Customer Identity and Access Management (CIAM) is moving fast, and the CIAM influencers leading the charge are shaping how companies handle trust, security, and user experience. From login flows to privacy rules, their voices carry weight across boardrooms, engineering teams, and global conferences.
This page pulls together the experts worth following — the analysts setting direction, the CISOs sharing battle-tested lessons, the standards leaders defining protocols, and the product builders driving innovation.
This page highlights the top cybersecurity influencers in CIAM, giving you a map of who to follow, why they matter, and how their voices shape the future of identity.
If you want to stay ahead in CIAM, these are the influencers who can help you see what's next.
Why Cybersecurity Influencers Matter in CIAM
In security, tools matter — but people set the direction. The frameworks we adopt, the regulations that keep us awake at night, even the way we design a signup form… all of it is shaped by conversations led by CIAM influencers.
These aren't just loud voices on LinkedIn. They're the analysts who decide what lands in a Gartner Magic Quadrant, the ex-CISOs who've lived through breaches and now guide vendors, the technologists drafting standards like OAuth or FIDO, and the investors betting big on where CIAM goes next.
When they publish a report, boards listen. When they question a new approach, entire product roadmaps shift. And when they back a vendor, suddenly that startup's on every shortlist.
Following the right CIAM influencers isn't about hype — it's about keeping your strategy aligned with the real currents shaping identity. Miss their perspective, and you risk building for yesterday's problems while your competitors leap ahead.
The 2025 CIAM Influence Map
Modern CIAM isn't just shaped by products — it's shaped by people. The real influence sits with those who set the narrative, guide buying decisions, and define the rules everyone else has to follow.
Here's how the map looks this year:
- Analyst Firms – Gartner, Forrester, KuppingerCole still decide who gets a seat at the table.
- Ex-CISOs & Advisors – Hard-won lessons make their voices trusted in boardrooms.
- Standards Architects – The minds behind OAuth, OIDC, and passkeys write the rulebook.
- Operator-Founders – Identity veterans turned founders bring credibility buyers can't ignore.
- Regional Leaders – From Singapore to Tel Aviv, local experts set global expectations.
Put together, this is the 2025 CIAM influence map: analysts shape perception, advisors frame risk, architects set guardrails, founders share playbooks, and regional leaders remind us identity is never one-size-fits-all.
Types of Cybersecurity Influencers in CIAM
Not all influence looks the same. In CIAM, it usually falls into buckets:
- Analysts & Researchers – voices like Martin Kuppinger or Andras Cser, who write the reports every boardroom reads.
- Practitioner CISOs – from retail, banking, healthcare, cloud. They share war stories that other CISOs listen to.
- Standards & Protocol Leaders – the architects behind OAuth, OIDC, FIDO, UMA. Their work quietly powers every SaaS login.
- Founders & Builders – leaders from ForgeRock, Auth0, Saviynt, Frontegg, Ping. They bring innovation into production..
Each plays a different role, but together they form the CIAM echo chamber where buying decisions, standards adoption, and vendor reputation are built.
The 2025 CIAM Influencer List
Below is a curated list of 30+ CIAM influencers who shape thinking, standards, adoption, and vendor reputation.
Analysts & Researchers
- Ian Glazer
Ian Glazer is widely recognized as a cybersecurity influencer in identity and access management. As founder and president of Weave Identity, he advises enterprises on advancing IAM maturity. Formerly SVP of Identity Product Management at Salesforce, Ian has become a go-to voice at events like Identiverse and RSA. - Martin Kuppinger
Martin Kuppinger, founder of KuppingerCole, is a leading analyst and cybersecurity influencer. Known for his reports on CIAM and AM vendors, Martin combines decades of technical depth with a business-first perspective, shaping how enterprises adopt digital identity. - Andras Cser VP & Principal Analyst at Forrester, specializing in IAM and fraud. Known for sharp insights on MFA, entitlement, and privileged identity.
- Alexei Balaganski
KuppingerCole Analyst and CTO. Covers cybersecurity, AI, and backend aspects of SaaS identity, bridging technical and strategic worlds. - Steve Wilson Digital identity advisor to governments (Australia, Singapore). Founder of Lockstep, with 10+ patents and pioneering work on PKI and credentials.
