Event Overview

NHIs (non-human identities) are hot for a reason. API keys, service accounts, and AI models constitute the largest and fastest-growing part of the identity attack surface. They’re also hard to defend and highly privileged–a recipe for trouble.


To learn what your peers are doing, join the largest NHI-focused conference of the year: NHI Summit 2024. This 3 hour virtual conference on October 30 features an amazing lineup of speakers in a fast-moving agenda. You’ll leave with information you can’t get anywhere else.

Agenda

Rich Dandliker

Welcome

Phil Venables
Tarun Thakur

The Rise of NHIs, featuring Phil Venables

Nicole Perlroth leads the conversation with Phil Venables and Tarun Thakur about the growth of NHIs and how security teams will need to adapt.

Keynote: Kicking Hackers in their Access

Learn what enterprise CISOs are prioritizing (and what they aren’t) with their identity access infrastructure.

Secrets of the NHI Attack

Gertie deconstructs a recent attack that exploited NHIs for privilege escalation, sharing key takeaways for prevention.

Ask the FBI: Current threat landscape for NHIs

Donovan will discuss the current cyber threat landscape, including top threat actors (organized crime, nation states, hacktivists). He’ll also share strategies to collaborate with the government in order to stop incidents, recuperate costs, and limit damage.

Purple Campaign–Live! with Mario Duarte

It’s red team vs blue team, and you’ve got a front row seat. Three security experts present a fictional readout of a purple campaign for a hybrid cloud environment running CI/CD tools. Blue team can reset passwords, but will that be enough to stop the red team? 

The NHI Vendor Landscape

Learn which vendors to watch in the emerging NHI space as Francis shares insights from his recent conversations with security leaders and CISOs.

Securing NHI’s in the cloud with AWS

Harvinder shares best practices for improving identity security posture in your cloud infrastructure.

The 2024 NHI Security Survey

88% of organizations say their non-human IAM practices lag their efforts for human identities. Hear the other key takeaways from Aembit’s security survey.

Agenda is subject to change

Sponsors

Veza is the identity security company. Identity and security teams use Veza to secure identity access across SaaS apps, on-prem apps, data systems, and cloud infrastructure. Veza solves the blind spots of traditional identity tools with its unique ability to ingest and organize permissions metadata in the Veza Access Graph. Global enterprises like Wynn Resorts, and Expedia trust Veza to visualize access permissions, monitor permissions activity, automate access reviews, and remediate privilege violations.

Learn more

Aembit is the non-human identity and access management platform that secures access between workloads across clouds, SaaS, and data centers. With Aembit’s identity control plane, DevSecOps can fully automate secretless, policy-based, and zero trust workload access with MFA-strength capabilities. 

Learn more

Since 2006, Amazon Web Services has been the world’s most comprehensive and broadly adopted cloud. AWS has been continually expanding its services to support virtually any workload, and it now has more than 240 fully featured services for compute, storage, databases, networking, analytics, machine learning and artificial intelligence (AI), Internet of Things (IoT), mobile, security, hybrid, media, and application development, deployment, and management.

Learn more

Register for the 2024 NHI Summit today!