IAM enables entities to connect and control access, forming the interaction blueprint among humans, machines, and organizations. IAM takes on a pivotal role in the digital era, adapts to accommodate cloud and AI, and defends against the evolving cyber threat landscape.
G
helps IAM and security leaders navigate implementing and operating a scalable IAM infrastructure with the goal of elevating the importance of
identity as a key discipline.
Prepare for ongoing disruption with prioritized risk management
Embrace sustainability as a
competitive advantage
Integrate purpose-driven strategy
Accelerate digital supply chain transformation
Enable customer centricity and customer-driven business transformation
Your community is waiting. Join us, December 9 – 11, in Grapevine, TX, right outside of Dallas, to discover the future of IAM, and gain the tools you need to elevate IAM as a key discipline and steer your organization through an evolving landscape of increasingly sophisticated threats.
© 2024 Gartner, Inc. and/or its affiliates. All rights reserved. EVTM_979_3098059
Unleash the value of your IAM programs and initiatives
Engage and collaborate with IAM peers and Gartner experts in a variety of ways.*
Identity Amplified
*Topics are subject to change; please click here for the most up-to-date agenda.
An interactive experience like no other
DRAFT
Drive automation across planning, procurement and logistics
Accelerate circular economy outcomes
Support operational excellence
Advance progress on diversity, equity and inclusion (DEI) and environmental and social governance (ESG) goals
Recruit and develop talent
Increase visibility
Register Now
The summit has changed the way I see identity. It’s much much bigger than
I thought. Indeed identity is the next security. The quality of speakers and substance of the content is apt.”
Explore the latest IAM trends and Gartner Predicts, including:
2025
2026
2027
2025
By 2027, 45% of IAM leaders will be promoted into executive roles, due to increased demand for effectiveness of compliance with regulations involving identity breaches.
70% of identity-first security strategies will fail unless organizations adopt context-based access policies that are continuous and consistent.
By 2025 at least 35% of organizations
will utilize generative AI as part of
their identity fabric functions. These organizations will substantially improve user experience and efficiency of their IAM controls.
2026
2027
Source: Gartner
3
days
1,800+
attendees
90+
exhibitors
Conference by the numbers
25+
experts
Bring your team
Accelerate learning, strengthen your team and build a shared vision by attending as a group. Receive complimentary ticket(s) when you register as a team.*
Thought-provoking and innovative. Fantastic chance to hear across industries how things are happening and also hear from fellow experts. The best part is there are future leading articles that shows the trend of innovation. It’s a great chance to hear from some work in the pipeline to be published.”
Edward Mugerwa
Director of IT Operations and Infrastructure, Bank of Uganda
Amit Kakad
Identity Principle, BP
Workshops
Workshops
Roundtables
Roundtables
Ask the Expert sessions
Ask the Expert sessions
Gartner one-on-one meetings
Gartner one-on-one meetings
Workshops
In these small-scale, interactive sessions, you can drill down on specific topics with a how-to focus. (Preregistration is required.)
View Agenda
Roundtables
These topic-driven end-user forums are moderated by Gartner experts and offer the opportunity to learn what peers are doing around particular issues across industries. (Preregistration is required.)
View Agenda
View Agenda
Ask the Expert sessions
These topic-driven sessions provide a more intimate discussion forum, featuring one Gartner expert and end-user peers posing questions. (Preregistration is required.)
View All Experts
Gartner one-on-one meetings
A 30-minute consultation with a Gartner expert provides targeted, personalized guidance to help you plan proactively and invest wisely. (Preregistration is required.)
Contract
Negotiation
Clinics
Learn More
Contract Negotiation Clinics
Uncover new tactics for planning or negotiating a contract with the biggest of the big software vendors and services to maximize your business value. (Preregistration is required.)
View Agenda
Agenda tracks
Designed for executives and IAM leaders focused on these key initiatives
Attendees have access to six agenda tracks and two spotlight tracks with 80+ sessions of the latest Gartner research specifically designed to help IAM leaders meet the demands of the future.
D. Privileged Access Management (PAM)
A. IAM Program Management
E. Identity Verification and Authentication
F. Cybersecurity and Organizational Alignment
B. Access Management
C. Identity Governance and Administration (IGA)
Any successful digital business initiative and cybersecurity strategy depends on a mature IAM program. This track provides best practices for establishing a well-governed
IAM program to enhance your overall security posture while delivering business value.
