The 1st
Non-human Identity Security Conference

SEP 18, 2024 | WATCH ON-DEMAND

Watch real case studies, live attack demos and more from non-human identity security pioneers and experts.

Brought to you by

Image
Image
SSH Key
Image
RPA Account
Image
Webhook
Image
API key
Image
SSH Key
Image
RPA Account
Image
Webhook
Image
API key
Image
SSH Key
Image
RPA Account
Image
Webhook
Image
API key
Image
SSH Key
Image
RPA Account
Image
Webhook
Image
API key
Image
Service Account
Image
Secret
Image
OAuth Apps
Image
IAM Role
Image
Service Account
Image
Secret
Image
OAuth Apps
Image
IAM Role
Image
Service Account
Image
Secret
Image
OAuth Apps
Image
IAM Role
Image
Service Account
Image
Secret
Image
OAuth Apps
Image
IAM Role

Watch the sessions on-demand

SESSION 1

The State of NHI Security: Data-Driven Insights

Gain insights from CSA’s groundbreaking survey on non-human identities, with insights from 800 security professionals and 2M monitored NHIs. Discover the top security challenges, from permission management to automation needs, and learn why NHIs require distinct, proactive strategies to reduce risk. Learn about the trends shaping future investments in NHI security.

Join us to learn from NHI security experts and researchers on how to tackle these security challenges.

RELATED ASSETS

State of NHI Security Report

Download the CSA report for full insights from 800+ security professionals.

Workshop: NHI Attack Paths

Watch the on-demand workshop to learn firsthand how hackers use NHIs.

SESSION 2

How Attackers Exploit Non-Human Identities

Watch a live demo of how attackers exploit non-human identities from entry to data exfiltration. Francis Odom and Michael Silva reveal tactics attackers use to pivot across environments, infiltrate systems, and leverage machine identities for supply chain attacks, and share best practices to avoid such exploits. 

RELATED ASSETS

Not Just Code Vulnerabilities

The risks of the proliferation of NHIs in cloud engineering environments.

Anatomy of Supply Chain Attacks

How these attacks work, and why attackers love using NHIs to perform them.

SESSION 3

Case Study (Part 1): How We Implemented NHI Security in Our Enterprise

In a candid case study, CISOs Gary Owen and Carl Siva outline their experiences launching an NHI security program. Through strategic risk management and automation, they share valuable insights into building a scalable, inventory-based NHI security approach while navigating challenges unique to modern cloud and SaaS environments.

RELATED ASSETS

4 NHI Use Cases

Learn from security experts about the top NHI use cases you should look into.

Employee Offboarding & NHIs

How to build processes to ensure you control your ex-employee NHIs.

SESSION 4

Case Study (Part 2): How We Implemented NHI Security in Our Enterprise

Albert Attias (Workday) and Vinay Patel (Zendesk) discuss their approaches to implementing NHI security. Through effective policies, real-time visibility, and clear ownership, they share how robust NHI management helps prevent orphaned identities and enables proactive risk management across diverse environments.

RELATED ASSETS

Insights Into NHI Incidents

Get the inside scoop on some of the latest incidents abusing NHIs.

Detect & Rotate Exposed Secrets

Exposed secrets pose a huge vulnerability. Learn how to automate scanning & rotation.

SESSION 5

Panel – Making the Business Case for an NHI Security Program

Five CISOs reveal why non-human identity security is critical now, discussing its risks, regulatory gaps, and real-world challenges. Gain actionable insights on securing machine identities and learn strategies for building a business case that aligns with risk management, compliance, and organizational goals.

RELATED ASSETS

SOX Compliance & NHIs

Learn how to achieve SOX compliance in NetSuite and Salesforce environments.

The Service Accounts Guide

The technical service accounts guide of origins, types, pitfalls and fixes .

Human Speakers

Covering non-human identity threats and security best practices

Image
Dr. Chase Cunningham
DrZeroTrust, Former Analyst at Forrester
Image Image
Image
Gary Owen
CISO & Chief Risk Officer
Image
Image
John Yeoh
Global Vice President of Research
Image
Image
Timothy Youngblood
4x Fortune 500 CSO/CISO
Image Image Image
Image
Coleen Coolidge
Former CISO
Image Image
Image
Vinay Patel
SVP, Chief Trust & Security Officer
Image
Moriah Hara
Head of Cyber Risk at Altice USA, 3x Fortune 500 CISO
Image Image
Carl Siva
CISO, VP Infrastructure
Image
Albert Attias
Senior Director, Enterprise Identity
Image
Image
Cory Scott
Former CISO & Head of Security
Image Image Image
Image
Emilio Escobar
CISO
Image
Image
Francis Odum
Cybersecurity Researcher, Independent Analyst
Image
Image
Heather Hinton
Cybersecurity Advisor & Former CISO
Image Image
Image
Dimitriy Sokolovskiy
Senior VP of Information Security
Image
Image
Gerhard Eschelbeck
Former CISO
Image

Be the first to hear about our events

Sign up to get event updates and secure your spot before everyone else.