In Episode 3 of Authentic Talks, we dive deep into the future of identity architecture, from consistent authentication and Zero Trust principles to the rise of AI agent identities that will reshape modern IAM at enterprise scale. Our guest, Jeff Hickman, Head of Customer Engineering at Ory, joins hosts Arielle Slama and Rich Gibson for a fast-moving, deeply practical conversation about building consistent authentication experiences, modernizing legacy IAM, and preparing for a world where human and non-human identities both operate at massive scale. With 15+ years of experience in enterprise identity, cybersecurity, and software engineering for the Fortune 500, Jeff explains how organizations can modernize legacy IAM systems, deliver consumer-grade employee experiences, enforce least privilege, and build the groundwork needed for auditable AI identity systems. Whether you're responsible for identity architecture, Zero Trust programs, IAM modernization, or digital trust strategy — this episode will reshape how you think about scale, governance, and the future of authentication. Episode Highlights Why consistency in authentication is the foundation of digital trust Why employees deserve consumer-grade authentication The hidden challenges of modernizing legacy IAM stacks When organizations should recognize "it's time to scale" The rise of AI agent identities and the need for new policies What a healthy agent lifecycle should look like The difference between trusted co-worker agents and first-class customer agents Chapter Guide (01:05) Welcome & today's topic: scaling trust in identity (03:01) Jeff's "authentic question": what scaling trust means in one sentence (04:10) Why inconsistent authentication breaks user trust (06:08) How device-to-device experience gaps open the door to phishing (07:57) Modernizing IAM without compromising experience (09:49) Employees vs. consumers: why the standards should match (11:03) Navigating convenience, security and real-world user environments (12:30) When modernization meets legacy systems: scale challenges (14:01) The logistics of MFA, tokens, provisioning and authenticator rollout (18:39) The signals that it's time to scale your identity program (19:06) AI as a major inflection point for identity architecture (21:52) Agentic identities: trusted coworker vs. first-class customer (23:03) What a healthy agent lifecycle requires (27:54) The economics of trust: short-lived, verifiable, cheap-to-validate access (29:01) The big question: does AI reduce workload or move it? (30:26) The observability crisis in AI-driven authentication (33:34) Compliance readiness—why most organizations aren't prepared (34:36) The 5 foundational steps for scaling trust with AI agents (41:47) Lightning round: culture, inflection points, and identity myths Featured Guests Jeff Hickman – Head of Customer Engineering, Ory Arielle Slama – Director of Product Marketing, HID Rich Gibson – Director of Strategic Alliances, HID Key Topics • Consistent authentication as a trust anchor • IAM modernization across legacy environments • Scaling identity across hybrid and multi-cloud environments • AI agent identity, authentication, and lifecycle governance • Observability and compliance in AI‑driven security • How least privilege + deny-by-default must evolve for AI • Enterprise passkeys and FIDO2‑based trust Related Resources · Download the Passkey Playbook - Learn how to choose, deploy, and scale passkeys effectively—with ROI insights backed by the FIDO Alliance. · Unlock Unified Enterprise Identity – Discover how ORY and HID deliver unified physical and digital access with FIDO2 security and enterprise-scale capabilities. · Follow HID Global IAM on LinkedIn - Stay up to date on the latest in digital identity, authentication, and enterprise security. FAQ Section Why is consistency so important in authentication? Consistency in authentication is the foundation of digital trust. When login flows, MFA prompts, or device experiences behave differently, users become more vulnerable to phishing and impersonation attacks. Inconsistent authentication also erodes brand trust and breaks Zero Trust principles by introducing unpredictable access paths. Organizations scaling identity need unified, repeatable authentication journeys across mobile, desktop, cloud, and legacy environments. What triggers the need to scale identity? Identity systems need to scale when there's a major shift in user behavior or authentication volume—such as hybrid work, mobile-first use, cloud migration, or the introduction of AI agents. Typical triggers include MFA friction, rising service desk tickets, legacy IAM outages, inconsistent authentication experiences, and the inability to onboard or deprovision identities quickly. Scaling identity is essential for Zero Trust maturity and enterprise-wide digital trust. How do AI agents change identity management? AI agents introduce an entirely new class of identities that interact autonomously with systems, APIs, and data. Unlike human users, AI agents require short-lived credentials, verifiable trust signals, and strict least privilege access. They also create higher authentication volume, require new policies for lifecycle management, and demand stronger observability so organizations can audit what agents did, why they did it, and whether the actions were authorized. What is the biggest risk organizations overlook? The greatest risk is the observability gap. AI agents may authenticate frequently, act autonomously, and make high-impact decisions—yet most enterprises lack the monitoring, reasoning logs, and audit trails needed to understand agent behavior. This creates gaps in compliance, risk scoring, and Zero Trust enforcement. Without agent-level observability, organizations cannot validate intent, detect misuse, or meet audit requirements. Why should employee authentication match consumer experience? Employees expect the same convenience and frictionless experience they get from modern consumer apps. Enterprise IAM modernization—such as passkeys, phishing-resistant MFA, and consistent cross-device authentication—reduces frustration, lowers ticket volume, and improves security adoption. Consumer-grade experiences are no longer optional; they're required for digital trust and hybrid workforce productivity. How does IAM modernization support scaling trust across legacy systems? Modern IAM platforms standardize authentication, enforce least privilege, and provide centralized policy control—even when organizations still rely on legacy systems. Modernizing IAM helps unify passwordless authentication, enforce consistent MFA, support FIDO2/passkeys, and extend Zero Trust controls across hybrid and multi-cloud environments. It reduces technical debt and eliminates the inconsistent identity flows that compromise trust at scale.