• Gartner Identity And Access Management Conference

    Start Your IAM Journey Now

    Build a detailed roadmap supported by technical architecture
    and specific IAM initiatives for digital age success

    View Infographic
  • Gartner Identity And Access Management Conference

    View Our 2016 Brochure

    An agenda built around your needs and priorities

    View Brochure
  • Gartner Identity And Access Management Conference

    Attend as a Team and Save

    Maximize your learning by attending Gartner IAM Summit as a group and save. 

    Learn More
  • Gartner Identity And Access Management Conference

    Inspiring Guest Keynote

    Hear from Jacob Morgan, Author and Futurist


     

    Learn More

IAM Innovation for a Digital Future – Making the Value Come Alive

Get the information you need to craft and refine your IAM vision and strategy for agile, digital-age security, so you can drive faster time to value. Update and refine your IAM program based on leading-edge research covering mobile, cloud, IAM as a service, privileged identity strategies, and IoT.

Gartner IAM Summit was designed for individuals in the following roles:
Roles Include:
  • CISOs, CSOs, CROs
  • Security architects
  • Infosecurity leaders
  • Network security managers
  • IT risk managers
  • IT GRC managers
Security and Risk Leaders
Roles Include:
  • IAM program leads
  • IAM architects
  • IAM planners
  • IAM consultants
  • Access managers
IAM Leaders
Roles Include:
  • Applications managers
  • I&O leaders
  • UX managers
  • IT service managers
  • Systems analysts
IT Leaders
Roles include:
  • Enterprise architects
  • Technical architects
  • Solution architects
  • Application architects
Architects

What You Will Learn


  • Understand the impact of cloud, mobility, social and big data on IAM
  • Implement digital business practices by adopting a simplified IAM approach
  • Learn where and how IAM fits within the larger context of solving business-relevant problems
  • Best practice case studies and practical advice for IAM governance
  • Take compliance reporting to the next level by leveraging identity and access intelligence
  • Create a more access accountable and transparent organizational culture for your enterprise

See what attendees have said about what they learned

What's Included



*Online preregistration is required for one-on-ones, workshops and analyst-user roundtables (AURs).
Reserve your place early, as space is limited.
 

Frequently Asked Questions


Get answers to your questions here


Agenda

The 2016 agenda delivers strategic insights for IAM in the digital age, as well as the latest tactics in IAM architecture. Whether you’re launching a new program or advancing existing capabilities, you’ll find the information you need to deliver security, agility and greater business value—and prepare for the future of IAM.



 

2016 Tracks

A) Foundational Strategies in IAM
Every program needs a solid foundation. This track provides the information you need to properly plan and organize your IAM program, create or restart an IAM strategy and ensure that process and controls are implemented to gain real business benefits. It provides time-proven best practices, focuses on doing the simple and most appropriate things first, and helps you avoid a number of pitfalls.

B) Next Steps: Enhance and Advance Your IAM Program
Your IAM program is established. You have identified a set of projects. How will you move forward simply and successfully? This track helps you make the most of the tools that you have, augment those tools appropriately to fill gaps and ensure you are positioning your current IAM infrastructure for success.

C) Future Focus: IAM in the Digital Age
The Nexus of Forces (cloud, mobile, social and information) continues to have a profound effect on IAM programs. Digital business and the Internet of Things have begun to influence IAM plans. This track explores where and how IAM can support and leverage these emerging trends and technologies.

D) The Big Picture: Security, Risk and IAM
IAM and threat protection security are related disciplines. There are process, organizational, functional and technological overlaps that should be considered so you can maximize your investment and have a robust, multifaceted approach to IAM, infrastructure protection and risk management within your organization. This track provides advice on the security disciplines that intersect with IAM, focusing on the most important security trends.

Virtual Track: TechInsights for Agile IAM Architectures
Taking an architectural perspective to how IAM technology and processes are realized is critical to achieving a sustainable, flexible, and effective IAM program. These will be in-depth talks providing real-world insight into  identity governance and administration, authorization,  cloud and identity, using identity to protect APIs, privacy, and identity externalization including social identity.

View TechInsights flyer
 

Hot Topics to be Covered

  • The future of IAM
  • IAM implementation best practices
  • IAM and Internet of Things
  • Single sign-on for cloud and mobile apps
  • Analytics-driven IAM
  • Balancing user experience vs security
  • IAM governance and organization
  • Authentication, privileged access trends
"SESSIONS WERE VERY SPECIFIC PROVIDING ACTIONABLE INSIGHT AND RECOMMENDATIONS. THEY WERE ALSO TARGETED TO ORGANIZATIONS WITH DIFFERING LEVELS OF IAM SOPHISTICATION."

- Jon Magers, Information Security Officer Salem Health

Optimize Your Attendance


You'll be able to add these Gartner exclusives to your agenda:

  • Admission to all Keynote sessions
  • 30 minute Gartner Analyst One-on-One
  • Analyst-User Roundtables
  • Workshops
  • End-User Case Studies
  • Solution Provider Showcase
  • Lunch and Snacks

 



Exhibitors

Meet the Solution Providers at the Forefront of IAM

Gartner Identity & Access Management Summit will help you develop a "short list" of technology and service providers who can meet your particular needs. You'll receive exclusive access to some of the world's leading technology and service providers in a variety of settings.

Premier


Platinum


Silver


Become an Exhibitor


Take Your Place Among Technology's Key Players
Join us now

 

Exhibitor Interactions


Read more​ about how you can interact with our exhibitors

Venue & Travel

London, UK

Venue

Park Plaza Westminster
200 Westminster Bridge Road
London, United Kingdom - SE1 7UT


Accommodations

Park Plaza Westminster
200 Westminster Bridge Road, 
London, SE1 7UT, UK

A limited number of rooms have been held at the Park Plaza Westminster Bridge Hotel for attendees of the Gartner Identity & Access Management Summit. There are two special promotional Gartner
rates available:

Superior Room: £185 per night (Includes Breakfast)
Studio Room: £215 per night (Includes Breakfast)

Please note that these rates are based on single occupancy and excludes VAT.

In order to secure accommodation at the preferred rate please click on the link below:
http://www.parkplaza.com/iam-management-summit

Alternatively, you can either e-mail your request to gartnerconference@pphe.com or call the Park Plaza Westminster Bridge in-house reservations office on +44 844 415 6780, quoting the promotion
code GART107

Reservation Office opening times are:

Monday to Friday between 08:00 - 19:00 (London Time)
Saturday between 09:00 - 17:30 (London Time)


 

Park Plaza County Hall
1 Addington Street
London, United Kingdom
SE1 7RY



A Note About Accomodations


Gartner has been made aware that a service provider called Exhibition Housing Management has contacted a number of individuals who are attending our conference to offer hotel reservation services. Exhibition Housing Management does not represent Gartner, nor have we authorized them to contact attendees on our behalf. 
Learn more