2025 Identiverse Downloads
Below you'll find the keynote and session recordings, along with presentation files for the sessions we’re permitted to share.
Session Title |
Speaker(s) |
Recording Link |
Presentation Link |
---|---|---|---|
Navigating Identiverse: A Newcomer's Guide |
Heather Flanagan & Allan Foster |
||
Introduction to Identity |
Lance Peterman & Espen Bago |
||
Transforming Retail and Hospitality Cloud with IAM: Enhancing Security, Operational Efficiency, and Customer Experience |
Jackie Deloplaine, Manish Gupta & Emily Williams |
||
Interoperability Profiling for Secure Identity in the Enterprise (IPSIE) Panel Discussion |
Jen Schreiber, Aaron Parecki, Atul Tulshibagwale & Dean H. Saxe |
||
AuthZEN: The "OpenID Connect" for Authorization |
Omri Gazitt, David Brossard & Gerry Gebel |
||
Fundamentals of Passkeys (part i & part ii) |
Megan Shamas, Nick Steele & Paul Heim |
||
Standards, Integrity, and Transparency: The Catalysts for Innovation and Market Advantage |
Kay Chopard, Carol Buttle, Andrew Johnson & Sal D'Agostino |
||
Building a Digital Commons for Identity |
Elizabeth Garber |
||
The TaSManian Devil of Cybersecurity: How the Threat and Safeguard Matrix Can Save Your Business |
Ross Young |
||
Introduction to Privacy |
Zack Martin, Heidi Wachs & Michael Borgia |
N/A |
|
Crawl, Walk, Run: Achieving Identity Security in Cloud-First Environments |
Art Poghosyan, Chetan Jha, Sriram Santhanam & Jami Watson |
||
Ain’t No Party Like a Relying Party: Verifiable Digital Credential Edition |
Ryan Galluzzo, George Fletcher, Stefan Schubert & Ben Flatgard |
||
The OpenID Foundation Board’s Quick Take on the Landscape |
Nancy Cam-Winget, Nat Sakimura, Gail Hodges & Dima Postnikov |
||
Hidden Dangers in Azure: Over-Privileged Roles and API Vulnerabilities |
Ariel Simon |
||
Playing Chess with Fraudsters |
Gary Gwin & Dhruv Patel |
N/A |
N/A |
A Practical Guide to Modernizing Authorization: Flexibility, Performance, Security |
|||
Welcome to Identiverse! |
Andi Hindle |
N/A |
|
Trust in the Age of Autonomous Identity |
Michael Coates |
N/A |
|
Speed of Trust |
Andre Durand |
N/A |
|
Practical Identity |
David Tyburski |
N/A |
If you can no longer attend Identiverse 2025, please review Identiverse’s cancellation policy below and provide written notice to Identiverse’s Customer Service team at customerservice@identiverse.com. Only cancellations in writing will be accepted.
- Substitute another individual from your organization at any time at no charge.
- Cancellations received before March 22, 2025 will be entitled to a 100% refund, less an administrative fee of $295.
- Cancellations received between March 22 - April 25, 2025 will be refunded 50% of the amount paid.
- No refund will be given for cancellations received after April 25, 2025.
- Registrations are non-transferable to other CyberRisk Alliance events.
- Cancellations or refunds will not be permitted for the purpose of applying an alternative or promotional discount code.
Cancellation policies are subject to change without notice.
(Last Updated: May 2024)
The Government rate is only available to active employees at Government agencies. Identiverse reserves the right to adjust the registration fee for any non-active employees of Government agencies to the General Registration type.
The Non-Profit Rate is available to employees of registered non-profits, government agencies, and educational institutions, subject to verification (e.g., a valid work email or proof of status). Passes are limited, non-transferable, and offered at a discounted rate. Consultants, contractors, and for-profit entities do not qualify. Registrations that do not meet eligibility may be adjusted to standard pricing.
Discount codes must be applied before payment is completed. They cannot be used after registration confirmation. Please ensure that you have entered your code correctly and applied it at this stage of the registration process.
