Online Event

Non-Human Identity: The Risks, The Reality and How to Manage

Three 20 minute sessions designed to help those currently looking for insight and guidance in how to best secure non-human identities, hosted by leading CISOs in the field.

Online Event
ON-DEMAND
3 Sessions

Unlike human accounts, which are more likely to trigger alerts when compromised, non-human accounts often go undetected for extended periods, providing malicious actors with prolonged access to critical systems and data.  

While breaches may initially target human accounts, adversaries frequently pivot to exploiting non-human accounts to maintain persistence within compromised networks. Traditional IAM solutions focus primarily on human identities, the evolving threat landscape necessitates a shift towards comprehensive solutions that encompass both human and non-human identities.  

This online event is structured into three comprehensive sessions, each designed to equip you with the knowledge and solutions required to ensure your organization is protecting it's non-human identities. 

  • From PAM to NHI Management. How technology is opening up new challenges to securing machine-to-machine access.
  • Best practices to secure NHIs
  • Case study - How leading organizations solved security challenges leveraging NHIM 

Our distinguished line-up of speakers brings a wealth of experience and expertise to the table, offering invaluable perspectives. From best practices to real-world case studies, attendees can expect to gain actionable insights that can be immediately applied in their own cybersecurity strategies.

Register To Watch On-Demand

Event Agenda

Session 1: From PAM to NHI Management. How technology is opening up new challenges to securing machine-to-machine access.

Join us to explore the security risks associated with relying on Cloud Service Providers (CSP) and external SaaS products for identity creation. Discover the simplicity with which API-centric services can be accessed with just a single click, raising questions about who oversees these vital credentials. We will discuss the rapid development of technology in the cloud environment, unveiling potential unknown risks to identities in both proof of concept stages and full production deployments whilst unpacking the inherent dangers of embedding keys directly within the codebase. Lastly, we will examine the delicate balance of trust in automation when the credentials remain unknown to human operators.
Ryan Frillman
Ryan Frillman
CISO, Equifax Workforce Solutions
Dorene Rettas Cyber Security Tribe
Dorene Rettas
Co-Founder, Cyber Security Tribe

Session 2: Best practices to secure NHIs

In this session, Bezawit Sumner, CISO of CRISP, and Roey Rozi, Director of Solution Architecture at Oasis Security, will explore the best practices for securing non-human identities. Attendees will learn strategies for overcoming challenges related to visibility, ownership, posture and compliance. The session will also provide guidance on automating processes such as secret rotation and policy enforcement, helping organizations strengthen their overall cybersecurity posture in an increasingly complex threat landscape.

 

Bezawit Sumner Cyber Security Tribe
Bezawit Sumner
CISO, CRISP
Roey Rozi Cyber Security Tribe
Roey Rozi
Director of Solution Architecture, Oasis Security

Session 3: Case study - How leading organizations solved security challenges leveraging NHIM

In the final session, we discuss specific hurdles organizations have faced with NHI security across a rapidly growing cloud environment prior to adopting a NHI Management platform. The session will also provide insights into how companies have implemented lifecycle automation capabilities to drastically reduce the risk of breaches while improving operations efficiency. Join us to gain practical insights and learn how you can replicate their success in your own organization.

Dorene Rettas Cyber Security Tribe
Dorene Rettas
Co-Founder, Cyber Security Tribe
Roey Rozi Cyber Security Tribe
Roey Rozi
Director of Solution Architecture, Oasis Security

Event Speakers

Ryan Frillman
Ryan Frillman
CISO, Equifax Workforce Solutions

Ryan Frillman is the Equifax Workforce Solutions CISO, leading teams in security across Equifax. In 2018, Ryan was a part of Netskope to drive security transformation and cloud strategy for customers as a Cloud-Information Security Officer. Prior Ryan was at Spire Inc., the 5th largest US gas only company as the director of information and security, CISO leading cyber security.
Bezawit Sumner Cyber Security Tribe
Bezawit Sumner
CISO, CRISP

Bezawit Sumner is the Chief Information Security Officer and Senior Director of Security & Compliance for CRISP Shared Services (CSS), a non-profit organization which provides health information technology and support services, including privacy & security and finance, to affiliate members and other jurisdictions by way of agreement. As CSS CISO, Bezawit leads the cybersecurity, information security, and compliance programs and all supporting activities for the enterprise and connected affiliates.
Roey Rozi Cyber Security Tribe
Roey Rozi
Director of Solution Architecture, Oasis Security

Roey Rozi brings over a decade of experience in cyber operations across various environments, from on-prem to hybrid. Specializing in the research, protection, and exploitation of complex systems, Roey's expertise spans network security, IAM, and endpoint protection. Known for his deep technical knowledge and passion for sharing insights, Roey actively engages in technical discussions and thought leadership within the cybersecurity community. In his spare time, he is a dedicated competitor in Cryptography CTFs, continuously honing his skills and staying at the forefront of cyber defense challenges.
Dorene Rettas Cyber Security Tribe
Dorene Rettas
Co-Founder, Cyber Security Tribe

Dorene Rettas is a senior executive with over 20 years' experience in business strategy and sales in the B2B tech space. She has extensive experience creating strong brand identities and identifying opportunities for growth in both new and established markets. As Co-founder of Cyber Security Tribe her focus is on bridging the gap for cyber security professionals by building a community and delivering content that addresses their current challenges.

Insight Partner

Oasis Logo Cyber Security Tribe

FAQs

Is it free to join the event?

Yes, there is no charge to join the event.

Can anyone join the event?

Only those who are Cybersecurity practitioners can join. 

How do I Join the Event?

After registering you will receive an email with all details allowing you to join on the day. The system will send you a reminder the day before and 1 hour before it starts so you don't forget! 

We do also send a calendar invite within the first email to help you simply click and add to your desired calendar with all the information required to join. 

Back to top