In the age of AI agent-driven super-phishing, is your identity stack ready?

While businesses assess risks of AI, and slowly adopt, bad actors don't have a thing to worry about. With the power of AI agents, hackers can deploy advanced phishing methods at scale, and quickly revamp their work to avoid detection. Protecting your organization's identity layer is more important than ever. We all know that most breaches don't start with malware, they start with people. Bridging gaps between HR and IT while further easing the adoption of phishing-resistant credentials is essential to blocking new attacks.

From our perspective, automations between HR and IT are key. You need a consistent source of truth for who your workers are, and then you need an airtight process to validate worker identities, and provide phishing resistant credentials at scale from the worker's first sign-on. This is achievable, with the right work and expertise.

Most IT pros are only remotely aware that HR onboarding processes in the US already contain an excellent mechanism for verifying worker identities. Form I-9 completion and validation is already a robust process where the employer must validate a worker's identity based on received credentials. E-Verify employers gain an additional boost by having a third-party trusted agency further confirm the credentials. You can't validate someone's eligibility to work without validating who that worker is. Background checks also provide solid information for properly verifying worker identities, though they contain gaps in linking a worker to a verifiable credential. If IT fails to take advantage of the work HR is already doing, value is being left on the table.

From there most HR tools, especially Workday, are well equipped with workflows for a seamless handoff to IT so a phishing resistant credential can be provisioned to the newly verified identity. With Microsoft's new Passkey Provisioning webservice in beta, and tools like YubiEnroll becoming more and more available across providers, the ecosystem is ripe for optimization. Your process should go from: hired individual → verified human identity → verified digital identity → phishing-resistant credential delivered to the verified individual. What's stopping you from having this right now?

Do you need help connecting Entra or Okta to Workday so your identities are automatically managed? Do you stay up at night worrying about first-day phishing risks? Have you been duped by one too many deepfakes? Do you need help building out a workflow to provide phishing-resistant passkey credentials to your new users?

Reach out today.

Next
Next

The Most Important Workday© 2026R1 Feature