2021 day highlights

We are currently working on the IAM 2022 agenda, check out the highlights from the 2021 agenda in the meantime.

Day # 1

Gartner Experts:

  • Tricia Phillips, Research Director
  • Michael Kelly, Sr Director
  • Ant Allan, VP Analyst

Sessions:

  • Gartner Keynote: Adaptive IAM Is the Key to Moving from Disruption to Transformation
  • The State of Access Management, 2021
  • Take Three Steps Toward Passwordless Authentication

Day # 2

Speakers:

  • Chip Conley, Strategic Advisor for Hospitality and Leadership, Airbnb

Gartner Experts:

  • Akif Khan, Senior Director
  • David Mahdi, VP Analyst

Sessions:

  • Guest Keynote: Surfing Disruption
  • State of Identity Proofing and Affirmation
  • Science Fiction or Reality: Decentralized and Bring Your Own Identity
View By:

A look back at 2021's agenda

Tuesday, May 11, 2021 / 11:00 AM - 11:30 AM EDT

Gartner Opening Keynote: Adaptive IAM Is The Key to Moving from Disruption to Transformation

Tricia Phillips, Sr Director Analyst, Gartner

The disruption of digital business on traditional Identity and Access Management has been growing for years, but the COVID-19 pandemic accelerated the need for all businesses to transform. IAM leaders must take their place as the first, and often last, line of defense against the malicious use of user and machine accounts and drive new strategies and technologies for efficient and secure business enablement.

Tuesday, May 11, 2021 / 11:45 AM - 12:15 PM EDT

Cool or Not? Emerging IAM Technologies You Should Know About

David Mahdi, VP Analyst, Gartner

There is no lack of innovation and emerging technology in the red hot IAM space. This presentation will cover some of the exciting and promising technologies in the IAM space. In this session, we will address areas such as passwordless authentication, decentralized identity, machine identity and privacy.

Tuesday, May 11, 2021 / 11:45 AM - 12:15 PM EDT

IAM Leader's Guide to Privileged Access Management

Felix Gaehtgens, VP Analyst, Gartner

An introduction for privileged access management: Why Is PAM Such a Crucial Piece of Any Security Program? How Should You Leverage PAM? How can you raise your security posture by using a just-in-time PAM and Zero Standing Privileges Approach?

Tuesday, May 11, 2021 / 11:45 AM - 12:15 PM EDT

State of User Authentication, 2021

Tricia Phillips, Sr Director Analyst, Gartner

User authentication is at the heart of account protection for both consumer and workforce use cases. In this session, we will review the most significant trends in user authentication with insights about what is driving investment, which technologies are getting the most interest, and the short and long term impact of the dramatic increase in remote work.

Tuesday, May 11, 2021 / 11:45 AM - 12:15 PM EDT

The State of Access Management, 2021

Michael Kelley, Sr Director Analyst, Gartner

Access Management technologies play a significant role in application access of all kinds, and has especially been a focus for enabling safe and secure remote work. How has access management technology evolved, what is available today, and what kinds of things can you expect to take advantage of in the near future?

Tuesday, May 11, 2021 / 11:45 AM - 12:15 PM EDT

Top Trends in Security and Risk Management

Peter Firstbrook, VP Analyst, Gartner

"Top trends" highlight ongoing strategic shifts in the security ecosystem that aren't yet widely recognized, but are expected to have broad industry impact and significant potential for disruption. This presentation will describe the most significant trends in security and risk management and how leading organizations are taking advantage of these trends.
Key issues explored will include:
- Top technological improvements in the security product landscape
- Trends in creating a top notch security organization
- Long-term trends that will influence security strategy

Tuesday, May 11, 2021 / 11:45 AM - 12:15 PM EDT

Ask the Expert: Managing External Identities through CIAM

Henrique Teixeira, Sr Director Analyst, Gartner

Customer Identity and Access Management (CIAM) is key to enabling your digital transformation and the foundation of your customers' digital experiences. This session gives you an opportunity to ask questions about CIAM features, vendors and best practices. Attendees should come prepared to ask questions about IAM for external identities (including customers, partners, patients and citizens).

Tuesday, May 11, 2021 / 11:45 AM - 12:15 PM EDT

Ask the Expert: Crafting a Compelling Story to Influence Stakeholders.

Leigh McMullen, Distinguished VP Analyst, Gartner

Akif Khan, Sr Director Analyst, Gartner

Great stories don't simply roll off "silver tongues"... they're engineered. And as engineers you have the capacity to be great story tellers. In this session you're walking into a storytelling clinic, working with one of Gartner's top "Story Doctors", bring your story, the doctor is in.

Tuesday, May 11, 2021 / 11:45 AM - 12:30 PM EDT

Workshop: Defining Metrics for your IAM Program

Kevin Kampman, Sr Director Analyst, Gartner

David Collinson, Sr Director Analyst, Gartner

Knowing what metrics matter to your IAM stakeholders is critical to prioritizing, developing and monitoring IAM features. Metrics identify the success of individual projects and where attention and improvements must take place. To succeed, they must be terms the stakeholder recognizes and understand. They should also align with or influence other initiatives. Learn how to set proper expectations.

Tuesday, May 11, 2021 / 12:30 PM - 12:50 PM EDT

Auth0: Business Customer Identity Simplified

When building software that is used by teams, like SaaS and B2B products, application development teams often need to do a lot of DIY to augment their existing IAM solution. They need to build onboarding flows, customize the login experience, configure access levels, and build out customer-specific requirements. Join this session where Auth0 will discuss a transformative approach that will change the way you manage business customer identity.

Tuesday, May 11, 2021 / 12:30 PM - 12:50 PM EDT

BeyondTrust: Managing Privileges in a Multicloud World

Morey Haber, CTO & CISO, BeyondTrust

The proliferation of cloud providers across enterprises has resulted in challenges due to siloed identity stores, native toolsets, and conflicting shared responsibility models. PAM solutions that include CIEM can help standardize management and security controls across your ecosystem and fill gaps in native toolsets. Learn how to implement seven PAM cloud security best practices to vastly decrease the risk of a cloud-related breach.

Tuesday, May 11, 2021 / 12:30 PM - 12:50 PM EDT

CyberArk: Anatomy of a Breach with CyberArk Labs-SolarWinds, Supply Chain & Privilege

Andy Thompson, Strategic Advisor, CyberArk Software

Examining revelations from the SolarWinds attack, it’s clear that the compromise of identity and manipulation of privileged access were instrumental in its success. In this session, CyberArk Labs deconstructs the breach to shed light on supply chain risk and the lure of identity compromise by breaking down the key phases of the attack - from initial infection and customer targeting, through privilege escalation to high value assets.

Tuesday, May 11, 2021 / 12:30 PM - 12:50 PM EDT

IBM: Modernize CIAM with Unified Risk Detection and Privacy Management

Patrik Horemans, Business Developer IAM for GSI and Advis, IBM

Wes Gyure, Director of Strategy and Offering Management - IBM Security, IBM

IAM frameworks for consumers (CIAM) and for workforce may be different but leveraging a shared technology solution enables organizations to leverage unique capabilities and experiences across both. In this session, learn how IBM clients have modernized their CIAM programs by unifying their capabilities for frictionless authentication, risk detection, as well as data privacy and consent management.

