Sunday, August 21, 2022 / 01:00 PM - 06:00 PM PDT
Registration and information hours for the day.
Monday, August 22, 2022 / 07:30 AM - 09:30 AM PDT
Monday, August 22, 2022 / 07:30 AM - 07:30 PM PDT
Registration and information hours for the day.
Monday, August 22, 2022 / 09:30 AM - 10:15 AM PDT
Mary Mesaglio, Managing Vice President, Gartner
It’s 2022 and we thought the long-awaited reopening was finally here. But then, wham. Omicron arrived on the scene. The pandemic sometimes seems like a never-ending story of dashed hopes. Yet, you don’t get to sit this one out. Businesses continue to transform, you must continue to lead your people, and the world doesn’t stop just because you’re tired. And we know you’re tired. This session covers how to continue your digital acceleration while keeping your people – and yourself – safe and whole. It’s a tightrope walk out there.
Monday, August 22, 2022 / 10:15 AM - 05:15 PM PDT
Are you ready to challenge your peers, and become the next IAM Smackdown champion?
Play Battle of the Brains to win the championship belt! Taking place at the Sath IDHub booth throughout the show, all participants win a prize.
IDHub - Simply Powerful, Identity Management.
Monday, August 22, 2022 / 10:15 AM - 05:15 PM PDT
Engagement Zone sponsored by Okta, Inc.
Monday, August 22, 2022 / 10:15 AM - 05:15 PM PDT
Engagement Zone sponsored by Transmit Security
Monday, August 22, 2022 / 10:15 AM - 07:30 PM PDT
Visit the Exhibit Showcase to evaluate industry offerings that can move your business forward. Engage with your peers, Gartner experts, and exhibitors. Attend a theater session to see technology in action.
Monday, August 22, 2022 / 10:30 AM - 10:50 AM PDT
James Hoover, Principal Analyst, Gartner
This Hype Cycle for identity and access management (IAM) emphasizes the maturation of innovations that deliver security, risk management and business value for customer and workforce IAM.
Monday, August 22, 2022 / 10:30 AM - 10:50 AM PDT
Brian Guthrie, Director Analyst, Gartner
This session will present the Magic Quadrant and Critical Capabilities for Access Management market, 2022.
Monday, August 22, 2022 / 11:00 AM - 11:30 AM PDT
Erik Wahlstrom, Sr Director Analyst, Gartner
Access Management technologies are enablers of Identity First security. What has been changing in the market, driving the need to account for new user constituencies, and new work models? How is access management technology continuing to evolve to meet these new challenges? We will talk about what is available today, and what kinds of things can you expect to take advantage of in the near future.
Monday, August 22, 2022 / 11:00 AM - 11:30 AM PDT
Peter Firstbrook, VP Analyst, Gartner
“Top trends” highlight shifts in the security ecosystem that aren't widely recognized, but are likely to have potential for disruption. This presentation will describe the significant trends in risk management and how organizations are taking advantage of these trends. Key issues include: Top technological improvements in the security product landscape; Trends in creating a top notch security organization; and long-term trends that will influence security strategy
Monday, August 22, 2022 / 11:00 AM - 11:30 AM PDT
Rebecca Archambault, Sr Director Analyst, Gartner
Leaders responsible for IAM generally focus on the technical benefits of an IAM solution rather than its impact on the organization's goals and objectives. They are not accustomed to recognizing and accommodating the influence IAM has on business outcomes or associating IAM with environmental, organization or social change. These skills are critical to an initiative with IAM's scope and breadth.
Monday, August 22, 2022 / 11:00 AM - 11:30 AM PDT
Tom Scholtz, Distinguished VP Analyst, Gartner
There are multiple approaches for communicating the business value of cybersecurity and none of them offer a single "best" way. All are relevant to different contexts. This presentation will discuss the characteristics of common approaches such as RO(S)I, price-performance analysis, outcome-driven approach, etc., and provide guidance on how to select the appropriate approach based on context.
Monday, August 22, 2022 / 11:00 AM - 11:30 AM PDT
Cynthia Phillips, Sr Director Analyst, Gartner
Innovation is critical to competitive advantage. Do you think innovation is best in person? Think again. Distributed team innovation provides distinct advantages over in-person collaboration. This session breaks down innovation myths and provides cyberpsychology insights with actionable advice for developing the culture, people and processes required for distributed innovation.
Monday, August 22, 2022 / 11:00 AM - 11:45 AM PDT
Ramon Krikken, Managing Vice President, Gartner
Zero trust is an overloaded marketing term. What is really mean by "zero trust" and as an IAM leader, why should I care?
Monday, August 22, 2022 / 11:00 AM - 11:45 AM PDT
Tobi Bet, Sr Director Analyst, Gartner
Improving diversity, equity and inclusion within IAM and security teams can go beyond moral arguments, into business cases built on better protection for your organization, and better talent and motivation for your team. Bring your questions to this session, and find out how to craft a DE&I strategy that can have positive impact to your business across multiple dimensions.
Monday, August 22, 2022 / 11:00 AM - 12:30 PM PDT
Nat Krishnan, Sr Director Analyst, Gartner
This workshop will provide a detailed exploration of Gartner's Two-Layer role modeling framework and provide practical guidance to achieve efficiency and flexibility, and address role management challenges such as overentitlement, role proliferation, and violations of least privilege principle.
Monday, August 22, 2022 / 11:00 AM - 12:30 PM PDT
David Collinson, Sr Director Analyst, Gartner
Gautham Mudra, Sr Director Analyst, Gartner
This workshop will help you by practically taking you through the stages of preparing for an RFP for an IGA product. Attendees will leave with a practical approach to a succesful RFP.
Monday, August 22, 2022 / 11:45 AM - 12:15 PM PDT
Thomas Jermoluk, CEO, Beyond Identity
Sasha Jovicic, CTO, RunBuggy Inc
Identity management will become critically important and is now a foundational linchpin in every org’s cybersecurity infrastructure. This panel will discuss drivers, the path forward, key lessons learned, and what still needs to be sorted as we move to a Zero-Trust model. They will discuss and contextualize ZT for identity pros and cover questions like:
*What does ZT mean to Identity and Cyber pros?
*How will identity/cyber tech stacks change? What are some important trends? Can you ditch legacy MFA, VPN, MDM?
