Sydney Identity, Authentication & Access Management Summit 2025
Secure the future of secure access and join industry experts for hands-on sessions and insights on identity management, authentication, and passwordless security solutions.

Welcome to the Identity, Authentication, and Access Management Summit in Sydney, where industry leaders and innovators gather to explore the critical challenges of securing digital identities in today's interconnected world.
This summit serves as a key platform for diving into the latest trends, technologies, and strategies in identity and access management (IAM). Attendees will gain invaluable insights into the tools and best practices that can help organisations strengthen their IAM frameworks and safeguard access to sensitive systems and data.
Throughout the day, participants will engage in expert-led sessions, thought-provoking discussions, and hands-on demonstrations designed to address real-world cloud security issues and opportunities.
Join us to explore:
- Building Resilience in Identity and Access Management: Develop a robust IAM framework with automated identity lifecycle management and access governance to protect against insider threats.
- Zero Trust: The Future of Identity and Access Security: Implement continuous authentication and least-privilege access policies to verify and secure users at every interaction.
- The Growing Threat of Credential-Based Attacks: Enforce Multi-Factor Authentication (MFA) and use AI-driven threat detection to combat credential theft and phishing attacks.
- AI and Machine Learning: Transforming Identity Security: Utilise AI for behavioural analytics, risk-based authentication, and automated incident response to enhance security and reduce human error.
- Securing Identity in Cloud-Native Environments: Integrate IAM into DevSecOps pipelines, leveraging SSO and RBAC for secure access control in cloud-native environments.
- Privacy and Compliance in Identity Management: Align IAM strategies with privacy regulations like GDPR and CCPA, ensuring auditability and compliance with data sovereignty laws.
- Interactive Demos and Simulation Exercises: Participate in hands-on simulations to practice incident response, credential attack mitigation, and access control management.
Join us in Sydney to connect with identity, authentication, and access management experts, refine your IAM strategies, and prepare your organisation to excel in securing identities and controlling access in an evolving digital landscape.
Program Highlights
Speakers
Sessions
IAM & Cybersecurity Leaders
Track
Our Speakers
Agenda
This session will explore the future of Identity and Access Management (IAM) and how organisations can adapt to the evolving cybersecurity landscape while providing seamless, secure experiences for users.
As the digital landscape evolves, organizations face both opportunities and risks across their expanding digital footprint - from users and devices to networks, applications, and data. Learn how to protect against common vulnerabilities, including credential-based attacks which account for 89% of web application breaches, through a comprehensive identity security approach.
This forward-looking panel will explore the evolving landscape of Identity and Access Management (IAM) over the next decade. Experts will discuss the cutting-edge trends and technologies that are expected to reshape IAM, including:
- AI-powered Identity Management: AI and ML driving smarter, adaptive identity management and real-time threat detection.
- Self-Sovereign Identity (SSI): Empowering users with control over digital identities for better privacy and security.
- Decentralised Authentication: Blockchain and distributed ledgers creating decentralised, trust-based authentication systems across platforms.
- The Rise of Automation: Automation streamlining IAM processes and enabling real-time, context-aware access control.
In this innovative session, attendees will be faced with a series of scenarios that they may face in their roles. Attendees will discuss the possible courses of action with their peers to consider the ramifications of each option before logging their own course of action.
Results will be tallied and analysed by our session facilitator and results will impact the way the group moves through the activity.
Will we collectively choose the right course of action?
According to the Australian Signals Directorate (ASD), Microsoft’s Windows Active Directory is the most widely used authentication and authorisation solution in enterprise IT (and OT) networks globally.
This makes it a valuable target for malicious cyber actors and it is routinely targeted as part of attacks against enterprise networks.
