Gartner Identity & Access Management Summit
March 20 – 22, 2023 | Grapevine, TX
Beyond IAM: Enable Identity-First Security
Register Now
© 2023 Gartner, Inc. and/or its affiliates. All rights reserved. EVTM_958_2108066
DRAFT
Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2020
Identity is foundational to cybersecurity and the running of your business — from remote work to customer access. Conventional approaches to identity and access management (IAM) are no longer sufficient as organizations operate in an escalating threat environment in which the perimeter has become porous and zero trust is no longer optional. Adopting an identity-first security mindset means putting identity-based controls at the heart of your organization’s protection architecture and expanding capabilities around threat detection and response. Gartner Identity & Access Management Summit 2023 helps IAM and security leaders make the right decisions about which identity-first security initiatives to prioritize, how to modernize existing staffing models and whether to invest in new tools to take their organization’s security posture into the identity-first era.
Keynotes
Our powerful lineup of keynote speakers helps you expand your thinking and discover new approaches to make smarter business decisions.
How to Digitally Accelerate When You’re So Freaking Tired
Mary Mesaglio, Managing VP
How to Tell Your Story Like a Pro
Leigh McMullen, Distinguished VP Analyst
Guest keynote
It’s 2022 and we thought the long-awaited reopening was finally here. But then, wham. Omicron arrived on the scene. The pandemic sometimes seems like a never-ending story of dashed hopes. Yet, you don’t get to sit this one out. Businesses continue to transform, you must continue to lead your people, and the world doesn’t stop just because you’re tired. And we know you’re tired. This session covers how to continue your digital acceleration while keeping your people — and yourself — safe and whole. It’s a tightrope walk out there.
Lorem ipsum session description
Session title
Name, Title
over 40% of organizations will be using analytics and insights from identity governance and administration tools as part of a wider identity fabric to reduce security risks across their identity and access management estate.
By 2025,
Source: Gartner
Gartner keynotes
Homan Farahmand VP Analyst
Outlook for Identity and Access Management, 2023
Tina Nunno Distinguished VP Analyst
Lead Like a Wolf
This dynamic and eye-opening session provides an innovative, neuroscience-based look at the benefits of creating inclusive workplaces, using the fields of cognitive neuroscience, social psychology and communication (among others). Steve Robbins delves into the hard-wired human need to belong — and what happens when that need is not met. HR leaders walk away energized with a clear DEI strategy, the positive impact it will have on their organization and how it will empower their teams and key stakeholders to view DEI as vital to success, not just something that is an afterthought.
Your Brain Is Good at Inclusion — Except When It’s Not
Disabled people are the largest historically underrepresented group, numbering more than one billion worldwide. Reaching a group of this scale creates value for everyone: Organizations that prioritize accessibility benefit by gaining access to a much larger audience, improving the experience for both disabled and nondisabled people, and facilitating further innovation. In this engaging presentation, Haben Girma shares how she became an advocate and what we can do to make our communities more inclusive.
Disability and Innovation
Gartner Keynotes
Big data is changing everything from content development to culture itself. Matthew Luhn, a 20-year Pixar story veteran, will share how big data is being used to create great stories and characters in films such as “Toy Story 3,” “Inside Out” and beyond. His experience and insight will empower and inspire publishers, advertisers and innovators to forge stronger, more meaningful connections with consumers.
Storytelling and Big Data
Guest Keynote
75% of cyberinsurance providers will mandate the use of just-in-time privileged access management principles.
Guest keynotes
Haben Girma Disability Rights Lawyer and Author of “Haben: The Deafblind Woman Who Conquered Harvard Law”
Steve Robbins Chief Curiosity Cultivator and Diversity, Inclusion and Cultural Competency Expert, S.L. Robbins and Associates
As a leader, are you a predator or prey, and what should you aspire to be? Technology executives are more visible now than ever before, this can be both an opportunity and a challenge. This session explores how being a wolf can make you a better leader for your team and a great asset for your organization. Before this session, find out yours at gartner.com/wolfcio and learn more about what your results mean during the keynote.
Digital identity requirements and importance are growing, as organizations are migrating their infrastructure and apps to the cloud. Enterprises anticipate innovations to enable continuous, dynamic and intelligent IAM controls, while bracing for emerging decentralized identity impact and potential Web3 business model disruption. This session discusses key trends and IAM outlook in the coming years.