Tuesday, May 11, 2021 / 12:30 PM - 12:50 PM EDT

Microsoft: Strengthen Your Zero Trust Security for the New Hybrid Work

As cyberattacks get more sophisticated, securing hybrid work environments is more complex—and more critical. Adopting a Zero Trust approach and upgrading your identity infrastructure hardens your defenses now and for the long-term. In this session, we will share how Zero Trust can help you manage the evolving global threat landscape and maximize control while enabling a seamless and secure user experience in the new era of hybrid work.

Tuesday, May 11, 2021 / 12:30 PM - 01:15 PM EDT

Roundtable: AM+IGA+PAM - Oh, my! A Unified Approach to Identity and Access Management, moderated by Okta

Kelsey Nelson, Product Marketing Manager, Okta

Join us for a conversation about emerging trends, such as remote work, cloud migration, and the rise in credential-based attacks that have increased the demands on identity and access management solutions. Discuss the opportunities to consolidate identity systems and benefits of shared information across access management, governance, and privileged access initiatives. Provide feedback on Okta’s unified approach and product roadmap.

Tuesday, May 11, 2021 / 12:30 PM - 01:15 PM EDT

Roundtable: Creating Your Identity Fabric - Unplugged, moderated by Symantec

Vadim Lander, Vadim Lander, Symantec Identity Management Security Chief Architect and CTO, CA

Join Vadim Lander, Symantec Chief Architect and CTO, as he sits down with Identity leaders from MetLife, Ameriprise, Prudential, UBS, and Chase, to discuss the challenges facing the modern enterprise, specifically with regards to weaving together their own identity fabrics.

Tuesday, May 11, 2021 / 12:55 PM - 01:10 PM EDT

Product Demo by OneTrust: Adding Consent and Preferences to Your CIAM

Zachary Faruque, Offering Analyst, OneTrust

With consent and preference management, you can support the user experiences you customers demand. Integrating your CIAM with OneTrust Consent and Preference Management helps enhance customer profiles, maximize marketing opt-ins, and capture first-party data. In this session, we'll demo how to integrate OneTrust with CIAM, how to setup consent, preference, and data capture, and what this looks like for your customers.

Tuesday, May 11, 2021 / 12:55 PM - 01:10 PM EDT

Product Demo by iProov: Face Authentication Balancing Risk, Security and User Experience

Joe Palmer, President, iProov Inc.

Now more than ever, the world is operating online. Governments and enterprises need a way of verifying an individual’s identity securely. iProov will demo Flexible Authentication, a single facial biometric authentication solution that combines Genuine Presence Assurance and Liveness Assurance catering to both high and low risk customer activities. This is how we envision enterprises using facial biometric authentication in the future.

Tuesday, May 11, 2021 / 12:55 PM - 01:10 PM EDT

Product Demo by OneLogin: Get SmartFactor Smart - AI Driven Passwordless Authentication

Damon Dean, CPO, OneLogin

With the acceleration of remote workforce and the increase in consumer-driven digital transactions, keeping your identities safe has never been more critical. This demo will showcase SmartFactor's advanced threat detection, across multiple login scenarios in real-time. Demonstrating how you can eliminate high-risk login attempts, without sacrificing user experience with AI-driven authentication.

Tuesday, May 11, 2021 / 12:55 PM - 01:10 PM EDT

Product Demo by SecurID, an RSA business: Protect Cloud and On-Prem Resources with SecurID

Lenore Tumey, Sr. Systems Engineer, RSA

Meet the challenges of the new normal of remote workforces and cloud applications by embracing a range of modern and convenient authentication methods – including Passwordless options. You’ll see how you can empower users to be productive while reducing IT calls and protecting company resources.

Tuesday, May 11, 2021 / 01:15 PM - 01:45 PM EDT

Best Practices for CIAM

Abhyuday Data, Sr Principal Analyst, Gartner

What are companies doing for CIAM? What are the primary considerations for a company planning to move from a “build it” to a “buy it” CIAM capability? How can you differentiate yourself from your competitors through a superior CIAM portal that your customers love? What are the main considerations, and how is privacy regulation impacting these decisions? We will discuss best practices around CIAM, what are the main considerations, how to plan for the best user experience to achieve your goals.

Tuesday, May 11, 2021 / 01:15 PM - 01:45 PM EDT

Take Three Steps Toward Passwordless Authentication

Ant Allan, VP Analyst, Gartner

Security and UX are key drivers for passwordless authentication. But the label tells us only what’s /not/ being used - and there are many passwordless technologies, some decades old. What are the most effective approaches? Where do novel methods add value? What is the role of FIDO2? Can a continuous adaptive trust (CAT) approach enable passwordless flows? How can you craft a cohesive strategy across multiple use cases?

Tuesday, May 11, 2021 / 01:15 PM - 01:45 PM EDT

How to Choose a PAM Solution

Michael Kelley, Sr Director Analyst, Gartner

Privileged access represents a significant security risk for every organization, but, there is a significant array of features and functionalities in the market. This session will cover five key steps to buying a PAM tool which will give you the confidence you need that you are buying the appropriate tools and technology to mitigate your PAM risk.

Tuesday, May 11, 2021 / 01:15 PM - 01:45 PM EDT

IT Leaders' Guide to IAM Program Management

David Collinson, Sr Director Analyst, Gartner

IT leaders often struggle to know where to begin and how to initiate a well-run IAM program. This session will help you by taking you through the initial steps, best practice and learnings from organisations that have been through this process before.

Tuesday, May 11, 2021 / 01:15 PM - 01:45 PM EDT

What Is CIEM, and How Can It Help to Mitigate Identity Risks in the Cloud?

Henrique Teixeira, Sr Director Analyst, Gartner

Entitlement management used to be a manageable problem. However, with the explosion of many thousands of permissions per identity in cloud infrastructures, legacy IAM approaches are no longer sufficient. Join this session to learn what cloud infrastructure entitlement management means, and how can it help to mitigate identity risks in the cloud.

Tuesday, May 11, 2021 / 01:15 PM - 01:45 PM EDT

Ask the Expert: How Can You Enable Business Access to Data While Mitigating Privacy and Security Risks?

Brian Lowans, Sr Director Analyst, Gartner

Business projects need access to data but these choices can create risks associated with privacy and data protection requirements. However, applying access controls to data will result in impacts to the performance of business projects. Therefore, there needs to be an approach that achieves a shared responsibility based upon data security governance.

Tuesday, May 11, 2021 / 01:15 PM - 01:45 PM EDT

Ask the Expert: Security in the Cloud Is Still a Shared Responsibility

Tom Croll, Sr Director Analyst, Gartner

Patrick Hevesi, VP Analyst, Gartner

While public cloud providers typically offer strong control attestations, numerous compliance certifications and their security features, CSPs cannot offer complete security. This interactive session will explore those portions of the shared responsibility model which remain in scope for customers — that's you — and how the combination of customer security and provider security offer a strong starting point.

