Watch the sessions on-demand
SESSION 1
The State of NHI Security: Data-Driven Insights
Gain insights from CSA’s groundbreaking survey on non-human identities, with insights from 800 security professionals and 2M monitored NHIs. Discover the top security challenges, from permission management to automation needs, and learn why NHIs require distinct, proactive strategies to reduce risk. Learn about the trends shaping future investments in NHI security.
Join us to learn from NHI security experts and researchers on how to tackle these security challenges.
RELATED ASSETS
State of NHI Security Report
Download the CSA report for full insights from 800+ security professionals.
Workshop: NHI Attack Paths
Watch the on-demand workshop to learn firsthand how hackers use NHIs.
SESSION 2
How Attackers Exploit Non-Human Identities
Watch a live demo of how attackers exploit non-human identities from entry to data exfiltration. Francis Odom and Michael Silva reveal tactics attackers use to pivot across environments, infiltrate systems, and leverage machine identities for supply chain attacks, and share best practices to avoid such exploits.Â
RELATED ASSETS
Not Just Code Vulnerabilities
The risks of the proliferation of NHIs in cloud engineering environments.
Anatomy of Supply Chain Attacks
How these attacks work, and why attackers love using NHIs to perform them.
SESSION 3
Case Study (Part 1): How We Implemented NHI Security in Our Enterprise
In a candid case study, CISOs Gary Owen and Carl Siva outline their experiences launching an NHI security program. Through strategic risk management and automation, they share valuable insights into building a scalable, inventory-based NHI security approach while navigating challenges unique to modern cloud and SaaS environments.
RELATED ASSETS
4 NHI Use Cases
Learn from security experts about the top NHI use cases you should look into.
Employee Offboarding & NHIs
How to build processes to ensure you control your ex-employee NHIs.
SESSION 4
Case Study (Part 2): How We Implemented NHI Security in Our Enterprise
Albert Attias (Workday) and Vinay Patel (Zendesk) discuss their approaches to implementing NHI security. Through effective policies, real-time visibility, and clear ownership, they share how robust NHI management helps prevent orphaned identities and enables proactive risk management across diverse environments.
RELATED ASSETS
Insights Into NHI Incidents
Get the inside scoop on some of the latest incidents abusing NHIs.
Detect & Rotate Exposed Secrets
Exposed secrets pose a huge vulnerability. Learn how to automate scanning & rotation.
SESSION 5
Panel – Making the Business Case for an NHI Security Program
Five CISOs reveal why non-human identity security is critical now, discussing its risks, regulatory gaps, and real-world challenges. Gain actionable insights on securing machine identities and learn strategies for building a business case that aligns with risk management, compliance, and organizational goals.
RELATED ASSETS
SOX Compliance & NHIs
Learn how to achieve SOX compliance in NetSuite and Salesforce environments.
The Service Accounts Guide
The technical service accounts guide of origins, types, pitfalls and fixes .
Human Speakers
Covering non-human identity threats and security best practices
Be the first to hear about our events
Sign up to get event updates and secure your spot before everyone else.