Tracks
Gain actionable insight from six topic-based tracks and five spotlight tracks that span the entire agenda.
Six tracks covering your top priorities
Spotlight tracks
View Full Agenda
a global standard for portable decentralized identities will emerge in the market to address business, personal, social, societal and identity-invisible use cases.
A. IGA B. Privileged Access Management C. Access Management D. User Authentication and Identity Proofing E. Cybersecurity, Leadership and Strategy F. IAM Program Management
Technical Insights Zero Trust
Spotlight tracks let you explore key topics and perspectives in detail. Understand the impact of new trends. Consider ways to support your career and business goals.
Future of IAM Digital Identity
Identity governance and administration (IGA) is a mature, complex IAM market that is changing radically. Get more information on ways to improve your IGA initiative by learning best practices and innovations such as IAM convergence and autonomous and predictive governance, all powered by identity analytics.
A. IGA
Deploying IAM, leading winning teams and supporting IAM operations require understanding the bigger role of IAM in cybersecurity. Get the information you need to take an identity-first approach to security while enhancing the overall user experience.
B. Cybersecurity, Leadership and Strategy
Identity governance and administration (IGA) is a mature, complex IAM market that is changing radically. Get more information on ways to improve your IGA initiative by learning best practices and innovations such as I AM convergence and autonomous and predictive governance, all powered by identity analytics.
C. IGA
Nearly every significant cyber breach in recent years has had something in common, a failure to monitor and control privileged access. Find out why privileged access management (PAM) principles are one of the most significant security approaches for enterprises, protecting secrets and sensitive accesses across the organization.
D. PAM
The demand for secure yet smooth digital experience is increasing. This track is essential for understanding how to establish trust in the identity of new and existing users and mitigate the risks of account takeover and other attacks through careful selection and implementation of modern toolsets.
E. User Authentication and Identity Proofing
This track focuses on deeper technical best practices and insights, composed by research that is tailored to help architects, analysts, engineers, technologists or IAM professionals who are looking to implement the right architectures, solutions and processes.
Technical Insights
This track covers research that helps understand how incorporating zero trust principles within your security and IAM programs improves your security posture and increases cyber resilience.
Zero Trust
This track points to research that includes technologies that enable secure and trusted digital interactions among people, machines and assets, based on a digital representation of people’s and machines’ physical (real-world) and virtual (electronic) identities.
Digital Identity
Organizations are squarely in the multicloud hybrid era, with resources flung between multiple cloud providers and on-premises applications. The responsibility is to provide sound IAM no matter the cloud environment. Learn how IAM can support and enhance, not hinder, your cloud migration.
Cloud Enablement
more than 50% of the workforce and more than 20% of customer authentication transactions will be passwordless, up from less than 10% today.
Explore Sessions
Interactive
This conference is designed so you can engage with and learn from peers and Gartner experts in myriad ways:
Workshops
One-on-one sessions
Contract Negotiation Clinic
Roundtables
Ask the Expert sessions
Gartner Magic Quadrant™ sessions
more than 25% of multifactor authentication transactions using a token will be based on Fast IDentity Online authentication protocols, up from less than 5% today.
70% of new access management, governance, administration and privileged access deployments will be converged identity and access management platforms.
View Exhibitors
In a tech-driven world, access is everything — and Gartner Identity & Access Summit gives it to you. Gain access to solution providers at the forefront of technology.
Exhibitors
Get objective insight and expert guidance to tackle your biggest priorities in the next normal at Gartner Identity & Access Management Summit 2022.
Don’t miss this chance
Solution Provider Sessions
Make educated investment decisions based on unbiased insights from Gartner, case studies and live interactions with solution providers.
Interactive sessions
Get a snapshot of the solution landscape, driven by Gartner research. Create your solution provider shortlist based on your assessment criteria.
Meet with exhibitors and receive individual guidance tailored to your goals and challenges. You’ll be offered tangible next steps to immediately implement solutions and achieve business priorities.
Exhibitor meetings
When you’re looking to address a specific issue, these strategic roadmap presentations and user case studies provide real-world advice.
Ways to engage
Solution Provider sessions