Passkeys & Regulations: How Global Policies Are Shaping Enterprise Authentication
Passkeys & Regulations: How Global Policies Are Shaping Enterprise Authentication
Passkeys & Regulations: How Global Policies Are Shaping Enterprise Authentication
What regulators really expect and how enterprises can deliver
As global regulations tighten, the question is no longer whether to adopt passkeys, but how to deploy them at scale while meeting regulatory expectations. Terms like “phishing-resistant MFA” appear increasingly in guidance from NIST, CISA, ENISA, NCSC, and under frameworks such as NIS2 and DORA but their practical meaning is often unclear.
This on-demand session connects regulatory intent with real-world implementation. It explains how passkeys fit into modern IAM and CIAM strategies and how enterprises can move to passwordless authentication without changing application code.
What regulators really expect and how enterprises can deliver
As global regulations tighten, the question is no longer whether to adopt passkeys, but how to deploy them at scale while meeting regulatory expectations. Terms like “phishing-resistant MFA” appear increasingly in guidance from NIST, CISA, ENISA, NCSC, and under frameworks such as NIS2 and DORA but their practical meaning is often unclear.
This on-demand session connects regulatory intent with real-world implementation. It explains how passkeys fit into modern IAM and CIAM strategies and how enterprises can move to passwordless authentication without changing application code.
Get Access to Webinar
Get Access to Webinar
Fill out the form:
Fill out the form:
You’ll learn:
How regulators across the U.S., U.K., and EU define phishing-resistant authentication
What compliance frameworks actually expect in practice, not theory
How passkeys integrate into enterprise IAM and CIAM architectures
How to deploy passwordless authentication without disrupting existing applications
Where passkeys sit in long-term identity and access strategies
You’ll learn:
How regulators across the U.S., U.K., and EU define phishing-resistant authentication
What compliance frameworks actually expect in practice, not theory
How passkeys integrate into enterprise IAM and CIAM architectures
How to deploy passwordless authentication without disrupting existing applications
Where passkeys sit in long-term identity and access strategies
Speakers:
Jeremy Grant
(FIDO Alliance)Sara Caramitti
(Secfense)
Speakers:
Jeremy Grant
(FIDO Alliance)Sara Caramitti
(Secfense)
Watch More:
Watch More:
Use Cases
Secfense Inc.
350 Townsend Street #670, San Francisco, CA 94107, US
Secfense Sp. z o.o.
Dolnych Młynów 3/1 , 31-124 Kraków, EU, VATID: PL6762546545
© Copyright 2025 Secfense. All rights reserved.
Use Cases
Secfense Inc.
350 Townsend Street #670, San Francisco, CA 94107, US
Secfense Sp. z o.o.
Dolnych Młynów 3/1 , 31-124 Kraków, EU, VATID: PL6762546545
© Copyright 2025 Secfense. All rights reserved.
Use Cases
Secfense Inc.
350 Townsend Street #670, San Francisco, CA 94107, US
Secfense Sp. z o.o.
Dolnych Młynów 3/1 , 31-124 Kraków, EU, VATID: PL6762546545
© Copyright 2025 Secfense. All rights reserved.
Use Cases
Secfense Inc.
350 Townsend Street #670, San Francisco, CA 94107, US
Secfense Sp. z o.o.
Dolnych Młynów 3/1 , 31-124 Kraków, EU, VATID: PL6762546545
© Copyright 2025 Secfense. All rights reserved.

