Blog

Mat Hamlin
Director of Product Marketing, SGNL
05.07.2025
Follow us on:
Subscribe to SGNL blog:

Must-see Identiverse sessions for modern access control

If you’re heading to Identiverse 2025 and your work involves continuous access, modern privileged identity strategies, or enterprise authorization, this year’s agenda delivers. We’ve pulled together a set of standout sessions for security and identity professionals focused on where identity control is heading next and how to get there.

If you’re heading to Identiverse 2025 and your work involves continuous access, modern privileged identity strategies, or enterprise authorization, this year’s agenda delivers. We’ve pulled together a set of standout sessions for security and identity professionals focused on where identity control is heading next and how to get there.

This list covers sessions focused on:

  • Continuous Access Evaluation (CAE)
  • Privileged Identity Management (PIM)
  • Granular, portable, and real-time authorization models

Whether you’re rethinking traditional PAM or exploring how to embed access decisions across distributed systems, these sessions are well worth your time.

Continuous access evaluation: standards, signals, and real-world strategy

Continuous access isn’t just a theory anymore: It’s a practical requirement in a world where user and device context can change by the minute.

Continuous Identity Workshop - June 3 | 9:30 AM - 11:30 AM with speakers Andrew Cameron and Sean O’Dell

This interactive workshop dives deep into continuous identity architecture. Learn from practitioners who have built real-world CAE systems about the design decisions, technical pitfalls, and operational challenges you’ll face. If you’re serious about implementing continuous access, this workshop belongs on your schedule.

Bringing It All Together: Harnessing the CAEPabilities With Event-Driven IAM - June 4 | 11:40 AM – 12:30 PM with speakers Andrew Cameron, Atul Tulshibagwale, Mike Kiser, David Bryan

This panel unpacks how Shared Signals and CAEP are being adopted in real-world architectures. It’s one of the most complete sessions for understanding what it takes to implement event-driven identity systems.

Episode IX: The Rise of Continuous Identity - June 6 | 11:00 AM – 11:25 AM with speakers Andrew Cameron, Sean O’Dell
In case you couldn’t make it to the Continuous Identity Workshop earlier in the week, come and explore how identity decisions are becoming more contextual, more continuous, and more embedded in everyday workflows.

Privileged identity: moving past the PAM model

Organizations are increasingly moving away from static privileged access models. These sessions explore more dynamic, risk-aware approaches to managing high-stakes access.

Drowning in Privileged Accounts: How to Get Your Head Above Water - June 4 | 2:35 PM – 3:00 PM with speaker Erin Lewis

Focused on the healthcare sector but relevant to any resource-constrained team, this session outlines practical steps to scale down privileged access and increase operational control.

Granular and portable authorization: policy as a platform

As enterprises rethink how they define and enforce access, policy-based systems that are portable, embeddable, and context-aware are gaining ground.

From Human Error to Automated Assurance: The Journey Toward Zero Touch Production -
June 4 | 2:00 PM – 2:25 PM with speaker Matt Topper

A look at how automation and policy maturity can reduce risk, increase consistency, and support enterprise authorization goals.

SGNL Presents: Take the First Step Towards Continuous, Event-Based IAM - June 4 | 2:35 PM – 3:00 PM with speaker Mat Hamlin

This session offers a real-world path to modernization by focusing on your highest-risk assets, like cloud, code, and customer environments, without overhauling your entire IAM infrastructure. Mat shares three guiding principles for building a modern identity architecture that’s event-driven, context-aware, and business-enabling. If you’re wondering how to make practical progress toward continuous access, this is a must-attend.

The Rise of WASM-Embeddable Policy Decision Points: Transforming Enterprise Authorization -
June 6 | 10:15 AM – 10:40 AM with speakers Alex Olivier, Mike Schwartz

This session explores how WebAssembly-based PDPs are enabling scalable, high-performance access decisions across cloud-native environments.

Strategy, interoperability, and identity leadership

Beyond the mechanics of access decisions, these sessions look at the broader context of implementation and how to align standards, systems, and teams.

Interoperability Profiling for Secure Identity in the Enterprise (IPSIE) Panel Discussion -
June 3 | 1:30 PM – 2:20 PM with speakers Aaron Parecki, Atul Tulshibagwale, Dean Saxe, Jen Schreiber, and others

A discussion of the early work in IPSIE, this panel explores how identity systems can—and must—interoperate in complex, multi-vendor enterprise environments.

Transforming Resistance into Resilience: Mastering Organizational Change Management -
June 4 | 11:05 AM – 11:30 AM with speaker Angie Klein

A reminder that successful identity programs don’t just need the right architecture—they need stakeholder buy-in and thoughtful implementation.

Tech Debt Holding You Back? 5 Strategies to Escape The Crush - June 6 | 8:30 AM – 8:55 AM with speaker Paul Lanzi

An essential conversation for leaders facing legacy challenges while trying to implement modern IAM strategies.

Perspective, provocation, and fresh thinking

How and Why IGA Programs Fail – A Case Study - June 4 | 11:05 AM – 11:30 AM with speaker Jon Lehtinen

No better teacher than failure—and this session proves it. Jon offers a candid case study of a large enterprise IGA implementation that didn’t go as planned. From underestimated complexity to misaligned expectations, this session delivers practical takeaways on what to watch for (and avoid) when standing up or overhauling an IGA program.

Getting the CISO’s Attention (Without Causing a Breach) - June 4 | 10:30 - 10:55 with speaker Joe Sullivan

How do you get your CISO’s attention to focus on Identity? In this session, Joe Sullivan, a seasoned security leader with extensive CISO experience, shares actionable insights on how identity practitioners can effectively capture and sustain their CISO’s focus in positive, impactful ways.

Prioritizing the right sessions

With so many strong sessions on the agenda, choosing where to spend your time is the hardest part, in the best possible way. There are overlaps. Trade-offs. And more content than anyone can reasonably absorb. But if you’re thinking seriously about how access control is evolving and how to put that evolution into practice, these sessions will move you forward.

SGNL will be at Identiverse as well. If you’re ready to talk about CAE, authorization modernization, or life after PAM, we’d love to connect.

Subscribe to SGNL's blog.

Want more of the latest identity-first security topics and trends delivered to your inbox? Helpful and insightful content, no fluff.