Agenda / Day

View By:

Agenda / Day

Sunday, August 21, 2022 / 01:00 PM - 06:00 PM PDT

Registration & Information

Registration and information hours for the day.

Monday, August 22, 2022 / 07:30 AM - 09:30 AM PDT

Attendee Breakfast Sponsored by LastPass

Monday, August 22, 2022 / 07:30 AM - 07:30 PM PDT

Registration & Information

Registration and information hours for the day.

Monday, August 22, 2022 / 09:30 AM - 10:15 AM PDT

Gartner Opening Keynote: How to Digitally Accelerate When You’re So Freaking Tired

Mary Mesaglio, Managing Vice President, Gartner

It’s 2022 and we thought the long-awaited reopening was finally here. But then, wham. Omicron arrived on the scene. The pandemic sometimes seems like a never-ending story of dashed hopes. Yet, you don’t get to sit this one out. Businesses continue to transform, you must continue to lead your people, and the world doesn’t stop just because you’re tired. And we know you’re tired. This session covers how to continue your digital acceleration while keeping your people – and yourself – safe and whole. It’s a tightrope walk out there.

Monday, August 22, 2022 / 10:15 AM - 05:15 PM PDT

Battle of the Brains - IAM Smackdown - Take the challenge! sponsored by SATH, Inc.

Are you ready to challenge your peers, and become the next IAM Smackdown champion?
Play Battle of the Brains to win the championship belt! Taking place at the Sath IDHub booth throughout the show, all participants win a prize.
IDHub - Simply Powerful, Identity Management.

Monday, August 22, 2022 / 10:15 AM - 05:15 PM PDT

Engagement Zone sponsored by Okta, Inc.

Engagement Zone sponsored by Okta, Inc.

Monday, August 22, 2022 / 10:15 AM - 05:15 PM PDT

Engagement Zone sponsored by Transmit Security

Engagement Zone sponsored by Transmit Security

Monday, August 22, 2022 / 10:15 AM - 07:30 PM PDT

Exhibit Showcase Open Hours

Visit the Exhibit Showcase to evaluate industry offerings that can move your business forward. Engage with your peers, Gartner experts, and exhibitors. Attend a theater session to see technology in action.

Monday, August 22, 2022 / 10:30 AM - 10:50 AM PDT

Hype Cycle for Digital Identity, 2022

James Hoover, Principal Analyst, Gartner

This Hype Cycle for identity and access management (IAM) emphasizes the maturation of innovations that deliver security, risk management and business value for customer and workforce IAM.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 10:30 AM - 10:50 AM PDT

Magic Quadrant for Access Management 2021

Brian Guthrie, Director Analyst, Gartner

This session will present the Magic Quadrant and Critical Capabilities for Access Management market, 2022.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 11:00 AM - 11:30 AM PDT

The State of Access Management, 2022

Erik Wahlstrom, Sr Director Analyst, Gartner

Access Management technologies are enablers of Identity First security. What has been changing in the market, driving the need to account for new user constituencies, and new work models? How is access management technology continuing to evolve to meet these new challenges? We will talk about what is available today, and what kinds of things can you expect to take advantage of in the near future.

Monday, August 22, 2022 / 11:00 AM - 11:30 AM PDT

Top Cybersecurity Trends

Peter Firstbrook, VP Analyst, Gartner

“Top trends” highlight shifts in the security ecosystem that aren't widely recognized, but are likely to have potential for disruption. This presentation will describe the significant trends in risk management and how organizations are taking advantage of these trends. Key issues include: Top technological improvements in the security product landscape; Trends in creating a top notch security organization; and long-term trends that will influence security strategy

Monday, August 22, 2022 / 11:00 AM - 11:30 AM PDT

Connect Business Value and Identity Management

Rebecca Archambault, Sr Director Analyst, Gartner

Leaders responsible for IAM generally focus on the technical benefits of an IAM solution rather than its impact on the organization's goals and objectives. They are not accustomed to recognizing and accommodating the influence IAM has on business outcomes or associating IAM with environmental, organization or social change. These skills are critical to an initiative with IAM's scope and breadth.

Monday, August 22, 2022 / 11:00 AM - 11:30 AM PDT

Best Practices in Communicating the Business Value of Cybersecurity

Tom Scholtz, Distinguished VP Analyst, Gartner

There are multiple approaches for communicating the business value of cybersecurity and none of them offer a single "best" way. All are relevant to different contexts. This presentation will discuss the characteristics of common approaches such as RO(S)I, price-performance analysis, outcome-driven approach, etc., and provide guidance on how to select the appropriate approach based on context.

Monday, August 22, 2022 / 11:00 AM - 11:30 AM PDT

How Technology Leaders Can Unlock Innovation With Distributed Teams

Cynthia Phillips, Sr Director Analyst, Gartner

Innovation is critical to competitive advantage. Do you think innovation is best in person? Think again. Distributed team innovation provides distinct advantages over in-person collaboration. This session breaks down innovation myths and provides cyberpsychology insights with actionable advice for developing the culture, people and processes required for distributed innovation.

Monday, August 22, 2022 / 11:00 AM - 11:45 AM PDT

Ask the Expert: What is Zero Trust?

Ramon Krikken, Managing Vice President, Gartner

Zero trust is an overloaded marketing term. What is really mean by "zero trust" and as an IAM leader, why should I care?

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 11:00 AM - 11:45 AM PDT

Ask the Expert: How Diversity, Equity and Inclusion Can Give Your IAM Program the Edge

Tobi Bet, Sr Director Analyst, Gartner

Improving diversity, equity and inclusion within IAM and security teams can go beyond moral arguments, into business cases built on better protection for your organization, and better talent and motivation for your team. Bring your questions to this session, and find out how to craft a DE&I strategy that can have positive impact to your business across multiple dimensions.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 11:00 AM - 12:30 PM PDT

Workshop: How to Develop and Maintain a Dynamic IGA Role Model

Nat Krishnan, Sr Director Analyst, Gartner

This workshop will provide a detailed exploration of Gartner's Two-Layer role modeling framework and provide practical guidance to achieve efficiency and flexibility, and address role management challenges such as overentitlement, role proliferation, and violations of least privilege principle.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 11:00 AM - 12:30 PM PDT

Workshop: How Best to Build and Execute an RFP for an IGA Product

David Collinson, Sr Director Analyst, Gartner

Gautham Mudra, Sr Director Analyst, Gartner

This workshop will help you by practically taking you through the stages of preparing for an RFP for an IGA product. Attendees will leave with a practical approach to a succesful RFP.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 11:45 AM - 12:15 PM PDT

Beyond Identity: The Nexus of Identity, Security and Zero Trust

Thomas Jermoluk, CEO, Beyond Identity

Sasha Jovicic, CTO, RunBuggy Inc

Identity management will become critically important and is now a foundational linchpin in every org’s cybersecurity infrastructure. This panel will discuss drivers, the path forward, key lessons learned, and what still needs to be sorted as we move to a Zero-Trust model. They will discuss and contextualize ZT for identity pros and cover questions like:
*What does ZT mean to Identity and Cyber pros?
*How will identity/cyber tech stacks change? What are some important trends? Can you ditch legacy MFA, VPN, MDM?
*Will it save you money or cost you?
*What are the key architectural implications?

Monday, August 22, 2022 / 11:45 AM - 12:15 PM PDT

ForgeRock: Beyond the Hype: How Leading Organizations Orchestrate Seamless Identity Experiences

Damon McDougald, Global Digital Identity Lead, Accenture

In today's digital-first world, customers expect secure and hassle-free experiences. Meanwhile, organizations like yours are facing the reality of numerous technology solutions — new and old, big and small — that all need to somehow work together to meet ever-evolving business requirements. Join this session to learn how top global companies with some of the world’s largest and most complex environments are using IAM orchestration to deliver personalized experiences, better customer engagement, and stronger security at the identity perimeter.

Monday, August 22, 2022 / 11:45 AM - 12:15 PM PDT

Microsoft: Manage, Secure, and Govern Identities Across Multicloud Infrastructures

Joseph Dadzie, DIRECTOR OF PRODUCT MANAGEMENT, Microsoft

Balaji Parimi, PARTNER, GENERAL MANAGER, Microsoft

Going multicloud makes you more agile and resilient. But it also creates more complexity and blind spots for your security and identity teams. It’s time to reimagine how we manage, secure, and govern identities and enforce least privileged access consistently across cloud platforms. In this session, we’ll explore how cloud infrastructure entitlement management (CIEM) can strengthen your Zero Trust security in a multicloud world.

Monday, August 22, 2022 / 11:45 AM - 12:15 PM PDT

Okta: Empowering a Productive, Secure and Dynamic Workforce with Identity

John McLeod, CISO, National Oilwell Varco

Parash Bhaya, Sr Director Product Marketing, Okta

Every person in the organization is important - office and front-line employees, partners, vendors among others. With more people accessing more apps from virtually anywhere and using more devices, Identity is rising as the linchpin to empower a dynamic and globally distributed workforce. In this session we’ll explore three key pillars of an effective identity strategy: providing access to the right apps for the right people, zero-trust security, and driving business agility via automation and modern governance tools that are easy to implement and use.

Monday, August 22, 2022 / 11:45 AM - 12:15 PM PDT

Omada: How to Avoid Common IGA Pitfalls and Deploy Successfully

Rod Simmons, VP of Product Strategy, Omada

Deploying an Identity Governance & Administration solution has a reputation of being lengthy, expensive, and frustrating. If you have ever wondered why that is, please join Rod Simmons to discuss how to avoid common pitfalls of overly customizing IGA in the deployment stage, and instead setting the stage for future successes. Topics discussed will include:

• Examples of common problems that delay deployments
• How to avoid customization and still deploy a modern, scalable and agile IGA solution to fit the needs of your organization
• A roadmap for how to deploy within 12 weeks

Monday, August 22, 2022 / 11:45 AM - 12:15 PM PDT

SailPoint: Moving Identity to the Cloud? Accenture Shares Why Speed & Intent Matter

Simon Gooch, DIRECTOR OF CYBER SECURITY & GLOBAL DIGI, Accenture

Mike Kiser, STRATEGY AND STANDARDS, SailPoint Technologies

The pace at which the Cyber Threat Landscape is evolving means that opportunities and mitigations presented by Security in the cloud, specifically Identity as a Service (IDaaS), are required now. The time it takes your business to migrate is critical. Moving your identity security to the cloud, and moving fast, enables a level of agility, value, and security that your organization cannot afford to miss out on and will play an important part in your broader IT and Business transformation strategy. Join this session to learn why SailPoint and Accenture are going through this journey together.

