Authentic Talks
Authentic Talks is designed to be a raw, unfiltered space where identity professionals — from analysts to CISOs — speak candidly about their journeys, challenges, and breakthroughs. This isn’t polished marketing. It’s real talk about what’s working, what’s broken, and what’s next.
info_outline
Authentic Women on Security: Bridging Physical Access & Digital Identity
03/06/2026
Authentic Women on Security: Bridging Physical Access & Digital Identity
What does it take to shape identity systems in a world where physical access and digital authentication are converging faster than ever? In Episode 4 of Authentic Talks, host Arielle Slama sits down with two influential voices in identity and security: Natacha Torres, Marketing Lead for HID’s Physical Access Control Solutions business, and Elizabeth Garber, Digital Trust Leader and advisor to global identity nonprofits. Together, they explore human decisions, leadership moments and structural shifts defining the future of identity. The conversation moves beyond architecture and into the lived experience of building systems that determine who gets access—physically and digitally. It is as much about clarity, courage, and representation as it is about trust. Episode Highlights Women shaping the future of identity and security The convergence of physical access control and digital identity Leadership through vulnerability and courage Why representation in standards bodies impacts global security Tenacity as a defining trait for women in cybersecurity Building inclusive pipelines for the next generation of identity leaders Trust as the foundation of secure systems The conversation highlights several themes shaping the identity landscape today. The convergence of physical and digital access Access control is no longer only about doors and badges. It is a combined ecosystem involving authentication flows, user experience, risk management, and trust. Natacha enters these conversations by grounding complex technical topics through clarity and fundamentals. She often emphasizes that leadership sometimes means “refocusing on what actually matters,” especially when identity ecosystems become increasingly layered. Identity technology is inherently political Elizabeth explains that decisions made in identity systems—attributes, authentication requirements, verification flows—directly determine inclusion and exclusion. As she puts it, identity technology “shapes who has access and how rights show up in real life.” Her work in global standards bodies underscores how much representation matters in these spaces. Representation strengthens outcomes Diverse teams reduce blind spots, improve system design, and expand perspectives on risk and user experience. Both guests highlight that representation is not only important socially—it is a security imperative. Leadership requires vulnerability and courage Both Natacha and Elizabeth have navigated environments where they were the only woman in the room. Their stories show how authenticity, clear communication, and tenacity enable them to lead effectively in technical and standards‑driven discussions. The next generation requires intentional support The future of identity depends on a diverse, global, and well-supported talent pipeline. Both guests call for mentorship, community, visibility, and more accessible pathways into identity roles. Representation and leadership in identity Identity and security remain fields where women are still underrepresented, especially in engineering and standards development. Both guests have experienced this firsthand. Natacha spoke about entering the physical access industry with deep marketing and technology experience but limited exposure to the inner mechanics of access control. Instead of letting that limit her impact, she leveraged her strength in clarity and simplification—skills especially valuable as identity systems become more interconnected, and user expectations rise. Her approach reinforces that identity leadership is not defined solely by technical depth, but by the ability to connect technology to human needs. Elizabeth shared her experience joining global standards meetings early in her identity career and often being the only woman present. These rooms shape how systems will interoperate around the world, yet they often lack the diversity needed to represent all populations. Her work with nonprofit organizations aims to widen participation and invite more practitioners into the ecosystem. Both leaders highlight the importance of: authenticity, even when navigating unfamiliar spaces communication that bridges highly technical and highly human domains recognizing where fresh perspectives can add clarity building confidence and visibility for emerging professionals Building the next generation of identity professionals Demand for identity expertise