• About
  • Subscribe
  • Contact
Tuesday, April 28, 2026
  • Login
FutureCISO
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
No Result
View All Result
FutureCISO
No Result
View All Result
Home Artificial Intelligence

The strategic imperative of identity management in the AI new normal

by Allan Tan
April 28, 2026
Share on FacebookShare on Twitter

As artificial intelligence permeates workplaces across Asia and globally in 2026, identity and access management (IAM) is no longer a static perimeter defence but a dynamic, intelligent control plane.

The proliferation of AI agents, machine identities and autonomous workflows has forced organisations to rethink how they govern, verify and protect access.

Analyst reports confirm this shift: Gartner’s February 2026 analysis highlights that “agentic AI demands cybersecurity oversight,” noting the rapid adoption of AI agents creates new attack surfaces through unmanaged proliferation and unsecured code.

Similarly, industry observers point to an “explosion” of non-human identities (NHIs), with AI agents, bots and service accounts already outnumbering human accounts in many environments.

Visibility into the AI identity explosion

Organisations in Asia are deploying AI agents at unprecedented scale, yet many lack basic oversight.

Johan Fantenberg, director at Ping Identity, stresses foundational discipline: “As organisations deploy AI agents at scale, it’s critical to first take stock of the machine, workload, and agent identities already operating within the environment. This includes what they have access to, who owns or deploys them, and the permissions and entitlements associated with them. Visibility is key.”

He adds that runtime insight, auditable logs and clarity on delegation—supported by standards like MCP and OAuth 2.0—are non-negotiable.

This perspective aligns with 2026 realities. NHIs, including AI agents, now frequently outnumber human accounts by ratios exceeding 100:1, with some reports citing 144:1. Paul Hanagan, CTO of Conscia UK, notes that non-human identities “are rising significantly, and in most enterprises they already outnumber human users by around three to one.”

Experts at Clarity Security warn that unmanaged AI bots and third-party identities represent common attack vectors, demanding discovery and governance as a priority.

From static checks to continuous verification

Traditional IAM, centred on single sign-on (SSO) and multi-factor authentication (MFA), was built for human-paced interactions. In the agentic era, point-in-time authentication fails.

Fantenberg explains: “Many identity platforms are still primarily focused on SSO and MFA, which were designed for a different era. These systems now need to evolve to support continuous verification, not just for human users but also for non-human identities (NHIs) such as workloads, services, and AI agents.” Point-in-time checks decay quickly amid changing contexts.

Gartner’s 2026 Predicts for IAM emphasise that human and machine identities have become the primary attack surface, urging leaders to enhance visibility and intelligence for real-time decision-making. Optimal IdM’s analysis of 2026 trends describe Zero Trust maturing into continuous, context-aware verification with dynamic privilege adjustments based on real-time risk.

Combating AI-powered fraud and deepfakes

Asia has witnessed a 200%+ surge in AI-driven fraud and deepfake attacks. Fantenberg advocates strengthening controls at high-risk points: “Strong identity verification is also vital at high-risk touchpoints such as account recovery… Modern verification should combine robust identity proofing, passive liveness detection, and ongoing user education.”

Supporting this, observers reports that agentic AI is reshaping IAM strategies, with buyers prioritising phishing-resistant methods to counter credential abuse and impersonation. Saviynt’s 2026 Identity Security Trends & Predictions highlight that bad actors are increasingly targeting AI identities, making identity the central strategy for cybersecurity.

Related:  AISP to address growing security challenges from AI use

Governance in the shadow of AI adoption

Rushed AI deployments often bypass governance. Fantenberg urges collaborative policy-making: “Many organisations are developing policies to guide AI adoption. However, the reality of shadow AI means these policies are most effective when created collaboratively across the business… Security, risk, IT, lines of business, and the board all need to be actively involved.”

AI agents require real-time lifecycle management mirroring human JML processes: “AI agents may exist for only seconds, or less, but during that brief window the appropriate identity controls, policies, and governance must still be applied and evaluated in real time.”

Forrester’s Predictions 2026 stress that governance gaps could lead to agentic AI breaches, recommending MCP for secure collaboration and human capital management platforms to treat digital employees as part of the workforce. AI raises new governance questions, urging organisations to treat IAM as a holistic practice rather than isolated products.

