2025 Identiverse Downloads
Below you'll find the keynote and session recordings, along with presentation files for the sessions we’re permitted to share.
Session Title |
Speaker(s) |
Recording Link |
Presentation Link |
---|---|---|---|
AI and Identity Workshop |
Jonathan Sander |
N/A |
N/A |
Non-Human Identity Workshop |
Lalit Choda |
||
Continuous Identity Workshop |
Andrew Cameron & Sean O'Dell |
N/A |
|
Personal Identity Workshop — A Tale of Two Standards |
Christine Owen, Teresa Wu, Tim Cappalli, Nick Steele & Lee Campbell |
N/A |
|
SANS Workshop |
Daniel King |
N/A |
|
Navigating Identiverse: A Newcomer's Guide |
Heather Flanagan & Allan Foster |
||
Introduction to Identity |
Lance Peterman & Espen Bago |
||
Transforming Retail and Hospitality Cloud with IAM: Enhancing Security, Operational Efficiency, and Customer Experience |
Jackie Deloplaine, Manish Gupta & Emily Williams |
||
Interoperability Profiling for Secure Identity in the Enterprise (IPSIE) Panel Discussion |
Jen Schreiber, Aaron Parecki, Atul Tulshibagwale & Dean H. Saxe |
||
AuthZEN: The "OpenID Connect" for Authorization |
Omri Gazitt, David Brossard & Gerry Gebel |
||
Fundamentals of Passkeys (part i & part ii) |
Megan Shamas, Nick Steele & Paul Heim |
||
Standards, Integrity, and Transparency: The Catalysts for Innovation and Market Advantage |
Kay Chopard, Carol Buttle, Andrew Johnson & Sal D'Agostino |
||
Building a Digital Commons for Identity |
Elizabeth Garber |
||
The TaSManian Devil of Cybersecurity: How the Threat and Safeguard Matrix Can Save Your Business |
Ross Young |
||
Introduction to Privacy |
Zack Martin, Heidi Wachs & Michael Borgia |
N/A |
|
Crawl, Walk, Run: Achieving Identity Security in Cloud-First Environments |
Art Poghosyan, Chetan Jha, Sriram Santhanam & Jami Watson |
||
Ain’t No Party Like a Relying Party: Verifiable Digital Credential Edition |
Ryan Galluzzo, George Fletcher, Stefan Schubert & Ben Flatgard |
||
The OpenID Foundation Board’s Quick Take on the Landscape |
Nancy Cam-Winget, Nat Sakimura, Gail Hodges & Dima Postnikov |
||
Hidden Dangers in Azure: Over-Privileged Roles and API Vulnerabilities |
Ariel Simon |
||
Playing Chess with Fraudsters |
Gary Gwin & Dhruv Patel |
N/A |
N/A |
A Practical Guide to Modernizing Authorization: Flexibility, Performance, Security |
|||
Welcome to Identiverse! |
Andi Hindle |
N/A |
|
Trust in the Age of Autonomous Identity |
Michael Coates |
N/A |
N/A |
Speed of Trust |
Andre Durand |
N/A |
|
Practical Identity |
David Tyburski |
N/A |
Session Title |
Speaker(s) |
Recording Link |
Presentation Link |
---|---|---|---|
Radiant Logic Presents: Ready Player Two: Why Multiplayer AI Beats Going Solo in Identity Security |
John Pritchard |
||
Establishing Trust Through Standards, Governance and Legislation |
Hannah Rutter |
||
Building World Class Teams: How to Achieve Breakthrough Performance Through Collaboration, Creativity, and A Culture of ONE |
Robyn Benincasa |
||
Planning for Failure |
Allan Foster |
||
Getting the CISO’s Attention (Without Causing a Breach) |
Joe Sullivan |
||
A Glorious Mess: AI, Identity and The Inevitable Privacy Crisis |
Richard Bird |
||
Pro-Human Identity: From Ideal to Real |
Nishant Kaushik |
||
The Identity of AI |
Jonathan Sander |
N/A |
N/A |
Using a Human-Centered Approach to Successfully Manage an ICAM Modernization |
