Identity Virtual Summit

Strengthening Defense Through Modern IAM and Zero Trust

As identity becomes the core of enterprise defense, attackers exploit misconfigurations, overprivileged accounts, and identity sprawl across cloud and on-prem systems. Teams struggle with managing identity risk at scale while ensuring user experience and compliance. This eSummit provides expert-led guidance on modern IAM, zero-trust architectures, and continuous authentication. From identity threat detection and response (ITDR) to least-privilege automation, attendees will learn how to strengthen the human and machine identities that now define organizational boundaries.

Why Attend

Learn from Global Experts: Gain insights from renowned experts on protecting and defending businesses from identity-driven cyber attacks through interactive panels and fast-track discussions.

Evaluate Solutions: Experience demonstrations from cutting-edge cybersecurity solution providers offering identity security protection from latest threats.

Convenient Virtual Format: Access expert content and solution demonstrations without travel commitment while maintaining high-quality learning and networking opportunities.

Executive Networking: Engage with pre-screened cybersecurity professionals, IT leaders, and information security practitioners addressing similar identity security challenges.

Professional Development: Earn Continuing Education Units (CEU) or Continuing Professional Education (CPE) credits through full participation.

Strategic Investment: Protect your organization from identity-driven breaches that could cost millions in losses, stock devaluation, and litigation.

Key Issues Covered

Identity Sprawl and Hidden Privilege: Finding (and Fixing) the Access You Don't Know You Have

In borderless enterprises, identity risk often hides in plain sight: stale accounts, shadow admins, forgotten service principals, and entitlements that quietly expanded through years of exceptions. Sessions tackle the operational reality of identity sprawl across cloud and on-prem environments—how it happens, why it persists, and how attackers exploit it through misconfigurations and privilege chaining. Panelists share practical approaches to discover effective access, reduce privilege safely, and build guardrails preventing re-sprawl without breaking business operations.

ITDR in Practice: Detecting and Responding to Identity-Driven Attacks Faster Than the Adversary

Identity Threat Detection and Response (ITDR) is becoming essential as attackers bypass endpoints and target credentials, tokens, and identity control planes directly. Sessions explore what effective ITDR looks like beyond marketing: the telemetry that matters (authentication, token issuance, directory changes, conditional access, API calls), the detections catching real attacks (impossible travel is not enough), and response motions stopping blast radius quickly. Discussions cover integrating ITDR with SOC operations, incident response, and cloud security teams.

Continuous Authentication Without Continuous Friction: Marrying User Experience, Compliance, and Zero Trust

Zero trust demands continuous verification—but users and business leaders won't tolerate endless prompts and broken workflows. Sessions examine how organizations implement continuous authentication and risk-based access improving both security and usability simultaneously. Topics include phishing-resistant MFA, device and session posture, step-up authentication, adaptive policies, and designing compliance requirements. Panelists share lessons on reducing helpdesk load, improving adoption, and making "secure by default" feel invisible.

What to Expect

This virtual summit delivers comprehensive programming combining identity security expertise, solution demonstrations, and networking opportunities focused specifically on identity as the modern enterprise perimeter. Through expert panels and strategic discussions, participants gain actionable insights for addressing identity sprawl, implementing ITDR, and deploying continuous authentication while building relationships with fellow practitioners defending against identity-driven threats.

Admission to this eSummit is reserved exclusively for active cybersecurity, IT, and information security practitioners tasked with safeguarding their enterprises against cyber threats and managing cybersecurity solutions. All registrations are subject to review. If unable to verify identity with registration information provided, attendance may be cancelled. These qualifications pertain to all attendees, including members of partner organizations.

Event schedule

Wednesday, March 11, 2026, 11:00 am - 4:00 pm EDT