Authentic Talks
Authentic Talks is designed to be a raw, unfiltered space where identity professionals — from analysts to CISOs — speak candidly about their journeys, challenges, and breakthroughs. This isn’t polished marketing. It’s real talk about what’s working, what’s broken, and what’s next.
info_outline
Identity at Scale: Authentication Consistency, IAM Modernization & AI Agents
01/29/2026
Identity at Scale: Authentication Consistency, IAM Modernization & AI Agents
In Episode 3 of Authentic Talks, we dive deep into the future of identity architecture, from consistent authentication and Zero Trust principles to the rise of AI agent identities that will reshape modern IAM at enterprise scale Our guest, Jeff Hickman, Head of Customer Engineering at Ory, joins hosts Arielle Slama and Rich Gibson for a fast-moving, deeply practical conversation about building consistent authentication experiences, modernizing legacy IAM, and preparing for a world where human and non-human identities both operate at massive scale. With 15+ years of experience in enterprise identity, cybersecurity, and software engineering for the Fortune 500, Jeff explains how organizations can modernize legacy IAM systems, deliver consumer-grade employee experiences, enforce least privilege, and build the groundwork needed for auditable AI identity systems. Whether you're responsible for identity architecture, Zero Trust programs, IAM modernization, or digital trust strategy — this episode will reshape how you think about scale, governance, and the future of authentication. Episode Highlights Why consistency in authentication is the foundation of digital trust Why employees deserve consumer-grade authentication The hidden challenges of modernizing legacy IAM stacks When organizations should recognize “it’s time to scale” The rise of AI agent identities and the need for new policies What a healthy agent lifecycle should look like The difference between trusted co-worker agents and first-class customer agents Chapter Guide (01:05) Welcome & today’s topic: scaling trust in identity (03:01) Jeff’s “authentic question”: what scaling trust means in one sentence (04:10) Why inconsistent authentication breaks user trust (06:08) How device-to-device experience gaps open the door to phishing (07:57) Modernizing IAM without compromising experience (09:49) Employees vs. consumers: why the standards should match (11:03) Navigating convenience, security and real-world user environments (12:30) When modernization meets legacy systems: scale challenges (14:01) The logistics of MFA, tokens, provisioning and authenticator rollout (18:39) The signals that it’s time to scale your identity program (19:06) AI as a major inflection point for identity architecture (21:52) Agentic identities: trusted coworker vs. first-class customer (23:03) What a healthy agent lifecycle requires (27:54) The economics of trust: short-lived, verifiable, cheap-to-validate access (29:01) The big question: does AI reduce workload or move it? (30:26) The observability crisis in AI-driven authentication (33:34) Compliance readiness—why most organizations aren’t prepared (34:36) The 5 foundational steps for scaling trust with AI agents (41:47) Lightning round: culture, inflection points, and identity myths Featured Guests Jeff Hickman – Head of Customer Engineering, Ory Arielle Slama – Director of Product Marketing, HID Rich Gibson – Director of Strategic Alliances, HID Key Topics • Consistent authentication as a trust anchor • IAM modernization across legacy environments • Scaling identity across hybrid and multi-cloud environments • AI agent identity, authentication, and lifecycle governance • Observability and compliance in AI‑driven security • How least privilege + deny-by-default must evolve for AI • Enterprise passkeys and FIDO2‑based trust Related Resources · - Learn how to choose, deploy, and scale passkeys effectively—with ROI insights backed by the FIDO Alliance. · – Discover how ORY and HID deliver unified physical and digital access with FIDO2 security and enterprise-scale capabilities. · - Stay up to date on the latest in digital identity, authentication, and enterprise security. Consistency in authentication is the foundation of digital trust. When login flows, MFA prompts, or device experiences behave differently, users become more vulnerable to phishing and impersonation attacks. Inconsistent authentication also erodes brand trust and breaks Zero Trust principles by introducing unpredictable access paths. Organizations scaling identity need unified, repeatable authentication journeys across mobile, desktop, cloud, and legacy environments. Identity systems need to scale when there’s a major shift in user behavior or authentication volume—such as hybrid work, mobile-first use, cloud migration, or the introduction of AI agents. Typical triggers include MFA friction, rising service desk tickets, legacy IAM outages, inconsistent authentication experiences, and the inability to onboard or deprovision identities quickly. Scaling identity is essential for Zero Trust maturity and enterprise-wide digital trust. AI agents introduce an entirely new class of identities that interact autonomously with systems, APIs, and data. Unlike human users, AI agents require short-lived credentials, verifiable trust signals, and strict least privilege access. They also create higher authentication volume, require new policies for lifecycle management, and demand stronger observability so organizations can audit what agents did, why they did it, and whether the actions were authorized. The greatest risk is the observability gap. AI agents may authenticate frequently, act autonomously, and make high-impact decisions—yet most enterprises lack the monitoring, reasoning logs, and audit trails needed to understand agent behavior. This creates gaps in compliance, risk scoring, and Zero Trust enforcement. Without agent-level observability, organizations cannot validate intent, detect misuse, or meet audit requirements. Employees expect the same convenience and frictionless experience they get from modern consumer apps. Enterprise IAM modernization—such as passkeys, phishing-resistant MFA, and consistent cross-device authentication—reduces frustration, lowers ticket volume, and improves security adoption. Consumer-grade experiences are no longer optional; they’re required for digital trust and hybrid workforce productivity. How does IAM modernization support scaling trust across legacy systems? Modern IAM platforms standardize authentication, enforce least privilege, and provide centralized policy control—even when organizations still rely on legacy systems. Modernizing IAM helps unify passwordless authentication, enforce consistent MFA, support FIDO2/passkeys, and extend Zero Trust controls across hybrid and multi-cloud environments. It reduces technical debt and eliminates the inconsistent identity flows that compromise trust at scale.
