Agenda

Attendees received the latest insights on identity governance and administration, security & privacy at Gartner Identity & Access Management Summit 2023, London, U.K.

2023 day highlights

Over 2 days attendees had access to unbiased, researched backed Gartner content, as well as guest keynotes, case studies, and solution provider sessions to help build their future-proof identity and access management strategy.  

Gartner Opening Keynote: Lead Like a Wolf

Speakers:  Tina Nunno, Distinguished VP Analyst

There is no safe middle ground in leadership, only challenging tradeoffs. A wolf learns the difference between calculated risk taking and recklessness, and recognizes that going to extremes can help bring a dark enterprise or situation to the light side. To be a successful wolf leader, you must master the three extreme disciplines of power, manipulation, and warfare.

 

Featured session: CIEM is Paving the Way for Identity Fabric Immunity in the Cloud. What's Next?

Speaker:  Henrique Teixeira, Sr Director Analyst

The identity infrastructure in most organizations is too brittle to survive a targeted attack. Over 80% of organizations have suffered an identity related breach in the last 12 months. The fragility is in large part related to incomplete, misconfigured or vulnerable elements in the identity fabric. Identity fabric immunity applies the concept of digital immune systems to identity infrastructure to minimize defects and failures.

Speakers:

  • Nick Tuffs, Executive Director, UBS
  • Simon Bradley, Service Architect, Vitality

Gartner Experts:

  • Akif Khan, VP Analyst
  • Mary Ruddy, VP Analyst
  • Henrique Teixeira, Sr Director Analyst

Sessions:

  • Avoid the Breach With Identity Threat Detection and Response
  • Technical Insights: Identity-First Security as the North Star for Your IAM Reimplementation
  • Use Journey-Time IAM Orchestration to Deliver Better UX

A look back at 2023's agenda

View By:

A look back at 2023's agenda

Sunday, 05 March, 2023 / 06:00 PM - 07:30 PM GMT

Registration and Information

Registration and information hours for the day.

Sunday, 05 March, 2023 / 06:30 PM - 06:45 PM GMT

Exhibitor Orientation

Exhibitors and their staff are encouraged to attend this session to familiarize themselves with the venue, onsite support and services, best practices for a successful conference, as well as a live Q&A with the Gartner team. Thank you for being an important part of the conference and the attendee experience!

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 06 March, 2023 / 07:30 AM - 06:00 PM GMT

Engagement Zone Sponsored by IBM: Clone an identity, watch live demos & grab some swag

Curious to see how decentralized identity works? Want to see how passwordless capabilities such as QR code and FIDO can make your organization more secure and how SSO, adaptive access, and verifiable credentials can make your workforce productive and customers happy? Then stop by the IBM Security Verify Engagement Zone. While you are there, participate in an interactive session to see how easily identities can be cloned!

Monday, 06 March, 2023 / 07:30 AM - 06:00 PM GMT

Engagement Zone Sponsored by ARCON

Come and visit us on the first floor!

Monday, 06 March, 2023 / 07:30 AM - 07:30 PM GMT

Registration and Information

Registration and information hours for the day.

Monday, 06 March, 2023 / 07:30 AM - 07:30 PM GMT

Exhibitor Showcase Open Hours

Visit the Exhibit Showcase to evaluate industry offerings that can move your business forward. Engage with your peers, Gartner experts, and exhibitors. Attend a theater session to see technology in action.

Monday, 06 March, 2023 / 08:00 AM - 06:00 PM GMT

Gartner Zone Open Hours

Demo our latest tools and gain insights that showcase how to maximize your Gartner benefits, including how Gartner for CISOs can help you make faster, smarter decisions on your most critical priorities.

Monday, 06 March, 2023 / 09:30 AM - 10:15 AM GMT

Gartner Opening Keynote: Lead Like a Wolf

Tina Nunno, Distinguished VP Analyst, Gartner

As a leader, are you a predator or prey, and what should you aspire to be? Technology executives are more visible now than ever before, this can be both an opportunity and a challenge. This session will explore how being a wolf can make you a better leader for your team and a great asset for your organization. Before this session find out yours at Gartner.com/wolfcio and learn more about what your results mean during the keynote.

Monday, 06 March, 2023 / 10:15 AM - 11:00 AM GMT

Refreshment Break

Join us for refreshments in a brief break between sessions.

Monday, 06 March, 2023 / 10:20 AM - 10:40 AM GMT

ARCON: Ditch Siloed IAM: Convergence, a Must For Identity Threat Detection & Response

Anil Bhandari, Chief Mentor, Arcon Techsolutions

An increase in the types of digital identities, coupled with multi-cloud adoption, has added complexity to managing identities and privileges. How does one get future-ready, to address these new-age challenges? An Identity-centric security strategy centers on effective governance with zero trust, that simplifies and unifies critical aspects of Access Management (AM), Identity Governance Administration (IGA) and Privileged Access Management (PAM). Join us to explore the benefits of a Converged Identity security approach that is outcome-driven, and looks to ditch the silos of key IAM components.

Monday, 06 March, 2023 / 10:20 AM - 10:40 AM GMT

CrowdStrike: No Room for Flat Spots: Stopping Identity-Related Breaches in Real Time

Steve Townsley, HEAD OF INFORMATION SECURITY, Mercedes AMG F1

Formula 1® is the most data-driven sport in the world where split-second decisions can determine success or failure. Find out why every second counts-not only on the track but in the race to beat the adversary and what drove the Formula 1® decision to choose CrowdStrike to protect such a high-profile team.

Monday, 06 March, 2023 / 11:00 AM - 11:30 AM GMT

Go Passwordless Whenever You Can, Wherever You Can

Ant Allan, VP Analyst, Gartner

To improve security and enhance UX, many organizations are already implementing various styles of passwordless authentication across a variety of use cases. This session will look to address the following questions. How can IAM leaders choose among the many passwordless approaches? Which approaches are most effective? Which approaches are feasible in which use cases? How do you deal with legacy applications? How can you craft a cohesive strategy across multiple use cases?

Monday, 06 March, 2023 / 11:00 AM - 11:30 AM GMT

State of Privileged Access Management (PAM) 2023

James Hoover, Principal Analyst, Gartner

This session will outline the current state and emerging trends in the market for privileged access management (PAM).

Monday, 06 March, 2023 / 11:00 AM - 11:30 AM GMT

The State of Access Management, 2023

Michael Kelley, Sr Director Analyst, Gartner

Access management tools are offering an array of increasingly converged technologies. This session will cover the progression and maturity of access management tools and how they will help you achieve identity first security strategies.

Monday, 06 March, 2023 / 11:00 AM - 11:30 AM GMT

Outlook for Identity and Access Management, 2023

Homan Farahmand, VP Analyst, Gartner

Digital identity requirements and importance are growing, as organizations are migrating their infrastructure and apps to the cloud. Enterprises anticipate innovations to enable continuous, dynamic, and intelligent IAM controls, while bracing for emerging decentralized identity impact and potential Web 3 business model disruption. This session discusses key trends and IAM outlook in the coming years.