Get the information you need to amplify the role of identity to secure your organization while enhancing the overall user experience.
A. IAM Program Management
D. Privileged Access Management (PAM)
E. Identity Verification and Authentication
F. Cybersecurity and Organizational Alignment
B. Access Management
C. Identity Governance and Administration (IGA)
Gartner Identity & Access Management Summit 2024, December 9 – 11, in Grapevine, TX,
Access management enables secure and resilient access for anyone or anything to anywhere.
This track provides insight into authentication, authorization, MFA, single sign-on, identity federation, and API access. Explore the foundation and advancements in these capabilities to support customer IAM (CIAM), employee IAM and API access use cases.
IGA enables identity life cycle management and access administration to implement admin-time authorization. This track provides insight into enhancement such as cloud support, identity
data engineering, dynamic provisioning, policy orchestration, and smart controls. Get more information on ways to improve your IGA initiative to harden identity security posture and access compliance.
PAM enables discovery and managing of sensitive credentials as well as just-in-time connectivity and session management to implement the least privilege principle. This track provides the latest on PAM controls evolution for a variety of use cases. Find out why PAM has become one of the most critical cybersecurity capabilities to maintain the security posture for protecting sensitive human-to-machine and machine-to-machine interactions on-premise and in the cloud.
In a world of heightened risk of fake data and identity, organizations must constantly enhance their identity verification and user authentication with fraud detection, advanced analytics and orchestration, to build adaptive, trusted user journeys. This track is essential for understanding how to establish trust in the identity of new and existing users and mitigate the risks of account takeover and other advanced attacks for all use cases such as employees and consumers.
Remote work, digitalization, cloud migration, generative AI, organizational dependencies,
and zero trust have more than ever made IAM
a core element and key enabler of the cybersecurity strategy. This track addresses
key CISOs' questions about IAM to discover bridge the cybersecurity and IAM disciplines
by understanding access risks, key IAM controls, their value, prioritization, and communicating strategies.
Gaylord Texan Hotel & Convention Center
1501 Gaylord Trail
Grapevine, TX 76051 United States
You must be registered to book your accommodation, which can be reserved directly through the online registration system by visiting the conference website.
Venue
Attending for the
first time?
1.
2.
3.
4.
5.
Here are the top 5 things you must do:
Discuss challenges faced and winning strategies with peers across industries during interactive sessions.
Grab a drink or snack at one of the exhibitor receptions; it’s on them!
Strike up a conversation with someone you don’t know at breakfast, lunch or in between sessions.
Book time with a Gartner expert and chat about projects, priorities and plans — you’ll have their undivided attention.
Get a lay of the land and plan your daily schedule by downloading the Gartner Conference Navigator app.
If you do just one of these things — download the Gartner Conference Navigator app! The session slides are housed there,
so you can focus on the content instead of taking photos during
the most important presentations. Plus, you can opt in to networking and connecting with other leaders on-site.
*See Group Rate Discount terms and conditions.
Group Rate Discount
Total cost
$15,400
25% group savings
$11,550
4
Total cost
$19,250
20% group savings
$15,400
5
Total cost
$23,100
16% group savings
$19,250
6
Total cost
$26,950
28% group savings
$19,250
7
Total cost
$30,800
25% group savings
$23,100
8
Total cost
$34,650
22% group savings
$26,950
9
Total cost
$38,500
30% group savings
$26,950
10
Total cost
$42,350
27% group savings
$30,800
11
Total cost
$46,200
25% group savings
$34,650
12
Total cost
$50,050
23% group savings
$38,500
13
Total cost
$53,900
28% group savings
$38,500
14
Thought Leadership Theaters
VP Analyst
Mary Ruddy
Register Now
Gartner Identity & Access Management Summit
December 9 – 11, 2024 | Grapevine, TX
gartner.com/us/iam
Return to Top
Register Now
Testimonials
Agenda Tracks
Interactive Experience
What's New
Exhibitors
Bring Your Team
Testimonials
Agenda Tracks
Interactive Experience
What's New
Exhibitors
Bring Your Team
Total cost
$67,875
20% group savings
$54,300
15
Total cost
$72,400
19% group savings
$58,825
16
Total cost
$76,925
18% group savings
$63,350
17
Total cost
17% group savings
$67,875
18
Total cost
$85,975
16% group savings
$72,400
19
Total cost
$90,500
20% group savings
$72,400
20
$81,450
Discover what your peers are saying about our conference
Jeroen Remie
IGA Team Lead, Traxion
Gartner (IAM) is the event to meet like-minded people, see what is up with the market and stay on top of current developments. It also provides a premier atmosphere for networking and collaboration.”
