November 20, 2025
8:30am - 3:30pm
Concorde Hotel Singapore

Singapore Identity, Authentication & Access Management Summit 2025

Secure the future of secure access and join industry experts for hands-on sessions and insights on identity management, authentication, and passwordless security solutions. 🏆 Plus, join us on the day for a chance to win some epic prizes and enjoy complimentary breakfast, refreshments and lunch! 🍜

Singapore Identity, Authentication & Access Management Summit 2025

Welcome to the Identity, Authentication, and Access Management Summit in Singapore, where industry leaders and innovators gather to explore the critical challenges of securing digital identities in today's interconnected world.

This summit serves as a key platform for diving into the latest trends, technologies, and strategies in identity and access management (IAM). Attendees will gain invaluable insights into the tools and best practices that can help organisations strengthen their IAM frameworks and safeguard access to sensitive systems and data.

Throughout the day, participants will engage in expert-led sessions, thought-provoking discussions, and hands-on demonstrations designed to address real-world cloud security issues and opportunities.

Join us to explore:

  • Building Resilience in Identity and Access Management: Develop a robust IAM framework with automated identity lifecycle management and access governance to protect against insider threats.
  • Zero Trust: The Future of Identity and Access Security: Implement continuous authentication and least-privilege access policies to verify and secure users at every interaction.
  • The Growing Threat of Credential-Based Attacks: Enforce Multi-Factor Authentication (MFA) and use AI-driven threat detection to combat credential theft and phishing attacks.
  • AI and Machine Learning: Transforming Identity Security: Utilise AI for behavioural analytics, risk-based authentication, and automated incident response to enhance security and reduce human error.
  • Securing Identity in Cloud-Native Environments: Integrate IAM into DevSecOps pipelines, leveraging SSO and RBAC for secure access control in cloud-native environments.
  • Privacy and Compliance in Identity Management: Align IAM strategies with privacy regulations like GDPR and CCPA, ensuring auditability and compliance with data sovereignty laws.
  • Interactive Demos and Simulation Exercises: Participate in hands-on simulations to practice incident response, credential attack mitigation, and access control management.

Join us in Singapore to connect with identity, authentication, and access management experts, refine your IAM strategies, and prepare your organisation to excel in securing identities and controlling access in an evolving digital landscape.

🏆 Plus, join us on the day for a chance to win some epic prizes and enjoy complimentary breakfast, refreshments and lunch! 🍜

Our Speakers

Gaurav Gupta

Gaurav Gupta

SVP and Senior Director - IT Audit and Regulatory Management
Hwee Cher Tan

Hwee Cher Tan

Group Head, Information Security & Data Governance
Aidan Turner

Aidan Turner

Head of Cyber Security Engineering
Ivan Kukanov

Ivan Kukanov

Principal Speech Scientist
Manan Leo Qureshi

Manan Leo Qureshi

Multi Industry Risk, Security and Resilience Leader
Amaresh Mohan

Amaresh Mohan

Advisor and Former Chief Risk Officer
Miao Song

Miao Song

Former Global Chief Information Officer
Richie Tan

Richie Tan

Big Four, Cybersecurity Partner
Marcus Guan

Marcus Guan

Senior Manager of PreSales, Greater ASEAN
Suraj Singh

Suraj Singh

Area Vice President, APJ
Edwardcher Monreal

Edwardcher Monreal

Principal Solutions Architect
Register Now

Register Now

To receive speaker and program updates and secure your seat!

Agenda

8:30 AM
Registration Open - Barista Coffee, Breakfast and Networking
No items found.
9:15 AM
Opening Address from the MC
No items found.
9:30am
Keynote: How Downer Made Identity the Backbone of Security: Lessons in Leading IAM at Scale

At Downer, identity is more than an access layer, it’s the foundation of their security strategy. In this session, you’ll hear how the IAM team is leading real change across a complex mix of cloud and on-prem environments.

From structuring teams for delivery to embedding identity into broader risk and operational priorities, this is a practical look at what it takes to move beyond policy and build a scalable, outcome-driven identity programme that earns buy-in and delivers results.

