BEGIN:VCALENDAR
VERSION:2.0
X-WR-CALNAME:BrightTALK Event
PRODID:-//BrightTALK//NONSGML BrightTALK Event Calendar//EN
CALSCALE:GREGORIAN
METHOD:REQUEST
BEGIN:VEVENT
UID:https://www.brighttalk.com/webcast/16779/666126
DTSTAMP:20260424T181132Z
ORGANIZER:MAILTO:noreply@brighttalk.com
LOCATION:BrightTALK
URL:https://www.brighttalk.com/webcast/16779/666126?utm_campaign=user_
 webcast_register&utm_medium=calendar&utm_source=brighttalk-transact
DTSTART:20260513T150000Z
DTEND:20260513T154217Z
SUMMARY:Live webcast: Closing the third-party identity gap: Practical 
 strategies to reduce risk and strengthen security
DESCRIPTION:Click here to attend: https://www.brighttalk.com/webcast/1
 6779/666126?utm_campaign=user_webcast_register&utm_medium=calendar&utm
 _source=brighttalk-transact\n\nPresenter: Preetika Srivastava, Senior 
 Manager, KPMG UK   |   Serena Tejani, Partner, KPMG Canada   |   Rober
 t Villegas, Director, KPMG US, Cyber and Tech Risk practice  |   Jaish
 ree Subramania, Sr. Vice President, Product Marketing\n\nAs organizati
 ons expand their digital ecosystems, access is no longer limited to em
 ployees. Partners, contractors, vendors, applications, service account
 s, APIs, and increasingly AI-driven tools such as chatbots now play a 
 critical role in day-to-day operations. While these identities enable 
 speed and innovation, unmanaged third-party and non-human identities h
 ave become one of the fastest-growing sources of cyber risk.\n\nJoin l
 eaders from KPMG and SailPoint for a 45-minute moderated discussion fo
 cused on the evolving identity risk landscape and what organizations c
 an do to better govern access across their extended enterprise. \n\nDu
 ring this session, we’ll cover:\n• Why third-party and non-human ident
 ities are now a top risk driver in identity security\n• Common gaps in
  traditional identity security and IGA programs, particularly around v
 isibility, ownership, and lifecycle management of identities\n• Practi
 cal strategies to improve control and oversight using risk-based prior
 itization, stronger governance models, and automation\n\nWhether you’r
 e establishing or maturing your third-party risk and identity security
  program, this webinar will provide practical insights to help reduce 
 risk, improve accountability, and strengthen your overall security pos
 ture.
SEQUENCE:1778456232
END:VEVENT
END:VCALENDAR
