InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Elevating Enterprise IGA Programs for the Future

Presented by

Todd Thiemann, Principal Analyst | Omdia

About this talk

Identity governance and administration (IGA) programs are critical for managing enterprise security and compliance, yet many organizations face persistent challenges. Operational inefficiencies, reliance on manual processes, and the growing complexity of managing diverse applications and identities often hinder success. As the digital landscape evolves, the stakes are higher than ever for enterprises to modernize their IGA strategies. This session explores the latest research from Omdia, revealing how leading organizations are addressing these challenges. From leveraging AI agents to automating workflows, discover actionable insights that can transform your IGA program into a driver of business value. Whether you’re refining an existing initiative or planning a new one, this session will equip you with the tools and strategies to stay ahead in 2026. Join Todd Thiemann, Principal Analyst at Omdia, to uncover what’s working, what’s not, and where the future of IGA is headed. Takeaways: - Strategies for integrating more applications while controlling costs. - Insights into rationalizing workforce identity security tool portfolios. - The role of AI agents in combating deepfakes and enhancing automation. - Best practices for governing non-human identities (NHIs) and AI agents. - Key trends shaping the future of enterprise IGA programs.
Information Security

Information Security

259568 subscribers736 talks
The latest trends and best practice advice from the leading experts
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.
Related topics