{"id":43919,"date":"2026-02-25T07:45:59","date_gmt":"2026-02-24T23:45:59","guid":{"rendered":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/25\/whats-next-for-ai-identity-in-2026-infosecurity-magazine\/"},"modified":"2026-02-25T07:45:59","modified_gmt":"2026-02-24T23:45:59","slug":"whats-next-for-ai-identity-in-2026-infosecurity-magazine","status":"publish","type":"post","link":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/2026\/02\/25\/whats-next-for-ai-identity-in-2026-infosecurity-magazine\/","title":{"rendered":"What\u2019s next for AI identity in 2026 &#8211; Infosecurity Magazine"},"content":{"rendered":"<p>In 2026, your company won&rsquo;t have just employees and customers&mdash;it&rsquo;ll have hundreds of AI agents acting on their behalf. Some you&rsquo;ll build. Others will just appear. The question is: will you know what they&rsquo;re doing?<\/p>\n<\/p>\n<p>Join Okta&rsquo;s Harish Peri, SVP &amp; GM, AI Security and Accenture&rsquo;s Greg Callegari, Managing Director, Cyber Protection, IAM, for a 20-minute discussion on what&rsquo;s next for AI identity, access, and trust. No slides. No scripts. Just a fast, honest look at the biggest shifts coming to enterprise security as AI agents become part of the workforce.<\/p>\n<\/p>\n<p>Key Takeaways:<\/p>\n<ul>\n<li>Why AI agents need to be treated as first-class identities&mdash;with the same visibility, governance, and guardrails as any human user&nbsp;<\/li>\n<li>How organizations can secure and scale AI innovation across both customer and workforce ecosystems, with identity at the center&nbsp;<\/li>\n<li>What 2026 will look like for security teams balancing speed, compliance, and control in an AI-driven<\/li>\n<\/ul>\n<p><strong><em>Brought to you by <a href=\"https:\/\/www.okta.com\/solutions\/secure-identity\/\">Okta<\/a><\/em><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In 2026, your company won&rsquo;t have just employees a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-43919","post","type-post","status-publish","format-standard","hentry","category--infosecurity-magazine"],"_links":{"self":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43919","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/comments?post=43919"}],"version-history":[{"count":0,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/posts\/43919\/revisions"}],"wp:attachment":[{"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/media?parent=43919"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/categories?post=43919"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nuoya.nuoyayasuo.top\/index.php\/wp-json\/wp\/v2\/tags?post=43919"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}