BEGIN:VCALENDAR
VERSION:2.0
X-WR-CALNAME:BrightTALK Event
PRODID:-//BrightTALK//NONSGML BrightTALK Event Calendar//EN
CALSCALE:GREGORIAN
METHOD:REQUEST
BEGIN:VEVENT
UID:https://www.brighttalk.com/webcast/9923/666500
DTSTAMP:20260507T133129Z
ORGANIZER:MAILTO:noreply@brighttalk.com
LOCATION:BrightTALK
URL:https://www.brighttalk.com/webcast/9923/666500?utm_campaign=commun
 ication_reminder_24hr_registrants&utm_medium=calendar&utm_source=brigh
 ttalk-transact
DTSTART:20260520T100000Z
DTEND:20260520T110000Z
SUMMARY:Live webcast: The Next Identity Frontier: Navigating from Huma
 n Users to Agentic AI
DESCRIPTION:Click here to attend: https://www.brighttalk.com/webcast/9
 923/666500?utm_campaign=communication_reminder_24hr_registrants&utm_me
 dium=calendar&utm_source=brighttalk-transact\n\nPresenter: Candice Sam
 ons - Product Marketing Manager - EMEA, Okta\n\nEnterprise technology 
 is undergoing a seismic shift. The move to the cloud was just the begi
 nning; leaders are now facing the explosion of autonomous tools and ag
 entic AI. As this digital complexity grows, so does a critical securit
 y gap. Recent industry analysis reveals a staggering 1,140% surge in a
 ccess requests, pushing traditional, manual governance models to the b
 reaking point.\n\nThis session unpacks the challenges and strategic de
 cisions that security leaders must confront. We will explore recent in
 dustry data to address a critical question: Is your organisation's ide
 ntity strategy prepared for the operational realities of AI at scale? 
 We will examine the core principles of NIST’s identity maturity and di
 scuss the trade-offs involved in evolving from a fragmented security p
 osture to a more cohesive approach, enabling the agility required to a
 dapt as new technologies emerge.\n\nJoin Candice Samons, Product Marke
 ting Manager - EMEA, Okta as she explores:\n\n- The widening phishing 
 gap: Examining why identity-based threats are outpacing the adoption o
 f phishing-resistant authentication by a factor of six, and discussing
  the strategic imperatives for closing this gap.\n- Governance beyond 
 the breaking point: Analyzing the limitations of manual certification 
 in the face of machine-scale access requests and exploring the shift t
 oward policy-driven governance.\n- The AI & identity symbiosis: Debati
 ng the proposition that "AI readiness is identity readiness." We will 
 explore how an organisation's approach to non-human identity managemen
 t can either accelerate or inhibit the secure, scaled deployment of AI
 .\n- Conceptualising non-human identities: Delving into the critical q
 uestions leaders must ask: Where are our non-human agents? What can th
 ey connect to? And what actions can they perform?
SEQUENCE:1779183983
END:VEVENT
END:VCALENDAR
