Gartner Identity & Access Management Summit
6 – 7 March 2023 | London, U.K.
Beyond IAM: Enable Identity-First Security
Register Now
© 2022 Gartner, Inc. and/or its affiliates. All rights reserved. EVTM_958_2081364
DRAFT
Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2020
Identity is foundational to cybersecurity and the running of your business — from remote work to customer access. Conventional approaches to identity and access management (IAM) are no longer sufficient, as organizations operate in an escalating threat environment in which the perimeter has become porous and zero trust is no longer optional. Adopting an identity-first security mindset means putting identity-based controls at the heart of your organization’s protection architecture and expanding capabilities around threat detection and response. Gartner Identity & Access Management Summit 2023 helps IAM and security leaders make the right decisions about which identity-first security initiatives to prioritize, how to modernize existing staffing models and whether to invest in new tools to take their organization’s security posture into the identity-first era.
Keynotes
Our powerful lineup of keynote speakers helps you expand your thinking and discover new approaches to make smarter business decisions.
How to Digitally Accelerate When You’re So Freaking Tired
Mary Mesaglio, Managing VP
How to Tell Your Story Like a Pro
Leigh McMullen, Distinguished VP Analyst
Guest keynote
It’s 2022 and we thought the long-awaited reopening was finally here. But then, wham. Omicron arrived on the scene. The pandemic sometimes seems like a never-ending story of dashed hopes. Yet, you don’t get to sit this one out. Businesses continue to transform, you must continue to lead your people, and the world doesn’t stop just because you’re tired. And we know you’re tired. This session covers how to continue your digital acceleration while keeping your people — and yourself — safe and whole. It’s a tightrope walk out there.
Lorem ipsum session description
Session title
Name, Title
over 40% of organizations will be using identity governance and administration (IGA) analytics and insights from IGA tools as part of a wider identity fabric to reduce security risks across their identity and access management estate.
By 2025,
Source: Gartner
Guest keynotes
Matthew Luhn, Story Consultant, Animator and Creative Writing Instructor
Storytelling and Big Data
Haben Girma, Author of “Haben: The Deafblind Woman Who Conquered Harvard Law”
Disability and Innovation
Fredrik Haren, The Creativity Explorer
The World of Creativity
This keynote is about the power of creativity, and what we can do to develop our full creative potential. By studying and understanding how creativity is different in different parts of the world, Fredrik Haren explores the ways we can broaden our understanding of the concept, and become better at developing our own creativity for the benefit of both our professional career and our private lives.
Disabled people are the largest historically underrepresented group, numbering more than one billion worldwide. Reaching a group of this scale creates value for everyone: Organizations that prioritize accessibility benefit by gaining access to a much larger audience, improving the experience for both disabled and nondisabled people, and facilitating further innovation. In this engaging presentation, Haben Girma shares how she became an advocate and what we can do to make our communities more inclusive.
Gartner Keynotes
Big data is changing everything from content development to culture itself. Matthew Luhn, a 20-year Pixar story veteran, will share how big data is being used to create great stories and characters in films such as “Toy Story 3,” “Inside Out” and beyond. His experience and insight will empower and inspire publishers, advertisers and innovators to forge stronger, more meaningful connections with consumers.
Guest Keynote
75% of cyberinsurance providers will mandate the use of just-in-time privileged access management principles.
Tracks
Gain actionable insight from five topic-based tracks and five spotlight tracks that span the entire agenda.
5 tracks covering your top priorities
Spotlight tracks
View Full Agenda
a global standard for portable decentralized identities will emerge in the market to address business, personal, social, societal and identity-invisible use cases.
A. Access Management B. Cybersecurity, Leadership and Strategy C. IGA D. PAM E. User Authentication and Identity Proofing
Technical Insights Zero Trust
Spotlight tracks let you explore key topics and perspectives in detail. Understand the impact of new trends. Consider ways to support your career and business goals.
Digital Identity Cloud Enablement
Access management is the source of trust for identity-first security. Explore how access management capabilities such as authorization, API access control and single sign-on have matured to support the latest demands of digital transformation.
A. Access Management
Deploying IAM, leading winning teams and supporting IAM operations require understanding the bigger role of IAM in cybersecurity. Get the information you need to take an identity-first approach to security while enhancing the overall user experience.
B. Cybersecurity, Leadership and Strategy
Identity governance and administration (IGA) is a mature, complex IAM market that is changing radically. Get more information on ways to improve your IGA initiative by learning best practices and innovations such as I AM convergence and autonomous and predictive governance, all powered by identity analytics.
C. IGA
Nearly every significant cyber breach in recent years has had something in common, a failure to monitor and control privileged access. Find out why privileged access management (PAM) principles are one of the most significant security approaches for enterprises, protecting secrets and sensitive accesses across the organization.
D. PAM
The demand for secure yet smooth digital experience is increasing. This track is essential for understanding how to establish trust in the identity of new and existing users and mitigate the risks of account takeover and other attacks through careful selection and implementation of modern toolsets.
E. User Authentication and Identity Proofing
This track focuses on deeper technical best practices and insights, composed by research that is tailored to help architects, analysts, engineers, technologists or IAM professionals who are looking to implement the right architectures, solutions and processes.
Technical Insights
This track covers research that helps understand how incorporating zero trust principles within your security and IAM programs improves your security posture and increases cyber resilience.
Zero Trust
This track points to research that includes technologies that enable secure and trusted digital interactions among people, machines and assets, based on a digital representation of people’s and machines’ physical (real-world) and virtual (electronic) identities.
Digital Identity
Organizations are squarely in the multicloud hybrid era, with resources flung between multiple cloud providers and on-premises applications. The responsibility is to provide sound IAM no matter the cloud environment. Learn how IAM can support and enhance, not hinder, your cloud migration.
Cloud Enablement
more than 50% of the workforce and more than 20% of customer authentication transactions will be passwordless, up from less than 10% today.
Explore Sessions
Interactive
This conference is designed so you can engage with and learn from peers and Gartner experts in myriad ways:
Workshops
One-on-one sessions
Contract Negotiation Clinic
Roundtables
Ask the Expert sessions
Gartner Magic Quadrant™ sessions
more than 25% of multi-factor authentication transactions using a token will be based on FIDO authentication protocols, up from less than 5% today.
70% of new access management, governance, administration and privileged access deployments will be converged identity and access management platforms.
Premier
View Exhibitors
In a tech-driven world, access is everything — and Gartner Identity & Access Summit gives it to you. Gain access to solution providers at the forefront of technology.
Exhibitors
Get objective insight and expert guidance to tackle your biggest priorities in the next normal at Gartner Identity & Access Management Summit 2023.
Don’t miss this chance
Solution Provider Sessions
Make educated investment decisions based on unbiased insights from Gartner, case studies and live interactions with solution providers.
Interactive sessions
Get a snapshot of the solution landscape, driven by Gartner research. Create your solution provider shortlist based on your assessment criteria.
Meet with exhibitors and receive individual guidance tailored to your goals and challenges. You’ll be offered tangible next steps to immediately implement solutions and achieve business priorities.
Exhibitor meetings
When you’re looking to address a specific issue, these strategic roadmap presentations and user case studies provide real-world advice.