Why Attend?

Attendees can expect to learn about:

Securing remote workforces and reducing attack surface sprawl.

Hybrid cloud deployments and data security principles.

Frameworks and strategies for implementing access control tools.

Implementing multi-factor authentication securely.

Vulnerability management, patching and zero-day mitigation.

Sponsored by

SecurityWeek Virtual Event Sponsorships

I want to become a sponsor

SecurityWeek Virtual Events Provide

  • BRAND AWARENESS: Introduce your brand to a large audience and deepen connections with existing customers and prospects through powerful brand integration by being part of a high-profile event that is heavily marketed for months.
  • THOUGHT LEADERSHIP: Demonstrate expertise and build trust by presenting to a targeted, information-hungry audience of cybersecurity professionals.
  • LEAD GENERATION: The scale of SecurityWeek’s virtual events serve as a cost effective lead generation platform to fuel your sales teams.

Agenda

October 8, 2025 11:00

Zero Friction Defense: Where Identity Meets Security

During this 30 minute virtual session, join security leaders from Okta, Palo Alto Networks, and Deloitte as they reveal how truly integrated security works in practice—featuring real-world implementations and commentary from our joint customers.

Whether you're driving Zero Trust adoption or just trying to reduce friction between identity and security teams, gain actionable insights to:

  • Automate secure access across users, devices, and workloads
  • Detect and respond to threats faster with integrated telemetry
  • Implement demonstrated design patterns for scalable, secure environments
  • Expect no fluff, just real architecture, demos, and a candid look at how our customers have brought their security together.
speaker headshot

Jack Zaldivar
Databricks, Staff Systems Engineer

speaker headshot

Guillermo Porcaro
Medallia, VP, Corporate IT

speaker headshot

Wayne Smiley
Okta, Principal Solutions Engineer

speaker headshot

Shivangi Sharma
Palo Alto Networks, Director, Technical Marketing Engineering

speaker headshot

Andrew Rafla
Deloitte & Touche LLP, Principal

speaker headshot

Vivek Lodhi
Deloitte & Touche LLP, Managing Director

October 8, 2025 11:30

Beyond the Basics: Why Today's Enterprises Need Full IGA

With 50% of Identity Governance and Administration (IGA) projects in distress, many organizations are turning to "Light IGA" for a simpler solution. But is this a costly mistake? Join this session to learn why a Full IGA platform is the essential engine for a successful Zero Trust strategy. We will demonstrate how to leverage AI-powered analytics and automated policy enforcement to manage risk, streamline compliance, and ensure that every user—and machine—has exactly the access they need, exactly when they need it, and nothing more.

speaker headshot

Max Fathauer
Ping Identity, Senior Product Marketing Manager

speaker headshot

Matt Berzinski
Ping Identity, Senior Director, Product Management

October 8, 2025 12:10

BREAK

Please visit our sponsors in the Exhibit Hall and explore their resources. They're standing by to answer you questions.

October 8, 2025 12:30

Solving Secrets Sprawl Takes More Than Security: Why Machine Identity Is Everyone's Problem

When a security event occurs, most teams tend to jump into a circle of blame. Everyone takes their turn saying, "It can't be my fault." Unfortunately, for many companies, the Security team is ultimately seen as at fault when a breach happens; after all, it is a security incident.

Long-lived credential leaks, aka secrets sprawl, are possibly the single largest security risk every organization is currently facing. No security team can solve this growing issue on its own. This is going to take a full team effort and rethinking some of the relationships and silos we have become accustomed to in the tech world. There has never been a better time to rethink how we build complex applications and how they interact with the world.

In this talk, you will:

  • Get an update on the latest secrets security research
  • Ask who really owns security and identity
  • Map possible routes for a secrets-free future
  • Rethink git and pull requests workflows and see why that is more involved than you think
speaker headshot

Dwayne McDaniel
Developer Advocate, GitGuardian

October 8, 2025 13:00

Seamless secure authentication with Okta Fastpass

One tap. No push. You're in. FastPass uses device trust and biometric checks to eliminate passwords, without compromising identity.

October 8, 2025 13:40

Ping Identity Workforce Solutions

This demo moves from theory to practice, showing how to operationalize trust across the entire identity lifecycle. We'll showcase how linking high-assurance identity proofing directly to access management can solve critical challenges. You'll see practical demos covering how to:

  • Prevent onboarding fraud with high-assurance verification.
  • Secure your help desk from social engineering and account takeover.
  • Simplify governance and access reviews with AI-driven recommendations.
  • Eliminate standing privileges using Just-in-Time (JIT) access for critical systems.

This is a look at a unified strategy designed to reduce risk and boost operational efficiency from an identity's first day to its last.

[On-Demand] Seamless secure authentication with Okta Fastpass

One tap. No push. You're in. FastPass uses device trust and biometric checks to eliminate passwords, without compromising identity.

[On-Demand] Ping Identity Workforce Solutions

This demo moves from theory to practice, showing how to operationalize trust across the entire identity lifecycle. We'll showcase how linking high-assurance identity proofing directly to access management can solve critical challenges. You'll see practical demos covering how to:

  • Prevent onboarding fraud with high-assurance verification.
  • Secure your help desk from social engineering and account takeover.
  • Simplify governance and access reviews with AI-driven recommendations.
  • Eliminate standing privileges using Just-in-Time (JIT) access for critical systems.

This is a look at a unified strategy designed to reduce risk and boost operational efficiency from an identity's first day to its last.

Register Now

FAQ


Yes, you’ll need to fill out our registration form to gain access to the event. Please fill in the registration form with some basic information to get started.
The information you provide upon registration will be used to establish you as a user on the platform.

SecurityWeek is committed to protecting and respecting your privacy. From time to time, we would like to contact you about our products and services, as well as other content and information from event sponsors that may be of interest to you. You may unsubscribe from these communications at any time.

By registering for this event, you consent to allow SecurityWeek to store and process the personal information submitted to provide you the content requested.
Yes, the vFairs platform is compatible with any computer or mobile device and any browser.
Yes, this event is completely free to attend. We encourage you to login and have a look around at your convenience.
Yes, the event will be available on-demand following the live broadcast.