Tuesday, August 26th, 2025

Tackling Identity Sprawl to Improve Business Agility, Security and Compliance

5:30pm – 8:00pm ET | Boston, MA

Event Overview

How do you ensure the integrity of your identity data in a way that enables only authorized identities (people, machines and AI agents) to get access to appropriate data via authorized devices at agreed times in a fast, secure manner, so that the job can be done efficiently while the data remains secure?

Health and financial services sectors share the unenviable experience of their data being under attack like never before, risking critical life or death situations in healthcare and financial loss for the finance sector. They both have the dual mandate of safeguarding information while enabling timely access, and both have to do so within stringent compliance requirements from multiple regulatory bodies. Revenue producers need to be able to quickly access the applications required to perform their job, and in healthcare, not only does the hospital lose revenue if fewer patients are seen, but delayed access can also impact patient care and cause suffering.

One of the factors mitigating against running an efficient, secure and compliant operation: Identity sprawl, which is the uncontrolled growth of identities across your legacy systems, home built platforms/systems, SaaS applications, cloud services and shadow IT. What often begins as a workaround or isolated solution to solve a business problem, ends up with individual users holding multiple accounts across disconnected silos, non-human identities spreading without oversight, and orphaned, stale or duplicate accounts left unmanaged. The result is a tangle of inconsistent identity records, outdated entitlements, and blind spots in governance that directly weaken security, expand the threat surface and jeopardize regulatory compliance. Yet, many security leaders believe their current ecosystem/IAM system is able to address identity sprawl, not recognizing the gaps created by a one-size fits all solutions, or the need for a common threat to form a base to which dedicated tools can be added.

Among the discussion points:

  • What is identity sprawl, and what conditions feed the problem – especially in healthcare and financial services?
  • Why is identity sprawl such a daunting challenge to face?
  • Beyond human identities, what’s your plan to address the new sprawl created by non-human identities – including AI agents?

Request to Attend

By submitting this form you agree to our Privacy & GDPR Statement.

If you have any trouble submitting this form, please send an email to roundtables@ismg-events.com for assistance.

*Please note that this is an invitation-only event and space is limited. All requests to attend will be reviewed by our event staff and approved based on professional qualifications and event capacity. Additionally, these events will not be recorded and the Chatham House Rule will apply.

Join our Events Community ISMG Connect

Continue the conversation with your industry peers

Share your Feedback

Complete a brief 5-minute survey here

Moderator

Tom Field

SVP Editorial

ISMG

 

Akshay Srinivas 

VP of Cybersecurity Strategy & Solutions

Radiant Logic

Speakers

This roundtable discussion brings together top security and IAM leaders to discuss Identity sprawl. Join your peers and thought-leaders from event sponsor Radiant Logic to dive into how to unify identity data across critical legacy systems and newer systems, as well as how to help control which users have access to what, to improve overall security posture and ensure audits are successful.

This session will be:

  • Chatham house rules
  • Peer driven
  • Pitch free

Subject matter expert

Akshay Srinivas 

VP of Cybersecurity Strategy & Solutions

Radiant Logic

Akshay Srinivas is a forward-thinking IT strategist with a deep passion for revolutionizing identity and access management. With extensive experience in designing and implementing large-scale identity ecosystems, his expertise is holistic, spanning identity management, modern authentication solutions, robust identity verification processes, and dynamic risk detection. By leveraging cutting-edge technologies within this ecosystem, Akshay has strengthened organizational security frameworks while driving innovation.

Exclusive Sneak Peek: Get a Preview of this Roundtable

Venue

The Oceanaire Seafood Room

40 Court Street Boston, MA, 02108

Underwritten by

Radiant Logic is a leading provider of enterprise identity data management solutions. Their core offering is the RadiantOne Identity Data Platform, which helps large organizations integrate identity data from diverse sources—such as Active Directory, LDAP, and cloud directories—into a unified, logical identity hub. This centralized approach enables improved access control, zero trust architecture, identity governance, and compliance.

Rules of Engagement

By taking part in this discussion you agree that:

  • These events follow Chatham House Rule. Nothing shared will be recorded or distributed anywhere online.
  • If for any reason you need to cancel your reservation, we ask you to let us know 48 hours prior to the event commencing so we can open your seat up to someone else.
  • These are interactive discussions, so we ask that all attendees participate in the discussion. If this is a virtual event, we ask all attendees to join via video.

Upcoming ISMG Events

July 3, 2025

Agentic AI: The Next Revolution in Intelligent Automation

July 8, 2025

Rethinking Operational Risk Through a Unified Framework

July 16, 2025

AI and Data Risk: Secure Sensitive Information and Build Next-Gen Cybersecurity Strategies

August 7-8, 2025

Cybersecurity Summit: Africa

August 19-20

Virtual Summit: Cybersecurity Implications of AI, Global

Upcoming ISMG Events

July 3, 2025

Agentic AI: The Next Revolution in Intelligent Automation

July 8, 2025

Rethinking Operational Risk Through a Unified Framework

July 16, 2025

AI and Data Risk: Secure Sensitive Information and Build Next-Gen Cybersecurity Strategies