| 61 | Collision Course: Ethics vs Human-Centered Design in the New Perimeter | Session | Identiverse | Las Vegas | 31-May-2023 | |
| 60 | The Design of Trustworthy Things | Keynote | Identiverse | Denver | 23-Jun-2022 | |
| 59 | Best Practices For Driving Amazing Customer Journeys in a Secure World | Session | Temenos SCALE 2021 | Virtual | 17-Nov-2021 | |
| 58 | Trust Is Not A Bad Word | Session | Identiverse | Denver | 23-Jun-2021 | |
| 57 | MindFul Authentication: Mo’ Factors, No Mo’ Problems? | Panel | Identiverse | Denver | 22-Jun-2021 | |
| 56 | Mission Impossible: Identity Mythos | Session | Identiverse | Virtual | 26-Jun-2020 | |
| 55 | So You Think You Can Two Factor | Session | Identity Week Asia | Singapore | 9-Oct-2019 | |
| 54 | So You Think You Can Two Factor | Session | Identiverse | Washington, DC | 27-Jun-2019 | |
| 53 | So You Think You Can Two Factor | Session | European Identity & Cloud Conference | Munich | 16-May-2019 | |
| 52 | Master Class: IAM at the Center of the Security Equation | Master Class | Know Conference | Las Vegas | 26-Mar-2019 | |
| 51 | Hu: The Missing Element | Session | Identiverse | Boston | 25-Jun-2018 | |
| 50 | The Missing Element | Session | European Identity & Cloud Conference | Munich | 16-May-2018 | |
| 49 | Achieve Balance between Security, Usability and Privacy with Invisible Identity | Session | Japan Identity & Cloud Summit 2017 | Tokyo | 15-Sep-2017 | |
| 48 | Stranger in a Strange Land | Session | Cloud Identity Summit | Chicago | 20-Jun-2017 | |
| 47 | At the Intersection of Security, Innovation and Privacy: Invisible Identity | Session | European Identity & Cloud Conference | Munich | 11-May-2017 | |
| 46 | Invisible Identity, or How to Delight People & Secure Users | Session | Cloud Identity Summit | New Orleans | 6-Jun-2016 | |
| 45 | IDaaS Needs Another ‘S’ for ‘Security’ | Session | European Identity & Cloud Conference | Munich | 12-May-2016 | |
| 44 | Security Challenges in a SaaS-First Era & Why Identity Matters | Webinar | ISC2 Webinar Series | Virtual | 10-Dec-2015 | |
| 43 | Putting Security in Identity-as-a-Service | Session | CA World | Las Vegas | 18-Nov-2015 | |
| 42 | #FAIL No More: The Rise of the Self Defending Enterprise | Session | Cloud Identity Summit | San Diego | 8-Jun-2015 | |
| 41 | What If the Future of Security Means Not Knowing It’s There? | Session | European Identity & Cloud Conference | Munich | 7-May-2015 | |
| 40 | #FAIL No More: From Chief Security Officer to Chief Security Bot | Session | Defrag Conference | Broomfield | 18-Nov-2014 | |
| 39 | Identity Management Is A People Problem (But It Shouldn’t Be!) | Session | Cloud Identity Summit | Monterey | 21-Jul-2014 | |
| 38 | Beyond Attributes: How Identity Provides Contextual Intelligence To Our Digital World | Session | Defrag Conference | Broomfield | 5-Nov-2013 | |
| 37 | IDaaS. The Now Big Thing | Session | Cloud Identity Summit | Napa | 11-Jul-2013 | |
| 36 | The Hitchhikers Guide to Identity: Is Identity the Answer to the Great Question of Life, the Universe, and Everything | Master Class | Cloud Identity Summit | Napa | 8-Jul-2013 | |
| 35 | The IDaaS Powered World, or: How I Learned to Stop Worrying and Love IAM (Again) | Session | Defrag Conference | Broomfield | 15-Nov-2012 | |
| 34 | Ask not what Identity can do for the Cloud, Ask what the Cloud can do for Identity | Session | Cloud Identity Summit | Vail | 18-Jul-2012 | |
| 33 | 2012 Top Security Threats | Webinar | Ping Identity Virtual Forum | Virtual | 15-Mar-2012 | |
| 32 | Reducing your IDM Operating Costs Using IDaaS | Webinar | IDC Webinar | Virtual | 14-Feb-2012 | |
| 31 | And Now For Something Completely Different: Identity Provisioning & The Cloud | Session | Cloud Identity Summit – Local Edition | New York City | 24-Oct-2011 | |
| 30 | And Now For Something Completely Different: Identity Provisioning & The Cloud | Session | Cloud Identity Summit | Keystone | 20-May-2011 | |