*Will it save you money or cost you?
*What are the key architectural implications?
Monday, August 22, 2022 / 11:45 AM - 12:15 PM PDT
Damon McDougald, Global Digital Identity Lead, Accenture
In today's digital-first world, customers expect secure and hassle-free experiences. Meanwhile, organizations like yours are facing the reality of numerous technology solutions — new and old, big and small — that all need to somehow work together to meet ever-evolving business requirements. Join this session to learn how top global companies with some of the world’s largest and most complex environments are using IAM orchestration to deliver personalized experiences, better customer engagement, and stronger security at the identity perimeter.
Monday, August 22, 2022 / 11:45 AM - 12:15 PM PDT
Joseph Dadzie, DIRECTOR OF PRODUCT MANAGEMENT, Microsoft
Balaji Parimi, PARTNER, GENERAL MANAGER, Microsoft
Going multicloud makes you more agile and resilient. But it also creates more complexity and blind spots for your security and identity teams. It’s time to reimagine how we manage, secure, and govern identities and enforce least privileged access consistently across cloud platforms. In this session, we’ll explore how cloud infrastructure entitlement management (CIEM) can strengthen your Zero Trust security in a multicloud world.
Monday, August 22, 2022 / 11:45 AM - 12:15 PM PDT
John McLeod, CISO, National Oilwell Varco
Parash Bhaya, Sr Director Product Marketing, Okta
Every person in the organization is important - office and front-line employees, partners, vendors among others. With more people accessing more apps from virtually anywhere and using more devices, Identity is rising as the linchpin to empower a dynamic and globally distributed workforce. In this session we’ll explore three key pillars of an effective identity strategy: providing access to the right apps for the right people, zero-trust security, and driving business agility via automation and modern governance tools that are easy to implement and use.
Monday, August 22, 2022 / 11:45 AM - 12:15 PM PDT
Rod Simmons, VP of Product Strategy, Omada
Deploying an Identity Governance & Administration solution has a reputation of being lengthy, expensive, and frustrating. If you have ever wondered why that is, please join Rod Simmons to discuss how to avoid common pitfalls of overly customizing IGA in the deployment stage, and instead setting the stage for future successes. Topics discussed will include:
• Examples of common problems that delay deployments
• How to avoid customization and still deploy a modern, scalable and agile IGA solution to fit the needs of your organization
• A roadmap for how to deploy within 12 weeks
Monday, August 22, 2022 / 11:45 AM - 12:15 PM PDT
Simon Gooch, DIRECTOR OF CYBER SECURITY & GLOBAL DIGI, Accenture
Mike Kiser, STRATEGY AND STANDARDS, SailPoint Technologies
The pace at which the Cyber Threat Landscape is evolving means that opportunities and mitigations presented by Security in the cloud, specifically Identity as a Service (IDaaS), are required now. The time it takes your business to migrate is critical. Moving your identity security to the cloud, and moving fast, enables a level of agility, value, and security that your organization cannot afford to miss out on and will play an important part in your broader IT and Business transformation strategy. Join this session to learn why SailPoint and Accenture are going through this journey together.
Monday, August 22, 2022 / 11:45 AM - 12:30 PM PDT
Wolfgang Goerlich, Advisory CISO, Cisco
Security has a design problem. Our security programs are unusable, causing people to opt-out. Our security tools are unmanageable, leading to staffing shortages and shelfware. The result is not defensible. This session details a framework combining path finding and choice architecture. The industry needs to get people to follow secure practices, to opt in, to transform security. The solution is design.
Monday, August 22, 2022 / 12:30 PM - 01:00 PM PDT
James Hoover, Principal Analyst, Gartner
Security and Risk leaders struggle to achieve the desired level of maturity across certain key activities that are critical to a healthy IAM function. Failure to address these "top gaps" devalues IAM programs, and increases risk to the enterprise. This session will outline the top gaps IAM programs are experiencing, and provide guidance on how to improve maturity in these critical areas.
Monday, August 22, 2022 / 12:30 PM - 01:00 PM PDT
Ant Allan, VP Analyst, Gartner
User authentication is at the heart of account protection for both consumer and workforce use cases, but cutting through the noise about passwordless authentication, hardware tokens and biometric authentication can be difficult. This session separates hype from the reality, theoretical from possible, and provides context of how to think about and invest in new user authentication technologies.
Monday, August 22, 2022 / 12:30 PM - 01:00 PM PDT
Felix Gaehtgens, VP Analyst, Gartner
Many organizations struggle with PAM after some small initial success, can't manage to get further. This session sheds light on: Why is PAM such a crucial piece of any security program? What are the common pitfalls? What should you do in the near, medium and long term?
Monday, August 22, 2022 / 12:30 PM - 01:00 PM PDT
Paul Rabinovich, Sr Director Analyst, Gartner
Implementing hybrid identity for Microsoft 365 and protecting employee, administrator and partner access can be daunting. This session will guide you through best practices for Microsoft 365 IAM.
Monday, August 22, 2022 / 12:30 PM - 01:00 PM PDT
Patrick Hevesi, VP Analyst, Gartner
Information security is frequently cited as a top obstacle to the adoption of cloud computing, yet improved security is cited as a top driver for adoption of cloud computing. This session will explore the current and future state of cloud security spanning infrastructure, platform and software as a service offerings, including hybrid cloud security and emerging distributed cloud and edge computing security issues.
Monday, August 22, 2022 / 12:45 PM - 02:30 PM PDT
Monday, August 22, 2022 / 01:00 PM - 02:30 PM PDT
Join us for a dessert reception on the Exhibit Showcase where you can engage with peers, Gartner experts, and exhibitors while enjoying delicious treats. Evaluate industry offerings that can move your business forward. Attend a theater session to see technology in action.
Monday, August 22, 2022 / 01:15 PM - 01:35 PM PDT
Brjann Brekkan, Identity and Security Architect, Microsoft
In the past few years as businesses evolved the ways in which they work, enterprise IT organizations were compelled to accelerate their identity modernization to adapt to a new normal of “work from anywhere”, “on any device”. This exposed the challenges of using on-premises authentication technologies and platforms as the control plane for enterprise applications and collaboration. Come join the Microsoft Identity product group for an interactive session where we will discuss the latest trends and platform capabilities to accelerate and simplify this journey.