2024 sessions
Spotlight tracks
Technical Insights
GenAI and Other Emerging Tech and Identity Standards
This track encompasses a collection of deeper technical design, best practices and insights, composed by research that is tailored to help architects, analysts, engineers, consultants, technologists or IAM professionals who are
looking for additional inspiration in design and
to implement the right architectures, solutions
and processes.
This track discusses advanced topics that bring you to the leading edge of IAM innovation. Join
us to discuss how generative AI will change the human-IAM interaction model or how to build access control for chatbots. Learn about trends and advancement in decentralized identity and verifiable credentials to understand how humans, machines, and organizations connect and exchange data in future. Finally, see how emerging IAM standards and identity data engineering can bring us closer to identity fabric vision.
Technical Insights
GenAI and Other Emerging Tech and Identity Standards
Return to Top
Return to Top
Return to Top
3
days
Guest keynotes
What’s new for 2024
Experienced practitioners and thought leaders help you expand your thinking and discover new approaches to make smarter business decisions.
Explore Speakers
Founder, Cybermindz
How to Build and Execute Best RFP for an PAM Product
How to Develop a Minimum Viable Architecture for IAM
How to Build an IAM Program/Capability
How to Build and Execute Best RFP for an IGA Product
How to Evaluate CIAM Vendors
Hands-On Generational AI Prompt Injection Challenge
•
•
•
•
2024 sessions
What’s the State of Quantum Computing and How Worried Should You Be?
IAM Leadership Perspective
Women in Technology: Fearless Challengers of the Status Quo
How to Manage External Identities and Sharing in Microsoft 365
•
•
2024 sessions
IGA Integration With PAM, Access Management and IaaS
How to Implement Multifactor Authentication
Who Can You Trust in a World of Deepfakes?
Dos and Don’ts of DevOps & Product Management in IAM
How Can You Secure the Account Recovery Process?
Guidance for Using Key Privacy Lessons When Preparing for AI Regulations
•
Best Practices for Privileged Access Management
Getting Started With Data Engineering for IAM
Is Light IGA Right for Your IAM Needs?
What Does Policy-Based Authorization Mean
for Reducing Access Risk?
•
•
•
•
•
•
•
•
•
Peter Coroneos
Spotlight track: GenAI and Other Emerging Technologies and Identity Standards
New tracks
Explore Agenda
This track discusses advanced topics that bring you to the leading edge of IAM innovation: How AI will change the human-IAM interaction model, trends in decentralized identity and fine-grained authorization and emerging IAM standards.
Exhibit Showcase
Gain access to vendors at the forefront of technology, and save time in finding the right solutions. Don’t miss this opportunity to meet your peers and 90+ providers — all under one roof.
Premier
View All Exhibitors
Admiral William H. McRaven
Former Commander of U.S. Special Operations Command and
Bestselling Author
Guest Keynote
Make Your Bed
Drawing from his viral 2014 commencement speech with 150+ million views, Admiral William H. McRaven shares captivating stories from his Navy SEAL training, the Osama Bin Laden raid, and the capture of Saddam Hussein. Through these experiences, he presents the 10 life lessons learned during his 37-year military career. Admiral McRaven’s talk is both educational and inspiring, offering practical wisdom and engaging anecdotes.
Workshop: How to Select the Right Design and Technologies to Derisk AI
Workshop: Data Management for LLM Deployments — Unlocking the Path to Success
Workshop: Deploy Data and Analytics Governance for Success
Workshop: Avoiding the Top Mistakes in Your Dashboard Through Best Practices in Data Storytelling
Workshop: Identify Successful Tactics to Launch and Sustain Data Stewardship
Workshop: How to Link Data and Analytics to Business Outcome
Workshop: Create a Robust AI Strategy — From Plan to Execution
Workshop: Design Patterns for Building Generative AI Applications
*Agenda as of 12 February 2023
Workshop: How to Use Financial Models for Negotiation Leverage and Bargaining Power
Workshop: Humanize the AI Elements of Your Product With Empathy and Candor
Workshop: Identify and Fix Your Gaps Between Strategy and Execution
Workshop: Practical AI for Midsize Enterprises — Get Started Today
•
•
•
•
•
•
•
•
•
•
•
•
Explore Speakers
Guest Speaker
Building a Trust Fabric With the OpenID Shared Signals Framework
OpenID SSF, CAEP and RISC are open standards that enable instantaneous event-based communication, enabling real-time ITDR. Leading companies have announced their support for this set of standards and some are demonstrating its interoperability in this conference. Join this session to learn about how this works and why
it is critical to building a trust fabric for your organization.
Atul Tulshibagwale
CTO, SGNL.ai INC and Co-Chair, OpenID SSWG
Workshop: How to Select the Right Design and Technologies to Derisk AI
Workshop: Data Management for LLM Deployments — Unlocking the Path to Success
Workshop: Deploy Data and Analytics Governance for Success
Workshop: Avoiding the Top Mistakes in Your Dashboard Through Best Practices in Data Storytelling
Workshop: Identify Successful Tactics to Launch and Sustain Data Stewardship
Workshop: How to Link Data and Analytics to Business Outcome
Workshop: Create a Robust AI Strategy — From Plan to Execution
Workshop: Design Patterns for Building Generative AI Applications
*Agenda as of 12 February 2023
Workshop: How to Use Financial Models for Negotiation Leverage and Bargaining Power
Workshop: Humanize the AI Elements of Your Product With Empathy and Candor
Workshop: Identify and Fix Your Gaps Between Strategy and Execution
Workshop: Practical AI for Midsize Enterprises — Get Started Today
•
•
•
•
•
•
•
•
•
•
•
•
Admiral William H. McRaven
Make Your Bed
Former Commander of U.S. Special Operations Command and
Bestselling Author
Atul Tulshibagwale
Building a Trust Fabric With the OpenID Shared Signals Framework
CTO, SGNL.ai INC and Co-Chair, OpenID SSWG
Guest speakers
Ian Glazer
What I Wish I Knew, When I Was Starting Out
Founder and President, Weave Identity
Guest Speaker
What I Wish I Knew, When I Was Starting Out
Becoming an identity practitioner, let alone an identity professional, is a long journey. Mistakes will be made; wrong turns are a given. Join this panel of identity practitioners as they discuss what they wish they knew before setting out on their journeys, common mistakes you can avoid, and tips and techniques for accelerated your career.
Ian Glazer
Founder and President, Weave Identity
Workshop: How to Select the Right Design and Technologies to Derisk AI
Workshop: Data Management for LLM Deployments — Unlocking the Path to Success
Workshop: Deploy Data and Analytics Governance for Success
Workshop: Avoiding the Top Mistakes in Your Dashboard Through Best Practices in Data Storytelling
Workshop: Identify Successful Tactics to Launch and Sustain Data Stewardship
Workshop: How to Link Data and Analytics to Business Outcome
Workshop: Create a Robust AI Strategy — From Plan to Execution
Workshop: Design Patterns for Building Generative AI Applications
*Agenda as of 12 February 2023
Workshop: How to Use Financial Models for Negotiation Leverage and Bargaining Power
Workshop: Humanize the AI Elements of Your Product With Empathy and Candor
Workshop: Identify and Fix Your Gaps Between Strategy and Execution
Workshop: Practical AI for Midsize Enterprises — Get Started Today
•
•
•
•
•
•
•
•
•
•
•
•
Explore Speakers
Explore Speakers
Explore Speakers
Guest Speaker
Paradigm Shift: Moving From Legacy to Modern, Cloud IGA
Making a technology change is never easy, especially when you need to meet the strategic technology needs of a global leader in the hospitality industry such as Hyatt Hotel Corportation. This session highlights the lessons Art Chernobrov learned migrating from a legacy system — why they decided they needed to move, how long it took, and what Hyatt learned along the way.