Sarah Villarmarzo |
||
Securing Stakeholder Buy-In: Driving Business Success through Strategic Identity Transformation |
Grace Sands & Cathy Hall |
||
I'm Just George - Living in a Decentralized Identity World |
George Roberts |
||
The State and Future of Passkeys |
Andrew Shikiar |
||
Making Sense of CRA, DORA and NIS2 in the Identity Space |
Sebastian Rohr |
||
Modernizing the Customer Experience: How a Top-20 Bank Unified Security, Experience, and ROI |
Chad Cromwell |
||
How and Why IGA Programs Fail - A Case Study |
Jon Lehtinen |
||
Transforming Resistance into Resilience: Mastering Organizational Change Management |
Angie Klein |
||
WorkOS Presents: CIAM for AI: Who Are Your Agents and What Can They Do? |
Michael Grinich |
N/A |
|
Unconventional Approaches to Identity: Securing Political Campaigns |
Ronnie Manning & Michael Kiser |
||
Hope Fulfilled, Hype Dispelled: Identity Standards Past, Present, and Future |
Brian Campbell |
||
Bringing It All Together: Harnessing the CAEPabilities With Event-Driven IAM |
Sean O'Dell, Andrew Cameron, Mike Kiser, Atul Tulshibagwale & Jeff Steadman |
||
Digital Identity on Defense |
Grace Klutke, Elizabeth Garber, Alex Weinert & Tina Srivastava |
||
Trends and Perspectives on Identity Startup Investing From Venture Capitalists |
Austin Arensberg, Andrew McClure & Pramod Gosavi |
||
Google Masterclass: What's New with the Digital Credentials API and How to Access Digital IDs Online |
Helen Qin & Lee Campbell |
||
Ping Identity Masterclass: From Who to What: The Central Role of Authorization in Modern Interactions |
Chris Price & Nick Wall |
||
Radiant Logic Masterclass: Empowering Identity-First Security: How Good Data Leads to a Better Defense |
Wade Ellery |
||
Cisco Masterclass: Defining (and Using) Maslow’s Hierarchy of Identity Risk |
Alex Zaslavsky & Didi Dotan |
||
Women in Identity Panel: Leading with Vision and Impact |
Kay Chopard, Jessica Vose, Michele Tomasic, Rita Gurevich & Hannha Rutter |
||
The State of OAuth 2025 |
Aaron Parecki |
||
From Human Error to Automated Assurance: The Journey Toward Zero Touch Production |
Matt Topper |
||
The State of Non-Human Identities: Key Challenges and Insights You Need to Know |
Todd Thiemann & Amit Zimerman |
||
Weaving the Trust Fabric for the Digital Identity Ecosystem |
Zack Martin |
||
Cisco Presents: IAM Built for the Imposter Era |
Chris Anderson |
||
Ping Identity Presents: Redefining Workforce Identity: A Financial Services Journey to Secure and Scalable Access |
Tripp Knowles |
||
Radiant Logic Presents: Flying an Airline Takes a Lot of Teamwork |
Jay Harrison |
||
Microsoft Presents: Harnessing Generative AI for Next-Generation Identity Management |
Rahul Prakash |
||
Women in Identity: Igniting Impact Through Community and Bravery |
Tasha Patterson |
||
Workload Identity - A Problem Made for Standards! |
Pieter Kasselman & Joseph Salowey |
||
Drowning in Privileged Accounts: How to Get Your Head Above Water |
Erin Lewis |
||
OWASP NHI Top 10: Diving into OWASP's Recent Guide on Non-Human Identity Security |
Roni Lichtman |
||
How Utah is Shaping the Future of Secure, Statewide Verifiable Digital Credentials |
Wayne Chang & George McEwan |
||
SGNL Presents: Take the First Step Towards Continuous, Event-Based IAM |