Monday, 06 March, 2023 / 11:00 AM - 12:00 PM GMT

Contract Negotiation Clinic: Follow Gartner's Top 10 Tips, Tactics and Tricks for Negotiation Success

Jo Ann Rosenberger, Distinguished VP, Advisory, Gartner

This session will demonstrate and guide IT and IAM leaders involved in the negotiation planning process how to incorporate ten “must know” tips, tactics and “tricks” into the negotiation plan to optimize pricing, discounts and contract terms. Attendees will receive ready-to-use checklists, templates, and worksheets for optimizing future negotiations with existing, new and emerging vendors.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 06 March, 2023 / 11:00 AM - 12:30 PM GMT

Workshop: Defining a Successful IAM Program

Rebecca Archambault, Sr Director Analyst, Gartner

During this workshop, IAM leaders will learn the importance and steps required for defining a well-crafted IAM program. The session will include exercises to help leaders create their own IAM vision.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 06 March, 2023 / 11:45 AM - 12:15 PM GMT

Ping Identity: How IAM Helped Bring the FIFA World Cup Qatar 2022 to Fans Securely Online

Jorge Oliveira E Carmo, DPO, FIFA

Candace Worley, CHIEF PRODUCT OFFICER, Ping Identity

In the lead up to the FIFA World Cup Qatar 2022, FIFA aimed at ensuring the secure access to event critical solutions by the FIFA workforce and delivering innovative fan experiences through digital technologies. This joint Q&A session will explore the cooperation between FIFA and Ping to ensure the secure delivery of the FIFA World Cup Qatar 2022 from an Identity & Access Management perspective. The attendees will learn about the secure management of identities during a tournament despite large-scale coordinated cyberattacks and the introduction of a secure and scalable log-in methodology for fans.

Monday, 06 March, 2023 / 11:45 AM - 12:15 PM GMT

Okta: Customer Q&A: How Cazoo Accelerated their Business Initiatives with Identity

Richard Owen, SECURITY ARCHITECT, Cazoo

Philip Hoyer, FIELD CTO EMEA, Okta

Okta's customers no longer need to make a trade-off between delivering a great user experience and strong security. In less than 3 years since launch, Okta customer Cazoo is now the UK's largest independent used car retailer and it's workforce expanded to match pace, growing to over 3,500 employees now.
In our session, we talk to Richard Owen, Security Architect about how Okta provides seamless IT experiences for Cazoo employees through Lifecycle Management while boosting security with SSO and MFA; resulting in time and money saved and peace of mind for Cazoo and its employees and customers.

Monday, 06 March, 2023 / 11:45 AM - 12:15 PM GMT

BeyondTrust: Cyber-Defense Strategies to Protect Cloud Resources & Identities

Morey Haber, CSO, BeyondTrust

Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed, and serviced from the cloud.

Attackers have also realigned their efforts, focusing on staying undetected, quickly monetizing exploitations, and publicly shaming organizations after successful breaches.

BeyondTrust Chief Security Officer (CSO), Morey J.Haber will offer best practices for minimizing these increasingly exploited cloud attack vectors. Join him to learn cutting edge strategies for building the optimal cloud defense for your organizations unique cloud environment and identities.

Monday, 06 March, 2023 / 11:45 AM - 12:15 PM GMT

SailPoint: Legal & General’s Approach to Managing Identity in a Modern World

Steve Bradford, SENIOR VICE PRESIDENT, EMEA, SailPoint

Richard Wareham, IAM ANALYST, Legal and General

John Heal, IDENTITY & ACCESS MANAGEMENT PLATFORM LE, Legal and General

In today’s complex digital environment, a mature approach to governing identity is key to maintaining productivity and security. Companies must have full visibility into user access to stay ahead of security risks. Automating and streamlining identity processes is essential to boosting productivity and to the business itself. Modernizing your identity security can help boost operational efficiency, comply with privacy regulations, and reduce cybersecurity risks. See how Legal & General leverages SailPoint to provide their workforce with the right user access without compromising security.

Monday, 06 March, 2023 / 11:45 AM - 12:15 PM GMT

One Identity: How to Achieve a Unified Approach to Identity and Security

Alan Radford, SOLUTIONS ARCHITECT, One Identity

Insert abstractMost large organisations attempt to manage thousands – and hundreds of thousands – of customer, partner and employee identities across multiple applications and data silos. Each system has a unique user-permissions provisioning and approval process. This leads to operational inefficiencies and cybersecurity gaps that threat actors can take advantage of to wreak havoc on your organisation. Join this session, led by Alan Radford, Technical Strategist at One Identity, to discover how to unify your identity and security strategies, thus saving time, money and strengthening security.

Monday, 06 March, 2023 / 11:45 AM - 12:30 PM GMT

Roundtable: IAM Managed Services and Business Process Outsourcing as Part of a Security Strategy, Moderated by iC Consult

Heiko Klarl, Chief Marketing and Sales Officer, iC Consult Group GmbH

Andre Priebe, Chief Technology Officer, iC Consult GmbH

Liam Hogan, DIRECTOR IT, Jaguar Land Rover

chris patrick, Managing Director, iC Consult

Digital Identities are the core of every Zero Trust strategy. Managed Services and BPO for IAM are an efficient approach to implement this strategy with consistent levels of security within the enterprise. Central governance, a high grade of automation and the flexibility to support DevOps and agile teams are not a contradiction when implemented in a smart way.

Join our discussion on:
- The role of Managed Services in Zero Trust
- How to benefit from Business Process Outsourcing for IAM
- How this supports a Zero Trust Strategy at a global scale

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 06 March, 2023 / 12:30 PM - 01:00 PM GMT

Can You Prove Someone's Identity Online?

Akif Khan, VP Analyst, Gartner

Obtaining confidence in a customer’s or employee's identity is the foundation of identity-first security. Identity and access management (IAM) leaders must understand the current state-of-the-art, balancing assurance needs with friction in the UX, while orchestrating multiple tools and becoming aware of strategic trends on the horizon.

Monday, 06 March, 2023 / 12:30 PM - 01:00 PM GMT

So What Exactly Is (and Isn't) IGA and How Is It Different From Access Management?

David Collinson, Sr Director Analyst, Gartner

This is a session to introduce what IGA is and is not, and how it differs and interacts with access management tools. Ideal for individuals that are being asked to take on responsibilities in this area or for senior leaders to be given a high-level introduction in to these capabilities.

Monday, 06 March, 2023 / 12:30 PM - 01:00 PM GMT

The State of Authorization, 2023

Felix Gaehtgens, VP Analyst, Gartner

Authorization technology has been in a renaissance period, with many new technologies, vendors and specifications appearing within the last two years. This session shines a light on the current market, including open source initiatives, where they are used and where the state of the art lies with regards to authorization technology.

Monday, 06 March, 2023 / 12:30 PM - 01:00 PM GMT

CIEM is Paving the Way for Identity Fabric Immunity in the Cloud. What's Next?

Henrique Teixeira, Sr Director Analyst, Gartner

Preventive mechanisms offered by emerging technologies like cloud infrastructure entitlement management (CIEM) include security posture principles to handle misconfiguration, vulnerabilities, and general exposure of entitlements in cloud infrastructures. Hygiene and security posture is a must have complement to run time threat detection and response disciplines. Join this session to learn how CIEM is paving the way to smarter strategies for enabling identity fabric immunity.

