
Resources
Ready to start your IAM project?
Our experts look forward to talking with you.
Results: 185

Challenging AI Threats and Strengthening Human Vigilance with Steve Cobb of SecurityScorecard
On this episode, Steve Cobb, CISO of SecurityScorecard and a founding member of the CarolinaCISO shares how today’s threat actors are targeting human behavior more than systems, and why cultural change and technical guardrails are both essential.

Passkeys in a Zero Trust World – Blessing or Curse?
Join us and KuppingerCole as we explore the different types of passkeys, their benefits, and the trade-offs between security and usability in achieving passwordless authentication.

Creating Psychological Safety in Security Teams with Susanne Senoff of PROS
On this episode of Authenticate This!, Susanne Senoff, CISO of PROS, talks about making security human, building trust through connection and leading with authenticity.

Why MFA and IGA Are Not Enough in 2025: A 100-Day Plan for Identity Security
Explore why attackers are shifting focus to the identity layer and how organizations can respond. Experts from KuppingerCole and iC Consult share key strategies, including PAM, ITDR, and a 100-day plan to strengthen identity resilience and defend against modern threats.

Understanding Microsoft Verified ID: Key Concepts and Opportunities
Discover how Microsoft Verified ID is redefining digital identity management, and explore key features, benefits, and integration best practices.

The Culture Factor in Cybersecurity Leadership with Scott Ostrander of SPS Commerce
On this episode of Authenticate This!, Scott Ostrander shares how he builds trust, manages risk and leads with empathy in fast-paced environments.

Identity Protection and ITDR: Security Beyond IAM and EDR
Learn how to strengthen your defenses against identity-based threats with Identity Threat Detection and Response (ITDR) and Identity Protection.

Building the Foundation for Zero Trust with Microsoft Entra ID
Explore the powerful capabilities of Microsoft Entra ID, including Conditional Access, Risk-Based Authentication, and Passwordless Multi-Factor Authentication (MFA).

IAM Made Easy – Demystifying the Complexity of Business Roles
Join us and our partner Nexis as we reveal a smarter approach to business role management—built on top of your existing IGA solution for seamless integration and enhanced control.

iC Consult and Omada: Reigniting a Nearly 20-Year Partnership to Power Global Identity Excellence
iC Consult and Omada revitalize their nearly 20-year partnership to power global identity excellence and strengthen their presence across key markets.
Stay Ahead with IAM Insights
Keep yourself informed on the latest IAM trends and upcoming Identity & Access Management events. Subscribe now!