Monday, August 22, 2022 / 01:15 PM - 01:35 PM PDT
Kevin Bocek, VP Strategy, Venafi
The number of machines of all types is on the rise. Every machine requires an identity. Compromise, misuse, and fraud of machine identities are prime attack vectors. Errors create debilitating outages and result in millions of dollars in lost revenue. That’s why leading analysts are recommending Machine Identity Management as a top security trend. During this session, we will discuss the impact that this is having on an organization’s ability to move faster in their quest for Digital Transformation and the steps that should be taken to strengthen the enterprise security strategy and posture.
Monday, August 22, 2022 / 01:40 PM - 02:00 PM PDT
Greg Reynolds, SR. SOLUTIONS ENGINEER, Yubico
Passwords no longer ensure secure login. SMS and mobile authentication are phishable. Strong authentication of any person or thing is critical, and validating that the devices used for authentication are secure is critical to enabling Zero Trust. Mobile phone numbers are not uniquely tied to the user, and can easily be usurped by malicious actors. Attend this session to learn why not all MFA is created equal, and why strong authentication and phishing-resistant MFA should be an integral part of establishing trusted identities in support of your Zero Trust strategy.
Monday, August 22, 2022 / 01:40 PM - 02:00 PM PDT
Naren Jangid, FOUNDER & CEO, RAAH Technologies Inc
Chris Witeck, Vice President of Product Management, Delinea
Privileged accounts abound in every organization, many of them unmanaged, uncontrolled, or even unknown. Learn how a large retail/food supply customer in the US was able to secure privileged access and protect against ransomware and other threats with a well-executed PAM security strategy. Get ready for an interactive discussion with Delinea and RAAH Technologies aimed at addressing the primary security challenges that organizations are facing today and how privileged access can play a critical role.
Monday, August 22, 2022 / 02:05 PM - 02:25 PM PDT
Identity fraud rates have increased 44% since 2019 — and aren't slowing down.
But a better understanding of fraudster behaviors can help you to protect your business.
In this 20 minute session, we’ll be sharing proprietary data insights to examine how fraudulent behavior is changing.
Join to learn:
- How attack patterns have changed
- Which industries are being most heavily targeted
- Which global identity documents are most frequently targeted by fraud
Monday, August 22, 2022 / 02:05 PM - 02:25 PM PDT
Gal Helemski, CO-FOUNDER AND CTO/CPO, PlainID
Tom Ammirati, CRO, PlainID
Damon McDougald, Global Digital Identity Lead, Accenture
Moderated panel given by PlainID's CRO, Tom Ammirati, with panelists Gal Helemski, Co-Founder, PlainID & Damon MacDougald, Global Digital Identity Lead, Accenture. The panel discussion will cover the relevance of Next Generation Authorization including:
• The Impact of Policy Based Access Control (PBAC)
• Identity Aware Security - How Authorization drives security resiliency & addresses ZTA
• Market Trends - Externalization of Authorization (Homegrown vs COTS) & value of the "Authorizers" (i.e.: advanced access control at the edge)
Monday, August 22, 2022 / 02:30 PM - 03:00 PM PDT
Felix Gaehtgens, VP Analyst, Gartner
With many IT assets now outside traditional enterprise perimeters, IT leaders must rethink security. Enter the cybersecurity mesh architecture, a composable and scalable approach to extend security controls to distributed assets by decoupling policy enforcement from the assets being protected.
Monday, August 22, 2022 / 02:30 PM - 03:00 PM PDT
Henrique Teixeira, Sr Director Analyst, Gartner
Access management solutions are mature, rich with features and offer a broadened scope that overlaps with many adjacent areas. Learn how to better use the AM MQ and a five-step approach to select a long-lasting, cost-efficient AM solution.
Monday, August 22, 2022 / 02:30 PM - 03:00 PM PDT
Tom Scholtz, Distinguished VP Analyst, Gartner
There is no such thing as a perfect model for security organizations. Every enterprise must develop its own model, taking into consideration basic principles, practical realities and the challenges of digital transformation. This session will address the following:
. What are the trends and challenges in security organization design?
. What are the factors that influence security organization?
. What are the current best practices and conceptual design models for security organization?
Monday, August 22, 2022 / 02:30 PM - 03:00 PM PDT
Tarun Khandelwal, Information Security Program Executive, EQ Bank
In this session, will discuss how we grappled with, and continue to do so, with privilege exposures in a cloud environment. We’ll discuss the building blocks for our target state architecture for Identity, and how cloud entitlement management fits into that big picture. This session will also discuss lessons learned.
Monday, August 22, 2022 / 02:30 PM - 03:00 PM PDT
Vlad Shapiro, Founder, Costidity
Stan Hammer, Chief Technologist and Assistant CIO, Western Carolina University
In this session, we will take you on a journey of Identity Governance from 2014 to now. From past of decentralized, chaotic, technology-centric spiderweb of applications with no identity store, no visibilities of access and use, hidden institutional knowledge, to modern days of centralized identity governance platform, business and people-centric approach to IAM, policies and processes build on practical needs, 360 degrees views, better user experience and leadership recognition.
Monday, August 22, 2022 / 02:30 PM - 03:15 PM PDT
Patrick Hevesi, VP Analyst, Gartner
Come ask the expert any question on the acronym soup in Cloud Security - CASB, SSE, CSPM, CWPP, CNAPP, SASE, CSMA, CIEM and IAM. How the different products work, any questions on where to start and how to build your cloud security architecture.
Monday, August 22, 2022 / 02:30 PM - 03:15 PM PDT
Erik Wahlstrom, Sr Director Analyst, Gartner
Application modernization and zero-trust strategies demand modern identity protocols. But what modern identity protocol should I use for my use-case? Bring your own questions to this session about the usage and deployment about modern identity protocols such as OAuth 2.0, OpenID Connect, OPA, JWT or SCIM?
Monday, August 22, 2022 / 02:30 PM - 03:15 PM PDT
Gautham Mudra, Sr Director Analyst, Gartner
IGA is often used as a tool to automate various manual processes - up to and including the use of robots and AI. This session will give you an opportunity to ask questions around automation and IGA;
Monday, August 22, 2022 / 03:15 PM - 03:45 PM PDT
Wolfgang Goerlich, Advisory CISO, Cisco
The digital-first customer experience and remote-first workforce has pushed enhanced identity governance and zero trust from buzzword to reality. And yet, much of the conversation is still heavy on theory and light on practice. In 2021, Cisco completed a study of high-level practices which contribute to successful cybersecurity programs based on a rigorous survey of 5,000 practitioners. Within the study, we analyzed commonalities of organizations implementing and running Zero Trust. This session will share how EIG is working in the real world, and what the best programs have in common.
