Join Saviynt for an Exclusive VIP Roundtable Lunch

Uncover the next frontier of identity governance: the rise of non-human identities.

On 12th February 2026, join a select group of CISOs and identity leaders for a confidential, Chatham House–style discussion hosted by Saviynt, the leader in converged identity governance and cloud security.

Over an intimate lunch, we’ll examine how bots, service accounts, and machine identities have quietly become the largest and least governed user group within organisations. Expect open dialogue, shared lessons, and new ideas on how identity programs can evolve to secure this hidden workforce.

A rare opportunity to connect, exchange insights, and help shape the next chapter of modern identity.

Location and Date:

Auckland:
12th February 2026
Location: Botswana Butchery
Time: 12:30 - 3:00pm

Guest Speakers

Leigh Doddy - Regional CTO Saviynt​

1742364810041

Leigh Doddy
Principal Solutions Strategist, Saviynt

With over 20 years of experience across security, fraud prevention, and identity management, Leigh Doddy is a trusted advisor to some of Australia’s largest organisations. His background spans internal and external threat mitigation, access and identity practices, security event response, and the delivery of training programs and strategic workshops.

Leigh is passionate about connecting business needs with the right security solutions—driven by a genuine interest in listening to customers and understanding their challenges and innovations. Throughout his career, he has been deeply involved in authentication, access control, compliance, and counter-fraud technologies.

Outside of his professional achievements, Leigh is also a co-inventor on a patent aimed at protecting children in online environments, reflecting his commitment to creating safer digital spaces.

Paul Platen - IAM Delivery Lead, Foodstuffs South Island

Paul Platen
IAM Delivery Lead, Foodstuffs South Island

With over two decades of experience across IT, cybersecurity, and project delivery, Paul Platen is a trusted expert in identity security and digital trust. He has dedicated his career to designing and implementing technology solutions that promote the ethical and secure use of digital identities—removing systemic barriers to participation and reducing the risks inherent in online interactions.

Paul recently served two terms as Chair of Digital Identity New Zealand, a role in which he championed inclusive, sustainable, and trustworthy digital identity ecosystems for Aotearoa. His strategic insights have guided identity and security programmes across a diverse range of sectors—including banking, government, insurance, and aviation—in regions spanning Africa, Australia, New Zealand, and the United States.

Beyond consulting, Paul is deeply committed to workforce development. He actively mentors and supports rangatahi from all backgrounds, working to demystify cybersecurity and make it an accessible and empowering career path for those without traditional IT experience.

Through his consultancy, Paul continues to explore emerging technologies such as quantum computing, quantum cryptography, identity management, and artificial intelligence, staying at the forefront of what’s next in digital trust and security.

Register for the Event Below:

Name
Which Location Would you Like to Attend?

Agenda:

1:15 PM — Opening Remarks
Welcome from the hosts and context for today’s discussion. We set expectations under Chatham House rules, inviting open and candid peer exchange.

1:25 PM — The Rise of Non-Human Identities
A thought-provoking look at how bots, service accounts, and machine identities have quietly outnumbered humans in our environments. We explore whether traditional IAM models are still relevant to governing them and what this means for the future of identity programs.

1:40 PM — Peer Perspectives: Risks & Blind Spots
Leaders share lived challenges around visibility, ownership, and auditability of non-human access. This is a space to surface the “unknown unknowns” that rarely make it into formal risk reports.

2:00 PM — Tackling the Unseen: Governance & Control Models
Discussion on how organisations are beginning to classify, govern, and monitor machine identities through identity programs. We examine emerging approaches from lifecycle frameworks to behavioural controls and where responsibility should sit.

2:20 PM — Lunch & Informal Dialogue
A chance to dive deeper in smaller conversations and exchange hard-earned lessons. This is where new connections form and private insights are shared without attribution.

2:50 PM — Closing Insights & Collective Takeaways
We reflect on the key themes uncovered and the questions that deserve continued collaboration. Participants leave with practical prompts to take back into their own programs and boards.

WordPress Appliance - Powered by TurnKey Linux