Monday, 06 March, 2023 / 12:30 PM - 01:15 PM GMT

Ask the Expert: Customer Identity and Access Management

Mary Ruddy, VP Analyst, Gartner

Customer identity and access management (CIAM) is key to enabling your digital transformation and the foundation of your customers' digital experiences. This session gives you an opportunity to ask questions about CIAM platform features, vendors' complementary tools and best practices. Attendees should come prepared to ask questions about IAM for external users.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 06 March, 2023 / 12:30 PM - 01:15 PM GMT

Ask the Expert: Discovering, Managing and Controlling Workload Identities

Erik Wahlstrom, Sr Director Analyst, Gartner

Come to this session prepared to ask questions about workload identities. How should identities, secrets, keys and certificates be discovered, managed and maintained for applications, services, containers and VMs in an hybrid and multicloud environment?

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 06 March, 2023 / 01:00 PM - 02:30 PM GMT

Grab Lunch on the Exhibit Showcase

Head to the Exhibit Showcase for a bite to eat! Engage with your peers, Gartner experts, and exhibitors while enjoying delicious food and beverages. Evaluate industry offerings that can move your business forward. Attend a theater session to see technology in action.

Monday, 06 March, 2023 / 01:10 PM - 01:30 PM GMT

Atos (Evidian): Identities, The Perimeter Of A Zero-Trust Strategy In A Hyperconnected World Without Boundaries

Graham Francis, HEAD OF DIGITAL SECURITY NORTHERN EUROPE, Atos

Today, in order to fulfil the requirements of a Zero Trust strategy, businesses’ global ecosystem needs to define a source of trust. Identity-first is the single transportable constant making this journey possible. Identities can come from anywhere in the ecosystem, making identity the new perimeter, and access the attack surface changing the threat landscape. Join Graham Francis, Head of digital security at Atos, as he describes the journey to a converged IAM and Governance Solution with a Zero trust strategy at its core.

Monday, 06 March, 2023 / 01:10 PM - 01:30 PM GMT

Yubico: Moving on from Legacy MFA: Phishing-Resistant MFA as a Prerequisite for Passwordless

Nic Sarginson, Principal Solutions Engineer, Yubico

As long as passwords exist, enterprises are vulnerable to account takeover attacks – yet organizations looking to eliminate passwords may not know where to begin their passwordless journey. While passwordless authentication methods—especially those based on FIDO2—are widely available, they are not yet universally supported nor adopted. This lack of a universal approach can cause confusion and complacency. Learn why (and how) organizations should move away from passwords and legacy MFA to advance to and adopt a secure passwordless strategy centered on phishing-resistant MFA in 2023.

Monday, 06 March, 2023 / 01:35 PM - 01:55 PM GMT

Lastpass: How the role of compliance needs to evolve related to technological paradigm shifts

Mario Platt, DIRECTOR OF GRC - SECURITY AND PRIVACY, LastPass

How Security professionals can Support Engineers and Dev in developing Secure Code - making sure that the systems and processes we implement are integrated and aligned with the compliance requirements (less shadow IT and unsecure environments).
Audit in the context of IAM - Why should IAM professionals know about Auditing and Compliance.
Modern Compliance Programs
- Integrated (mention how that integrates with Security and IAM)
- Automated - how automation increases the sync between different teams
- Employee Experience - streamlining the process to improve user experience = less time to audit and more cost savings

Monday, 06 March, 2023 / 02:00 PM - 02:20 PM GMT

Keyless Technologies: Will 2023 be the Death of One-Time Passwords?

Fabian Eberle, CO-FOUNDER, Keyless Technologies

With DIY phishing kits and SIM swapping more prevalent than ever, bypassing MFA challenges has never been easier. Countries such as Malaysia are instructing financial institutions to cease using SMS OTPs altogether; is this the beginning of the end? As with traditional passwords, OTPs are vulnerable. So long as they can be typed, shared, or seen by others, they can be compromised. This presentation will cover the inherent weaknesses of OTPs and explore the emerging alternatives that can help businesses enable strong, frictionless security.

Monday, 06 March, 2023 / 02:00 PM - 02:20 PM GMT

Jumio: The Ever-Increasing Sophistication of Fraudsters

Stuart Wells, CHIEF TECHNOLOGY OFFICER, JUMIO

Deep fakes have been a looming fraud risk over the past few years, but as technology continues to become more sophisticated, so do fraud attempts that can hurt your business. Implementing and maintaining the latest security measures while also providing a positive end-user experience for good customers can be challenging.
In this session, attendees will learn about:
The evolution of fraud attempts used to circumvent the verification process
The latest fraud trends and techniques such as manipulating document microprints, watermarks and holograms, and duping biometric authentication using AI/ML

Monday, 06 March, 2023 / 02:30 PM - 03:00 PM GMT

Technical Insights: Is Light IGA Right for Your IAM Needs?

Nat Krishnan, Sr Director Analyst, Gartner

Light alternatives to IGA suites can be used for reducing costs or to augment an existing IGA suite to add niche capabilities. This session will discuss whether light IGA tools can be considered as the primary IGA solution for an organization.

Monday, 06 March, 2023 / 02:30 PM - 03:00 PM GMT

The State of Customer IAM, 2023

Abhyuday Data, Director Analyst, Gartner

Demand for customer IAM has increased, due to its importance in converging UX, security and privacy for high-assurance interactions. How is CIAM technology continuing to evolve to meet these new challenges? We will talk about what is available today, and what kinds of things can you expect to take advantage of in the near future.

Monday, 06 March, 2023 / 02:30 PM - 03:00 PM GMT

Maximizing Business Value with IAM Maturity Assessment

James Hoover, Principal Analyst, Gartner

Security and risk leaders struggle to deliver demonstrable business value from their IAM investments. Maturity Assessment approaches hold promise for improving business value delivery, but realization of this improved business value is inconsistent. This session will outline Gartner's IT Score for IAM and practical steps for applying it effectively to increase business value delivery.

Monday, 06 March, 2023 / 02:30 PM - 03:00 PM GMT

Case Study Presentation by TomTom: TomTom’s Journey to Right-sized CIAM

Han Van Leijen, Director of Applications, TomTom International B.V.

We have fully reimplemented our consumer identity stack, enabling customers to purchase content and service products and use web and mobile-based navigation services. The previous “leader-quadrant” solution had high software license costs and was difficult to operate – we replaced it with an open-source “niche player”. The main complexity was providing user provisioning and single sign-on for 10 web, mobile and embedded channels with minimal client change. The biggest challenge was near-zero down-time during cut-over, whilst preserving token state for millions of navigation devices. The new landscape offers feature parity while being vastly simpler and more affordable.

Monday, 06 March, 2023 / 02:30 PM - 04:00 PM GMT

Workshop: How to Build and Execute Best RFP for an IGA Product

Rebecca Archambault, Sr Director Analyst, Gartner

This workshop will help you by practically taking you through the stages of preparing the RFP for an identity governance and administration (IGA) product. Attendees will leave with a practical approach to a successful RFP.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 06 March, 2023 / 03:15 PM - 03:45 PM GMT

CyberArk: Don't just Manage Identities, Secure them.

Barak Feldman, MANAGER, SVP, PAM and Identity Security

Every identity is a gateway to your organization’s most valuable resources. Privilege users are no longer just IT admins. Almost any identity can have high-value or high-level access. How can you ensure that the right users securely access the right resources at the right time?

