practical automation first roadmap aligned with Zero Trust, NIST, and ISO principles, along with guidance on assessing and strengthening non human identity governance.
5 days from now
Small businesses are increasingly targeted by cyber attackers who use AI to scale phishing, impersonation, and credential theft campaigns. This webinar examines how these AI-driven threats are affecting organizations with limited security resources and why compromised credentials remain a primary attack vector. The session focuses on practical strategies that businesses can use to strengthen their defenses without introducing significant operational complexity.
The discussion highlights the role of phishing resistant multi factor authentication (MFA) in reducing identity based attacks. Attendees will learn how AI is used to automate sophisticated attacks and how organizations can respond when credentials are exploited. The webinar also demonstrates how Duo helps small and midsize businesses implement user friendly MFA to strengthen security while minimizing deployment and management challenges.
5 days from now
Active Directory Is Still the Backbone of Trust. But credential-based attacks are still the easiest way in.
For banking institutions, healthcare systems, and critical infrastructure organizations, Active Directory remains the foundation of access control. Yet phishing, account takeover, and helpdesk reset abuse continue to bypass traditional defenses, especially in hybrid workforce environments.
When identity is the control plane, credentials alone are no longer enough.
This session explores how regulated organizations can strengthen identity assurance by adding a government ID validation layer to their authentication workflows without disrupting user experience or operational efficiency.
What You’ll Learn • Why credential attacks remain dominant in high-trust industries • How phishing-resistant identity verification reduces account takeover risk • The hidden risk in helpdesk password resets and how to eliminate it • Why government ID validation is uniquely suited for regulated environments • How to elevate identity assurance without adding friction
Why This Matters for Regulated Industries
In industries where compliance, auditability, and trust are non-negotiable, strengthening authentication isn’t optional, it’s operationally critical.
Government ID validation: • Reduces account takeover exposure • Mitigates helpdesk social engineering • Strengthens phishing resilience • Supports stronger audit and compliance postures • Provides high-confidence identity proofing without complex infrastructure
2 weeks from now
Human identities play a central role in many modern security breaches as privilege expands beyond traditional IT administrators to developers, cloud teams, data professionals, and business users. As organizations adopt cloud services, automation, and AI systems, machines increasingly act on behalf of people, creating additional complexity in managing access. This webinar examines how privilege spreads across environments and why siloed identity tools often leave critical security blind spots.
The session explores how fragmented identity and access systems make it difficult to understand where privilege exists and how it is being used. Speakers will present real world examples of non IT roles carrying significant privileges and discuss how attackers exploit these gaps. Attendees will learn why securing privilege requires a unified visibility and governance approach rather than isolated identity controls.
3 weeks from now
Managing workforce identities in cloud and hybrid environments has become increasingly complex as organizations adopt modern infrastructure and distributed work models. Standing privileges and fragmented access controls can introduce significant security risks when permissions accumulate across systems without clear oversight. This webinar explores practical approaches for reducing identity related risk through modern privilege management strategies.
The session explains how concepts such as Zero Standing Privileges and Just in Time access function in real operational environments. Speakers will discuss how workforce identity management, privileged access management, endpoint privilege controls, and cloud permissions can work together to strengthen access governance. Attendees will gain a practical view of how organizations can gradually modernize human identity security during cloud transformation initiatives.
1 month from now
Many organizations aim to move toward passwordless authentication, yet legacy systems still depend on traditional credentials. This webinar explores how security teams can manage the transition by implementing a hybrid strategy that supports passwordless experiences while continuing to protect systems that require passwords. The session focuses on reducing the risks associated with credential based attacks during this transitional phase.
Attendees will learn how to combine FIDO2 and passkeys with enterprise credential management to support modern authentication workflows. The discussion also addresses methods for securing legacy applications that cannot natively support passwordless login. A demonstration will show end to end passwordless login journeys and practical use cases, along with strategies for reducing MFA fatigue and minimizing password reset requests while improving overall security and productivity.
1 day ago
Security teams often struggle with limited visibility into employee credential habits and shadow IT. This webinar, part of the Last-mile defense series, focuses on identifying weak and compromised passwords across the employee browser environment. It addresses the risks created by unmanaged applications and poor password practices, which can expose organizations to preventable threats.
Attendees will see how to gain clearer insight into enterprise password risk and receive actionable intelligence to strengthen their security posture. The session also highlights the use of real time alerts to help security teams respond quickly and reduce exposure tied to shadow IT and compromised credentials.
1 day ago
Organizations that want to scale often struggle with fragmented IT systems that limit visibility and control. This webinar explores how enterprise flexibility depends on building a unified and secure IT foundation rather than relying on disconnected tools. Experts from Google Workspace and JumpCloud discuss how aligning productivity platforms with identity and device management can reduce complexity and improve oversight across the technology environment.
The session explains how unified IT management supports stronger access control, reduces operational silos, and helps organizations manage growth without increasing risk. Speakers also outline how modern platforms enable better visibility into users, devices, and systems, helping teams maintain security and operational control while adapting to changing business needs.
1 day ago
Shadow IT and unmanaged employee credentials continue to create blind spots that expose organizations to unnecessary risk. This session focuses on how security teams can gain visibility into password practices across the employee browser environment and identify weak, reused or compromised credentials before they are exploited. The discussion highlights the impact of hidden applications and unmanaged accounts on overall enterprise security.
Practical guidance will be shared on detecting shadow IT activity, monitoring credential exposure and using real time alerts to strengthen response efforts. Attendees will see how better visibility and actionable intelligence help reduce password related risk and improve overall security posture across the organization.
2 days ago
AI agents can rapidly test thousands of permission paths, creating security risks that traditional controls may miss. This webinar demonstrates how developers using agentic AI in real world scenarios can unintentionally create unauthorized roles and access points while attempting simple tasks. A live AWS environment is used to show how these situations occur and why existing RBAC models often fail to detect or prevent the resulting overprivilege.
The session explains how cloud native IAM guardrails can help manage these risks and why additional controls may still be required. It also presents the role of Cloud Permissions Firewall as a final defensive layer and shows how automated Default Deny policies can block agents from creating new identities or ingress points.