• Gartner Identity And Access Management Summit.

    Strategic Direction and Industry Expertise

    Hear from leading IAM experts in diverse industries.

    Learn More
  • Gartner Identity And Access Management Summit.

    Preview the World’s Leading Solution Providers

    Learn about new products and emerging technologies while you network with peers.

    Learn More
  • Gartner Identity And Access Management Summit.

    Cost Optimization

    Drive cost reduction while maximizing business value. 


    View Sessions
  • Gartner Identity And Access Management Summit.

    Build your Agenda

    Create a customized agenda to align with your top IAM priorities.

    View Agenda

Reimagine IAM to Accelerate Digital Business

At Gartner Identity & Access Management Summit 2016 you’ll learn how to tackle complex issues and generate new ideas to reimagine significant elements of your IAM approach for digital age success. Hear the latest tactics and best practices across IAM fundamentals, and take a look ahead at analytics-driven automation and advances in consumer engagement platforms, so you can craft and implement an IAM vision and strategy for the digital age.

Gartner IAM Summit was designed for individuals in the following roles:
Roles Include:
  • CISOs and CIOs
  • IAM Program manager
  • Program management
  • Building IAM program
  • Getting stakeholder buy-in
  • Baseline services that must be deployed
  • Marketing the program
IAM Leaders
Roles Include:
  • IAM planners and implementers
  • Systems integrators
  • Authentication
  • Privileged accounts
  • Governance and administration
  • Single sign-on
IAM Architects
Roles Include:
  • CISOs
  • IAM leaders
  • Network security
  • Mobile security
  • Endpoint security
Security Leaders

What You Will Learn

  • Understand the impact of cloud, mobility, social and big data on IAM and vice versa
  • Learn where and how IAM fits within the larger context of solving business-relevant problems and positioning the business for success
  • Gain best practice use cases and practical advice for IAM governance that provide real value to your enterprise
  • Discover IAM delivery alternatives, their maturity and applicability for your enterprise
  • Learn to take compliance reporting to the next step by leveraging identity and access intelligence
  • Create a more access accountable and transparent organizational culture for your enterprise

See what attendees have said about what they learned

Features & Benefits

  • Gartner Analyst SessionsGartner analysts presenting select research, targeted to your priorities
  • Gartner Analyst One-on-One Meetings: Sit privately for 30 minutes with a Gartner analyst specializing in a topic you'd like to discuss
  • Analyst-User Roundtables: Hear how your colleagues from various industries tackle problems similar to yours
  • WorkshopsIntimate workshops provide an opportunity to drill down on specific "how to" topics in a small group environment
  • End-User Case Studies: Real-world examples from leading industry experts
  • Industry Forums: Get tailored sessions aligned to healthcare, financial services, government, energy and utilities, and consumer
  • TechInsights sessions: Guidance for the toughest security architecture projects, delivered by Gartner for Technical Professionals analysts
  • Solution Showcase: Learn about the latest cutting-edge solutions — from the best-of-breed providers and up-and-comers
  • Solution Provider Sessions: Marketplace offerings from solution providers
  • Group Rate Discount: Maximize your learning by attending as a group and receive a group discount

What's Included

*Online preregistration is required for one-on-ones, workshops and analyst-user roundtables (AURs).
Reserve your place early, as space is limited.

Frequently Asked Questions

Get answers to your questions here


The 2016 agenda features comprehensive tracks to drill down on your hottest IAM topics based on your role, experience level and key focus.


Agendas by Industry and Key Initiatives

Discover forums and recommended sessions that drill down on your most pressing challenges in key industries.
Suggested Agendas & Networking Opportunities​

2016 Content Coverage

A) Foundational Strategies in IAM
Every program needs a solid foundation. This track provides the information you need to properly plan and organize your IAM program, create or restart an identity and access management (IAM) strategy and ensure that processes and controls are implemented to gain real business benefits. We provide time-proven and emerging best practices, with a focus on doing the simple and right things first, and will help you avoid a number of pitfalls.

B) Moving Your IAM Program Forward
You have IAM experience. You’ve established your IAM program and you’ve created a roadmap. It’s time to get busy on your projects and move forward. In this track, we identify best practices, help you avoid pitfalls, and help with tool and service selection in dynamic IAM markets.

C) Building IAM for the Future
As organizations position themselves for the digital age, IAM programs are faced with new business demands and expectations. Business transparency, openness and the Internet of Thing’s enablement at the edge are forcing IAM leaders to reimagine IAM and how they have been managing their programs. In this track, we explore how digital business will accelerate changes in IAM program management, technology delivery and scale to address changes in business.