Enter Identity Security, a strategy to enable Zero Trust and enforce least privilege, with dynamic adaptive controls, giving the right level of access, based on risk.

In this panel we will explore:

Rethinking privilege
How organizations are adopting Identity Security
Starting your Identity Security program

Monday, 06 March, 2023 / 03:15 PM - 03:45 PM GMT

ForgeRock: Never Login Again. The Path to Passwordless is Paved with Orchestration

Matthew Berzinski, SENIOR DIRECTOR, PRODUCT MANAGEMENT, ForgeRock

Alex Laurie, Solution Architecture, Forgerock

Passwordless authentication is gaining momentum with good reason. Users love it and would-be intruders hate it. So why hasn’t it caught on more quickly? Many enterprises are saddled with legacy technology, identity silos, and complex policies. But now you can orchestrate passwordless journeys for your workforce and customers using contextual factors, such as user location, behaviour, and device — driven by continuous AI-powered orchestration. Join this session to explore the evolution to passwordless and how to enable it for your legitimate users while reducing the risk of unauthorised access.

Monday, 06 March, 2023 / 03:15 PM - 03:45 PM GMT

Radiant Logic: Identity Data, Observability & Analytics. The Road to Identity First Security

John Pritchard, CHIEF PRODUCT OFFICER, Radiant Logic

Sebastien Faivre, CTO, Brainwave

Data is foundational to business intelligence-but how do you translate that into identity governance? Today’s enterprise has unprecedented levels of real-time, rich identity data across multiple parallel sources. More data leads to more predictive power in machine learning algorithms. These runtime data driven insights can become a central component to a systematic compliance and risk management strategy. This session will highlight how identity data can be used to uncover patterns, anomalies, and outliers and radically improve decision making, supporting your Identity First Security strategy.

Monday, 06 March, 2023 / 03:15 PM - 03:45 PM GMT

Saviynt: Lloyds Banking Group's Cloud Identity Transformation, A discussion

Jonathan Neal, Technical Director, Saviynt

David Queen, HEAD OF CLOUD IDENTITY, Lloyds Banking Group

Lloyds Banking Group is the largest UK retail and commercial financial services provider, with 26 million customers, 58000 employees and a heritage that goes back 250 years.

Learn about the key part that implementing Cloud Privilege Access Management (CPAM) is playing in the bank’s cloud transformation strategy.

Head of Cloud Identity for Lloyds Banking Group, David Queen, will talk about the journey to implementation and you will have the opportunity to ask questions and learn from David’s experience.

Monday, 06 March, 2023 / 03:15 PM - 03:45 PM GMT

WSO2: CIAM Beyond AM. Multi-Experience Apps, a Unified Customer View, and Digital Doubles

Geethika Cooray, VP & GENERAL MGR - IAM, WSO2

Organizations are looking beyond making customer registration and log in simple to deliver unified authentication across multi-experience applications. This requires a set of capabilities beyond access management to unify disparate user stores, databases and apps across enterprises. The unified customer view can be leveraged to provide a truly personalized experience at any customer interaction point. Hear how WSO2’s CIAM Suite goes beyond the CIAM basics and learn from a customer that will discuss what they’ve accomplished with WSO2.

Monday, 06 March, 2023 / 03:15 PM - 04:00 PM GMT

Roundtable: Why are Identity Based Attacks prevalent and how do you prevent them? Moderated by Crowdstrike

Ross Penny, Senior Manager, Tech Strategy (Identity, Crowdstrike

Jeremy Freeman, Identity Practice Manager - Northern Europe, CrowdStrike

Selling identity credentials is big business on the dark web today. Access broker credential sales have exploded more than 250% since only February 2022. Adversaries in the know can easily steal or buy keys to an organisations identity store which quickly gives them log-in access without having to break-in. Once in, an adversary has the ability to quickly get to work and deploy ransomware, ransomware data extortion, conduct cyber sabotage and cyber espionage. Protecting against this sort of activity should be a must have for every organisation. Join this roundtable to discuss how.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 06 March, 2023 / 04:00 PM - 04:30 PM GMT

Technical Insights: Identity Fabric — From Here to There

Mary Ruddy, VP Analyst, Gartner

In a world where identity is the only perimeter, more effective identity and access management (IAM) is now an imperative. IAM must be deployed more cohesively as a composable, distributed, resilient identity fabric. This session will explain the 10 identity fabric principles that should guide IAM decisions.

Monday, 06 March, 2023 / 04:00 PM - 04:30 PM GMT

Technical Insights: Your MFA Will be Attacked — Can You Protect It?

Paul Rabinovich, Sr Director Analyst, Gartner

Like all security controls, MFA itself is vulnerable to attacks. Man in the middle, prompt bombing, SIM swaps, social engineering and session hijacking are a few examples of attacks against MFA implementations. In this session, we will discuss common threats and ways to counter them.

Monday, 06 March, 2023 / 04:00 PM - 04:30 PM GMT

Case Study Presentation by Michelin Group: Journey from Accounts Management to Identity Governance

Giriraj Balasubramanian, IAM Architect, Michelin Group

The case study would present the evolution of the IAM domain at Michelin Group from Accounts Management to Identity Governance. The reasons behind this evolution, preparatory work and major steps taken during the course of the evolution. The non-obvious benefits and challenges faced during this journey.

Monday, 06 March, 2023 / 04:00 PM - 04:30 PM GMT

The State of Artificial Intelligence in Security and Risk Management

Felix Gaehtgens, VP Analyst, Gartner

This session covers why everyone speaks about how artificial intelligence might solve security and risk management challenges, but struggle when asked to provide a concrete example. It will show examples of what we call AI today.

Monday, 06 March, 2023 / 04:00 PM - 04:45 PM GMT

Ask the Expert: CIEM, ITDR and Identity Immune Systems

Henrique Teixeira, Sr Director Analyst, Gartner

Cloud infrastructure entitlement management plays an important role in identity security posture management, with identity threat detection and response adding protection mechanisms against ongoing attacks to the identity infrastructure. Ask me anything about how ITDR and IDSP can be combined to create identity immune systems.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 06 March, 2023 / 04:30 PM - 05:15 PM GMT

Refreshment Break

Join us for refreshments in a brief break between sessions.

Monday, 06 March, 2023 / 04:40 PM - 05:00 PM GMT

Delinea: The Rise of Cyber Insurance: How Will it Impact your Business?

Scott Shields, TECHNO KING, Delinea

The cyber insurance industry is evolving fast to help your business mitigate risk. Cyber insurance offers a safety net for businesses threatened by the rapid growth of insider cybercrime and external cyber threats, particularly ransomware. While cyber insurance has been a reliable safety net for years - driven by accelerating insider cybercrime and exploding ransomware attacks - things are changing fast. It’s important to understand the dynamics of the rapidly changing market and consider how well your security controls will stand up to an insurance company’s review.

Monday, 06 March, 2023 / 04:40 PM - 05:00 PM GMT

PlainID: Driving Zero Trust and Identity-First Security with Authorization

Tom Ammirati, CRO, PlainID

Static and inflexible policies through traditional access control methods have failed to address security risk in real-time. Enterprises are expanding on an Identity-First Security strategy to better support Zero Trust initiatives and address their complex, distributed environments. In this session we cover how enterprises can deliver dynamic controls for Identity-First Security in a consistent, continuous, and contextual manner by externalizing Authorization.