Monday, August 22, 2022 / 03:15 PM - 03:45 PM PDT
Karen Leavitt, IT Director, Unum Group
With 9 million users, customer delight is at the top of insurance company Unum’s list of priorities. From a customer experience perspective, that means high-availability for customer authentication and just-in-time provisioning at-speed. When it came time to migrate from legacy platforms, they needed to figure out a way to move customers with no hassle, and a performance boost. This presentation will discuss why their migration strategy hinges on a modern identity data platform to create a secure but frictionless experience for their customers.
Monday, August 22, 2022 / 03:15 PM - 03:45 PM PDT
Craig Currim, VP Customer Solutions & Field Engineerin, Transmit Security
Matthew Nunn, DIRECTOR - GLOBAL HEAD OF IAM ENGINEERIN, Citi
Matthew Nunn, Citi’s Director, Secure Authentication Architecture & Technology Engineering, will discuss the move to passwordless. He'll explore security, scale, resilience, architecture, and the use of FIDO for authentication and migrating away from OTPs and similar systems. He’ll share the economics of their decision and how they are solving for account recovery, user binding, FIDO portability across channels, and anti-fraud use cases.
Moderated by Transmit Security’s Field CTO, Craig Currium, this session is a must-attend for those responsible for a modern digital experience.
Monday, August 22, 2022 / 03:15 PM - 03:45 PM PDT
Barak Feldman, Manager, SVP, PAM and Identity Security
The rapid pace of digital transformation investments has led to a rise in cybersecurity debt, increasing the threat of attack. According to the 2022 CyberArk Identity Security Threat Landscape Report, 79% say security has taken a backseat in favor of accelerating digital initiatives. Learn about the impact of increasing digital identities on cybersecurity debt, and what building blocks can be put in place to strengthen defenses.
Monday, August 22, 2022 / 03:15 PM - 03:45 PM PDT
Jaime Lewis-Gross, VP, Solutions Engineering, Saviynt
Steven Edford, IAM ENGINEER, Phillips 66
Todd Werner, Manager, Brown-Forman
Jeremy Giacchi, SYSTEMS ARCHITECT, WAWA
The path to Cloud Identity Transformation is challenging with the modern cyber risk landscape changing every day. New vulnerabilities arise that security & identity professionals must fight against to keep their organizations safe. From managing remote workforces to protecting global supply chains, corporations must think differently and adopt an identity-based security perimeter to stay prepared. Hear from IAM experts at Brown-Forman, Wawa, and Phillips 66 as they explore how the right Identity strategy can go beyond solving compliance & operational efficiencies to securing your business.
Monday, August 22, 2022 / 03:15 PM - 03:45 PM PDT
Imagine having to provide identity and access for over half a million employees, with a highly customized, single tenant, on-premises platform. And at the same time, having to provide similar services for over 26 million global customers with a separate, antiquated first-generation IDaaS solution. Transforming these authentication services would require significant infrastructure modernization and consolidation…and a lot of self-examination. Join us to learn how even the largest organizations can centralize and modernize internal and external identity and access and thrive in the process.
Monday, August 22, 2022 / 03:15 PM - 04:00 PM PDT
Morey Haber, CSO, BeyondTrust
Remote working is now commonplace.In this increasingly perimeter-less world, organizations must embrace zero trust security principles, such as least privilege, continuous authentication and monitoring, segmentation, and identity management to stay secure all while moving digital transformation initiatives forward.Join this session with Morey J. Haber, CSO at BeyondTrust who will clarify and break down:
•The Reality of Zero Trust?
•Zero Trust vs. Zero Trust Architecture–Are They Different?
•The Path to Zero Trust You Should Consider
•8 Ways Privileged Access Management (PAM) Enables Zero Trust
Monday, August 22, 2022 / 04:00 PM - 04:30 PM PDT
David Chase, Sr Director Analyst, Gartner
Access management is a key part of identity first security. Organizations need to optimize AM activities in the context of broader identity, security and business goals, for example as part of an identity first security, zero-trust or cloud first initiatives.
Monday, August 22, 2022 / 04:00 PM - 04:30 PM PDT
Mary Mesaglio, Managing Vice President, Gartner
CIOs make critical decisions every day — decisions that impact the viability and success of the organization, and the quality of life of the people who work there. Make those decisions count by understanding how to frame and evaluate your options using proven frameworks for every type of decision.
Monday, August 22, 2022 / 04:00 PM - 04:30 PM PDT
Homan Farahmand, VP Analyst, Gartner
Decentralized identity and verifiable claims will disrupt IAM by enabling a shared trust model, protocol-based controls, and decentralized identity data exchange. In this session we discuss how organizations can leverage these technologies to drive efficiency in identity verification and data exchange for business processes in digital ecosystems.
Monday, August 22, 2022 / 04:00 PM - 04:30 PM PDT
Andrew Cameron, IT Fellow, Identity & Access Management, General Motors
For GM to blaze a trail to its "All Electric Future", an IT foundation that supported a secure path to all their digital services was required. This session will highlight how General Motors developed a cybersecurity strategy that focused on identity services as the core element of the approach. Insight will be presented that details how each element of a zero-trust strategy can be realized thru a set of identity services that enable a secure digital enterprise. Additionally in the journey is a transformation from a “private to hybrid” cloud infrastructure model for IT resources and how Zero Trust principals play such a critical role. Of course, some bumps and bruises will be absorbed along the "Drive to ZTA" and best practices and guidance will be covered. Finally, leveraging the NIST Cybersecurity Framework will be covered as well.
Monday, August 22, 2022 / 04:00 PM - 04:45 PM PDT
Paul Rabinovich, Sr Director Analyst, Gartner
Whether you are just starting on a Microsoft 365 deployment or have had one for some time, threats against your users continue to evolve. IAM controls in Microsoft 365 must adapt accordingly.