Tuesday, May 11, 2021 / 01:15 PM - 02:00 PM EDT

Practitioner Roundtables: Balancing Act: Customer Experience. Revenue Protection. Regulation

Marcin Zimny, Identity and Access Mgmt Architect, London Stock Exchange Group

This case study led peer discussion will address how to manage user sessions at a resource level to ensure great customer experience, while protecting revenue and maintaining compliance with regulatory and contractual obligations. Participants will have the opportunity to discuss what they have experienced in their organizations and share additional ideas that have worked for them

Tuesday, May 11, 2021 / 02:00 PM - 02:20 PM EDT

ForgeRock: Drive to the Cloud with a Hybrid IAM Strategy, A BMW Case Study

Damon Mcdougald, Managing Director, Accenture

BMW supports 25M external IDs and 15K employees and partners. This presentation will demonstrate how BMW delivers a seamless digital experience with the cloud and a hybrid IAM strategy. It will also address how BMW empowers customers, partners and employees to quickly and securely access and manage apps and services, while introducing new features in a cost-efficient manner.

Tuesday, May 11, 2021 / 02:00 PM - 02:20 PM EDT

Hitachi ID: The Zero Trust Journey - Stepping Ahead with Identity and Privilege Access Management

Zero Trust and legacy workflows can coexist as you tackle one business process at a time and as your organization evolves to a higher level of operational maturity and greater cybersecurity resilience.
This session will explore the layers of identity and privileged access management. Addressing how a singular security fabric can offer, from square one or integrated with existing solutions, to build a Zero Trust security model that protects your organization from cyberattacks.

Tuesday, May 11, 2021 / 02:00 PM - 02:20 PM EDT

Okta: Unifying Your Approach to IAM - Access, Governance, Privilege

Robert Karel, Vice President Product Marketing, Okta

Remote work, cloud migration, and the rise in credential-based attacks have made it more difficult to maintain security, compliance, and productivity. Learn how Okta’s unified identity platform, covering access, governance, and privilege, delivers a faster time to value. Get strategy and implementation best practices from Moody’s, as well as our latest product enhancements and roadmap for identity governance and privileged access

Tuesday, May 11, 2021 / 02:00 PM - 02:20 PM EDT

Omada: Your Zero Trust Strategy Starts with Modern IGA

Rod Simmons, VP of Product Strategy, Omada

Make zero trust your unfair advantage. Organizations have managed remote workers and hybrid IT for years, but global events have magnified the scale and challenges of a mostly remote workforce. Identity is the common element across all security models. This session will address the importance of a modern IGA strategy in your zero-trust program. It will demonstrate how identity automation can enable efficiency, speed, accuracy, and consistent output at scale for today's cloud first remote workforce.

Tuesday, May 11, 2021 / 02:00 PM - 02:20 PM EDT

SailPoint: 13 Treasures in 81 Minutes - Identity, Security, and the Gardner Heist

Mike Kiser, Global Security Advocate, Office of the, SailPoint Technologies

In the early hours of March 18th, 1990, two men entered the Gardner Museum. They left 81 minutes later with 13 world-class artworks. The heist remains unsolved today and the museum is offering $10 million for the safe return of the pieces. Art is meant to be enjoyed by the public, but it also must be adequately protected. We’ll step through the heist, we’ll explore the current tension between access and security—and see the power of identity.

Tuesday, May 11, 2021 / 02:00 PM - 02:45 PM EDT

Roundtable: Adopting Advanced PAM Use Cases, moderated by BeyondTrust

Morey Haber, CTO & CISO, BeyondTrust

Privileged Access Management (PAM) has evolved significantly. Modern enterprises are going beyond basic account discovery and vaulting to adopt PAM capabilities that help manage administrative activity in a remote world, secure privileged access to cloud environments, and apply a zero standing privileges model. Join BeyondTrust and your peers for a discussion on how companies are successfully evolving their PAM programs to fit the new normal.

Tuesday, May 11, 2021 / 02:00 PM - 02:45 PM EDT

Roundtable: Navigating CIAM Security vs Business Requirements, moderated by IBM

Martijn Loderus, CIAM Global Leader, IBM

Deepak Kanwar, Sales Leader, IAM

It’s a paradox. Do you maintain current security measures to keep your organization safe or make tradeoffs to please your marketing, line-of-business, and procurement leaders? Are you grappling with this challenge? What are your plans for not only surviving but thriving? Join your peers in discussing what they’ve experienced in their organizations and what’s worked for them.

Tuesday, May 11, 2021 / 02:25 PM - 02:40 PM EDT

Product Demo by Yubico: Enabling Secure Work Anywhere and Delivering Trust at Scale

Andy Winiarski, Sr. Solutions Engineer, Yubico Inc.

As remote work is here to stay, secure and easy access to systems and applications is critical. Legacy and mobile-based authentication continues to be vulnerable, making it imperative to modernize MFA for every access point. Attend this demo to experience a day in the life of modern authentication, discover how to prevent account takeovers, see passwordless login in action, and deliver trust while supporting a remote workforce.

Tuesday, May 11, 2021 / 02:25 PM - 02:40 PM EDT

Product Demo by Saviynt: Enabling Zero Trust with the Enterprise Identity Cloud

Jason Gzym, Director, Solutions Engineering, Saviynt

Learn how Saviynt’s converged Enterprise Identity Cloud platform facilitates Zero Trust by making identity your security perimeter and providing time-limited & just-enough access. We will show you how to:
- Automatically discover and onboard assets
- Design access policies that conform to principles of least privilege
- Use identity controls to monitor risk and compliance

Tuesday, May 11, 2021 / 02:25 PM - 02:40 PM EDT

Product Demo by OpenText: Secure Value Chains & Digital Ecosystems at Scale

Dan Knauss, Lead Product Manager, OpenText

See use cases that scale identity and governance across external ecosystems: insurance, manufacturing, distributors, customers
- Solve supply chain security challenges: create visibility and automate lifecycle management
- Increase loyalty and wallet share: multi-enterprise data orchestration
- Create new offerings: PaaS and Partner integrations
Bring your questions and take advantage of our experience in securing global
value chains

Tuesday, May 11, 2021 / 02:25 PM - 02:40 PM EDT

Product Demo by Instnt: Mastering Digital Onboarding with a Managed Service

Sunil Madhu, CEO, Instnt Inc.

Justin Kamerman, CPO, Instnt Inc.

Join us for a walkthrough of Instnt’s managed onboarding service that helps businesses stay KYC (Know Your Customer) compliant, mitigate fraud, and improve acceptance rates. We will demonstrate how to:
- Replace waterfall rules with a simple onboarding workflow and implement the code onto your website
- Detect fraudsters using Machine Learning and our AI engine
- Increase revenue and save on operational costs with fraud indemnification

Tuesday, May 11, 2021 / 02:45 PM - 03:15 PM EDT

State of Fraud Detection

Jonathan Care, Sr Director Analyst, Gartner

This presentation looks at the state of the art in fraud detection solutions, casts an eye at the potential threats out there, and gives the IAM leader responsible for fraud detection a briefing on what to expect.

