Featured virtual events
-
Webinar
CISO Identity Fireside: How Genesys, AWS, and Veza Are Reshaping Identity Security
Identity is the New Perimeter — Are You Ready? According to CrowdStrike’s 2025 Threat Report, identity-based attacks have become the #1 breach vector. Tune in for this expert-led session to explore how organizations are rethinking access governance, cloud identity risk, and modern identity security strategies. Join to uncover: SpeakersAug 21 2025, 8:00am PST -
Webinar
Identity is the New Battleground: How to Forge a Path to Identity Security and What Security Leaders Need to Know
Identity represents a massive blind spot for enterprises, quickly becoming the primary attack vector. As highlighted in CrowdStrike’s 2025 Threat Report: “Every breach starts with initial access, and identity-based attacks are among the most effective entry methods.” With complex, hybrid infrastructures and rising threats, it’s time to benchmark your identity security strategy against the standards […]On-demand
Watch on-demand
-
Webinar
Disrupting Security: How HIG Eliminated Blindspots by Securing Identity (and Reducing SharePoint Risk in the Process)
Learn moreOn-demand -
Webinar
Beating the Breach: Effective Identity Security Strategies for Healthcare
Learn moreOn-demand -
Conferences
NHI Summit 2024: The Rise of Non-Human Identities
Learn moreOn-demand -
Webinar
Securing Non-human Identities in the Enterprise with HashiCorp Vault and Veza
Learn moreOn-demand -
Webinar
Veza launches Access AI to Deliver Generative AI-Powered Identity Security
Learn moreOn-demand -
Book Launch
Modernizing Identity with Just In Time Access
Learn moreOn-demand
-
Webinar
Disrupting Security: How HIG Eliminated Blindspots by Securing Identity (and Reducing SharePoint Risk in the Process)
Learn moreOn-demand -
Webinar
Beating the Breach: Effective Identity Security Strategies for Healthcare
Learn moreOn-demand -
Webinar
Securing Non-human Identities in the Enterprise with HashiCorp Vault and Veza
Learn moreOn-demand -
Webinar
Veza launches Access AI to Deliver Generative AI-Powered Identity Security
Learn moreOn-demand -
Webinar
Access Intelligence in Snowflake: who has access to what?
Learn moreOn-demand -
Webinar
State of Access 2024
Learn moreOn-demand
-
Book Launch
Modernizing Identity with Just In Time Access
Learn moreOn-demand -
Webinar
State of Access 2024
Learn moreOn-demand -
Book Launch
Intelligent Access: Strategies for Achieving Least Privilege in the Modern Enterprise
Learn moreOn-demand -
Book Launch
Book Launch: A Practitioner’s Guide to Intelligent Access
Learn moreOn-demand -
Webinar
Next-Gen IGA
Learn moreOn-demand