Trust Every Digital Moment
We believe identity should just work—securely, seamlessly and invisibly—so people can work, shop and live online without a second thought. At Identiverse 2025, we’re bringing big ideas, bold tech and smart people to prove that, with Ping, it’s possible to trust every digital moment.
Visit our Booth #533 | Book a Meeting | Attend an After Party
Whether you’re tackling the toughest identity challenges or just trying to keep pace with a hybrid world, Ping is your partner for all things IAM. From mind-opening keynotes and hands-on demos to deep-dive masterclasses and can’t-miss parties, we’re bringing the hottest tech and the coolest moments. Let’s connect, solve and celebrate trusted digital moments. Together.
Special Offer for Ping Customers!
Register now and receive an additional 20% off your Identiverse pass with code: IDV25-PING20
Hurry! Offer valid only for customers registered by Friday, May 16th.
Where You’ll Find Us—Let’s Talk!
Stop by Booth #533
Our booth isn’t one you’ll want to pass up. Get up close with interactive hands-on demos, chat with identity experts and explore real-world intelligent identity solutions that are powering global enterprises. And the swag? It’s worth the stop alone.
Book a Private Meeting
Ping executives, product leaders and solutions architects will be on hand for one-on-one conversations tailored to your strategy, your stack and your goals. Tell us what’s on your mind, and we’ll match you with an expert who can help. We look forward to meeting you there!
Keynote Address
Date: Tuesday, June 3, 5:00 – 5:25 pm
Speaker: Andre Durand
Title: Founder & CEO, Ping Identity
June 3, 5:00 – 5:25 pm
Andre Durand
CEO and Founder, Ping Identity
June 4, 11:40 am - 12:30 pm | Mandalay Bay I
In 2013, the Cloud Identity Summit (the precursor to Identiverse) hosted the seminal “Hope or Hype?” session, a humorous yet insightful examination of emerging standards like OAuth, OIDC, JOSE, and JWT. The recently late but forever great Vittorio Bertocci described the session as "hilarious & very informative!" in praise that the humbled presenter has aspired to live up to every day since. In tribute to Vittorio, this session will strive to be funny and informative as it takes a retrospective look at the pronouncements made in 2013 and considers similarities to today's hope and hype surrounding wallets and credentials.
Brian Campbell
Distinguished Engineer, Ping Identity
June 4, 11:40 am - 12:30 pm | Breakers L
As the market moves past authentication, how do you make sure that a person or agent is able to perform the transaction they're asking for? Authorization takes center-stage to make sure that Roles \ Policies \ Relationships are enforced throughout the interaction. With the move to Wallet-based interactions, does mere possesion of a verifiable credential mean you can complete the request? With AI - controlling what information is give about your Identity is easier than prompting to constrain what the AI uses.This session explores the role of authorization to ensure that not only do you know who you're dealing with, but they're also allowed to do what they're asking.
Chris Price
Distinguished Sales Engineer, Ping Identity
Nick Wall
Solutions Architect, Ping Identity
June 4, 12:50 pm - 1:05 pm | Tech Theatre 1
Since the Covid-19 pandemic, the world has been undergoing a major transformation. Among the various aspects, one of the most important is the use of technology to inhibit and/or limit as much as possible negative impacts on business operations. The retail segment was heavily impacted by the pandemic, both by the closure of operations due to the lockdown and by fraud in business applications related to consumers. The world was not ready to protect itself. After so many lessons learned from failures, fraud and loss of trust, a strong recovery in the context of information security/cybersecurity has begun. Incredible solutions have been developed to optimize business operations, such as AI. But at the same time, these new solutions are also being used for negative purposes (fraud, ransomware, etc.). At this time, organizations are using new technologies to identify and verify their customers/consumers, protecting not only the business, but also the people who make this business grow. We will present and discuss in more detail these strategies and technological foundations that are placing organizations on a new level of trust with their consumers.
Luciano Johnson
Senior Sales Engineer, Ping Identity
June 4, 2:00 pm - 2:25 pm | Breakers L
As cyber threats evolve, securing workforce identity has become a top priority for financial services organizations. In this session, William "Tripp" Knowles will discuss Raymond James’ journey of implementing visual authentication and verification for workforce users. They embarked on a workforce identity transformation, starting with its customer support team and expanding to thousands of employees.