Monday, August 22, 2022 / 11:45 AM - 12:30 PM PDT

ETSS: Strategic Design, moderated by Cisco Secure

Wolfgang Goerlich, Advisory CISO, Cisco

Security has a design problem. Our security programs are unusable, causing people to opt-out. Our security tools are unmanageable, leading to staffing shortages and shelfware. The result is not defensible. This session details a framework combining path finding and choice architecture. The industry needs to get people to follow secure practices, to opt in, to transform security. The solution is design.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 12:30 PM - 01:00 PM PDT

Address the Top Maturity Gaps in IAM Programs with Insights from Gartner's ITscore

James Hoover, Principal Analyst, Gartner

Security and Risk leaders struggle to achieve the desired level of maturity across certain key activities that are critical to a healthy IAM function. Failure to address these "top gaps" devalues IAM programs, and increases risk to the enterprise. This session will outline the top gaps IAM programs are experiencing, and provide guidance on how to improve maturity in these critical areas.

Monday, August 22, 2022 / 12:30 PM - 01:00 PM PDT

State of User Authentication, 2022

Ant Allan, VP Analyst, Gartner

User authentication is at the heart of account protection for both consumer and workforce use cases, but cutting through the noise about passwordless authentication, hardware tokens and biometric authentication can be difficult. This session separates hype from the reality, theoretical from possible, and provides context of how to think about and invest in new user authentication technologies.

Monday, August 22, 2022 / 12:30 PM - 01:00 PM PDT

Do Privileged Access Management Right: How to Build an Effective and Mature PAM Program

Felix Gaehtgens, VP Analyst, Gartner

Many organizations struggle with PAM after some small initial success, can't manage to get further. This session sheds light on: Why is PAM such a crucial piece of any security program? What are the common pitfalls? What should you do in the near, medium and long term?

Monday, August 22, 2022 / 12:30 PM - 01:00 PM PDT

How to Mature Your Microsoft 365 Identity Management

Paul Rabinovich, Sr Director Analyst, Gartner

Implementing hybrid identity for Microsoft 365 and protecting employee, administrator and partner access can be daunting. This session will guide you through best practices for Microsoft 365 IAM.

Monday, August 22, 2022 / 12:30 PM - 01:00 PM PDT

Outlook for Cloud Security

Patrick Hevesi, VP Analyst, Gartner

Information security is frequently cited as a top obstacle to the adoption of cloud computing, yet improved security is cited as a top driver for adoption of cloud computing. This session will explore the current and future state of cloud security spanning infrastructure, platform and software as a service offerings, including hybrid cloud security and emerging distributed cloud and edge computing security issues.

Monday, August 22, 2022 / 12:45 PM - 02:30 PM PDT

Attendee Lunch Sponsored by LastPass

Monday, August 22, 2022 / 01:00 PM - 02:30 PM PDT

Exhibit Showcase Dessert Reception

Join us for a dessert reception on the Exhibit Showcase where you can engage with peers, Gartner experts, and exhibitors while enjoying delicious treats. Evaluate industry offerings that can move your business forward. Attend a theater session to see technology in action.

Monday, August 22, 2022 / 01:15 PM - 01:35 PM PDT

Microsoft: Beyond the Firewall: Upgrading from On-Premises to the Microsoft Cloud Identity

Brjann Brekkan, Identity and Security Architect, Microsoft

In the past few years as businesses evolved the ways in which they work, enterprise IT organizations were compelled to accelerate their identity modernization to adapt to a new normal of “work from anywhere”, “on any device”. This exposed the challenges of using on-premises authentication technologies and platforms as the control plane for enterprise applications and collaboration. Come join the Microsoft Identity product group for an interactive session where we will discuss the latest trends and platform capabilities to accelerate and simplify this journey.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 01:15 PM - 01:35 PM PDT

Venafi: Rise of Machines Meets Digital Transformation

Kevin Bocek, VP Strategy, Venafi

The number of machines of all types is on the rise. Every machine requires an identity. Compromise, misuse, and fraud of machine identities are prime attack vectors. Errors create debilitating outages and result in millions of dollars in lost revenue. That’s why leading analysts are recommending Machine Identity Management as a top security trend. During this session, we will discuss the impact that this is having on an organization’s ability to move faster in their quest for Digital Transformation and the steps that should be taken to strengthen the enterprise security strategy and posture.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 01:40 PM - 02:00 PM PDT

Yubico: Establishing Trusted Identities Within Your Zero Trust Strategy

Greg Reynolds, SR. SOLUTIONS ENGINEER, Yubico

Passwords no longer ensure secure login. SMS and mobile authentication are phishable. Strong authentication of any person or thing is critical, and validating that the devices used for authentication are secure is critical to enabling Zero Trust. Mobile phone numbers are not uniquely tied to the user, and can easily be usurped by malicious actors. Attend this session to learn why not all MFA is created equal, and why strong authentication and phishing-resistant MFA should be an integral part of establishing trusted identities in support of your Zero Trust strategy.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 01:40 PM - 02:00 PM PDT

Delinea: Privileged Access Security at a Large Retail/Food Supply Client

Naren Jangid, FOUNDER & CEO, RAAH Technologies Inc

Chris Witeck, Vice President of Product Management, Delinea

Privileged accounts abound in every organization, many of them unmanaged, uncontrolled, or even unknown. Learn how a large retail/food supply customer in the US was able to secure privileged access and protect against ransomware and other threats with a well-executed PAM security strategy. Get ready for an interactive discussion with Delinea and RAAH Technologies aimed at addressing the primary security challenges that organizations are facing today and how privileged access can play a critical role.

Monday, August 22, 2022 / 02:05 PM - 02:25 PM PDT

Onfido: Think Like a Fraudster - Decoding New Behaviors

Identity fraud rates have increased 44% since 2019 — and aren't slowing down.

But a better understanding of fraudster behaviors can help you to protect your business.

In this 20 minute session, we’ll be sharing proprietary data insights to examine how fraudulent behavior is changing.

Join to learn:

- How attack patterns have changed
- Which industries are being most heavily targeted
- Which global identity documents are most frequently targeted by fraud

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 02:05 PM - 02:25 PM PDT

PlainID: Authorization Today - Relevance in a Digital Age

Gal Helemski, CO-FOUNDER AND CTO/CPO, PlainID

Tom Ammirati, CRO, PlainID

Damon McDougald, Global Digital Identity Lead, Accenture

Moderated panel given by PlainID's CRO, Tom Ammirati, with panelists Gal Helemski, Co-Founder, PlainID & Damon MacDougald, Global Digital Identity Lead, Accenture. The panel discussion will cover the relevance of Next Generation Authorization including:

• The Impact of Policy Based Access Control (PBAC)
• Identity Aware Security - How Authorization drives security resiliency & addresses ZTA
• Market Trends - Externalization of Authorization (Homegrown vs COTS) & value of the "Authorizers" (i.e.: advanced access control at the edge)

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 02:30 PM - 03:00 PM PDT

Cybersecurity Mesh Architecture 101

Felix Gaehtgens, VP Analyst, Gartner

With many IT assets now outside traditional enterprise perimeters, IT leaders must rethink security. Enter the cybersecurity mesh architecture, a composable and scalable approach to extend security controls to distributed assets by decoupling policy enforcement from the assets being protected.

Monday, August 22, 2022 / 02:30 PM - 03:00 PM PDT

How to Choose an Access Management Solution: Using the MQ and Beyond

Henrique Teixeira, Sr Director Analyst, Gartner

Access management solutions are mature, rich with features and offer a broadened scope that overlaps with many adjacent areas. Learn how to better use the AM MQ and a five-step approach to select a long-lasting, cost-efficient AM solution.

Monday, August 22, 2022 / 02:30 PM - 03:00 PM PDT

Security Organization Dynamics

Tom Scholtz, Distinguished VP Analyst, Gartner

There is no such thing as a perfect model for security organizations. Every enterprise must develop its own model, taking into consideration basic principles, practical realities and the challenges of digital transformation. This session will address the following:
. What are the trends and challenges in security organization design?
. What are the factors that influence security organization?
. What are the current best practices and conceptual design models for security organization?

Monday, August 22, 2022 / 02:30 PM - 03:00 PM PDT

Case Study: Cloud Privileges – Grappling with a Different Beast

Tarun Khandelwal, Information Security Program Executive, EQ Bank


In this session, will discuss how we grappled with, and continue to do so, with privilege exposures in a cloud environment. We’ll discuss the building blocks for our target state architecture for Identity, and how cloud entitlement management fits into that big picture. This session will also discuss lessons learned.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 02:30 PM - 03:00 PM PDT

Case Study: IGA Practitioners Journey in Blue Rigde and Great Smoky Mountains – WCU way

Vlad Shapiro, Founder, Costidity

Stan Hammer, Chief Technologist and Assistant CIO, Western Carolina University

In this session, we will take you on a journey of Identity Governance from 2014 to now. From past of decentralized, chaotic, technology-centric spiderweb of applications with no identity store, no visibilities of access and use, hidden institutional knowledge, to modern days of centralized identity governance platform, business and people-centric approach to IAM, policies and processes build on practical needs, 360 degrees views, better user experience and leadership recognition.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 02:30 PM - 03:15 PM PDT

Ask the Expert: How to build your Cloud Security Strategy and Architecture

Patrick Hevesi, VP Analyst, Gartner

Come ask the expert any question on the acronym soup in Cloud Security - CASB, SSE, CSPM, CWPP, CNAPP, SASE, CSMA, CIEM and IAM. How the different products work, any questions on where to start and how to build your cloud security architecture.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 02:30 PM - 03:15 PM PDT

Ask the Expert: Which Modern Identity Protocols Should I Use? OAuth 2.0, OIDC, OPA, JWT or SCIM?

Erik Wahlstrom, Sr Director Analyst, Gartner

Application modernization and zero-trust strategies demand modern identity protocols. But what modern identity protocol should I use for my use-case? Bring your own questions to this session about the usage and deployment about modern identity protocols such as OAuth 2.0, OpenID Connect, OPA, JWT or SCIM?

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 02:30 PM - 03:15 PM PDT

Ask the Expert: How do I Automate all these Identity Governance and Administration tasks?

Gautham Mudra, Sr Director Analyst, Gartner

IGA is often used as a tool to automate various manual processes - up to and including the use of robots and AI. This session will give you an opportunity to ask questions around automation and IGA;

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 03:15 PM - 03:45 PM PDT

Cisco Secure: Enhanced Identity Governance: Real World Problems, Real World Lessons

Wolfgang Goerlich, Advisory CISO, Cisco

The digital-first customer experience and remote-first workforce has pushed enhanced identity governance and zero trust from buzzword to reality. And yet, much of the conversation is still heavy on theory and light on practice. In 2021, Cisco completed a study of high-level practices which contribute to successful cybersecurity programs based on a rigorous survey of 5,000 practitioners. Within the study, we analyzed commonalities of organizations implementing and running Zero Trust. This session will share how EIG is working in the real world, and what the best programs have in common.

