View By:

Agenda / Track

Thursday, 12 March, 2020 / 08:00 AM - 08:45 AM GMT

Tutorial: Identity and Access Management (IAM) 101

Brent Predovich, Assoc Principal Analyst, Gartner

As is the case with practically every domain, identity and access management (IAM) has its own jargon that can be difficult for newcomers to understand. This session provides newcomers with an introduction to the IAM territory and its vocabulary.
Key Issues:

● What is the definition and purpose of IAM?

● How do IAM practitioners think about IAM?

● What should newcomers to IAM know before they go?

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 09:00 AM - 10:00 AM GMT

Keynote: Learn to Be a Better Communicator — A Play in Four Acts

Jeffrey Wheatman, VP Analyst, Gartner

One of the biggest challenges for IAM leaders and practitioners is how to more effectively communicate with a range of stakeholders. Stop using acronyms, jargon and technobabble and get more traction, align with business goals and be viewed as a strategic leader.
1 - What are the benefits of better communication?
2 - What are the top causes of miscommunication?
3 - How can IAM leaders and practitioners be more effective risk communicators?

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 10:45 AM - 11:30 AM GMT

IT Leaders' Guide to IAM Program Management

David Collinson, Sr Director Analyst, Gartner

IT leaders often struggle to know where to begin and how to initiate a well-run IAM program. This session will help you by taking you through the initial steps, best practice and learnings from organisations that have been through this process before.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 11:45 AM - 12:30 PM GMT

IAM Leaders Guide to PAM

Felix Gaehtgens, VP Analyst, Gartner

An introduction for privileged access management. What value does PAM bring today to reduce your security risk? What do you need to know about PAM to build an outlook for the future? AM vs. IGA vs. PAM. Trending questions about PAM.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 11:45 AM - 12:30 PM GMT

IAM Program Perspectives Survey

Kevin Kampman, Sr Director Analyst, Gartner

In 2019, Gartner conducted a survey of IAM practitioners to gauge adoption, investment and priorities. This session will present our findings about how your peers are accomplishing their objectives and the priorities that are influencing their program activities.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 01:45 PM - 03:15 PM GMT

Workshop: IT Score for Identity and Access Management

Abhyuday Data, Principal Analyst, Gartner

Maturing competency levels require stakeholder's collaboration to identify the optimal alignment with IT and business goals and requirements. This workshop will help IAM leaders learn how to use Gartner's new IT Score Survey and Tool to facilitate for developing maturity roadmaps and action plans.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 02:45 PM - 03:15 PM GMT

Lead the Way With Agile for IAM Program Initiatives

David Collinson, Sr Director Analyst, Gartner

How can PAM, AM, IGA and Authentication initiatives benefit from an Agile approach? What are the areas that most lend themselves to Agile, and what are things to be aware of when adopting Agile at a departmental level?

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 04:15 PM - 05:00 PM GMT

Ask the Expert: IAM Program Management

Kevin Kampman, Sr Director Analyst, Gartner

In many organizations, IAM functions are distributed between information security, human resources and other areas, with little coordination, recognition or dedicated funding. In this session, you'll learn how to coordinate these elements and bring them the level of attention they require to contribute to compliance, security, process management and new initiatives in your organization.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 05:15 PM - 06:00 PM GMT

Keynote: Insights From the IAM Magic Quadrants

Felix Gaehtgens, VP Analyst, Gartner

Henrique Teixeira, Sr Director Analyst, Gartner

Abhyuday Data, Principal Analyst, Gartner

Through a selection of relevant Gartner insights and complementary methodologies, Gartner analysts will discuss players and capabilities in the identity governance and administration and access management Magic Quadrants, and will provide insight into latest updates in the privileged access management market.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 08:00 AM - 08:45 AM GMT

Evaluation Criteria for PAM Requirements and Vendor Offerings

Homan Farahmand, Sr Director Analyst, Gartner

PAM is an essential, but complex, IAM discipline. It includes privileged credential management, session management (human) and services access management (nonhuman). It also includes privileged elevation and delegation for endpoints, governance, automation, audit and analytics capabilities. This session presents evaluation criteria to use when defining your requirement and making product decisions.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 10:45 AM - 11:30 AM GMT

Ask the Expert: How Can You Validate Consumer Identity?