Monday, 06 March, 2023 / 05:15 PM - 06:00 PM GMT

Guest Keynote: The World of Creativity

Fredrik Haren, The Creativity Explorer,

A session about the power of creativity, and about what we can do to develop our full creative potential. By studying and understanding how creativity is different in different part of the world we can broaden our understanding of the concept and become better at developing our own creativity for the benefit of both our professional career and our private lives.

Monday, 06 March, 2023 / 06:00 PM - 07:30 PM GMT

Exhibit Showcase Networking Reception

Join us for a networking reception on the Exhibit Showcase where you can engage with your peers, Gartner experts, and exhibitors while enjoying delicious food and beverages. Evaluate industry offerings that can move your business forward. Attend a theater/stage session to see technology in action.

Monday, 06 March, 2023 / 07:30 PM - 09:00 PM GMT

Cocktails in the Sky Hosted by WSO2

WSO2 invites you to unwind and network with industry peers against the backdrop of London’s skyline.

Tuesday, 07 March, 2023 / 07:30 AM - 03:45 PM GMT

Exhibitor Showcase Open Hours

Visit the Exhibit Showcase to evaluate industry offerings that can move your business forward. Engage with your peers, Gartner experts, and exhibitors. Attend a theater session to see technology in action.

Tuesday, 07 March, 2023 / 07:30 AM - 03:45 PM GMT

Engagement Zone Sponsored by IBM: Clone an identity, watch live demos & grab some swag

Curious to see how decentralized identity works? Want to see how passwordless capabilities such as QR code and FIDO can make your organization more secure and how SSO, adaptive access, and verifiable credentials can make your workforce productive and customers happy? Then stop by the IBM Security Verify Engagement Zone. While you are there, participate in an interactive session to see how easily identities can be cloned!

Tuesday, 07 March, 2023 / 07:30 AM - 03:45 PM GMT

Engagement Zone Sponsored by ARCON

Come and visit us on the first floor!

Tuesday, 07 March, 2023 / 07:30 AM - 05:00 PM GMT

Registration and Information

Registration and information hours for the day.

Tuesday, 07 March, 2023 / 08:00 AM - 05:00 PM GMT

Gartner Zone Open Hours

Demo our latest tools and gain insights that showcase how to maximize your Gartner benefits, including how Gartner for CISOs can help you make faster, smarter decisions on your most critical priorities.

Tuesday, 07 March, 2023 / 09:00 AM - 09:45 AM GMT

Guest Keynote: Disability & Innovation

Haben Girma, Disability Rights Lawyer and Author,

Disabled people are the largest historically underrepresented group, numbering over one billion worldwide. Reaching a group of this scale creates value for everyone. Organizations that prioritize accessibility benefit by gaining access to a much larger audience, improving the experience for both disabled and nondisabled people, and facilitating further innovation. Join us for an engaging presentation where Haben Girma will share how she became an advocate and what we can do to make our communities more inclusive.

Tuesday, 07 March, 2023 / 09:45 AM - 10:30 AM GMT

Refreshment Break

Join us for refreshments in a brief break between sessions.

Tuesday, 07 March, 2023 / 09:45 AM - 10:30 AM GMT

Exclusive Book Signing with Guest Keynote Speaker Haben Girma (Please note that quantities are limited, and participation will be first come, first served)

Haben Girma, Disability Rights Lawyer and Author,

Join us for an exclusive opportunity to meet Guest Keynote Speaker Haben Girma.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 07 March, 2023 / 09:50 AM - 10:10 AM GMT

Akeyless: Managing the Secrets Behind Machine Identities

Oded Hareven, CEO & CO-FOUNDER,

The rise of machine identities and DevOps automation has caused “Secrets Sprawl,” due to the increase of database credentials, certificates, API keys, and other machine secrets.

These machine secrets are kept in siloed point solutions, multiple DevOps tools, hardcoded, and saved across on-prem servers or multiple cloud providers. Secrets sprawl is at the root of the difficulty of tracking, securing and managing machine secrets.

Join CEO, Oded Hareven as he explores the rise of machine identities, secrets sprawl, and actionable steps that IAM teams can take to address these challenges.

Tuesday, 07 March, 2023 / 09:50 AM - 10:10 AM GMT

HYPR: Passwordless Authentication: Become the Champion in Your Organisation.

Bojan Simic, CEO, HYPR Corp.

Best-in-class authentication has been on everyone’s mind; and it’s no surprise. The vast majority of recent breaches can be traced back to the failure of passwords and legacy MFA. With recent guidance for phishing-resistant MFA, organisations have become Passwordless Curious, but may be hesitant to move forward until they can quantify the business case. Join us for this exciting session where we will outline the benefits of implementing phishing-resistant MFA and discuss the quantifiable value drivers which you can champion within your organisation.

Tuesday, 07 March, 2023 / 10:30 AM - 11:00 AM GMT

Insights From the Magic Quadrant and Critical Capabilities for Privileged Access Management

Abhyuday Data, Director Analyst, Gartner

Through a selection of relevant Gartner insights and complementary methodologies, we will provide insight into latest updates in the privileged access management market.

Tuesday, 07 March, 2023 / 10:30 AM - 11:00 AM GMT

Technical Insights: Identity-First Security as the North Star for Your IAM Reimplementation

Mary Ruddy, VP Analyst, Gartner

Many organizations are reimplementing identity and access management. This session will show how organizations can use the principles of Identity-First Security to guide the prioritization and design of their best practice IAM reimplementations.

Tuesday, 07 March, 2023 / 10:30 AM - 11:00 AM GMT

The State of IAM Program Management, 2023

Rebecca Archambault, Sr Director Analyst, Gartner

The establishment and delivery of an IAM Program is vital to delivering Identity First security. Whether you are new to identity or delivering identity and access management currently, you need to understand and communicate the role that identity plays within your organization to enable your workforce, customers and business partners to deliver their strategic initiatives.

Tuesday, 07 March, 2023 / 10:30 AM - 11:00 AM GMT

How to Combat Inflation During Vendor Negotiations Using Gartner's Four-Step Approach

Jo Ann Rosenberger, Distinguished VP, Advisory, Gartner

Inflationary times create added complexity when negotiating with vendors. Gartner's four-step approach to proactively plan for new and renewal deals can help assess the fairness of increases as well as use data points from economic indicators such as CPI and ECI to customize "should cost" models to use during vendor negotiations. This session will demonstrate these steps by walking through two case study scenarios.

Tuesday, 07 March, 2023 / 10:30 AM - 11:15 AM GMT

Ask the Expert: Architecting and Defending Identity First and Zero Trust Implementations

David Chase, Sr Director Analyst, Gartner

A chance to ask an analyst your questions on implementing identity first, zero trust, and ITDR (identity threat detection and response).

