SHARE
Facebook X Pinterest WhatsApp

Report: Execs Rank AI Identity Threats as Top 2026 Risk

A new report finds 54% of executives fear AI-driven identity threats in 2026, yet just 3% say organizations are very prepared to defend.

Written By
thumbnail
Luis Millares
Luis Millares
Jan 22, 2026
Channel Insider content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More

Fifty-four percent of executives cite AI-enhanced identity threats as their top concern heading into 2026. Yet only 3 percent of organizations say they are “very prepared” to defend against AI-driven identity attacks.

Those findings come from The Identity Underground’s 2026 Annual Pulse report, underscoring a clear disconnect between rapidly emerging AI-based identity threats and the preparedness of many organizations to defend against them.

Identity and access as a risk target in 2026

According to the report, organizations are constrained by legacy infrastructure and manual processes, preventing them from modernizing their identity security measures, particularly those powered by AI.

“These systems were never designed for today’s threat landscape,” said Simon Moffatt, founder and research analyst at The Cyber Hut. 

“IAM has become a strategic enabler for the business but it’s also become a prime target. Without unified visibility and adaptive response across identity systems, privilege misuse and credential compromise proliferate faster than teams can contain them,” Moffatt added.

The Annual Pulse 2026 is based on a survey of more than 150 members of The Identity Underground — a closed community of leading IAM practitioners and identity security executives worldwide. 

Advertisement

Adapting legacy systems to today’s AI threats

As AI adoption has become widespread, many organizations are recognizing that legacy systems and infrastructure are posing identity risks across their businesses.

In particular, 82 percent of respondents say legacy infrastructure actively creates identity security risk. 

Meanwhile, 61 percent cite NTLM authentication as their primary legacy challenge, citing its role in enabling lateral movement and its lack of native MFA support.

“As the IAM ecosystem expanded, silos multiplied: Instead of a unified approach, identity security has become increasingly fragmented,” said Hed Kovetz, chief executive officer and co-founder of Silverfort.

“While defenders try to secure the silos separately, attackers look at the entire attack surface, turning silos into their advantage. What was once dangerous has become untenable,” Kovetz continued.

Adding to the challenge is the rapid growth of non-human identities such as service accounts, API keys, workloads, and automated processes, many of which fall outside the scope of traditional identity governance systems and models.

For example, 37 percent of organizations reported having 21 or more third-party organizations with access to their systems, dramatically expanding the identity attack surface. Meanwhile, only 5 percent said they were confident they had a complete inventory of non-human identities.

Advertisement

Next steps: consolidation and evolving privileged access

With the widening gap between legacy defenses and rising identity threats, executives are consolidating fragmented security systems and tightening privileged access controls.

Fifty-five percent are implementing unified identity security platforms, moving away from point solutions toward centralized visibility and control. 

In addition, 69 percent are deploying SIEM platforms with identity analytics to improve detection and context across environments.

Meanwhile, 57 percent of respondents say they have implemented stronger boundaries between privileged and standard access. 

Just-in-time (JIT) access is also gaining traction, with 40 percent saying they are building toward JIT strategies where privileges exist only when needed and expire immediately after use.

Advertisement

Why organizations need to focus on identity security in 2026

Taken together, the findings underscore the need for organizations to strengthen identity security and adapt to today’s emerging AI-driven threats. The Identity Underground emphasizes that simply managing access is no longer enough to protect identities.

“Organizations that continue to rely on fragmented tools, static policies, and manual response will struggle as attacks accelerate and AI agents multiply,” the community said in its report.

“Those that consolidate identity visibility, integrate security systems, and enforce controls inline—without adding friction—will be best positioned to move forward safely.”

thumbnail
Luis Millares

Luis Millares has extensive experience reviewing virtual private networks (VPNs), password managers, and other security software. He has tested and reviewed numerous forms of tech, covering consumer technology like smartphones and laptops, all the way to enterprise software and cybersecurity products. He has authored over 450 online articles on technology and has worked for the leading tech journalism site in the Philippines, YugaTech.com. He currently contributes to the Daily Tech Insider newsletter, providing well-researched insights and coverage of the latest in technology.

Recommended for you...

RegScale: Only 4% of Orgs Have Fully Automated GRC
Luis Millares
Jan 20, 2026
Report: CISOs Increasingly Positioned as Executive Leaders
Victoria Durgin
Jan 15, 2026
RSAC on LLM Consistency and Cybersecurity Trust
Victoria Durgin
Jan 14, 2026
Mid-Market Businesses Need MDR: DSN on Proactive Security
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.