Monday, August 22, 2022 / 03:15 PM - 03:45 PM PDT

Radiant Logic: Delighting Customers Amidst a Major Migration

Karen Leavitt, IT Director, Unum Group

With 9 million users, customer delight is at the top of insurance company Unum’s list of priorities. From a customer experience perspective, that means high-availability for customer authentication and just-in-time provisioning at-speed. When it came time to migrate from legacy platforms, they needed to figure out a way to move customers with no hassle, and a performance boost. This presentation will discuss why their migration strategy hinges on a modern identity data platform to create a secure but frictionless experience for their customers.

Monday, August 22, 2022 / 03:15 PM - 03:45 PM PDT

Transmit Security: Rolling Out Passwordless to 200 Million Banking Clients in 160 Countries

Craig Currim, VP Customer Solutions & Field Engineerin, Transmit Security

Matthew Nunn, DIRECTOR - GLOBAL HEAD OF IAM ENGINEERIN, Citi

Matthew Nunn, Citi’s Director, Secure Authentication Architecture & Technology Engineering, will discuss the move to passwordless. He'll explore security, scale, resilience, architecture, and the use of FIDO for authentication and migrating away from OTPs and similar systems. He’ll share the economics of their decision and how they are solving for account recovery, user binding, FIDO portability across channels, and anti-fraud use cases.

Moderated by Transmit Security’s Field CTO, Craig Currium, this session is a must-attend for those responsible for a modern digital experience.

Monday, August 22, 2022 / 03:15 PM - 03:45 PM PDT

CyberArk: How Digital Identities Drive Cybersecurity Debt

Barak Feldman, Manager, SVP, PAM and Identity Security

The rapid pace of digital transformation investments has led to a rise in cybersecurity debt, increasing the threat of attack. According to the 2022 CyberArk Identity Security Threat Landscape Report, 79% say security has taken a backseat in favor of accelerating digital initiatives. Learn about the impact of increasing digital identities on cybersecurity debt, and what building blocks can be put in place to strengthen defenses.

Monday, August 22, 2022 / 03:15 PM - 03:45 PM PDT

Saviynt: Stories of Cloud Identity Transformation from Brown-Forman,Wawa & Phillips 66

Jaime Lewis-Gross, VP, Solutions Engineering, Saviynt

Steven Edford, IAM ENGINEER, Phillips 66

Todd Werner, Manager, Brown-Forman

Jeremy Giacchi, SYSTEMS ARCHITECT, WAWA

The path to Cloud Identity Transformation is challenging with the modern cyber risk landscape changing every day. New vulnerabilities arise that security & identity professionals must fight against to keep their organizations safe. From managing remote workforces to protecting global supply chains, corporations must think differently and adopt an identity-based security perimeter to stay prepared. Hear from IAM experts at Brown-Forman, Wawa, and Phillips 66 as they explore how the right Identity strategy can go beyond solving compliance & operational efficiencies to securing your business.

Monday, August 22, 2022 / 03:15 PM - 03:45 PM PDT

IBM: Simplifying Secure Identity & Access for 27 Million Users, Practically Overnight

Imagine having to provide identity and access for over half a million employees, with a highly customized, single tenant, on-premises platform. And at the same time, having to provide similar services for over 26 million global customers with a separate, antiquated first-generation IDaaS solution. Transforming these authentication services would require significant infrastructure modernization and consolidation…and a lot of self-examination. Join us to learn how even the largest organizations can centralize and modernize internal and external identity and access and thrive in the process.

Monday, August 22, 2022 / 03:15 PM - 04:00 PM PDT

ETSS: The Path to Zero Trust: From Ambition to Reality, moderated by BeyondTrust

Morey Haber, CSO, BeyondTrust

Remote working is now commonplace.In this increasingly perimeter-less world, organizations must embrace zero trust security principles, such as least privilege, continuous authentication and monitoring, segmentation, and identity management to stay secure all while moving digital transformation initiatives forward.Join this session with Morey J. Haber, CSO at BeyondTrust who will clarify and break down:
•The Reality of Zero Trust?
•Zero Trust vs. Zero Trust Architecture–Are They Different?
•The Path to Zero Trust You Should Consider
•8 Ways Privileged Access Management (PAM) Enables Zero Trust

Monday, August 22, 2022 / 04:00 PM - 04:30 PM PDT

Best Practices for Improving Access Management

David Chase, Sr Director Analyst, Gartner

Access management is a key part of identity first security. Organizations need to optimize AM activities in the context of broader identity, security and business goals, for example as part of an identity first security, zero-trust or cloud first initiatives.

Monday, August 22, 2022 / 04:00 PM - 04:30 PM PDT

How to Make a Great Decision, Every Time

Mary Mesaglio, Managing Vice President, Gartner

CIOs make critical decisions every day — decisions that impact the viability and success of the organization, and the quality of life of the people who work there. Make those decisions count by understanding how to frame and evaluate your options using proven frameworks for every type of decision.

Monday, August 22, 2022 / 04:00 PM - 04:30 PM PDT

Practical Applications of Decentralized Identity and Verifiable Claims

Homan Farahmand, VP Analyst, Gartner

Decentralized identity and verifiable claims will disrupt IAM by enabling a shared trust model, protocol-based controls, and decentralized identity data exchange. In this session we discuss how organizations can leverage these technologies to drive efficiency in identity verification and data exchange for business processes in digital ecosystems.

Monday, August 22, 2022 / 04:00 PM - 04:30 PM PDT

Case Study: Driving to Zero Trust with Hybrid Modern Identity Services

Andrew Cameron, IT Fellow, Identity & Access Management, General Motors

For GM to blaze a trail to its "All Electric Future", an IT foundation that supported a secure path to all their digital services was required. This session will highlight how General Motors developed a cybersecurity strategy that focused on identity services as the core element of the approach. Insight will be presented that details how each element of a zero-trust strategy can be realized thru a set of identity services that enable a secure digital enterprise. Additionally in the journey is a transformation from a “private to hybrid” cloud infrastructure model for IT resources and how Zero Trust principals play such a critical role. Of course, some bumps and bruises will be absorbed along the "Drive to ZTA" and best practices and guidance will be covered. Finally, leveraging the NIST Cybersecurity Framework will be covered as well.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 04:00 PM - 04:45 PM PDT

Ask the Expert: Effective Identity Management for Microsoft 365

Paul Rabinovich, Sr Director Analyst, Gartner

Whether you are just starting on a Microsoft 365 deployment or have had one for some time, threats against your users continue to evolve. IAM controls in Microsoft 365 must adapt accordingly.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 04:00 PM - 04:45 PM PDT

Ask the Expert: What are the Best Practices for Privileged Access Management?

Felix Gaehtgens, VP Analyst, Gartner

Privileged access is the prime cause of breaches, yet more people than ever require it for their work. Requirements for PAM are evolving quickly to include hybrid multicloud scenarios and machine identities. Bring your questions about trends, best practices to this session.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 04:00 PM - 04:45 PM PDT

Ask the Expert: Everything You Always Wanted to Know About CIEM, that You Can't Find on Google

Henrique Teixeira, Sr Director Analyst, Gartner

CIEM is a breakaway theme in IAM, leveraging identity analytics and AI to help mitigate cloud identity risks. As the number of vendors proliferate, and not a lot of success stories exist yet, it becomes hard to differentiate fact from fiction. Bring your own questions about CIEM, cloud identity, AI and analytics in IAM.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 04:45 PM - 05:05 PM PDT

Axiomatics: Orchestrated Authorization - The Future of Access Control

Matt Luckett, VP CUSTOMER RELATIONS, Axiomatics

Identity and security leaders recognize authorization delivered in siloes is running rampant throughout their organization. The only way to defeat these isolated instances is to offer a more secure, scalable and easy-to-use alternative – orchestrated authorization (OA).

In this session, you will learn:
- How OA provides developers the tools to quickly build authorization policies and meet the demands of the cybersecurity mesh architecture (CSMA); and
- Provides the business an easy-to-use experience for developing the demanding, complex policies required at the application layer.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 04:45 PM - 05:05 PM PDT

ForgeRock: It’s Time to Rethink Governance: Put AI and Big Data to Work to Protect Your Business

Chip Hughes, VP Product Management, ForgeRock

Identity governance is as critical to businesses as ever. Digital transformation, SaaS adoption, and the need to support the remote workforce have reinforced the need for organizations to continually review users’ access and enforce least privilege. But challenges around scale, user experience, and administrative complexity often lead to distressed and/or unsuccessful IGA implementations. Join this session to get a fresh perspective on how to leverage AI, big data, and cloud to overcome these challenges and see a preview of ForgeRock’s next generation of cloud-delivered identity governance.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 05:15 PM - 06:00 PM PDT

Guest Keynote: How to Create a Culture of Listening

Heather Younger, CEO of Employee Fanatix, Employee Fanatix

A culture of listening and employee feedback is crucial for organizational success as we prepare for the future of work. For the last 12 years, Heather has reviewed over 25,000 employee engagement surveys. This keynote distills that knowledge into actionable insights that have been proven to lead to better employee engagement, better customer satisfaction, higher revenue, lower turnover, and brand loyalty.
This keynote will demonstrate:
• How to practice active listening with those who look to them for guidance
• A listening process that will unlock valuable insights and deliver desired outcomes
• Characteristics needed to reach goals and create win-win scenarios at work

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 06:00 PM - 07:30 PM PDT

Exhibit Showcase Networking Reception

Join us for a networking reception on the Exhibit Showcase where you can engage with your peers, Gartner experts, and exhibitors while enjoying delicious food and beverages. Evaluate industry offerings that can move your business forward. Attend a theater session to see technology in action.