We will explore the decision-making process for selecting appropriate use cases, the benefits of visual verification, and industry best practices for integrating this technology into a comprehensive IAM program.
But security wasn’t the only goal. The company took a step back and asked, “What is possible here?” This question sparked a journey of agility and innovation, leading to the adoption of a robust identity governance solution that streamlined access control, improved compliance, and enhanced user experience. By balancing trust and security with efficiency, they set the foundation for the future of workforce identity.
Looking ahead, their vision includes verified onboarding, dynamic access management, and seamless user authentication—all designed to enhance security without compromising productivity. Attendees will gain insights into long-term strategies for maintaining and evolving visual authentication solutions to ensure robust security and business enablement.
Tripp Knowles
Director IAM Engineering and Architecture, Raymond James Financial
June 5, 10:30 am - 11:20 pm | Breakers L
For decades, Identity and Access Management (IAM) has been a battlefield of integrations, protocols, and evolving security challenges. SAML, OAuth, SCIM, ABAC, RBAC, etc. we’ve built a complex web of authentication, authorization, and provisioning. Yet, breaches continue, integrations remain rigid, and IAM is often seen as both the gatekeeper and the scapegoat for security failures. But what if the future of IAM didn’t solely rely on these traditional, centralized systems? What if identity itself could be portable, verifiable, and seamlessly interoperable across ecosystems? We are at the dawn of a new era—one where decentralized IAM and identity wallets enable true verified trust. No more brittle integrations or static roles—just dynamic, self-sovereign identities that work anywhere, securely. Join me as I explore this radical transformation in IAM, uncover the building blocks of decentralized identity, and discuss how we can shift from an integration-heavy model to one driven by verified trust and user control. The rebirth of IAM is here—are you ready?
Justin Chin
Director of Government Solutions, Ping Identity
June 5, 10:30 am - 11:20 am | Mandalay Bay H
Join us for a dynamic, no-holds-barred panel where leading IAM product experts from top industry brands go head-to-head, showcasing how customers are evolving their approach to access control in B2B scenarios.
Moderated by Jim McDonald of Identity at the Center, this session blends competition with collaboration as panelists defend their unique solutions and perspectives on the future of Partner IAM. Expect bold insights, friendly jabs, and valuable takeaways from decades of IAM expertise. In the world of B2B-IAM, one size definitely does not fit all./p>
Mark Wilson
B2B IAM GTM Lead and Strategist, Ping Identity
Marco Venuti
IAM Acceleration Director, Thales Group
Jim MacDonald
Founder, Director and Host, Identity At The Center
Dr. Sridhar Muppidi
IBM Fellow & CTO, IBM Security
Jeff Margolies
Chief Product and Strategy Officer, Saviynt
June 5, 11:30 am - 12:20 pm | Breakers L
As artificial intelligence reshapes digital identity, organizations find themselves navigating a fast-changing and often unpredictable regulatory landscape. From the EU’s sweeping AI Act to U.S. state-level efforts and evolving global standards like NIST 800-63 and eIDAS 2, the terrain is shifting—and the path forward isn’t always clear.
This session will provide a strategic overview of key regulations defining the future of identity. We’ll explore what it takes to build trustworthy, compliant systems in an era of deepfakes, biometric data, and global verfication—while maintaining a seamless user experience.
Join us to learn practical insights on how to lasso tomorrow’s compliance challenges, balance risk with usability, and turn governance into a competitive edge. Whether you’re designing origination flows, managing vendors, or adapting AI models, this is your map to navigating the next frontier of digital identity.
Diana Jouard
Senior Product Manager, Ping Identity
June 5, 2:00 pm - 2:25 pm
In an era where seamless travel experiences define customer satisfaction, Delta Air Lines revolutionized its operations by implementing a robust customer identity and authentication platform. This session will explore how the airline leveraged advanced authentication to optimize its loyalty programs and omnichannel interactions, enhancing security, convenience, and engagement across multiple touchpoints.
By integrating a unified identity framework, Delta enabled frictionless interactions from pre-flight services to post-landing experiences. Customers now enjoy seamless authentication when booking flights, checking in, and accessing airport services. Beyond the airport, the airline extended secure identity verification to ground transportation, hotels, and partner services, allowing travelers to move effortlessly between services without repeated logins or authentication challenges.