Tuesday, May 11, 2021 / 02:45 PM - 03:15 PM EDT

How to Choose an Access Management Solution

Henrique Teixeira, Sr Director Analyst, Gartner

Access management solutions are mature, rich with features and offer a broadened scope that overlaps with many adjacent areas. Learn to use a five-step approach to select a long-lasting, cost-efficient AM solution.

Tuesday, May 11, 2021 / 02:45 PM - 03:15 PM EDT

How to Choose an Identity Governance and Administration (IGA) Solution

David Collinson, Sr Director Analyst, Gartner

This session will help IAM leaders understand the changes Gartner are seeing in the IGA space and how to evaluate the different types of vendors offering IGA capabilities. This will support organizations who are looking to draw up a short list to compare in more detail.

Tuesday, May 11, 2021 / 02:45 PM - 03:15 PM EDT

Managing Machine Identities, Secrets, Keys and Certificates

Erik Wahlstrom, Sr Director Analyst, Gartner

An enterprisewide strategy for managing machine identities and credentials such as keys, secrets and certificates requires the usage of multiple tools. In this session we will provide guidance on how to pick the right type of tool and establish a processes that meets modern DevOps as well as security requirements.

Tuesday, May 11, 2021 / 02:45 PM - 03:15 PM EDT

Outlook for Cloud Security

Tom Croll, Sr Director Analyst, Gartner

Cloud security remains a top priority. This presentation summarizes the problems, recommended processes, and new product types to address three key issues:
. What are the unique risks associated with public cloud service providers, and how can they be controlled?
. What are the unique security challenges of IaaS and how can they be mitigated?
. What are the unique control challenges of SaaS, and how can they be addressed?

Tuesday, May 11, 2021 / 02:45 PM - 03:15 PM EDT

Ask the Expert: Top Practices for User Authentication — With or Without Passwords

Ant Allan, VP Analyst, Gartner

This session gives you an opportunity to ask your questions about user authentication, whether they're about choice of methods and vendors (Who has the best mobile push offering?), delivery options (Should this be discrete from our access management tool?), roll-out projects and ongoing administration (What are the key success factors?), or strategic trends (When can we go passwordless?).

Tuesday, May 11, 2021 / 02:45 PM - 03:30 PM EDT

Roundtable: How Successful Women Navigate Career Success in Times of Change

Mary Ruddy, VP Analyst, Gartner

Change brings challenges but it can also create new opportunities and open new avenues for achieving your goals. In this session we will talk about recent changes, including the expansion of remote work, and best practice adjustments you can make to keep your career on track and increase your future success. Participants will discuss what they have seen in their organization and share additional ideas that have worked for them.

Tuesday, May 11, 2021 / 02:45 PM - 03:30 PM EDT

Roundtable: Getting IAM Policies Right

Kevin Kampman, Sr Director Analyst, Gartner

Assigning entitlements to a user can be accomplished directly, via group or role membership, or by context. Assignment can be streamlined or refined if the rationale is well articulated using policies and attributes. Choosing the right approach improves flexibility and reduces delays and workloads. Learn from your peers how they have established and leveraged policy approaches to assign access.

Tuesday, May 11, 2021 / 03:30 PM - 04:00 PM EDT

Accelerate Your IAM Using DevOps and Agile Approaches

Kevin Kampman, Sr Director Analyst, Gartner

IAM adoption has traditionally been seen as a monolithic and waterfall style of deployment activity. These characteristics are changing as the needs of the business preclude extended investment and adoption. Learn how organizations have used DevOps and agile approaches to improve alignment with their business requirements and practices.

Tuesday, May 11, 2021 / 03:30 PM - 04:00 PM EDT

Guidance and Best Practices for Managing Your IGA Platform

Paul Mezzera, Sr Director Analyst, Gartner

IGA platforms are complex and have been traditionally difficult to implement, yet the demand is increasing both for new deployments and reimplementations. Organizations can increase their likelihood of success by following a more structured approach to deployment and ongoing management of their IGA platforms. This session provides guidance on best practices and common pitfalls to be avoided when selecting and implementing IGA platforms.

Tuesday, May 11, 2021 / 03:30 PM - 04:00 PM EDT

Technical Insights: Guidance for Microsoft Office 365 Identity Management

Paul Rabinovich, Sr Director Analyst, Gartner

Implementing hybrid identity for Office 365 and protecting employee, administrator and partner access can be daunting. This session will guide you through best practices for Office 365 IAM.

Tuesday, May 11, 2021 / 03:30 PM - 04:00 PM EDT

Technical Insights: Machine Learning and Analytics for IAM: What Is Real Now?

Mary Ruddy, VP Analyst, Gartner

Our digital environment has become too complex for humans to control system access without the help of smarter analytics. Advancements in identity analytics can help simplify and improve multiple identity and access management activities. Identity analytics, including machine learning, can process vast amounts of data to detect and respond to risks in a more automated and timely fashion. In this session, we will discuss how machine learning is being applied to many IAM use cases .

Tuesday, May 11, 2021 / 03:30 PM - 04:00 PM EDT

Top 10 Pitfalls When Deploying MFA

David Chase, Sr Director Analyst, Gartner

Multifactor authentication has become a priority for mitigating account takeover attacks. This breakout will discuss the top pitfalls organizations experience and how to avoid them.

Tuesday, May 11, 2021 / 03:30 PM - 04:00 PM EDT

Ask the Expert: Consent Management and Data Residency – Two Critical Privacy Priorities for IAM Leaders

Bernard Woo, Sr Director Analyst, Gartner

Nader Henein, VP Analyst, Gartner

This Ask the Expert session will focus on the two critical focus areas part of the privacy program that will dominate the agenda for IAM leaders through 2022. The first is data residency and the increased number of laws and regulations that tie the location where data can be stored with the identity of the user. The second is consent and preference management, and the need to stretch the meaning of identity to encompass any identifiable piece of information linking it to preferences and other identity fragments.

Tuesday, May 11, 2021 / 04:15 PM - 04:45 PM EDT

Peer Conversations: Top IAM Challenges Facing Financial Services Organizations

Working in the financial services sector presents unique challenges and requirements for IAM and Security & Risk leaders. Join this lightly facilitated session to share your experiences and ideas with your financial services peers.

Tuesday, May 11, 2021 / 04:15 PM - 04:45 PM EDT

Peer Conversations: Top IAM Challenges Facing Manufacturing Organizations

Working in the manufacturing sector presents unique challenges and requirements for IAM and Security & Risk leaders. Join this lightly facilitated session to share your experiences and ideas with your manufacturing peers.

Tuesday, May 11, 2021 / 04:15 PM - 04:45 PM EDT

Peer Conversations: Healthcare: Finding the Bright Spots Through Disruption

2020 has brought unexpected challenges and disruption. Through these challenges, innovation, resilience and creativity emerge. Please come ready to share your top bright spots from the last 6 months.