Monday, August 22, 2022 / 04:00 PM - 04:45 PM PDT
Felix Gaehtgens, VP Analyst, Gartner
Privileged access is the prime cause of breaches, yet more people than ever require it for their work. Requirements for PAM are evolving quickly to include hybrid multicloud scenarios and machine identities. Bring your questions about trends, best practices to this session.
Monday, August 22, 2022 / 04:00 PM - 04:45 PM PDT
Henrique Teixeira, Sr Director Analyst, Gartner
CIEM is a breakaway theme in IAM, leveraging identity analytics and AI to help mitigate cloud identity risks. As the number of vendors proliferate, and not a lot of success stories exist yet, it becomes hard to differentiate fact from fiction. Bring your own questions about CIEM, cloud identity, AI and analytics in IAM.
Monday, August 22, 2022 / 04:45 PM - 05:05 PM PDT
Matt Luckett, VP CUSTOMER RELATIONS, Axiomatics
Identity and security leaders recognize authorization delivered in siloes is running rampant throughout their organization. The only way to defeat these isolated instances is to offer a more secure, scalable and easy-to-use alternative – orchestrated authorization (OA).
In this session, you will learn:
- How OA provides developers the tools to quickly build authorization policies and meet the demands of the cybersecurity mesh architecture (CSMA); and
- Provides the business an easy-to-use experience for developing the demanding, complex policies required at the application layer.
Monday, August 22, 2022 / 04:45 PM - 05:05 PM PDT
Chip Hughes, VP Product Management, ForgeRock
Identity governance is as critical to businesses as ever. Digital transformation, SaaS adoption, and the need to support the remote workforce have reinforced the need for organizations to continually review users’ access and enforce least privilege. But challenges around scale, user experience, and administrative complexity often lead to distressed and/or unsuccessful IGA implementations. Join this session to get a fresh perspective on how to leverage AI, big data, and cloud to overcome these challenges and see a preview of ForgeRock’s next generation of cloud-delivered identity governance.
Monday, August 22, 2022 / 05:15 PM - 06:00 PM PDT
Heather Younger, CEO of Employee Fanatix, Employee Fanatix
A culture of listening and employee feedback is crucial for organizational success as we prepare for the future of work. For the last 12 years, Heather has reviewed over 25,000 employee engagement surveys. This keynote distills that knowledge into actionable insights that have been proven to lead to better employee engagement, better customer satisfaction, higher revenue, lower turnover, and brand loyalty.
This keynote will demonstrate:
• How to practice active listening with those who look to them for guidance
• A listening process that will unlock valuable insights and deliver desired outcomes
• Characteristics needed to reach goals and create win-win scenarios at work
Monday, August 22, 2022 / 06:00 PM - 07:30 PM PDT
Join us for a networking reception on the Exhibit Showcase where you can engage with your peers, Gartner experts, and exhibitors while enjoying delicious food and beverages. Evaluate industry offerings that can move your business forward. Attend a theater session to see technology in action.
Monday, August 22, 2022 / 06:15 PM - 06:35 PM PDT
Hed Kovetz, CEO & Co-Founder, Silverfort
MFA and other identity security controls are very effective in stopping cyber attacks, and are widely used on modern apps, but until now they couldn’t be applied to legacy apps, service accounts (non-human identities), command-line interfaces, OT systems and many other critical resources. These ‘blind spots’ are targeted in almost all data breaches and ransomware attacks, and often prevent compliance with regulations and cyber insurance requirements. Join this session to learn how your existing MFA and modern identity solutions can be extended to all these legacy assets using a new technology.
Monday, August 22, 2022 / 06:15 PM - 06:35 PM PDT
Christopher Hickman, Chief Security Officer, Keyfactor
IAM practices have traditionally focused on users (aka humans). The problem with that is your digital workforce is part human, part machine. The seismic shift to dynamic workloads, AI-driven technologies, and mobile, and IoT devices has driven rapid growth in the use of PKI and machine identities, such as TLS certificates, SSH keys, digital signatures, and other secrets.
Join Chris Hickman, CSO, as he discusses the challenges of managing machine identities, as well as strategies and tactics to overcome security risks.
Monday, August 22, 2022 / 06:40 PM - 07:00 PM PDT
Dan Dagnall, CEO, Fischer Identity
A Zero Trust security model can be used to help organizations achieve their digital transformation goals. Network solutions can assist in guarding and segmenting, but to truly achieve the Zero Trust model, you must rely more on identity focused controls. Because this model states "never trust, always verify," getting to the granular level is critical for managing identities for users, contractors, partners, and other enterprise resources. Learn how to improve not only the user experience but also security practices, with identity playing a key role in enforcing trust beyond the network.
Monday, August 22, 2022 / 06:40 PM - 07:00 PM PDT
David Gibson, CMO, VARONIS
We’re expected to work from anywhere from any device and there are more data and applications on-premises and in the cloud built for collaboration, connected through a myriad of APIs, and with unique configuration stacks that the attack surface will only grow. Organizations must manage the tension between security and productivity. With an “assume breach” mentality, organizations must turn to the concept of measuring and reducing the “blast radius” by ensuring zero trust and useful monitoring of not just the networks, but to the target of cyberattacks: data.
Monday, August 22, 2022 / 07:05 PM - 07:25 PM PDT
Neeraj Methi, VP, Solutions, BeyondID
A seamless omnichannel user experience has been a focal point for companies engaging in new digital initiatives. Identity Mgmt. is a consequential technology that sits at the front door of every user (people or machine) interaction, an opportunity to balance convenience, privacy, and security all in one. While this has been historically challenging, with businesses often forced to prioritize one over the other, the evolving role of UX in Zero Trust security across multiple industries demonstrates that seamless user experience does not need to be a tradeoff for strong security, and vice versa
Monday, August 22, 2022 / 07:05 PM - 07:25 PM PDT
Almog Apirion, CEO, Cyolo
The explosion of remote work is revolutionizing how businesses connect users and their work environments, but not without challenges. With people becoming the new perimeter, it makes sense that identity is the new key. But can you adopt this new modern authentication with your existing infrastructure?
Grab a drink and join Almog Apirion, CISO turned CEO as he shares how to retrofit your current infrastructure to utilize smart, identity-based keys that quickly and securely connect users.
You no longer have to compromise security or usability. You can have it all!
