• Gartner Identity And Access Management Conference.

    View Our Brochure

    An agenda built around your needs and priorities

    Go to Brochure
  • Gartner Identity And Access Management Conference.

    Just-Announced Guest Keynote

    Brian Krebs
    Investigative Reporter

    Find Out More
  • Gartner Identity And Access Management Conference.

    Earn CPE Credits

    Earn CPE credits towards (ISC)2 and ISACA when you attend Gartner IAM Summit 2015

    Learn More
  • Gartner Identity And Access Management Conference.

    Register Early and Save $300

    Save $300 on the standard registration fee when you register October 16

    Register Today

Make the Value Come Alive: The Future of IAM

At Gartner Identity & Access Management Summit 2015 you’ll learn how to position IAM as a key partner in business innovation, and carve out the time and resources for IAM projects to make the value come alive. Hear the latest tactics and best practices across IAM fundamentals, and take a look ahead at analytics-driven automation and advances in consumer engagement platforms, so you can craft and implement an IAM vision and strategy for the digital age.

Gartner IAM Summit was designed for individuals in the following roles:
Roles Include:
  • CISOs and CIOs
  • IAM Program manager
  • Program management
  • Building IAM program
  • Getting stakeholder buy-in
  • Baseline services that must be deployed
  • Marketing the program
IAM Leaders
Roles Include:
  • IAM planners and implementers
  • Systems integrators
  • Authentication
  • Privileged accounts
  • Governance and administration
  • Single sign-on
IAM Architects
Roles Include:
  • CISOs
  • IAM leaders
  • Network security
  • Mobile security
  • Endpoint security
Security Leaders

What You Will Learn

  • Launch or relaunch your IAM program using the latest strategies and best practices
  • Understand the trends reshaping IAM and using forward-looking architectures that support rapid innovation, agility and adaptability
  • Balance the duel demands of innovation and stability with effective new bimodal IAM strategies
  • Prepare for IoT with new approaches to identity data models, hierarchies and relationship management
  • Implement user behavior analytics to improve the consumer experience
  • Demonstrate the business value IAM contributes

See what attendees have said about what they learned

Features & Benefits

  • Gartner Analyst Sessions: Gartner analysts presenting select research, targeted to your priorities
  • Gartner Analyst One-on-One Meetings: Sit privately for 30 minutes with a Gartner analyst specializing in a topic you'd like to discuss
  • Analyst-User Roundtables: Hear how your colleagues from various industries tackle problems similar to yours
  • Workshops: Intimate workshops provide an opportunity to drill down on specific "how to" topics in a small group environment
  • End-User Case Studies: Real-world examples from leading industry experts
  • Industry Forums: Get tailored sessions aligned to healthcare, financial services, government, energy and utilities, and education
  • TechInsights sessions: Guidance for the toughest security architecture projects, delivered by Gartner for Technical Professionals analysts
  • Solution Showcase: Learn about the latest cutting-edge solutions — from the best-of-breed providers and up-and-comers
  • Solution Provider Sessions: Marketplace offerings from solution providers
  • Group Rate Discount: Maximize your learning by attending as a group and receive a group discount

What's Included

*Online preregistration is required for one-on-ones, workshops and analyst-user roundtables (AURs).
Reserve your place early, as space is limited.

Frequently Asked Questions

Get answers to your questions here


The 2015 agenda delivers strategic insights for IAM in the digital age, as well as the latest tactics in IAM architecture. Whether you’re launching a new program or advancing existing capabilities, you’ll find the information you need to deliver security, agility and greater business value—and prepare for the future of IAM.


2015 Tracks

A) Foundational Strategies in IAM
Every program needs a solid foundation. This track provides the information you need to properly plan and organize your IAM program, create or restart an IAM strategy and ensure that process and controls are implemented to gain real business benefits. It provides time-proven best practices, focuses on doing the simple and most appropriate things first, and helps you avoid a number of pitfalls.
B) Next Steps: Enhance and Advance Your IAM Program
Your IAM program is established. You have identified a set of projects. How will you move forward simply and successfully? This track helps you make the most of the tools that you have, augment those tools appropriately to fill gaps and ensure you are positioning your current IAM infrastructure for success.
C) Future Focus: IAM in the Digital Age
The Nexus of Forces (cloud, mobile, social and information) continues to have a profound effect on IAM programs. Digital business and the Internet of Things have begun to influence IAM plans. This track explores where and how IAM can support and leverage these emerging trends and technologies.
D) TechInsights for Agile IAM Architectures
These in-depth talks provide an architectural perspective on how IAM technology and processes can support value creation in your organization. Get real-world insight into modern identity architecture, identity governance and administration, identity analytics, identity proofing, authorization, identity in the cloud, identity for third-parties, privileged account management, and using identity to protect APIs.
View TechInsights flyer

E) The Big Picture: Security, Risk and IAM

IAM and threat protection security are related disciplines. There are process, organizational, functional and technological overlaps that should be considered so you can maximize your investment and have a robust, multifaceted approach to IAM, infrastructure protection and risk management within your organization. This track provides advice on the security disciplines that intersect with IAM, focusing on the most important security trends.

