The 1st

Non-human Identity Security Conference

SEP 18, 2024 | WATCH ON-DEMAND

Watch real case studies, live attack demos and more from non-human identity security pioneers and experts.

Brought to you by

SSH Key
RPA Account
Webhook
API key
SSH Key
RPA Account
Webhook
API key
SSH Key
RPA Account
Webhook
API key
SSH Key
RPA Account
Webhook
API key
Service Account
Secret
OAuth Apps
IAM Role
Service Account
Secret
OAuth Apps
IAM Role
Service Account
Secret
OAuth Apps
IAM Role
Service Account
Secret
OAuth Apps
IAM Role

Watch the sessions on-demand

SESSION 1

The State of NHI Security: Data-Driven Insights

Gain insights from CSA’s groundbreaking survey on non-human identities, with insights from 800 security professionals and 2M monitored NHIs. Discover the top security challenges, from permission management to automation needs, and learn why NHIs require distinct, proactive strategies to reduce risk. Learn about the trends shaping future investments in NHI security.

Join us to learn from NHI security experts and researchers on how to tackle these security challenges.

RELATED ASSETS

State of NHI Security Report

Download the CSA report for full insights from 800+ security professionals.

Workshop: NHI Attack Paths

Watch the on-demand workshop to learn firsthand how hackers use NHIs.

SESSION 2

How Attackers Exploit Non-Human Identities

Watch a live demo of how attackers exploit non-human identities from entry to data exfiltration. Francis Odom and Michael Silva reveal tactics attackers use to pivot across environments, infiltrate systems, and leverage machine identities for supply chain attacks, and share best practices to avoid such exploits. 

RELATED ASSETS

Not Just Code Vulnerabilities

The risks of the proliferation of NHIs in cloud engineering environments.

Anatomy of Supply Chain Attacks

How these attacks work, and why attackers love using NHIs to perform them.

SESSION 3

Case Study (Part 1): How We Implemented NHI Security in Our Enterprise

In a candid case study, CISOs Gary Owen and Carl Siva outline their experiences launching an NHI security program. Through strategic risk management and automation, they share valuable insights into building a scalable, inventory-based NHI security approach while navigating challenges unique to modern cloud and SaaS environments.

RELATED ASSETS

4 NHI Use Cases

Learn from security experts about the top NHI use cases you should look into.

Employee Offboarding & NHIs

How to build processes to ensure you control your ex-employee NHIs.

SESSION 4

Case Study (Part 2): How We Implemented NHI Security in Our Enterprise

Albert Attias (Workday) and Vinay Patel (Zendesk) discuss their approaches to implementing NHI security. Through effective policies, real-time visibility, and clear ownership, they share how robust NHI management helps prevent orphaned identities and enables proactive risk management across diverse environments.

RELATED ASSETS

Insights Into NHI Incidents

Get the inside scoop on some of the latest incidents abusing NHIs.

Detect & Rotate Exposed Secrets

Exposed secrets pose a huge vulnerability. Learn how to automate scanning & rotation.

SESSION 5

Panel – Making the Business Case for an NHI Security Program

Five CISOs reveal why non-human identity security is critical now, discussing its risks, regulatory gaps, and real-world challenges. Gain actionable insights on securing machine identities and learn strategies for building a business case that aligns with risk management, compliance, and organizational goals.

RELATED ASSETS

SOX Compliance & NHIs

Learn how to achieve SOX compliance in NetSuite and Salesforce environments.

The Service Accounts Guide

The technical service accounts guide of origins, types, pitfalls and fixes .

Human Speakers

Covering non-human identity threats and security best practices

Dr. Chase Cunningham
DrZeroTrust, Former Analyst at Forrester
Gary Owen
CISO & Chief Risk Officer
John Yeoh
Global Vice President of Research
Timothy Youngblood
4x Fortune 500 CSO/CISO
Coleen Coolidge
Former CISO
Vinay Patel
SVP, Chief Trust & Security Officer
Moriah Hara
Head of Cyber Risk at Altice USA, 3x Fortune 500 CISO
Carl Siva
CISO, VP Infrastructure
Albert Attias
Senior Director, Enterprise Identity
Cory Scott
Former CISO & Head of Security
Emilio Escobar
CISO
Francis Odum
Cybersecurity Researcher, Independent Analyst
Heather Hinton
Cybersecurity Advisor & Former CISO
Dimitriy Sokolovskiy
Senior VP of Information Security
Gerhard Eschelbeck
Former CISO

Be the first to hear about our events

Sign up to get event updates and secure your spot before everyone else.