Tuesday, August 23, 2022 / 07:00 AM - 09:00 AM PDT
Tuesday, August 23, 2022 / 07:00 AM - 07:00 PM PDT
Registration and information hours for the day.
Tuesday, August 23, 2022 / 09:00 AM - 09:45 AM PDT
Matthew Luhn, Story Consultant, Animator & Creative Writing Instructor,
Big data is changing everything from content development to culture itself. Matthew Luhn, a 20 year Pixar story veteran will share how big data is being used to create great stories and characters in films like Toy Story 3, Inside Out and beyond. Matthew’s experience and insight will empower and inspire publishers, advertisers and innovators on how to forge stronger, more meaningful connections with consumers.
Tuesday, August 23, 2022 / 09:45 AM - 05:45 PM PDT
Are you ready to challenge your peers, and become the next IAM Smackdown champion?
Play Battle of the Brains to win the championship belt! Taking place at the Sath IDHub booth throughout the show, all participants win a prize.
IDHub - Simply Powerful, Identity Management.
Tuesday, August 23, 2022 / 09:45 AM - 05:45 PM PDT
Engagement Zone sponsored by Okta, Inc.
Tuesday, August 23, 2022 / 09:45 AM - 05:45 PM PDT
Engagement Zone sponsored by Transmit Security
Tuesday, August 23, 2022 / 09:45 AM - 07:15 PM PDT
Visit the Exhibit Showcase to evaluate industry offerings that can move your business forward. Engage with your peers, Gartner experts, and exhibitors. Attend a theater session to see technology in action.
Tuesday, August 23, 2022 / 10:00 AM - 10:20 AM PDT
James Hoover, Principal Analyst, Gartner
This session will present the Magic Quadrant and Critical Capabilities for Access Management market, 2022.
Tuesday, August 23, 2022 / 10:00 AM - 10:20 AM PDT
Rebecca Archambault, Sr Director Analyst, Gartner
Identity and Access Management leaders should use this Market Guide to aid in making decisions about identity governance and administration products.
Tuesday, August 23, 2022 / 10:30 AM - 11:00 AM PDT
Homan Farahmand, VP Analyst, Gartner
PAM is a complex cyber defense discipline that requires careful technical planning for coverage areas. In this session we discuss the basic and emerging controls architecture to drive a zero standing privilege model for multi-cloud and hybrid environments. This includes PAM best practices and what works practically, considering organizational challenges and tools limitations.
Tuesday, August 23, 2022 / 10:30 AM - 11:00 AM PDT
Felix Gaehtgens, VP Analyst, Gartner
This session covers why everyone speaks about how artificial intelligence might solve security and risk management challenges, but struggle when asked to provide a concrete example. It will show examples of what we call AI today.
Tuesday, August 23, 2022 / 10:30 AM - 11:00 AM PDT
Henrique Teixeira, Sr Director Analyst, Gartner
Entitlement management used to be a manageable problem. However, with the explosion of many thousands of permissions per identity in cloud infrastructures, legacy IAM approaches are no longer sufficient. Join this session to learn what cloud infrastructure entitlement management means, and how can it help to mitigate identity risks in the cloud.
Tuesday, August 23, 2022 / 10:30 AM - 11:00 AM PDT
Tobi Bet, Sr Director Analyst, Gartner
Workplace and supplier diversity is at the forefront of organizations’ minds. Beyond the ethical and moral benefits, DEI can protect against an increasingly broad range of cyber attacks. We will discuss the business case for DEI, how to develop a one-page DEI strategy and how to grow your employee and supplier diverse base.
Tuesday, August 23, 2022 / 10:30 AM - 11:00 AM PDT
Paul Furtado, VP Analyst, Gartner
Ransomware attacks have been morphing. Techniques used by the bad actors are changing. During this presentation, we will provide insight into the new tactics being used by the bad actors not only to access your environment, but what they are doing with your data once exfiltrated. Finally, we will also provide current data on the financial impact of a ransomware attack.
Tuesday, August 23, 2022 / 10:30 AM - 11:15 AM PDT
Bernard Woo, Sr Director Analyst, Gartner
Privacy regulations are increasing including either data residency or data localization requirements. This session is an opportunity for you ask questions about managing customer consent and preferences in such a rapidly evolving environment.
Tuesday, August 23, 2022 / 10:30 AM - 12:00 PM PDT
David Chase, Sr Director Analyst, Gartner
Modern architectures and applications place additional demands on access management tools. This workshop will introduce access management evaluation criteria guidelines and discuss what features you should look for and what vendors to consider for your next employee access management solution.
Tuesday, August 23, 2022 / 11:15 AM - 11:45 AM PDT
Morey Haber, CSO, BeyondTrust
Spencer Levels, Endpoint Security Systems Administrator, L3Harris Technologies
Spencer Levels knows a thing or two about data. It’s proven to be his source of truth for standardizing products, securing operations, socializing users and measuring success to make strategic decisions, and ultimately be successful. With a major merger came the need to rationalize security tools and lock down endpoints. In a three-phase project, Spencer leans on his history in analytics and data-focused operations at NASA. Learn how you too can pioneer a data-first PAM strategy, lead a cultural mindset shift, avoid roadblocks along the way and work smarter with the data available to you.
Tuesday, August 23, 2022 / 11:15 AM - 11:45 AM PDT
Vadim Lander, Symantec Identity Security Chief Architect and CTO, CA
Modern applications and environments are driving a new Identity Fabric. Are you ready to build yours? Join Vadim Lander, Chief Architect and CTO at Broadcom Software, as he discusses the design considerations to evolving your Identity and Access Management solution to build a Zero Trust foundation and bridge the identity gap across your hybrid environment.
Tuesday, August 23, 2022 / 11:15 AM - 11:45 AM PDT
Getting IAM right is hard enough. Now there’s talk of decentralized identity, digital wallets, and issuers. Still, some of us shudder just at the thought of moving IAM to the cloud. Transformation can be intimidating, but it doesn’t have to be. Whether for consumers, citizens, classrooms, or workforce, there are safe, reasonably simple ways to modernize, even with legacy apps, to establish consistent SSO, manage granular access policies, survive an MFA rollout, and even add risk scoring. In this session, hear from those who’ve been there, done that…you’ve arrived at your destination.