Monday, August 22, 2022 / 06:15 PM - 06:35 PM PDT

Silverfort: Extending MFA to Legacy Systems and Service Accounts

Hed Kovetz, CEO & Co-Founder, Silverfort

MFA and other identity security controls are very effective in stopping cyber attacks, and are widely used on modern apps, but until now they couldn’t be applied to legacy apps, service accounts (non-human identities), command-line interfaces, OT systems and many other critical resources. These ‘blind spots’ are targeted in almost all data breaches and ransomware attacks, and often prevent compliance with regulations and cyber insurance requirements. Join this session to learn how your existing MFA and modern identity solutions can be extended to all these legacy assets using a new technology.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 06:15 PM - 06:35 PM PDT

Keyfactor: PKI, Crypto, and Machine Identities: Keys to IAM Strategy

Christopher Hickman, Chief Security Officer, Keyfactor

IAM practices have traditionally focused on users (aka humans). The problem with that is your digital workforce is part human, part machine. The seismic shift to dynamic workloads, AI-driven technologies, and mobile, and IoT devices has driven rapid growth in the use of PKI and machine identities, such as TLS certificates, SSH keys, digital signatures, and other secrets.

Join Chris Hickman, CSO, as he discusses the challenges of managing machine identities, as well as strategies and tactics to overcome security risks.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 06:40 PM - 07:00 PM PDT

Fischer Identity: Identity is Where Zero Trust Begins

Dan Dagnall, CEO, Fischer Identity

A Zero Trust security model can be used to help organizations achieve their digital transformation goals. Network solutions can assist in guarding and segmenting, but to truly achieve the Zero Trust model, you must rely more on identity focused controls. Because this model states "never trust, always verify," getting to the granular level is critical for managing identities for users, contractors, partners, and other enterprise resources. Learn how to improve not only the user experience but also security practices, with identity playing a key role in enforcing trust beyond the network.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 06:40 PM - 07:00 PM PDT

Varonis: Attack Surface Vs Blast Radius

David Gibson, CMO, VARONIS

We’re expected to work from anywhere from any device and there are more data and applications on-premises and in the cloud built for collaboration, connected through a myriad of APIs, and with unique configuration stacks that the attack surface will only grow. Organizations must manage the tension between security and productivity. With an “assume breach” mentality, organizations must turn to the concept of measuring and reducing the “blast radius” by ensuring zero trust and useful monitoring of not just the networks, but to the target of cyberattacks: data.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 07:05 PM - 07:25 PM PDT

BeyondID: The Journey to Ominchannel UX While Adopting Identity Centric Zero Trust

Neeraj Methi, VP, Solutions, BeyondID

A seamless omnichannel user experience has been a focal point for companies engaging in new digital initiatives. Identity Mgmt. is a consequential technology that sits at the front door of every user (people or machine) interaction, an opportunity to balance convenience, privacy, and security all in one. While this has been historically challenging, with businesses often forced to prioritize one over the other, the evolving role of UX in Zero Trust security across multiple industries demonstrates that seamless user experience does not need to be a tradeoff for strong security, and vice versa

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 07:05 PM - 07:25 PM PDT

Cyolo: There’s Got to be a Better Way to Manage Access to all these Assets, right?!

Almog Apirion, CEO, Cyolo

The explosion of remote work is revolutionizing how businesses connect users and their work environments, but not without challenges. With people becoming the new perimeter, it makes sense that identity is the new key. But can you adopt this new modern authentication with your existing infrastructure?

Grab a drink and join Almog Apirion, CISO turned CEO as he shares how to retrofit your current infrastructure to utilize smart, identity-based keys that quickly and securely connect users.

You no longer have to compromise security or usability. You can have it all!

Tuesday, August 23, 2022 / 07:00 AM - 09:00 AM PDT

Attendee Breakfast Sponsored by LastPass

Tuesday, August 23, 2022 / 07:00 AM - 07:00 PM PDT

Registration & Information

Registration and information hours for the day.

Tuesday, August 23, 2022 / 09:00 AM - 09:45 AM PDT

Guest Keynote: Storytelling and Big Data

Matthew Luhn, Story Consultant, Animator & Creative Writing Instructor,

Big data is changing everything from content development to culture itself. Matthew Luhn, a 20 year Pixar story veteran will share how big data is being used to create great stories and characters in films like Toy Story 3, Inside Out and beyond. Matthew’s experience and insight will empower and inspire publishers, advertisers and innovators on how to forge stronger, more meaningful connections with consumers.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 09:45 AM - 05:45 PM PDT

Battle of the Brains - IAM Smackdown - Take the challenge! sponsored by SATH, Inc.

Are you ready to challenge your peers, and become the next IAM Smackdown champion?
Play Battle of the Brains to win the championship belt! Taking place at the Sath IDHub booth throughout the show, all participants win a prize.
IDHub - Simply Powerful, Identity Management.

Tuesday, August 23, 2022 / 09:45 AM - 05:45 PM PDT

Engagement Zone sponsored by Okta, Inc.

Engagement Zone sponsored by Okta, Inc.

Tuesday, August 23, 2022 / 09:45 AM - 05:45 PM PDT

Engagement Zone sponsored by Transmit Security

Engagement Zone sponsored by Transmit Security

Tuesday, August 23, 2022 / 09:45 AM - 07:15 PM PDT

Exhibit Showcase Open Hours

Visit the Exhibit Showcase to evaluate industry offerings that can move your business forward. Engage with your peers, Gartner experts, and exhibitors. Attend a theater session to see technology in action.

Tuesday, August 23, 2022 / 10:00 AM - 10:20 AM PDT

Magic Quadrant for Access Management 2021 (Repeat)

James Hoover, Principal Analyst, Gartner

This session will present the Magic Quadrant and Critical Capabilities for Access Management market, 2022.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 10:00 AM - 10:20 AM PDT

Market Guide for Identity Governance and Administration

Rebecca Archambault, Sr Director Analyst, Gartner

Identity and Access Management leaders should use this Market Guide to aid in making decisions about identity governance and administration products.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 10:30 AM - 11:00 AM PDT

Guidance for Privileged Access Management

Homan Farahmand, VP Analyst, Gartner

PAM is a complex cyber defense discipline that requires careful technical planning for coverage areas. In this session we discuss the basic and emerging controls architecture to drive a zero standing privilege model for multi-cloud and hybrid environments. This includes PAM best practices and what works practically, considering organizational challenges and tools limitations.

Tuesday, August 23, 2022 / 10:30 AM - 11:00 AM PDT

The State of Artificial Intelligence in Security and Risk Management

Felix Gaehtgens, VP Analyst, Gartner

This session covers why everyone speaks about how artificial intelligence might solve security and risk management challenges, but struggle when asked to provide a concrete example. It will show examples of what we call AI today.

Tuesday, August 23, 2022 / 10:30 AM - 11:00 AM PDT

What’s Next in Cloud Identity Risks? CIEM and Beyond

Henrique Teixeira, Sr Director Analyst, Gartner

Entitlement management used to be a manageable problem. However, with the explosion of many thousands of permissions per identity in cloud infrastructures, legacy IAM approaches are no longer sufficient. Join this session to learn what cloud infrastructure entitlement management means, and how can it help to mitigate identity risks in the cloud.

Tuesday, August 23, 2022 / 10:30 AM - 11:00 AM PDT

Gain a Critical Advantage Over Cybercrimes Through Diversity, Equity and Inclusion

Tobi Bet, Sr Director Analyst, Gartner

Workplace and supplier diversity is at the forefront of organizations’ minds. Beyond the ethical and moral benefits, DEI can protect against an increasingly broad range of cyber attacks. We will discuss the business case for DEI, how to develop a one-page DEI strategy and how to grow your employee and supplier diverse base.

Tuesday, August 23, 2022 / 10:30 AM - 11:00 AM PDT

Ransomware Is Changing — Are You Ready?

Paul Furtado, VP Analyst, Gartner

Ransomware attacks have been morphing. Techniques used by the bad actors are changing. During this presentation, we will provide insight into the new tactics being used by the bad actors not only to access your environment, but what they are doing with your data once exfiltrated. Finally, we will also provide current data on the financial impact of a ransomware attack.

Tuesday, August 23, 2022 / 10:30 AM - 11:15 AM PDT

Ask the Expert: Consent and preference management in a diverse privacy environment

Bernard Woo, Sr Director Analyst, Gartner

Privacy regulations are increasing including either data residency or data localization requirements. This session is an opportunity for you ask questions about managing customer consent and preferences in such a rapidly evolving environment.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 10:30 AM - 12:00 PM PDT

Workshop: Selecting the Right Employee SSO Solution for Your Evolving Organization

David Chase, Sr Director Analyst, Gartner

Modern architectures and applications place additional demands on access management tools. This workshop will introduce access management evaluation criteria guidelines and discuss what features you should look for and what vendors to consider for your next employee access management solution.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 11:15 AM - 11:45 AM PDT

BeyondTrust: Leading with Data to Standardize PAM & Endpoint Security

Morey Haber, CSO, BeyondTrust

Spencer Levels, Endpoint Security Systems Administrator, L3Harris Technologies

Spencer Levels knows a thing or two about data. It’s proven to be his source of truth for standardizing products, securing operations, socializing users and measuring success to make strategic decisions, and ultimately be successful. With a major merger came the need to rationalize security tools and lock down endpoints. In a three-phase project, Spencer leans on his history in analytics and data-focused operations at NASA. Learn how you too can pioneer a data-first PAM strategy, lead a cultural mindset shift, avoid roadblocks along the way and work smarter with the data available to you.

Tuesday, August 23, 2022 / 11:15 AM - 11:45 AM PDT

Broadcom: Designing the New Identity Fabric

Vadim Lander, Symantec Identity Security Chief Architect and CTO, CA

Modern applications and environments are driving a new Identity Fabric. Are you ready to build yours? Join Vadim Lander, Chief Architect and CTO at Broadcom Software, as he discusses the design considerations to evolving your Identity and Access Management solution to build a Zero Trust foundation and bridge the identity gap across your hybrid environment.

Tuesday, August 23, 2022 / 11:15 AM - 11:45 AM PDT

IBM: Taking the Decentralized Identity Journey…GPS Recalculating!

Getting IAM right is hard enough. Now there’s talk of decentralized identity, digital wallets, and issuers. Still, some of us shudder just at the thought of moving IAM to the cloud. Transformation can be intimidating, but it doesn’t have to be. Whether for consumers, citizens, classrooms, or workforce, there are safe, reasonably simple ways to modernize, even with legacy apps, to establish consistent SSO, manage granular access policies, survive an MFA rollout, and even add risk scoring. In this session, hear from those who’ve been there, done that…you’ve arrived at your destination.

Tuesday, August 23, 2022 / 11:15 AM - 11:45 AM PDT

Microsoft: ITDR – Essential Defenses for a New Generation of Attacks

Modern attacks seek to compromise on-premises identity infrastructure itself to gain unrestricted access to multi-cloud environments and workloads wherever they are deployed. It’s no longer enough to keep accounts from getting hacked – we must ensure robust protections for the account infrastructure. Join us to learn how Microsoft envisions the future of identity threat detection and response and what effective and efficient identity/security collaboration should look like for your organization to grow fearlessly!