Hot Topics to be Covered

  • Agile IAM architecture
  • Mobile, cloud and IoT
  • Bimodal IAM strategies
  • Analytics-driven authorization
  • Identity relationship management
  • The future of IAM
  • Digital-age IAM leadership
  • Improving the user experience
  • Agile and adaptable IAM
  • IAM basics and best practices
  • Launching your IAM program
  • Resource allocation
  • Governance and administration

Key Take-Aways from the 2014 Conference

At the ninth annual Gartner IAM Summit, attendees participated in on-site benefits, heard the latest IAM presentations from the Gartner Research community on today’s most pressing topics, attended workshops run by expert analysts and industry leaders, heard real-life experiences during peer case studies, engaged in analyst-user roundtables and one-on-one meetings with Gartner analysts, and checked out the latest solutions at the Solution Showcase.

Key Take-Aways from the 2014 Conference Included:
  • How to Start an IAM Program. Focus more on process rather than technology. Create a well-crafted vision and articulate it in light of strategic business needs. Continuously re-evaluate this. Run IAM as a governed program, not as a stand-alone IT initiative. IAM is by nature a program where issues arise unexpectedly —don't try to solve everything now
  •   Horror Stories: Why IAM Programs Fail. Be aware of the warning signs! Create a well-crafted vision and articulate it in light of strategic business needs. Continuously re-evaluate this. Run IAM as a program, not as an initiative. Select products only once you're done with the processes and people work
  • Single Sign-On: Start Simply and Inexpensively, THEN Get Fancy. Assess the current environment and pain points. Evaluate anticipated changes to in-scope applications. Assess currently owned services or solutions that can be leveraged to reduce the in-scope applications. Select solutions to resolve the remaining requirements
  • Building a Secure User. Develop a behavior influence plan mindful of reputation and relationships. Introduce change in digestible "chunks". Give employees choices and agency. Insist that executives model the desired behaviors. Build transparency and consistency. Engage, do not dictate. Promote, model, assess, remediate behavior consistently
  • Future-Proofing IAM. Identify items on your legacy IAM road map that should move to your adaptive IAM road map. Update your IAM vision to include the bimodal nature of your IAM program. Challenge your IAM vendor(s) to include adaptive IAM features in their road map. Socialize your bimodal IAM vision to your organization. Create an adaptive IAM team and pilot an adaptive IAM initiative. Encourage them to take risks
  • Giving Your IAM to Someone Else Using IDaaS. Identify your business drivers for moving to IDaaS. Align plans for IDaaS with your sourcing, application purchase, and mobility strategies. Analyze your current costs for managing IAM for the use cases you are considering for IDaaS. Determine suitability of vendors' security and privacy controls and have a back-out plan
  • Leveraging Social Identities to Enable Business: “BYOI”. Accept social identities for low assurance use cases and use adaptive authentication for more sensitive use cases. Use social identities for new and transient relationships. Tell the Identity Ecosystem Steering Group (IDESG) about gaps in the ecosystem 

See for yourself, visit Gartner Events On Demand and view key sessions from the 2014 conference

- Jon Magers, Information Security Officer Salem Health

Optimize Your Attendance

You'll be able to add these Gartner exclusives to your agenda:

  • Admission to all Keynote sessions
  • Two (30 min) Gartner Analyst One-on-Ones
  • Two Analyst-User Roundtables
  • Two Workshops
  • End-User Case Studies
  • Solution Provider Showcase
  • Breakfast, Lunch, Snacks

        Sign-up to be among the first to recieve our 2015 Agenda


Meet the Solution Providers at the Forefront of IAM

Gartner Identity & Access Management Summit will help you develop a "short list" of technology and service providers who can meet your particular needs. You'll receive exclusive access to some of the world's leading technology and service providers in a variety of settings.

  • Learn more about the exhibitor experience.
  • Contact us to learn more about opportunities to exhibit.




Become an Exhibitor

Take Your Place Among Technology's Key Players
Join us now


Venue & Travel

Las Vegas, Nevada


Caesars Palace
3570 Las Vegas Blvd. South
Las Vegas, NV, United States - 89109


Special Gartner Hotel Room Rate
We have reserved a limited block for attendees of Gartner Identity & Access Management Summit the price of $169 (plus tax and $25 resort fee) per night for single or double occupancy. As these rooms can only be held at this rate until November 11, we recommend you  contact the hotel now. To obtain our special Gartner rate, inform the hotel that you are attending the Gartner Identity & Access Management Summit when making your reservation. You may also call +1 866-503-3904

A Note About Accomodations

Gartner has been made aware that a service provider called Exhibition Housing Management has contacted a number of individuals who are attending our conference to offer hotel reservation services. Exhibition Housing Management does not represent Gartner, nor have we authorized them to contact attendees on our behalf. 
Learn more