InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

From PAM to NHI Management. How technology is opening up new challenges to securing machine-to-machine access

Presented by

Ryan Frillman, CISO at Equifax Workforce Solutions

About this talk

As businesses increasingly rely on cloud services and external SaaS platforms, managing non-human identities has become more critical than ever. In this webinar, join us as Ryan Frillman, CISO at Equifax Workforce Solutions, explores the security risks associated with cloud-based identity creation and the challenges posed by API-centric services. Learn how the rapid development of cloud technology introduces new vulnerabilities, particularly around the management of credentials embedded within code. Ryan will also discuss the balance between trust and automation in managing these identities, offering insights into best practices for securing machine-to-machine access.
Oasis Security

Oasis Security

1299 subscribers15 talks
Live webinars for humans on mastering non-human identity security
Oasis Security is the market leader in non-human identity management, dedicated to revolutionizing how organizations secure their digital environments. As the first enterprise platform specifically designed for managing and securing non-human identities (NHIs), Oasis addresses the critical and rapidly growing security gap that traditional tools overlook. Our comprehensive solution encompasses the entire lifecycle of NHIs—service accounts, API keys, secrets, and tokens—ensuring robust protection against the unique challenges they pose. Through advanced automation, holistic visibility, and contextual intelligence, Oasis empowers security, identity, and cloud teams to effectively manage NHIs, enhancing enterprise security posture, governance, and compliance.
Related topics