Tuesday, August 23, 2022 / 11:15 AM - 11:45 AM PDT

One Identity: Why Traditional IAM Solutions are Insufficient in the Current Threat Landscape

Larry Chinski, VP, GLOBAL CUSTOMER ADVOCACY, One Identity

There has been a shift in the credential-based cyber security market causing organizations to rethink their security posture. Traditional IAM tools, deployed in a fragmented, tactical fashion are no longer able to effectively protect against cyber attacks, specifically ransomware. Understanding this shift, past responses, and the best path for future-proofing your IAM platform is critical for mitigating risk and building a flexible yet controlled identity-based ecosystem. We will discuss this approach and create a roadmap for success based on the current threat surface and the future of IAM.

Tuesday, August 23, 2022 / 11:15 AM - 11:45 AM PDT

Tuebora: A New Approach to Onboarding IT Systems for IGA

Brian Iverson, Chief Product Officer, Tuebora

IGA has a well-deserved reputation for being big, slow and expensive. Much of the pain of IGA deployment and operation is related to the onboarding of IT systems to bring them under management. What if it didn't have to be this way? Cloud-native IGA offers the opportunity reinvent the way IT systems are onboarded. This session will demonstrate the ways that Tuebora is helping organizations accelerate the onboarding of IT systems so organizations can more effectively manage their access risk.

Tuesday, August 23, 2022 / 11:15 AM - 12:00 PM PDT

ETSS: Identify, Convert, and Retain Customer at Scale by Balancing CX and Security, moderated by SAP

Ratul Shah, HEAD OF PRODUCT MARKETING SAP CUSTOMER D, SAP

Christopher Ohara, HEAD OF GLOBAL MARKETING & SOLUTIONS, CU, SAP

How do you 10x your commerce revenue? The Answer: A Customer Identity and Access Management solution that removes friction, enhances security, addresses data privacy, and forms the foundation of your holistic customer data strategy. Join this discussion to learn how identity and consent are changing how organizations approach customer-centricity.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 12:00 PM - 12:30 PM PDT

Machine Identities, Secrets, Keys and Certificates — The Team, the Process and the Tools

Erik Wahlstrom, Sr Director Analyst, Gartner

In this session we will look at a best-of-breed verses all-in-one tooling discussions of the expanding portfolio of tools that manage our machine identities, secrets, keys and certificates.

Tuesday, August 23, 2022 / 12:00 PM - 12:30 PM PDT

Your Next MFA Solution Will Be Cloud-Based. How Do You Pick the Best One?

Paul Rabinovich, Sr Director Analyst, Gartner

Everyone agrees that MFA is a must when it comes to protection against account takeover attacks, but MFA requirements evolve. In this session we will discuss results of Gartner's most recent solution comparison of capabilities of six leading cloud-based MFA vendors.

Tuesday, August 23, 2022 / 12:00 PM - 12:30 PM PDT

How to Choose and Deploy an Identity Governance and Administration (IGA) Solution

David Collinson, Sr Director Analyst, Gartner

This session will help provide IAM leaders with best practice advice to both select and then deploy an IGA tool. Starting with what an IGA tool comprises of, and working methodically through the stages of the buying journey it will help IAM leaders select the right product for their organization. The second part of the presentation will then focus on how to succesfully deploy it.

Tuesday, August 23, 2022 / 12:00 PM - 12:30 PM PDT

Preventing ATO Fraud

Bernard Woo, Sr Director Analyst, Gartner

In this presentation, Gartner will address the prevalent new fraud threat that is keeping end user leaders awake at night. In this presentation we will explore an overview of ATO fraud, what the impact is to financial institutions and end users, and what action plan can be initiated to address this new issue

Tuesday, August 23, 2022 / 12:00 PM - 12:30 PM PDT

Case Study: Balancing Agility, Security, and User Experience for DevOp Teams in Multi-cloud Environments

Sriram Santhanam, Sr. Director, Information Security, Gap Inc.


Cloud platforms help organizations deliver applications and value to their customers faster than ever before. However, fast-moving agile DevOps teams often run ahead of security and, with powerful access they normally possess in multiple cloud environments, present a major risk to the enterprise. Is this session, we look at ways to balance agility, security, and developer experience to realize benefits provided by cloud while maintaining effective privileged access controls. Addressing real world insights, lessons learned, and best practices that can help plan and execute successful cloud transition for your development organization while minimizing risks.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 12:00 PM - 12:45 PM PDT

Ask the Expert: Is your CIAM strategy effective in the world of the 'Experience Economy'?

Nat Krishnan, Sr Director Analyst, Gartner

CIAM offerings continue to expand to include features like customer identity analytics and consent management, along with maturing access management features like secure customer authentication and API access controls. Bring your own questions about CIAM to discuss recommended practices and how to plan for enriched user experience through CIAM offerings.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 12:15 PM - 02:00 PM PDT

Attendee Lunch Sponsored by LastPass

Tuesday, August 23, 2022 / 12:30 PM - 02:00 PM PDT

Exhibit Showcase Dessert Reception

Join us for a dessert reception on the Exhibit Showcase where you can engage with peers, Gartner experts, and exhibitors while enjoying delicious treats. Evaluate industry offerings that can move your business forward. Attend a theater session to see technology in action.

Tuesday, August 23, 2022 / 12:45 PM - 01:05 PM PDT

Callsign: Future Proof Your Fraud-Prevention Strategy

Hal Granoff, Head of US Market Development, Callsign

With online threats evolving at the pace of new technologies it’s a constant game of catch-up for organizations to stay secure, but these threats need to be managed without impacting the user journey or, invading privacy - it’s a complex challenge.

Hal Granoff (Callsign) and Reuben Stewart (Truist) will discuss how organizations can streamline their fraud prevention strategy and utilize new technologies from behavioral biometrics to orchestration solutions to meet a new digital world that combines privacy, security, and minimal friction for consumers.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 12:45 PM - 01:05 PM PDT

Sift: Fight the Fraud Economy with Account Security

Jimmy Dunn, SENIOR PRODUCT MARKETING MANAGER, Sift

The Fraud Economy is sophisticated, interconnected, and focused on exploiting online businesses. A growing number of attacks start with Account Takeovers (ATO). Sift exclusive research, during the last Black Friday/Cyber Monday shopping period found ATO fraud rose by a gut-wrenching 2,950% in the omnichannel retail sector. This session will discuss the importance to move from reactive account defense to proactive authentication, how passwordless authentication using biometrics can help secure your users’ accounts and conclude with best practices to future-proof your fraud prevention strategy.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 01:10 PM - 01:30 PM PDT

HYPR: When It Comes To MFA - It All Starts At The Endpoint

Amid the changing security environment, passwordless multifactor authentication plays a key role. It is in fact the attack vector for which many other threats originate and then propagate. And the only way to address the current operating paradigm is to fix the way the world logs in. So how do we get there from here? In this session, we will address: 1. The gaps in legacy MFA 2. Advantages of passwordless MFA and how it solves today's security gaps 3. The evolving world of ZTA and CARTA. Best practices and the essential role of the endpoint

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 01:10 PM - 01:30 PM PDT

VERIFF: Online Identity Verification for Identity and Access Management

Learn how enterprises are leveraging cutting edge technologies in online identity verification for identity and access management in a remote world. Taking a step beyond passwords and one-time passcodes, enterprises are using identity proofing technology to further secure corporate user accounts and data. Discover the case study from Veriff.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 01:35 PM - 01:55 PM PDT

Clear Skye: Rise of the Platforms: The Next Generation of Identity on ServiceNow

The next generation of identity is upon us, and it starts with the platform. While identity has traditionally been confined to siloed best-of-breed solutions, there’s a fundamental shift happening in the industry. More than half of IT workers use ITSM to govern access and permissions, according to recent research. This session will explore why the rise of cloud-native, platform-first identity is the future. Attendees will learn how this approach reduces silos between functional areas like HR, IT, SecOps, and GRC, ensures usability, and accelerates time-to-value through the Now Platform.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 02:00 PM - 02:30 PM PDT

Top Practices for Strengthening Your CIAM Strategy

Nat Krishnan, Sr Director Analyst, Gartner

What are companies doing for CIAM? How can you differentiate yourself from your competitors through a superior CIAM portal that your customers love? What are the main considerations, and how is privacy regulation impacting these decisions? We will discuss top practices around CIAM, how to take your CIAM initiative to the next level and how to plan for the best user experience to achieve your goals.

Tuesday, August 23, 2022 / 02:00 PM - 02:30 PM PDT

Active Directory in Transition: Gartner Survey Results and Analysis

Paul Rabinovich, Sr Director Analyst, Gartner

Gartner clients often ask if they can drop their Active Directory and migrate to a cloud-based identity service. Technology is already in place to support this journey, but do real-world Active Directory customers actually take it? In this session we will share the results of a Gartner survey about the future of Active Directory as seen by end-user organizations.

Tuesday, August 23, 2022 / 02:00 PM - 02:30 PM PDT

Schrödinger’s CAT — Using Continuous Adaptive Trust to Distinguish Between Users and Attackers

Ant Allan, VP Analyst, Gartner

In quantum physics there is a famous thought experiment in which you don’t know if a cat is alive or dead until you open the box containing it. Similarly, you may not truly know – until it is too late – if the person accessing your systems is your employee or customer or an attacker. How does CAT let you resolve this with greater confidence than legacy MFA? How does CAT fit within zero trust and adaptive access approaches?

Tuesday, August 23, 2022 / 02:00 PM - 02:30 PM PDT

Case Study: Between a Hard Rock and a CIAM Place - Building Unique Digital Customer Experiences

André Gowens, Vice President, Enterprise Architecture, Software Engineering & Data/Analytics, Seminole Hard Rock Support Services

Customer Identity Access Management (CIAM) is a vital component of organizations dealing with different entities, especially organizations that see growth via M&A. Seminole Hard Rock's user experience journey started with the requirement of having a 360 degree view of patrons across its multiple assets in the hospitality sector.

This session explores Seminole's journey; we look at what the requirements were, the unique challenges in our ecosystem, how we overcame those challenges and satisfied the requirements, and launched our internal digital platform.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 02:00 PM - 02:30 PM PDT

Case Study: Moving from legacy to Modern IGA

Mandy Huth, VP, Cybersecurity, Kohler Co.

Kohler, a leading manufacturer out of Wisconsin, needed to implement strong identity lifecycle and entitlements management, adhere to NIST frameworks, and enable their workforce with a modern, cloud based IGA solution. This was important for Kohler’s overall IAM strategy to protect their IP, provide a secure and efficient user experience, and manage identities from hire date to retirement. Join this session to learn about Kohler partnering with Omada to secure and manage their 30,000 identities.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 02:00 PM - 02:45 PM PDT

Ask the Expert: Access Management and Decentralized Identity

Henrique Teixeira, Sr Director Analyst, Gartner

The promise of decentralized identity (DCI). Is privacy and security not possible today? But how close are we, and is this approach viable? We will discuss the maturity of DCI in the market today, as well as possible real world applications for verifiable claims, which will promote the adoption of DCI.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 02:00 PM - 03:00 PM PDT

Contract Negotiation Clinic: Best Practices in Negotiating Both Traditional and Cloud-Based Infrastructure Contracts

Tobi Bet, Sr Director Analyst, Gartner

Traditional deals, such as data center outsourcing and cloud-based solutions such as infrastructure as a service (IaaS) have unique attributes and requirements with changes occurring frequently as the market matures.This session will provide sourcing executives and procurement managers with key attributes and contract examples to help organizations understand what to look for and how to negotiate deals.
Key issues:
• What are the differences between traditional and emerging cloud based contracts, KI?
• What opportunities do I have to negotiate these contracts?
• What do I do to limit risk via the contracts?

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 02:00 PM - 03:30 PM PDT

Workshop: Defining Meaningful Metrics for IAM

Rebecca Archambault, Sr Director Analyst, Gartner

Brian Guthrie, Director Analyst, Gartner

Knowing what metrics matter to your IAM stakeholders is critical to prioritizing, developing and monitoring IAM features. Metrics identify the success of individual projects and where attention and improvements must take place. To succeed, they must be terms the stakeholder recognizes and understand. They should also align with or influence other initiatives. Learn how to set proper expectations.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 02:45 PM - 03:15 PM PDT

Ping Identity: Securing Your Users Beyond the Digital Front Door with Authorization

Alex Wong, DIRECTOR OF PRODUCT MANAGEMENT, Ping Identity

Securing the customer experience doesn’t end at authentication. Once a customer signs to your app, your business must deliver a personalized, seamless experience that remains secure and minimizes risk. If authentication is the digital front door, how do you properly govern what your customers see and do once they are in? Take an identity-centric approach that uses dynamic policies that rely on a multitude of risk and fraud signals to drive intelligent authorization decisions. Learn how you can leverage dynamic authorization to extend security throughout the customer experience.

Tuesday, August 23, 2022 / 02:45 PM - 03:15 PM PDT

Axiad: The Devil is in the Details: Not All Passwordless Strategies Are Equal

Bassam Al-Khalidi, CO-CEO, Axiad IDS, Inc.

Eric Brown, SENIOR DIRECTOR, CYBERSECURITY IAM, Cognizant

Passwordless is hot because it offers a balance between security and usability. But a loophole may exist that can be exploited. Many who have complex IT environments and perhaps existing workflows and IAM investments, often pursue authentication in silos. This fragmentation can lead to gaps and inconsistencies that can leave your most-valuable assets exposed. Learn how taking an integrated approach to passwordless—across all key credentials, operating systems, and IAM ecosystems—can help close those gaps and deliver phishing-resistant workflows, lower friction, and a path to Zero Trust.

Tuesday, August 23, 2022 / 02:45 PM - 03:15 PM PDT

Kount: The Evolution of Identity: From Operational Concern to Business Enabler

Adam Gunther, SVP AND CPO, GLOBAL IDENTITY AND FRAUD, Equifax, Inc.

5% of CFOs think they have a fraud problem. 100% of CFOs have a revenue problem. Businesses striving to be at the forefront of digital transformation can evolve their identity and access management from a risk and operational concern to an opportunity for better customer engagement. This session will focus on real and tangible ways in which you can leverage identity and account data to better understand your customers, enhance loyalty, and drive revenue.

Tuesday, August 23, 2022 / 02:45 PM - 03:15 PM PDT

WSO2: CIAM - Let’s get Down to Business 2 Business

Geethika Cooray, VP & GM IAM BU, WSO2

B2B Customer Identity and Access Management (CIAM) transforms how businesses interact with third parties such as customers, partners, distributors, brokers, etc. within their value delivery chain. Traditional CIAM solutions that focus mostly on B2C needs fall short when it comes to tackling the more sophisticated requirements of B2B. This session will demonstrate use cases of how WSO2’s CIAM has helped leading organizations worldwide to connect with their extended value chain profitably. You’ll hear firsthand from WSO2 customer Nutanix about their B2B journey.

Tuesday, August 23, 2022 / 02:45 PM - 03:15 PM PDT

Hitachi ID: How to Execute a Strong Identity Strategy Amid Big Growth & Shifts

Peter Muller, PRINCIPAL SECURITY ARCHITECT, IAM, DocuSign

Nicholas Brown, CRO, Hitachi ID

DocuSign is executing a major greenfield Identity Governance program. This session will cover DocSign's approach from identifying and analyzing existing manual processes to rolling out reliably automated solutions that enables the business to scale rapidly. It's a multi-year undertaking that, by design, also adapts to the company’s changing priorities and accompanies all of the major initiatives where identity is key.

Tuesday, August 23, 2022 / 02:45 PM - 03:15 PM PDT

ARCON: Building Data Contextual Models for Identity Threat Detection & Response

Anil Bhandari, Chief Mentor, Arcon Techsolutions

Amid the increasing pace of digitization, a growing number of organizations are managing their workloads on the basis of hybrid model. A Hybrid model by design leads to dispersion of the corporate data across different environment. While security components like multifactor authentication (MFA), Single Sign-On (SSO), among others, provide strong layers of security around data, having a Corporate Identity related threat detection and response mechanism which is based on data contextual model enables the organization build a proactive information security posture.

Tuesday, August 23, 2022 / 02:45 PM - 03:30 PM PDT

ETSS: Avoid a View to a Ransom - Risky Exposures & Third-Party Vendors moderated by QOMPLX

Identity is the apex control for network security. Attackers continue to exploit existing vulnerabilities for profit by increasing attack surfaces through cloud services. Our session addresses the crucial need for attack surface monitoring & lateral movement detection to identify potential threats, mis-configurations, and attacker techniques.

Join this ETSS with QOMPLX to learn:

>How cloud providers and other vendors can extend attack surfaces
>Attacker techniques that compromise on-premise Active Directory or cloud services
>Best practices for threat identification and network defense

Tuesday, August 23, 2022 / 03:30 PM - 04:00 PM PDT

An IAM Program Is Critical to a Zero Trust Strategy

Ramon Krikken, Managing Vice President, Gartner

Solid IAM programs are crucial to zero trust strategies. Without IAM, zero trust strategies are doomed to fail. In this session, you will learn:
- High-level zero trust strategy and its relation to IAM programs
- How zero trust and identity architectures fit together
- Practical zero trust technologies implementations and their impact on identity

Tuesday, August 23, 2022 / 03:30 PM - 04:00 PM PDT

API Access Control 201: Architect a Modern API Access Control Strategy

Erik Wahlstrom, Sr Director Analyst, Gartner

In this technical session we will establish an agile and composable identity fabric that supports API access control that consists of multiple types of identity tools and components that together enable encryption, authentication and authorization for your distributed APIs.

Tuesday, August 23, 2022 / 03:30 PM - 04:00 PM PDT

Insights from the Magic Quadrant and Critical Capabilities for Privileged Access Management

Felix Gaehtgens, VP Analyst, Gartner

Through a selection of relevant Gartner insights and complementary methodologies, we will provide insight into latest updates in the privileged access management market.

Tuesday, August 23, 2022 / 03:30 PM - 04:00 PM PDT

Passwörterdämmerung Redux — Take 3 Steps Towards Passwordless Authentication

Ant Allan, VP Analyst, Gartner

The twilight of the passwords has long been foretold but is now, at last, upon us. Security and UX are key drivers for passwordless authentication. But how can IAM leaders choose among the many passwordless approaches? Which are the most effective? Where do novel methods add value? What is the role of FIDO2? How does passwordless authentication fit with zero trust, adaptive access and the identity fabric? How can you craft a cohesive strategy across multiple use cases?

Tuesday, August 23, 2022 / 03:30 PM - 04:00 PM PDT

Case Study: Path to Identity Inclusion

Melissa Carvalho, Canada Ambassador, Women in Identity

Kimberly Sutherland, Board Member, Women in Identity

The cornerstone of the digital world is trust! More than one billion people worldwide lack a basic verifiable identity. Without recognizable and consistent proof of identity there can be no financial, health, citizen or digital inclusion. The Women in Identity “Code of Conduct” initiative was established to set guiding principles and an implementation framework for organizations. This presentation will provide practical and pragmatic methods to becoming a truly inclusive sector.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 03:30 PM - 04:15 PM PDT

Ask the Expert: How to Keep Teams Safe and Motivated When in Constant Crisis Mode

Mary Mesaglio, Managing Vice President, Gartner

It’s hard to be a leader right now. The world seems be lurching from crisis to crisis. There’s not time to adjust, let alone recover. This session is focused on the practical: tactics that leaders can use to keep their teams motivated, even as everyone is exhausted and the crises multiply. The emphasis is on what that attendees can immediately put into practice.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 03:30 PM - 04:15 PM PDT

Ask the Expert: Ransomware Is Changing — Are You Ready?

Paul Furtado, VP Analyst, Gartner

Ransomware attacks have been morphing. Techniques used by the bad actors are changing. Come ask our experts how you can best protect, defend and respond to this threat

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 04:05 PM - 04:25 PM PDT

Authomize: Securing Your Identity Infrastructure Across Cloud and IAM with ITDR

David Bullas, Director of Solutions Engineering, Authomize

Identity solutions across Access Management (AM), IaaS, SSO, Identity Providers (IdPs), and SaaS apps are all under attack by malicious actors seeking to undermine critical identity infrastructure. Join us to learn how you can detect and respond to threats such as:
1. SaaS identity and access threats like data exfiltration by permissions manipulation, privilege escalations, and using service accounts to create back-doors
2. Lifecycle threats like partial off-boarding, inactive accounts, and privilege creep
3.IdP attacks like stealing passwords, admin impersonation, and proxying SSO connections

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 04:05 PM - 04:25 PM PDT

RAAH Tech: Unraveling Complexities to Enable 360° Growth via IAM

Naren Jangid, FOUNDER & CEO, RAAH Technologies Inc

The IAM space is confusing and complex, where your decisions have severe impacts on your company. Selecting the best IAM products from a saturated pool, budgeting for the IAM program to accurately project ROIs, and building and maintaining in-house band-aid solutions are challenges you face every day. This session is for the IT leader who wants to clear the clutter to build functional, and scalable identity programs. We will address the various tiers of technical complexity in Privileged, Workforce, Partner, and Customer Identity environments.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 04:30 PM - 05:00 PM PDT

IDMWORKS: Using automation to extend and understand your Identity Program

Do you understand how your identity technologies align to your business? Identity Management program is a significant financial investment that takes years to fully realize the benefit. Two issues remain: The ability to deploy identity technology across all applications, and the ability to see real time information that provides the detail necessary to understand the cross-functional benefits of your Identity program. Learn how to connect the rest of your enterprise to your existing IAM program, and, to gain Visibility to the programmatic benefits of your IAM efforts.

