Events & Webinars

Front-Row Access to NHI Security Expertise

Maximize Aembit and boost your secure workload access skills with our interactive sessions and event appearances.

Events

Aembit is leading the conversation at Thursday's #SecDays, where our CEO David Goldschlag and CMO Apurva Davé will share how security teams can take control of the growing identity attack surface and manage NHIs at scale.

Upcoming Webinars

Modernizing Workload Identity and Access Control Across Hybrid Windows Environments webinar share image

Modernizing Workload Identity and Access Control Across Hybrid Windows Environments

Learn how leading organizations are modernizing workload identity and access control across hybrid Windows environments. From legacy on-prem systems to Azure, we’ll explore practical strategies for securing non-human identities, unifying IAM, and reducing operational complexity—while maintaining compliance and minimizing risk. Perfect for security leaders, IT managers, and architects navigating hybrid infrastructure transitions.
Access Without Friction: Modern Identity and Secrets Management for DevOps Teams webinar share image

Access Without Friction: Modern Identity and Secrets Management for DevOps Teams

Join Andrew McCormick, former SRE and Security Engineer at Starbucks, and Apurva Dave' from Aembit for a practical conversation on modern access management approaches that prioritize velocity and security. We'll break down real-world patterns and pitfalls across cloud-native environments as well as hard-to-manage on-premise and retail deployments.
Aembit Webinar Series How Snowflake Secures Workload Access: A Practitioner’s Deep Dive into Non-Human Identity Security Share Image

How Snowflake Secures Workload Access: A Practitioner’s Deep Dive into Non-Human Identity Security

The explosion of automated workloads has created a security nightmare: managing non-human identities at scale. Snowflake faced this challenge head-on, and now, Cameron Tekiyeh is sharing their journey. Discover why human identity solutions fail in this context, and learn how they built a robust WIAM strategy that balances security and developer agility. This is your chance to learn from a seasoned practitioner and gain actionable insights into securing your own critical infrastructure.
Securing Snowflake: The Non-Human Identity (NHI) Attack Surface webinar share image

Securing Snowflake: The Non-Human Identity (NHI) Attack Surface

Over 10,000 enterprises trust Snowflake’s cloud-based data platform. Most have built applications using many third-party tools. In this webinar, we’ll discuss how Aembit is deployed by Snowflake to secure cross-boundary access. We’ll share how to transition from long-lived access in code to identity-based, conditional access methods using short-lived, just-in-time access, plus more!
How to Eliminate Credential Risks in CI/CD Pipelines

How to Eliminate Credential Risks in CI/CD Pipelines

Join our webinar to learn how to secure CI/CD pipelines by replacing static credentials with dynamic, short-lived access tokens tied to workload identity. Discover how Aembit simplifies secrets management, prevents breaches, and integrates seamlessly with GitHub and GitLab.
A CISO’s Perspective on Securing Non-Human Identities share image

A CISO’s Perspective on Securing Non-Human Identities

Join former Snowflake CISO and current Aembit CISO Mario Duarte for a live discussion on securing non-human identities across enterprise environments. Learn why static credentials fail and discover practical solutions for workload authentication. Gain insights into non-human vs. human IAM and explore innovative security solutions without compromise.
Ditch Fixed Credentials and Harness the Power of Workload Identity Federation share image

Ditching Fixed Credentials and Harnessing the Power of Workload Identity Federation

Discover how Workload Identity Federation streamlines security for non-human identities. Learn to replace static credentials with just-in-time access using Google, AWS, and Aembit's enhanced security features. Simplify identity management and fortify your cloud security. Join our webinar now!
Discovering LLM API Usage And Protecting Identity and Access webinar share image

The AI Identity Crisis: How to Secure Access for LLMs and Other Emerging Non-Human Identities

Join our webinar to learn how to secure AI workloads and manage non-human identities in LLMs. Discover policy-based controls, strategies to reduce credential risks, and techniques to simplify AI authentication. Gain visibility into AI access and ensure safe, seamless operations.
Survey Says Aembit Webinar

Survey Says: The Current State of Non-Human Identity Security

Join us for a deep dive into the findings of Aembit's 2024 Non-Human Identity Security Report, addressing a critical issue that’s gaining attention in security circles. We’ll unpack the survey data to reveal where organizations like yours may be struggling with their NHI efforts and what steps you can take to bridge the gaps.

On-Demand Webinars

Learn how leading organizations are modernizing workload identity and access control across hybrid Windows environments. From legacy on-prem systems to Azure, we’ll explore practical strategies for securing non-human identities, unifying IAM, and reducing operational complexity—while maintaining compliance and minimizing risk. Perfect for security leaders, IT managers, and architects navigating hybrid infrastructure transitions.
Join Andrew McCormick, former SRE and Security Engineer at Starbucks, and Apurva Dave' from Aembit for a practical conversation on modern access management approaches that prioritize velocity and security. We'll break down real-world patterns and pitfalls across cloud-native environments as well as hard-to-manage on-premise and retail deployments.
The explosion of automated workloads has created a security nightmare: managing non-human identities at scale. Snowflake faced this challenge head-on, and now, Cameron Tekiyeh is sharing their journey. Discover why human identity solutions fail in this context, and learn how they built a robust WIAM strategy that balances security and developer agility. This is your chance to learn from a seasoned practitioner and gain actionable insights into securing your own critical infrastructure.
Over 10,000 enterprises trust Snowflake’s cloud-based data platform. Most have built applications using many third-party tools. In this webinar, we’ll discuss how Aembit is deployed by Snowflake to secure cross-boundary access. We’ll share how to transition from long-lived access in code to identity-based, conditional access methods using short-lived, just-in-time access, plus more!
Join our webinar to learn how to secure CI/CD pipelines by replacing static credentials with dynamic, short-lived access tokens tied to workload identity. Discover how Aembit simplifies secrets management, prevents breaches, and integrates seamlessly with GitHub and GitLab.
Discover how Workload Identity Federation streamlines security for non-human identities. Learn to replace static credentials with just-in-time access using Google, AWS, and Aembit's enhanced security features. Simplify identity management and fortify your cloud security. Join our webinar now!