July 23, 2026
08:30am - 3:30pm
Conrad Hotel New York Downtown

New York Identity, Authentication & Access Management Summit 2026

Join us for the inaugural New York edition of the IAAM Summit to explore the latest in security and compliance through expert-led sessions and interactive discussions. Connect with peers, address real-world IAM challenges, and gain practical insights to strengthen your organization’s digital identity strategy.

New York Identity, Authentication & Access Management Summit 2026
Join us for a gathering of professionals dedicated to advancing security and compliance.

Attendees will participate in a series of expert-led sessions and interactive activities designed to address current challenges and uncover future opportunities in identity and access management.

Highlights include:
  • Implementing U.S. digital identity and privacy frameworks
  • Managing security with access controls
  • Demonstration sessions showcasing real-world solutions to industry challenges
  • A dynamic debate on centralized versus decentralized IAM solutions
  • Unifying identity management across hybrid and multi-cloud environments

This summit will equip attendees with the insights and tools needed to navigate the complexities of modern identity management.

Register now to secure your spot and receive updates as the agenda develops.

Our Speakers

Priyesh Bansal

Priyesh Bansal

Identity and Security Product Manager
 Dr. Nader Nassar

Dr. Nader Nassar

Director Engineering: Cybersecurity and IAM
Justin Kim

Justin Kim

VP Product Management
Anirudh Pullela

Anirudh Pullela

Technology Controls and IAM Director
Rahil Parikh

Rahil Parikh

Senior Manager, Security Engineering, Architecture and Operations
Sanchita Bajaj

Sanchita Bajaj

Privacy, Authentication and Identity Experience Design Director
Jason Rodriguez

Jason Rodriguez

Head of IAM Privileged Access (PAM)
Register Now

Register Now

To receive speaker and program updates and secure your seat!

Agenda

8:30am
Registration Opens & Networking Breakfast

Beat the rush and join us early for complimentary barista-made coffee and breakfast.

No items found.
9:20am
Keynote: Managing Non-Human Identity at Scale: What’s Changed and What Still Works

Non-human identities now play a central role across cloud platforms, CI/CD pipelines, APIs, and AI-driven workflows. As these identities scale, many teams are finding that practices designed for human access need to be adapted to support automation, autonomy, and rapid change.

This keynote explores how non-human identity usage is evolving in real environments, where traditional IAM approaches need refinement, and how organisations are adjusting ownership and lifecycle models to maintain visibility and control while supporting innovation.

We’ll cover:

  • How service accounts, APIs, and AI agents are typically introduced and managed across modern platforms
  • Where teams are encountering challenges with ownership, lifecycle management, and visibility as these identities grow
  • Practical approaches organisations are using today to improve governance of non-human identities without slowing delivery
Dr. Nader Nassar
Director Engineering: Cybersecurity and IAM, CapitalOne
9:40 am
Keynote:
No items found.
10:10am
Panel: Identity Under Regulatory Scrutiny: What US Compliance Actually Requires in 2026

Regulators are no longer treating identity as a background control. Across financial services and regulated industries, access decisions, identity logs, and privileged activity are now being examined directly during investigations, audits, and post-incident reviews.

This panel brings together security, identity, and risk leaders to unpack how US regulatory expectations around identity have shifted, what scrutiny actually looks like in practice, and how teams are preparing for enforcement without turning IAM into a compliance-only function.

We’ll discuss:

  • How identity controls are being examined under NYDFS cybersecurity rules, SEC cyber disclosure requirements, and evolving state privacy laws
  • What regulators look for after an incident including access logs, privileged activity, review evidence, and decision traceability
  • Why baseline controls like MFA are now assumed, and what “defensible access decisions” really mean in regulatory conversations
Anirudh Pullela
Technology Controls and IAM Director, Citadel
Jason Rodriguez
Head of IAM Privileged Access (PAM), Guardian Life
10:40 am
How I Solved...
No items found.
10:55am
Morning Tea & Networking
No items found.
11:25am
Interactive Audience Activity: Managing a Compromised Credential Scenario
No items found.
11:40am
How I Solved... Introducing Risk-Based Identity Decisions

Static identity policies couldn’t keep up with changing user behaviour, device contexts, and threat patterns. Risk-based decisions promised a better balance between security and experience by adapting access in real time but handing decisions to systems introduced new challenges the team hadn’t fully anticipated.

In this session, we’ll walk through how risk-based identity controls were introduced, what assumptions didn’t hold once they hit production, and how the approach evolved when false positives, edge cases, and accountability questions started to surface.

We’ll cover:

  • What pushed the team to move beyond static identity policies in the first place
  • Where risk signals conflicted with user expectations and business workflows
  • How false positives and edge cases began to erode trust in automated decisions
  • What governance, oversight, and escalation models had to change once humans were no longer approving every access request
No items found.
11:55am
How I Solved... Enhancing Authentication with Multi-Factor Authentication (MFA) Best Practices
No items found.
12:10am
Panel: When Identity Shapes the User Experience

Identity and security decisions increasingly influence how users experience products, platforms, and internal tools. Step-up authentication, session expiry, device trust, and risk-based access now sit inside critical journeys, often requiring trade-offs between protection, usability, and performance.