With Windows Active Directory being a regular factor in the increasing amount of data theft and business disruptions by attackers gaining unauthorised access to systems and data:
- What are common blind-spots that organisations face and that attackers exploit?
- How modern identity-security controls help mitigate the risk exposure organisations face?
- Demonstration of applying these controls where it was difficult/impossible to do before!
Discover how reimagining digital authority transforms data security and digital ownership, and why breaches soon won’t matter.
- Super-admin altering any permissions, vendor devops with a backdoor, sysadmin accessing root keys, db-admin accessing any record – takes only one to compromise
- Understanding the fundamental flaw in today’s cybersecurity
- How ineffable cryptography ensures digital authority can no longer be stolen or abused
- How application of the technology to your IAM will turn a breach from a catastrophe into a non-event
- Understanding the risks associated with service accounts, bots, and machine identities, and how to bring them under governance
- Implementing access controls, automated policy enforcement, and real-time monitoring to detect and prevent unauthorised privilege escalations
- Demonstrating how to unify identity security across on-prem, cloud, and third-party applications without disrupting operation
- Why is Zero Trust IAM becoming the standard for Cloud Security: Zero Trust principles, such as least-privilege access and continuous identity verification, are crucial for securing modern cloud environments and reducing risk
- Challenges in Implementing Zero Trust for IAM: Implementing Zero Trust in hybrid and multi-cloud environments presents challenges, such as integrating legacy systems and managing diverse identity sources
- Evolving IAM Models for Continuous Verification: Organisations must evolve their IAM strategies to support real-time authentication, adaptive access control, and continuous identity verification
- Success Stories and Lessons Learned: Successful enterprise adoption of Zero Trust for IAM demonstrates its impact on security and the valuable lessons learned along the way
Choose 1 topic from the following:
- Secure Your Identity Infrastructure from Insider Threats
- What is the future of Identity Governance and Security?
- Implementing Adaptive Authentication to Combat Evolving Threats
- The role of Unified Identity Security in protecting your organisation from malicious cyber actors
- Bridging the Gap: Integrating Privileged Access Management and Identity Access Governance
- Secure identity before, during, and after authentication: Addressing additional roadblocks in your IAM solution
- Leveraging AI in Modern Privileged Access Management: Uncovering Threats and Hidden Paths to Privilege
AI-powered deepfakes have become more sophisticated, which means organisations must stay ahead of evolving threats to digital identity, authentication, and trust. In this presentation, we’ll unpack:
- The increasing role of AI deepfakes in identity fraud and authentication
- Emerging detection techniques and AI-driven countermeasures
- Best practices for safeguarding digital identities in a deepfake-driven landscape
As identity, authentication, and access management practices evolve, the industry is rife with debate over which technologies and models best serve security and user experience. This session challenges thought leaders to examine the pros, cons, and trade-offs of emerging trends that are reshaping the IAM landscape.
Contentious Trends Up for Debate:
- Should we focus on centralised or decentralised identity?
- Is passwordless authentication the next big thing?
- Is there more to come for consumer biometrics or has the novelty worn off?
- Is the digital identity bill achieving its goal?
- Should UX be considered in choosing IAM methods?
Who Attends?
Chief IAM Officer
Chief Identity Engineer
Head of KYC
Head of Risk and Compliance
Head of Financial Crime
Head of Privacy
Head of Identity Governance
Head of Cybersecurity Platform
Head of IAM
Head of Access Control
Head of PAM
Cyber GRC Director
CIAM Director
Digital ID Manager
Workforce Identity Lifecycle Manager
Digital Product Manager
Fraud Risk Manager
Authentication Manager
Cybersecurity Engineering Manager
Cybersecurity Architecture Manager
Benefits For Attendees








Event Location
Dockside Group

FAQs
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Suspendisse varius enim in eros elementum tristique.
Get In Touch
Contact our event team for any enquiry

Danny Perry
For sponsorship opportunities.

Lili Munar
For guest and attendee enquiries.

Ben Turner
For speaking opportunities & content enquiries.

Taylor Stanyon
For event-related enquiries.