Workshop: How to Select the Right Design and Technologies to Derisk AI
Workshop: Data Management for LLM Deployments — Unlocking the Path to Success
Workshop: Deploy Data and Analytics Governance for Success
Workshop: Avoiding the Top Mistakes in Your Dashboard Through Best Practices in Data Storytelling
Workshop: Identify Successful Tactics to Launch and Sustain Data Stewardship
Workshop: How to Link Data and Analytics to Business Outcome
Workshop: Create a Robust AI Strategy — From Plan to Execution
Workshop: Design Patterns for Building Generative AI Applications
*Agenda as of 12 February 2023
Workshop: How to Use Financial Models for Negotiation Leverage and Bargaining Power
Workshop: Humanize the AI Elements of Your Product With Empathy and Candor
Workshop: Identify and Fix Your Gaps Between Strategy and Execution
Workshop: Practical AI for Midsize Enterprises — Get Started Today
•
•
•
•
•
•
•
•
•
•
•
•
Rahaf Harfoush
Digital Zen: Mastering Well-Being in a Constantly Connected World
Digital Anthropologist and Bestselling Author
Rahaf Harfoush
Digital Anthropologist and Bestselling Author
Guest Keynote
Digital Zen: Mastering Well-Being in a Constantly Connected World
IAM leaders and their teams operate in a constantly pressurized environment, leading to high levels of stress and burnout, and a decline in mental well-being. Added to this, workers find themselves navigating a deluge of digital information, struggling to maintain focus amid constant interruptions, and grappling with the implications of an overly connected lifestyle. The resultant digital fatigue and team misunderstandings highlight the need for a critical reevaluation of our digital habits, and the cultivation of practices that support digital well-being.
This keynote addresses the impact of stress and burnout on cybersecurity professionals and the psychological effects of doom-scrolling and dopamine-driven interactions on our ability to focus, engage in deep work and maintain mental health. Rahaf Harfoush explores strategies for IAM professionals and
their teams to mitigate these challenges, promoting a healthier, more balanced approach to work and life.
Workshop: How to Select the Right Design and Technologies to Derisk AI
Workshop: Data Management for LLM Deployments — Unlocking the Path to Success
Workshop: Deploy Data and Analytics Governance for Success
Workshop: Avoiding the Top Mistakes in Your Dashboard Through Best Practices in Data Storytelling
Workshop: Identify Successful Tactics to Launch and Sustain Data Stewardship
Workshop: How to Link Data and Analytics to Business Outcome
Workshop: Create a Robust AI Strategy — From Plan to Execution
Workshop: Design Patterns for Building Generative AI Applications
*Agenda as of 12 February 2023
Workshop: How to Use Financial Models for Negotiation Leverage and Bargaining Power
Workshop: Humanize the AI Elements of Your Product With Empathy and Candor
Workshop: Identify and Fix Your Gaps Between Strategy and Execution
Workshop: Practical AI for Midsize Enterprises — Get Started Today
•
•
•
•
•
•
•
•
•
•
•
•
Explore Speakers
Explore Speakers
Guest Speaker
Executive Story: Gatwick’s “Flight Path” for Mastering Security Service Requirements
Join us on an exhilarating journey as London Gatwick’s head of cybersecurity unveils their flight plan for mastering security service requirements when procuring services. Buckle up as we explore how Gatwick Airport leverages security as a strategic lever, forging powerful partnerships between business
units and suppliers.
Megan Poortman
Head of Cybersecurity
at Gatwick Airport
Workshop: How to Select the Right Design and Technologies to Derisk AI
Workshop: Data Management for LLM Deployments — Unlocking the Path to Success
Workshop: Deploy Data and Analytics Governance for Success
Workshop: Avoiding the Top Mistakes in Your Dashboard Through Best Practices in Data Storytelling
Workshop: Identify Successful Tactics to Launch and Sustain Data Stewardship
Workshop: How to Link Data and Analytics to Business Outcome
Workshop: Create a Robust AI Strategy — From Plan to Execution
Workshop: Design Patterns for Building Generative AI Applications
*Agenda as of 12 February 2023
Workshop: How to Use Financial Models for Negotiation Leverage and Bargaining Power
Workshop: Humanize the AI Elements of Your Product With Empathy and Candor
Workshop: Identify and Fix Your Gaps Between Strategy and Execution
Workshop: Practical AI for Midsize Enterprises — Get Started Today
•
•
•
•
•
•
•
•
•
•
•
•
Key take-aways:
•
•
Discover how Gatwick ensures services procured today remain relevant tomorrow, adapting seamlessly to the ever-changing organizational landscape.
Hear firsthand from the head of cyber about their
risk-based approach to service scoping, ensuring robust protection without compromising agility.
Soaring Beyond Boundaries: Navigating the Skies of Cybersecurity
Navigating turbulence.
Risk-based altitude.
