Modern applications are relentlessly targeted by sophisticated attackers who continuously seek vulnerabilities to exploit, and among the most critical is Broken Access Control—a vulnerability that has earned its place as a top concern in the OWASP Top 10. Simultaneously, the emerging risk of Improper Offboarding of Non-Human Identities, identified as NHI1:2025 in the new OWASP Non-Human Identities Top 10, presents an additional challenge. These issues extend far beyond compliance checklists, touching on the very heart of how access is managed across diverse systems. In today’s session, “Securing Access: Leveraging IGA, JIT & Policy Controls to Tackle OWASP Threats,” we delve into these two pivotal areas by exploring the complexities of access management from multiple angles. This 45-minute collaborative presentation, featuring insights from two seasoned industry experts, aims to shed light on both the vulnerabilities inherent in broken access control and the often-overlooked risk posed by lingering, improperly decommissioned non-human identities. Our discussion will draw from extensive industry experience, real-world incidents, and emerging best practices, providing a comprehensive framework for understanding and addressing these critical security challenges. By examining both theoretical frameworks and practical implementations, our session will equip you with the insights necessary to fortify your organization’s security posture effectively. The first part of our session delves deep into Broken Access Control, a vulnerability that continues to plague web applications across industries. Broken Access Control occurs when applications fail to restrict user permissions adequately, allowing unauthorized users to modify requests, access restricted data, or perform actions beyond their privileges. Despite numerous guidelines and best practices, many organizations struggle to implement consistent controls due to legacy system constraints, decentralized management, or simple misconfigurations. For example, there have been incidents where attackers exploited URL manipulation or insecure API endpoints, gaining access to confidential information or administrative functions without proper authorization. In our discussion, we will examine several real-world scenarios that demonstrate how such vulnerabilities have been leveraged by malicious actors. We will analyze the root causes of these breaches, including insufficient validation, over-reliance on manual controls, and the lack of automated oversight. By unpacking these case studies, we will illustrate the tangible impact of Broken Access Control on organizational security and the urgent need for more adaptive and proactive security measures at scale. In response to these pressing challenges, advanced Identity Governance and Administration (IGA) systems have evolved to provide more dynamic and responsive solutions for access management. Rather than serving solely as a compliance tool, modern IGA platforms offer a strategic framework that enables organizations to implement innovative approaches such as Just-In-Time (JIT) access and policy-based controls. JIT access is a dynamic provisioning method that grants temporary permissions based on immediate needs, thereby reducing the window of opportunity for exploitation. Policy-based access control, on the other hand, relies on predefined rules and real-time risk assessments to automatically enforce granular access permissions. These approaches ensure that access rights are continuously reviewed and adjusted according to contextual factors such as user behavior, threat intelligence, and system performance. In our session, we will explore how these dynamic methodologies can be integrated into existing security infrastructures to significantly mitigate the risk of Broken Access Control. By leveraging these innovative techniques, organizations can maintain a more agile and resilient security posture in the face of ever-evolving cyber threats. Our discussion will include practical implementation examples and actionable recommendations for integrating these approaches into existing systems, thereby enhancing overall security effectiveness and operational agility to drive continuous improvement. The second focus of our presentation addresses the critical issue of Improper Offboarding of Non-Human Identities, a risk that has become increasingly significant as organizations expand their use of automated systems, APIs, and service accounts. Non-human identities, unlike their human counterparts, often lack robust oversight once they are no longer actively managed, leading to scenarios where outdated credentials remain active. This failure to decommission or properly revoke access rights creates a hidden vulnerability, providing attackers with an opportunity to exploit orphaned identities and gain unauthorized entry to sensitive systems. Although documented cases specifically highlighting this issue under the label “Improper Offboarding” are limited, numerous security audits and internal reviews have identified orphaned service accounts and API keys as recurring vulnerabilities. In this segment, we will explore the underlying causes of these lapses, including inadequate lifecycle management practices and the absence of automated deprovisioning processes. Our discussion will provide a detailed analysis of how these vulnerabilities can be exploited, along with actionable strategies to ensure that all non-human identities are systematically and securely decommissioned once their role has concluded. We will also discuss how integrating continuous monitoring and automated remediation can significantly reduce the risk posed by orphaned credentials in practice. Recognizing that there is no universal solution to access management challenges, our presentation will explore various approaches to implementing IGA systems that support dynamic access controls. Whether an organization opts for a centralized model, which offers unified oversight and streamlined processes, or a distributed framework that provides flexibility and localized control, the primary objective remains the same: to ensure that access rights are accurately aligned with user needs and risk profiles. Our session will provide an in-depth discussion of the operational challenges inherent in each approach, including integration with legacy systems, scalability issues, and the balance between security and user convenience. We will examine how incorporating techniques such as Just-In-Time access and policy-based controls can enhance overall security by providing granular, context-aware access decisions. Additionally, we will share actionable recommendations for overcoming common obstacles in the deployment and management of IGA systems, ensuring that organizations can adapt their strategies to meet evolving security requirements while maintaining operational efficiency. By drawing on case studies, technical insights, and proven methodologies, we will illustrate how organizations have successfully navigated these challenges and achieved a balanced, secure, and responsive access management framework. Our recommendations are designed to be practical, scalable, and adaptable for success. In conclusion, our 45-minute collaborative session is designed to bridge the gap between traditional access control models and modern, dynamic security solutions. By focusing on the twin challenges of Broken Access Control and Improper Offboarding of Non-Human Identities, we provide a comprehensive analysis that is both technically rigorous and practically relevant. Attendees will gain a deeper understanding of how advanced IGA systems, complemented by strategies such as Just-In-Time access and policy-based controls, can transform the way organizations manage and secure access to critical resources. Our session emphasizes that while the architectural approach can vary, the underlying goal remains to ensure that access is granted only when appropriate and revoked promptly when no longer needed. We will offer actionable insights, real-world examples, and strategic recommendations that empower developers, security professionals, and