This Complete Survey Results presentation focuses on the scope, scale, and types of identities that IT and cybersecurity teams must manage, including the associated security requirements and challenges, the types of native identity security controls in use, and the individuals and groups responsible for securing identities.