Discount codes are subject to verification to ensure their applicability.
Session Title |
Speaker(s) |
Recording Link |
Presentation Link |
---|---|---|---|
Cisco Presents: How Identity Resilience Will Improve Your Worst Day on The Job |
Matt Caulfield |
||
Authenticating the Future: AI's Role in Identity's Next Chapter |
Diana Kelley |
||
5 Lessons From 15 Years of Defending Microsoft Identity |
Alex Weinert |
||
Death & The Digital Estate: One Year Later |
Mike Kiser, Dean H. Saxe, Elizabeth Wharton & George Fletcher |
||
Optimize Your Passkey Implementation with New UX Guidelines |
Megan Shamas, Mitchell Galavan & James Hwang |
||
Thales Masterclass: B2B-IAM Smackdown: Defending the Future of Partner Identity |
Jeff Margolies, Sridhar Muppidi, Jim McDonald, Marco Venuti & Mark Wilson |
||
Innovation Workshop: Overcoming Obstacles to Empower Innovators to Advance Identity and Security |
Tina Srivastava, Lance Peterman, Nishant Kaushik & Alex Weinert |
||
Delighting the Business with Identity: The Power of Listening |
Alyson Ruff |
||
Ping Identity Masterclass: The Rebirth of IAM: Embracing Decentralization and Verified Trust |
Justin Chin & Charles Andrus |
N/A |
N/A |
SailPoint Masterclass: Unlocking Identity Security Efficiency |
Deepesh Kumar |
||
TechDemocracy Masterclass: Successful Mergers & Acquisitions - Navigating Identity-Related Use Cases While Preserving Business Continuity |
Todd Rossin & Karim Syed |
||
Digital Identity Proofing: Maximizing Rewards, Mitigating Risks |
Andi Hindle, Sabrina Guenther Frigo, Heidi Wachs & Darcie Winkler |
||
The Recovery Session |
Rob Brown, Bertrand Carlier, Ove Morten Stalheim, Justin Song & Dean H. Saxe |
||
The Next Step in Zero Trust Architecture, Zero Trust Applications |
Nat Bongiovanni |
||
Liminal Presents: Identity Verification & CIAM: Collision or Convergence? |
David Mahdi, Filip Verley & Miguel Navarro |
||
IDMWORKS Masterclass: How to Eliminate Access Sprawl and Empower Least Privilege Access |
Bill Willis |
||
Ping Identity Masterclass: Wrangling Compliance on the AI Frontier |
Diana Jouard |
||
Frontegg Masterclass: AI in CIAM: Breaking Barriers for Non-Tech Teams |
Roy Daniel |
||
CyberSolve Masterclass: What If Your Identity Had a Credit Score? Building the Future of Risk-Aware IAM |
Mak Tomar & Mohit Vaish |
||
Passkeys and Multi-Factor Authentication: When is Enough, Enough? |
Christiaan Brand |
||
Advancing Digital Identity Governance – Without Government |
Jeremy Grant |
||
Moving the MFA Needle: Real-Life Lessons from AWS's Cloud-Scale Campaign |
Arynn Crow |
||
Open Banking - Best Current Practice - Opinionated Reference Architecture |
Dima Postnikov |
||
Cisco Presents: Achieve the Impossible: End-to-End Phishing Resistance That’s Actually Deployable |
Karianne Butler & Ted Kietzman |
||
Ping Identity Presents: Seamless Travel: How Advanced Authentication Transforms the Airline Experience |
Jay Hefferman & Vishnu Mandala |
||
Radiant Logic Presents: Identity Security Posture Management (ISPM) in the Modern Enterprise |
Miguel Furtado |
||
Data Provenance: The Keystone of Trust in the Age of AI Deep Fakes |
Dan Kaufman, Tina Srivastava & Jack Poller |
||
Authentication, Reloaded: The Browser’s Role in Identity |
Heather Flanagan |
||
Can Verifiable Credentials Be Used to Improve the Citizen Experience? |
David Chan & Kartheek Solipuram |
||
Passkeys and Verifiable Credentials: Friends or Enemies? Choosing the Right Tool for Your Identity Challenge |
