Singapore Identity, Authentication & Access Management Summit 2025
Secure the future of secure access and join industry experts for hands-on sessions and insights on identity management, authentication, and passwordless security solutions.
Check out last year's event

Welcome to the Identity, Authentication, and Access Management Summit in Singapore, where industry leaders and innovators gather to explore the critical challenges of securing digital identities in today's interconnected world.
This summit serves as a key platform for diving into the latest trends, technologies, and strategies in identity and access management (IAM). Attendees will gain invaluable insights into the tools and best practices that can help organisations strengthen their IAM frameworks and safeguard access to sensitive systems and data.
Throughout the day, participants will engage in expert-led sessions, thought-provoking discussions, and hands-on demonstrations designed to address real-world cloud security issues and opportunities.
Join us to explore:
- Building Resilience in Identity and Access Management: Develop a robust IAM framework with automated identity lifecycle management and access governance to protect against insider threats.
- Zero Trust: The Future of Identity and Access Security: Implement continuous authentication and least-privilege access policies to verify and secure users at every interaction.
- The Growing Threat of Credential-Based Attacks: Enforce Multi-Factor Authentication (MFA) and use AI-driven threat detection to combat credential theft and phishing attacks.
- AI and Machine Learning: Transforming Identity Security: Utilise AI for behavioural analytics, risk-based authentication, and automated incident response to enhance security and reduce human error.
- Securing Identity in Cloud-Native Environments: Integrate IAM into DevSecOps pipelines, leveraging SSO and RBAC for secure access control in cloud-native environments.
- Privacy and Compliance in Identity Management: Align IAM strategies with privacy regulations like GDPR and CCPA, ensuring auditability and compliance with data sovereignty laws.
- Interactive Demos and Simulation Exercises: Participate in hands-on simulations to practice incident response, credential attack mitigation, and access control management.
Join us in Singapore to connect with identity, authentication, and access management experts, refine your IAM strategies, and prepare your organisation to excel in securing identities and controlling access in an evolving digital landscape.
Our Speakers
Agenda
Privileged Access Management (PAM) is no longer just about human users. As organisations scale automation, APIs, service accounts, and machine identities, the attack surface expands. In this session, Satya Nagaram, Head of PAM at Standard Chartered, will explore the next phase of PAM transformation, including how to secure non-interactive IDs, reduce risk across sprawling environments, and the critical role IAM plays in strengthening AI security and trust.
- Why non-interactive IDs are today’s biggest PAM blind spot
- Approaches to modernising PAM for automation and scale
- How identity frameworks underpin safe and trustworthy AI adoption
- Where PAM and IAM must evolve to keep pace with AI-driven enterprises
Identity-based threats are still the most common cause of breaches but in 2025, they’re harder to spot and faster to spread. It’s not just about stopping bad logins anymore; attackers are hijacking sessions, abusing tokens, and blending in with legitimate users. In this panel, security and IAM leaders share how they’re spotting identity misuse early, what behaviours and signals actually help, and how they’re speeding up response without burning out their teams.
- The signals, behaviours, and patterns helping catch identity misuse early
- What’s working for fast containment, smarter investigation, and reducing manual effort
- How to ensure identity systems and security teams work together, not in silos
An interactive session where attendees participate in handling a simulated breach due to compromised credentials, focusing on containment and remediation strategies.
Deepfakes are rapidly becoming one of the most sophisticated identity threats, capable of bypassing traditional authentication and eroding digital trust. This live demo session shows how deepfake detection works in practice, from spotting subtle inconsistencies to integrating detection into identity workflows. Attendees will see real-world attack scenarios, the tools used to identify manipulated media, and strategies to safeguard authentication processes in an AI-driven threat landscape.
Demo Flow
- A look at how deepfakes are crafted and deployed in fraud and social engineering
- Demonstration of detection techniques: visual, audio, and behavioural analysis
- Showcasing how detection integrates into IAM and fraud prevention systems
- What organisations need to prepare for as deepfakes evolve
Practical insights into deploying MFA effectively to protect against unauthorised access.
AI agents, synthetic users, and machine identities are becoming part of daily operations but most IAM strategies weren’t built to handle them. In this panel, security and identity leaders will explore what happens when your users aren’t human, your workflows are autonomous, and your policies can’t keep up.We’ll unpack the new risks AI introduces, how teams are adapting identity controls, and what needs to change in how we govern access and identity going forward.
- How to handle machine and agent identities: What’s working to manage authentication, permissions, and lifecycle for non-human actors
- Where current IAM approaches break down: Firsthand challenges teams are facing as AI scales across infrastructure
- What to change now: Tools, policies, and cross-team strategies that help you stay in control as AI reshapes the identity landscape
Delegates will chose from a list of pertinent peer-to-peer discussion topics focussing on evolving and emerging trends, techniques and technologies
Put your knowledge to the test in this fast-paced quiz covering real-world identity trivia, key concepts, and emerging trends. Compete for bragging rights—and a travel voucher—as the top scorer takes the crown.
Insights into how artificial intelligence is reshaping access management through behavioral analytics and adaptive authentication.
Some IAM challenges just don’t have clean answers but the choices your team makes can define your entire security posture.
In this interactive session, we’ll vote, debate, and challenge five of the most divisive identity decisions facing organisations in 2025. Each one will be explored through live multiple-choice questions designed to split the room and surface the real trade-offs teams are making today.
You’ll leave with a sharper view of where others stand and what strategies are actually working.
We’ll explore questions like:
- Who should really own IAM — security, IT, or the business?
- How much friction is acceptable in customer identity before it hurts the business?
- Should IAM be centralised, or is federated identity the only way to scale?
- Where are modern identity architectures failing silently?
- Should identity systems block risky behaviour or just alert and log it?
Past Speaker Highlights
Who Attends?
Chief IAM Officer
Chief Identity Engineer
Head of KYC
Head of Risk and Compliance
Head of Financial Crime
Head of Privacy
Head of Identity Governance
Head of Cybersecurity Platform
Head of IAM
Head of Access Control
Head of PAM
Cyber GRC Director
CIAM Director
Digital ID Manager
Workforce Identity Lifecycle Manager
Digital Product Manager
Fraud Risk Manager
Authentication Manager
Cybersecurity Engineering Manager
Cybersecurity Architecture Manager
Event Feedback
Our event sponsors




Past Sponsors
Event Location
Concorde Hotel Singapore

Frequently Asked Questions
Get In Touch
Contact our event team for any enquiry

Danny Perry
For sponsorship opportunities.

Lili Munar
For guest and attendee enquiries.

Ben Turner
For speaking opportunities & content enquiries.

Taylor Stanyon
For event-related enquiries.