Featured virtual events
-
WebinarHow to Automate Your User Access Reviews for Continuous Compliance
As cloud adoption, SaaS usage, and AI integration accelerate, identities and permissions have become increasingly complex and harder to manage. Many teams struggle to get a true picture of access and stay compliant during audits. The result? Slow, error-prone, and frustrating access reviews. Join our webinar to learn how to streamline and modernize your user […]Dec 04 2025, 9:00am PST -
WebinarImplications of Agentic AI for Identity Security: NHI, Human, or Something New?
AI agents are transforming the way enterprises operate: supercharging productivity by automating workflows, decision-making, and actions across digital ecosystems. But with this power comes new security challenges. Join us for an informative session that explores security strategies for AI agents and other non-human identities. Tune in to learn:On-demand
Watch on-demand
-
Book LaunchIntelligent Access: Strategies for Achieving Least Privilege in the Modern Enterprise
Learn moreOn-demand -
Book LaunchBook Launch: A Practitioner’s Guide to Intelligent Access
Learn moreOn-demand -
WebinarBlackstone’s Approach to Identity Governance with Veza
Learn moreOn-demand -
WebinarIGA and IAM Strategies for Achieving Least Privilege
Learn moreOn-demand -
WebinarBeyond IAM, Meet Identity Security
Learn moreOn-demand -
WebinarWhen Employees Depart: Ensuring access to sensitive data is removed
Learn moreOn-demand
-
WebinarVeza launches Access AI to Deliver Generative AI-Powered Identity Security
Learn moreOn-demand -
WebinarAccess Intelligence in Snowflake: who has access to what?
Learn moreOn-demand -
WebinarState of Access 2024
Learn moreOn-demand -
WebinarPanel Discussion | Future of Identity Security
Learn moreOn-demand -
Book LaunchBook Launch: A Practitioner’s Guide to Intelligent Access
Learn moreOn-demand -
WebinarBlackstone’s Approach to Identity Governance with Veza
Learn moreOn-demand
-
WebinarCISO Identity Fireside: How Genesys, AWS, and Veza Are Reshaping Identity Security
Learn moreOn-demand -
Book LaunchModernizing Identity with Just In Time Access
Learn moreOn-demand -
WebinarState of Access 2024
Learn moreOn-demand -
Book LaunchIntelligent Access: Strategies for Achieving Least Privilege in the Modern Enterprise
Learn moreOn-demand -
Book LaunchBook Launch: A Practitioner’s Guide to Intelligent Access
Learn moreOn-demand -
WebinarNext-Gen IGA
Learn moreOn-demand