‍

  • What identity-centric security looks like at Downer – How controls, visibility, and risk reduction are delivered in day-to-day operations.
  • How Downer structures and leads IAM at scale – Team design, platform coverage, and delivery across hybrid infrastructure.
  • Where identity delivers the most impact – How we connect IAM strategy to compliance, operational priorities, and business risk.

‍

‍

‍

‍

Aidan Turner
Head of Cyber Security Engineering, Downer EDI
9:50am
Keynote: The Swiss Cheese Identity Problem: How We Got Here and What Comes Next

From passports to biometrics, identity has constantly evolved, but the cloud era has left us with a “Swiss cheese” framework full of gaps. This session unpacks how we got here, from the rise of digital identity to the impact of remote work and Zero Trust, and explores what it will take to build a more unified and resilient identity future.  

  • Trace the surprising journey of identity, and see how history shaped today’s digital trust gaps.
  • Expose the hidden holes in our modern identity layers and why even Zero Trust can’t fill them all (yet).
  • Discover how a smarter, unified approach can finally turn the “Swiss cheese” of identity into a solid foundation for the future.

‍

Suraj Singh
Area Vice President, APJ, Silverfor
10:20am
Panel Discussion: Detecting Identity-Based Threats in 2025

Identity-based threats are still the most common cause of breaches but in 2025, they’re harder to spot and faster to spread. It’s not just about stopping bad logins anymore; attackers are hijacking sessions, abusing tokens, and blending in with legitimate users. In this panel, security and IAM leaders share how they’re spotting identity misuse early, what behaviours and signals actually help, and how they’re speeding up response without burning out their teams.

  • The signals, behaviours, and patterns helping catch identity misuse early
  • What’s working for fast containment, smarter investigation, and reducing manual effort
  • How to ensure identity systems and security teams work together, not in silos
Hwee Cher Tan
Group Head, Information Security & Data Governance, CGS International Securities Group
Gaurav Gupta
SVP and Senior Director - IT Audit and Regulatory Management, UOB
Marcus Guan
Senior Manager of PreSales, Greater ASEAN, Okta
10:50am
Morning Tea & Networking
No items found.
11:20am
Interactive Audience Activity: Managing a Compromised Credential Scenario

An interactive session where attendees participate in handling a simulated breach due to compromised credentials, focusing on containment and remediation strategies.

No items found.
11:40am
How I... Built a Defence Against Deepfakes

Deepfakes are rapidly becoming one of the most sophisticated identity threats, capable of bypassing traditional authentication and eroding digital trust. This lightning talk shows how deepfake detection works in practice, from spotting subtle inconsistencies to integrating detection into identity workflows. Attendees will see real-world attack scenarios, the approaches/ methodologies used to identify manipulated media, and strategies to safeguard authentication processes in an AI-driven threat landscape.

  • A look at how deepfakes are crafted and deployed in fraud and social engineering
  • Demonstration of detection techniques: visual, audio, and behavioural analysis
  • Showcasing how detection integrates into IAM and fraud prevention systems
  • What organisations need to prepare for as deepfakes evolve

‍

Ivan Kukanov
Principal Speech Scientist, KLASS
11:55AM
How to... Implement Phishing-Resistant Access Across the Enterprise: From Door to the Cloud

Achieving phishing-resistant access across your enterprise requires strong, unified authentication — from the physical door to the digital cloud. This session explores how HID Crescendo Cards and Keys deliver secure, passwordless access with one trusted identity across all environments.

  • Implement phishing-resistant authentication using HID Crescendo Cards and Keys
  • See how a single credential enables both physical and digital access
  • Learn best practices for building a unified, passwordless access ecosystem
  • Brief mention of how Enterprise Provisioning and Management (EPM) enhances scalability and lifecycle management

‍

Edwardcher Monreal
Principal Solutions Architect, HID
12:10pm
Fireside Chat: Adapting Identity Management for AI Systems

AI agents, synthetic users, and machine identities are becoming part of daily operations but most IAM strategies weren’t built to handle them. In this panel, security and identity leaders will explore what happens when your users aren’t human, your workflows are autonomous, and your policies can’t keep up. We’ll unpack the new risks AI introduces, how teams are adapting identity controls, and what needs to change in how we govern access and identity going forward.

