Accessibility Statement Skip Navigation
  • Why PRWeb
  • How It Works
  • Who Uses It
  • Pricing
  • Login
  • GDPR
  • Create a Free Account
Return to PRWeb homepage
  • News
  • Resources
  • Contact
When typing in this field, a list of search results will appear and be automatically updated as you type.

Searching for your content...

No results found. Please change your search terms and try again.
  • News in Focus
      • Browse News Releases

      • All News Releases
      • Multimedia Gallery

      • All Multimedia
      • All Photos
      • All Videos
  • Business & Money
      • Auto & Transportation

      • Aerospace, Defense
      • Air Freight
      • Airlines & Aviation
      • Automotive
      • Maritime & Shipbuilding
      • Railroads and Intermodal Transportation
      • Supply Chain/Logistics
      • Transportation, Trucking & Railroad
      • Travel
      • Trucking and Road Transportation
      • View All Auto & Transportation

      • Business Technology

      • Blockchain
      • Broadcast Tech
      • Computer & Electronics
      • Computer Hardware
      • Computer Software
      • Data Analytics
      • Electronic Commerce
      • Electronic Components
      • Electronic Design Automation
      • Financial Technology
      • High Tech Security
      • Internet Technology
      • Nanotechnology
      • Networks
      • Peripherals
      • Semiconductors
      • View All Business Technology

      • Entertain­ment & Media

      • Advertising
      • Art
      • Books
      • Entertainment
      • Film and Motion Picture
      • Magazines
      • Music
      • Publishing & Information Services
      • Radio & Podcast
      • Television
      • View All Entertain­ment & Media

      • Financial Services & Investing

      • Accounting News & Issues
      • Acquisitions, Mergers and Takeovers
      • Banking & Financial Services
      • Bankruptcy
      • Bond & Stock Ratings
      • Conference Call Announcements
      • Contracts
      • Cryptocurrency
      • Dividends
      • Earnings
      • Earnings Forecasts & Projections
      • Financing Agreements
      • Insurance
      • Investments Opinions
      • Joint Ventures
      • Mutual Funds
      • Private Placement
      • Real Estate
      • Restructuring & Recapitalization
      • Sales Reports
      • Shareholder Activism
      • Shareholder Meetings
      • Stock Offering
      • Stock Split
      • Venture Capital
      • View All Financial Services & Investing

      • General Business

      • Awards
      • Commercial Real Estate
      • Corporate Expansion
      • Earnings
      • Environmental, Social and Governance (ESG)
      • Human Resource & Workforce Management
      • Licensing
      • New Products & Services
      • Obituaries
      • Outsourcing Businesses
      • Overseas Real Estate (non-US)
      • Personnel Announcements
      • Real Estate Transactions
      • Residential Real Estate
      • Small Business Services
      • Socially Responsible Investing
      • Surveys, Polls and Research
      • Trade Show News
      • View All General Business

  • Science & Tech
      • Consumer Technology

      • Artificial Intelligence
      • Blockchain
      • Cloud Computing/Internet of Things
      • Computer Electronics
      • Computer Hardware
      • Computer Software
      • Consumer Electronics
      • Cryptocurrency
      • Data Analytics
      • Electronic Commerce
      • Electronic Gaming
      • Financial Technology
      • Mobile Entertainment
      • Multimedia & Internet
      • Peripherals
      • Social Media
      • STEM (Science, Tech, Engineering, Math)
      • Supply Chain/Logistics
      • Wireless Communications
      • View All Consumer Technology

      • Energy & Natural Resources

      • Alternative Energies
      • Chemical
      • Electrical Utilities
      • Gas
      • General Manufacturing
      • Mining
      • Mining & Metals
      • Oil & Energy
      • Oil and Gas Discoveries
      • Utilities
      • Water Utilities
      • View All Energy & Natural Resources

      • Environ­ment

      • Conservation & Recycling
      • Environmental Issues
      • Environmental Policy
      • Environmental Products & Services
      • Green Technology
      • Natural Disasters
      • View All Environ­ment

      • Heavy Industry & Manufacturing

      • Aerospace & Defense
      • Agriculture
      • Chemical
      • Construction & Building
      • General Manufacturing
      • HVAC (Heating, Ventilation and Air-Conditioning)
      • Machinery
      • Machine Tools, Metalworking and Metallurgy
      • Mining
      • Mining & Metals
      • Paper, Forest Products & Containers
      • Precious Metals
      • Textiles
      • Tobacco
      • View All Heavy Industry & Manufacturing

