July 16, 2026
08:30am - 3:00pm
Concorde Hotel Singapore

Singapore Identity, Authentication and Access Management Summit 2026

Join us at the second edition of the IAAM Summit in Singapore to explore the latest in security and compliance with expert-led sessions and interactive discussions. Connect with peers, tackle real-world IAM challenges, and leave with practical insights to strengthen your organisation’s digital identity strategy.

Singapore Identity, Authentication and Access Management Summit 2026
Join us for professionals dedicated to advancing security and compliance.

Attendees will engage in a series of expert-led sessions and interactive activities designed to tackle current challenges and future opportunities in identity and access management.

Highlights include:

  • Implementing the Australian Digital Identity Bill
  • Managing security with access controls
  • Demonstration sessions showcasing real-world solutions to industry challenges
  • A dynamic debate on centralised versus decentralised IAM solutions
  • Unifying identity management across hybrid and multi-cloud environments

This summit promises to equip attendees with the insights and tools needed to navigate the complexities of modern identity management.

Speakers & Full Agenda Announced Soon!

Our speaker lineup will be released in April 2026.

Register now to secure your place and receive announcements when our full program launches.

Our Speakers

No items found.

Agenda

8:30 AM
Registration, Breakfast and Barista Coffee

Get in early avoid the queue hot coffee and fresh made barista coffee.

No items found.
9:15 AM
Welcome & Opening Remarks
No items found.
9:20 AM
Opening Keynote: Identity Observability: Turning Identity Signals into Real-Time Threat Defence

Identity is now the most valuable signal in cyber - and the earliest indicator of attacker intent. In high-threat environments, waiting for alerts isn’t enough.

This session breaks down how critical organisations are using identity telemetry - logins, privilege shifts, access anomalies, and behavioural patterns - to detect hostile activity earlier, disrupt lateral movement, and respond before impact. Hear the practical playbook for shifting identity from a static control to a live threat-intelligence capability - and what it takes to operationalise identity data at scale.

No items found.
9:40 AM
Keynote
No items found.
10:10 AM
Panel: Implementing Zero Trust through Robust Authentication

Discussing how Zero Trust models rely on strong authentication and access management to secure modern enterprises.

No items found.
10:40 AM
How I Solved...
No items found.
10:55 AM
Morning Tea and Networking
No items found.
11:25 AM
Audience Activity

In this innovative session, attendees will be faced with a series of scenarios that they may face in their roles. Attendees will discuss the possible courses of action with their peers to consider the ramifications of each option before logging their own course of action.

Results will be tallied and analysed by our session facilitator and results will impact the way the group moves through the activity.

Will we collectively choose the right course of action?

No items found.
11:40 A M
How I Solved... Streamlining Access Management with Single Sign-On (SSO)

A case study on implementing SSO solutions to enhance security and user experience across multiple platforms.

No items found.
11:55 AM
How I Solved... Enhancing Authentication with Multi-Factor Authentication (MFA) Best Practices

Practical insights into deploying MFA effectively to protect against unauthorised access.

No items found.
12:10 PM
Panel: Balancing User Experience and Security in Identity Management

Users expect fast, seamless access - while attackers increasingly target identity as the weakest link. This session explores how organisations can deliver frictionless experiences without sacrificing security, using adaptive authentication, passwordless approaches, and smart UX design. Learn practical ways to reduce drop-off, strengthen trust, and align security and product goals.

  • Apply adaptive, risk-based authentication to reduce friction while improving protection.
  • Use design patterns like passwordless and progressive profiling to streamline user journeys.
  • Align security and product teams to create identity experiences that drive engagement and trust.

No items found.
12:40 PM
Roundtable Discussions
No items found.
1:30 PM
Lunch and Networking
No items found.
2:20 PM
QuickFire Quiz: Test Your Knowledge Against Your Peers

Put your knowledge to the test in this fast-paced quiz covering real-world identity trivia, key concepts, and emerging trends. Compete for bragging rights—and a travel voucher—as the top scorer takes the crown.

No items found.
2:35 AM
Keynote: The Role of AI in Transforming Access Management

Insights into how artificial intelligence is reshaping access management through behavioral analytics and adaptive authentication.

No items found.
2:55 PM
Think Tank
No items found.
3:25 PM
Closing Remarks
No items found.

Past Speaker Highlights

Gaurav Gupta

SVP and Senior Director - IT Audit and Regulatory Management, UOB

Aidan Turner

Head of Cyber Security Engineering, Downer EDI

Hwee Cher Tan

Group Head, Information Security & Data Governance, CGS International Securities Group

Miao Song

Former Global Chief Information Officer, Global Logistics Properties

Richie Tan

Big Four, Cybersecurity Partner

Ivan Kukanov

Principal Speech Scientist, KLASS

Who Attends?

Chief Information Security Officer

Chief Information Officer

Chief IAM Officer

Chief Risk Officer

Cybersecurity Directors

Head of Cybersecurity

Cybersecurity GRC Director

Senior Cybersecurity Managers

Cybersecurity Engineering Manager

Chief Identity Engineer

Head of Identity Governance

Workforce Identity Lifecycle Manager

Head of IAM

Senior IAM Managers

Head of KYC

Product Security Director

CIAM Director

Man in gray blazer holding a laptop and talking to another man wearing a black jacket with a conference badge, surrounded by other attendees with badges at an indoor event.Audience seated in a conference room watching a speaker present slides about winning fantastic prizes on large screens.Crowd of people networking indoors at a conference or event with informational booths in the background.Audience attentively listening to a speaker in a conference room with round tables and water pitchers.

Attendee Testimonials

No items found.
No items found.
No items found.
No items found.

Our event sponsors

No items found.
For sponsorship opportunities, please get in touch with Danny Perry, danny@clutchgroup.co

Past Sponsors

No items found.

Event Location

Concorde Hotel Singapore

100 Orchard Rd, Singapore 238840
Singapore Identity, Authentication and Access Management Summit 2026

Frequently Asked Questions

No items found.

Get In Touch

Contact our event team for any enquiry

Danny Perry

Director of Sales
For sponsorship opportunities.
danny@clutchgroup.co

Lili Munar

Director of Client Relations
For guest and attendee enquiries.
lilibeth@clutchgroup.co

Steph Tolmie

Director of Conference Production
For speaking opportunities & content enquiries.
stephanie@clutchevents.co

Taylor Stanyon

Director of Operations
For event-related enquiries.
taylor@clutchgroup.co