Early-bird Discount
expires in
Register Now

Agenda

Future in Security

Future in Security

Combined Session
Thursday, May 08, 2025 15:35—16:35
Location: B 09

Will PAM, CIEM, Secrets Management, and NHI Management Merge?
15:35—15:55
 

The convergence of Privileged Access Management (PAM), Cloud Infrastructure Entitlement Management (CIEM), Secrets Management, and Non-Human Identity (NHI) Management feels almost inevitable as the traditional concept of privileged access evolves into something far more dynamic and complex.

With the rise of cloud supremacy, the dominance of DevOps and CI/CD pipelines, and the increasing significance of NHIs, we’ve seen the emergence of CIEM and specialized niche PAM solutions. Organizations are now juggling multiple tools to address their evolving security needs.

But is this fragmented approach sustainable in the long term? Some PAM vendors are already positioning themselves as comprehensive Identity Security platform providers, incorporating CIEM, Secrets Management, and even ITDR (Identity Threat Detection and Response) capabilities to meet the growing demand for unified solutions. At the same time, innovative cloud-native access tools and niche PAM solutions continue to emerge with fresh ideas and capabilities.

So, what does the future hold? Can these solutions coexist, or will we see consolidation? More importantly, should they converge?

In this session, we’ll analyze the market dynamics, highlight key trends in privileged access management, and explore the potential trajectory for the next five years. Key questions include:

  • How will convergence impact our ability to secure both human and non-human identities across hybrid environments?
  • Can a single vendor truly deliver best-in-class solutions across such a broad scope, or is a layered, best-of-breed approach still the better strategy?
  • What will privileged access management mean for businesses in 2030?

Join us to understand how these evolving markets and technologies will shape the future of identity security—and how your organization can stay ahead.

Paul Fisher
Lead Analyst
KuppingerCole
Paul Fisher is a Lead Analyst who researches primarily on cybersecurity and identity and access management (IAM). He also studies trends in AI, IoT and data governance for different industry...
Cybersecurity Leadership – Who Takes Responsibility When Everything Fails?
16:15—16:35
 

Cybersecurity often seems under control—until an attack reveals that no one truly takes responsibility. Regulations like NIS2 and DORA increase the pressure, yet many organizations struggle to define clear leadership in critical moments. The challenge isn’t just technology but governance, compliance, and accountability. A systemic approach, such as a Cybersecurity Fabric, integrates technologies (IAM, Zero Trust, SIEM) with well-defined responsibilities. Without strong identity and access management, any security strategy remains incomplete. Organizations that treat cybersecurity as a business priority are more resilient. Real-world examples show that clear ownership and integrated solutions make the difference. Responsibility in a crisis should be defined before—not after—an incident occurs. Is your organization truly prepared? Let’s explore how we can build a more secure future together.

Christopher Schütze
Chief of Advisory and CISO
KuppingerCole
Christopher Schütze has been working as Director Practice Cyber Security and Lead Analyst for KuppingerCole Analysts AG since 2019. In 2023 he was promoted to Chief of Advisory and CISO....
Almost Ready to Join European Identity and Cloud Conference 2025?
Reach out to our team with any remaining questions
Get in touch