Wednesday, May 12, 2021 / 10:15 AM - 10:45 AM EDT

Peer Conversation: Digital Citizen Identities and Other Top Government IAM Challenges, moderated by Entrust

James LaPalme, Vice President of the Identity Business, Entrust

Secure digital citizen identities with credentials like health and travel are top of mind for governments as we enter a post-pandemic world. Join your peers in this lightly facilitated session to share your perspectives and experiences on primary government-to-citizen (G2C) IAM challenges and opportunities at this time of rapid digital transformation.

Wednesday, May 12, 2021 / 10:15 AM - 10:45 AM EDT

Peer Conversation: Diversity, Equity & Inclusion for Senior Executives

This session will be a facilitated discussion focusing on the role and importance of diversity, equity & inclusion for leaders who manage large, diverse organizations and teams. What culture, organizational politics, and tactics are you and your peers using to address these very current, and critical issues?

Wednesday, May 12, 2021 / 10:15 AM - 10:45 AM EDT

Peer Conversations: Top IAM Challenges Facing mid-sized Enterprises

Working in the mid-sized enterprise sector presents a unique set challenges and requirements for IAM leaders and Secuirty Leaders. Join this lightly facilitated session to share your experiences and ideas with your manufacturing peers.

Wednesday, May 12, 2021 / 11:00 AM - 11:30 AM EDT

Guest Keynote: Surfing Disruption

Chip Conley, Strategic Advisor for Hospitality and Leadership, Airbnb,

Chip Conley has disrupted the hospitality industry twice, once as the founder and long-time CEO of Joie de Vivre Hotels (America's second largest boutique hotel company) and more recently in 2013 when he joined the three founders of Airbnb to help grow and lead the company to become the most valuable hospitality company in the world. Chip has identified his three rules of disruptive innovation in any industry and how start-ups as well as established companies can see the foreshadowing of a new wave on the horizon and surf that wave to competitive advantage.

Wednesday, May 12, 2021 / 11:45 AM - 12:15 PM EDT

Halfway to Star Trek: A Professional's Guide to Predicting the Future

Leigh McMullen, Distinguished VP Analyst, Gartner

In this light and entertaining session, Gartner analyst and futurist, Leigh McMullen uses the "Half Way to Star Trek" scenario to illustrate a method for predicting and rapidly responding to the future based on proven concepts from the Military-Effects-Based Operations planning doctrine.

Wednesday, May 12, 2021 / 11:45 AM - 12:15 PM EDT

Science Fiction or Reality: Decentralized and Bring Your Own Identity

David Mahdi, VP Analyst, Gartner

Digital identity is now viewed as a critical infrastructure. Yet, fundamental problems such as privacy, security and convivence remain a challenge. But is it real? What can and should you do? Decentralized and bring your own identity offer new and exciting approaches to solving this problem.

Wednesday, May 12, 2021 / 11:45 AM - 12:15 PM EDT

Solving the Challenges of Modern Remote Access in a Post-COVID-19 World

Rob Smith, Sr Director Analyst, Gartner

This session will discuss the challenges of enabling users to access corporate resources in a post-COVID-19 world. Is an always-on VPN still the right access choice or should new technologies such as ZTNA and CASB be used instead? And what about the policies?

Wednesday, May 12, 2021 / 11:45 AM - 12:15 PM EDT

The State of Identity Proofing and Affirmation

Akif Khan, Sr Director Analyst, Gartner

Obtaining confidence in a customer’s or employee's identity is the foundational starting point of remote interactions for most organizations. IAM leaders must understand the current state-of-the-art, balancing assurance needs with friction in the UX, while orchestrating multiple tools and becoming aware of accuracy and bias.

Wednesday, May 12, 2021 / 11:45 AM - 12:15 PM EDT

Ask the Expert: Access Management Strategies, Risks and Best Practices

Michael Kelley, Sr Director Analyst, Gartner

This session gives you an opportunity to ask questions about Access Management(AM) technology in the broader IAM umbrella. Attendees should come prepared to ask questions about AM tools features, vendors, best practices and AM features convergence with other adjacent IAM markets.

Wednesday, May 12, 2021 / 11:45 AM - 12:15 PM EDT

Ask the Expert: How to Avoid Common Pitfalls Deploying an IGA Tool

David Collinson, Sr Director Analyst, Gartner

This is a an Ask the expert session aimed at helping IAM leaders avoid common mistakes

Wednesday, May 12, 2021 / 11:45 AM - 12:15 PM EDT

Outlook for Privacy, 2022

Bart Willemsen, VP Analyst, Gartner

The future of privacy is now. Amidst an unprecedented set of innovations, driven by a global move to maturing privacy and data protection legislation, consumers' demand for active protection of privacy continues. Looking for minimum compliance leads to risk and opportunity oversight. This session deals with upcoming challenges in privacy, the global state of the landscape, and the tools for a mature, value-creating privacy program.

Wednesday, May 12, 2021 / 11:45 AM - 12:30 PM EDT

Roundtable: Selecting the Right Professional Services Partner

Kevin Kampman, Sr Director Analyst, Gartner

This session will solicit the experience of organizations that have used professional services firms for their IAM projects. Learn how to select and manage your consulting, integration and managed services partner.

Wednesday, May 12, 2021 / 12:30 PM - 12:50 PM EDT

CyberRes: The Road to Autonomous Identity and Access Management

Patrick Gookin, Senior Product Manager, Micro Focus

Patrick Gookin, Senior Product Manager, Micro Focus

Autonomous IAM leverages a combination of artificial intelligence, machine learning and automation capabilities to transform how organizations approach IAM. This session will discuss the road to Autonomous IAM addressing how it can improve security, achieve better compliance results, and reduce the burden IAM imposes on business users and administrators.

Wednesday, May 12, 2021 / 12:30 PM - 12:50 PM EDT

Duo Security: OMG, What Just Happened? Securing Access is Suddenly Top of Mind!

Ash Devata, General Manager of Cisco Zero Trust and Duo Security, Duo Security

In this session, Ash Devata will discuss how MFA, SSO, VPN Remote Access, UEBA, passwordless and other technologies are paving the way to continuous trusted access and addressing the modern security challenges of cloud migration and pandemic driven remote work.

Wednesday, May 12, 2021 / 12:30 PM - 12:50 PM EDT

HPE: Case Studies on Establishing Trust Within an Infrastructure via Service Identity

Hasibul Haque, Manager, Security Engineering, Uber Engineering

Derek Edwards, VP Engineering at Anthem.ai, Anthem

Enterprise software services are increasingly running across multiple platforms spanning data centers and public clouds. Since these services span various domains, a zero trust model is the most efficient way to secure them. Service identity is a fundamental piece of building zero trust environments.
Join your peers at Anthem, Uber, and HPE to learn how SPIFFE provides a universal service identity control plane for a zero trust security model.

