Identity Security ProTalks

Your PAM vault secures human identities perfectly, but can it do the same for the machines? What happens when a workload spins up at 3 AM, lives for 7 minutes, and needs access to production databases? Or when your CI/CD pipeline spawns 1,000 ephemeral workloads that all need different permissions? Now machines outnumber humans 82:1 and credentials need to rotate faster than you can type; traditional PAM becomes unmanageable.
From field experience with enterprise customers, we've identified four critical gaps when organizations try to apply human identity patterns to machines:
This session introduces workload identity fundamentals through the lens of the emerging SPIFFE standard—the universal identity framework underlying CyberArk's Secure Workload Access. You'll learn how trust domains create security boundaries, how attestation proves identity without passwords, and why workload identity isn't just about secrets—it's about knowing who's asking for them.
You will learn how to: