Discover IAM best practices: From IoT to risk management and beyond

Businesses demand that IAM protect assets, ensure compliance and enable great customer experience the “digital way”: agile, efficient and customer-friendly. At Gartner Identity & Access Management Summit 2018, you’ll learn how to deliver successful IAM programs that takes business wherever digital transformation leads.

 

Craft a robust cloud IAM strategy. Automate and simplify IAM processes for agility and efficiency. Meet changing customer needs with consumer IAM. Protect APIs and ramp up fraud protection. What’s the next step on your IAM journey?

Your IAM Journey: The Road to Efficiency, Agility and Customer Value

Meaningful networking

Interact with more than 1,400 of your peers to share IAM program implementation lessons learned.

How-to guidance

Pose tough questions and hear the latest research and recommendations from 20+ Gartner analysts on IAM trends and strategies.

Real-world solutions

Explore the latest technologies changing the IAM landscape, from identity as a service and identity governance and administration (IGA) to privileged access management (PAM), biometrics and multifactor authentication.

Get the latest information. 

Sign up for agenda updates, early-bird offers and more.

 

Gartner takes privacy seriously - check your inbox and click on the activation link to consent to our privacy policy. Please add @Gartner to your list of safe senders to ensure receipt of all communications.
Error occurred in submitting the form. Please try again!
 
An agenda built around your needs
 

We’re preparing the 2018 Agenda which will feature comprehensive tracks to help you tackle your most pressing issues.

 

 

 
IAM Strategy and Program Management
Get the information you need to align your IAM strategy with corporate goals, build an IAM roadmap with attainable milestones, organize project resources and measure project success.
 
 
 
 
 
Identity Administration
Learn practical Identity governance and administration to reduce operational overhead, streamline operations, minimize risk and comply with regulations. Explore next-gen identity architecture and technologies.
 
 
 
 
Trust, Authentication and Fraud Prevention
Explore continuous adaptive risk and trust models. Learn how analytics, biometrics and other advanced authentication methods help provide frictionless access, improve security and prevent fraud.
 
 
 
 
Access Management and Authorization
Security, risk, privacy and IAM must be aligned. There are process, organizational, functional and technology overlaps that should be considered so that you can maximize your investments and have a robust, multifaceted approach to IAM.
 
 
 
 
Security, Risk and Privacy
The lines of delineation between IAM and security, risk and privacy are diminishing as more identities, data sources and technologies are introduced. Explore the security and privacy trends influencing IAM.
 
 
 
 
Senior Leadership Circle
 IAM leaders face new challenges in digital business: They must understand business goals; quickly identify and assess risks; and articulate them in business terms. Learn how to become a recognized leader and problem solver.
 
 
 

Don’t miss these hot topics!

The future of IAM

Privileged access management

AI & analytics-driven IAM

Single sign-on for cloud and mobile

GDPR and privacy

Cloud IAM and IDaaS

Consumer IAM

IGA best practices 

Biometrics and multifactor authentication

Fraud protection

Blockchain

Robotic process automation, bots and automation

Find solutions for your most pressing identity and access management needs

Join us in Vegas!

Accommodations

 

Caesars Palace in Las Vegas, NV

Getting Here

 

Located on the Vegas Strip, just steps from shopping and entertainment