In a time when businesses must operate without a protective perimeter, when the stakes for protecting private data and intellectual property have never been higher, and when users are growing increasingly impatient with cumbersome access, identity has become central to how organizations secure their resources and enable their users. On the following pages, we share ten trends that illustrate the ways in which identity both reflects and defines cybersecurity today.