AI agents are here. Your identity strategy isn’t ready.
Chandra Gnanasambandam, SailPoint
Govern the Mix: Static and Federated Non-Human Identities
Marta Dern, Oasis Security
Securing Identity in the Age of AI: A Buyer’s Guide to Teleport
Meina Ghafouri, Teleport
Why Full Non-Human Identity Coverage Requires Connecting to Systems Everyone Else Can’t See
Ido Shlomo, Token Security
Non-Human Identities (NHIs) vs. Machine Identities: Key Differences & Security Best Practices
Shashwat Sehgal, P0 Security
Beyond Secrets: How Managed Identities Are Transforming Multicloud Security
Mattias Gees, Anna Nabiullina, GitGuardian
Defining Agentic Identity Security Platforms (AISP): Security for the Age of AI Agents
Britive
The Fundamentals of NHI
Kamal Congevaram Muralidharan, Andromeda Security
Mastering Machine Identity Management: The Key to Securing Non-Human Identities (NHIs)
Miryam Brand, Akeyless
Zero Trust 2025: A 30-day identity-first MVP you can launch
Unosecur
Securing Non-Human Identities and Workloads in the Generative-AI Era — TrustFour’s Role
Jim Curtin, TrustFour
Rethinking identity for AI agents and other non-human identities
Non-Human Identity Security in the Age of AI
Dwayne McDaniel, GitGuardian
Rethinking NHI Security Strategies for the Cloud Era
ISO 27001:2022 Requirements Explained for 2025
Jack Pitts, Teleport
Why Anthropic’s new Compliance API is a Game-Changer for Secure Agentic AI Access
Lost ships in the fog: the hidden machine identity problem
Michael Conti, SailPoint
3 use cases for Agentic AI
Sameera Kelkar, Natoma
New AI Security Guide Provides a Maturity Model for Secure Agentic AI Adoption
Christian Simko, Token Security
Achieving Least Privilege: Unused Entitlement Removal
Vincenzo Iozzo, SlashID
Astrix Research Presents: Touchpoints Between AI and Non-Human Identities
Tal Skverer, Astrix Security
Beyond security basics: How traditional best practices have failed machine identity
SailPoint
Challenges and Solutions in Adopting Zero Standing Privileges
Vinaymamidi, Whiteswan Security
Reflections on Identiverse 2025: Identity Is the New Perimeter. So Why Are the Ports Still Wide Open?
Clarity Security
Securing Your LLM Infrastructure: Best Practices for 2025
Scaling Trust: How to Solve NHI Challenges in Modern Infrastructure
Understanding MCP and A2A: Essential Protocols for Secure AI Agent Integration
Nate Yocom, Natoma
Detailed Write-Up of the NHI Workshop at Identiverse
Lalit Choda
Identity Due Diligence: Managing Non-Human Identity Security in M&A
Ofer Sivan, Token Security
Why MFA and SSO Fall Short Without Effective Identity Governance
52 Non-Human Identity Breaches
Lalit Choda, NHI Mgmt Group
Forty unlocked doors: Hidden compliance risks in every cloud
AI Agents And Their Intersection with Non-Human Identities
Abdou, NHI Mgmt Group
GDPR Fines Hit EUR 1.2Bn in 2024 – 363 Data Breaches Per Day
The hidden cost of doing nothing about machine identities
Kirby Fitch, SailPoint
The OWASP Non-Human Identity Top 10
Adam Fisher, Oasis Security
Access granted: the future of identity in the cloud
The cloud has a serious and fragile vulnerability: Access Tokens
Robert Levine, TrustFour
Human Identity & NHI Must Be Addressed Together
Karen Crowley, Andromeda
Secrets Management Maturity Model
Thomas Segura, GitGuardian
Securing Your Machine Identities Means Better Secrets Management
Spiffe – Secrets-Free Machine Identity Framework
A Quick Take on OWASP API Security Top 10
Robert Birdsong, Corsha
Understanding Non-Human Identity Management
Suresh Sathyamurthy, Akeyless
Cloud API Keys For Sale
Addressing and Mitigating Third Party Security Risks
Itzik Alvas. Entro Security
How AI Agents Are Creating a New Class of Identity Risk
Apurva Davé, Aembit
The Holy Grail of Non-Human Identities – Databases
Non-Human Identity or Machine Identity?
Building a cybersecurity incident response plan, step by step
Adam Cheriki. Entro Security
Exploring SPIFFE / SPIRE
GitHub Access Control Management Best Practices
Harnessing AI in Access Management and Identity Security
Secrets Encryption on AWS with Kubernetes and Terraform
Navigating PCI DSS 4.0 – The Challenge of Non-Human Identities
Will Easton, SlashID
A Day in the Life of a Developer
Aembit
Snowflake Data Breach – NHI IAM, Zero Trust and MFA for Machines
Kevin Thomas, Corsha
Secure Enterprise AI with Unified Secrets & Non-Human Identity Management
Risks of Non-Human Identity Misconfiguration and Poor Management
Itzik Alvas, Entro Security
An Intro to X.509 certificates, TLS and mTLS
Hunter Metcalfe, Corsha
The 1st Non-Human Identity Security Conference
Streamlining Identity Governance Reporting: The 3 Key Features for Compliance Audits
Identity Governance Challenges in Complex Active Directory Environments
Challenges of Rotating Non-Human Identities
#1 Authority in NHI Research and Advisory, empowering organizations to tackle the critical risks posed by Non-Human Identities (NHIs).
Get in Touch
Join our Newsletter
Quick Links
Legal & Policies
©2025 NHIMG. All right reserved.