Modernize IAM for the Age of AI: Simplify and Secure Your Identity Security with Duo
October 15th at 9:00 am PT / 12pm ET
October 15th at 13:00 pm BST
October 15th at 13:00 pm AEST
AI-driven attacks are accelerating identity security growth and system modernization, with rising conversations around protecting the cutting edge of AI work while balancing legacy applications.
It’s no surprise that traditional identity is failing. In over 50% of incidents where attackers targeted MFA deployments, identity and access management (IAM) applications were their first stop after initial compromise to escalate privileges and move laterally with more permissions.
There are two key drivers behind these breaches: outdated protection and complexity.
Outdated Protection: Organizations tend to use older forms of multi-factor authentication (MFA) if they use any at all. They implement protection at login, but not the full identity lifecycle.
Complexity: In 2025, the average enterprise identity spans nearly five separate systems, creating operational friction and expanding the attack surface. On top of that, each systems’ security controls may be different – compounding the problem.
Duo unveiled security-first IAM to protect against advancing attacks on the identity perimeter. See how to defend your users, data, and systems with the most advanced tools available, starting with an identity solution that’s secure by default for the age of AI.
In this webinar, you will learn:
The ways AI can be a double-edged sword in identity security
Actionable top-of-mind and trend insights from IT and cybersecurity leaders
How to set robust, consistent security policy that won’t frustrate your users
How Duo can help make brokering and securing user identity simple from the start
Register to attend our webinar!
Presenter Info
Product Marketing Manager, Cisco Duo
Katherine Yang is a Duo Product Marketing Manager bringing identity security and AI into international markets and partner routes to market. She connects decision-making with data to advocate for simple yet effective cybersecurity practices that work for organizations of all sizes. Although based out of NYC, her heart resides in Michigan (Go Blue!).
Tess is a hacker at heart who enjoys making, breaking, and dissecting every new piece of tech she can get her hands on. When she’s not performing research on authentication data, she’s usually found tuning her antennas towards the stars or writing up the latest malware sent to her inbox. She lives happily with her hacker-in-training and loving partner and can be found knitting when out and about.