Registered Attendees
Live Sessions
Technical Demos
Interactive Expo Hall
Resource Center
Attendees can expect to learn about:
Securing remote workforces and reducing attack surface sprawl.
Hybrid cloud deployments and data security principles.
Frameworks and strategies for implementing access control tools.
Implementing multi-factor authentication securely.
Vulnerability management, patching and zero-day mitigation.
SecurityWeek Virtual Events Provide
During this 30 minute virtual session, join security leaders from Okta, Palo Alto Networks, and Deloitte as they reveal how truly integrated security works in practice—featuring real-world implementations and commentary from our joint customers.
Whether you're driving Zero Trust adoption or just trying to reduce friction between identity and security teams, gain actionable insights to:
Jack Zaldivar
Databricks, Staff Systems Engineer
Guillermo Porcaro
Medallia, VP, Corporate IT
Wayne Smiley
Okta, Principal Solutions Engineer
Shivangi Sharma
Palo Alto Networks, Director, Technical Marketing Engineering
Andrew Rafla
Deloitte & Touche LLP, Principal
Vivek Lodhi
Deloitte & Touche LLP, Managing Director
With 50% of Identity Governance and Administration (IGA) projects in distress, many organizations are turning to "Light IGA" for a simpler solution. But is this a costly mistake? Join this session to learn why a Full IGA platform is the essential engine for a successful Zero Trust strategy. We will demonstrate how to leverage AI-powered analytics and automated policy enforcement to manage risk, streamline compliance, and ensure that every user—and machine—has exactly the access they need, exactly when they need it, and nothing more.
Max Fathauer
Ping Identity, Senior Product Marketing Manager
Matt Berzinski
Ping Identity, Senior Director, Product Management
Please visit our sponsors in the Exhibit Hall and explore their resources. They're standing by to answer you questions.
When a security event occurs, most teams tend to jump into a circle of blame. Everyone takes their turn saying, "It can't be my fault." Unfortunately, for many companies, the Security team is ultimately seen as at fault when a breach happens; after all, it is a security incident.
Long-lived credential leaks, aka secrets sprawl, are possibly the single largest security risk every organization is currently facing. No security team can solve this growing issue on its own. This is going to take a full team effort and rethinking some of the relationships and silos we have become accustomed to in the tech world. There has never been a better time to rethink how we build complex applications and how they interact with the world.
In this talk, you will:
Dwayne McDaniel
Developer Advocate, GitGuardian
One tap. No push. You're in. FastPass uses device trust and biometric checks to eliminate passwords, without compromising identity.
This demo moves from theory to practice, showing how to operationalize trust across the entire identity lifecycle. We'll showcase how linking high-assurance identity proofing directly to access management can solve critical challenges. You'll see practical demos covering how to:
This is a look at a unified strategy designed to reduce risk and boost operational efficiency from an identity's first day to its last.
One tap. No push. You're in. FastPass uses device trust and biometric checks to eliminate passwords, without compromising identity.
This demo moves from theory to practice, showing how to operationalize trust across the entire identity lifecycle. We'll showcase how linking high-assurance identity proofing directly to access management can solve critical challenges. You'll see practical demos covering how to:
This is a look at a unified strategy designed to reduce risk and boost operational efficiency from an identity's first day to its last.