Skip to content

Identity Security

Unleashed For The AI Era

Limited Episode Series

Episode 2 Airs December 4th, 12 PM ET / 5 PM GMT

Discover What’s Next in Identity Security

Modern enterprises now manage identities across humans, machines, and increasingly AI agents. As agentic AI gains traction, these systems bring new access patterns and new risks.

Fragmented tools cannot keep pace. Organizations need a modern identity approach that supports the realities of AI-driven environments.

Identity Security: Unleashed for the AI Era is a limited series from Akeyless examining how to extend protection to AI agents while strengthening identity security overall. Hear expert perspectives, see real-world examples, and learn what it takes to secure identity in the age of AI.

Register for Access

Discover What’s Next in Identity Security

Modern enterprises now manage identities across humans, machines, and increasingly AI agents. As agentic AI gains traction, these systems bring new access patterns and new risks.

Fragmented tools cannot keep pace. Organizations need a modern identity approach that supports the realities of AI-driven environments.

Identity Security: Unleashed for the AI Era is a limited series from Akeyless examining how to extend protection to AI agents while strengthening identity security overall. Hear expert perspectives, see real-world examples, and learn what it takes to secure identity in the age of AI.

What You Can Expect

Discover

Learn why the AI era demands a new identity paradigm. Hear how leading organizations are rethinking trust, automation, and control in an AI-driven world.

Apply

Walk away with practical strategies to simplify access and modernize identity security for the next generation of AI-powered systems.

Episode 5 - AI Data Encryption & Key Management

AI agents are changing how data is accessed, encrypted, and exposed. As identity and data security converge, traditional models fall short.

In this session, leaders from Akeyless and Thales unpack how Secretless AI closes a critical gap by preventing AI agents from ever accessing full secrets or encryption keys.

 

What you will learn:

  • Why AI agents are becoming the new insider threat

  • How Secretless AI eliminates key exposure using distributed cryptography

  • How Akeyless and Thales work together to secure encryption keys inside CipherTrust

 
 

Speakers:

Oded Hareven
CEO & Co-Founder, Akeyless

Dr. Conor Mancone
Principal Application Security Engineer, Akeyless

Oded Hareven
CEO & Co-Founder, Akeyless

Speakers

  • Oded Hareven

    Oded Hareven

    Co-Founder and CEO, Akeyless

    Oded, a veteran of the IDF Cyber-Security elite unit, specializes in Identity and Access Management technologies and has held various senior product and project management positions in both enterprise organizations and startups. Among his previous roles were Director of Product Management at Moovit (acquired by Intel) and Senior Project Manager at CA Technologies. Oded holds a BA in Management & Economics from the Open University of Israel.

    Oded Hareven

    Co-Founder and CEO, Akeyless

  • Admiral Mike Rogers

    Admiral Mike Rogers

    Former NSA Director

    Admiral Mike Rogers retired from the U.S. Navy in June 2018 after 37 years of naval service rising to the rank of four-star admiral. He culminated his career with a four-year tour as Commander, U.S. Cyber Command and Director, National Security Agency. During his service in uniform, Admiral Rogers held positions afloat and ashore around the globe focusing on cyber, intelligence, maritime operations and national security.

    Admiral Mike Rogers

    Former NSA Director

  • Richard Barretto

    Richard Barretto

    CISO, Progress

    Richard Barretto serves as Chief Information Security Officer (CISO) at Progress a software company that provides high impact software for 1700+ software companies and 3.5 million developers. Richard leads all aspects of Progress’ enterprise cybersecurity practice, delivering the vision and strategy, and governance against a churning landscape of digital threats.

    Richard Barretto

    CISO, Progress

  • James Azar

    James Azar

    CISO, Artera Services

    James Azar is a cybersecurity practitioner with over two decades of experience in Data security, Privacy, Geo-Politics and cybercrime. James has been featured on Fox, OANN, NBC, AJC and other publications.

    James Azar

    CISO, Artera Services

  • Nibin Philip

    Nibin Philip

    Head of Information & Cyber Security, STP Nuclear Operating Company

    Strategic cybersecurity executive with expertise in building enterprise-wide security programs that protect critical assets, mitigate risk, and enable business operations.