•
•
Andrew Nash
Identity consultant
Andrew Nash
Identity consultant
•
•
Contract
Negotiation
Clinics
2024 sessions
Contract Negotiation Clinic: Microsoft 365
•
Art Chernobrov
Paradigm Shift: Moving From Legacy to Modern, Cloud IGA
Director, Identity, Access and Endpoints, Hyatt Hotels Corporation
Art Chernobrov
Director, Identity, Access and Endpoints, Hyatt Hotels Corporation
Shared Signals Interop Demos: CAEP and RISC in Action
Watch live demos by implementers participating in the shared signals interoperability event co-hosted by the OpenID Foundation.
Special Sessions
Explore Agenda
Identity at the Center Podcast Session
Hear questions answered and discussions on all things IAM
with podcast hosts Jim McDonald and Jeff Steadman.
Connect with like-minded IAM peers in topic-based breakfasts.
Networking Breakfasts
Have fun and build new business relationships with fellow IAM leaders in special events.
Peer Meetups
Melissa Carvalho
Women’s Networking Breakfast: Being a Leader, Being Yourself
VP, Global Cybersecurity Strategic Services
Megan Shamas
Passkeys 101: Foundations and State of Adoption
Chief Marketing Officer, FIDO Alliance
Omri Gazitt
AuthZEN: The “OpenID Connect”
of Authorization
Co-Founder and CEO, Aserto
Explore Speakers
Guest Speaker
Women’s Networking Breakfast: Being a Leader, Being Yourself
How can you use having a different leadership or communication
style than most people in your work environment to your advantage? How do you maintain your power and influence as a leader, while also staying true to yourself? Join us for this networking breakfast to share experiences and strategies for different leadership styles with your peers. This breakfast is open to all genders and identities.
Workshop: How to Select the Right Design and Technologies to Derisk AI
Workshop: Data Management for LLM Deployments — Unlocking the Path to Success
Workshop: Deploy Data and Analytics Governance for Success
Workshop: Avoiding the Top Mistakes in Your Dashboard Through Best Practices in Data Storytelling
Workshop: Identify Successful Tactics to Launch and Sustain Data Stewardship
Workshop: How to Link Data and Analytics to Business Outcome
Workshop: Create a Robust AI Strategy — From Plan to Execution
Workshop: Design Patterns for Building Generative AI Applications
*Agenda as of 12 February 2023
Workshop: How to Use Financial Models for Negotiation Leverage and Bargaining Power
Workshop: Humanize the AI Elements of Your Product With Empathy and Candor
Workshop: Identify and Fix Your Gaps Between Strategy and Execution
Workshop: Practical AI for Midsize Enterprises — Get Started Today
•
•
•
•
•
•
•
•
•
•
•
•
Melissa Carvalho
VP, Global Cybersecurity Strategic Services
Explore Speakers
Guest Speaker
Passkeys 101: Foundations and State of Adoption
Passkeys represent a new paradigm in authentication; finally, there
is a phishing-resistant, user-friendly and scalable way to replace passwords. But, IAM teams continue to have questions around how passkeys can fit into their organization. Join this session for a deep dive on passkeys: what they are, how they work, why the FIDO Alliance has introduced them, and how you can use them in your authentication strategy. Plus, learn about the state of passwordless authentication from the FIDO lens and how to get started toward your own.
Workshop: How to Select the Right Design and Technologies to Derisk AI
Workshop: Data Management for LLM Deployments — Unlocking the Path to Success
Workshop: Deploy Data and Analytics Governance for Success
Workshop: Avoiding the Top Mistakes in Your Dashboard Through Best Practices in Data Storytelling
Workshop: Identify Successful Tactics to Launch and Sustain Data Stewardship
Workshop: How to Link Data and Analytics to Business Outcome
Workshop: Create a Robust AI Strategy — From Plan to Execution
Workshop: Design Patterns for Building Generative AI Applications
*Agenda as of 12 February 2023
Workshop: How to Use Financial Models for Negotiation Leverage and Bargaining Power
Workshop: Humanize the AI Elements of Your Product With Empathy and Candor
Workshop: Identify and Fix Your Gaps Between Strategy and Execution
Workshop: Practical AI for Midsize Enterprises — Get Started Today
•
•
•
•
•
•
•
•
•
•
•
•
Megan Shamas
Chief Marketing Officer, FIDO Alliance
Explore Speakers
Guest Speaker
AuthZEN: The “OpenID Connect” of Authorization
Today, the authorization world is fractured — each vendor supports
its own APIs and protocols. But this is about to change: OIDF AuthZEN was created in late 2023 to establish much-needed standards. This session will describe the state of modern authorization, review the
API and show off interoperable implementations. With AuthZEN, IAM teams can confidently externalize and standardize authorization across their application estate without being locked into a proprietary API.