  • How to handle machine and agent identities: What’s working to manage authentication, permissions, and lifecycle for non-human actors
  • Where current IAM approaches break down: Firsthand challenges teams are facing as AI scales across infrastructure
  • What to change now: Tools, policies, and cross-team strategies that help you stay in control as AI reshapes the identity landscape
Manan Leo Qureshi
Multi Industry Risk, Security and Resilience Leader
12:40pm
Roundtable Discussions

Delegates will chose from a list of pertinent peer-to-peer discussion topics focussing on evolving and emerging trends, techniques and technologies

No items found.
1:30pm
Lunch & Networking
No items found.
2:30pm
QuickFire Quiz: Test Your Knowledge Against Your Peers

Put your knowledge to the test in this fast-paced quiz covering real-world identity trivia, key concepts, and emerging trends. Compete for bragging rights—and a travel voucher—as the top scorer takes the crown.

No items found.
2:50PM
Keynote: The New Identity Economy – Building Trust and Access at Enterprise Scale

As digital ecosystems expand across borders, clouds, and AI-driven platforms, identity has become the new currency of trust. In this session, Miao Song, award-winning Global CIO and Board Advisor, explores how forward thinking organisations are redefining access, governance, and user experience in the “identity economy.”
Drawing from her experience leading multi-billion-dollar cloud, AI, and data transformations across global markets, Miao shares how modern identity strategies are enabling secure AI adoption, resilient cloud operations, and frictionless experiences for users worldwide.

  • How to align identity, trust, and AI for secure, scalable innovation.
  • Building a unified identity foundation across global, multi-cloud environments.
  • Turning identity into a strategic business enabler, powering confidence, compliance, and seamless digital access.

‍

Miao Song
Former Global Chief Information Officer, Global Logistics Properties
3:10pm
Think Tank: Dissecting the Five Identity Challenges That Still Divide Security Teams

Some IAM challenges just don’t have clean answers but the choices your team makes can define your entire security posture.

In this interactive session, we’ll vote, debate, and challenge five of the most divisive identity decisions facing organisations in 2025. Each one will be explored through live multiple-choice questions designed to split the room and surface the real trade-offs teams are making today.

You’ll leave with a sharper view of where others stand and what strategies are actually working.

We’ll explore questions like:

  • Who should really own IAM — security, IT, or the business?
  • How much friction is acceptable in customer identity before it hurts the business?
  • Should IAM be centralised, or is federated identity the only way to scale?
  • Where are modern identity architectures failing silently?
  • Should identity systems block risky behaviour or just alert and log it?
Amaresh Mohan
Advisor and Former Chief Risk Officer, Flutterwave
Richie Tan
Big Four, Cybersecurity Partner
Miao Song
Former Global Chief Information Officer, Global Logistics Properties
3:30pm
Event Closed
No items found.

Past Speaker Highlights

No items found.

Who Attends?

Chief IAM Officer

Chief Identity Engineer

Head of KYC

Head of Risk and Compliance

Head of Financial Crime

Head of Privacy

Head of Identity Governance

Head of Cybersecurity Platform

Head of IAM

Head of Access Control

Head of PAM

Cyber GRC Director

CIAM Director

Digital ID Manager

Workforce Identity Lifecycle Manager

Digital Product Manager

Fraud Risk Manager

Authentication Manager

Cybersecurity Engineering Manager

Cybersecurity Architecture Manager

Attendee Testimonials

No items found.
No items found.
No items found.
No items found.

Our event sponsors

For sponsorship opportunities, please get in touch with Danny Perry, danny@clutchgroup.co

Past Sponsors

No items found.

Event Location

Concorde Hotel Singapore

100 Orchard Rd, Singapore 238840
Singapore Identity, Authentication & Access Management Summit 2025

Frequently Asked Questions

No items found.

Get In Touch

Contact our event team for any enquiry

Danny Perry

Director of Sales
For sponsorship opportunities.
danny@clutchgroup.co

Lili Munar

Director of Client Relations
For guest and attendee enquiries.
lilibeth@clutchgroup.co

Ben Turner

Director of Conference Production
For speaking opportunities & content enquiries.
ben@clutchevents.co

Taylor Stanyon

Director of Operations
For event-related enquiries.
taylor@clutchgroup.co