Non-Human Identity: The Risks, The Reality and How to Manage
Three 20 minute sessions designed to help those currently looking for insight and guidance in how to best secure non-human identities, hosted by leading CISOs in the field.
Unlike human accounts, which are more likely to trigger alerts when compromised, non-human accounts often go undetected for extended periods, providing malicious actors with prolonged access to critical systems and data.
While breaches may initially target human accounts, adversaries frequently pivot to exploiting non-human accounts to maintain persistence within compromised networks. Traditional IAM solutions focus primarily on human identities, the evolving threat landscape necessitates a shift towards comprehensive solutions that encompass both human and non-human identities.
This online event is structured into three comprehensive sessions, each designed to equip you with the knowledge and solutions required to ensure your organization is protecting it's non-human identities.
- From PAM to NHI Management. How technology is opening up new challenges to securing machine-to-machine access.
- Best practices to secure NHIs
- Case study - How leading organizations solved security challenges leveraging NHIM
Our distinguished line-up of speakers brings a wealth of experience and expertise to the table, offering invaluable perspectives. From best practices to real-world case studies, attendees can expect to gain actionable insights that can be immediately applied in their own cybersecurity strategies.
Register To Watch On-Demand
Event Agenda
Session 1: From PAM to NHI Management. How technology is opening up new challenges to securing machine-to-machine access.


Session 2: Best practices to secure NHIs
In this session, Bezawit Sumner, CISO of CRISP, and Roey Rozi, Director of Solution Architecture at Oasis Security, will explore the best practices for securing non-human identities. Attendees will learn strategies for overcoming challenges related to visibility, ownership, posture and compliance. The session will also provide guidance on automating processes such as secret rotation and policy enforcement, helping organizations strengthen their overall cybersecurity posture in an increasingly complex threat landscape.


Session 3: Case study - How leading organizations solved security challenges leveraging NHIM
In the final session, we discuss specific hurdles organizations have faced with NHI security across a rapidly growing cloud environment prior to adopting a NHI Management platform. The session will also provide insights into how companies have implemented lifecycle automation capabilities to drastically reduce the risk of breaches while improving operations efficiency. Join us to gain practical insights and learn how you can replicate their success in your own organization.


Event Speakers

Ryan Frillman is the Equifax Workforce Solutions CISO, leading teams in security across Equifax. In 2018, Ryan was a part of Netskope to drive security transformation and cloud strategy for customers as a Cloud-Information Security Officer. Prior Ryan was at Spire Inc., the 5th largest US gas only company as the director of information and security, CISO leading cyber security.

Bezawit Sumner is the Chief Information Security Officer and Senior Director of Security & Compliance for CRISP Shared Services (CSS), a non-profit organization which provides health information technology and support services, including privacy & security and finance, to affiliate members and other jurisdictions by way of agreement. As CSS CISO, Bezawit leads the cybersecurity, information security, and compliance programs and all supporting activities for the enterprise and connected affiliates.

Roey Rozi brings over a decade of experience in cyber operations across various environments, from on-prem to hybrid. Specializing in the research, protection, and exploitation of complex systems, Roey's expertise spans network security, IAM, and endpoint protection. Known for his deep technical knowledge and passion for sharing insights, Roey actively engages in technical discussions and thought leadership within the cybersecurity community. In his spare time, he is a dedicated competitor in Cryptography CTFs, continuously honing his skills and staying at the forefront of cyber defense challenges.

Dorene Rettas is a senior executive with over 20 years' experience in business strategy and sales in the B2B tech space. She has extensive experience creating strong brand identities and identifying opportunities for growth in both new and established markets. As Co-founder of Cyber Security Tribe her focus is on bridging the gap for cyber security professionals by building a community and delivering content that addresses their current challenges.
Insight Partner

FAQs
Yes, there is no charge to join the event.
Only those who are Cybersecurity practitioners can join.
After registering you will receive an email with all details allowing you to join on the day. The system will send you a reminder the day before and 1 hour before it starts so you don't forget!
We do also send a calendar invite within the first email to help you simply click and add to your desired calendar with all the information required to join.