Akif Khan, Sr Director Analyst, Gartner

Carrying out identity proofing of consumers in B2C interactions remains a constant challenge, with uses cases ranging from account sign-up to meeting industry regulation. The pressure in digital channels to maintain a competitive, smooth CX during this process adds further complexity. Find out what options are available and how best they can be deployed for your business.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 10:45 AM - 12:15 PM GMT

Workshop: Selecting the Right IGA Solution

Paul Mezzera, Sr Director Analyst, Gartner

The digital transformation and the cloud are placing additional demands on IGA solutions for managing identity and access rights. This workshop will review key IGA concepts and provide an opportunity for participants to review and discuss the core features in the IGA Solution Criteria guidelines to better understand and prioritize the essential capabilities needed to evaluate an IGA solution.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 11:00 AM - 11:45 AM GMT

Leverage Just in Time Approaches to Improve PAM

Michael Kelley, Sr Director Analyst, Gartner

While PAM is a mature capability, new approaches for a just in time (JIT) approach hold promise to both increase security around privileged access and simplify the way privileged access is controlled and used.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 01:45 PM - 02:15 PM GMT

The Evolution of Digital Identity in a B2C World

Jonathan Care, Sr Director Analyst, Gartner

Not all B2C interactions involve formal authentication of identity using credentials and tokens.
How has the concept of digital identity evolved? How do businesses today identify customers in digital interactions for the purposes of fraud detection, advertising and improving customer experience?
How can combinations of attributes (name, email, IP address, phone number), device telemetry, behavioral biometrics, public records data and verification of physical documents be combined to create digital identities with sufficient trust levels for use cases ranging from e-commerce to banking? Introducing the concept of the identity graph. Taking a Zachman approach this pitch will focus on the conceptual/logical aspects of identity, looking at how identity is used, how it is a multi faceted jewel, and how identity verification on a graph is two nodes measuring the quality of the interstices.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 02:30 PM - 03:15 PM GMT

Evolving Maturity Models: The New IT Score for IAM

Kevin Kampman, Sr Director Analyst, Gartner

As IAM characteristics keep pace with digital initiatives, so too must the IAM program adapt to change. In this session, learn about Gartner's new IT Score maturity model and how this will help you to organize and align with changes in your business and industry.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 02:30 PM - 03:15 PM GMT

Ask the Expert: Privileged Access Management

Michael Kelley, Sr Director Analyst, Gartner

This session is a discussion about privileged access management (PAM) technologies, implementations, new approaches, and strategies needed to make your PAM efforts successful. Attendees should come prepared to ask questions.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 10:30 AM - 12:00 PM GMT

Workshop: Best Practices Learned From Mobile Identity Implementations

Rob Smith, Sr Director Analyst, Gartner

This workshop discusses real-world experiences on solving the challenges associated with identifying users and devices in a mobile landscape. It also discusses the convergence of mobility management and identity management technologies and the implications this poses to the digital workplace.
Key Issues:
Do I need to implement mobile identity?
If so, how?
What are the best practices in deploying it?

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 10:45 AM - 11:30 AM GMT

Passwordless Authentication Is Already Here, It's Just Unevenly Distributed

Ant Allan, VP Analyst, Gartner

There are many different ways to eliminate passwords to significantly improve UX/CX, enhance security, or both, but technology constraints make a universal approach elusive. IAM must take pains to craft a cohesive strategy across key use cases.
- What are the key drivers for passwordless authentication?
- What options are available and what value do they provide?
- Is it possible to completely eliminate passwords – and if it is, is it always desirable?

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 11:45 AM - 12:30 PM GMT

Leveraging CARTA and CIAM to Prevent Fraud and Protect Privacy

Michael Kelley, Sr Director Analyst, Gartner

Abhyuday Data, Principal Analyst, Gartner

After Facebook privacy scandals, and publicity around so many data breaches, consumers and the public opinion have pushed the industry to do the inconceivable: to entertain the idea that #thefutureisprivate. How continuous adaptive risk and trust assessment (CARTA) for CIAM can help prevent internal fraud, and achieve a more private future. Includes contexts for CIAM, and Internal Fraud. Based on "Implications of Facebook’s Privacy Scandal: Key Takeaways and Next Steps" — using this in the context of CIAM, to leverage CARTA to prevent *internal* fraud.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 01:45 PM - 02:30 PM GMT

