Search
X
  • Categories

  • Tags

  • Reset filters

Ready to start your IAM project?

Our experts look forward to talking with you.

Results: 189

Webinar Recording

Zero Trust and Identity Resilience: Why IAM Without ISPM

Experts from Saviynt and iC Consult explore the critical connection between Zero Trust and Identity Resilience, and how Identity Security Posture Management (ISPM) plays a vital role in bridging that gap.

Blog

Move to Least Privilege through a Deeper Integration between EMP and IGA Solutions

Enhance healthcare security by closing the integration gap between EMP and IGA systems, enforcing Least Privilege to reduce risks, ensure compliance, and improve operational efficiency.

Blog

Our Foundation for Successful IAM Projects: iC Consult Centers of Excellence (CoEs)

Discover how iC Consult’s structured knowledge sharing and expert communities ensure high quality and deep expertise in identity projects.

Blog

Securing the Unseen: Managing Healthcare IoT Devices as Identities

Protect connected medical devices in healthcare with IAM strategies for IoT security, compliance, and patient safety.

White Paper

The 100-Day Identity Security Plan

Discover KuppingerCole’s 100-Day Identity Security Plan to build resilience, stop identity-based attacks, and accelerate Zero Trust adoption.

Podcast

Challenging AI Threats and Strengthening Human Vigilance with Steve Cobb of SecurityScorecard

On this episode, Steve Cobb, CISO of SecurityScorecard and a founding member of the CarolinaCISO shares how today’s threat actors are targeting human behavior more than systems, and why cultural change and technical guardrails are both essential.

Spotify
Apple Podcasts
Youtube
Webinar Recording

Passkeys in a Zero Trust World – Blessing or Curse?

Join us and KuppingerCole as we explore the different types of passkeys, their benefits, and the trade-offs between security and usability in achieving passwordless authentication.

Podcast

Creating Psychological Safety in Security Teams with Susanne Senoff of PROS

On this episode of Authenticate This!, Susanne Senoff, CISO of PROS, talks about making security human, building trust through connection and leading with authenticity.

Spotify
Apple Podcasts
Youtube
Webinar Recording

Why MFA and IGA Are Not Enough in 2025: A 100-Day Plan for Identity Security

Explore why attackers are shifting focus to the identity layer and how organizations can respond. Experts from KuppingerCole and iC Consult share key strategies, including PAM, ITDR, and a 100-day plan to strengthen identity resilience and defend against modern threats.

Webinar Recording

Understanding Microsoft Verified ID: Key Concepts and Opportunities

Discover how Microsoft Verified ID is redefining digital identity management, and explore key features, benefits, and integration best practices.

Podcast

The Culture Factor in Cybersecurity Leadership with Scott Ostrander of SPS Commerce

On this episode of Authenticate This!, Scott Ostrander shares how he builds trust, manages risk and leads with empathy in fast-paced environments.

Spotify
Apple Podcasts
Youtube
Webinar Recording

Identity Protection and ITDR: Security Beyond IAM and EDR

Learn how to strengthen your defenses against identity-based threats with Identity Threat Detection and Response (ITDR) and Identity Protection.

Stay Ahead with IAM Insights

Keep yourself informed on the latest IAM trends and upcoming Identity & Access Management events. Subscribe now!