Mat Hamlin |
||
Transmit Security Presents: The Need for CyberFusion: Because Fraudsters Don’t Care About Your Identity and Fraud Silos |
David Mahdi & David Bailey |
||
Saviynt Presents: GE Healthcare’s Journey to Proactive Identity Security with Identity Security Posture Management (ISPM) |
Vibhuti Sinha & Joey Tyler |
||
Broadcom Presents: Modernize your IAM infrastructure |
Lee Howarth |
||
Women in Identity: Identity for All: Unlocking Economic Empowerment Through Inclusive ID |
Kay Chopard, Naomi Baur, Teresa Wu & Jeremy Grant |
||
Building Scaleable & Interoperable Digital Credential Ecosystems with OpenID for Verifiable Credentials |
Joseph Heenan |
||
Re-envisioning TIAA's CIAM Platform using Software and Platform Engineering Principles |
James Deerkoski & Gaurav Kothari |
||
A Deep Dive into Grammarly’s NHI Security Strategy |
Thijn Bukkems |
||
Balancing Access and Security at Scale: How Login.gov Partners with Agencies and the Private Sector to Confront Fraud and Protect Benefits for Millions |
Hanna Kim |
||
HYPR Presents: Passkeys + Identity Verification: Build an Authentication Chain of Trust |
Bojan Simic |
||
SecureAuth Presents: AI as Both User and Gatekeeper: The New Challenge for Identity Security |
Brook Lovatt |
||
PlainID Presents: Securing the Future: Best Practices for Authorization and Access Control in AI Systems |
Gal Helemski |
||
Tuebora Presents: Smart Onboarding of Applications using AI Agents |
Sanjay Nadimpalli |
||
Session Presented by Axonius: The Magic Triangle of Identity: Aligning Identities, Security, and Assets |
Liz Morton |
||
Nothing Good Stays Still - Dealing with Changes in Interconnected Authentication Standards |
Alex Chalmers |
||
Let’s Be Honest – Your Identity Project Isn’t Stuck, It’s Confused |
David Lee |
||
Identity as a Battleground: Lessons from Microsoft’s Midnight Blizzard Encounter |
Abbas Kudrati |
||
Enhancing Identity Proofing for Improved Security and Customer Experience |
Titi Robinson |
||
Curity Presents: Leaky APIs, Rogue Tokens |
Jonas Iggbom |
||
Oasis Security Presents: Adding NHI Management to Your IAM Program |
Adam Ochayon |
||
Oleria Presents: Reimagining Identity in the Age of AI |
Jim Alkove |
||
Identity is Hard, Learning Identity is Harder |
Andy Barlow |
||
Italian Precision and German Creativity: A Conversation on Optimising B2B Services |
Olaf Grewe & Marco Venuti |
||
How to Enhance Security with Transaction Tokens |
Mert Coskuner & Naveen CM |
||
Why it's Time to Move Beyond Photo ID |
Chloe Coleman & Jaye Hackett |
||
Okta Presents: Identity is Security: Securing AI Agents and Non-Human Identities |
Sandeep Kumbhat & Jamie Fitz-Gerald |
||
CyberArk Presents: Breaking Free from Complexity: A Practical Guide to Workforce Access Security |
Khizar Sultan & Caleb McDonald |
||
DigiCert Presents: Security Matchmaker: How PKI-based Credentials and IAM Can Save the Digital World |
Ashley Stevenson |
||
Veriff Presents: Trust-Driven Success: The Key to Scaling Securely Across Borders |
Gina Rodrigues & Chaochao Zuo |
Session Title |
Speaker(s) |
Recording Link |
Presentation Link |
---|---|---|---|
Cisco Presents: How Identity Resilience Will Improve Your Worst Day on The Job |
Matt Caulfield |
||
Authenticating the Future: AI's Role in Identity's Next Chapter |
Diana Kelley |
||