Wednesday, May 12, 2021 / 12:30 PM - 12:50 PM EDT

Radiant Logic: How Comcast Corporation Built a Strategic Identity Infrastructure

Rajnish Bhatia, Executive Director, Comcast

Pankaj Khatri, Director, Comcast

Comcast needed an identity transformation plan to serve both their immediate needs and their long-term strategic goals. The team leveraged identity data virtualization to build an identity metadata hub, acting as the source of truth for anything that needs to consume identity. This session will explore the principles they used to enable the roll-out of a new platform serving 190,000 users, with IGA, federation, & access management components.

Wednesday, May 12, 2021 / 12:30 PM - 12:50 PM EDT

Symantec: The Dawn of Digital Identity

Vadim Lander, Vadim Lander, Symantec Identity Management Security Chief Architect and CTO, CA

Join Vadim Lander, Symantec Identity Security CTO & Distinguished Engineer at Broadcom, as he discusses the new realities that are driving the evolution of Identity and Access Management (IAM) and how organizations use IAM as a key pillar in the architecture for Zero Trust. Vadim will also highlight the future of Symantec’s IAM suite of solutions and showcase a demo of the first chapter in this evolution.

Wednesday, May 12, 2021 / 12:30 PM - 01:15 PM EDT

Roundtable: The Role of Modern IGA in a Zero Trust Strategy, moderated by Omada

Rod Simmons, VP of Product Strategy, Omada

Strong identity governance is essential to enable a zero trust model. This roundtable of industry peers will discuss how to get the most value from your IGA solution as your organization tackles a Zero-Trust security model. Addressing principles such as tightly scope user roles, implement segregation of duties, regularly review permissions, strong authentication, approval workflows, and continuous monitoring.

Wednesday, May 12, 2021 / 12:30 PM - 01:15 PM EDT

Roundtable: How to Unify Privileged Access in Hybrid Cloud, moderated by Microsoft

Mark Wahl, Principal Program Manager (Active Direct, Microsoft

Joseph Dadzie, Principal Group PM Manager, Microsoft

With the proliferation of identities, and the acceleration of cloud adoption, organizations need to secure access to their most sensitive resources. In this facilitated conversation, we will discuss the challenges of securing privileged access across on-premises and multi-cloud environments, what solutions are used today and what technology gaps need to be filled for CISOs and CIOs to have complete visibility and control over privileged access.

Wednesday, May 12, 2021 / 12:55 PM - 01:10 PM EDT

Product Demo by BigID: Next-Generation Access Intelligence

The world of data is evolving - is your access management keeping up? The traditional ways of managing access to sensitive data isn’t enough to proactively protect the crown jewels of an organization.
Learn how to reimagine access intelligence to manage and reduce risk for all data and users - not just by traditional security groups, but with actionable ML-based intelligence to analyze and reduce risk on hotspots, users, categories, and more.

Wednesday, May 12, 2021 / 12:55 PM - 01:10 PM EDT

Product Demo by SecurEnds: Credential Entitlement Management

Austin Baker, Sales and Strategic Partnerships Lead, SecurEnds

Steven Weeks, Sales Representative, SecurEnds

What if we took traditional Identity Governance and reversed it completely? SecurEnds brings a modern ideology for IGA that drastically reduces the time to value, the total cost of ownership, and the economic impact of an Identity Governance Solution. This demonstration will focus on strategic order of operations, how to optimize AI/ML in Identity Governance, and how simplicity expedites the path to stronger compliance and security postures.

Wednesday, May 12, 2021 / 12:55 PM - 01:10 PM EDT

Product Demo by Onfido: Seeing Real Identity at Onboarding and Beyond

Albert Roux, VP Fraud Product Management, Onfido

Effective identity proofing has never been more important. It's the mechanism by which you provide seamless access and ongoing security.
In this session, Albert Roux (Director of Fraud, Onfido) will discuss how businesses can:
• Anchor users to real identities using an ID and photo
• Re-authenticate them with a biometric
• Create a trusted identity lifecycle with varied fraud components

Wednesday, May 12, 2021 / 12:55 PM - 01:10 PM EDT

Product Demo by WSO2: Start Onboarding Your Customers in Less than 15 mins with WSO2 Identity Server

Johann Nallathamby, Associate Director/Solutions Architect, WSO2 Lanka (Pvt.) Ltd.

Start onboarding your customers in less than 15 mins with the leading open source developer-first CIAM solution that is simple, secure and stackable, with a review of 3 of the most common use cases in CIAM:
- BYOID with social login
- Dynamic and adaptive access control
- Self-service account and password management
Join us for this demo and our Product Experts will be on hand for Q&A and follow up with your specific needs after the session.

Wednesday, May 12, 2021 / 01:15 PM - 01:45 PM EDT

Technical Insights: Decentralized Identity and Verifiable Claim Exchange

Homan Farahmand, Sr Director Analyst, Gartner

Decentralized identity will disrupt identity management by enabling privacy-enhanced, verifiable identity data exchange over the internet. This session provides an overview of these technologies, quick win use cases, key architectural approaches and the state of market.

Wednesday, May 12, 2021 / 01:15 PM - 01:45 PM EDT

Technical Insights: Managing Privileged Access in Multicloud Infrastructure.

Paul Mezzera, Sr Director Analyst, Gartner

Protecting cloud infrastructure is crucial, especially with more workloads hosted across cloud service providers. Security and risk management technical professionals must deploy tools that enable effective management of cloud infrastructure entitlements and reduce risks caused by unintended access. In this session we will discuss scope, key requirements, and potential approaches for securing access to cloud infrastructures.

Wednesday, May 12, 2021 / 01:15 PM - 01:45 PM EDT

Outlook for Data Security

Ramon Krikken, Distinguished VP Analyst, Gartner

This session covers current trends and emerging topics in the area of data security. From databases to files, threats are rapidly evolving and countermeasures slowly follow. Planning a data-centric roadmap for security governance and security architecture is a critical component of any security and risk management program.

Wednesday, May 12, 2021 / 01:15 PM - 01:45 PM EDT

Technical Insights: Architecting a Better CIAM User Experience

Mary Ruddy, VP Analyst, Gartner

Improving external user experience is now an imperative. It is no longer a "nice to have." This session will focus on factors you should consider when architecting a better user experience for your customers.

Wednesday, May 12, 2021 / 01:15 PM - 01:45 PM EDT

Face Value: Biometric Authentication Risks and Opportunities

Everyone has inherent physical and behavioral traits that can provide a uniquely personal basis for authentication in place of passwords or tokens. These biometric methods can transform authentication user experience across a multitude of channels. But how can you effectively mitigate privacy concerns, presentation attacks and other risks? And what value will biometrics add to continuous adaptive trust (CAT) strategies?

Wednesday, May 12, 2021 / 01:15 PM - 01:45 PM EDT

Ask the Expert: Can you Prove Someone's Identity Online?

Akif Khan, Sr Director Analyst, Gartner

Obtaining confidence in someone's identity online is the foundation of many customer and employee interactions. Join this open discussion to find out about the advantages and disadvantages of different approaches to ascertain the most appropriate solution for your business requirements.