Tuesday, August 23, 2022 / 04:30 PM - 05:00 PM PDT

RSA: Defining the Problem(s): The Need for Next-Gen IAM

Jim Taylor, CHIEF PRODUCT OFFICER, RSA

Learn how SecurID customers are addressing current challenges and preparing for the future of IAM. Continuous change—including fully remote workforces, new enterprise users, a growing attack surface and greater complexity—are reshaping work, becoming more entrenched and increasing risk. Inadequate IT stacks built on perimeter-based access and passwords no longer address the challenges resulting from SaaS applications, IT Disaggregation, the API economy, microservices and Cloud serverless. See how CISOs are future-proofing their business for a technological step change with next-gen IAM.

Tuesday, August 23, 2022 / 04:30 PM - 05:00 PM PDT

Simeio Solutions: Identity Orchestration - A Game Changer for IAM Adoption

Enterprises today have structures that have changed than what traditionally it used to be. From remote workers across the globe, enterprise mobile apps, distributed supply chains and innumerable IoT devices and bringing everything under one identity platform needs a centralized approach. Identity orchestration could be a game changer for enterprises! Join us to go deeper about Identity Orchestration, current IAM program scenarios, drivers and enablers of orchestration in IAM, and how enterprises are doing it.

Tuesday, August 23, 2022 / 04:30 PM - 05:00 PM PDT

Sectigo: Digital Trust & the Cybersecurity Mesh: A Call for Openness & Interoperability

David Mahdi, CSO, Sectigo

Many CISOs and IAM leaders are doing their jobs with numerous siloed and incompatible solutions. Consolidation is a powerful approach but it's simply not possible when many vendors use closed and proprietary solutions. With the volume of digital identities growing exponentially, businesses need a modern approach to secure and manage their identities across complex IT infrastructures. Join this session to learn about the new ways to establish digital trust for human and machine identities leveraging Gartner’s Cybersecurity Mesh, and to gain visibility and lifecycle control for those identities.

Tuesday, August 23, 2022 / 04:30 PM - 05:00 PM PDT

PlainID: Why Policy-Based Authorization is Critical for Identity First Security

Mickey Martin, DIRECTOR OF PRODUCT OUTREACH, PlainID

The enterprise perimeter is now its data objects, APIs, applications, and its users are now the workforce, customers, partners and in many cases, machines. In this new, decentralized, and highly segmented world, CISOs and IAM leaders find themselves struggling with multiple systems and interfaces that control the most basic question: Who has access to what and when?
In this session we will present a new architecture for Identity First Security based on centralized Access and Authorization Policy Management Platform, and discuss pro and cons, specific real-world implementations and more.

Tuesday, August 23, 2022 / 04:30 PM - 05:00 PM PDT

Edgile: Accelerating Business Value with Identity Transformation

Lawrence Wolf, Managing Partner, Edgile

Ashish Chandra, GM and Practice Head, Wipro

As organizations continue their digital transformation, identity governance and administration (IGA) needs to account for ALL identities, not just employees. The cloud journey requires re-baselining IAM technologies and processes and developing a well-thought-out strategy to ensure key stakeholder buy-in. Join us as we discuss how two Fortune 100 companies transformed their IGA program with a strategy, roadmap, and business case. You’ll learn IGA best practices and how to effectively operate an IGA program with managed services.

Tuesday, August 23, 2022 / 04:30 PM - 05:15 PM PDT

ETSS: Surprising Secrets of Cyber-Resilience, moderated by senhasegura

Steve Hunt, Executive Advisor, Ravé Strategy

Learn the keys to excellence practiced at the best-run and most cyber-resilient organizations in the world. Steve Hunt, an inductee into the ISSA Hall of Fame, joined by a special guest from the FBI, will share their insights gleaned from cyber-crimes at hundreds of companies to discover steps you can take today to boost your organization’s resilience. Learn what you can do to protect the organization while also driving management to give you more budget. Everyone will leave this session feeling more empowered about their work-life, with actionable practical steps to be taken now.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 05:15 PM - 05:45 PM PDT

How to Choose a User Authentication Vendor

Ant Allan, VP Analyst, Gartner

With more than 300 vendors in the user authentication market, choosing one or more vendors to fit your needs across a variety of use cases for employees and customers can be fraught with difficulty. How can you identify the most effective authentication methods (with or without passwords)? Where can you find the ablest providers among the IAM marketverse? Do you need to look beyond the methods already available within your IAM infrastructure?

Tuesday, August 23, 2022 / 05:15 PM - 05:45 PM PDT

Improve IAM Architecture by Embracing 10 Identity Fabric Principles

Erik Wahlstrom, Sr Director Analyst, Gartner

In a world where identity is the only perimeter, identity-first security has become an imperative. IAM must be deployed more cohesively as a composable, distributed, resilient identity fabric. Organizations should also apply IAM best practices to more of their applications and services and to the IAM infrastructure itself.

Tuesday, August 23, 2022 / 05:15 PM - 05:45 PM PDT

Leverage ITSM for IGA

Nat Krishnan, Sr Director Analyst, Gartner

Organizations with ITSM are looking for specific Identity Governance and Administration features to complement their current workflows. This research will discuss approaches to adding features, such as Identity lifecycle, Access reviews, and Access requests, leveraging ITSM instead of using IGA as a standalone service.

Tuesday, August 23, 2022 / 05:15 PM - 05:45 PM PDT

Who Do You Want to Be Post-Crisis? Actions for Leaders

Mary Mesaglio, Managing Vice President, Gartner

There is a lot of corporate soul searching going on right now. Some enterprises are doubling down on their values while others are adopting new ones. In all cases, values are inspiring and exciting, but not enough on their own to drive change. This session covers the values-to-action pyramid, walking through practical ways to turn values into everyday behaviors.

Tuesday, August 23, 2022 / 05:15 PM - 05:45 PM PDT

Five Tactics to Help Employees Navigate Ambiguity and Make Change Stick

Cynthia Phillips, Sr Director Analyst, Gartner

Technology leaders must skillfully lead change to support the strategic and digital transformation needs of the enterprise. This session will provide insights from change psychology that can help motivate employees through the transformation journey and make change STICK.

Tuesday, August 23, 2022 / 05:45 PM - 07:15 PM PDT

Exhibit Showcase Networking Reception

Join us for a networking reception on the Exhibit Showcase where you can engage with your peers, Gartner experts, and exhibitors while enjoying delicious food and beverages. Evaluate industry offerings that can move your business forward. Attend a theater session to see technology in action.

Tuesday, August 23, 2022 / 06:00 PM - 06:20 PM PDT

SentinelOne: How Effective is your Cybersecurity Against Identity-Based Attacks?

Joseph Salazar, TECHNICAL MARKETING, SentinelOne

Almost all attacks rely on credential abuse and privilege escalation to infiltrate and move laterally. Current identity protection solutions safeguard privileged credentials or secure authentication processes but leave gaps that new solutions must address. Identity Visibility solutions reduce the attack surface by identifying exposed credentials, domain controller vulnerabilities, and cloud overprovisioning. Identity Detection & Response (IDR) solutions add Active Directory and credential protection from theft and misuse. Join this session to learn about identity attacks and how to stop them.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 06:00 PM - 06:20 PM PDT

Integral Partners: Building a Secure Identity Program - Custom IAM Workshop Preview

Jason Ellis, Advisory Director, Integral Partners, LLC

Integral Partners will preview their complimentary IAM Essentials Advisory workshop, which provides a practical approach to IAM strategy development and building a secure program. Providing an understanding of how IAM technologies and best practices should fit into a high-level roadmap using the "3 pillars" of an IAM strategy, workshops are tailored to fit each organization's interests. Topics include an IAM "big picture" overview, components within a program, the IAM Maturity Model, creating a PAM report card, cyber insurance, demystifying Zero Trust, the marketplace, and building a roadmap.

Tuesday, August 23, 2022 / 06:25 PM - 06:45 PM PDT

iC Consult: How IAM Managed Services Contribute to a Global Cyber Security Strategy

Managed Services for IAM are an innovative and efficient approach to leverage a standardized level of security by utilizing factory patterns. However, DevOps working models require flexibility to enable independent development teams to act individually. It is crucial to ensure that central MSP approaches do not conflict or slow down agile development. Learn our session and learn more about 1) the role of IAM Managed Services in Zero Trust, 2) How IAM factory patterns enable DevOps teams 3) How MSP supports the execution of a Zero Trust Strategy on a global scale

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 06:25 PM - 06:45 PM PDT

Ermetic: Securing Identities and Entitlements in AWS, Azure and GCP

Arick Goomanovsky, CBO & Co-Founder, Ermetic

Mismanagement of identities, entitlements & privileges is now a leading cause of cloud breaches. With thousands of human & machine identities, configurations & permissions, it’s extremely difficult to visualize & remediate access risk.

Gartner has recognized a new category of security solutions - Cloud Infrastructure Entitlements Management - to limit the attack surface & help you reduce your blast radius in case of a breach.

Join Ermetic’s CBO & Co-Founder, Arick Goomanovesky, to learn how to manage identities & privileges, achieve least privilege & protect your data at scale.

Tuesday, August 23, 2022 / 06:50 PM - 07:10 PM PDT

OpenText IAM: Zero-trust security for external ecosystems

Sony Abraham, VP DIGITAL IDENTITY, opentext

Dennis Mcdermott, SALES & MARKETING LEADER, IDENTITY MANAG, OpenText

Businesses have been digitally transforming inside the four walls of their enterprise to increase efficiency. But businesses looking to grow, enter new markets, and operate more efficiently need to digitize outside the enterprise – across business networks. Digital B2B ecosystem adoption is rising, but many initiatives fail to meet expectations due to security complexity and cost.

