UPCOMING WEBINAR

Agentic Security

Managing agents through IAM

speaker image

Hosted by Jay Kozireski
Vice President, SPS

Date: Thursday, May 14th, 2026

Time: 9:00 AM - 10:00 AM Eastern

  • 00

    Days

  • :
  • 00

    Hours

  • :
  • 00

    Minutes

  • :
  • 00

    Seconds

Featured Speakers:

speaker image

Bob Kalka
Global Leader, IBM Security

About Webinar

The combined value proposition of IBM Verify and HashiCorp Vault centers on creating a unified "identity fabric" that bridges human and machine identity management. This integration secures modern hybrid-cloud environments by centralizing trust across workforce users and automated workloads. 

Unified Value Proposition

  • Integrated Identity Management: By connecting IBM Verify (human identity) with HashiCorp Vault (machine identity), organizations eliminate security silos. This allows for the detection of unusual patterns, such as a human account attempting to call unauthorized service APIs.
  • Adaptive Security for Secrets: IBM Verify provides AI-powered adaptive authentication (e.g., MFA, passkeys) to secure access to HashiCorp Vault, ensuring only verified personnel can manage sensitive secrets.
  • Zero Trust Architecture: Together, they enforce a zero-trust model where every user and machine must be continuously verified. Vault issues short-lived, scoped credentials only after IBM Verify confirms the identity and risk level of the requester. 

     

Core Benefits by Component

IBM Verify (Human Identity & Access)

  • Frictionless Access: Automates risk protection by analyzing user, device, and environmental context to streamline logins for low-risk scenarios and enforce MFA for high-risk ones.
  • Phishing Resistance: Supports Passkeys to eliminate password-based vulnerabilities while improving the user experience.

High ROI: Deployment of IBM Verify has been linked to a significant 619% Return on Investment for enterprise access management. 

HashiCorp Vault (Machine Identity & Secrets)

  • Centralized Secrets Management: Provides a single source of truth for API keys, database credentials, and certificates, preventing "secret sprawl" across distributed systems.
  • Dynamic Credentials: Vault can generate on-demand, time-limited credentials for databases or cloud platforms, automatically revoking them after use to minimize the attack surface.
  • Data Protection: Offers robust encryption-as-a-service, allowing applications to encrypt data in transit and at rest without exposing the underlying keys to developers. 

    HashiCorpHashiCorp +5

Integration Use Cases

  • Secure SSO for Vault Admin: Admins can use their corporate credentials from IBM Security Verify via OIDC or SAML to log into the Vault dashboard, ensuring centralized governance.
  • Privileged Session Management: IBM Verify Privilege Vault can inject credentials directly into tools like PuTTY or RDP sessions, allowing admins to work without ever seeing the raw passwords.
  • Storage Encryption: IBM Storage products (e.g., Ceph or Storage Scale) leverage Vault for KMIP-based key management and server-side
Goals and Objectives

Internal: establish thought leadership with client and generate opportunities for vault and verify

Agenda
  • Four core cyber challenges in Agentic AI
  • How to address those challenges
Who should join
  • CISOs
  • IAM Leaders
  • Developers
  • AI leaders

Webinar Registration