THURSday, August 14th, 2025

Tackling Identity Sprawl to Improve Business Agility, Security and Compliance

5:30pm – 8:00pm CT | Chicago, IL

Event Overview

How do you ensure the integrity of your identity data in a way that enables only authorized identities (people, machines and AI agents) to get access to appropriate data via authorized devices at agreed times in a fast, secure manner, so that the job can be done efficiently while the data remains secure?

Health and financial services sectors share the unenviable experience of their data being under attack like never before, risking critical life or death situations in healthcare and financial loss for the finance sector. They both have the dual mandate of safeguarding information while enabling timely access, and both have to do so within stringent compliance requirements from multiple regulatory bodies. Revenue producers need to be able to quickly access the applications required to perform their job, and in healthcare, not only does the hospital lose revenue if fewer patients are seen, but delayed access can also impact patient care and cause suffering.

One of the factors mitigating against running an efficient, secure and compliant operation: Identity sprawl, which is the uncontrolled growth of identities across your legacy systems, home built platforms/systems, SaaS applications, cloud services and shadow IT. What often begins as a workaround or isolated solution to solve a business problem, ends up with individual users holding multiple accounts across disconnected silos, non-human identities spreading without oversight, and orphaned, stale or duplicate accounts left unmanaged. The result is a tangle of inconsistent identity records, outdated entitlements, and blind spots in governance that directly weaken security, expand the threat surface and jeopardize regulatory compliance. Yet, many security leaders believe their current ecosystem/IAM system is able to address identity sprawl, not recognizing the gaps created by a one-size fits all solutions, or the need for a common threat to form a base to which dedicated tools can be added.

Among the discussion points:

  • What is identity sprawl, and what conditions feed the problem – especially in healthcare and financial services?
  • Why is identity sprawl such a daunting challenge to face?
  • Beyond human identities, what’s your plan to address the new sprawl created by non-human identities – including AI agents?

Request to Attend

By submitting this form you agree to our Privacy & GDPR Statement.

If you have any trouble submitting this form, please send an email to roundtables@ismg-events.com for assistance.

*Please note that this is an invitation-only event and space is limited. All requests to attend will be reviewed by our event staff and approved based on professional qualifications and event capacity. Additionally, these events will not be recorded and the Chatham House Rule will apply.

Join our Events Community ISMG Connect

Continue the conversation with your industry peers

Share your Feedback

Complete a brief 5-minute survey here

Moderator

Erik Hart

Consulting Editor, CISO,

CyberEdBoard

ISMG

 

Wade Ellery

Field Chief Technology Officer and Senior

Technical Evangelist

Radiant Logic

Speakers

This roundtable discussion brings together top security and IAM leaders to discuss Identity sprawl. Join your peers and thought-leaders from event sponsor Radiant Logic to dive into how to unify identity data across critical legacy systems and newer systems, as well as how to help control which users have access to what, to improve overall security posture and ensure audits are successful.

This session will be:

  • Chatham house rules
  • Peer driven
  • Pitch free

Subject matter expert

Wade Ellery

Field Chief Technology Officer and Senior Technical

Evangelist

Radiant Logic

Wade Ellery, Field Chief Technology Officer and Senior Technical Evangelist with Radiant Logic. Wade has extensive experience in enterprise IT direct and channel software, and services, sales and management. He has in-depth knowledge and experience in enterprise IAM, IGA, risk and compliance and IT security challenges.

Exclusive Sneak Peek: Get a Preview of this Roundtable

Venue

Kinzie Chophouse

400 N Wells St Chicago, IL 60654

Underwritten by

Radiant Logic is a leading provider of enterprise identity data management solutions. Their core offering is the RadiantOne Identity Data Platform, which helps large organizations integrate identity data from diverse sources—such as Active Directory, LDAP, and cloud directories—into a unified, logical identity hub. This centralized approach enables improved access control, zero trust architecture, identity governance, and compliance.

Rules of Engagement

By taking part in this discussion you agree that:

  • These events follow Chatham House Rule. Nothing shared will be recorded or distributed anywhere online.
  • If for any reason you need to cancel your reservation, we ask you to let us know 48 hours prior to the event commencing so we can open your seat up to someone else.
  • These are interactive discussions, so we ask that all attendees participate in the discussion. If this is a virtual event, we ask all attendees to join via video.

Upcoming ISMG Events

July 8, 2025

Rethinking Operational Risk Through a Unified Framework

July 16, 2025

AI and Data Risk: Secure Sensitive Information and Build Next-Gen Cybersecurity Strategies

August 7-8, 2025

Cybersecurity Summit: Africa

August 19-20, 2025

Virtual Summit: Cybersecurity Implications of AI, Global

September 11, 2025

Cybersecurity Summit: London Financial Services

Upcoming ISMG Events

July 8, 2025

Rethinking Operational Risk Through a Unified Framework

July 16, 2025

AI and Data Risk: Secure Sensitive Information and Build Next-Gen Cybersecurity Strategies

August 7-8, 2025

Cybersecurity Summit: Africa