Calendar icon Tuesday, April 1st
Clock icon 08:30 - 14:00 BST

Sit back and relax for an action-packed morning of Workload Identity!

Come and join our exclusive CyberArk Workload Identity Day Zero session, co-located with KubeCon + CloudNativeCon Europe! This single-track event will showcase thinking from the leaders of this rapidly growing space. It will bring together platform engineers, cloud security architects and CTOs to exchange ideas and insights on how to solve identity problems and zero trust security.

What to expect:

  • Identity as the new perimeter
    Learn why identity holds the key to safeguarding your workloads from attacks, leakages and outages.
  • Understand identity challenges
    Uncover the unique factors of increasing workload identity complexity in cloud-native environments and explore how to transform security moving forward.
  • Meet the community
    Meet the leaders shaping workload identity management, exchange notes and to cap it all off, stick around for lunch and networking, where you can relax and reflect on a morning filled with insights, intrigue and innovation.

Prelimenary Agenda*:

08:30 - 09:30
Coffee and pastries
09:30 - 09:45
Welcome & Workload Identity in the Wild (hear from an end-user)
09:45 - 10:15
Keynote: The Past is Prologue: What Workload Identity's History Tells Us About The Future

Sal Kimmich (Independent Cybersecurity Expert)

10:15 - 10:45
Talk 1: Zero-trust Based Workload Identity Solutions for Agentic Platforms

Anjali Telang (Red Hat), Mariusz Sabath (IBM Research), Maia Iyer (IBM Research)

10:45 - 11:00
Break
11:00 - 11:30
Talk 2: (TBD)
11:30 - 12:00
Talk 3: Universal Identities and Secure Seamless Connectivity Across On-premises and Multi-cloud for your Kubernetes Applications

Ram Ramani (AWS), Divyansh Gupta (AWS)

12:00 - 12:30
Closing panel: Workload Identity Strategy in the Enterprise

Moderator: Sal Kimmich (Independent Cybersecurity Expert)

12:30 - 14:00
Lunch and networking

*To view a more detailed break-down of the sessions, please follow the drop-down links below.

The future of workload identity and zero-trust security isn’t a new idea, it’s about finally enforcing first principles that have been proven for decades. From the earliest multi-user systems and cryptographic authentication models of the 1960s to virtualization, federated identity, and workload attestation, every security breakthrough has been a rediscovery of how to verify execution integrity without implicit trust.

We explore the key milestones in workload identity’s evolution, from Needham-Schroeder (1978) and Kerberos (1983) to modern confidential computing (SGX, SEV, CCA) and federated workload identity (SPIFFE, Workload Identity Federation). We’ll break down why zero-trust workloads are a return to these fundamental principles, now made scalable through modern computing.

By the end of this talk, you will have a clear understanding of why zero-trust is not a new paradigm but a return to fundamental security models, and how historical breakthroughs in cryptography and workload isolation shape today’s cloud security.
Agentic workflows have been gaining in popularity and while the industry has been coming to grasp how to adopt these types of patterns, it is essential that secure practices are inherent in the overall design. Answers to questions such as how are the interactions between these systems controlled and managed for human and machine actors, as well as how credentials are handled so that they are stored and properly rotated, must be addressed. Failing to provide answers to each of these questions and more represents a departure from existing research and experience related to zero-trust methodologies.

In this session, we will explore a practical approach to securing agentic workflows, from initial user authentication to machine-to-machine communication across AI agents and tools. Using industry standards like OAuth2 transaction tokens and SPIFFE/SPIRE workload identity, we’ll show how to enforce least privilege and build a production-ready security model for agentic AI.

Expect real-world insights, actionable takeaways, and a deep dive into securing the next generation of AI-driven systems.
You are building containerized applications and are thinking about your universal identity strategy as you set up secure communication between AWS , on-premises, and other cloud environments. End-to-end security requires both authentication and encryption in transit.

In this session, you will learn about using universal identities to connect to AWS and implement comprehensive Encryption in transit for Kubernetes applications using AWS Private CA and cert-manager. We will discuss theory and provide demos.

This session is useful for security engineers and Kubernetes operators looking to enhance their Kubernetes application's security posture while maintaining operational excellence.
We’ve spent the last 30 years relying on firewalls to protect our perimeter. With the rise of multi-cloud, edge computing, and AI agents, the way we think about securing our workloads is rapidly evolving.

In this panel session hear from Enterprise Security leaders, and how they plan to use identity to help them secure the future of their businesses.

Hosts:

Speaker Photo

Matt Barker

VP & Global Head, Workload Identity Architecture, 
CyberArk

Speaker Photo

Mattias Gees

Director of Tech Workload Identity,
CyberArk

  • Cert Manager
  • Spiffe Horizontal

Want to speak?

We have yet to announce speakers, but we’d love for you to mark your calendars, and register for the event below. Are you interested in speaking at the Workload Identity Day Zero event and sharing your experience? If so, send your talk proposal to [email protected].

Location:

We welcome you to East London's Curzon Aldgate cinema, just a few bus stops away from the KubeCon Europe 2025 location.



Directions from KubeCon Europe 2025 (ExCeL) to Curzon Aldgate, and back:

REGISTER NOW!

About CyberArk
CyberArk (NASDAQ: CYBR) is the global leader in identity security, trusted by organizations around the world to secure human and machine identities in the modern enterprise. CyberArk’s AI-powered Identity Security Platform applies intelligent privilege controls to every identity with continuous threat prevention, detection and response across the identity lifecycle. With CyberArk, organizations can reduce operational and security risks by enabling zero trust and least privilege with complete visibility, empowering all users and identities, including workforce, IT, developers and machines, to securely access any resource, located anywhere, from everywhere. Learn more at cyberark.com.