Explore our events
-
Webinar
IGA and IAM Strategies for Achieving Least Privilege
Learn moreOn-demand -
Webinar
Beyond IAM, Meet Identity Security
Learn moreOn-demand -
Webinar
When Employees Depart: Ensuring access to sensitive data is removed
Learn moreOn-demand -
Lightning Talk
3 Essential Strategies for Access Governance with AWS
Learn moreOn-demand -
Webinar
Next-Gen IGA
Learn moreOn-demand -
Webinar
Meet Veza: Bringing the trust back to zero trust
Learn moreOn-demand
-
Webinar
Identity is the New Battleground: How to Forge a Path to Identity Security and What Security Leaders Need to Know
Learn moreMay 08 2025, 11:00am PST -
Webinar
Disrupting Security: How HIG Eliminated Blindspots by Securing Identity (and Reducing SharePoint Risk in the Process)
Learn moreOn-demand -
Webinar
Beating the Breach: Effective Identity Security Strategies for Healthcare
Learn moreOn-demand -
Webinar
Securing Non-human Identities in the Enterprise with HashiCorp Vault and Veza
Learn moreOn-demand -
Webinar
Veza launches Access AI to Deliver Generative AI-Powered Identity Security
Learn moreOn-demand -
Webinar
Access Intelligence in Snowflake: who has access to what?
Learn moreOn-demand
-
Webinar
Identity is the New Battleground: How to Forge a Path to Identity Security and What Security Leaders Need to Know
Learn moreMay 08 2025, 11:00am PST -
Webinar
Disrupting Security: How HIG Eliminated Blindspots by Securing Identity (and Reducing SharePoint Risk in the Process)
Learn moreOn-demand -
Webinar
Beating the Breach: Effective Identity Security Strategies for Healthcare
Learn moreOn-demand -
Webinar
Securing Non-human Identities in the Enterprise with HashiCorp Vault and Veza
Learn moreOn-demand -
Webinar
Veza launches Access AI to Deliver Generative AI-Powered Identity Security
Learn moreOn-demand -
Book Launch
Modernizing Identity with Just In Time Access
Learn moreOn-demand