Join us to learn how a zero-trust distributed identity platform can secure access for users, assets and applications across diverse ecosystems comprised of thousands organizations and millions of users – at scale.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 06:50 PM - 07:10 PM PDT

Incognia: How Location Identity Enables Zero Friction, Zero Factor Authentication on Mobile

Andre Ferraz, CEO, incognia

Banks and Fintechs are competing for mobile users and are challenged to balance user experience with security. This session outlines how location behavior combined with device intelligence enables zero factor authentication (0FA) and the opportunity to eliminate friction for more than 90% of legitimate users, leaving MFA for high risk users. In reviewing data from 200 million devices with Incognia deployed, André will explain how the combination of location and device intelligence creates a unique identity that offers stronger security and very low false positive rates on mobile.

Wednesday, August 24, 2022 / 07:00 AM - 09:00 AM PDT

Attendee Breakfast Sponsored by LastPass

Wednesday, August 24, 2022 / 07:00 AM - 12:15 PM PDT

Registration & Information

Registration and information hours for the day.

Wednesday, August 24, 2022 / 09:00 AM - 09:30 AM PDT

Outlook for Data Security

Ramon Krikken, Managing Vice President, Gartner

This session covers current trends and emerging topics in the area of data security. From databases to cloud applications, threats are rapidly evolving and countermeasures slowly follow. Planning a data-centric roadmap for security governance and security architecture is a critical component of any security and risk management program.

Wednesday, August 24, 2022 / 09:00 AM - 09:30 AM PDT

Top Trends in Privacy

Bernard Woo, Sr Director Analyst, Gartner

Dive into five top trends in privacy and privacy tech. What are leading organizations focused on, what are the best capabilities to develop and what should you expect from your tech. We'll cover use cases, vendors and cost — enough to provide you with clear next steps to take to your teams.

Wednesday, August 24, 2022 / 09:00 AM - 09:30 AM PDT

Outlook for Identity and Access Management

Henrique Teixeira, Sr Director Analyst, Gartner

Identity and access management has reached a tipping point with the distribution of workforce and customer access. The decentralization of objects and assets demands a flexible and centralized response with a reliance on flexible orchestration, and policy enforcement which supports a low-friction, zero-trust approach.

Wednesday, August 24, 2022 / 09:00 AM - 09:30 AM PDT

Cybersecurity Mesh Architecture: Technical Deep Dive

Patrick Hevesi, VP Analyst, Gartner

This session will continue from introduction to the cybersecury mesh concept and dive deep into how to build the cybersecurity mesh architecture (CSMA). We will discuss the evolution of best-of-breed to the new CSMA along with pros and cons of each approach. Finally, we will discuss the vendor landscape from larger security vendors with full stacks to open source/distributed CSM solutions.

Wednesday, August 24, 2022 / 09:00 AM - 09:30 AM PDT

Protection From the Risk Within — Managing Insider Risk

Paul Furtado, VP Analyst, Gartner

One of the biggest risks to our security accesses our systems on a daily basis. This presentation will focus on providing guidance on building an effective insider risk program. We will discuss the tools, tactics and techniques to balance the needs of the business with user's privacy. Recommendations will also be made on how to present the program effectively to leadership and end users.

Wednesday, August 24, 2022 / 09:00 AM - 09:45 AM PDT

Ask the Expert: How do I Manage my Machine Identities?

Erik Wahlstrom, Sr Director Analyst, Gartner

Organizations find themselves needing to manage and provide best practices for how to handle the machine identities for a growing number of workloads. Bring your own questions to this session on how to manage secrets, keys and certificates in a hybrid and multi cloud environment.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, August 24, 2022 / 09:00 AM - 10:30 AM PDT

Workshop: Defining a Successful IAM Program

Rebecca Archambault, Sr Director Analyst, Gartner

Brian Guthrie, Director Analyst, Gartner

During this workshop IAM leaders will learn the importance, and what steps are required for the definition of a well-crafted IAM Program. The session will include exercises for creating your own IAM vision.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, August 24, 2022 / 09:00 AM - 10:30 AM PDT

Workshop: Turn Lessons Learned From Recent Supply Chain Attacks Into an Action Plan

Peter Firstbrook, VP Analyst, Gartner

Gartner experts have compiled the key learnings from recent supply chain attacks. We will examine both familiar and novel techniques the attackers used to carry out massive scale attacks and stay undetected for up to six months. Attendees will learn how to better identify and respond to these and similar exploits and take away an actionable plan for their own organization.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, August 24, 2022 / 09:00 AM - 11:30 AM PDT

Battle of the Brains - IAM Smackdown - Take the challenge! sponsored by SATH, Inc.

Are you ready to challenge your peers, and become the next IAM Smackdown champion?
Play Battle of the Brains to win the championship belt! Taking place at the Sath IDHub booth throughout the show, all participants win a prize.
IDHub - Simply Powerful, Identity Management.

Wednesday, August 24, 2022 / 09:00 AM - 11:30 AM PDT

Engagement Zone sponsored by Okta, Inc.

Engagement Zone sponsored by Okta, Inc.

Wednesday, August 24, 2022 / 09:00 AM - 11:30 AM PDT

Engagement Zone sponsored by Transmit Security

Engagement Zone sponsored by Transmit Security

Wednesday, August 24, 2022 / 09:45 AM - 10:05 AM PDT

Optiv: Navigate Change, Drive Measurable Value, and Optimize Adoption of Your IAM Program

Katie Pelton, Agile Change Transformation Practice Manager, Optiv Inc.

Any level of change can be difficult to adopt, especially if it requires real or perceived disruption(s) and evolving your IAM program comes with continual change to people and processes throughout your organization. Learn how to integrate Organizational Change Management (OCM) into your IAM program to improve the ROI and adoption of IAM initiatives, maturing your IAM program.
We’ll discuss real examples of what works, how to support the value of your IAM investments, and a simple action plan to incorporate OCM into your IAM program – regardless of where your program is today.

Wednesday, August 24, 2022 / 09:45 AM - 10:15 AM PDT

Akeyless: Are You Keeping The Right Secrets? How to Secure Machine Identities

Today’s IAM professionals face a pressing issue—the rise of machine identities and DevOps automation has caused “Secrets Sprawl,” due to the increase of database credentials, certificates, API keys, and other machine secrets within their environments. These machine secrets are kept in siloed point solutions and in multiple DevOps tools, sometimes hardcoded, and saved across on-prem servers as well as multiple cloud providers. In this presentation, Oded Hareven will explore the rise of machine identities, secrets sprawl, and actionable steps that IAM teams can take to address these challenges.

Wednesday, August 24, 2022 / 09:45 AM - 10:15 AM PDT

SecurEnds: Transform User Access Reviews: Painful Checkbox to Powerful and Effective Tool!

Bob Pruett, CISO, SecurEnds, Inc.

Managing identities and permissions across all applications is a tough job. It’s getting tougher every day. SecurEnds CEM will give you a consolidated view of all your identities and allow you to perform automated and meaningful user access reviews without weeks of preparation. SecurEnds can turn a compliance checkbox into a powerful tool to protect your enterprise with additional features such as access requests, SOD, and service account management, simplifying your identity tasks quickly.

Wednesday, August 24, 2022 / 09:45 AM - 10:15 AM PDT

SSH: Chances Are You Are Managing Only 20% Of Your Credentials With Traditional PAM

Teemu Tunkelo, CEO, SSH Communications Security Oyj

So you have your passwords in a vault and rotated regularly? Unfortunately, this is just the beginning. Join SSH’s CEO Teemu Tunkelo to discover why encryption keys need similar audit attention as passwords, why existing Privileged Access Management (PAM) solutions can’t handle them and what it takes to truly be in control your passwords and keys. Learn how Zero Trust credentials management paves the way for a passworldess and keyless future with minimal management effort and maximum access security.

Wednesday, August 24, 2022 / 09:45 AM - 10:30 AM PDT

ETSS: How to Overcome Privileged Access Management (PAM) Complexity & Reduce Cost, Moderated by WALLIX

Didier Lesteven, COO, Wallix

Richard Weeks, SVP Global Alliances, Wallix USA

According to Gartner, the global PAM market is valued ~$2.4B, representing 40 to 50k companies worldwide that have purchased a PAM solution, while the global market is much larger. Many IT compliance frameworks mandate PAM tools to be deployed to lower risk. Why the large discrepancy? Is it due to the complexity & cost of PAM solutions? Or are there other reasons?
In this moderated discussion, we’ll share perceptions of why PAM deployments aren’t more ubiquitous, while cyberattacks utilizing privileged accounts continue to grow. Key issues include cost, ease of deployment and simplicity.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, August 24, 2022 / 10:30 AM - 11:00 AM PDT

How to Architect CIAM and Select the Right Vendors

Nat Krishnan, Sr Director Analyst, Gartner

As requirements for great CIAM become more sophisticated, best practices for architecting CIAM and selecting vendors are evolving. This session will focus on the broadening scope of CIAM deployment architecture, selection criteria and vendors you should consider for your short lists.

Wednesday, August 24, 2022 / 10:30 AM - 11:00 AM PDT

Segregation of Duty Controls (That Most IGA Tools Have) Are Pretty Cool — So Why Limit Them Only to Finance?

David Collinson, Sr Director Analyst, Gartner

Whilst segregation of duty controls are key to preventing fraud, they can also be used very effectively in the security arena.
This session will explore the changing scope and supporting technologies to prevent toxic combinations impacting your organization financially and also from a security perspective.

Wednesday, August 24, 2022 / 10:30 AM - 11:00 AM PDT

Enabling Identity-First Security With Policy-Based Authorization

Homan Farahmand, VP Analyst, Gartner

Policy-based authorization has become a focal point for developing the next generation of identity-centric access controls. It includes both human and machine use cases supporting access to modern apps, computing units, data objects and underlying networks. In this session we discuss key use cases, policy management, and policy enforcement patterns to enhance security model of digital systems.

Wednesday, August 24, 2022 / 10:30 AM - 11:00 AM PDT

The Pitfalls of Implementing Multifactor Authentication

David Chase, Sr Director Analyst, Gartner

Multifactor authentication has become a priority for mitigating account takeover attacks. This breakout will discuss the top pitfalls organizations experience and how to avoid them.

Wednesday, August 24, 2022 / 11:30 AM - 12:15 PM PDT

Gartner Keynote: Stop Treating Security Like Magic and Security People Like Wizards

Tom Scholtz, Distinguished VP Analyst, Gartner

Refocus corporate security initiatives and efforts — from a futile effort to prevent breaches to accepting the inevitability of breaches. We will define how to learn from normal accident theory to build a culture of resilience, capable of reducing or eliminating business impacts from security breaches. This culture is built on characteristics and disciplines which we will define in actionable terms.

Want to stay informed?

Get conference email updates.
Contact Information

All fields are required.

  • Step 2 of 2