Enter your email to access this webinar

Shared Passwords, Shadow Devices, and the New Network Perimeter

For many businesses, weak WiFi security has become the elephant in the room. Not because teams are negligent, but because access has historically been designed around where someone is connecting from and what network they’re on, not who they are.

Across many organizations, WiFi access is still treated as a solved problem. One shared password. Limited visibility into who or what is connecting. An assumption that once a device is on the network, it belongs there.

The data tells a different story.

• More than and 70% of corporate networks still rely on shared WiFi credentials.
• Unmanaged devices now outnumber managed devices by four to one.
• Around one in three breaches begin with compromised credentials or insecure access points.

At the same time, joiners, movers, and leavers now account for up to 85% of IT tickets. Access decisions are being made constantly, by people under pressure to keep work moving, with limited tools to enforce consistent controls. Accountability, however, still sits with security leaders.

This session looks at how the network perimeter has already shifted. Identity, not location or passwords, now defines risk.

We’ll examine the structural weaknesses that make WiFi such an attractive entry point for attackers, the changing mix of users and devices connecting to corporate networks, and why traditional access models struggle to keep up.

By the end of this session, you’ll understand:

• Why identity has become the real network perimeter, even when most controls still sit elsewhere
• Which WiFi risks create the most exposure and which are often underestimated
• How leading organizations are moving away from shared credentials toward identity-based access
• Practical steps IT and security teams can take now to reduce risk without replacing existing infrastructure

This isn’t a WiFi upgrade. It’s closing the door that attackers look for first.

Agenda

• What attackers exploit today: The real access patterns security teams are seeing across corporate, guest, and multi-tenant environments.
• Modern access models: How identity-based WiFi changes visibility, accountability, and control without adding friction for users.
• First steps to reducing risk: Where organizations are starting to close gaps, improve oversight, and take pressure off overstretched teams.

Meet the Speakers

Gavin Wheeldon

Chief Executive Officer (CEO), Purple

Gavin Wheeldon is CEO of Purple, where he leads the company’s mission to build the world’s leading identity-based WiFi platform. He works with enterprise IT and security teams to eliminate shared-password risk, automate joiners/movers/leavers, and reduce the operational drag of network access - delivering stronger control without breaking user experience.

Andy Dancer

Non-Executive Chairman, Boxphish

Andy Dancer is Chair of Boxphish and a board member at Purple, with 25+ years building and leading technology businesses and deep cybersecurity expertise. He brings a threat-led perspective on how WiFi becomes an attacker’s fastest entry point, why “big” controls like NAC often end up in monitor mode, and what practical steps security leaders can take to regain accountability.