About this event
Identity has become the new control plane for security.
As users, devices, workloads, and applications continue to multiply across hybrid and cloud environments, traditional perimeter-based security models are no longer fit for purpose. Disconnected tools and point solutions create blind spots, slow response times, and fragmented visibility.
In this webinar, we explore why Identity Security Mesh thinking is emerging as the foundation of modern security architectures by transforming identity from a standalone control into an intelligent, adaptive layer that connects and orchestrates the entire security stack.
Join us as we examine how leading organisations are placing identity at the centre of their security strategy to enable better visibility, faster detection, and more effective response across today’s complex threat landscape.
By attending this session, you will gain insight into:
This session is presented by:
Stephen Williams - Commercial Development Director, Intragen
Stephen brings over 16 years deep, hands-on experience in Identity and Access Management, having led the technical delivery of enterprise IAM programmes that span Single Sign-On, Identity Management, Multi-Factor Authentication and Privileged Identity Management at scale. His unique blend of consultancy, vendor and customer insights helps organisations demystify why identity matters, what outcomes it enables, and how to turn strategy into reality.
Niall McLoughlin - Client Solutions Director, Intragen
Niall is a seasoned IAM Architect and strategist with more than 20 years’ experience in consulting, delivery management and risk leadership across defence, financial services, government, and commercial sectors. As Client Solutions Director at Intragen, Niall helps organisations translate cyber risk into business-relevant outcomes, embed risk-aware decision-making and shape security programmes that bridge technical controls with governance, operations, and executive priorities — a perspective that elevates identity from an IT project to a strategic security asset