• Gartner Identity And Access Management Conference.

    Save the Date

    Identity and Access Management Summit
    is set for 7-9 December 2015

    Add to your calendar
  • Gartner Identity And Access Management Conference.

    Access Recorded Sessions

    Gartner Events on Demand offers access 
    to recorded sessions from this event

    Watch Session Now
  • Gartner Identity And Access Management Conference.

    Conference Highlights

    Get the 2014 Conference Trip Report

    Get It Now

Drive faster time to value with your IAM program

Get the information you need to craft and refine your IAM vision and strategy for agile, digital-age security, so you can drive faster time to value. Update and refine your IAM program based on leading-edge research covering mobile, cloud, IAM as a service, privileged identity strategies, and IoT.

Gartner IAM Summit was designed for individuals in the following roles:
Roles Include:
  • CISOs and CIOs
  • IAM Program manager
  • Program management
  • Building IAM program
  • Getting stakeholder buy-in
  • Baseline services that must be deployed
  • Marketing the program
IAM Leaders
Roles Include:
  • IAM planners and implementers
  • Systems integrators
  • Authentication
  • Privileged accounts
  • Governance and administration
  • Single sign-on
IAM Architects
Roles Include:
  • CISOs
  • IAM leaders
  • Network security
  • Mobile security
  • Endpoint security
Security Leaders

What You Will Learn


  • Understand the impact of cloud, mobility, social and big data on IAM
  • Implement digital business practices by adopting a simplified IAM approach
  • Learn where and how IAM fits within the larger context of solving business-relevant problems
  • Best practice case studies and practical advice for IAM governance
  • Take compliance reporting to the next level by leveraging identity and access intelligence
  • Create a more access accountable and transparent organizational culture for your enterprise

See what attendees have said about what they learned

What's Included



*Online preregistration is required for one-on-ones, workshops and analyst-user roundtables (AURs).
Reserve your place early, as space is limited.
 

Frequently Asked Questions


Get answers to your questions here


Agenda

We're preparing our 2015 agenda which will feature comprehensive tracks to drill down on your hottest IAM topics based on your role, experience level and key focus.



 

2014 Highlights and Key Takeaways

2014 Tracks Included

  • IAM Foundations
  • Moving Your IAM Initiatives Forward
  • Future of IAM
  • Technical Insights: Your Technology Blueprint
  • Making IAM Secure 

Hot Topics to be Covered

  • Future IAM technology directions
  • IAM implementation best practices
  • Compliance and regulatory issues
  • IAM governance and organizational issues
  • Evaluating IAM tools/products

Key Take-Aways from the 2014 Conference


Image
At the ninth annual Gartner IAM Summit, attendees participated in on-site benefits, heard the latest IAM presentations from the Gartner Research community on today’s most pressing topics, attended workshops run by expert analysts and industry leaders, heard real-life experiences during peer case studies, engaged in analyst-user roundtables and one-on-one meetings with Gartner analysts, and checked out the latest solutions at the Solution Showcase.





Key Take-Aways from the 2014 Conference Included:
  • How to Start an IAM Program. Focus more on process rather than technology. Create a well-crafted vision and articulate it in light of strategic business needs. Continuously re-evaluate this. Run IAM as a governed program, not as a stand-alone IT initiative. IAM is by nature a program where issues arise unexpectedly —don't try to solve everything now
  •   Horror Stories: Why IAM Programs Fail. Be aware of the warning signs! Create a well-crafted vision and articulate it in light of strategic business needs. Continuously re-evaluate this. Run IAM as a program, not as an initiative. Select products only once you're done with the processes and people work
  • Single Sign-On: Start Simply and Inexpensively, THEN Get Fancy. Assess the current environment and pain points. Evaluate anticipated changes to in-scope applications. Assess currently owned services or solutions that can be leveraged to reduce the in-scope applications. Select solutions to resolve the remaining requirements
  • Building a Secure User. Develop a behavior influence plan mindful of reputation and relationships. Introduce change in digestible "chunks". Give employees choices and agency. Insist that executives model the desired behaviors. Build transparency and consistency. Engage, do not dictate. Promote, model, assess, remediate behavior consistently
  • Future-Proofing IAM. Identify items on your legacy IAM road map that should move to your adaptive IAM road map. Update your IAM vision to include the bimodal nature of your IAM program. Challenge your IAM vendor(s) to include adaptive IAM features in their road map. Socialize your bimodal IAM vision to your organization. Create an adaptive IAM team and pilot an adaptive IAM initiative. Encourage them to take risks
  • Giving Your IAM to Someone Else Using IDaaS. Identify your business drivers for moving to IDaaS. Align plans for IDaaS with your sourcing, application purchase, and mobility strategies. Analyze your current costs for managing IAM for the use cases you are considering for IDaaS. Determine suitability of vendors' security and privacy controls and have a back-out plan
  • Leveraging Social Identities to Enable Business: “BYOI”. Accept social identities for low assurance use cases and use adaptive authentication for more sensitive use cases. Use social identities for new and transient relationships. Tell the Identity Ecosystem Steering Group (IDESG) about gaps in the ecosystem 