      • Telecomm­unications

      • Carriers and Services
      • Mobile Entertainment
      • Networks
      • Peripherals
      • Telecommunications Equipment
      • Telecommunications Industry
      • VoIP (Voice over Internet Protocol)
      • Wireless Communications
      • View All Telecomm­unications

  • Lifestyle & Health
      • Consumer Products & Retail

      • Animals & Pets
      • Beers, Wines and Spirits
      • Beverages
      • Bridal Services
      • Cannabis
      • Cosmetics and Personal Care
      • Fashion
      • Food & Beverages
      • Furniture and Furnishings
      • Home Improvement
      • Household, Consumer & Cosmetics
      • Household Products
      • Jewelry
      • Non-Alcoholic Beverages
      • Office Products
      • Organic Food
      • Product Recalls
      • Restaurants
      • Retail
      • Supermarkets
      • Toys
      • View All Consumer Products & Retail

      • Entertain­ment & Media

      • Advertising
      • Art
      • Books
      • Entertainment
      • Film and Motion Picture
      • Magazines
      • Music
      • Publishing & Information Services
      • Radio & Podcast
      • Television
      • View All Entertain­ment & Media

      • Health

      • Biometrics
      • Biotechnology
      • Clinical Trials & Medical Discoveries
      • Dentistry
      • FDA Approval
      • Fitness/Wellness
      • Health Care & Hospitals
      • Health Insurance
      • Infection Control
      • International Medical Approval
      • Medical Equipment
      • Medical Pharmaceuticals
      • Mental Health
      • Pharmaceuticals
      • Supplementary Medicine
      • View All Health

      • Sports

      • General Sports
      • Outdoors, Camping & Hiking
      • Sporting Events
      • Sports Equipment & Accessories
      • View All Sports

      • Travel

      • Amusement Parks and Tourist Attractions
      • Gambling & Casinos
      • Hotels and Resorts
      • Leisure & Tourism
      • Outdoors, Camping & Hiking
      • Passenger Aviation
      • Travel Industry
      • View All Travel

  • Policy & Public Interest
      • Policy & Public Interest

      • Advocacy Group Opinion
      • Animal Welfare
      • Congressional & Presidential Campaigns
      • Corporate Social Responsibility
      • Domestic Policy
      • Economic News, Trends, Analysis
      • Education
      • Environmental
      • European Government
      • FDA Approval
      • Federal and State Legislation
      • Federal Executive Branch & Agency
      • Foreign Policy & International Affairs
      • Homeland Security
      • Labor & Union
      • Legal Issues
      • Natural Disasters
      • Not For Profit
      • Patent Law
      • Public Safety
      • Trade Policy
      • U.S. State Policy
      • View All Policy & Public Interest

  • People & Culture
      • People & Culture

      • Aboriginal, First Nations & Native American
      • African American
      • Asian American
      • Children
      • Diversity, Equity & Inclusion
      • Hispanic
      • Lesbian, Gay & Bisexual
      • Men's Interest
      • People with Disabilities
      • Religion
      • Senior Citizens
      • Veterans
      • Women
      • View All People & Culture

  • Hamburger menu
  • Cision PRWeb provides efficient communication tools to continuously engage with target audiences across multiple online channels
  • Create a Free Account
    • ALL CONTACT INFO
    • Contact Us


      11AM ET Sunday – 8PM ET Friday

  • Send a Release
  • Sign up
  • Log in
  • Resources
  • RSS
  • GDPR
  • News in Focus
    • Browse All News
    • Multimedia Gallery
  • Business & Money
    • Auto & Transportation
    • Business Technology
    • Entertain­ment & Media
    • Financial Services & Investing
    • General Business
  • Science & Tech
    • Consumer Technology
    • Energy & Natural Resources
    • Environ­ment
    • Heavy Industry & Manufacturing
    • Telecomm­unications
  • Lifestyle & Health
    • Consumer Products & Retail
    • Entertain­ment & Media
    • Health
    • Sports
    • Travel
  • Policy & Public Interest
  • People & Culture
    • People & Culture
  • Send a Release
  • Sign up
  • Log in
  • Resources
  • RSS
  • GDPR
  • Send a Release
  • Sign up
  • Log in
  • Resources
  • RSS
  • GDPR
  • Send a Release
  • Sign up
  • Log in
  • Resources
  • RSS
  • GDPR