is growing across industries, yet the field is not always accessible to new entrants. Both guests emphasized that the industry needs: stronger global representation, especially from regions often underrepresented in standards work more early‑career exposure to identity concepts mentorship programs that guide professionals into the field community structures that help practitioners find their voice cross‑disciplinary pathways into identity roles Elizabeth’s work with organizations like reflects this vision. Scholarship programs, volunteer opportunities, and professional networks are key to building a more inclusive global identity ecosystem. Natacha reinforced that organizations must create environments where new professionals feel supported. As identity continues to evolve, diverse perspectives will be essential for guiding the industry forward. Across every part of this conversation—technology, leadership, representation, and standards—trust emerged as the unifying theme. Identity systems protect access, safeguard sensitive information, and enable participation in digital life. That responsibility requires both technological rigor and human leadership. The people shaping identity today influence how secure, inclusive, and fair future systems will be. This episode highlights how women in identity are helping steer that future with purpose, clarity, and tenacity. Chapter guide (00:48) Welcome to Episode 4, and celebrating women shaping identity (01:33) Setting the stage: trust, convergence, and why women’s voices matter (05:54) The truth women in identity need to say out loud (09:19) Natacha’s journey into physical access control and finding her voice (16:17) Elizabeth’s path into digital identity, standards, and nonprofit leadership (26:00) Representation, leadership, and being the only woman in the room (33:31) Why identity technology is inherently political (37:26) Building the next generation: diversity, standards, and talent (45:22) Mentors, leadership habits, and superpowers (53:01) Final reflections on trust and tenacity · · Learn about · Explore the · · Follow Why are women important in the identity and security industry? Women bring perspectives that improve how identity systems are designed and governed. Greater representation strengthens inclusiveness and security. What challenges do women face in cybersecurity and IAM? Women remain underrepresented in technical and standards roles. Mentorship and community support help address these gaps. How does diversity improve identity standards? Diverse contributors help shape frameworks that work effectively across cultures, industries, and populations. What is the connection between identity and inclusion? Identity defines access to services, infrastructure, and rights. Inclusive design supports equitable participation. How can the industry support the next generation of women in identity? By investing in mentorship, standards participation, scholarships, and early-career development programs.
/episode/index/show/d8ff5c29-f25a-4a6b-a39b-e1496cc2eb0d/id/40259865
info_outline
Identity at Scale: Authentication Consistency, IAM Modernization & AI Agents
01/29/2026
Identity at Scale: Authentication Consistency, IAM Modernization & AI Agents
In Episode 3 of Authentic Talks, we dive deep into the future of identity architecture, from consistent authentication and Zero Trust principles to the rise of AI agent identities that will reshape modern IAM at enterprise scale Our guest, Jeff Hickman, Head of Customer Engineering at Ory, joins hosts Arielle Slama and Rich Gibson for a fast-moving, deeply practical conversation about building consistent authentication experiences, modernizing legacy IAM, and preparing for a world where human and non-human identities both operate at massive scale. With 15+ years of experience in enterprise identity, cybersecurity, and software engineering for the Fortune 500, Jeff explains how organizations can modernize legacy IAM systems, deliver consumer-grade employee experiences, enforce least privilege, and build the groundwork needed for auditable AI identity systems. Whether you're responsible for identity architecture, Zero Trust programs, IAM modernization, or digital trust strategy — this episode will reshape how you think about scale, governance, and the future of authentication. Episode Highlights Why consistency in authentication is the foundation of digital trust Why employees deserve consumer-grade authentication The hidden challenges of modernizing legacy IAM stacks When organizations should recognize “it’s time to scale” The rise of AI agent identities and the need for new policies What a healthy agent lifecycle should look like The difference between trusted co-worker agents and first-class customer agents Chapter Guide (01:05) Welcome & today’s topic: scaling trust in identity (03:01) Jeff’s “authentic question”: what scaling trust means in one sentence (04:10) Why inconsistent authentication breaks user trust (06:08) How device-to-device experience gaps open the door to phishing (07:57) Modernizing IAM without compromising experience (09:49) Employees vs. consumers: why the standards should match (11:03) Navigating convenience, security and real-world user environments (12:30) When modernization meets legacy systems: scale challenges (14:01) The logistics of MFA, tokens, provisioning and authenticator rollout (18:39) The signals that it’s time to scale your identity program (19:06) AI as a major inflection point for identity architecture (21:52) Agentic identities: trusted coworker vs. first-class customer (23:03) What a healthy agent lifecycle requires (27:54) The economics of trust: short-lived, verifiable, cheap-to-validate access (29:01) The big question: does AI reduce workload or move it? (30:26) The observability crisis in AI-driven authentication (33:34) Compliance readiness—why most organizations aren’t prepared (34:36) The 5 foundational steps for scaling trust with AI agents (41:47) Lightning round: culture, inflection points, and identity myths Featured Guests Jeff Hickman – Head of Customer Engineering, Ory Arielle Slama – Director of Product Marketing, HID Rich Gibson – Director of Strategic Alliances, HID Key Topics • Consistent authentication as a trust anchor • IAM modernization across legacy environments • Scaling identity across hybrid and multi-cloud environments • AI agent identity, authentication, and lifecycle governance • Observability and compliance in AI‑driven security • How least privilege + deny-by-default must evolve for AI • Enterprise passkeys and FIDO2‑based trust Related Resources · - Learn how to choose, deploy, and scale passkeys effectively—with ROI insights backed by the FIDO Alliance. · – Discover how ORY and HID deliver unified physical and digital access with FIDO2 security and enterprise-scale capabilities. · - Stay up to date on the latest in digital identity, authentication, and enterprise security. Consistency in authentication is the foundation of digital trust. When login flows, MFA prompts, or device experiences behave differently, users become more vulnerable to phishing and impersonation attacks. Inconsistent authentication also erodes brand trust and breaks Zero Trust principles by introducing unpredictable access paths. Organizations scaling identity need unified, repeatable authentication journeys across mobile, desktop, cloud, and legacy environments. Identity systems need to scale when there’s a major shift in user behavior or authentication volume—such as hybrid work, mobile-first use, cloud migration, or the introduction of AI agents. Typical triggers include MFA friction, rising service desk tickets, legacy IAM outages, inconsistent authentication experiences, and the inability to onboard or deprovision identities quickly. Scaling identity is essential for Zero Trust maturity and enterprise-wide digital trust. AI agents introduce an entirely new class of identities that interact autonomously with systems, APIs, and data. Unlike human users, AI agents require short-lived credentials, verifiable trust signals, and strict least privilege access. They also create higher authentication volume, require new policies for lifecycle management, and demand stronger observability so organizations can audit what agents did, why they did it, and whether the actions were authorized. The greatest risk is the observability gap. AI agents may authenticate frequently, act autonomously, and make high-impact decisions—yet most enterprises lack the monitoring, reasoning logs, and audit trails needed to understand agent behavior. This creates gaps in compliance, risk scoring, and Zero Trust enforcement. Without agent-level observability, organizations cannot validate intent, detect misuse, or meet audit requirements. Employees expect the same convenience and frictionless experience they get from modern consumer apps. Enterprise IAM modernization—such as passkeys, phishing-resistant MFA, and consistent cross-device authentication—reduces frustration, lowers ticket volume, and improves security adoption. Consumer-grade experiences are no longer optional; they’re required for digital trust and hybrid workforce productivity. How does IAM modernization support scaling trust across legacy systems? Modern IAM platforms standardize authentication, enforce least privilege, and provide centralized policy control—even when organizations still rely on legacy systems. Modernizing IAM helps unify passwordless authentication, enforce consistent MFA, support FIDO2/passkeys, and extend Zero Trust controls across hybrid and multi-cloud environments. It reduces technical debt and eliminates the inconsistent identity flows that compromise trust at scale.
