Bob Kalka and Tyler Lynch discuss the challenges of fragmented identity and access management (IAM) in modern cybersecurity, emphasizing the need for a unified “identity fabric” that integrates human and non-human identities using AI to enhance security. They outline key use cases and propose a phased approach—inspect, protect, and govern—to improve identity observability, secrets management, privileged access, and threat detection, ultimately strengthening organizations’ defenses against identity-based cyberattacks.
In this video, Bob Kalka from IBM and Tyler Lynch from HashiCorp discuss the challenges and evolving landscape of identity and access management (IAM) in modern cybersecurity. They highlight a common disconnect in organizations where IT teams manage human identities (workforce and consumer identities), while DevOps or platform engineering teams handle non-human identities such as machine identities and API keys. This separation creates vulnerabilities, as evidenced by the fact that 80% of cyberattacks involve identity in some form. The speakers emphasize the need for a unified approach, which they term an “identity fabric,” that integrates existing tools and augments them with AI capabilities to manage both human and non-human identities cohesively.
The discussion begins with the complexity of managing human identities, where organizations often rely on multiple identity providers and legacy systems that are decades old. These legacy applications frequently lack modern security features like multifactor authentication or passwordless access, relying instead on outdated methods such as hardcoded passwords or SQL tables. This situation is further complicated by hybrid and multicloud environments where identities are managed across various platforms, increasing the attack surface and management complexity.
Non-human identities are categorized into four main types: machine identities, API keys, public key infrastructure (PKI), and AI agents. The rise of AI introduces new identity challenges, as AI agents often act on behalf of human users, requiring careful identity management. The speakers stress that managing these identities alongside human identities is critical for enforcing zero trust policies and minimizing security risks. They illustrate how fragmented identity management leads to security gaps, such as hardcoded secrets and shadow directories, which attackers can exploit.
The video outlines six key use cases that organizations struggle with due to the current fragmented IAM landscape. These include identity observability (detecting shadow identities and risky behaviors), frictionless access (eliminating passwords for smoother and more secure user experiences), centralized secrets management (storing and auditing non-human credentials), dynamic secrets (just-in-time credential creation), privileged access management (PAM) to protect high-risk accounts, and identity threat detection and response (ITDR) to identify and respond to identity-based attacks in real time. These use cases represent critical areas where organizations seek improvement to enhance security and operational efficiency.
To address these challenges, the speakers propose a phased approach starting with “inspect” to discover and inventory secrets and shadow identities, followed by “protect” through centralized secrets management, PAM, and ITDR with behavioral analysis to detect compromised credentials quickly. The final phase is “govern,” focusing on managing the full lifecycle of both human and non-human identities consistently. This comprehensive strategy, supported by an identity fabric that integrates existing tools and AI, aims to improve cybersecurity posture by closing gaps between human and machine identity management and enabling organizations to better defend against identity-related cyber threats.