Wednesday, February 12th 2025

Have We Shifted Too Far Left? Engineering, InfoSec, and Customer Identity Ownership

5:30 PM - 8:00 PM ET | New York, NY

Event Overview

Shifting left – integrating security early in the software development lifecycle – is a no-brainer. It cuts costs and provides a more integrated solution than retrofitting security. However, many developers view this added responsibility as a burden, increasing their workload, slowing them down, and distracting them from creating core business product functionality. As a result, it often gets rushed through or pushed to the back of the queue.

For CISOs, the shift-left process can mean losing control over critical security functions, leaving them at the mercy of developers to code everything. This can result in long delays, sometimes lasting months, for the implementation of adaptive MFA, audit logs, regulatory/security policy adjustments, and other measures necessary to prevent breaches.

Control over customer ID management may be seen as peripheral by both groups, yet both have a vested interest in ensuring that software is fit for purpose and does not enable breaches. Implementing a distributed ID management approach can lead to better outcomes for both teams. Each can advance their departmental goals: Infosec gains greater control without relying on developers, while developers experience a reduced workload, enabling them to focus on product development and minimize bottlenecks.

Key Takeaways Include:

  • How can organizations implement shift-left security without overburdening developers or compromising innovation and speed?
  • Which collaborative frameworks are most effective in bridging the gap between InfoSec and development teams?
  • How does distributed identity management address the shared challenges of security and development teams?
  • How can organizations demonstrate the ROI of shift-left practices to gain buy-in from all stakeholders?

Request to Attend

By submitting this form you agree to our Privacy & GDPR Statement.

If you have any trouble submitting this form, please send an email to roundtables@ismg-events.com for assistance.

*Please note that this is an invitation-only event and space is limited. All requests to attend will be reviewed by our event staff and approved based on professional qualifications and event capacity. Additionally, these events will not be recorded and the Chatham House Rule will apply.

Join our Events Community ISMG Connect

Continue the conversation with your industry peers

Share your Feedback

Complete a brief 5-minute survey here

Moderator

 

Sean D. Mack

Consulting Editor, CISO,

CyberEdBoard

ISMG

 

Sagi Rodin

Co-Founder and CEO

Frontegg

Speakers

Join this dynamic roundtable discussion with your peers to discuss the main challenges you face when implementing ID management systems.

This session will be:

  • Chatham house rule
  • Peer driven
  • Pitch free

Subject matter expert

Sagi Rodin

Co-Founder and CEO

Frontegg

Sagi is co-founder and CEO of Frontegg, a customer identity management platform that makes every software product better by untangling identity complexities for builders, users and security teams. Sagi has more than 15 years of experience building innovative and customizable solutions that allow businesses to focus on their core needs and scale quickly. Prior to Frontegg, Sagi was director of cloud security at Check Point Software Technologies, and he has also held multiple CTO positions. Sagi holds a BSc in computer software engineering from Technion-Israel Institute of Technology.

Exclusive Sneak Peek: Get a Preview of this Roundtable

Venue

New York, NY

Venue to be announced

Underwritten by

Frontegg was founded in 2019 by Sagi Rodin (CEO), and Aviad Mizrachi (CTO) with the goal to modernize B2B SaaS user management. While working together at Check Point, they experienced firsthand the wasted engineering effort that went into building the same user management and authentication features that otherwise could’ve been invested in building the core product.

They set out to solve this problem by building a modern, all-in-one user management solution tailor-made for the unique needs of B2B SaaS companies.

Rules of Engagement

By taking part in this discussion you agree that:

  • These events follow Chatham House Rule. Nothing shared will be recorded or distributed anywhere online.
  • If for any reason you need to cancel your reservation, we ask you to let us know 48 hours prior to the event commencing so we can open your seat up to someone else.
  • These are interactive discussions, so we ask that all attendees participate in the discussion. If this is a virtual event, we ask all attendees to join via video.

Upcoming ISMG Events

January 16, 2025

AI-Driven Insights for Asset Visibility and Streamlined Patch Management

January 22, 2025

Mitigate Risks Through Asset Discovery and Compliance Monitoring

January 28, 2025

Are You Ready for DORA? Strengthening Resilience and Achieving Compliance by 2025

January 30, 2025

The Anatomy of Cyber Resilience: What It Is, What It Isn't, Why It Matters, and How to Achieve It

February 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI

Upcoming ISMG Events

January 16, 2025

AI-Driven Insights for Asset Visibility and Streamlined Patch Management

January 22, 2025

Mitigate Risks Through Asset Discovery and Compliance Monitoring

January 28, 2025

Are You Ready for DORA? Strengthening Resilience and Achieving Compliance by 2025