    Nibin Philip

    Head of Information & Cyber Security, STP Nuclear Operating Company

  • Shaul Eldar

    Shaul Eldar

    CISO, Wix

    Shaul Eldar, CISSP, is an experienced professional in the field of information security, currently serving as the Head of Infrastructure Information Security at Wix. Previously, Shaul held the position of Director Information Security at Amdocs and has also worked as CISO and risk analyst at CYMOTIVE Technologies.

    Shaul Eldar

    CISO, Wix

  • Todd Moore

    Todd Moore

    Global VP Data Security Products, Thales

    Todd leads the strategy for enterprise data protection solutions at Thales. He has a deep understanding of security challenges and technologies within the defense industry, and regularly develops strategies for new product development and execution, as well as negotiating strategic relationships and alliances.

    Todd Moore

    Global VP Data Security Products, Thales

  • Lalit Choda

    Lalit Choda

    Founder, NHIM

    With 25+ years of experience, Lalit Choda is a pioneering figure in Non-Human Identity (NHI) Risk Management and the Founder & CEO of NHI Mgmt Group. His expertise in identity security, risk mitigation, and strategic consulting has helped global financial institutions to build resilient and scalable systems.

    Lalit Choda

    Founder, NHIM

  • Eric Fourrier

    Eric Fourrier

    Co-Founder & CEO, GitGuardian

    Eric co-founded GitGuardian, a rapidly growing cybersecurity startup that is dedicated to helping businesses protect their SDLC and software supply chain.

    Eric Fourrier

    Co-Founder & CEO, GitGuardian

  • Suresh Sathyamurthy

    Suresh Sathyamurthy

    CMO, Akeyless

    Suresh Sathyamurthy

    CMO, Akeyless

Episodes

Episode 5

AI-ready encryption and key management, powered by Akeyless + Thales. Learn how to keep every key, fragment, and secret protected and always under your control.

Episode 6

Track the entire life of a certificate, from issuance to automated renewal. Featuring real-world examples of how enterprises use Akeyless CLM to strengthen trust and simplify compliance.​

Episode 7

Managing non-human identities from creation to retirement. Plus preview Akeyless AI Insights, the intelligent assistant that helps uncover and remediate risks in real time.

Episode List

Episode 1

Identity, Intelligence & the Agents Among Us | Keynote: Identity Security for the AI Era

AI agents are exploding across the enterprise, bringing both power and peril to identity security. Oded Hareven maps the new rules for securing non-human identities, then sits down with Admiral Mike Rogers for a candid conversation on how AI is reshaping offense, defense, and security strategy. Dr. Conor Mancone follows with a live demo of Akeyless AI Agent Security.​

Special Guest: Admiral Mike Rogers, Former NSA Director

Episode 2

The Fast & the Federated | The Evolution of Secrets Management to Secretless

Secrets management is evolving fast; from static vaults to secretless, federated access at runtime. Hear how security leaders are rethinking access to deliver spee, agility, and control across every environment.

Special Guests:

Richard Barretto, CISO,Progress
Nibin Philip, Head of Information and Cyber Security, STP Nuclear Operating Company
James Azar, CISO, Artera Services

Episode 3

Vaults of the Multicloud | Unified Governance Across Every Vault

A look at how Multi-Vault Governance brings visibility and policy control to any vault—cloud, hybrid, or on-prem—without breaking existing systems.

Episode 4

Chain of Trust| Automating the Certificate Lifecycle

Track the entire life of a certificate, from issuance to automated renewal. Featuring real-world examples of how enterprises use Akeyless CLM to strengthen trust and simplify compliance.

Episode 5

Mission: Accessible| Modern PAM for the Cloud Era

Inside the modern PAM model built for the cloud era. Discover how teams are replacing VPNs and static credentials with secure, just-in-time access that actually speeds up work.

Special Guest: Shauli Eldar, CISO, Wix

Episode 6

For Your Keys Only| AI Data Encryption & Key Management

AI-ready encryption and key management, powered by Akeyless + Thales. Learn how to keep every key, fragment, and secret protected and always under your control.

Special Guest: Todd Moore, SVP Products,Thales

Episode 7

The Lifecycle Directive| Managing the Full Lifecycle of Non-Human Identities

Managing non-human identities from creation to retirement. Plus preview Akeyless AI Insights, the intelligent assistant that helps uncover and remediate risks in real time.

Special Guests:

Eric Fourrier, CEO, GitGuardian
Lalit Choda, Founder, Non-Human Identity Management Group

Access All Episodes

Access All Episodes