If you’re heading to Identiverse 2025 and your work involves continuous access, modern privileged identity strategies, or enterprise authorization, this year’s agenda delivers. We’ve pulled together a set of standout sessions for security and identity professionals focused on where identity control is heading next and how to get there.
If you’re heading to Identiverse 2025 and your work involves continuous access, modern privileged identity strategies, or enterprise authorization, this year’s agenda delivers. We’ve pulled together a set of standout sessions for security and identity professionals focused on where identity control is heading next and how to get there.
This list covers sessions focused on:
Whether you’re rethinking traditional PAM or exploring how to embed access decisions across distributed systems, these sessions are well worth your time.
Continuous access isn’t just a theory anymore: It’s a practical requirement in a world where user and device context can change by the minute.
Continuous Identity Workshop - June 3 | 9:30 AM - 11:30 AM with speakers Andrew Cameron and Sean O’Dell
This interactive workshop dives deep into continuous identity architecture. Learn from practitioners who have built real-world CAE systems about the design decisions, technical pitfalls, and operational challenges you’ll face. If you’re serious about implementing continuous access, this workshop belongs on your schedule.
Bringing It All Together: Harnessing the CAEPabilities With Event-Driven IAM - June 4 | 11:40 AM – 12:30 PM with speakers Andrew Cameron, Atul Tulshibagwale, Mike Kiser, David Bryan
This panel unpacks how Shared Signals and CAEP are being adopted in real-world architectures. It’s one of the most complete sessions for understanding what it takes to implement event-driven identity systems.
Episode IX: The Rise of Continuous Identity - June 6 | 11:00 AM – 11:25 AM with speakers Andrew Cameron, Sean O’Dell
In case you couldn’t make it to the Continuous Identity Workshop earlier in the week, come and explore how identity decisions are becoming more contextual, more continuous, and more embedded in everyday workflows.
Organizations are increasingly moving away from static privileged access models. These sessions explore more dynamic, risk-aware approaches to managing high-stakes access.
Drowning in Privileged Accounts: How to Get Your Head Above Water - June 4 | 2:35 PM – 3:00 PM with speaker Erin Lewis
Focused on the healthcare sector but relevant to any resource-constrained team, this session outlines practical steps to scale down privileged access and increase operational control.
As enterprises rethink how they define and enforce access, policy-based systems that are portable, embeddable, and context-aware are gaining ground.
From Human Error to Automated Assurance: The Journey Toward Zero Touch Production -
June 4 | 2:00 PM – 2:25 PM with speaker Matt Topper
A look at how automation and policy maturity can reduce risk, increase consistency, and support enterprise authorization goals.
SGNL Presents: Take the First Step Towards Continuous, Event-Based IAM - June 4 | 2:35 PM – 3:00 PM with speaker Mat Hamlin
This session offers a real-world path to modernization by focusing on your highest-risk assets, like cloud, code, and customer environments, without overhauling your entire IAM infrastructure. Mat shares three guiding principles for building a modern identity architecture that’s event-driven, context-aware, and business-enabling. If you’re wondering how to make practical progress toward continuous access, this is a must-attend.
The Rise of WASM-Embeddable Policy Decision Points: Transforming Enterprise Authorization -
June 6 | 10:15 AM – 10:40 AM with speakers Alex Olivier, Mike Schwartz
This session explores how WebAssembly-based PDPs are enabling scalable, high-performance access decisions across cloud-native environments.
Beyond the mechanics of access decisions, these sessions look at the broader context of implementation and how to align standards, systems, and teams.
Interoperability Profiling for Secure Identity in the Enterprise (IPSIE) Panel Discussion -
June 3 | 1:30 PM – 2:20 PM with speakers Aaron Parecki, Atul Tulshibagwale, Dean Saxe, Jen Schreiber, and others
A discussion of the early work in IPSIE, this panel explores how identity systems can—and must—interoperate in complex, multi-vendor enterprise environments.
Transforming Resistance into Resilience: Mastering Organizational Change Management -
June 4 | 11:05 AM – 11:30 AM with speaker Angie Klein
A reminder that successful identity programs don’t just need the right architecture—they need stakeholder buy-in and thoughtful implementation.
Tech Debt Holding You Back? 5 Strategies to Escape The Crush - June 6 | 8:30 AM – 8:55 AM with speaker Paul Lanzi
An essential conversation for leaders facing legacy challenges while trying to implement modern IAM strategies.
How and Why IGA Programs Fail – A Case Study - June 4 | 11:05 AM – 11:30 AM with speaker Jon Lehtinen
No better teacher than failure—and this session proves it. Jon offers a candid case study of a large enterprise IGA implementation that didn’t go as planned. From underestimated complexity to misaligned expectations, this session delivers practical takeaways on what to watch for (and avoid) when standing up or overhauling an IGA program.
Getting the CISO’s Attention (Without Causing a Breach) - June 4 | 10:30 - 10:55 with speaker Joe Sullivan
How do you get your CISO’s attention to focus on Identity? In this session, Joe Sullivan, a seasoned security leader with extensive CISO experience, shares actionable insights on how identity practitioners can effectively capture and sustain their CISO’s focus in positive, impactful ways.
With so many strong sessions on the agenda, choosing where to spend your time is the hardest part, in the best possible way. There are overlaps. Trade-offs. And more content than anyone can reasonably absorb. But if you’re thinking seriously about how access control is evolving and how to put that evolution into practice, these sessions will move you forward.
SGNL will be at Identiverse as well. If you’re ready to talk about CAE, authorization modernization, or life after PAM, we’d love to connect.
Want more of the latest identity-first security topics and trends delivered to your inbox? Helpful and insightful content, no fluff.