Identity and Access Management Conferences

Drive digital transformation for your organization

For many enterprises, the global pandemic has compressed years-long strategic change into months, even weeks. For others, it has forced them to adopt approaches that they'd previously been cautious about. Whatever the time scale and trajectory of the pandemic, IAM leaders will need to plan for a new normal for their organizations.

This disruption, along with continued digital transformation and technical change, is raising the visibility of IAM professionals and creating new challenges for IAM architecture. The economy now relies on IAM systems.

Our conferences give IAM professionals the opportunity to hear from independent experts who can help you craft your strategy for agile, intelligent and automated identity access management that the business can trust to enable rapid change and digital transformation.

Gartner Identity &Access Management Summit

14 – 16 March 2022 | Las Vegas, NV

Four Rules for a Compelling IAM Business Case

IAM leaders must provide a persuasive business case that demonstrates the alignment of the program with business needs and provides metrics to define success.

Gartner Identity & Access Management Summit

The premier gathering of today’s IAM leaders offering strategic guidance on rapidly evolving IAM strategies and technologies.
What was covered

We're currently building out the 2022 program. In the meantime, see the hot topics that we covered in 2021 to get an idea of the type of content you can expect:

  • IAM and remote work
  • Identity proofing and affirmation
  • Multifactor authentication and passwordless methods
  • Cloud IAM and identity as a service
  • Single sign-on
  • Analytics-driven IAM
  • IAM automation
  • IAM governance and organization
  • Password management
  • Privileged access management (PAM)
  • Consumer IAM
  • IAM leadership
  • Security and privacy best practices
  • Preventing account takeover
  • BYOI and decentralized identity
Who attended

Explore how we help you address your top challenges

IAM (Identity & Access Management) for C-level leaders
Enhance agility and responsiveness with your business while guiding the transition of IAM from cost centre to business enablement.

IAM leaders
Learn about the priorities of IAM leaders looking to deliver the effective IAM system the business can trust to enable rapid change and digital transformation.

Architects and technical professionals
Modernize architecture and identity infrastructure strategies to respond to digital business imperatives of agility and scalability.

In addition to focused, useful, on-point presentations, which gave me tips and insights I can implement immediately, I gained new ways to deliver visuals and points that will help me be more persuasive in my organization.

Greg Handrick

Information Security, IAM Leader, Country Financial

Gartner identity and access management conferences give IAM professionals unbiased advice to drive digital business transformation.

Our team of Gartner experts conducts thousands of interactions every year with IAM leaders like you. They use this knowledge to help you address your biggest challenges in areas such as IAM program management, digital identity theft protection, hybrid and multicloud IAM, identity management, governance and administration, security and privacy, and more. Take a deep dive into the technologies and best practices that will help you to drive digital transformation for your organization.

Get thought-leading guidance and practical tools on how to:
 
  • Gather best practices for a successful cloud migration and digital transformation
  • Understand IAM trends and emerging technologies in the bigger context of data security, risk and business
  • Learn how your IAM program can improve experiences, enhance collaboration, connect new partners to enable rapid change and innovation, advancing MFA (multifactor authentication and fraud detection), including cloud options
  • Learn to make your IAM program more agile and deliver quicker results and continuous improvements
  • Learn about next-generation IAM technologies, architecture and implementation best practices
  • Determine the right requirements for PAM, IGA and identity management solutions

 

Find content aligned to your roles below

Reinvent the Role of the IAM Leader

Create and implement IAM strategies and policies that ensure the right access to the right people. Articulate the IAM vision, and create a roadmap for successful implementation and coordination of the various processes and technologies involved.

Implement IT security technologies efficiently and effectively

Maintain IAM systems by implementing vendor updates and maintaining policy and workflow configurations. Architect IAM solutions to deliver the right capabilities aligned with the organizations security, cost and business objectives.

Lead Your IAM Programs in the Digital Transformation

Learn how to structure and communicate a vision and strategy that corresponds to organizational needs and expectations. Align IAM initiatives with the organization's security, applications, data, and digital business strategies.

Lead your IAM programs in the digital transformation

Learn how to structure and communicate a vision and strategy that corresponds to organizational needs and expectations. Align IAM initiatives with the organization's security, applications, data, and digital business strategies.

Take a look inside Gartner virtual conferences

Explore the latest trends in business and technology with the added interactive benefits of virtual. Get actionable insight, connect with peers, find inspiration and discover game-changing tech to lead your organization into the future. Gain an immersive virtual experience with the greatest minds in IT and business.

The Value of Gartner Event Sponsorship

Three key planning considerations for IAM Leaders

Many identity and access management (IAM) trends are not new, but COVID-19 has accelerated transformation in ways that are greatly impacting IAM teams and plans. The ongoing disruption also highlighted areas of weakness in organizations’ IAM architectures. The sheer number of IAM tools and options have added an additional layer of challenges for data security and risk teams. IAM leaders need to rethink their roadmaps for the future, starting with three key planning considerations.

Although IAM teams have been dealing with a continued move to cloud, an increase in devices, shifts in IT management and other changes, the pandemic accelerated these emerging concepts with a massive shift to remote work. The traditional enterprise perimeter has all but disappeared, and while secure remote access to on-site and cloud applications exists, many organizations lack all the necessary IAM controls. Remote access increases the attack surface, requiring additional access control management. When COVID-19 drove sudden changes to IAM approaches, it revealed that many IAM processes were too rigid and not agile enough to respond quickly to the new environment.

The need to digitalize experiences and interactions has increased, which means IAM teams need to focus more on external users like customers, citizens, patients, residents, students and vendors. How organizations — and therefore IAM teams — must support customers has shifted rapidly. Digital customer interactions not only must be secure and easy to use, they also must enable a broader range of contactless experiences and integrate with more “back office" IAM systems. An example might be enabling travelers to arrive at a hotel, perform digital identity validation, register and gain entrance to their room without interacting with another person. With the increase in remote work, more organizations also need to provide remote employees, gig workers and contractors — some of whom will never come into any office — a way to perform the required level of customer identity proofing.

The number of machines, whether applications, services, agents or devices interacting with organizations is increasing. Each of these interactions, regardless of their nonhuman status, must be secured and credentials must be managed and maintained. Although organizations require an enterprisewide IAM strategy for handling this challenge, existing organizational barriers and lack of the necessary skills and tools makes this virtually impossible. Development, DevOps, security, IAM and I&O teams have different needs and preferences for tools and processes. Often, IAM teams no longer make identity decisions. Instead, the decisions are increasingly made by other teams.

Not finding what you’re looking for?
Experience Gartner conferences.

Gartner provides world-class conferences across six core business areas to help you master your role, transform your business and tap into an unsurpassed peer network. Gartner conferences bring together forward-thinking leaders like you to explore emerging trends, accelerate your learning and guide near-term decisions.