
Sign up to save your podcasts
Or


Episode Notes:
In late 2025, identity security stopped being a simple checkpoint and became "air-traffic control," a continuous, high-stakes negotiation between humans, machines, and adversaries. Join us as we break down the operational shifts required to survive the new threat landscape of 2026.
In this episode, we cover:
• From Checkpoints to Telemetry: Why the old "prove you are you" model has failed and been replaced by a "living picture of risk" that requires always-on negotiation.
• "Know Your Agent" (KYA): Why autonomous AI software is the newest "user" in your stack and why you must register, fence, and sign their actions just like human employees.
• Deepfakes & SLAs: Moving beyond the demo reel—why effective deepfake defense now requires specific Service Level Agreements (SLAs) for injection attacks and content forensics.
• The Economics of Wallets: The convergence of reusable credentials and EUDI wallets, and the critical question blocking adoption: who pays and who benefits?
• Privacy as a Routing Problem: How top organizations are handling data sovereignty by keeping sensitive data local while moving proofs across borders.
• The 2026 Playbook: A step-by-step order of operations for the coming year, from making agents first-class citizens to engineering trust as a system rather than a slogan.
Don't miss out on these and other essential updates by subscribing to the Identity Insights: The G2 Weekly Podcast. Stay informed about the latest advancements, challenges, and opportunities in identity and biometrics, a critical area for professionals in banking, fintech, insurance, telco, manufacturing, e-commerce, social, and healthcare
Credit and appreciation go to Google's NotebookLM for transforming my identity and biometrics newsletter into an AI-powered audio podcast!
By Ralph A. RodriguezEpisode Notes:
In late 2025, identity security stopped being a simple checkpoint and became "air-traffic control," a continuous, high-stakes negotiation between humans, machines, and adversaries. Join us as we break down the operational shifts required to survive the new threat landscape of 2026.
In this episode, we cover:
• From Checkpoints to Telemetry: Why the old "prove you are you" model has failed and been replaced by a "living picture of risk" that requires always-on negotiation.
• "Know Your Agent" (KYA): Why autonomous AI software is the newest "user" in your stack and why you must register, fence, and sign their actions just like human employees.
• Deepfakes & SLAs: Moving beyond the demo reel—why effective deepfake defense now requires specific Service Level Agreements (SLAs) for injection attacks and content forensics.
• The Economics of Wallets: The convergence of reusable credentials and EUDI wallets, and the critical question blocking adoption: who pays and who benefits?
• Privacy as a Routing Problem: How top organizations are handling data sovereignty by keeping sensitive data local while moving proofs across borders.
• The 2026 Playbook: A step-by-step order of operations for the coming year, from making agents first-class citizens to engineering trust as a system rather than a slogan.
Don't miss out on these and other essential updates by subscribing to the Identity Insights: The G2 Weekly Podcast. Stay informed about the latest advancements, challenges, and opportunities in identity and biometrics, a critical area for professionals in banking, fintech, insurance, telco, manufacturing, e-commerce, social, and healthcare
Credit and appreciation go to Google's NotebookLM for transforming my identity and biometrics newsletter into an AI-powered audio podcast!