Mark Perry & Richard Mallam |
||
Passkeys and IC Chip-based Identity Proofing for Protecting Customers |
Koichi Moriyama |
||
Google Presents: Zero Trust Networking with Managed Workload Identities |
Uttam Ramesh |
||
SailPoint Presents: Your Business Partners Are Not Your Employees—So Why Manage Them Like They Are? |
Phil Nero & Jeff Bounds |
||
Thales Presents: The Quantum Shift: Phishing-Resistant and Quantum-Safe Authentication |
Robert Burns |
||
IDMWORKS Presents: Modernizing Identity Verification: Going Beyond Legacy Practices to Combat Fraud, Theft, and Account Takeover |
Matt Connors |
||
Preparing for a Post-Quantum World – Identity in the Crosshairs |
Andrew Regenscheid |
||
Unlocking the Future: The Harmonious Integration of Identity Wallets and Passkeys |
Christine Owen & Teresa Wu |
||
Where’s Waldo: Spotting Credential Stuffing in a Sea of Logins |
Josh Pierce |
||
Dynamic Employee Lifecycle for Modern Enterprises |
Elisa Abedarpo |
||
A Practitioners Guide to Managing Non-Human Identity Risks |
Lalit Choda |
||
TechDemocracy Presents: Winning at IAM! A Dynamic Process to Ensure Success for Your Workforce IAM (WF-IAM) and Customer IAM (CIAM) Planning, Implementation and Operations |
Todd Rossin |
||
Frontegg Presents: Conversation with a CISO/ Founder: How to Integrate Identity in a Successful SaaS Company |
Sagi Rodin & Guy Flechter |
||
CyberSolve Presents: Stories from the Trenches: How GSK Globally Moved From On-Prem SSO to the Cloud |
Brian Lewis, Eugert Jani & Ankush Kapoor |
||
Federated Forgery: Golden SAML and Beyond |
Alex Weinert |
||
Winning the War on Phishing |
Derek Hanson |
||
Through the Digital Credentials Rabbit Hole: Navigating Uses, Standards, and Interoperability |
Libby Brown |
||
Trust...But Verify: Enhancing Verification Processes to Build Trust and Reduce Fraud |
Tim Roufa |
||
Identity: The Superhero No One Invited to the Boardroom (But Still Saves the Day) |
David Lee |
||
Ping Identity Presents: Scaling Identity in Hospitality: Marriott International’s CIAM Journey |
Josh Knight |
N/A |
N/A |
Thales Presents: AI In The Shadow: Identity Verification in the age of Deepfakes - Understanding and Preventing Presentation & Injection Attacks |
Haider Iqbal |
||
Google Presents: Securing the Digital Frontier: Google's Approach to Modern Authentication |
Ievgeniia Zhovtobriukh |
||
Well That's Not How That's Supposed to Work… What Are Your Vulnerabilities Telling You About Your Business Processes? |
Tia Louden & Lea Snyder |
||
Why I Bought an EV, and Why You Should Use a Passkey |
Shane Weeden |
||
The Anatomy of an Open Banking Implementation |
Paul Heaney & Patrick Keenan |
||
Be Our Guest - Building a Great Experience for Anonymous Visitors |
Rob Otto |
||
When Are You Done? It is Time to Retire Identity as a 'mere' Project |
Lance Peterman |
N/A |
|
SailPoint Presents: AI-powered Identity Security: Practical Application to Solve Identity Specific Problems |
Devan D'Silva & Steve Toole |
N/A |
|
TechDemocracy Presents: Identity Security Architecture for Epic |
Viresh Garg |
||
CyberSolve Presents: The Identity Budget Squeeze: Doing More with Less |
Mohit Vaish & Chris Lugo |
N/A |
|
Best Practices in Protecting PII and PCI Data for 500M+ Customers: Building Secure Digital Identity Frameworks |
Abuarshad Saifudeen |
||
Ensuring Continuity: Mercari's Approach to Account Recovery amid Passkey Deployment |