Workshop: How to Select the Right Design and Technologies to Derisk AI
Workshop: Data Management for LLM Deployments — Unlocking the Path to Success
Workshop: Deploy Data and Analytics Governance for Success
Workshop: Avoiding the Top Mistakes in Your Dashboard Through Best Practices in Data Storytelling
Workshop: Identify Successful Tactics to Launch and Sustain Data Stewardship
Workshop: How to Link Data and Analytics to Business Outcome
Workshop: Create a Robust AI Strategy — From Plan to Execution
Workshop: Design Patterns for Building Generative AI Applications
*Agenda as of 12 February 2023
Workshop: How to Use Financial Models for Negotiation Leverage and Bargaining Power
Workshop: Humanize the AI Elements of Your Product With Empathy and Candor
Workshop: Identify and Fix Your Gaps Between Strategy and Execution
Workshop: Practical AI for Midsize Enterprises — Get Started Today
•
•
•
•
•
•
•
•
•
•
•
•
Omri Gazitt
Co-Founder and CEO, Aserto
Paint for Purpose: Community Service Project
Take a break to unwind with your peers while collaboratively painting murals for donation to the Physicians Pediatric Center — Bay Area, in Houston, Texas.
Rola Turk
Senior Director, Identity Life Cycle Management and Intelligence, RBC
Rola Turk
Senior Director, Identity Life Cycle Management and Intelligence, RBC
David Brossard
AuthZEN: The “OpenID Connect”
of Authorization
Chief Technology Officer, Axiomatics
Explore Speakers
Guest Speaker
AuthZEN: The “OpenID Connect” of Authorization
Today, the authorization world is fractured — each solution provider supports its own APIs and protocols. But this is about to change: OIDF AuthZEN was created in late 2023 to establish much-needed standards. This session describes the state of modern authorization, reviews APIs and shows off interoperable implementations. With AuthZEN, IAM teams can confidently externalize and standardize authorization across their application estate without being locked
into a proprietary API.
Workshop: How to Select the Right Design and Technologies to Derisk AI
Workshop: Data Management for LLM Deployments — Unlocking the Path to Success
Workshop: Deploy Data and Analytics Governance for Success
Workshop: Avoiding the Top Mistakes in Your Dashboard Through Best Practices in Data Storytelling
Workshop: Identify Successful Tactics to Launch and Sustain Data Stewardship
Workshop: How to Link Data and Analytics to Business Outcome
Workshop: Create a Robust AI Strategy — From Plan to Execution
Workshop: Design Patterns for Building Generative AI Applications
*Agenda as of 12 February 2023
Workshop: How to Use Financial Models for Negotiation Leverage and Bargaining Power
Workshop: Humanize the AI Elements of Your Product With Empathy and Candor
Workshop: Identify and Fix Your Gaps Between Strategy and Execution
Workshop: Practical AI for Midsize Enterprises — Get Started Today
•
•
•
•
•
•
•
•
•
•
•
•
David Brossard
Chief Technology Officer, Axiomatics
Sean Kennedy
Executive Story: An Identity-First Approach to Mergers and Acquisitions
Senior Director, IAM Strategy, Royal
Bank of Canada
Explore Speakers
Guest Speaker
Executive Story: An Identity-First Approach to Mergers and Acquisitions
In a merger or acquisition (M&A), identity and access management (IAM) is essential to secure and streamline the integration of systems, personnel and processes, while unlocking value for the business. This session explores an IAM-first approach to driving successful M&As.