Ask the Expert: Modern Authorization Solutions

Homan Farahmand, Sr Director Analyst, Gartner

Authorization architecture is constantly evolving as organizations digitize their assets and run more workload in hybrid-IT and/or multicloud environments. This is while automation technologies that orchestrate access to business and infrastructure services increasingly require a dynamic authorization decision making. In this session we discuss how ABAC can be applied to address these requirements.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 04:30 PM - 05:00 PM GMT

Building Modern Identity Into Your Apps (TechDemo)

Erik Wahlstrom, Sr Director Analyst, Gartner

There are many ways modern identity protocols such as OAuth 2.0 and OpenID Connect can be built into mobile applications, services and SPAs (single-page applications). In this TechDemo we will look how common best practices for integrating modern identity protocols are built into applications and services.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 04:30 PM - 05:00 PM GMT

Model Your Risk Assessment on the Digital Business Runway

Jie Zhang, VP Analyst, Gartner

Digital transformation relies heavily on new technology adoptions. While organizations innovate and create values through digital business, a set of new risks emerging. These emerging risks require security and risk leaders' special attention. This session equips you a model to assess the emerging risks.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 08:00 AM - 08:45 AM GMT

To MFA for Office 365 ... and Beyond!

Ant Allan, VP Analyst, Gartner

What’s the best option for MFA for O365? This is a recurring question — typically (sadly) after an O365 phishing attack or actual breach. But it’s often a lead-in to a broader discussion about the choice of MFA to support broader SaaS and legacy use cases.

● What are the best MFA and access management approaches for SaaS and legacy use cases?

● Is it best to stick with Microsoft or choose a third-party tool?

● Why might a discrete authentication vendor be indicated?

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 09:45 AM - 10:30 AM GMT

The Future of Device Management in the Digital Workplace

Rob Smith, Sr Director Analyst, Gartner

This session will cover how device management has evolved from separate tools to a new single unified endpoint management (UEM) console. It will examine the challenges faced by newly formed end-user computing groups from issues such as BYOD and the ever exploding diversity of devices in the digital workplace.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 11:00 AM - 11:45 AM GMT

Guidance for Decentralized Identity Adoption

Homan Farahmand, Sr Director Analyst, Gartner

In this session, we provide a quick overview of decentralized identity architecture, including key components such as identity networks and blockchain, services, protocols, and agents. Then we provide example use cases and solutions for B2E (workforce), B2B (business entities), and B2C (consumers) scenarios. We conclude by discussing lessons learned to adopt decentralized identity based on our research.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 08:00 AM - 08:45 AM GMT

Tutorial: IAM Leaders Guide to IGA

Henrique Teixeira, Sr Director Analyst, Gartner

An introduction to identity governance and administration. What value does IGA bring today? What are the main challenges? What is the outlook for the future?

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 10:30 AM - 11:15 AM GMT

Ask the Expert: Preparing for Future IGA Technologies

Homan Farahmand, Sr Director Analyst, Gartner

IGA requirements are changing rapidly. Organizations are often mandated to address competing requirements such as increasing IGA coverage while reducing the cost and enhancing user experience. There are also emerging requirements in the cloud for dynamic identity governance and user management. In this session, we discuss the art of possible to handle these requirements in short- and long-term.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 10:45 AM - 11:30 AM GMT

Guidance and Best Practices for Successful IGA Deployments

Paul Mezzera, Sr Director Analyst, Gartner

IGA platforms are complex and have been traditionally difficult to implement, yet the demand is increasing both for new deployments and reimplementations. Organizations can increase their likelihood of success by following a more structured approach to deployment and ongoing management of their IGA platforms. This session provides guidance on, best practices, and common pitfalls to be avoided when selecting and implementing IGA platforms.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 02:45 PM - 03:15 PM GMT

Gain Trust in Digital Transformation by Reducing Privacy Risks in 5G Products and Services

Bart Willemsen, VP Analyst, Gartner

5G is here and increases the speed and scale at which data is processed. Yet individuals are demanding their rights be protected and the regulatory environment is changing at an unprecedented pace. This session describes the crucial steps you need to take to process the data enabled by 5G while respecting privacy rights and fostering trust among all stakeholders in a rapidly evolving landscape.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 04:15 PM - 05:45 PM GMT

Workshop: Applying the Four Phase IGA Guidance Framework

Paul Mezzera, Sr Director Analyst, Gartner

This workshop provides an opportunity for participants to learn about IGA program best practices for planning, expanding, and managing IGA deployments. Attendees will be presented with key information related to each phase of the IGA framework and handouts with exercises to apply the information along with other peers using Gartner’s IGA guidance framework.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 08:00 AM - 08:45 AM GMT

