Let’s make businesses RESILIENT against CYBERSECURITY threats!
Technical Deep Dive: Multi-Tenant IGA Automation with JSM and Microsoft Entra ID
Recently, we implemented a sophisticated Identity Governance and Administration (IGA) workflow that bridges Jira Service...
Meet Resilient Security at CyberSec Europe 2026
This year, Resilient Security will be present at CyberSec Europe, and we would love to...
IGA: a fancy term, but what does it really mean?
IGA fundamentally changes the model. Instead of managing separate accounts, we manage identities...
When custom reporting breaks automation: a One Identity offboarding story
Recently, we solved a complex offboarding challenge in One Identity Manager that required balancing a...
Jonas’ journey: growing with Resilient Security
Jonas’s story starts with curiosity, the same spark that drives many in cybersecurity...
Resilient TALKS – Episode 2: Why Identity Is the New Security Perimeter
In this new episode of Resilient TALKS we sit down with Vincent Appelmans and Michiel...
The state of Identity Governance 2025: key insights for modern organizations
Omada recently surveyed over 500 IT and business leaders to assess the state of IGA...
State of Cyber 2025 Antwerp
Are you an IT manager, security manager, or CISO looking to stay ahead in cybersecurity?...
Resilient TALKS – Episode 1: The Role of Identity in a Changing Threat Landscape
In this first edition of Resilient TALKS, we welcome Matt and Alexandra from Delinea, a...
Load More