This panel brings together identity, security, and product leaders to discuss how these trade-offs show up in practice, how teams identify unintended impacts over time, and how ownership is evolving as identity becomes more closely tied to user experience and business outcomes.

We’ll explore:

  • How authentication and access decisions affect conversion, engagement, and productivity over time
  • Where well-intentioned security changes created unexpected friction for users
  • How teams collaborate across security, identity, and product to manage trade-offs
Justin Kim
VP Product Management, Openlane
Sanchita Bajaj
Privacy, Authentication and Identity Experience Design Director, Verizon
12:40pm
Roundtable Discussions

Delegates will chose from a list of pertinent peer-to-peer discussion topics focussing on evolving and emerging trends, techniques and technologies.

No items found.
1:30pm
Lunch & Networking
No items found.
2:20pm
QuickFire Quiz: Test Your Knowledge Against Your Peers

Put your knowledge to the test in this fast-paced quiz covering real-world identity trivia, key concepts, and emerging trends. Compete for bragging rights—and a travel voucher—as the top scorer takes the crown.

No items found.
2:35pm
Keynote: Agentic Identity: Maintaining Control as AI Systems Act on Our Behalf

AI systems are starting to act autonomously on behalf of users, calling other services, triggering actions, and making decisions across multiple systems. As this happens, many organisations are discovering that identity context, ownership, and accountability are difficult to maintain once requests move beyond a single application or model.This session explores how identity and access control change when actions are taken by chains of AI agents rather than humans. Drawing on real-world experience, it examines where existing IAM approaches fall short and how teams are adapting authentication, delegation, and auditing models to retain control as autonomy increases.We’ll cover:

  • How user intent and accountability can be preserved as actions pass through multiple AI agents
  • Why static credentials and traditional service accounts struggle in agent-driven workflows
  • How teams are reducing the risk of unintended or unauthorised actions in autonomous systems

Priyesh Bansal
Identity and Security Product Manager, Cerebras AI
2:55pm
Think Tank: Responding to an Unexpected Identity Incident

Identity systems are designed to provide control, accountability, and traceability. But when long-standing service accounts, APIs, or machine identities begin behaving in unexpected ways, those assumptions can be tested quickly. Ownership becomes unclear, privilege boundaries blur, and incident response and compliance timelines start to collide.

This interactive Think Tank puts the room into a realistic identity incident. Participants vote live on a series of real-world decisions, explore the implications together, and revisit their choices as new information emerges and trade-offs become clearer.

We’ll Cover:

  • How teams respond in the first moments of an identity incident involving privileged non-human access
  • The decision trade-offs between containment, investigation, and business disruption
  • Where identity lifecycle and governance gaps typically surface under pressure
Rahil Parikh
Senior Manager, Security Engineering, Architecture and Operations, Zinnia
3:25pm
Event Closed
No items found.

Past Speaker Highlights

No items found.

Who Attends?

Chief Information Security Officer

Chief IAM Officer

Chief Identity Engineer

Head of KYC

Head of Risk and Compliance

Head of Financial Crime

Head of Privacy

Head of Identity Governance

Head of Cybersecurity Platform

Head of Cybersecurity

Head of IAM

Cyber GRC Director

CIAM Director

Digital ID Manager

Workforce Identity Lifecycle Manager

Digital Product Manager

Fraud Risk Manager

Authentication Manager

Cybersecurity Engineering Manager

Cybersecurity Architecture Manager

Man in gray blazer holding a laptop and talking to another man wearing a black jacket with a conference badge, surrounded by other attendees with badges at an indoor event.Audience seated in a conference room watching a speaker present slides about winning fantastic prizes on large screens.Crowd of people networking indoors at a conference or event with informational booths in the background.Audience attentively listening to a speaker in a conference room with round tables and water pitchers.

Attendee Testimonials

No items found.
No items found.
No items found.
No items found.

Our event sponsors

For sponsorship opportunities, please get in touch with Danny Perry, danny@clutchgroup.co

Past Sponsors

Event Location

Conrad Hotel New York Downtown

102 N End Ave, New York, NY 10282, United States
New York Identity, Authentication & Access Management Summit 2026

Frequently Asked Questions

No items found.

Get In Touch

Contact our event team for any enquiry

Danny Perry

Director of Sales
For sponsorship opportunities.
danny@clutchgroup.co

Lili Munar

Director of Client Relations
For guest and attendee enquiries.
lilibeth@clutchgroup.co

Steph Tolmie

Director of Conference Production
For speaking opportunities & content enquiries.
stephanie@clutchevents.co

Taylor Stanyon

Director of Operations
For event-related enquiries.
taylor@clutchgroup.co