5 Lessons From 15 Years of Defending Microsoft Identity |
Alex Weinert |
||
Death & The Digital Estate: One Year Later |
Mike Kiser, Dean H. Saxe, Elizabeth Wharton & George Fletcher |
||
Optimize Your Passkey Implementation with New UX Guidelines |
Megan Shamas, Mitchell Galavan & James Hwang |
||
Thales Masterclass: B2B-IAM Smackdown: Defending the Future of Partner Identity |
Jeff Margolies, Sridhar Muppidi, Jim McDonald, Marco Venuti & Mark Wilson |
||
Innovation Workshop: Overcoming Obstacles to Empower Innovators to Advance Identity and Security |
Tina Srivastava, Lance Peterman, Nishant Kaushik & Alex Weinert |
||
Delighting the Business with Identity: The Power of Listening |
Alyson Ruff |
||
Ping Identity Masterclass: The Rebirth of IAM: Embracing Decentralization and Verified Trust |
Justin Chin & Charles Andrus |
N/A |
N/A |
SailPoint Masterclass: Unlocking Identity Security Efficiency |
Deepesh Kumar |
||
TechDemocracy Masterclass: Successful Mergers & Acquisitions - Navigating Identity-Related Use Cases While Preserving Business Continuity |
Todd Rossin & Karim Syed |
||
Digital Identity Proofing: Maximizing Rewards, Mitigating Risks |
Andi Hindle, Sabrina Guenther Frigo, Heidi Wachs & Darcie Winkler |
||
The Recovery Session |
Rob Brown, Bertrand Carlier, Ove Morten Stalheim, Justin Song & Dean H. Saxe |
||
The Next Step in Zero Trust Architecture, Zero Trust Applications |
Nat Bongiovanni |
||
Liminal Presents: Identity Verification & CIAM: Collision or Convergence? |
David Mahdi, Filip Verley & Miguel Navarro |
||
IDMWORKS Masterclass: How to Eliminate Access Sprawl and Empower Least Privilege Access |
Bill Willis |
||
Ping Identity Masterclass: Wrangling Compliance on the AI Frontier |
Diana Jouard |
||
Frontegg Masterclass: AI in CIAM: Breaking Barriers for Non-Tech Teams |
Roy Daniel |
||
CyberSolve Masterclass: What If Your Identity Had a Credit Score? Building the Future of Risk-Aware IAM |
Mak Tomar & Mohit Vaish |
||
Passkeys and Multi-Factor Authentication: When is Enough, Enough? |
Christiaan Brand |
||
Advancing Digital Identity Governance – Without Government |
Jeremy Grant |
||
Moving the MFA Needle: Real-Life Lessons from AWS's Cloud-Scale Campaign |
Arynn Crow |
||
Open Banking - Best Current Practice - Opinionated Reference Architecture |
Dima Postnikov |
||
Cisco Presents: Achieve the Impossible: End-to-End Phishing Resistance That’s Actually Deployable |
Karianne Butler & Ted Kietzman |
||
Ping Identity Presents: Seamless Travel: How Advanced Authentication Transforms the Airline Experience |
Jay Hefferman & Vishnu Mandala |
||
Radiant Logic Presents: Identity Security Posture Management (ISPM) in the Modern Enterprise |
Miguel Furtado |
||
Data Provenance: The Keystone of Trust in the Age of AI Deep Fakes |
Dan Kaufman, Tina Srivastava & Jack Poller |
||
Authentication, Reloaded: The Browser’s Role in Identity |
Heather Flanagan |
||
Can Verifiable Credentials Be Used to Improve the Citizen Experience? |
David Chan & Kartheek Solipuram |
||
Passkeys and Verifiable Credentials: Friends or Enemies? Choosing the Right Tool for Your Identity Challenge |
Mark Perry & Richard Mallam |
||
Passkeys and IC Chip-based Identity Proofing for Protecting Customers |
Koichi Moriyama |
||
Google Presents: Zero Trust Networking with Managed Workload Identities |