| 29 | Identity and Access in the Cloud | Panel | European Identity Conference | Munich | 12-May-2011 | |
| 28 | When Trust is not Enough | Keynote | European Identity Conference | Munich | 11-May-2011 | |
| 27 | Federation: Lessons Learned | Panel | European Identity Conference | Munich | 11-May-2011 | |
| 26 | An Entitlement-Centric Approach to Security | Session | CSO Summit | New York City | 30-Mar-2011 | |
| 25 | Identity Intelligence to Drive Business Objectives | Session | Gartner Identity and Access Management Summit | London | 10-Mar-2011 | |
| 24 | Identity and Access Management – Evolution or Revolution? | Panel | Gartner Identity and Access Management Summit | London | 9-Mar-2011 | |
| 23 | 2011: Information Security Trends for the Next Decade | Panel | Oracle Security Online Forum | Virtual | 24-Feb-2011 | |
| 22 | Oracle and FICAM – Leveraging Smart Cards for Access Control and Information Protection | Session | 4th Annual Federal Forum 2010 | Washington, DC | 20-Oct-2010 | |
| 21 | Oracle Identity Management 11g: A Giant Leap in Identity Management | Session | Oracle Security Inside Out Summit | New York City | 13-Oct-2010 | |
| 20 | Building a Strong Foundation for Your Cloud with Identity Management | Session | Oracle OpenWorld | San Francisco | 22-Sep-2010 | |
| 19 | Beyond SPML: Access Provisioning in a Services World | Session | Burton Catalyst | San Diego | 28-Jul-2010 | |
| 18 | Federated Provisioning and the Cloud | Session | Glue Conference | Denver | 27-May-2010 | |
| 17 | The Next Step of User Provisioning: Identity GRC as a Natural Evolution | Panel | European Identity Conference | Munich | 5-May-2010 | |
| 16 | Why Web Security Standards Must Form the Basis for Cloud Security and What the Identity Industry Should do to Make this Happen | Panel | European Identity Conference | Munich | 5-May-2010 | |
| 15 | Securing the Cloud with Identity Management and Service Oriented Security | Session | Network World’s Security Inside Out Summit | Houston | 3-Feb-2010 | |
| 14 | Securing the Cloud with Identity Management and Service Oriented Security | Session | Network World’s Security Inside Out Summit | Jersey City | 19-Jan-2010 | |
| 13 | Identity Management and the Cloud: Stormy Days Ahead? | Session | Oracle OpenWorld | San Francisco | 12-Oct-2009 | |
| 12 | Identity Services and the Cloud: What Every Enterprise Should Know | Webinar | Kuppinger Cole Webinar | Virtual | 21-Sep-2009 | |
| 11 | Cost-Effective Security and Compliance | Session | Network World’s Security Inside Out Summit | New York City | 19-Aug-2009 | |
| 10 | Identity Services Roundtable: Aligning Vendor Strategies with Customer Needs | Panel | Burton Catalyst | Prague | 23-Oct-2008 | |
| 9 | Building an Identity Services Layer with Oracle Identity Management | Session | Oracle OpenWorld | San Francisco | 24-Sep-2008 | |
| 8 | Lessons learned from Successful Compliance Deployments | Panel | Digital ID World | Los Angeles | 10-Sep-2008 | |
| 7 | Identity: The Ultimate Solution to SOA Security | Panel | InfoWorld SOA Executive Forum | New York City | 8-Nov-2007 | |
| 6 | Rationalize, Centralize, Externalize: Detailing Identity Management in Oracle Fusion Architecture | Session | Oracle OpenWorld | San Francisco | 12-Nov-2007 | |
| 5 | Externalizing Identity | Session | Digital ID World | San Francisco | 25-Sep-2007 | |
| 4 | Understanding Identity As A Service | Session | Jericho Forum | New York City | 11-Sep-2007 | |
| 3 | Developing an Identity Layer for the Secure Enterprise | Session | Collaborate Conference | Las Vegas | 18-Apr-2007 | |
| 2 | The Oracle Identity Services Container: Identity-Enabled Applications Made Easy | Session | Oracle OpenWorld | San Francisco | 26-Oct-2006 | |
| 1 | Role Management and Provisioning: Creating Economies of Scale in Identity Management | Session | Oracle OpenWorld | San Francisco | 25-Oct-2006 | |