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 07 March, 2023 / 10:30 AM - 12:00 PM GMT

Workshop: Defining Great Metrics for IAM

David Collinson, Sr Director Analyst, Gartner

Knowing what metrics matter to your IAM stakeholders is critical to prioritizing, developing and monitoring IAM features. Metrics identify the success of individual projects, and where attention and improvements must take place. To succeed, they must be terms that the stakeholders recognize and understand. They should also align with or influence other initiatives. This workshop will enable you to learn how to set proper expectations.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 07 March, 2023 / 11:15 AM - 11:45 AM GMT

Cisco Secure: The Weakness is us. How Zero Trust can Help Save Us from Ourselves

Oliver Cheal, DIRECTOR, EMEAR, Duo Security

Josh Green, TECH EVANGELIST, Cisco Systems

It was only a matter of time before threat actors found a weakness in push-based MFA. It was there all along: our patience. Our patience only lasts so long, and attackers have been exploiting its limits to phish us mercilessly. The good news is that we are anything but defenceless. Behavioural analytics and adaptive authentication can mitigate the attacks quickly, while deploying passwordless and device trust render these attacks completely obsolete. Even better still, these new technologies make the user experience easier than ever.

Tuesday, 07 March, 2023 / 11:15 AM - 11:45 AM GMT

Crowdstrike: Don’t Lose Your Identity: Why an Adversary-Focused ITDR Approach Matters Now

Zeki Turedi, CTO EMEA , CrowdStrike UK Ltd

The key to your network is your user identity and the threat actor knows it. Adversaries are sharpening their attack tactics and focussing on compromised credentials and your users, constantly evolving to find the shortest path to your critical resources. Securing your identity store is a major step in stopping modern attacks like ransomware, supply chain threats and account takeover. But how? In this session, discover why it matters to think like the adversary to detect adversarial actions and to shift from a reactive approach to a proactive one to mitigate identity-related threats.

Tuesday, 07 March, 2023 / 11:15 AM - 11:45 AM GMT

IBM: Making Identity and Access Governance for Cloud Maintainable and Sustainable

Angelika Steinacker, CTO IAM , IBM SECURITY EUROPE, IBM Global Security

Controlling identities and access rights in cloud environments is a challenge. Although every large enterprise has an IAM framework, it sometimes seems impossible to integrate IAM in the cloud with the enterprise framework. CIAG (Cloud Identity & Access Governance) is the orchestration layer between cloud and enterprise framework and provides the methods and assets to achieve the integration. This session will show how an organization can leverage the CIAG assets to keep their clouds clean and making identity and access governance in and across cloud environments maintainable and sustainable.

Tuesday, 07 March, 2023 / 11:15 AM - 11:45 AM GMT

Omada: How Domino’s Embrace Modern IGA To Drive Digital Transformation

Steve Barker, MODERN WORKPLACE ARCHITECT, Dominos PLC

Over the past several years, Domino’s Pizza has undergone a major digital transformation, including transitioning fully to the cloud and instituting a Zero Trust strategy throughout the organization. In this session, you will hear how Domino’s leveraged an IGA as a Service solution to not only bolster security and compliance, but delivering value by enabling the entire workforce, including employees, third party contractors, and more. They will also discuss how they avoided common deployment and scaling pitfalls by engaging people across the organization including HR and executive leadership.

Tuesday, 07 March, 2023 / 11:15 AM - 11:45 AM GMT

Silverfort: The Identity Security Blind Spot. MFA and ITDR for Legacy Systems and Service Accounts

Hed Kovetz, CEO & Co-Founder, Silverfort

MFA and other identity security controls are very effective in protecting web apps and modern systems, but until now they couldn't be applied to legacy systems, command-line interfaces, service accounts, OT systems and many other sensitive resources. These 'blind spots' are extensively leveraged in data breaches and ransomware attacks, and also prevent meeting regulatory and cyber insurance requirements. In this session we will show how identity security controls, ranging from the traditional MFA to the emerging ITDR, can now be extended to critical resources that couldn’t be protected before.

Tuesday, 07 March, 2023 / 11:15 AM - 12:00 PM GMT

Roundtable: Understanding the Horizons of Identity Security, Moderated by SailPoint

Paul Squires, LEAD IDENTITY STRATEGIST, SailPoint

In an era of hyper innovation and rising cyber threats, it’s imperative that identity security evolve to meet today’s needs and future demands. How do you know if your program is mature enough? What does the future entail? Research has uncovered 5 horizons of identity security, showing that those further along the journey see identity as a strategic enabler to business innovation and security realizing the benefits of an advanced identity program. Hear the latest findings on the horizons of identity security, insights on digital trends, and ways to capture the full value of identity security.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 07 March, 2023 / 12:00 PM - 12:30 PM GMT

Guidance for Successful IGA Deployments

Nat Krishnan, Sr Director Analyst, Gartner

Identity governance and administration systems is one of the most expensive IAM components an organization will ever purchase. It is a foundational component of an IAM program. However, it is extremely complex and one of the costliest when considering the total cost of ownership. This session will cover IGA deployment methodology to ensure your project stays on time, within professional services budget and avoid lengthy overruns.

Tuesday, 07 March, 2023 / 12:00 PM - 12:30 PM GMT

Use Journey-Time IAM Orchestration to Deliver Better UX

Akif Khan, VP Analyst, Gartner

A typical digital user journey may involve a broad range of IAM tools from identity proofing to authentication to access management to fraud detection. Getting all of these instruments to play in harmony is an increasingly complex challenge. Organizations are buying or building orchestration layers to conduct the symphony. Learn how such orchestration can reduce complexity and improve UX.

Tuesday, 07 March, 2023 / 12:00 PM - 12:30 PM GMT

State of User Authentication, 2023: What it Is, Why It Matters, How It Will Change

Ant Allan, VP Analyst, Gartner

User authentication is a cornerstone of identity-first security, and digital identity for workforce and customers. Market hype about passwordless, risk-based and continuous authentication can be daunting. This session will help IAM leaders understand the value of authentication, the shift to continuous adaptive trust, and where this fits with zero trust, adaptive access and the identity fabric.

Tuesday, 07 March, 2023 / 12:00 PM - 12:30 PM GMT

Technical Insights: Best Practices for Improving Your Access Management Implementation

David Chase, Sr Director Analyst, Gartner

Organizations struggle with changes to authentication, authorization, architecture and migrating to new access management platforms. In this session, guidance and strategies to handling these changes will be discussed.

Tuesday, 07 March, 2023 / 12:00 PM - 12:45 PM GMT

Ask the Expert: IAM Program Management

Rebecca Archambault, Sr Director Analyst, Gartner

Organizations understand the important role that identity plays in their cybersecurity program, however security and risk management leaders aren't clear on where to begin. For those who have a defined IAM program, their efforts often stall, limiting their ability to mature their IAM capabilities. Bring your questions to this session, where we can talk about initiating or enhancing your IAM program.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 07 March, 2023 / 12:00 PM - 12:45 PM GMT

Ask the Expert: Access Management

Abhyuday Data, Director Analyst, Gartner

Access management tools are the key to ubiquitous application access, enabling any user to access any application, anytime and anywhere. Gartner has identified a five-step approach to create a modern, efficient access management strategy that serves the needs of all user segments. This session gives you an opportunity to ask questions about that approach for your broader access management strategy.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 07 March, 2023 / 12:30 PM - 02:00 PM GMT

Grab Lunch on the Exhibit Showcase

Head to the Exhibit Showcase for a bite to eat! Engage with your peers, Gartner experts, and exhibitors while enjoying delicious food and beverages. Evaluate industry offerings that can move your business forward. Attend a theater session to see technology in action.

