Menu
Sign In Search Podcasts Charts People & Topics Add Podcast API Pricing
Podcast Image

CXOInsights by CXOCIETY

PodChats for FutureCISO: AI alters identity management strategies

15 Sep 2025

Description

In 2025 identity has become the new (security) perimeter, making identity security attacks a primary threat vector for organisations throughout the region. Threat actors are targeting user credentials and privileged access pathways, moving beyond traditional network-based assaults to exploit identities as the weakest link. This is forcing CISOs to re-evaluate their defence-in-depth strategies, with a pronounced focus on securing privileged access management (PAM) as a critical control point. As organisations adopt zero trust architectures, we are seeing just-in-time and just-enough-access privileges As organisations mature in their understanding and use of AI, FutureCISO becoming standard practice. But what about the use of AI in identity management?In this PodChats for FutureCISO, we are joined by Nigel Tan, Delinea’s director of sales engineering in APAC, shares his views on how is AI altering identity and access management strategies?1.       Before we start, give us the 30-second elevator pitch of who Delinea is.2.       How is AI Redefining Identity and Access Management?3.       Please identify emerging AI-driven IAM use cases in Southeast Asia and Hong Kong? 4.       How do you see Agentic AI potentially changing Privileged Access Management (PAM)?5.       We may have covered this in the earlier questions, what are the cybersecurity risks of AI-Enhanced IAM? Please cite 2025 incidents on the same topic.6.       Efforts are underway to come up with regional regulations around AI use. Can we expect something similar around AI in IAM?7.       Can AI improve IAM for hybrid workforces?8.       You mentioned earlier about identity access rights that have become dormant. What role would GenAI/Agentic AI play in identity lifecycle management?9.       Deepfake cases are growing in Asia. How should CISOs prepare for AI-enabled identity fraud?10.   What skills will security teams need for AI-driven IAM? How about endusers?11.   What is the future of AI in IAM for Southeast Asia and Hong Kong?

Audio
Featured in this Episode

No persons identified in this episode.

Transcription

This episode hasn't been transcribed yet

Help us prioritize this episode for transcription by upvoting it.

0 upvotes
🗳️ Sign in to Upvote

Popular episodes get transcribed faster

Comments

There are no comments yet.

Please log in to write the first comment.