In this webinar, our co-authors John Walsh & Uzi Ailon will preview their new O’Reilly book before it’s official release. Join us as they explore the critical role of identity security in software development and the impact on the modern enterprise. From the basics of identity security essentials to advanced topics such as cloud security, Kubernetes, and CI/CD pipeline security.
Recommended for You

Zilla’s talk explores the hidden risks of service accounts, offering guidance on managing and securing these often-overlooked non-human identities.

90% of identity leaders struggle with roles—this webinar explores an AI-driven, automated approach to delivering job-appropriate access at scale.

Zilla leaders and experts share 2025 IGA best practices and insights from a recent market research survey of identity leaders.

Discover how identity security can play a pivotal role in achieving and maintaining compliance on endpoints.

The advantages of an identity security platform & how to maximize risk reduction by managing and securing identities with appropriate privilege controls.

Learn 5 proven strategies to boost adoption of your WPM tool and build secure, low-friction password habits across your workforce.

MFA isn’t enough. Learn how attackers bypass it—and how to secure access beyond the login with Identity Security

Machine identity sprawl is rising. Hear expert insights from ESG and CISO tips to improve visibility, control, and security.

CyberArk experts uncover Scattered Spider’s latest identity attacks and review how to detect threats and defend against privilege abuse.

The CA/Browser Forum has approved sweeping changes to the TLS certificate lifecycle, reducing the maximum validity for public certificates to just 47 days, down from today’s 398.

Phishing and compromised credentials remain the leading causes of security breaches. Traditional passwords are not only vulnerable.

This guide explains what certificate lifecycle management (CLM) is and why it should be central to your machine identity security strategy.

In this session, attendees will review the progression of quantum computing along with industry recommendations to help agencies prepare for and transition to post quantum cryptography.

Traditional approaches to workforce identity security are no match for today's evolving threats. This session introduces a defense-in-depth strategy that reimagines how to secure workforce identities

Struggling with access reviews? Get expert tips on automation, catching hidden accounts, and staying audit-ready in this must-watch webinar.

Despite the shift toward passkeys and multi-factor authentication, many legacy and third-party apps still rely on passwords. To balance security and productivity, enterprises need effective password

Unlock hybrid cloud potential with secure, seamless dev access. Learn to cut excessive privileges, automate ops, and boost agility—without slowing innovation.

Endpoint Security in Higher Education Webinar

Take an in-depth look into the journey toward a passwordless future, examining both its benefits and the challenges organizations face during transition.

Practical strategies for aligning identity management practices with multiple frameworks and standards.