D) TechInsights for Agile IAM Architectures
Providing an architectural perspective on how IAM technology and processes can support value creation in your organization. These will be in-depth talks providing real-world insight into modern identity architecture, identity governance and administration, identity analytics, identity proofing, authorization, identity in the cloud, identity for third parties, privileged account management, and using identity to protect APIs.

E) Beyond the Checkbox: Security, Risk and Privacy

It’s now clear that in order for digital business to succeed, security, risk, privacy and IAM must be aligned. There are process, organizational, functional and technology overlaps that should be considered so that you can maximize your investments and have a robust, multifaceted approach to IAM, infrastructure protection, risk management and privacy protection. In this track, we cover the security disciplines that align with IAM along with the most important security trends.

NEW! Consumer IAM Virtual Track
Consumer-facing IAM differs significantly from traditional workforce-facing IAM in scale and function. Many organizations have separate IAM programs to serve their workforce and consumer constituencies, though Gartner is observing a trend toward consolidation as a strategy for IAM to meet the demands of digital business. This year’s Summit will provide IAM leaders who are responsible for consumer IAM (CIAM) with dedicated content and opportunities to connect with peers who work in this specialized IAM field.

Check out the track flier.

2016 Hot Topics

  • Agile IAM
  • Mastering the Politics of IAM
  • Industrialization of IGA
  • Cloud for Access Management
  • IAM Intelligence
  • Blockchain

- Jon Magers, Information Security Officer Salem Health

Optimize Your Attendance

You'll be able to add these Gartner exclusives to your agenda:

  • Admission to all Keynote sessions
  • Two (30 min) Gartner Analyst One-on-Ones
  • Two Analyst-User Roundtables
  • Two Workshops
  • End-User Case Studies
  • Solution Provider Showcase
  • Breakfast, Lunch, Snacks



Listen to inspirational guest keynote speakers, hear from Gartner-invited end-user case study speakers, and learn from Gartner analysts – the foremost experts in their areas of focus.

Highlighted Speakers


Featured Speakers

Gartner Analysts


Meet the Solution Providers at the Forefront of IAM

Gartner Identity & Access Management Summit will help you develop a "short list" of technology and service providers who can meet your particular needs. You'll receive exclusive access to some of the world's leading technology and service providers in a variety of settings.

  • Learn more about the exhibitor experience.
  • Contact us to learn more about opportunities to exhibit.

Venue & Travel

Las Vegas, Nevada


Caesars Palace
3570 Las Vegas Blvd. South
Las Vegas, NV, United States - 89109


Special Gartner Hotel Room Rate
We have reserved a limited block of hotel rooms for attendees of Identity & Access Management Summit at the price of $169(plus tax) per night for single or double occupancy. The deadline for the special room rate is November 11th, 2016 at 5:00p.m. EDT.
To book your reservation, please log back into your registration profile in your gartner.com account and select “Make Hotel Reservation.”  Please note, you must be a registered attendee in order to book a hotel reservation. 
Reservation & Cancellation Policies:
Please be advised, there is a mandatory 2 night minimum stay at Caesars Palace

To change or cancel your hotel reservation without penalty you may do so before November 11th, 2016 at 5:00p.m. EDT by logging into your registration profile and selecting “Edit” in the Hotels section or by contacting the Gartner Help Desk, Monday - Friday, 6:00 a.m. - 6:00 p.m. via phone: 866.405.2511 or +1 650.226.0825, or Email: us.registration@gartner.com.  

Cancellations are allowed up to November 11th, 2016 at 5:00p.m. EDT without penalty. After November 11th, 2016 at 5:00p.m. EDT, the hotel will charge a NON-refundable deposit of the minimum 2 night stay.
Government Rates:
There are a limited number of government rate rooms available at Caesars Palace.  These are for U.S. government officials and military travelers that require the federal per diem lodging rate. A valid Government or Military ID will be required at check-in upon arrival. Government Rooms are subject to the cancellation policies outlined above.


Accommodations & Privacy Advisory

Gartner has been made aware that service providers, such as Exhibition Housing Management, have contacted a number of individuals who are attending our conference to offer hotel reservation services and/or sell copies of the confidential attendee list. 
Please note that Gartner has NOT authorized them, or anyone else, to contact attendees on our behalf, nor does Gartner share/sell attendee contact information to anyone. 
Learn more on how to protect yourself from scamming attempts. ​