The identity fabric across clouds

Hybrid and multi-cloud environments exacerbate identity sprawl. Fantenberg advocates a unified approach: “An identity fabric needs to be unified so that the identity controls and governance can be applied across deployment topologies and architectures. The identity fabric needs to become the unified control plane for all your identity types.”

Practical steps include provisioning across on-premise and SaaS, full IGA reach and single-pane visibility. He adds: “Creating an identity fabric doesn’t need to be a rip and replace project… adding identity fraud detection (e.g., bot detection) can be done without having to replace an existing access management solution.”

Identity fabric addresses sprawl through cloud-native orchestration, enabling SSO, MFA and governance in one platform. Gartner recommends modernising identity governance and extending controls into AI deployments to scale adoption safely.

The passwordless push

Phishing-resistant authentication is accelerating. Fantenberg reports positive momentum: “Yes, we are seeing a growing adoption of phishing-resistant authentication methods such as passkeys and biometrics.”

He says these approaches significantly strengthen security while also delivering a far better user experience.

Johan Fantenberg

“In mobile-first regions like Asia, we can expect rapid uptake of hardware-backed authentication methods, including passkeys, cryptographically bound devices, verifiable credentials, and digital identity wallets.” Johan Fanterberg

By 2026, passwordless is mainstream, driven by AI-amplified phishing and the superior user experience of biometrics and passkeys. Privacy-preserving biometrics with server-side protections are particularly valued for account recovery and human-in-the-loop approvals in e-commerce.

First-class identities in the Fabric

Agentic AI—autonomous agents acting independently—requires treating machines as equals to humans in the identity ecosystem. Fantenberg notes: “We are still in the early stages of agentic AI, with frameworks and protocols such as MCP, A2A, and AP2 continuing to emerge.”

He acknowledges that many organisations have already deployed agents in customer-facing roles, like support chatbots, as well as within back-office operations, though the identity controls governing these systems are often still basic or proprietary.

“AI agents and their identities must be treated as first-class identities within the enterprise identity fabric, governed and managed alongside customer, citizen, workforce, and partner identities.” Johan Fantenberg

Emerging standards like MCP and OAuth 2.0 provide the foundation, while governance frameworks ensure integration with enterprise policies. This mirrors Gartner’s call for robust controls on AI agents and aligns with predictions that agentic AI will reshape IAM governance entirely in 2026. Astrix echoes the need for discovery and governance of shadow AI agents.

Related:  Runtime identity standard to govern AI Agents

Dynamic friction in real-time

Organisations are moving beyond static rules. Fantenberg confirms capability exists: “Absolutely, many organisations have modern identity fabrics deployed and augmenting them to integrate with providers of real-time risk signals can be straightforward… The trick is to analyse a large number of signals in real-time as well as adjust policies dynamically. Leveraging AI can help here.”

This is supported by broader trends towards AI-driven adaptive access, as noted in IDMworks’ 2026 analysis, where machine learning enables real-time threat countering.

Ecosystem collaboration, including shared signals frameworks from the OpenID Foundation, is accelerating, particularly among financial services and telcos in Asia.

Third-party and supply-chain risks

B2B identities often lag in governance. Fantenberg observes: “Enterprises are increasingly recognising that their B2B identity environments can represent a significant risk… Strengthening governance for B2B identities allows organisations to apply appropriate security measures across business and supply chain partner access.” Robust verification and biometrics are eliminating shared accounts and enhancing accountability.

Gravitee’s State of AI Agent Security 2026 Report highlight that only 14.4% of AI agents deploy with full security approval, amplifying supply-chain vulnerabilities.

Coaching AI agents: The human touch

Securing AI demands skilled human oversight. Fantenberg likens it to training employees: “AI agents will need close supervision, particularly in the early stages as they learn the business—much like coaching a human trainee… Human supervisors also need secure ways to refine and improve agent behaviour through human-in-the-loop (HITL), retrieval-augmented generation (RAG), and reinforcement learning from human feedback (RLHF) processes.”