Executives Rank AI-related Identity Risks as Top Concern, Yet 97% Admit They Lack Full Preparedness


News provided by

The Identity Underground

Jan 20, 2026, 09:00 ET

Share this article

Share toX

Share this article

Share toX


New findings from The Identity Underground reveals growing gap between reality of modern identity attacks and constraints of outdated, legacy infrastructure; highlights an industry in transition

GRAPEVINE, Texas, Jan. 20, 2026 /PRNewswire-PRWeb/ -- As enterprises race to prepare for AI-driven threats, a new global study released today reveals a stark disconnect between executive focus and the practitioners' reality. According to the 2026 Annual Pulse from The Identity Underground, only 3% of organizations say they are 'very prepared' for AI-related identity attacks—even as 54% of executives cite AI-enhanced identity threats as their top concern for the year ahead.

The Identity Underground Annual Pulse 2026 is based on a survey of more than 150 members of The Identity Underground, a closed community for leading IAM practitioners and identity security executives worldwide. This report marks the first time the community has shared insights outside the closed group.

Taken together, the findings point to a clear conclusion: identity security is no longer just about managing access—it has become a real-time control plane for the enterprise.

Post this

The report paints a picture of an industry in transition: organizations are actively modernizing identity security for AI-era threats, while still constrained by legacy infrastructure and manual processes that slow progress.

"These systems were never designed for today's threat landscape," said Simon Moffatt, Founder and Research Analyst at The Cyber Hut. "IAM has become a strategic enabler for the business, but it's also become a prime target. Without unified visibility and adaptive response across identity systems, privilege misuse and credential compromise proliferate faster than teams can contain them."

AI is Executives' Focus, but Securing Legacy Infrastructure Remains Daily Bottleneck

Executives are focused on the AI future: seeking to leverage AI for the enterprise while their own concerns of AI-powered attacks rise. The data reveals a paradox: 54% of executives cite AI-enhanced threats as their top concern. Meanwhile, 33% creating governance frameworks for AI agent deployment and monitoring— a sign that AI adoption is outpacing security readiness.

Yet, as attention shifts, they acknowledge legacy systems remain a persistent source of identity risk across enterprises: 82% of organizations say legacy infrastructure actively creates identity security risk.

Practitioners living the day-to-day understand identity risks posed by their legacy infrastructure even more acutely:

  • 61% cite NTLM authentication as their primary legacy challenge, due to its role in enabling lateral movement and its lack of native MFA support
  • 43% encounter credential stuffing and password spraying as their most frequent attack—basic credential abuse that still works

"As the IAM ecosystem expanded, silos multiplied: Instead of a unified approach, identity security has become increasingly fragmented," said Hed Kovetz, CEO and Co-Founder of Silverfort, in his contribution. "While defenders try to secure the silos separately, attackers look at the entire attack surface, turning silos into their advantage. What was once dangerous has become untenable."

Axes of Tension: The Practitioner-Executive Constraints Dilemma

The report reveals a widening disconnect between executives and practitioners operating on two different axes of tension. On one axis: legacy systems vs. AI-era challenges. On the other: practitioners fighting daily credential attacks vs. executives managing board-level pressure to adopt AI agents.

Practitioners face credential stuffing, password spraying, the daily grind. Executives are torn between supporting their teams on these realities while addressing growing business demands for agentic AI adoption.

"You can't watch for the future when you're constantly putting out fires in old infrastructure," the report notes.

Non-human Identities Expand the Attack Surface

Compounding these challenges is the rapid growth of non-human identities—service accounts, API keys, workloads, and automated processes—which fall outside traditional identity governance models. Third-party vendor access sprawl further complicates an already increasingly complex attack surface:

  • 37% of organizations report having 21 or more third-party organizations with access to their systems, dramatically expanding the identity attack surface.
  • Only 5% of organizations feel confident they have a complete inventory of non-human identities

As enterprises adopt AI agents and automation at scale, the publication warns that identity programs designed around human users alone are no longer sufficient.

Detection is High. Response is Not.

The 2026 Annual Pulse shows that organizations are no longer blind to identity-based threats, but they are still struggling to act fast enough when those threats appear— 53% say that confidence relies on rapid manual remediation. The result, the publication notes, is that identity security teams increasingly act as "human APIs," stitching together context by hand while attackers move at machine speed.