- Paul Simmonds
Fellow Analyst at KuppingerCole and CEO of the Global Identity Foundation. Former Global CISO at AstraZeneca and ICI, with senior identity roles at Motorola. Co-editor of CSA's Security Guidance v3.0, he brings deep CIAM expertise. - Wendy Nather
Wendy Nather, Cisco Advisory CISO and former 451 Research director, is one of the most respected cybersecurity influencers today. Blending analyst, CISO, and advisory perspectives, she's a frequent voice on trust, security, and identity strategy. - Brian Iverson
Former Gartner analyst and KPMG director. Now advising Fortune 500s on IAM and CIAM strategy. - David Birch
Author and speaker, known for bold takes on identity in finance and payments.
Practitioner CISOs
- Lance Peterman
Leads IAM program at Dick's Sporting Goods, with 20+ years in security. Frequent speaker at Identiverse and RSA. - Henrique Bernardes
SVP of Strategy at Saviynt. Former Gartner lead analyst on access management MQ, blending enterprise IAM and CIAM leadership. - Vishal Salvi
Global CISO at Infosys, shaping CIAM practices in large-scale, regulated enterprises across banking and telecom. - Roland Cloutier
Former TikTok & ADP security leader, now advisor. Brings OT/ICS and consumer identity together in critical infrastructure settings.
Standards & Protocol Leaders
- Eve Maler
Eve Maler is a cybersecurity influencer best known for her protocol leadership. From co-creating SAML and UMA to serving as ForgeRock's CTO, she has shaped identity standards that power modern authentication across industries. - Andrew Hindle
Content Chair at Identiverse, co-founder of IDPro. Longtime advocate for standards like OAuth and open identity ecosystems. - Heather Flanagan
Heather Flanagan, owner of Spherical Cow Consulting, helps organizations simplify digital identity management across SaaS and research. - John Fontana
Yubico identity evangelist, FIDO Alliance rep, and ex-Ping Identity leader. Bridges standards with developer adoption. - Nat Sakimura
Chair of the OpenID Foundation. Architect of OAuth and OIDC standards that power most CIAM systems today. - Pamela Dingle
Director of Identity Standards at Microsoft. Leading voice on federation and protocol adoption. - Kaliya Young
"Identity Woman," community builder and advocate for decentralized identity. Co-hosts Internet Identity Workshop. - Joni Brennan
President of DIACC. Shapes policy, trust frameworks, and cross-border CIAM standards. - Colin Wallis
Executive Director at Kantara Initiative. Champion of trust frameworks, privacy, and CIAM standards. - Kim Cameron (in memoriam)
Late Microsoft identity visionary and author of the "Laws of Identity," whose influence still guides CIAM. - Mary Ruddy
Identity architect and advisor, contributor to UMA and Kantara initiatives.
Founders & Builders
- Deepak Gupta
Co-founder & CEO of GrackerAI building AI GTM Engineer for cybersecurity SaaS; previously founded and built LoginRadius CIAM platform from scratch and grew to $8M ARR - Eugenio Pace
Co-founder & CEO of Auth0 (acquired by Okta). Continues to influence how developers think about CIAM and SaaS identity. - Andre Durand
Founder & CEO of Ping Identity. Industry veteran driving enterprise identity innovation for over two decades. - Rakesh Loonkar
Co-founder of Transmit Security, shaping the passwordless CIAM market with a customer-first approach. - Sagi Rodin
CEO at Frontegg, building developer-friendly CIAM for SaaS apps. Voice in simplifying identity for growth-stage companies. - Sachin K Nayyar
CEO at Saviynt. Former Oracle and Symantec executive, driving enterprise-grade CIAM and identity governance. - Govind Kumar
Co-founder and CTPO of GrackerAI. Creating the first AI-driven Organic Growth Co-pilot for B2B SaaS (Cybersecurity, IAM). - Simon Moffatt
As founder of The Cyber Hut and host of The Week in Identity, Simon Moffatt is a cybersecurity influencer who bridges education, analysis, and community. He authored one of the first CIAM-focused books and continues to advise enterprises and startups on identity strategy.
How to Actually Connect with CIAM Influencers
Reading about the top CIAM influencers is one thing — but the real value comes when you start interacting with them. Here are a few practical (and realistic) ways to do it:
- Follow their updates on LinkedIn or X. Most of them share short takes on new standards, conference talks, or lessons learned. It's the easiest way to keep up.