See for yourself, visit Gartner Events On Demand and view key sessions from the 2014 conference
"SESSIONS WERE VERY SPECIFIC PROVIDING ACTIONABLE INSIGHT AND RECOMMENDATIONS. THEY WERE ALSO TARGETED TO ORGANIZATIONS WITH DIFFERING LEVELS OF IAM SOPHISTICATION."

- Jon Magers, Information Security Officer Salem Health

Optimize Your Attendance


You'll be able to add these Gartner exclusives to your agenda:

  • Admission to all Keynote sessions
  • Two (30 min) Gartner Analyst One-on-Ones
  • Two Analyst-User Roundtables
  • Two Workshops
  • End-User Case Studies
  • Solution Provider Showcase
  • Breakfast, Lunch, Snacks

        Sign-up to be among the first to recieve our 2015 Agenda



Speakers

Listen to inspirational guest keynote speakers; hear from Gartner-invited end-user case study speakers – real practitioners with real-world knowledge; and learn from Gartner analysts – the foremost experts in their areas of focus.

Highlighted Speakers From the 2014 Conference

  • Earl Perkins
    Earl Perkins

    Vice President, Gartner

  • Brian Iverson
    Brian Iverson

    Director, Gartner

  • Lori Robinson
    Lori Robinson

    Vice President, Gartner

  • Neil Wynne
    Neil Wynne

    Service Analyst, Gartner

2014 Conference Wrap Up

Gregg Kreizman
Gregg Kreizman

Vice President and Conference Chair, Gartner

At the ninth annual Gartner Identity & Access Management Summit, attendees participated in on-site benefits, heard the latest IAM presentations from the Gartner Research community on today’s most pressing topics, attended workshops run by expert analysts and industry leaders, heard real-life experiences during peer case studies, engaged in analyst-user roundtables and one-on-one meetings with Gartner analysts, and checked out the latest solutions at the Solution Showcase.

What We Hear About Our Speakers


"AS ALWAYS, GARTNER ANALYSTS DEMONSTRATE THEY HAVE THEIR FINGER ON THE PULSE OF WHAT'S HAPPENING IN SECURITY AND IDENTITY, DEEP INSIGHTS AND DEEP INFO."

- Brendon Wilson Eirnin Consulting

Exhibitors

Meet the Solution Providers at the Forefront of IAM

Gartner Identity & Access Management Summit will help you develop a "short list" of technology and service providers who can meet your particular needs. You'll receive exclusive access to some of the world's leading technology and service solution providers in a variety of settings.

Premier


Platinum


Silver


Become an Exhibitor


Take Your Place Among Technology's Key Players
Join us now

 

Venue & Travel

Las Vegas, Nevada

Venue

Caesars Palace
3570 Las Vegas Blvd. South
Las Vegas, NV, United States - 89109


Accommodations

Caesars Palace
www.caesars.com


Gartner will be reserving a limited block of hotel rooms for attendees of the conference.  
Let us know if you'd like to recieve a notificaiton when booking information is available.

A Note About Accomodations


Gartner has been made aware that a service provider called Exhibition Housing Management has contacted a number of individuals who are attending our conference to offer hotel reservation services. Exhibition Housing Management does not represent Gartner, nor have we authorized them to contact attendees on our behalf. 
Learn more