LIVE WEBINAR

From the IAM Trenches

Navigating Non-Human Identity and IAM Complexity: Lessons from Blue Shield of California

Join Blue Shield of California’s Miguel Furtado and Radiant Logic for a fireside chat tackling the new frontiers of identity management—non-human identities, AI, and orchestrating seamless security at enterprise scale. Get real-world insights, candid lessons, and actionable strategies from leaders managing IAM complexity in today’s fast-moving digital landscape.

  • Wednesday, September 17th, 2025
  • 11:00 AM PST / 2 PM EST
  • Live Webinar

From the IAM Trenches

Navigating Non-Human Identity and IAM Complexity: Lessons from Blue Shield of California

As organizations grapple with increasingly complex environments, including hybrid workforces, rapidly evolving technology stacks, and stringent regulatory pressures, the challenge of delivering secure, scalable, and agile identity and access management (IAM) solutions has never been greater.  

Join us for a fireside chat with Miguel Furtado, Senior Manager for Identity Engineering at Blue Shield of California, as he shares practical experiences and lessons learned from the front lines. Discover how his team addresses IAM complexity for both workforce and customer environments, navigates the unique threats and opportunities of non-human (machine, service, agentic AI) identities, and prioritizes data quality and risk reduction—all while supporting business innovation and integration at scale. 

Key topics to be discussed include: 

  • Delivering Reliable, Secure IAM at Scale: Strategies for supporting hybrid, cloud-first, and highly regulated environments 
  • Managing All Identities as First-Class Citizens: Bringing discipline and security to human and non-human identities, including Agentic AI and machine/service accounts
  • Avoiding Tool Sprawl: Harmonizing best-of-breed solutions through platform integration and workflow orchestration 
  • Balancing Risk, Compliance and Efficiency: Making critical trade-offs amid budgetary and operational constraints 
  • Investing in Data Quality and Observability: Enabling better policy enforcement, security posture, and real-time response with robust identity data

Join us to discover how RadiantOne can simplify one of your toughest IT challenges and accelerate your path to modernization—as it has for leading organizations across every industry. 

Who should attend:
This session is designed for professionals responsible for building, managing, or transforming identity and access management at scale within complex organizations. Recommended for: 

  • Identity & Access Management (IAM) Leaders/Managers 
  • Security Architects or CISOs 
  • IT Operations Directors 
  • Governance, Risk & Compliance (GRC) Professionals 
  • Cloud or DevOps Engineers involved with identity orchestration

Speakers

Wade Ellery

Chief Evangelist and IAM Strategy Officer

Wade Ellery, Chief Evangelist and IAM Strategy Officer with Radiant Logic. Wade has extensive experience in enterprise IT direct and channel software as well as services, sales and management. He has in-depth knowledge and experience in enterprise IAM, IGA, risk and compliance and IT security challenges.

Miguel Furtado

Sr. Manager, Identity Engineering at Blue Shield of California

Miguel Furtado is a senior leader in Identity and Access Management with over 20 years of experience shaping identity security strategies across healthcare, finance, and technology sectors. Passionate about identity-centric security, Miguel has led enterprise-scale identity transformations, driving innovation in IAM engineering, governance, and modern authentication frameworks. With deep expertise in identity integration for mergers and acquisitions, Miguel has played a key role in ensuring seamless identity consolidation, reducing security risks, and enabling scalable, secure access strategies during organizational transitions. A frequent contributor to industry discussions, research, and conferences, Miguel is recognized for bridging technical excellence with business strategy to help organizations build secure, scalable, and user-friendly identity ecosystems. 

Can’t wait to see more? Request a demo.

Let’s explore how an identity security posture management solution can support your specific needs and use cases.