/

Webinar

/

Passkeys & Regulations: How Global Policies Are Shaping Enterprise Authentication

Passkeys & Regulations: How Global Policies Are Shaping Enterprise Authentication

Passkeys & Regulations: How Global Policies Are Shaping Enterprise Authentication

What regulators really expect and how enterprises can deliver

As global regulations tighten, the question is no longer whether to adopt passkeys, but how to deploy them at scale while meeting regulatory expectations. Terms like “phishing-resistant MFA” appear increasingly in guidance from NIST, CISA, ENISA, NCSC, and under frameworks such as NIS2 and DORA but their practical meaning is often unclear.

This on-demand session connects regulatory intent with real-world implementation. It explains how passkeys fit into modern IAM and CIAM strategies and how enterprises can move to passwordless authentication without changing application code.

What regulators really expect and how enterprises can deliver

As global regulations tighten, the question is no longer whether to adopt passkeys, but how to deploy them at scale while meeting regulatory expectations. Terms like “phishing-resistant MFA” appear increasingly in guidance from NIST, CISA, ENISA, NCSC, and under frameworks such as NIS2 and DORA but their practical meaning is often unclear.

This on-demand session connects regulatory intent with real-world implementation. It explains how passkeys fit into modern IAM and CIAM strategies and how enterprises can move to passwordless authentication without changing application code.

Get Access to Webinar

Get Access to Webinar

Fill out the form:

Fill out the form:

You’ll learn:

  • How regulators across the U.S., U.K., and EU define phishing-resistant authentication

  • What compliance frameworks actually expect in practice, not theory

  • How passkeys integrate into enterprise IAM and CIAM architectures

  • How to deploy passwordless authentication without disrupting existing applications

  • Where passkeys sit in long-term identity and access strategies

You’ll learn:

  • How regulators across the U.S., U.K., and EU define phishing-resistant authentication

  • What compliance frameworks actually expect in practice, not theory

  • How passkeys integrate into enterprise IAM and CIAM architectures

  • How to deploy passwordless authentication without disrupting existing applications

  • Where passkeys sit in long-term identity and access strategies

Speakers:

  • Jeremy Grant
    (FIDO Alliance)

  • Sara Caramitti
    (Secfense)

Speakers:

  • Jeremy Grant
    (FIDO Alliance)

  • Sara Caramitti
    (Secfense)