AuthCon

The Customer Identity Conference

May 14, 2025 | New York

Join us for the first-ever conference to bring Customer Identity and Access Management (CIAM) to the forefront.

To learn about sponsorship opportunities, please reach out to Adriana Gallivan

Header background graphics

Where Modern Product & Engineering Teams Go to ‘Hit Refresh’ on CIAM

Whether you're building it yourself, or just building out your app, this conference will have the networking and content to get you and your team to the next level of authentication!

Join The Next Level of Authentication

It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout. The point of using Lorem Ipsum is that it has a more-or-less normal.

Authcon empty conference room

Featured Speakers

Cheryl Hung
Sr. Director

Arm

Learn more

As an early Kubernetes pioneer and evangelist, I’ve been privileged to meet tens of thousands of people through the cloud native community. I’ll share memorable moments that inspired me, insider information on how to navigate the many projects…

See Agenda
Hannah Sutor
Principal Product Mgr.

Gitlab

Learn more

Having built and maintained homegrown authentication across organizations with varied approaches—from acquisition-driven growth to GitLab's engineering-focused culture— I’ve learned the complexities of identity systems the hard way.

See Agenda
Hirsch Singhal
Staff Product Mgr.

GitHub

Learn more

Implementing mandatory two-factor authentication (2FA) for millions of users presented a unique set of social and technical challenges, balancing supportability, usability, and security.

See Agenda
Heather Flanagan
Executive Director

IDPro

Learn more

Once upon a time, browsers were just windows to the Internet: neutral, passive, and happy to let authentication happen elsewhere. That era is over. Today, browsers are making decisions about…

See Agenda
Mike Ross
Sr. Director of Technologies

Blockchains, Inc.

Learn more

OAuth 2.0 (centralized authentication, authorization) and decentralized identity (DID) both have unique strengths that benefit users. How can we leverage the best of each through OIDC integration?

See Agenda
Michael Gruen
VP of Engineering

Layr

Learn more

Migrating identity and access management for millions of global users is no small feat—especially when it's blocking a larger re-platforming initiative to support rapid growth and GDPR compliance.

See Agenda
Matt Goodrich
Dir. Information Security

Alteryx

Learn more

So, you’re building a SaaS product, and now your customers expect seamless, secure authentication. Sounds simple, right? Until one customer demands OAuth, another insists on SAML, and that big enterprise deal? Oh, they need LDAP over a VPN from 2003.

See Agenda
Topher Marie
Founder

Strata Identity and JumpCloud

Learn more

While CIAM is central to identity strategies, many tools enhance security and coverage. This session explores key solutions that integrate with CIAM for a holistic approach, including:
Workforce IAM – securing employee access, PAM – protecting admin accounts
and much more.

See Agenda
Dan Erez
Lead Architect

ZIM

Learn more

Creating your JSON schema correctly (including JWT schema validation and opaque tokens) and validating it is crucial for preventing errors and security risks. With modern, AI based, approach and tools you can now do it automatically and error free - let me show you how!

See Agenda
Dick Hardt
Founder / CEO

Hello

Learn more

Integrating a B2B SaaS app with the enterprise IAM has been a game of "choose your own adventure" where what is required to be "secure" has been ill defined. The OIDF IPSIE working group was created to standardize best practices for both apps and providers.

See Agenda
Gabriel Manor
VP of DevRel

Permit.io

Learn more

Moving beyond a world where roles define coarse-grained user permissions, modern applications now rely on multiple factors and methods to determine fine-grained permissions.

See Agenda
Shon Urbas
CTO

Pandium

Learn more

OAuth 2 is a protocol celebrated for its intended standardization, yet it’s plagued by inconsistent implementations across various systems. Drawing on unique insights from a platform that streamlines authentication and…

See Agenda
Dan Maher
Sr. DevRel Engineer

Cerbos

Learn more

Authentication and authorization systems have grown from the days of /etc/passwd into a maze of distributed systems across cloud providers and edge locations. This increasing complexity and scale has opened the door to entirely new classes of security incidents.

See Agenda

Register Now to Be a Part of the First-Ever CIAM Conference

It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout.