AI Agents | Businesses | Customers | Devices | Employees
Step into a live digital soundscape, where every identity moves in sync. Across four dynamic demos, experience trust in motion — verified, authorized, and synchronized at high velocity.
Connect with our experts and explore how to elevate your identity-first security posture — so you can embrace AI today while protecting against quantum risks.
Plus, score some exclusive swag and giveaways!
Book your spot for an exclusive demo tour or a one-on-one meeting with our senior leaders and security experts.
Joseph F. Miceli Jr. | Distinguished Author, IAM Transformation and Growth Executive, Identity Fusion
Ammar Faheem | Director of Product Marketing, CIAM, Thales
The perimeter has shifted from the network edge to identity itself. Yet most organizations still treat Identity and Data Security as separate, leaving a dangerous gap where “shadow access” meets “shadow data.” Today’s breaches don’t start with break-ins—they start with valid credentials and over-permissioned identities quietly accessing sensitive data. This session cuts through the noise to show why identity governance is now a frontline business issue—impacting revenue, trust, and risk—and how unifying identity with data context, alongside DSPM, ISPM, and a Cybersecurity Mesh approach, closes the gap.
Marco Venuti | Director of Business Acceleration, Thales
Gal Helemski | CPO, Plain ID
Sharing is redefining identity. From playlists to financial accounts to enterprise apps, access delegation is rapidly reshaping expectations for Customer Identity and Access Management (CIAM). As B2B and hybrid B2C–B2B use cases grow, organizations must support cross-org collaboration, delegated control, and scalable trust—moving beyond frictionless login to secure, flexible, and auditable sharing at scale.
This session explores real-world scenarios driving this shift, the convergence of CIAM with B2B identity, and why advanced authorization—not just authentication—is the key to enabling portability, adaptability, and business growth.
Chitwan Arora | Senior Product Manager, IAM, Thales
Passkeys and FIDO-based authentication are critical to eliminating phishing—but most enterprises struggle to scale beyond pilots. This session focuses on how to deploy and operate passkeys at enterprise scale, addressing real-world challenges like enrollment, lifecycle management, and policy consistency.
Learn best practices for secure rollout, coexistence with existing IAM, and maintaining control as environments grow—ensuring identity decisions remain consistent beyond authentication and delivering on the promise of phishing-resistant, future-proof identity.
Jason Keenaghan | Director, Product Management & UX, IAM, Thales. (LINK HAS HAIDER)
Most IAM programs are optimized for security—not for customer trust. Across enterprise deployments and 30,000+ consumer insights from the Thales Digital Trust Index, we reveal how friction, opacity, and poorly designed AI-driven journeys silently drive abandonment and lost revenue.
Learn where the biggest gaps lie, what leading organizations are fixing first, and how to redesign identity experiences that reduce friction, build trust, and improve retention—without compromising security.
Full identity lifecycle and strong authentication enable secure banking and seamless collaboration.
Device-bound, high-assurance authentication stops phishing and secures defense-grade access.
Unifying the customer experience in a fragmented insurance landscape.
Phishing-resistant MFA strengthens government security while ensuring compliance and trust.
A solution that enables trusted enterprise AI:
✓ securing access for AI agents
✓ enforcing identity decisions at runtime—aligning intent to actions
✓ ensuring AI interactions are authenticated, authorized, and auditable
A unified CIAM platform enabling secure, seamless identity experiences:
✓ orchestrating identities across ecosystems
✓ enabling adaptive authentication and delegated access
✓ delivering real-time policy control for customers and partners
A phishing-resistant, authentication solution with centralized control:
✓ enabling secure device-bound access from FIDO to PKI use cases
✓ managing FIDO key lifecycle with ease
✓ scaling deployment with enterprise-grade control
Gain hands-on insights into implementing passwordless authentication across all user types:
✓ exploring a 360° approach to improve security, usability, and scalability for employees, customers, and partners
✓ learn how it can help reduce breach risks and compliance cost