Symposiums
Securing NHIs: Service Accounts, RPA and Agentic AI Considerations
Virtual Event
Feb 26, 2026
1:00 PM - 3:30 PM ET
Web Conference
- Build up your knowledge with this tactical, in-depth event experience covering technical/operational topics that matter most to you.
- Get into the weeds with subject-matter experts from IANS Faculty who have been there, done that.
- Receive actionable, unbiased guidance that is free from the influence of vendor agendas.
- Build up your knowledge with this tactical, in-depth event experience covering technical/operational topics that matter most to you.
- Get into the weeds with subject-matter experts from IANS Faculty who have been there, done that.
- Receive actionable, unbiased guidance that is free from the influence of vendor agendas.
80+
Virtual Events Per Year
32
In-Person Events Per Year
20K+
Industry Attendees
Securing NHIs: Service Accounts, RPA and Agentic AI Considerations
Most organizations now grapple with explosive growth in privileged non-human identities (NHIs)—from OS-scoped service accounts and SaaS tokens to RPA bots and agentic AI. Recent incidents show attackers bypassing humans entirely by abusing OAuth and app-to-app integrations to siphon data and cloud keys, underscoring how NHI compromise fuels supply-chain style breaches. This session reframes NHI security around practical lifecycle management and hard-won field lessons. We’ll cut through hype on AI agents to the real work: securing emerging protocols like MCP, tightening SaaS-to-SaaS grants, and balancing priorities between the emerging and legacy pain that still drives risk. Attendees leave with actionable architectures, governance patterns, and controls that reduce NHI blast radius in imperfect, real-world conditions.
- Governance and lifecycle management considerations for NHI accounts, including discovery, provisioning, and monitoring strategies
- Fitting security principles like least privilege and separation of duties to NHIs, particularly those for RPA and AI agents
- Reference architectures and where (and how) to implement controls to secure NHIs
- Adapting and applying identity tooling for NHI, such as ISPM and ITDR
Audience
This event is for IANS clients and invited guests — there is no vendor sponsorship or presence.

*Receive 1 CPE credit for every hour of attendance at our events.
Let your colleagues know you're coming!