/episode/index/show/d8ff5c29-f25a-4a6b-a39b-e1496cc2eb0d/id/39926865
info_outline
Identity in 2026: Passkeys, AI & Preemptive Security
12/23/2025
Identity in 2026: Passkeys, AI & Preemptive Security
What will identity and access management really look like in 2026? In Episode 2 of Authentic Talks, we explore how identity is evolving from a one-time login control into a continuous trust engine—shaping security decisions across digital and physical environments. Our guest, Brent Vernon, Senior Director of Technology & Product Management at HID Global, joins hosts Arielle Slama and Rich Gibsen for a candid conversation on convergence, passkeys at scale, AI-driven security decisions, and what enterprises are still getting wrong. This episode moves beyond hype to focus on execution: why passkeys work but adoption stalls, how user empathy and operational confidence determine success, and where AI is starting to deliver real value in identity and access management. If you’re responsible for trust, identity, or enterprise security, this episode will challenge how you think about access, risk, and decision-making in a constantly changing threat landscape. Episode Highlights Why “log in once, trust all day” is over The convergence of physical and logical access Moving from “if” to “how” with passkeys in the enterprise How user empathy and operational confidence determine success What CISOs should prioritize heading into 2026 Chapter Guide (1:41) Welcome to 2026 & looking back at 2025 (3:13) Brent’s bold predictions for IAM in 2026 (6:15) What enterprises underestimate in authentication and IAM (8:52) Why deployment and user empathy make or break adoption (12:29) The overlooked role of digital identity validation (IDV) (16:18) Did AI deliver real value in IAM in 2025? (21:02) Key takeaways from Gartner IAM Summit (24:29) Why “log in once, trust all day” is over (27:28) What must happen for passkeys to scale in 2026 (32:04) Preemptive cybersecurity and identity as a live risk signal (37:04) Lightning round: bold takes, wrong predictions, and advice for CISOs Featured Guests Brent Vernon – Senior Director of Technology & Product Management, HID Global Arielle Slama – Director of Product Marketing, HID Rich Gibsen – Director of Strategic Alliances, HID Key Topics • Identity as a continuous trust signal • Passkeys adoption challenges • AI-driven security decisions • Physical and logical access convergence • Preemptive vs. reactive security Related Resources - Learn how to choose, deploy, and scale passkeys effectively—with ROI insights backed by the FIDO Alliance. - Stay up to date on the latest in digital identity, authentication, and enterprise security. FAQ Section What is the future of identity and access management in 2026? Identity management is shifting toward continuous, real-time trust validation across both digital and physical environments. How do passkeys improve enterprise security? Passkeys remove password vulnerabilities, enabling frictionless authentication while strengthening enterprise security posture. What role does AI play in authentication? AI is helping organizations move from reactive defenses to preemptive, trust-based security models. Why is continuous trust critical for cybersecurity? Because the traditional “log in once, trust all day” model no longer holds up against evolving threats. #IdentityManagement #Passkeys #Authentication #Cybersecurity #IAM #DigitalIdentity #EnterpriseSecurity #AIinSecurity #HIDGlobal #AccessControl #PreemptiveSecurity #ConvergedAuthentication
/episode/index/show/d8ff5c29-f25a-4a6b-a39b-e1496cc2eb0d/id/39520630
info_outline
AI and Enterprise Security: Best Friend or Worst Enemy?
12/05/2025
AI and Enterprise Security: Best Friend or Worst Enemy?
Is Artificial Intelligence the ultimate business partner or a hidden risk for enterprises? In Episode 1 of Authentic Talks, we explore the impact of AI on enterprise security, governance, and trust. Learn how AI can drive innovation and efficiency—and why uncontrolled deployment poses serious risks. Our guest, Mark Dallmeier, cybersecurity veteran and author of , shares expert insights on: AI governance frameworks Risk management strategies Building trust in digital identity and authentication Tune in for practical strategies and thought-provoking perspectives to help your organization stay intentional in the age of AI. Jump into the conversation with our hosts Arielle Slama and Rich Gibsen: (1:43) Introducing Mark Dallmeier (3:30) Trust in the Age of AI (6:06) Understanding the Opportunities of AI (7:29) The Biggest Concern in AI Adoption Every Company Should Consider (9:28) Best Practice: The Governance Model of AI (13:56) Resistance to Change and Technology Numbness (17:23) Four Reasons Why IT Projects Fail (22:04) The Adoption Curve of AI and Related Side Effects (28:47) The New Mindset in the Age of AI (33:27) Mark’s Advice to His Younger Self: Core Values vs. Disruptive Technologies (36:35) Mark’s First Identity Tool (37:24) Mark’s Biggest Win During His Career in the Security Field (39:02) Mark’s First Experience with AI ------------------------------- Arielle Slama, Director of Product Marketing, HID Rich Gibsen, Director of Strategic Alliances, HID Mark Dallmeier, Chief Revenue Officer, Envoy Data
/episode/index/show/d8ff5c29-f25a-4a6b-a39b-e1496cc2eb0d/id/39242870