A panel of experts discuss why traditional IAM is such a thorn in the side of CISOs, which IAM best practices are working and which need to change, if new tech the only way to help security leaders regain control over their identity sprawl, how important user education is and awareness relative to systemic protection, and how organizations can strike a balance between strong authentication measures and user convenience.