Tuesday, August 23, 2022 / 11:15 AM - 11:45 AM PDT
Modern attacks seek to compromise on-premises identity infrastructure itself to gain unrestricted access to multi-cloud environments and workloads wherever they are deployed. It’s no longer enough to keep accounts from getting hacked – we must ensure robust protections for the account infrastructure. Join us to learn how Microsoft envisions the future of identity threat detection and response and what effective and efficient identity/security collaboration should look like for your organization to grow fearlessly!
Tuesday, August 23, 2022 / 11:15 AM - 11:45 AM PDT
Larry Chinski, VP, GLOBAL CUSTOMER ADVOCACY, One Identity
There has been a shift in the credential-based cyber security market causing organizations to rethink their security posture. Traditional IAM tools, deployed in a fragmented, tactical fashion are no longer able to effectively protect against cyber attacks, specifically ransomware. Understanding this shift, past responses, and the best path for future-proofing your IAM platform is critical for mitigating risk and building a flexible yet controlled identity-based ecosystem. We will discuss this approach and create a roadmap for success based on the current threat surface and the future of IAM.
Tuesday, August 23, 2022 / 11:15 AM - 11:45 AM PDT
Brian Iverson, Chief Product Officer, Tuebora
IGA has a well-deserved reputation for being big, slow and expensive. Much of the pain of IGA deployment and operation is related to the onboarding of IT systems to bring them under management. What if it didn't have to be this way? Cloud-native IGA offers the opportunity reinvent the way IT systems are onboarded. This session will demonstrate the ways that Tuebora is helping organizations accelerate the onboarding of IT systems so organizations can more effectively manage their access risk.
Tuesday, August 23, 2022 / 11:15 AM - 12:00 PM PDT
Ratul Shah, HEAD OF PRODUCT MARKETING SAP CUSTOMER D, SAP
Christopher Ohara, HEAD OF GLOBAL MARKETING & SOLUTIONS, CU, SAP
How do you 10x your commerce revenue? The Answer: A Customer Identity and Access Management solution that removes friction, enhances security, addresses data privacy, and forms the foundation of your holistic customer data strategy. Join this discussion to learn how identity and consent are changing how organizations approach customer-centricity.
Tuesday, August 23, 2022 / 12:00 PM - 12:30 PM PDT
Erik Wahlstrom, Sr Director Analyst, Gartner
In this session we will look at a best-of-breed verses all-in-one tooling discussions of the expanding portfolio of tools that manage our machine identities, secrets, keys and certificates.
Tuesday, August 23, 2022 / 12:00 PM - 12:30 PM PDT
Paul Rabinovich, Sr Director Analyst, Gartner
Everyone agrees that MFA is a must when it comes to protection against account takeover attacks, but MFA requirements evolve. In this session we will discuss results of Gartner's most recent solution comparison of capabilities of six leading cloud-based MFA vendors.
Tuesday, August 23, 2022 / 12:00 PM - 12:30 PM PDT
David Collinson, Sr Director Analyst, Gartner
This session will help provide IAM leaders with best practice advice to both select and then deploy an IGA tool. Starting with what an IGA tool comprises of, and working methodically through the stages of the buying journey it will help IAM leaders select the right product for their organization. The second part of the presentation will then focus on how to succesfully deploy it.
Tuesday, August 23, 2022 / 12:00 PM - 12:30 PM PDT
Bernard Woo, Sr Director Analyst, Gartner
In this presentation, Gartner will address the prevalent new fraud threat that is keeping end user leaders awake at night. In this presentation we will explore an overview of ATO fraud, what the impact is to financial institutions and end users, and what action plan can be initiated to address this new issue
Tuesday, August 23, 2022 / 12:00 PM - 12:30 PM PDT
Sriram Santhanam, Sr. Director, Information Security, Gap Inc.
Cloud platforms help organizations deliver applications and value to their customers faster than ever before. However, fast-moving agile DevOps teams often run ahead of security and, with powerful access they normally possess in multiple cloud environments, present a major risk to the enterprise. Is this session, we look at ways to balance agility, security, and developer experience to realize benefits provided by cloud while maintaining effective privileged access controls. Addressing real world insights, lessons learned, and best practices that can help plan and execute successful cloud transition for your development organization while minimizing risks.
Tuesday, August 23, 2022 / 12:00 PM - 12:45 PM PDT
Nat Krishnan, Sr Director Analyst, Gartner
CIAM offerings continue to expand to include features like customer identity analytics and consent management, along with maturing access management features like secure customer authentication and API access controls. Bring your own questions about CIAM to discuss recommended practices and how to plan for enriched user experience through CIAM offerings.
Tuesday, August 23, 2022 / 12:15 PM - 02:00 PM PDT
Tuesday, August 23, 2022 / 12:30 PM - 02:00 PM PDT
Join us for a dessert reception on the Exhibit Showcase where you can engage with peers, Gartner experts, and exhibitors while enjoying delicious treats. Evaluate industry offerings that can move your business forward. Attend a theater session to see technology in action.
Tuesday, August 23, 2022 / 12:45 PM - 01:05 PM PDT
Hal Granoff, Head of US Market Development, Callsign
With online threats evolving at the pace of new technologies it’s a constant game of catch-up for organizations to stay secure, but these threats need to be managed without impacting the user journey or, invading privacy - it’s a complex challenge.
Hal Granoff (Callsign) and Reuben Stewart (Truist) will discuss how organizations can streamline their fraud prevention strategy and utilize new technologies from behavioral biometrics to orchestration solutions to meet a new digital world that combines privacy, security, and minimal friction for consumers.
Tuesday, August 23, 2022 / 12:45 PM - 01:05 PM PDT
Jimmy Dunn, SENIOR PRODUCT MARKETING MANAGER, Sift
The Fraud Economy is sophisticated, interconnected, and focused on exploiting online businesses. A growing number of attacks start with Account Takeovers (ATO). Sift exclusive research, during the last Black Friday/Cyber Monday shopping period found ATO fraud rose by a gut-wrenching 2,950% in the omnichannel retail sector. This session will discuss the importance to move from reactive account defense to proactive authentication, how passwordless authentication using biometrics can help secure your users’ accounts and conclude with best practices to future-proof your fraud prevention strategy.