Workshop: How to Select the Right Design and Technologies to Derisk AI
Workshop: Data Management for LLM Deployments — Unlocking the Path to Success
Workshop: Deploy Data and Analytics Governance for Success
Workshop: Avoiding the Top Mistakes in Your Dashboard Through Best Practices in Data Storytelling
Workshop: Identify Successful Tactics to Launch and Sustain Data Stewardship
Workshop: How to Link Data and Analytics to Business Outcome
Workshop: Create a Robust AI Strategy — From Plan to Execution
Workshop: Design Patterns for Building Generative AI Applications
*Agenda as of 12 February 2023
Workshop: How to Use Financial Models for Negotiation Leverage and Bargaining Power
Workshop: Humanize the AI Elements of Your Product With Empathy and Candor
Workshop: Identify and Fix Your Gaps Between Strategy and Execution
Workshop: Practical AI for Midsize Enterprises — Get Started Today
•
•
•
•
•
•
•
•
•
•
•
•
Sean Kennedy
Senior Director, IAM Strategy, Royal Bank
of Canada
David Middleton
Beneath the Surface: Leveraging Metadata for Smarter IGA Automation
VP, IAM Transformation and Enablement, Prudential Financial
Explore Speakers
Guest Speaker
Beneath the Surface: Leveraging Metadata for Smarter IGA Automation
Learn how an iceberg analogy applies to identity governance and administration (IGA) and why metadata is both a security and business enabler across the IGA life cycle. In this session, we dive into how metadata and risk calculations combine to unlock automation potential in high-touch areas, such as entitlement descriptions, requests, approvals and recertifications. Discover how these elements work together to improve practitioner and end-user experiences, enhance compliance and drive meaningful cost savings.
Workshop: How to Select the Right Design and Technologies to Derisk AI
Workshop: Data Management for LLM Deployments — Unlocking the Path to Success
Workshop: Deploy Data and Analytics Governance for Success
Workshop: Avoiding the Top Mistakes in Your Dashboard Through Best Practices in Data Storytelling
Workshop: Identify Successful Tactics to Launch and Sustain Data Stewardship
Workshop: How to Link Data and Analytics to Business Outcome
Workshop: Create a Robust AI Strategy — From Plan to Execution
Workshop: Design Patterns for Building Generative AI Applications
*Agenda as of 12 February 2023
Workshop: How to Use Financial Models for Negotiation Leverage and Bargaining Power
Workshop: Humanize the AI Elements of Your Product With Empathy and Candor
Workshop: Identify and Fix Your Gaps Between Strategy and Execution
Workshop: Practical AI for Midsize Enterprises — Get Started Today
•
•
•
•
•
•
•
•
•
•
•
•
David Middleton
VP, IAM Transformation and Enablement, Prudential Financial
Lori Robinson
Executive Stories: Identity
Data Unleashed — Harnessing
the Power of Identity Data and Intelligence
VP, Identity and Access Management, Salesforce
Explore Speakers
Guest Speaker
Executive Stories: Identity Data Unleashed — Harnessing the Power of Identity Data and Intelligence
Salesforce, having grown through acquisition, had a classic case of identity sprawl: User accounts spread across many environments and many applications. Answering the proverbial question, “who has access to what?” was difficult — if not impossible. In this session, Lori Robinson describes how Salesforce embarked upon an effort to gain a 360-degree view of workforce identities and, in the process, unleashed a wealth of identity data and intelligence.
Workshop: How to Select the Right Design and Technologies to Derisk AI
Workshop: Data Management for LLM Deployments — Unlocking the Path to Success
Workshop: Deploy Data and Analytics Governance for Success
Workshop: Avoiding the Top Mistakes in Your Dashboard Through Best Practices in Data Storytelling
Workshop: Identify Successful Tactics to Launch and Sustain Data Stewardship
Workshop: How to Link Data and Analytics to Business Outcome
Workshop: Create a Robust AI Strategy — From Plan to Execution
Workshop: Design Patterns for Building Generative AI Applications
*Agenda as of 12 February 2023
Workshop: How to Use Financial Models for Negotiation Leverage and Bargaining Power
Workshop: Humanize the AI Elements of Your Product With Empathy and Candor
Workshop: Identify and Fix Your Gaps Between Strategy and Execution
Workshop: Practical AI for Midsize Enterprises — Get Started Today
•
•
•
•
•
•
•
•
•
•
•
•
Lori Robinson
VP, Identity and Access Management, Salesforce
Lori Robinson
VP, Identity and Access Management, Salesforce
Lori Robinson
VP, Identity and Access Management, Salesforce
Hannah Sutor
Principal Product Manager, GitLab
Hannah Sutor
Principal Product Manager, GitLab
David Turner
Senior Technical Director, FIDO Alliance
David Turner
Senior Technical Director, FIDO Alliance
