Sydney Identity, Authentication & Access Management Summit 2025
Secure the future of secure access and join industry experts for hands-on sessions and insights on identity management, authentication, and passwordless security solutions.
Welcome to the Identity, Authentication, and Access Management Summit in Sydney, where industry leaders and innovators gather to explore the critical challenges of securing digital identities in today's interconnected world.
This summit serves as a key platform for diving into the latest trends, technologies, and strategies in identity and access management (IAM). Attendees will gain invaluable insights into the tools and best practices that can help organisations strengthen their IAM frameworks and safeguard access to sensitive systems and data.
Throughout the day, participants will engage in expert-led sessions, thought-provoking discussions, and hands-on demonstrations designed to address real-world cloud security issues and opportunities.
Join us to explore:
- Building Resilience in Identity and Access Management: Develop a robust IAM framework with automated identity lifecycle management and access governance to protect against insider threats.
- Zero Trust: The Future of Identity and Access Security: Implement continuous authentication and least-privilege access policies to verify and secure users at every interaction.
- The Growing Threat of Credential-Based Attacks: Enforce Multi-Factor Authentication (MFA) and use AI-driven threat detection to combat credential theft and phishing attacks.
- AI and Machine Learning: Transforming Identity Security: Utilise AI for behavioural analytics, risk-based authentication, and automated incident response to enhance security and reduce human error.
- Securing Identity in Cloud-Native Environments: Integrate IAM into DevSecOps pipelines, leveraging SSO and RBAC for secure access control in cloud-native environments.
- Privacy and Compliance in Identity Management: Align IAM strategies with privacy regulations like GDPR and CCPA, ensuring auditability and compliance with data sovereignty laws.
- Interactive Demos and Simulation Exercises: Participate in hands-on simulations to practice incident response, credential attack mitigation, and access control management.
Join us in Sydney to connect with identity, authentication, and access management experts, refine your IAM strategies, and prepare your organisation to excel in securing identities and controlling access in an evolving digital landscape.
Program Highlights
Speakers
Sessions
IAM & Cybersecurity Leaders
Track
Agenda
This session will explore the future of Identity and Access Management (IAM) and how organisations can adapt to the evolving cybersecurity landscape while providing seamless, secure experiences for users.
This session explores proven strategies for refining authentication, implementing adaptive access controls, and aligning identity management practices with evolving threats and regulations.
- Integrating identity-centric architectures to enhance security and user experience
- Leveraging adaptive authentication and granular access policies to counter emerging threats
- Ensuring regulatory alignment and user trust through transparent and consistent identity governance
This forward-looking panel will explore the evolving landscape of Identity and Access Management (IAM) over the next decade. Experts will discuss the cutting-edge trends and technologies that are expected to reshape IAM, including:
- AI-powered Identity Management: AI and ML driving smarter, adaptive identity management and real-time threat detection.
- Self-Sovereign Identity (SSI): Empowering users with control over digital identities for better privacy and security.
- Decentralised Authentication: Blockchain and distributed ledgers creating decentralised, trust-based authentication systems across platforms.
- The Rise of Automation: Automation streamlining IAM processes and enabling real-time, context-aware access control.
In this innovative session, attendees will be faced with a series of scenarios that they may face in their roles. Attendees will discuss the possible courses of action with their peers to consider the ramifications of each option before logging their own course of action.
Results will be tallied and analysed by our session facilitator and results will impact the way the group moves through the activity.
Will we collectively choose the right course of action?
This demonstration session will uncover how an industry leader overcame a common industry challenge. They’ll take you inside their world and show you the process and tools they use to build something brilliant.
This demonstration session will uncover how an industry leader overcame a common industry challenge. They’ll take you inside their world and show you the process and tools they use to build something brilliant.
- Why Zero Trust is the Gold Standard for IAM in the Cloud: Zero Trust principles, such as least-privilege access and continuous identity verification, are crucial for securing modern cloud environments and reducing risk.
- Challenges in Implementing Zero Trust for IAM: Implementing Zero Trust in hybrid and multi-cloud environments presents challenges, such as integrating legacy systems and managing diverse identity sources.
- Evolving IAM Models for Continuous Verification: Organisations must evolve their IAM strategies to support real-time authentication, adaptive access control, and continuous identity verification.
- Success Stories and Lessons Learned: Successful enterprise adoption of Zero Trust for IAM demonstrates its impact on security and the valuable lessons learned along the way.
Select a topic of discussion and engage in an interactive roundtable discussion with a group of your like-minded peers.
As organisations embrace digital transformation, trust has become the cornerstone of secure, efficient access management. This session will explore how identity and access management (IAM) systems must evolve to create a seamless, trustworthy experience that balances security with user convenience in an increasingly complex digital ecosystem.
As identity, authentication, and access management practices evolve, the industry is rife with debate over which technologies and models best serve security and user experience. This session challenges thought leaders to examine the pros, cons, and trade-offs of emerging trends that are reshaping the IAM landscape.
Contentious Trends Up for Debate:
- Should we focus on centralised or decentralised identity?
- Is passwordless authentication the next big thing?
- Is there more to come for consumer biometrics or has the novelty worn off?
- Is the digital identity bill achieving its goal?
- Should UX be considered in choosing IAM methods?
Who Attends?
Chief Information Security Officer
Chief IAM Officer
Chief Identity Engineer
Head of KYC
Head of Risk and Compliance
Head of Financial Crime
Head of Privacy
Head of Identity Governance
Head of Cybersecurity Platform
Head of Cybersecurity
Head of IAM
Head of Access Control
Head of PAM
Cyber GRC Director
CIAM Director
Digital ID Manager
Workforce Identity Lifecycle Manager
Digital Product Manager
Fraud Risk Manager
Authentication Manager
Cybersecurity Engineering Manager
Cybersecurity Architecture Manager
Benefits For Attendees
Event Location
Dockside Group
FAQs
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique.
Get In Touch
Contact our event team for any enquiry
Danny Perry
For sponsorship opportunities.
Lili Munar
For guest and attendee enquiries.
Ben Turner
For speaking opportunities & content enquiries.
Taylor Stanyon
For event-related enquiries.