Uttam Ramesh |
||
SailPoint Presents: Your Business Partners Are Not Your Employees—So Why Manage Them Like They Are? |
Phil Nero & Jeff Bounds |
||
Thales Presents: The Quantum Shift: Phishing-Resistant and Quantum-Safe Authentication |
Robert Burns |
||
IDMWORKS Presents: Modernizing Identity Verification: Going Beyond Legacy Practices to Combat Fraud, Theft, and Account Takeover |
Matt Connors |
||
Preparing for a Post-Quantum World – Identity in the Crosshairs |
Andrew Regenscheid |
||
Unlocking the Future: The Harmonious Integration of Identity Wallets and Passkeys |
Christine Owen & Teresa Wu |
||
Where’s Waldo: Spotting Credential Stuffing in a Sea of Logins |
Josh Pierce |
||
Dynamic Employee Lifecycle for Modern Enterprises |
Elisa Abedarpo |
||
A Practitioners Guide to Managing Non-Human Identity Risks |
Lalit Choda |
||
TechDemocracy Presents: Winning at IAM! A Dynamic Process to Ensure Success for Your Workforce IAM (WF-IAM) and Customer IAM (CIAM) Planning, Implementation and Operations |
Todd Rossin |
||
Frontegg Presents: Conversation with a CISO/ Founder: How to Integrate Identity in a Successful SaaS Company |
Sagi Rodin & Guy Flechter |
||
CyberSolve Presents: Stories from the Trenches: How GSK Globally Moved From On-Prem SSO to the Cloud |
Brian Lewis, Eugert Jani & Ankush Kapoor |
||
Federated Forgery: Golden SAML and Beyond |
Alex Weinert |
||
Winning the War on Phishing |
Derek Hanson |
||
Through the Digital Credentials Rabbit Hole: Navigating Uses, Standards, and Interoperability |
Libby Brown |
||
Trust...But Verify: Enhancing Verification Processes to Build Trust and Reduce Fraud |
Tim Roufa |
||
Identity: The Superhero No One Invited to the Boardroom (But Still Saves the Day) |
David Lee |
||
Ping Identity Presents: Scaling Identity in Hospitality: Marriott International’s CIAM Journey |
Josh Knight |
N/A |
N/A |
Thales Presents: AI In The Shadow: Identity Verification in the age of Deepfakes - Understanding and Preventing Presentation & Injection Attacks |
Haider Iqbal |
||
Google Presents: Securing the Digital Frontier: Google's Approach to Modern Authentication |
Ievgeniia Zhovtobriukh |
||
Well That's Not How That's Supposed to Work… What Are Your Vulnerabilities Telling You About Your Business Processes? |
Tia Louden & Lea Snyder |
||
Why I Bought an EV, and Why You Should Use a Passkey |
Shane Weeden |
||
The Anatomy of an Open Banking Implementation |
Paul Heaney & Patrick Keenan |
||
Be Our Guest - Building a Great Experience for Anonymous Visitors |
Rob Otto |
||
When Are You Done? It is Time to Retire Identity as a 'mere' Project |
Lance Peterman |
N/A |
|
SailPoint Presents: AI-powered Identity Security: Practical Application to Solve Identity Specific Problems |
Devan D'Silva & Steve Toole |
N/A |
|
TechDemocracy Presents: Identity Security Architecture for Epic |
Viresh Garg |
||
CyberSolve Presents: The Identity Budget Squeeze: Doing More with Less |
Mohit Vaish & Chris Lugo |
N/A |
|
Best Practices in Protecting PII and PCI Data for 500M+ Customers: Building Secure Digital Identity Frameworks |
Abuarshad Saifudeen |
||
Ensuring Continuity: Mercari's Approach to Account Recovery amid Passkey Deployment |
Danny August Ramaputra |
||
IAM from Mars. IAM Doing it Wrong? |
Shannon Roddy |
||
