Mr. NHIs Top 20 Identity & Access Management (IAM) Evangelists & Voices
Lalit Choda, NHI Mgmt Group
Ten things to understand when using agentic AI applications
Shashwat Sehgal, P0 Security
AI agents are here. Your identity strategy isn’t ready.
Chandra Gnanasambandam, SailPoint
Securing Identity in the Age of AI: A Buyer’s Guide to Teleport
Meina Ghafouri, Teleport
Why Full Non-Human Identity Coverage Requires Connecting to Systems Everyone Else Can’t See
Ido Shlomo, Token Security
Non-Human Identities (NHIs) vs. Machine Identities: Key Differences & Security Best Practices
Beyond Secrets: How Managed Identities Are Transforming Multicloud Security
Mattias Gees, Anna Nabiullina, GitGuardian
Defining Agentic Identity Security Platforms (AISP): Security for the Age of AI Agents
Britive
The Fundamentals of NHI
Kamal Congevaram Muralidharan, Andromeda Security
Mastering Machine Identity Management: The Key to Securing Non-Human Identities (NHIs)
Miryam Brand, Akeyless
Zero Trust 2025: A 30-day identity-first MVP you can launch
Unosecur
Securing Non-Human Identities and Workloads in the Generative-AI Era — TrustFour’s Role
Jim Curtin, TrustFour
Rethinking identity for AI agents and other non-human identities
Non-Human Identity Security in the Age of AI
Dwayne McDaniel, GitGuardian
Rethinking NHI Security Strategies for the Cloud Era
ISO 27001:2022 Requirements Explained for 2025
Jack Pitts, Teleport
Why Anthropic’s new Compliance API is a Game-Changer for Secure Agentic AI Access
Lost ships in the fog: the hidden machine identity problem
Michael Conti, SailPoint
3 use cases for Agentic AI
Sameera Kelkar, Natoma
New AI Security Guide Provides a Maturity Model for Secure Agentic AI Adoption
Christian Simko, Token Security
Achieving Least Privilege: Unused Entitlement Removal
Vincenzo Iozzo, SlashID
Astrix Research Presents: Touchpoints Between AI and Non-Human Identities
Tal Skverer, Astrix Security
Beyond security basics: How traditional best practices have failed machine identity
SailPoint
Challenges and Solutions in Adopting Zero Standing Privileges
Vinaymamidi, Whiteswan Security
Reflections on Identiverse 2025: Identity Is the New Perimeter. So Why Are the Ports Still Wide Open?
Clarity Security
Securing Your LLM Infrastructure: Best Practices for 2025
Scaling Trust: How to Solve NHI Challenges in Modern Infrastructure
Understanding MCP and A2A: Essential Protocols for Secure AI Agent Integration
Nate Yocom, Natoma
Detailed Write-Up of the NHI Workshop at Identiverse
Lalit Choda
Identity Due Diligence: Managing Non-Human Identity Security in M&A
Ofer Sivan, Token Security
Why MFA and SSO Fall Short Without Effective Identity Governance
52 Non-Human Identity Breaches
Forty unlocked doors: Hidden compliance risks in every cloud
AI Agents And Their Intersection with Non-Human Identities
Abdou, NHI Mgmt Group
GDPR Fines Hit EUR 1.2Bn in 2024 – 363 Data Breaches Per Day
The hidden cost of doing nothing about machine identities
Kirby Fitch, SailPoint
The OWASP Non-Human Identity Top 10
Adam Fisher, Oasis Security
Access granted: the future of identity in the cloud
The cloud has a serious and fragile vulnerability: Access Tokens
Robert Levine, TrustFour
Human Identity & NHI Must Be Addressed Together
Karen Crowley, Andromeda
Secrets Management Maturity Model
Thomas Segura, GitGuardian
Securing Your Machine Identities Means Better Secrets Management
Spiffe – Secrets-Free Machine Identity Framework
A Quick Take on OWASP API Security Top 10
Robert Birdsong, Corsha
Understanding Non-Human Identity Management
Suresh Sathyamurthy, Akeyless
Cloud API Keys For Sale
Addressing and Mitigating Third Party Security Risks
Itzik Alvas. Entro Security
How AI Agents Are Creating a New Class of Identity Risk
Apurva Davé, Aembit
The Holy Grail of Non-Human Identities – Databases
Non-Human Identity or Machine Identity?
Building a cybersecurity incident response plan, step by step
Adam Cheriki. Entro Security
Exploring SPIFFE / SPIRE
GitHub Access Control Management Best Practices
Harnessing AI in Access Management and Identity Security
Secrets Encryption on AWS with Kubernetes and Terraform
Navigating PCI DSS 4.0 – The Challenge of Non-Human Identities
Will Easton, SlashID
A Day in the Life of a Developer
Aembit
Snowflake Data Breach – NHI IAM, Zero Trust and MFA for Machines
Kevin Thomas, Corsha
Secure Enterprise AI with Unified Secrets & Non-Human Identity Management
Risks of Non-Human Identity Misconfiguration and Poor Management
Itzik Alvas, Entro Security
An Intro to X.509 certificates, TLS and mTLS
Hunter Metcalfe, Corsha
The 1st Non-Human Identity Security Conference
Streamlining Identity Governance Reporting: The 3 Key Features for Compliance Audits
Identity Governance Challenges in Complex Active Directory Environments
Govern the Mix: Static and Federated Non-Human Identities
Marta Dern, Oasis Security
Challenges of Rotating Non-Human Identities
#1 Authority in NHI Research and Advisory, empowering organizations to tackle the critical risks posed by Non-Human Identities (NHIs).
Get in Touch
Join our Newsletter
Quick Links
Legal & Policies
©2025 NHIMG. All right reserved.