Tuesday, 07 March, 2023 / 12:40 PM - 01:00 PM GMT

Appgate: Use IAM to Build a Dynamic, Context and Risk Aware Zero Trust Architecture

Establishing a strong IAM strategy is a great first step in any Zero Trust journey. The right access for the right users, MFA everywhere and identity context reduce the risk of identity theft. Despite this, networks are still infected with malware, ransomware and compromised devices. Let's explore the benefits of a context and risk aware Zero Trust architecture, using IAM in combination with Zero Trust Network Access to dynamically adjust fine-grain access privileges for both network and applications based on a multi-dimensional profile consisting of identity, context and risk.

Tuesday, 07 March, 2023 / 12:40 PM - 01:00 PM GMT

QOMPLX: Assume Breach. Layering Prevention and Detection for Comprehensive Identity Security

Tudor James, PRESALES ENGINEER, Qomplx

Identity systems are under attack like never before with attackers who simply login and elevate privilege. Learn where MFA and PAM work, and how you can improve your attack detection capabilities to get a complete identity security solution. Additionally, understand how you can improve your overall identity security posture by ensuring identities are secured, your attack detections are comprehensive, and your response is tried and true.

• Why MFA is not enough
• Why you need to assume breach
• What ITDR actually means
• Why the best ITDR programs include prevention along with detection

Tuesday, 07 March, 2023 / 01:05 PM - 01:25 PM GMT

Curity: Securing APIs and Microservices at Scale

Travis Spencer, CEO, Curity

Security is never a simple task; the same applies to APIs. And even more challenging at scale. It’s naturally easier to protect a few endpoints and microservices than hundreds. As the API ecosystem grows, just starting to use OAuth may not be enough. Proper handling of OAuth tokens, utilising different features, and other non-trivial implementation details must be overcome. To help with these, this talk will describe:
- The different perspectives that should be viewed when assessing the size of an API ecosystem; Common security issues; and
- How to address these security challenges.

Tuesday, 07 March, 2023 / 01:05 PM - 01:25 PM GMT

DigiCert: Invisible Authentication: Simplifying Access and Improving Security

In this session, Brian Trzupek will discuss “invisible authentication” as a strategy to improve end user experience, reduce the IT support burden, and improve security posture related to authentication to IT services and applications. Invisible authentication is governed by certificate-mediated rather than password-governed access. Brian will explore how organizations are:
Automating certificate provisioning for authentication to services such as WiFi and VPN
Achieving instant revocation and remediation to eliminate security gaps
Managing last-mile installation to end-user applications

Tuesday, 07 March, 2023 / 01:30 PM - 01:50 PM GMT

Keyfactor: Preparing for the Future of IAM: Navigating the Impact of Quantum Computing

Tomas Gustavsson, CTO, PrimeKey Solutions AB

Join Keyfactor's Chief PKI Officer, Tomas Gustavsson, for a strategic discussion on the potential impact of quantum computing on IAM and the shift towards post-quantum cryptography.

Tomas will explore the current state of PQC research and standardization, the steps organizations can take to prepare for the transition to these new security protocols as well as some of the pitfalls that we know we can expect on the way. Don't miss this opportunity to gain valuable insights and a head start on the future of IAM from the perspective of a leading PKI expert.

Tuesday, 07 March, 2023 / 01:30 PM - 01:50 PM GMT

TrustBuilder: Navigating B2B2X Complexity with Identity-Centric Personas

Frank Hamerlinck, CEO, Trustbuilder

Streamline your B2B2X digital ecosystem with identity-centric personas and policy-based access control. As customers, workforce, partners, suppliers,… become increasingly intertwined, companies face the challenge of managing access for multiple mandates. Combining different personas into a single user profile and allowing users to always authenticate with a single set of credentials enhances user experience. It also allows for effective management of customer, workforce, and partner data, ensuring compliance and security, while reducing complexity and automating data removal when mandates end.

Tuesday, 07 March, 2023 / 02:00 PM - 02:30 PM GMT

Avoid the Breach With Identity Threat Detection and Response

Henrique Teixeira, Sr Director Analyst, Gartner

Conventional IAM and security prevention controls are not sufficient to protect your identity system itself from cyberattacks. Learn how to enhance your cyber attack preparedness with the emerging discipline of ITDR.

Tuesday, 07 March, 2023 / 02:00 PM - 02:30 PM GMT

How to Be Successful With Privileged Access Management

Felix Gaehtgens, VP Analyst, Gartner

This breakout serves not just as an introduction but is also ideal for those who already have a PAM program and are looking to mature it. The following topics are covered: why is PAM such a crucial piece of any security program? How should you leverage PAM? How can you raise your security posture by using a just-in-time PAM and zero standing privileges approach?

Tuesday, 07 March, 2023 / 02:00 PM - 02:30 PM GMT

Technical Insights: (Re)implement the Right Identity Protocol in Your Apps, Services and APIs

Erik Wahlstrom, Sr Director Analyst, Gartner

What modern identity protocol should you implement in your applications and services, such as OAuth 2.0, OpenID Connect, SAML, OPA, FIDO? How do you do it at scale? In this technical session we will define what protocol to use for what specific use case.

Tuesday, 07 March, 2023 / 02:00 PM - 02:30 PM GMT

Case Study Presentation by UBS: Project Cadmus: Slaying the Monsters!

Nick Tuffs, Executive Director, UBS

Cadmus was a Greek Hero, renowned for slaying monsters. UBS has over the course of several decades created several “monsters” through the entitlement management tools that were custom built for the needs of specific business areas. UBS needed to reduce complexity for their business users that was impacting productivity, while also finding ways to improve their security posture and ability to meet compliance mandates. With multiple siloed solutions increasing operational and infrastructure costs, the need for change was obvious. However, doing all this required ambition and innovation as these tools touched every corner of the organization. UBS had attempted this before several years ago with a vendor product but without success, so many people asked - what is different this time? This session will go through the differential factors that have led to Cadmus being a success.

Tuesday, 07 March, 2023 / 02:00 PM - 02:45 PM GMT

Ask the Expert: User Authentication

Ant Allan, VP Analyst, Gartner

This interactive session enables attendees to ask the Gartner expert and learn from others about any authentication or adjacent topic. Topics covered include requirements definition, the pros and cons of different technologies, passwordless authentication trends, the shift towards continuous adaptive trust, synergies with identity proofing, user experience and life cycle management.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 07 March, 2023 / 02:00 PM - 03:30 PM GMT

Workshop: Selecting the Right Employee SSO Solution for Your Organization

David Chase, Sr Director Analyst, Gartner

Modern architectures and applications place additional demands on access management tools. This workshop will introduce access management evaluation criteria guidelines, and discuss what features you should look for and what vendors to consider for your next employee access management solution.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 07 March, 2023 / 02:45 PM - 03:15 PM GMT

SecurEnds: Transform User Access Reviews: Painful Checkbox to Effective Tool

Bob Pruett, CISO, SecurEnds, Inc.

Managing identities and permissions across all applications is a tough job. It’s getting tougher every day. SecurEnds CEM will give you a consolidated view of all your identities and allow you to perform automated and meaningful user access reviews without weeks of preparation. SecurEnds can turn a compliance checkbox into a powerful tool to protect your enterprise with additional features such as SOD and service account management, simplifying your identity tasks quickly.

Tuesday, 07 March, 2023 / 02:45 PM - 03:15 PM GMT

SSH: How to Become Passwordless and Keyless in a Borderless World?