Wednesday, May 12, 2021 / 01:15 PM - 02:00 PM EDT

Contract Negotiation Clinic: Six Steps to Strategize Software and SaaS Negotiations for Cost Optimization and Risk Mitigation

Christopher Dixon, Sr Principal Analyst, Gartner

This interactive session illustrates how to use six steps for planning negotiations with major vendors — megavendors and new and emerging software and cloud vendors. These steps can and should be used for any major negotiation to ensure the right questions are asked and the right detail is revealed to analyze proposals from a cost optimization and risk-mitigation standpoint. Clinic attendees will have access to ready-to-use checklists, templates, models and worksheets to execute these six steps effectively in their organizations.

*Session qualifies for Continuing Profession Education credits from ISACA, ISC2

Wednesday, May 12, 2021 / 01:15 PM - 02:00 PM EDT

Practitioner Roundtables: Building a Sustainable Business and Application Integration Strategy for IAM

Most organizations struggle to maximize the benefits of a mature IAM program. One of the primary causes is the failure to onboard applications fully into the IAM ecosystem. Learn how Humana is approaching this to drive lower cost and higher velocity by applying product-oriented delivery with an accompanying technology playbook. . Participants will have the opportunity to discuss what they have experienced in their organizations and share additional ideas that have worked for them.

Wednesday, May 12, 2021 / 02:00 PM - 02:20 PM EDT

Callsign: Bridging the Gap Between Security and UX, a Fireside Chat with PNC

Hal Granoff, Head of US Market Development, Callsign

With the rise in online adoption reaching new heights, balancing security & UX has become critical for enterprises. But where do you start & how do you ensure you’re aligning to your organization’s strategic objectives?
Hal Granoff (Head of US Market Development, Callsign) & Sridhar Kotamraju (SVP, PNC) discuss how you can build a seamless & secure experiences into your IAM strategy & why you should also ensure privacy is considered throughout

Wednesday, May 12, 2021 / 02:00 PM - 02:20 PM EDT

IDMWORKS: Nobody Puts Identity in a Corner

Gray Mitchell, CISO and VP Advisory Services, IDMWORKS

Paul Bedi, CEO, IDMWORKS, LLC.

The events of the past year exposed how critical identity is -- to security, productivity, and customer engagement. We’ve covered a “decade in days” worth of digital adoption, and that puts Identity and Access Management squarely in the spotlight. Learn the top 5 strategies IAM leaders should employ today to ensure their IAM program is ready for whatever comes next, from a vision, technology, resource, and budgetary perspective.

Wednesday, May 12, 2021 / 02:00 PM - 02:20 PM EDT

Entrust: Real Life IAM War Stories

The way we work, run errands, socialize, and even how we see the doctor has all changed. From financial fraud to medical identity theft to
ransomware attacks, the massive transformation has also injected many new threats into our daily lives.
Today’s digital world demands a modern approach to identity and access management (IAM). Hear real life or practical
experiences and current priorities of Entrust’s own customer base.

Wednesday, May 12, 2021 / 02:00 PM - 02:20 PM EDT

One Identity: The Next Step in Secure - Unified Identity Security Platform

Modern threats dictate that identity must be at the core of your security strategy. Protect your identities and you protect your world. Our cloud-first strategy simplifies securing identities, data, and connections to SaaS apps and other cloud-based resources. Join this session to hear how our Unified Identity Security Platform helps CISOs and other IT leaders stay employed, and enables true governance of your enterprise.

Wednesday, May 12, 2021 / 02:00 PM - 02:20 PM EDT

Thales: The Key to Post Covid Success - Learn to Thrive and not Merely Survive

Is your company proactive and fit or reactive and unfit?
In this presentation we’ll discuss:
How the right access management AM solution can help your business thrive, rather than merely survive.
How your organization can achieve successful business outcomes, remain agile enough to adapt to new circumstances, and stay ahead of
shifting regulations.

Wednesday, May 12, 2021 / 02:00 PM - 02:45 PM EDT

Roundtable: The Gardner Heist: Identity, Security, and Art, moderated by SailPoint

Mike Kiser, Global Security Advocate, Office of the, SailPoint Technologies

On March 18th, 1990, two men entered the Gardner Museum and left 81 minutes later with 13 world-class artworks. The heist remains unsolved today — and the museum is offering $10 million for the safe return of the pieces.

Come follow the evidence and follow the leads with us as we discuss identity’s role in modern architectures.

Note: If we somehow crack the case together, we'll split the $10 million between us all.

Wednesday, May 12, 2021 / 02:00 PM - 02:45 PM EDT

Roundtable: The Great Balancing Act - Security, Privacy, and Convenience, moderated by Auth0

Jasmit Sagoo, Head of Solution Engineering, Auth0

Companies that succeed in the next five years will meet the growing expectations for frictionless experiences that do not compromise between security, privacy, and convenience.
In this conversation, discuss how identity must flexibly manage securing information, protecting private data, and ensuring a seamless experience for customers.
Key issues discussed include: CIAM, renovating identity paradigms, building a successful identity strategy.

Wednesday, May 12, 2021 / 02:25 PM - 02:40 PM EDT

Product Demo by Herjavec Group: Access Anywhere with Robert Herjavec & Doug Chin

Doug Chin, VP, Identity & Access Management, Herjavec Group

Mike Sims, VP IAM Advisory and Architecture at Herj, Herjavec Group

Before the pandemic, tasks like onboarding new employees & managing user credentials took place on secured, local office networks. Today, the perimeters we relied on are gone. With many companies opting for remote or hybrid work environments, virtual requirements pose the challenge – how do you securely onboard & manage your workforce that could exist anywhere? HG Access Anywhere provides a secure and efficient way to address this IAM challenge.

Wednesday, May 12, 2021 / 02:25 PM - 02:40 PM EDT

Product Demo by Integral Partners: IAM Essentials Advisory Workshop

Jason Ellis, Advisory Director, Integral Partners, LLC

Join us to preview our IAM Essentials Advisory workshop. Each workshop provides a practical approach to IAM strategy development, with a clear understanding of how each of the IAM technologies works with best practices to fit into your roadmap. This session will demonstrate each phase of the workshop and the value it delivers, including, IAM "big picture" overview, IAM program components, IAM Maturity Model, the IAM marketplace, and building a roadmap.

Wednesday, May 12, 2021 / 02:25 PM - 02:40 PM EDT

Product Demo by Kount, An Equifax Company: Your Customer Accounts are Under Attack

Sven Hindman, Product Owner, Kount

See how Kount Control takes an intelligent, multi-layered approach to protect against account takeover attacks while delivering frictionless login experiences. We’ll demonstrate how Kount’s multi-layered solution works passively to stop attacks, and how to customize login policies to fine-tune protection. Join the live demo!

Wednesday, May 12, 2021 / 02:25 PM - 02:40 PM EDT

Product Demo by Silverfort: Unified Identity Protection Platform

Hed Kovetz, CEO & Co-Founder, Silverfort

Silverfort's Platform consolidates security controls across corporate networks and cloud environments to block identity-based attacks. Its innovative agentless and proxyless technology seamlessly integrates with IAM solutions like AD, ADFS, Azure AD, Okta, Ping, AWS IAM, etc.), extending coverage to assets that couldn't be protected before, including homegrown/legacy apps, IT infrastructure, command-line tools, machine-to-machine access and more. This session will be a hands on demonstration followed by Q&A for your specific needs.