/episode/index/show/d8ff5c29-f25a-4a6b-a39b-e1496cc2eb0d/id/39926865
info_outline
Identity in 2026: Passkeys, AI & Preemptive Security
12/23/2025
Identity in 2026: Passkeys, AI & Preemptive Security
What will identity and access management really look like in 2026? In Episode 2 of Authentic Talks, we explore how identity is evolving from a one-time login control into a continuous trust engine—shaping security decisions across digital and physical environments. Our guest, Brent Vernon, Senior Director of Technology & Product Management at HID Global, joins hosts Arielle Slama and Rich Gibsen for a candid conversation on convergence, passkeys at scale, AI-driven security decisions, and what enterprises are still getting wrong. This episode moves beyond hype to focus on execution: why passkeys work but adoption stalls, how user empathy and operational confidence determine success, and where AI is starting to deliver real value in identity and access management. If you’re responsible for trust, identity, or enterprise security, this episode will challenge how you think about access, risk, and decision-making in a constantly changing threat landscape. Episode Highlights Why “log in once, trust all day” is over The convergence of physical and logical access Moving from “if” to “how” with passkeys in the enterprise How user empathy and operational confidence determine success What CISOs should prioritize heading into 2026 Chapter Guide (1:41) Welcome to 2026 & looking back at 2025 (3:13) Brent’s bold predictions for IAM in 2026 (6:15) What enterprises underestimate in authentication and IAM (8:52) Why deployment and user empathy make or break adoption (12:29) The overlooked role of digital identity validation (IDV) (16:18) Did AI deliver real value in IAM in 2025? (21:02) Key takeaways from Gartner IAM Summit (24:29) Why “log in once, trust all day” is over (27:28) What must happen for passkeys to scale in 2026 (32:04) Preemptive cybersecurity and identity as a live risk signal (37:04) Lightning round: bold takes, wrong predictions, and advice for CISOs Featured Guests Brent Vernon – Senior Director of Technology & Product Management, HID Global Arielle Slama – Director of Product Marketing, HID Rich Gibsen – Director of Strategic Alliances, HID Key Topics • Identity as a continuous trust signal • Passkeys adoption challenges • AI-driven security decisions • Physical and logical access convergence • Preemptive vs. reactive security Related Resources - Learn how to choose, deploy, and scale passkeys effectively—with ROI insights backed by the FIDO Alliance. - Stay up to date on the latest in digital identity, authentication, and enterprise security. FAQ Section What is the future of identity and access management in 2026? Identity management is shifting toward continuous, real-time trust validation across both digital and physical environments. How do passkeys improve enterprise security? Passkeys remove password vulnerabilities, enabling frictionless authentication while strengthening enterprise security posture. What role does AI play in authentication? AI is helping organizations move from reactive defenses to preemptive, trust-based security models. Why is continuous trust critical for cybersecurity? Because the traditional “log in once, trust all day” model no longer holds up against evolving threats. #IdentityManagement #Passkeys #Authentication #Cybersecurity #IAM #DigitalIdentity #EnterpriseSecurity #AIinSecurity #HIDGlobal #AccessControl #PreemptiveSecurity #ConvergedAuthentication
/episode/index/show/d8ff5c29-f25a-4a6b-a39b-e1496cc2eb0d/id/39520630
info_outline
AI and Enterprise Security: Best Friend or Worst Enemy?
12/05/2025
AI and Enterprise Security: Best Friend or Worst Enemy?
Is Artificial Intelligence the ultimate business partner or a hidden risk for enterprises? In Episode 1 of Authentic Talks, we explore the impact of AI on enterprise security, governance, and trust. Learn how AI can drive innovation and efficiency—and why uncontrolled deployment poses serious risks. Our guest, Mark Dallmeier, cybersecurity veteran and author of , shares expert insights on: AI governance frameworks Risk management strategies Building trust in digital identity and authentication Tune in for practical strategies and thought-provoking perspectives to help your organization stay intentional in the age of AI. Jump into the conversation with our hosts Arielle Slama and Rich Gibsen: (1:43) Introducing Mark Dallmeier (3:30) Trust in the Age of AI (6:06) Understanding the Opportunities of AI (7:29) The Biggest Concern in AI Adoption Every Company Should Consider (9:28) Best Practice: The Governance Model of AI (13:56) Resistance to Change and Technology Numbness (17:23) Four Reasons Why IT Projects Fail (22:04) The Adoption Curve of AI and Related Side Effects (28:47) The New Mindset in the Age of AI (33:27) Mark’s Advice to His Younger Self: Core Values vs. Disruptive Technologies (36:35) Mark’s First Identity Tool (37:24) Mark’s Biggest Win During His Career in the Security Field (39:02) Mark’s First Experience with AI ------------------------------- Arielle Slama, Director of Product Marketing, HID Rich Gibsen, Director of Strategic Alliances, HID Mark Dallmeier, Chief Revenue Officer, Envoy Data
/episode/index/show/d8ff5c29-f25a-4a6b-a39b-e1496cc2eb0d/id/39242870