Additionally, Delta enhanced entertainment experiences across flight layovers, enabling passengers to start content on one flight and resume content on the next flight. This personalized, connected journey strengthens brand loyalty while ensuring security remains a top priority.
Join us as we dive into how advanced authentication technologies are redefining the airline industry, driving seamless travel experiences, increasing engagement, and fostering trust across an interconnected ecosystem of partners and suppliers. Learn how secure identity solutions can transform customer journeys while maintaining privacy and operational efficiency.
Jay Hefferman
General Manager of Identity Management, Delta Airlines
June 5, 4:00 pm - 4:25 pm | Breakers L
As a global leader in hospitality, Marriott International is redefining Customer Identity and Access Management (CIAM) to drive customer engagement, enhance security, and expand its award winning Bonvoy Loyalty program. Seamless and trusted authentication for Bonvoy members accessing services directly and across Marriott’s vast partner network—including airlines, coffee shops, and credit card companies—is essential for providing added value to members, growing Bonvoy enrollment and boosting hotel revenues.
With over 230 million Bonvoy members, Marriott must ensure a secure, scalable, and frictionless experience while simplifying operations for Marriott’s own application owners, developers, and other important internal stakeholders. The challenges lie in balancing and aligning priorities of customers, partners, and the organization itself.
Marriott’s connected travel ecosystem allows Bonvoy members to register and authenticate across multiple partner apps effortlessly. As both user expectations for a seamless experience and security requirements continue to evolve, Marriott plans to enhance its Customer Identity program with innovations that drive even deeper engagement.
Join us as we explore how Marriott International is innovating CIAM to fuel loyalty, growth, enhance security, and create a seamless customer experience—setting a new standard for identity in the travel and hospitality industry.
Rajesh Kandasamy
Vice President, Application Development & Support, Marriott International
June 5, 4:35 pm - 5:00 pm | Mandalay Bay F
"Conversion Rate", "Basket Abandonment", "Targeting"... these are not terms that we have traditionally understood or cared about in the IAM domain, but are of great importance of any product owner looking to increase e-commerce revenue and improve customer retention.
How can we ensure that the IAM solutions we put in place for mass-market consumer brands align with their business goals and "speak the right language" - one that cares more about visitors, profiling and conversion than it does about users, authentication and passkeys?
In this session, we'll explore how user journey orchestration is key to unlocking great expeiences for all users, whether registered or anonymous, while giving the business the analytical data it needs to maximise conversion.
Rob Otto
Field CTO, Ping Identity
June 6, 8:30 am - 8:55 am | Breakers J
Despite significant investments in Identity and Access Management (IAM), many organizations struggle to realize the full potential of their projects. Why do some IAM initiatives succeed while others falter? This session dives into the most common pitfalls of IAM projects—from fragmented architectures and lack of stakeholder alignment to insufficient focus on user experience and operational efficiency.
Drawing on market research, real-world project data, and customer insights, we will examine why IAM projects often fall short of their full potential. Using these learnings, this session offers actionable insights for turning challenges into opportunities. Attendees will gain insight into how to recognize early that their project is off track early and learn strategies to avoid the common pitfalls.
Whether you’re navigating your first IAM initiative or looking to revitalize an existing deployment, this session will provide a candid, research-backed analysis of why IAM projects fail—and how to fix them.
Jason Oeltjen
Vice President, Product Management, Ping Identity
June 4, 7:00 - 9:00 pm
House of Blues B-Side Entrance, Mandalay Bay
Join Ping Identity and our partners at the legendary House of Blues for an unforgettable night of music, craft cocktails and meaningful conversation. Whether you’re closing deals or just cutting loose, this is your moment to relax, recharge and make lasting connections. Because trust isn’t just something we build online—it starts with real people, in real moments.
June 3, 6:30 - 8:00 pm
Sunken Garden at Swingers, Mandalay Bay
Kick off Identiverse 2025 with good drinks, good vibes and even better company. We’re teaming up with Cybersolve and BeyondTrust to bring you a breezy evening of casual networking in the lush Sunken Garden. It’s the perfect spot to chill, meet identity pros, swap ideas and ease into a big week ahead.
Registration Coming Soon!