Wednesday, May 12, 2021 / 02:45 PM - 03:15 PM EDT

Best Practice Guide to Deploying an IGA Tool

David Collinson, Sr Director Analyst, Gartner

This guide will give recommendations on how to deploy a new IGA tool by outlining pitfalls to avoid and how to ensure value is obtained quickly.

Wednesday, May 12, 2021 / 02:45 PM - 03:15 PM EDT

Your Next MFA Solution Will Probably Be In the Cloud: How To Pick the Right One

Paul Rabinovich, Sr Director Analyst, Gartner

Multifactor authentication (MFA) is an effective means to mitigate impersonation attacks, but how do you select an MFA solution? This session will help you to home in on the vendors that can address your organization’s requirements for supported use cases, authentication methods, adaptive access, administration, application integration and UX.

Wednesday, May 12, 2021 / 02:45 PM - 03:15 PM EDT

Choosing the Right IAM Professional Services Vendor

Kevin Kampman, Sr Director Analyst, Gartner

One of the most critical success factors in any IAM deployment is the quality and expertise of the consulting and implementation resources employed. Most organizations draw upon outside professional services for experience with the situation and products chosen to satisfy a client's needs. This session will identify how best to solicit and choose firms so as to accomplish a successful deployment.

Wednesday, May 12, 2021 / 02:45 PM - 03:15 PM EDT

Technical Insights: Best Practices for Microservices IAM

David Chase, Sr Director Analyst, Gartner

Identity of microservices is a rapidly evolving and challenging topic. In a zero-trust framework, microservices has to be authenticated and authorized. This breakout will discuss the latest best practices of identity and microservices.

Wednesday, May 12, 2021 / 02:45 PM - 03:15 PM EDT

The VPN Is Dead: Long Live Zero Trust Network Access

Patrick Hevesi, VP Analyst, Gartner

ZTNA, sometimes called as software-defined perimeters (SDP), replaces traditional technologies and eliminates the need to extend excessive trust. It provides adaptive, identity-aware, precision access that improves flexibility, agility and scalability, while offering a consistent experience regardless of who the user is or where they are. In this session, we will learn:
. What is ZTNA, exactly, and why is it suddenly so popular?
. What are the benefits and the common emerging use cases?
. What can we expect it to evolve into as it matures?

Wednesday, May 12, 2021 / 02:45 PM - 03:15 PM EDT

Ask the Expert: Bring Your Own Identity and Decentralized Identity - Science Fiction or Reality?

David Mahdi, VP Analyst, Gartner

Michael Kelley, Sr Director Analyst, Gartner

Join us in this interactive session - come with questions to discuss this interesting topic!. Digital identity is now viewed as a critical infrastructure. But problems such as privacy, security and convivence remain a challenge. But is it real? What can and should you do? Decentralized and bring your own identity offer new and exciting approaches to solving this problem.

Wednesday, May 12, 2021 / 02:45 PM - 03:30 PM EDT

Workshop: Experiences from Implementing Mobile Identity for the Digital Workplace

Rob Smith, Sr Director Analyst, Gartner

This workshop discusses real-world experiences on solving the challenges associated with identifying users and devices in a mobile landscape. It also discusses the convergence of mobility management and identity management technologies and the implications this poses to the digital workplace.
Key Issues:
Do I need to implement mobile identity?
If so, how?
What are the best practices in deploying it?

Wednesday, May 12, 2021 / 02:45 PM - 03:30 PM EDT

Workshop: Everything I know About Meeting Politics I Learned from a 17th Century Japanese Sword Master

Leigh McMullen, Distinguished VP Analyst, Gartner

In this session you will learn to recognize and counter more than a dozen forms of resistance that commonly occur in meetings, as well as techniques to handle more advanced political situations such as malevolent actors, as well as the essential tools of persuasion. All of this wrapped in a fun and entertaining exploration of the wisdom of one of Japan's greatest swordsmen.

Wednesday, May 12, 2021 / 03:30 PM - 04:00 PM EDT

What Happens When the Second Half of the Internet Comes Online

Leigh McMullen, Distinguished VP Analyst, Gartner

The internet now reaches more than half the world's population. Conventional wisdom suggests that solutions that served the first half will trickle down and serve the second. The Conventional wisdom is dead wrong. People living in the "2nd half" have different problems and seek different solutions. The 2nd half presents the greatest blue ocean market opportunity the world has ever seen. it also will challenge the status quo in unexpected ways.

Wednesday, May 12, 2021 / 03:30 PM - 04:00 PM EDT

Architecting Modern Authentication and Authorization Strategies for Your APIs

Erik Wahlstrom, Sr Director Analyst, Gartner

Modern identity protocols such as OAuth 2.0 and specifically JWTs are now commonly used to protect APIs. Architects must bridge the gap between systems, mediators and teams such as I&O, application developers, security and the IAM teams to define those practices. This highly technical session will provide guidance how organizations should do so while balancing expectations, security, privacy and usability.

Wednesday, May 12, 2021 / 03:30 PM - 04:00 PM EDT

How to Choose an Identity Proofing Vendor

Akif Khan, Sr Director Analyst, Gartner

Proving the identity of customers or employees in digital channels is a challenging task that bad actors try to subvert. IAM leaders must be aware of how to differentiate between vendors offering such services, and carefully define their full scope of requirements in order to implement a solution that delivers on organizational needs with respect to identity assurance, CX, compliance and cost.

Wednesday, May 12, 2021 / 03:30 PM - 04:00 PM EDT

Modernize Your IGA Solution Architecture

Paul Mezzera, Sr Director Analyst, Gartner

Identity governance and administration (IGA) systems have existed for several decades, but many IGA deployments are struggling to keep pace with new digital business demands. Organizations need to evaluate and adopt next-generation technologies that support cloud, mobile, DevOps, AI, analytics, and cybersecurity initiatives. This session will explore IGA technology trends and modern IGA architectures.

Wednesday, May 12, 2021 / 03:30 PM - 04:00 PM EDT

Security Organization Dynamics

Tom Scholtz, Distinguished VP Analyst, Gartner

There is no such thing as a perfect model for security organizations. Every enterprise must develop its own model, taking into consideration basic principles, practical realities and the challenges of digital transformation. This session will address the following:
. What are the trends and challenges in security organization design?
. What are the factors that influence security organization?
. What are the current best practices and conceptual design models for security organization?

Wednesday, May 12, 2021 / 03:30 PM - 04:00 PM EDT

Ask the Expert: Privileged Access Management

Felix Gaehtgens, VP Analyst, Gartner

Henrique Teixeira, Sr Director Analyst, Gartner

This session gives you an opportunity to ask questions about privileged access management (PAM), successful use cases and requirements needed to make your PAM efforts successful. Attendees should come prepared to ask questions.

Join us in 2022

Get conference email updates.
Contact Information

All fields are required.

  • Step 2 of 2