The event is over. See you in the next one.
About this event
As the landscape of Non-Human Identities (NHI) continues to expand, managing and securing these identities has become one of the most pressing challenges for organizations today. With automation and the increasing reliance on machine-to-machine communication, the stakes for securing these entities have never been higher. Did you know that over 80% of cloud breaches involve mismanaged or unauthorized machine identities?
In this webinar, we’ll explore why NHIs are at the heart of modern security strategies and how integrating secrets managers and advanced security tools can mitigate risks and enhance your overall security posture.
Key topics we’ll cover:
Join Lalit Choda, the founder of the NHI management group that now counts 4500+ followers, and Dwayne McDaniel, Senior Developer Advocate at GitGuardian, for an in-depth discussion packed with actionable insights, real-world examples, and strategies for staying ahead in an evolving threat landscape.
We’ll see you on Wednesday, January 22nd—don’t miss this opportunity to strengthen your identity security practices!
Hosted by
Lalit Choda is a recognized leader in Identity and Access Management (IAM) with over 25 years of experience managing global programs focused on Non-Human Identities (NHIs). Known as "Mr. NHI," he is the foremost advocate and thought leader in the industry, addressing the critical risks posed by machine identities in modern cybersecurity landscapes. As the founder of the Non-Human Identity Management Group and a Top-15 Identity Influencer, Lalit has authored numerous white papers and articles, delivered keynotes at leading conferences, and served as an executive advisor on IAM and NHI strategies. Learn more at www.nhimg.org or join the LinkedIn NHI Community Group here.
Security Developer Advocate at GitGuardian Dwayne has been working as a Developer Advocate since 2016 and has been involved in tech communities since 2005.
GitGuardian is a cybersecurity company that offers automated and real-time monitoring to protect businesses from data leaks caused by security breaches through secrets detection on source codes, cloud infrastructures and various platforms. They aim to ...