Foundations of Identity-First Security
As identity becomes the core control plane of modern security architecture, organizations must strengthen the fundamentals that support scalable, resilient identity systems. This track explores the essential building blocks of identity-first security—from authentication and access controls to governance, policy frameworks, and risk management. Sessions will highlight proven strategies, emerging standards, and real-world case studies to help practitioners build strong, adaptable identity infrastructures that align with business priorities while keeping everyone secure.
Thursday, November 20, 2025 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
10:30 AM - 11:00 AM | Session Presented by DigiCert: Security Matchmaker - How PKI-Based Credentials and IAM Can Save the Digital World 10:30 AM - 11:00 AM | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
3:05 PM - 3:35 PM | Session Presented by Yubico: Secure Business Continuity: Modern Cyber Resilience in Action 3:05 PM - 3:35 PM |
Intelligent Identity: AI, Automation, and Analytics
AI, automation, and analytics are transforming how we manage and secure digital identities. This track delves into the cutting edge of identity intelligence—covering topics like behavior-based authentication, risk scoring, identity threat detection, and machine learning–driven governance. Explore how smart technologies are enabling faster decisions, deeper insights, and more adaptive identity strategies across both workforce and customer environments.
Thursday, November 20, 2025 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2:30 PM - 3:00 PM | Session Presented by PO Security: A Six-Phase Roadmap to Governing Privileged Access in the Age of AI 2:30 PM - 3:00 PM |
Public Trust and Digital Identity at Scale
Building secure, privacy-respecting digital identity systems at scale requires more than just technology—it demands trust. This track explores how governments, enterprises, and ecosystem leaders are designing identity frameworks that support interoperability, user control, and public confidence. Topics include decentralized identity, verifiable credentials, cross-border standards, and the policy and governance models driving large-scale adoption across sectors. Learn how trust is earned—and maintained—at the identity infrastructure level.
Thursday, November 20, 2025 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
11:05 AM - 11:35 AM | Session Presented by HYPR: Passkeys + Identity Verification: Build an Authentication Chain of Trust 11:05 AM - 11:35 AM | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
11:40 AM - 12:10 PM | Weaving the Trust Fabric for the Digital Identity Ecosystem 11:40 AM - 12:10 PM | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
3:40 PM - 4:10 PM | Advancing Digital Identity Governance 3:40 PM - 4:10 PM |
Join our mailing list below to receive the latest event news.