Strong identity controls around data, models and interventions ensure explainability, auditability and trust. Gartner’s Alex Michaels reinforces this: “To realise the full potential of AI in security operations, cybersecurity leaders must prioritise people as much as technology,” advocating human-in-the-loop frameworks.

All this suggests that 2026 is the year IAM evolves from gatekeeper to enabler in the AI workplace. As Fantenberg’s insights illustrate, success lies in visibility, continuous verification, unified fabrics, passwordless methods and treating AI agents as first-class citizens.

Organisations embracing these practices—backed by standards, collaboration and human-centric governance—will not only mitigate risks but unlock the full potential of agentic AI. identity is the new battleground, and proactive, intelligent IAM is the winning strategy.

Tags: agentic AIMFAPing IdentitySSO

Allan Tan

Allan is Group Editor-in-Chief for CXOCIETY writing for FutureIoT, FutureCIO and FutureCFO. He supports content marketing engagements for CXOCIETY clients, as well as moderates senior-level discussions and speaks at events. Previous Roles He served as Group Editor-in-Chief for Questex Asia concurrent to the Regional Content and Strategy Director role. He was the Director of Technology Practice at Hill+Knowlton in Hong Kong and Director of Client Services at EBA Communications. He also served as Marketing Director for Asia at Hitachi Data Systems and served as Country Sales Manager for HDS’ Philippines. Other sales roles include Encore Computer and First International Computer. He was a Senior Industry Analyst at Dataquest (Gartner Group) covering IT Professional Services for Asia-Pacific. He moved to Hong Kong as a Network Specialist and later MIS Manager at Imagineering/Tech Pacific. He holds a Bachelor of Science in Electronics and Communications Engineering degree and is a certified PICK programmer.

No Result
View All Result

Recent Posts

  • The strategic imperative of identity management in the AI new normal
  • Delinea: 95% of Singapore firms relaxed identity controls for AI
  • CrowdStrike unites industry around AI‑driven vulnerability gap
  • PodChats for FutureCISO: The weak link CISOs can’t ignore in 2026
  • Only 5% of firms fully trust their cybersecurity vendors

Categories

  • AI and Machine Learning
  • Artificial Intelligence
  • Blogs
  • CHRO
  • CISO
  • CISO strategies
  • Cloud, Platforms and Ecosystems
  • Cloud, Virtualization, Operating Environments and Middleware
  • Compliance and Governance
  • Compliance and Governance
  • Compliance and Governance|People
  • Compliance and Governance|Technology
  • Computer, Storage, Networks, Connectivity
  • Culture and Behaviour
  • Culture and Behaviour|People
  • Cyber risk management
  • Cyber risk management
  • Cyberattacks and data breaches
  • Cybersecurity careers
  • Cybersecurity careers
  • Cybersecurity operations
  • Cybersecurity operations
  • Data Protection
  • Data Protection
  • Endpoint Security
  • Future Workplace
  • FutureCISO
  • Governance, Risk and Compliance
  • Governance, Standards and Regulations
  • HR, education and Training
  • Incident Response
  • IT-OT integration
  • Network Security
  • Operations
  • People
  • Process
  • Remote work
  • Resources
  • Risk Management
  • Risk Management
  • Security
  • Tactics and Strategies
  • Technology
  • Training and awarenes
  • Videos
  • Vulnerabilities and threats
  • Vulnerabilities and threats
  • Webcasts/Podcasts
  • Webinars and PodChats
  • White Papers

Strategic Insights for Chief Information Officers

FutureCISO serves the interests of the Chief Information Security Officer (CISO) and the information security profession. Its purpose is to provide relevant and timely industry insights around all things important to security professionals and organisations that recognize and value the importance of protecting the organisation’s data and its customers’ privacy.

Cxociety Media Brands

  • FutureIoT
  • FutureCFO
  • FutureCIO

Categories

  • Privacy Policy
  • Terms of Use
  • Cookie Policy

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl

Login to your account below

or

[wpli_login_link]

Not a member yet? Register here

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
No Result
View All Result
  • People
  • Process
  • Technology
  • Resources
    • White Papers
    • PodChats
  • Events
  • Login

Copyright © 2024 Cxociety Pte Ltd | Designed by Pixl