BEGIN:VCALENDAR
VERSION:2.0
X-WR-CALNAME:BrightTALK Event
PRODID:-//BrightTALK//NONSGML BrightTALK Event Calendar//EN
CALSCALE:GREGORIAN
METHOD:REQUEST
BEGIN:VEVENT
UID:https://www.brighttalk.com/webcast/16779/666126
DTSTAMP:20260424T181132Z
ORGANIZER:MAILTO:noreply@brighttalk.com
LOCATION:BrightTALK
URL:https://www.brighttalk.com/webcast/16779/666126?utm_campaign=commu
 nication_reminder_24hr_registrants&utm_medium=calendar&utm_source=brig
 httalk-transact
DTSTART:20260513T150000Z
DTEND:20260513T154217Z
SUMMARY:Live webcast: Closing the third-party identity gap: Practical 
 strategies to reduce risk and strengthen security
DESCRIPTION:Click here to attend: https://www.brighttalk.com/webcast/1
 6779/666126?utm_campaign=communication_reminder_24hr_registrants&utm_m
 edium=calendar&utm_source=brighttalk-transact\n\nPresenter: Preetika S
 rivastava, Senior Manager, KPMG UK   |   Serena Tejani, Partner, KPMG 
 Canada   |   Robert Villegas, Director, KPMG US, Cyber and Tech Risk p
 ractice  |   Jaishree Subramania, Sr. Vice President, Product Marketin
 g\n\nAs organizations expand their digital ecosystems, access is no lo
 nger limited to employees. Partners, contractors, vendors, application
 s, service accounts, APIs, and increasingly AI-driven tools such as ch
 atbots now play a critical role in day-to-day operations. While these 
 identities enable speed and innovation, unmanaged third-party and non-
 human identities have become one of the fastest-growing sources of cyb
 er risk.\n\nJoin leaders from KPMG and SailPoint for a 45-minute moder
 ated discussion focused on the evolving identity risk landscape and wh
 at organizations can do to better govern access across their extended 
 enterprise. \n\nDuring this session, we’ll cover:\n• Why third-party a
 nd non-human identities are now a top risk driver in identity security
 \n• Common gaps in traditional identity security and IGA programs, par
 ticularly around visibility, ownership, and lifecycle management of id
 entities\n• Practical strategies to improve control and oversight usin
 g risk-based prioritization, stronger governance models, and automatio
 n\n\nWhether you’re establishing or maturing your third-party risk and
  identity security program, this webinar will provide practical insigh
 ts to help reduce risk, improve accountability, and strengthen your ov
 erall security posture.
SEQUENCE:1778597953
END:VEVENT
END:VCALENDAR
