“Many enterprises are nonetheless within the early levels of deploying passkeys and FIDO2, and biometrics are sometimes deployed as a part of a broader MFA technique, the place {hardware} prices and administration overhead stay obstacles to widespread adoption,” says Conscia’s Hanagan.
Rules shake up IAM architectures
The regulatory setting has developed from a tick-box train in compliance towards governance and steady testing to reveal company adherence to rules. That shift, in keeping with Conscia’s Hanagan, is actively reshaping how organizations architect their IAM packages.
“There’s a vital quantity of regulatory work below means,” he says. “GDPR, NIS2, DORA, PCI DSS 4.0, and sector-specific frameworks all give attention to who accesses what, when, and why.”



