IGA for the Digital Era (Back-Office Capabilities)
Combined Session
Wednesday, May 07, 2025 11:00—12:00
Location: A 03-04
Wednesday, May 07, 2025 11:00—12:00
Location: A 03-04
The rise of non-human identities (NHI) is undeniable - and their presence is growing at an astonishing rate. With estimates suggesting there are 25 to 50 times more non-human identities than human ones, it’s no surprise that NHIs and their management are now a focal point for identity professionals.
Have you thought about governing non-human identities? While most NHI approaches focus on credential management, API access, and security, there’s another crucial angle: the very essence of non-human identities themselves. This is where identity governance comes into play.
In this talk, we will explore how the proven principles of identity governance and administration (IGA) can be seamlessly applied to non-human identities and the benefits that come with it. You will learn how to leverage your existing IGA deployment and extend it to cover both human and non-human identities by using governance principles like ownership and responsibility for NHIs. By utilizing a modern IGA platform, you’ll create a unified foundation for managing both types of identities while reducing obstacles to the
This session explores the critical stages that follow the procurement process, focusing on how to effectively deploy, integrate, and optimize your IGA solution to drive tangible results. From defining a robust implementation strategy to making key decisions on system integration, customization, and stakeholder engagement, we will cover essential considerations to ensure a smooth, scalable, and successful IGA deployment. Attendees will gain actionable insights, practical tools, and proven methodologies to navigate the complexities of the implementation phase and set the foundation for long-term success.
Over the past decade, technology transformation has been significant, particularly in the realm of Identity. What was once straightforward identity and access management, focused on application access governance, has now evolved into complex layers that influence how customers interact with an organization's products. For instance, identity now plays a crucial role in enhancing user experience and driving more foot traffic to stores or contributing to more around digital trust. While these transformations have highlighted the importance of Identity Governance and Administration (IGA) capabilities, they have also impacted and reshaped the enterprise risk landscape. Unfortunately, this area still lags behind, as many organizations fail to incorporate these considerations into their large-scale identity programs and thus IGA transformation programs and GRC as functions still run in silos.