- Listen to what they publish — many run podcasts, newsletters, or drop into webinars. “The Week in Identity” or IDPro's updates, for example, are gold mines if you don't have hours to scroll feeds.
- Catch them at events. Identiverse, EIC, or the Gartner IAM Summit are usually packed with these names on stage. Hearing them live gives you the unfiltered version you don't always get online.
- Don't just lurk. Comment on their posts, share their talks, or even ask thoughtful questions. A lot of these folks respond, and those small exchanges can build lasting connections.
- Find the smaller circles. Beyond LinkedIn, many are active in IDPro, Kantara, or even private Slack/Discord groups. That's often where the deeper conversations happen.
👉 The more you engage, the more context and foresight you gain in shaping your own CIAM strategy.
Top CIAM Events & Communities
If you want to follow CIAM trends where they're being shaped in real time, these events and communities are worth bookmarking:
Event / Community | Why It Matters |
Identiverse | The largest identity-focused conference; most influencers on this list speak here. |
Gartner IAM Summit | Analyst-driven insights on CIAM adoption, vendor landscapes, and enterprise trends. |
European Identity & Cloud Conference (EIC) | Deep dive into standards, architectures, and policy — especially relevant for EU and global rollouts. |
Authenticate (FIDO Alliance) | Where passwordless, biometrics, and authentication-first CIAM strategies take shape. |
Internet Identity Workshop (IIW) | A community-led gathering, co-hosted by identity pioneers, shaping open standards and decentralized identity. |
IDPro | A professional association for identity practitioners — offering newsletters, working groups, and networking. |
Kantara Initiative & DIACC | Trusted bodies shaping CIAM standards, frameworks, and interoperability. |
👉 These communities are where many of the influencers you just read about publish their first ideas, test their frameworks, and influence adoption across the industry.
Recommended Reading & Resources
If you want to go deeper into CIAM beyond just following influencers, here are some resources worth bookmarking:
- Industry Reports & Analysis
- Gartner Magic Quadrant for Access Management – the most cited analyst view on vendors in the CIAM/AM market.
- KuppingerCole Leadership Compass for CIAM – a solid look at strengths and gaps across CIAM providers.
- Forrester Wave: Customer Identity and Access Management – deep dive into strategy and implementation trends.
- Gartner Magic Quadrant for Access Management – the most cited analyst view on vendors in the CIAM/AM market.
- Influencer & Community Content
- IDPro Body of Knowledge – the community-driven knowledge base for identity pros.
- The Week in Identity Podcast – regular updates on standards, vendors, and industry shifts.
- Kantara Initiative – if you want to get into standards, policy, and trust frameworks.
- IDPro Body of Knowledge – the community-driven knowledge base for identity pros.
- Practical Guides & Blogs
- OIDC vs SAML – Which is Better for SSO? – A hands-on guide from SSOJet comparing the two most common CIAM protocols.
- Top Cybersecurity Keywords – Boost Traffic & Conversion (2025 Edition) – from Gracker, useful for marketers trying to align CIAM messaging with search demand.
- CIAM in 2025 – Navigating the Authentication Revolution and Solving Tomorrow's Identity Challenges
- CIAM 101 Knowledge Hub – a central resource for teams just starting their CIAM journey.
- The Complete CIAM Resource Hub by Deepak Gupta
- Cybersecurity Influencers & Experts (2025) – Who's shaping the industry conversation.
- Best Cybersecurity Podcasts – Where to get unfiltered insights on security & CIAM.
- Cybersecurity Newsletters & Daily News – Stay ahead with curated, high-signal updates.
- CIAM Vendors Comparison – Explore the best consumer identity platforms
- OIDC vs SAML – Which is Better for SSO? – A hands-on guide from SSOJet comparing the two most common CIAM protocols.
👉 These aren't just “extra reading.” They'll help you understand how analysts think, how practitioners apply CIAM in the real world, and where the conversation is headed.
Conclusion
Influence in CIAM is built by the same forces that shape cybersecurity as a whole — analysts, CISOs, researchers, and builders who turn complex identity challenges into practical strategies.
If you're serious about CIAM, following the right cybersecurity influencers gives you a head start. They'll show you what matters, where the industry is going, and how to avoid costly mistakes. The sooner you plug into these conversations, the stronger your identity strategy will be