Teemu Tunkelo, CEO, SSH Communications Security Oyj

To improve security and ensure compliance, organizations are moving away from static perimeter-based cyber defense to a Zero Trust model, where there are no passwords or keys nor implicitly trusted users, connections, applications, servers, or devices. The increased need for remote work, multi-cloud environments & 3rd party access have created the need for solutions that are passwordless and borderless.
Join this session to learn how you can:

- Get rid of all passwords
- Move past rotating secrets
- Forget SMS-based MFA
- Base your access on identities
- Monitor, verify, and control 24/7

Tuesday, 07 March, 2023 / 02:45 PM - 03:15 PM GMT

Thales: Unifying the Customer Experience in a Fragmented Insurance Landscape

Aizo Krikke, SENIOR PRODUCT OWNER, a.s.r.

a.s.r. has a long history of providing customer-friendly insurance products on the Dutch market. Over the years, the company has grown into a merger organisation offering a wide range of brands and products, with different go to market approaches, backend systems and processes. Join this session to understand how a.s.r. streamlined the user experience for their B2C and B2B channel and business customers, by leveraging a CIAM platform and delivered a frictionless and consistent user journey across all brands and products.

Tuesday, 07 March, 2023 / 02:45 PM - 03:15 PM GMT

Ubisecure: Nobody is Delivering True B2B IAM. How do we Change that?

Simon Wood, CEO, Ubisecure Ltd

IAM has evolved to secure and protect transactions, from the smallest interaction to the largest global contract. Individuals have a plethora of technology available to identify themselves. However, organisations are underserved and under-identified with no standard ability for individuals to express their verified relationship to various organisations. Learn how to achieve true B2B IAM - only made possible by combining strongly authenticated individuals with highly assured organisation identities to allow them to express who they are, who they represent and the rights they have when doing so.

Tuesday, 07 March, 2023 / 02:45 PM - 03:15 PM GMT

VU: Online Persona: Being you in a Decentralized Digital World

Sebastian Stranieri, CEO, VU

Insert AbstractIt's not only about balancing User Experience, Compliance, and Organizational Needs while building a unified online identity. It's about maximizing all of them.

Everyone demands a seamless and consistent user experience while also complying with industry regulations and meeting business goals. At the same time, individuals need to protect their personal information and manage their online reputation.

This talk will explore the challenges and alternatives for addressing these problems. Where are we today? Where do we need to go? Digital identity beyond current needs.

Tuesday, 07 March, 2023 / 02:45 PM - 03:30 PM GMT

Roundtable: Identity Management Collaboration Moderated by One Identity

Alan Radford, SOLUTIONS ARCHITECT, One Identity

Hear from your peers. Participate in this interactive session, hosted by One Identity, to learn how others have overcome identity challenges such as phishing, stolen credentials, third-party access, credential surfing or compromised privileged access. In this 45-minute session, be prepared to share your IAM successes and setbacks, and to gain insights from industry colleagues. Ultimate objective for this collaborative session is to learn you’re not alone, and to envision a path to a secure and unified approach to identity management.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 07 March, 2023 / 03:15 PM - 03:45 PM GMT

Refreshment Break

Join us for refreshments in a brief break between sessions.

Tuesday, 07 March, 2023 / 03:45 PM - 04:15 PM GMT

Insights From the Magic Quadrant and Critical Capabilities for Access Management

Michael Kelley, Sr Director Analyst, Gartner

This session will present the Magic Quadrant and Critical Capabilities for the access management market.

Tuesday, 07 March, 2023 / 03:45 PM - 04:15 PM GMT

Technical Insights: Policy-Based Authorization Architecture Patterns

Homan Farahmand, VP Analyst, Gartner

Policy-based authorization has become a focal point for developing the next generation of identity-centric access controls. However, the one-size authorization architecture doesn't fit all authorization use cases. In this session. we review key enterprise policy management requirements and runtime architecture patterns for cloud, API, applications, data & analytics, microservices and other common authorization use cases.

Tuesday, 07 March, 2023 / 03:45 PM - 04:15 PM GMT

Top Practices for Strengthening Your CIAM Strategy

Abhyuday Data, Director Analyst, Gartner

What is Customer IAM (CIAM)? What are the key considerations for an effective CIAM strategy? We will discuss recommended top practices around CIAM, how to take your CIAM strategy to the next level and how to plan for the best user experience to achieve your goals.

Tuesday, 07 March, 2023 / 03:45 PM - 04:15 PM GMT

Case Study by Vitality: Vital IT and Why. Why and How Vitality Transformed the Most Important Step in the Customer Experience, the First Step

Simon Bradley, Service Architect, Vitality

This session will describe the transformation from a fractured legacy architectural landscape to an enterprise grade CIAM, that meets the expectations of an increasingly technologically aware customer base, meets the business demands for agile and innovative solutions and ensuring that our members data is always secure and accessible.

Tuesday, 07 March, 2023 / 03:45 PM - 04:30 PM GMT

Ask the Expert: Privileged Access Management

Felix Gaehtgens, VP Analyst, Gartner

Privileged access is the prime cause of breaches, yet more people than ever require it for their work. Requirements for PAM are evolving rapidly to include hybrid-multicloud scenarios and machine identities. Bring your questions about trends and best practices to this session.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 07 March, 2023 / 03:45 PM - 04:30 PM GMT

Ask the Expert: IGA Deployments

Nat Krishnan, Sr Director Analyst, Gartner

This is an ask the expert session where you can ask any questions around IGA deployment — how to get started; common issues; how to keep the business engaged; reporting; and any other issues.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 07 March, 2023 / 04:30 PM - 05:00 PM GMT

Hype Cycle for Digital Identity

James Hoover, Principal Analyst, Gartner

This Hype Cycle for Digital Identity emphasizes the maturation of innovations that enable and deliver digital identity services.

Tuesday, 07 March, 2023 / 04:30 PM - 05:00 PM GMT

Start Using the Most Overlooked IGA Feature to Significantly Improve Security

David Collinson, Sr Director Analyst, Gartner

Whilst segregation of duty controls are key to preventing fraud, they can also be used very effectively in the security arena. This session will explore the changing scope and supporting technologies to prevent toxic combinations impacting your organization financially but perhaps more importantly also from a security perspective.

Tuesday, 07 March, 2023 / 04:30 PM - 05:00 PM GMT

Stopping Account Takeover Attacks

Akif Khan, VP Analyst, Gartner

Account takeover (ATO) attacks keep IAM leaders up at night. Attackers are not breaking and entering, they are not exploiting vulnerabilities - they are simply using stolen credentials on login pages for corporate systems, online banking and more. In this session, the focus will be on how to build a layered defense of complementary capabilities to mitigate the risks of ATO attacks.

Tuesday, 07 March, 2023 / 04:30 PM - 05:00 PM GMT

Technical Insights: Implement IAM Best Practices for Your Active Directory

Paul Rabinovich, Sr Director Analyst, Gartner

Active Directory is a critical IT asset for an overwhelming majority of organizations. This session will guide you on how to apply current IAM best practices to Active Directory. Among other things, we'll talk about hybridization and cloud, topology optimization, group management, identity governance, privileged access management, MFA, and AD threat detection and response.

Join us in 2024

Get conference email updates.
Contact Information

All fields are required.

  • Step 2 of 2