Upcoming Events
As Federal agencies operate under assumed breach and Zero Trust principles, identity has emerged as the primary control for managing cyber risk, operational resilience and mission agility. Yet many identity programs remain centered on authentication and enforcement, leaving critical ...
Discover how secure all identities, human and non-human in the public sector.
Local government agencies are facing an explosion of non-human identities, including AI agents, service accounts, and bots. This influx introduces new risks and challenges for IT teams. As digital transformation and AI adoption ...
Archived Events
This webinar explored how higher education institutions can streamline identity management in complex IT environments. SailPoint experts discussed the challenges created by multiple affiliations—such as student-employees and alumni-faculty—and shared strategies for managing ...
SailPoint hosted an in-person event that explored how intelligent identity security empowers agencies to streamline operations, strengthen compliance, and optimize resources for greater efficiency and resilience.
During this event, attendees were equipped to:
Following a full day of sessions at the NASTD Annual Conference, Wiz and SailPoint hosted an exclusive networking reception to unwind above the Nashville skyline with great views, craft cocktails and good company. Attendees connected with peers, shared ideas and enjoyed the energy of ...
Grand Canyon University, Carahsoft, SailPoint, and Accenture hosted a dynamic and collaborative Identity Day in Arizona - designed specifically for professionals in higher education and state/local government.
This event featured:
SailPoint hosted a webinar that provided actionable strategies to address pain points, offering insights into how ...
Infoblox, Proofpoint, Rubrik, SailPoint, and SHI hosted a fun March Madness Event on Friday, March 21st. Attendees had the opportunity to network with their peers, watch their favorite teams play, and hear about exciting technology from their favorite vendors!
Attendees of this gained insight into:
The Bubble Model: Learned how the bubble model creates resilient, self-contained identity environments that operate independently of central authorities, ensuring secure operations even in high-risk scenarios by isolating identities & ...
In the realm of state, local, and higher education institutions, manually managing access for non-employees can create significant challenges. Lack of visibility and control over non-employee identities such as contractors, researchers, visiting faculty, partners, vendors, and other external collaborators is time-consuming, ...