Archived: Securing third‑party access to disrupt the supply chain attack path
Topics include:
- The anatomy of identity-driven intrusions across third-, fourth-, and Nth-party ecosystems
- Designing scalable IAM strategies for dynamic partner ecosystems
- How to operationalize “Verified Trust” as a detection and response capability
Registration Closed
This event is no longer accepting registrations, but there’s plenty more to explore! Check out all our upcoming and available events.
Browse Events
Using real-world attack patterns and identity compromise scenarios, we'll explore how mismanaged identities, insufficient access policies, and weak verification controls expose organizations to downstream threats. Attendees will learn how to apply end-to-end Identity Lifecycle Protection, from verified onboarding to adaptive MFA and continuous access monitoring, to contain identity risks and prevent attacker progression.
Event Speakers

David Gwizdala is a Senior Sales Engineer at Ping Identity with over a decade of experience bridging the gap between complex technical solutions and real-world business challenges. He specializes in Identity and Access Management (IAM), helping organizations strengthen their digital security postures while streamlining user experiences. David excels at translating intricate IAM concepts into clear, actionable strategies, enabling clients to confidently navigate today’s evolving threat landscape. He is passionate about empowering businesses with robust, scalable, and user-friendly security solutions.

Mark is a recognized leader in B2B IAM with over 25 years’ experience in identity and access management. As Ping Identity’s B2B IAM Go‑To‑Market lead, he helps global enterprises securely scale their partner, supplier, and business customer ecosystems while navigating complex regulatory and operational challenges. A regular speaker at IAM events and forums, Mark is shaping the conversation on securing digital business relationships in an increasingly connected world.

Adrian is an outspoken researcher that doesn’t shy away from uncomfortable truths. He loves to write about the security industry, tell stories, and still sees the glass as half full.