Framework for Evaluating Equivalence in Authentication Journeys |
George Fletcher |
||
Some Assembly Required: Instruction Manual for Building a Workforce Identity Data Platform |
Sean O'Dell |
||
Microsoft Presents: The Future of Identity Must Include Network Access |
Nitika Gupta |
||
IDMWORKS Presents: The $700M Problem in US Health Care: Nurse Onboarding |
Matt Connors |
||
Frontegg Presents: Authentication and Identity in the Agentic Era |
Sagi Rodin |
Session Title |
Speaker(s) |
Recording Link |
Presentation Link |
---|---|---|---|
From Abraham to Zooko (With a Nod to Ian Along the Way) |
John Kemp |
||
When Your Digital Footprint Enables a Physical Threats |
Donald Burgess |
||
wwWallet an Identity Wallet Project for Europe and Beyond |
Derek Hanson |
||
Tech Debt Holding You Back? 5 Strategies to Escape the Crush |
Paul Lanzi |
||
The Identity Management Program - What's Easy, What's Hard and How to Succeed |
Mark Cox |
N/A |
N/A |
Why Your IAM Project is Failing |
Jason Oeltjen |
||
Inside an Enterprise-Wide IAM Transformation: Lessons in Orchestration, Visibility, and Scale |
Nick Rowe & Brian Dickerson |
||
Identity Management for AI Agents - Nobody Knows its Your Bot on the Internet |
Jeff Lombardo & Ram Ramani |
||
Safeguarding Enterprise Online Credentials Post Authentication Using Modern Technologies |
An Ho & Shane Weeden |
||
From Obsolescence to Transformation: The Untold Story of an IAM Program's Evolution |
Maryeme Boussouis |
||
How to REALLY Eliminate Phishing Attacks by Passkeys? |
Tatsuya Karino |
||
Identity is a Team Sport, Setting Up to Win |
Paul Heaney & Oonagh Maclnnes |
||
Pitching Access Control to Business and Product Leaders |
Nikolaus Brauer |
||
The Identity Paradox: Balancing Privacy, Security, and User Experience in a Hyper-Connected World |
Ravi Purohit |
||
"How do I…?" Answering Common Passkey Questions From Relying Party Devs |
Matthew Miller |
||
The Hidden Risks of GraphQL; Handling Complexity in Enterprise Deployments |
Alexandre Babeanu & George Fletcher |
||
The Airline and the Passenger: The Aircraft Turn Around of Digital Identity Part II |
Christopher Blasie |
||
Passkeys and Verifiable Digital Credentials: Friends or Foes? |
Tim Cappalli |
||
Building a Mentorship Program From the Ground Up for Women in Technology |
Alyson Ruff |
||
CIAM to Enable Financial Services: A Research Study of Promises and Challenges |
John Horn |
||
Redefining Workforce Identity Management Using Privacy Impact Considerations |
Subrata Majumder |
||
Great Power, Greater Responsibility: The Fragile Security of Many SCIM APIs |
Denny Zollner & Paul Lanzi |
||
When the Leaver Never Leaves: Closing the Hidden Gap in Employee Off-Boarding |
Amit Zimerman |
||
Revolutionizing Authentication: A Passwordless Journey in Healthcare |
Paul Smith & Joe Neuman |
N/A |
N/A |
How to Find and Educate Your IAM Team |
Heather Flanagan |
||
The Rise of WASM-Embeddable Policy Decision Points: Transforming Enterprise Authorization |
Mike Schwartz & Alex Olivier |
||
Standardization at Work: AuthZEN Interop Readout |
Gerry Gebel & David Brossard |
||
Privacy Enhancing Mobile Credentials |
Sal D'Agostino |
||
Episode IX: The Rise of Continuous Identity |
Sean O'Dell & Andrew Cameron |
N/A |
|
The Future of Identity-Centric Cybersecurity |
Berthold Kerl |
N/A |