Search
X
  • Categories

  • Tags

  • Reset filters

Ready to start your IAM project?

Our experts look forward to talking with you.

Results: 46

One Identity Fabric: The Foundation for Unified Identity Security

Experts from One Identity and iC Consult explore the core concept of the One Identity Fabric: a modular, integrated architecture that brings together all key IAM domains – including IGA, PAM, Access Management, and AD Management.

Zero Trust and Identity Resilience: Why IAM Without ISPM

Experts from Saviynt and iC Consult explore the critical connection between Zero Trust and Identity Resilience, and how Identity Security Posture Management (ISPM) plays a vital role in bridging that gap.

Passkeys in a Zero Trust World – Blessing or Curse?

Join us and KuppingerCole as we explore the different types of passkeys, their benefits, and the trade-offs between security and usability in achieving passwordless authentication.

Why MFA and IGA Are Not Enough in 2025: A 100-Day Plan for Identity Security

Explore why attackers are shifting focus to the identity layer and how organizations can respond. Experts from KuppingerCole and iC Consult share key strategies, including PAM, ITDR, and a 100-day plan to strengthen identity resilience and defend against modern threats.

Understanding Microsoft Verified ID: Key Concepts and Opportunities

Discover how Microsoft Verified ID is redefining digital identity management, and explore key features, benefits, and integration best practices.

Identity Protection and ITDR: Security Beyond IAM and EDR

Learn how to strengthen your defenses against identity-based threats with Identity Threat Detection and Response (ITDR) and Identity Protection.

Building the Foundation for Zero Trust with Microsoft Entra ID

Explore the powerful capabilities of Microsoft Entra ID, including Conditional Access, Risk-Based Authentication, and Passwordless Multi-Factor Authentication (MFA).

IAM Made Easy – Demystifying the Complexity of Business Roles

Join us and our partner Nexis as we reveal a smarter approach to business role management—built on top of your existing IGA solution for seamless integration and enhanced control.

The New Kid on the Block: Entra ID Governance

Explore Entra ID Governance, SAP integration, and best practices in part 2 of our Microsoft webinar series.

Identity Under Attack: How to Build a Resilient Zero Trust Strategy

Explore how identity and network layers must align to strengthen your Zero Trust posture, and more!

Identity Threat Landscape 2025: How Do I Protect My Company Against Deepfake, GenAI and more?

Protect your company from DeepFake, GenAI and modern threats in identity management.

Why Is Your Active Directory an Easy Target for Attackers?

Learn how leading experts tackle fraud attacks with a modern Identity Security approach.

Want to join us live?

Register now for one of our upcoming webinars.

Results: 12

Event

IAM Pit Stop – München

Date
Sep 29, 2025
9:30 - 16:00
Location

Novotel München City Arnulfpark
Arnulfstraße 57
80636 München

Event

IAM Pit Stop – Munich

Date
Sep 29, 2025
9:30 - 16:00
Location

Novotel München City Arnulfpark
Arnulfstraße 57
80636 München

Event

Cyber Crime Forum

Date
Sep 29, 2025
All day
Location

CYBER CRIME FORUM Graz
Steiermarkhof, Graz

View all
upcoming Events
and Webinars

Stay Ahead with IAM Insights

Keep yourself informed on the latest IAM trends and upcoming Identity & Access Management events. Subscribe now!