  • 68% of executives say they are confident in their ability to detect identity-based attacks
  • Only 8% say real-time detection paired with automated response is what gives them confidence

A Wave of Consolidation is Happening

More than half of identity executives cite lack of integration between security tools as their top challenge during incident response. Organizations are making changes to address this—they are investing, consolidating, and modernizing identity security to reduce risk without breaking the business.

  • 55% of organizations are implementing unified identity security platforms, moving away from fragmented point solutions toward centralized visibility and control
  • 69% are deploying SIEM platforms with identity analytics, improving detection and context across environments

Signs of Progress: The Privileged Access Evolution

While the challenges are significant, the publication also shows clear momentum. Just-in-time (JIT) access is moving from theory to practice, with more than two-thirds of organizations deploying JIT at least in pilot form, and over one-third using it across critical systems or broadly for privileged access.

  • 57% have implemented strong boundaries between privileged and standard access
  • 40% are building toward just-in-time (JIT) strategies where privileges exist only when needed and expire immediately after

More Controls, More Friction—and New Risk

The publication highlights a growing paradox: while organizations have expanded identity security controls, the constraints of legacy infrastructure, systems, and incomplete implementation have led to unintended consequences, often disrupting the work they were intended to protect:

  • 58% say access approval workflows cause more delays than actual security incidents
  • 40% say security policies prevent legitimate work
  • More than half cite identity controls as either blocking work or causing repeated authentication prompts

Outdated identity security tools like traditional PAM have compounded these challenges as traditional credential vaulting and session management add friction to every privileged action. The publication notes that when friction rises, users predictably seek workarounds—increasing exposure to the same credential-based attacks that remain the most common entry point for attackers.

However, organizations and executive leadership are not ignoring this friction, they're taking action to both understand and reduce these risks. Businesses are measuring the impact this friction has on teams, the security of the organization, and the business's bottom line. Quantifying business impact is the first step toward security that enables rather than blocks.

They're also taking a pragmatic approach to remediation: organizations are reducing exposure where they can, modernizing incrementally, and building the architectural foundation needed to support AI agents, non-human identities, and automated response.

A Turning Point for Identity Security

Taken together, the findings point to a clear conclusion: identity security is no longer just about managing access—it has become a real-time control plane for the enterprise.

Organizations that continue to rely on fragmented tools, static policies, and manual response will struggle as attacks accelerate and AI agents multiply. Those that consolidate identity visibility, integrate security systems, and enforce controls inline—without adding friction—will be best positioned to move forward safely.

About The Identity Underground Annual Pulse 2026

The Annual Pulse is published by The Identity Underground, a closed community where identity security practitioners and executives speak candidly about what works, what breaks, and why. This is the first time the community has made its survey data public, offering an unfiltered look at the state of identity security as organizations head into 2026.

About The Identity Underground

The Identity Underground is a global, invite-only community of IAM and identity security leaders, powered by Silverfort, yet independently run, giving members space for candid conversations and genuine peer connection. It exists to foster honest, practitioner-driven conversations about the real challenges facing identity teams—no vendor pitches no sponsors.

Media Contact
Jessica Stone, The Identity Underground, 1 8324920305, [email protected], www.theidentityunderground.com 

SOURCE The Identity Underground

Modal title

The Identity Underground Annual Pulse 2026
The Identity Underground Annual Pulse 2026
The Identity Underground
The Identity Underground
The Identity Underground Annual Pulse 2026 The Identity Underground

Contact PRWeb

  • 11AM ET Sunday – 8PM ET Friday
  • Contact Us

About PRWeb

  • About PRWeb
  • Partners
  • Partnership Programs
  • Editorial Guidelines
  • Resources

Why PRWeb

  • Why PRWeb
  • How It Works
  • Who Uses It
  • Pricing

Accounts

  • Create a Free Account
  • Log in
  • Contact Us

Do not sell or share my personal information:

  • Submit via [email protected] 
  • Call Privacy toll-free: 877-297-8921

Contact Cision

Products

About

My Services
  • All News Releases
  • Online Member Center
  • ProfNet
Cision Distribution Helpline
888-776-0942
  • Legal
  • Site Map
  • RSS
  • Cookie Settings
Copyright © 2025 Cision US Inc.