Danny August Ramaputra |
||
IAM from Mars. IAM Doing it Wrong? |
Shannon Roddy |
||
Framework for Evaluating Equivalence in Authentication Journeys |
George Fletcher |
||
Some Assembly Required: Instruction Manual for Building a Workforce Identity Data Platform |
Sean O'Dell |
||
Microsoft Presents: The Future of Identity Must Include Network Access |
Nitika Gupta |
||
IDMWORKS Presents: The $700M Problem in US Health Care: Nurse Onboarding |
Matt Connors |
||
Frontegg Presents: Authentication and Identity in the Agentic Era |
Sagi Rodin |
Session Title |
Speaker(s) |
Recording Link |
Presentation Link |
---|---|---|---|
From Abraham to Zooko (With a Nod to Ian Along the Way) |
John Kemp |
||
When Your Digital Footprint Enables a Physical Threats |
Donald Burgess |
||
wwWallet an Identity Wallet Project for Europe and Beyond |
Derek Hanson |
||
Tech Debt Holding You Back? 5 Strategies to Escape the Crush |
Paul Lanzi |
||
The Identity Management Program - What's Easy, What's Hard and How to Succeed |
Mark Cox |
N/A |
N/A |
Why Your IAM Project is Failing |
Jason Oeltjen |
||
Inside an Enterprise-Wide IAM Transformation: Lessons in Orchestration, Visibility, and Scale |
Nick Rowe & Brian Dickerson |
||
Identity Management for AI Agents - Nobody Knows its Your Bot on the Internet |
Jeff Lombardo & Ram Ramani |
||
Safeguarding Enterprise Online Credentials Post Authentication Using Modern Technologies |
An Ho & Shane Weeden |
||
From Obsolescence to Transformation: The Untold Story of an IAM Program's Evolution |
Maryeme Boussouis |
||
How to REALLY Eliminate Phishing Attacks by Passkeys? |
Tatsuya Karino |
||
Identity is a Team Sport, Setting Up to Win |
Paul Heaney & Oonagh Maclnnes |
||
Pitching Access Control to Business and Product Leaders |
Nikolaus Brauer |
||
The Identity Paradox: Balancing Privacy, Security, and User Experience in a Hyper-Connected World |
Ravi Purohit |
||
"How do I…?" Answering Common Passkey Questions From Relying Party Devs |
Matthew Miller |
||
The Hidden Risks of GraphQL; Handling Complexity in Enterprise Deployments |
Alexandre Babeanu & George Fletcher |
||
The Airline and the Passenger: The Aircraft Turn Around of Digital Identity Part II |
Christopher Blasie |
||
Passkeys and Verifiable Digital Credentials: Friends or Foes? |
Tim Cappalli |
||
Building a Mentorship Program From the Ground Up for Women in Technology |
Alyson Ruff |
||
CIAM to Enable Financial Services: A Research Study of Promises and Challenges |
John Horn |
||
Redefining Workforce Identity Management Using Privacy Impact Considerations |
Subrata Majumder |
||
Great Power, Greater Responsibility: The Fragile Security of Many SCIM APIs |
Denny Zollner & Paul Lanzi |
||
When the Leaver Never Leaves: Closing the Hidden Gap in Employee Off-Boarding |
Amit Zimerman |
||
Revolutionizing Authentication: A Passwordless Journey in Healthcare |
Paul Smith & Joe Neuman |
N/A |
N/A |
How to Find and Educate Your IAM Team |
Heather Flanagan |
||
The Rise of WASM-Embeddable Policy Decision Points: Transforming Enterprise Authorization |
Mike Schwartz & Alex Olivier |
||
Standardization at Work: AuthZEN Interop Readout |
Gerry Gebel & David Brossard |
||
Privacy Enhancing Mobile Credentials |
Sal D'Agostino |
||
Episode IX: The Rise of Continuous Identity |
Sean O'Dell & Andrew Cameron |
N/A |
|
The Future of Identity-Centric Cybersecurity |
Berthold Kerl |
N/A |