Modernize Your IGA Solution Architecture

Paul Mezzera, Sr Director Analyst, Gartner

Identity governance and administration (IGA) systems have existed for several decades, but many IGA deployments are struggling to keep pace with new digital business demands. Organizations need to evaluate and adopt next-generation technologies that support cloud, mobile, DevOps, AI, analytics, and cybersecurity initiatives. In this session, Gartner will explore IGA technology trends and modern IGA architectures.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 09:45 AM - 10:30 AM GMT

Identity Multiverse: See Your Role Management Process in 3D

Henrique Teixeira, Sr Director Analyst, Gartner

Enterprise role management is not only about the tools. Learn how to combine a traditional bi-dimensional enterprise role management framework with three parallel universes of identities, accounts and entitlements to unlock a tridimensional approach for role management. A combination of the hats and buckets approach with the three planes of identities.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 09:45 AM - 10:30 AM GMT

Managing a Successful PAM Program

Felix Gaehtgens, VP Analyst, Gartner

Success with a PAM program is a mixed bag for most companies, finding PAM a challenging implementation. Before you even purchase a tool, fundamental tasks must be taken on to ensure success later in the process. We will talk about what those basic building blocks are for finding success in managing your PAM risk later on.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 11:00 AM - 11:45 AM GMT

Identity Analytics, Machine Learning and AI Are Changing the Game

Mary Ruddy, VP Analyst, Gartner

Our digital environment has become too complex for humans to control system access without the help of smarter analytics. Advancements in identity analytics can help simplify and improve multiple identity and access management activities. Identity analytics, including machine learning, can process vast amounts of data to detect and respond to risks in a more automated and timely fashion. In this session, we will discuss how machine learning can be applied to many IAM use cases .

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 11:00 AM - 11:45 AM GMT

The Technical Evaluation Criteria for Access Management Solutions

Erik Wahlstrom, Sr Director Analyst, Gartner

Access management is an essential part of the identity landscape. It includes single sign-on, session management, authentication and authorization to both cloud and on-premises applications. This technical session presents the criteria to use when defining your requirement and making product decisions to ensure deployed solutions meet security, privacy, usability and integration demands.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 01:45 PM - 02:15 PM GMT

Demystify Analytics and Enable Governance on the Fly

Henrique Teixeira, Sr Director Analyst, Gartner

Use analytics to optimize IGA deployments by applying continuous monitoring capabilities to add real-time insight and risk-mitigation capabilities to IGA initiatives. IGA deployments need to shift from administering compliance to a real-time identity and access risk management dashboard.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 02:30 PM - 03:15 PM GMT

Me, Myself and I: Is Biometric Authentication Ready for Prime Time?

Ant Allan, VP Analyst, Gartner

Early promises of easy, secure and universal authentication through unique personal traits have been unfulfilled for decades, but in the past 10 years we have seen a surge in interest and adoption.

● How is biometric authentication differ from other orthodox methods?

● Where is biometric authentication adding most value today?

● Are biometric methods the way forward for every enterprise?

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 10:45 AM - 11:30 AM GMT

Top Trends in CIAM Solution Design

Mary Ruddy, VP Analyst, Gartner

The imperative to streamline operations, unify customer experience and enable digital transformation requires continual improvements to consumer identity and access management systems. Technical professionals designing CIAM solutions must understand key trends, features and evolving vendor offerings.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 11:45 AM - 12:30 PM GMT

Mastering the Art of the Political Discussion

Security and risk management leaders often find themselves in political discussions, which can be high stakes, and challenging to successfully navigate. This session helps you know when you are in a political conversation, and provides practical techniques for managing the potential conflict and reaching a successful outcome.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 12:00 PM - 12:45 PM GMT

Ask the Expert: Mastering Privacy UX — Transparency, Subject Rights and Consent Management

Bart Willemsen, VP Analyst, Gartner

Privacy UX is composed of the aspects of a privacy program that are exposed to the public. Come to this Ask the Expert session to join a discussion about balancing just the right level of transparency with your users to earn their trust, drive depth and turn privacy from a challenge to a market advantage.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 12:45 PM - 01:45 PM GMT

Women in Identity Luncheon and Panel

Mary Ruddy, VP Analyst, Gartner

Colette D’Alessandro, Co-Founder of Women in Identity,

Join our luncheon to network with successful women who are driving identity innovation into and throughout their companies. This luncheon will feature a panel discussion about some of the challenges and opportunities faced by women in IT today and how to address them. Panelists include Pam Dingle and Colette D'Alessandro from WomenInIDentity.org. Seats are limited.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 02:45 PM - 03:15 PM GMT

Creating Trust and Safety on the Internet

Jonathan Care, Sr Director Analyst, Gartner

The Internet, like any other society, is plagued with the kind of jerks who enjoy the electronic equivalent of writing on other people's walls with spraypaint, tearing their mailboxes off, or just sitting in the street blowing their car horns. Some people try to get real work done over the Internet, and others have sensitive or proprietary data they must protect." Successful e-business - whether retail, financial (or other) services, social platforms, sharing economy all make use of this untrustworthy medium.
What does trust and safety mean?
Where is it applicable?
How do we know where it is being applied?
What can we observe?
What can we measure? Since mulling this idea on client inquiries we have seen the industry start to gain traction around this idea in 2019. .
What does trust and safety mean?
Where is it applicable?
How do we know where it is being applied?
What can we observe? What can we measure?

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, 12 March, 2020 / 04:30 PM - 05:00 PM GMT

Enabling the Customer Experience With Fraud Management

Akif Khan, Sr Director Analyst, Gartner

Consumers have unrelenting expectations for smooth and friction-free experiences when dealing with retailers and financial institutions. This is often at odds with the various antifraud mechanisms that security leaders have implemented. A new approach is required to reduce tension between CX and fraud management, and instead blend a spectrum of technologies to deliver the fluid experience that most customers want and deserve.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 08:00 AM - 08:45 AM GMT

Top Challenges Security and Risk Leaders Face in China

Jie Zhang, VP Analyst, Gartner

As the second largest economy, China continues to attract businesses to enter the market and expand as these businesses grow. But, security and risk leaders face a set of unique challenges. How to understand these challenges and apply best practices will enable CISOs and risk leaders to assure business successes.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 09:45 AM - 10:30 AM GMT

Privacy, AI and Ethics Meet in the #DigitalSociety; Now What?

Bart Willemsen, VP Analyst, Gartner

Digital society is a fact, taking shape as we continue to develop our organizations and value propositions in communities, contact and collaboration. The changes ahead may be unforeseen, though must be guided and chosen deliberately to maintain universal human rights like privacy and freedom. Ethical dilemmas enable the conversation and provide the choices to be made to achieve the synergy needed between what your customer wants and what your technologies enable.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 01:00 PM - 02:30 PM GMT

Workshop: Selecting the Right CIAM Solution

Mary Ruddy, VP Analyst, Gartner

The right customer identity and access management solution is key to providing a great user experience, and securing customer data and privacy. In this workshop, we will discuss what factors and features to consider, and which vendors to shortlist when looking for your new CIAM solution.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 02:30 PM - 03:15 PM GMT

Best Practices for Mobile Identity

Rob Smith, Sr Director Analyst, Gartner

Mobility brings constant chaos with users trying to access applications and data from new and potentially unknown devices and locations. This session will cover how this chaos impacts identity and what organizations should be doing as best practices to ensure proper authentication.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 02:30 PM - 03:15 PM GMT

Building a B2C Identity Proofing Strategy

Akif Khan, Sr Director Analyst, Gartner

Authenticating the identity of new users in the B2C environment is a significant business challenge.A range of techniques are available - checking against credit data; looking up in public records; checking social media history; authenticating government ID plus selfie. What vendors and capabilities exist in this space, and how can they be weaved together to give an assurance of identity appropriate to different use cases?

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Friday, 13 March, 2020 / 02:30 PM - 03:15 PM GMT

Ask the Expert: Establish an Agile Model for IGA App Onboarding

Felix Gaehtgens, VP Analyst, Gartner

Application onboarding continues to be a challenging activity of IGA projects. It can be time consuming and expensive. How to leverage an agile continuous delivery approach for creating a best-practices-driven factory model for integrating new apps to your IGA infrastructure. How small prototyping and frequent improvement sprints can help you achieve continuous value when onboarding apps?

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.
Registered Attendee
Build Your Agenda

Want to stay informed?

Get conference email updates.
Contact Information

All fields are required.

  • Step 2 of 2