Tuesday, August 23, 2022 / 01:10 PM - 01:30 PM PDT
Amid the changing security environment, passwordless multifactor authentication plays a key role. It is in fact the attack vector for which many other threats originate and then propagate. And the only way to address the current operating paradigm is to fix the way the world logs in. So how do we get there from here? In this session, we will address: 1. The gaps in legacy MFA 2. Advantages of passwordless MFA and how it solves today's security gaps 3. The evolving world of ZTA and CARTA. Best practices and the essential role of the endpoint
Tuesday, August 23, 2022 / 01:10 PM - 01:30 PM PDT
Learn how enterprises are leveraging cutting edge technologies in online identity verification for identity and access management in a remote world. Taking a step beyond passwords and one-time passcodes, enterprises are using identity proofing technology to further secure corporate user accounts and data. Discover the case study from Veriff.
Tuesday, August 23, 2022 / 01:35 PM - 01:55 PM PDT
The next generation of identity is upon us, and it starts with the platform. While identity has traditionally been confined to siloed best-of-breed solutions, there’s a fundamental shift happening in the industry. More than half of IT workers use ITSM to govern access and permissions, according to recent research. This session will explore why the rise of cloud-native, platform-first identity is the future. Attendees will learn how this approach reduces silos between functional areas like HR, IT, SecOps, and GRC, ensures usability, and accelerates time-to-value through the Now Platform.
Tuesday, August 23, 2022 / 02:00 PM - 02:30 PM PDT
Nat Krishnan, Sr Director Analyst, Gartner
What are companies doing for CIAM? How can you differentiate yourself from your competitors through a superior CIAM portal that your customers love? What are the main considerations, and how is privacy regulation impacting these decisions? We will discuss top practices around CIAM, how to take your CIAM initiative to the next level and how to plan for the best user experience to achieve your goals.
Tuesday, August 23, 2022 / 02:00 PM - 02:30 PM PDT
Paul Rabinovich, Sr Director Analyst, Gartner
Gartner clients often ask if they can drop their Active Directory and migrate to a cloud-based identity service. Technology is already in place to support this journey, but do real-world Active Directory customers actually take it? In this session we will share the results of a Gartner survey about the future of Active Directory as seen by end-user organizations.
Tuesday, August 23, 2022 / 02:00 PM - 02:30 PM PDT
Ant Allan, VP Analyst, Gartner
In quantum physics there is a famous thought experiment in which you don’t know if a cat is alive or dead until you open the box containing it. Similarly, you may not truly know – until it is too late – if the person accessing your systems is your employee or customer or an attacker. How does CAT let you resolve this with greater confidence than legacy MFA? How does CAT fit within zero trust and adaptive access approaches?
Tuesday, August 23, 2022 / 02:00 PM - 02:30 PM PDT
André Gowens, Vice President, Enterprise Architecture, Software Engineering & Data/Analytics, Seminole Hard Rock Support Services
Customer Identity Access Management (CIAM) is a vital component of organizations dealing with different entities, especially organizations that see growth via M&A. Seminole Hard Rock's user experience journey started with the requirement of having a 360 degree view of patrons across its multiple assets in the hospitality sector.
This session explores Seminole's journey; we look at what the requirements were, the unique challenges in our ecosystem, how we overcame those challenges and satisfied the requirements, and launched our internal digital platform.
Tuesday, August 23, 2022 / 02:00 PM - 02:30 PM PDT
Mandy Huth, VP, Cybersecurity, Kohler Co.
Kohler, a leading manufacturer out of Wisconsin, needed to implement strong identity lifecycle and entitlements management, adhere to NIST frameworks, and enable their workforce with a modern, cloud based IGA solution. This was important for Kohler’s overall IAM strategy to protect their IP, provide a secure and efficient user experience, and manage identities from hire date to retirement. Join this session to learn about Kohler partnering with Omada to secure and manage their 30,000 identities.
Tuesday, August 23, 2022 / 02:00 PM - 02:45 PM PDT
Henrique Teixeira, Sr Director Analyst, Gartner
The promise of decentralized identity (DCI). Is privacy and security not possible today? But how close are we, and is this approach viable? We will discuss the maturity of DCI in the market today, as well as possible real world applications for verifiable claims, which will promote the adoption of DCI.
Tuesday, August 23, 2022 / 02:00 PM - 03:00 PM PDT
Tobi Bet, Sr Director Analyst, Gartner
Traditional deals, such as data center outsourcing and cloud-based solutions such as infrastructure as a service (IaaS) have unique attributes and requirements with changes occurring frequently as the market matures.This session will provide sourcing executives and procurement managers with key attributes and contract examples to help organizations understand what to look for and how to negotiate deals.
Key issues:
• What are the differences between traditional and emerging cloud based contracts, KI?
• What opportunities do I have to negotiate these contracts?
• What do I do to limit risk via the contracts?
Tuesday, August 23, 2022 / 02:00 PM - 03:30 PM PDT
Rebecca Archambault, Sr Director Analyst, Gartner
Brian Guthrie, Director Analyst, Gartner
Knowing what metrics matter to your IAM stakeholders is critical to prioritizing, developing and monitoring IAM features. Metrics identify the success of individual projects and where attention and improvements must take place. To succeed, they must be terms the stakeholder recognizes and understand. They should also align with or influence other initiatives. Learn how to set proper expectations.
Tuesday, August 23, 2022 / 02:45 PM - 03:15 PM PDT
Alex Wong, DIRECTOR OF PRODUCT MANAGEMENT, Ping Identity
Securing the customer experience doesn’t end at authentication. Once a customer signs to your app, your business must deliver a personalized, seamless experience that remains secure and minimizes risk. If authentication is the digital front door, how do you properly govern what your customers see and do once they are in? Take an identity-centric approach that uses dynamic policies that rely on a multitude of risk and fraud signals to drive intelligent authorization decisions. Learn how you can leverage dynamic authorization to extend security throughout the customer experience.
Tuesday, August 23, 2022 / 02:45 PM - 03:15 PM PDT
Bassam Al-Khalidi, CO-CEO, Axiad IDS, Inc.
Eric Brown, SENIOR DIRECTOR, CYBERSECURITY IAM, Cognizant
Passwordless is hot because it offers a balance between security and usability. But a loophole may exist that can be exploited. Many who have complex IT environments and perhaps existing workflows and IAM investments, often pursue authentication in silos. This fragmentation can lead to gaps and inconsistencies that can leave your most-valuable assets exposed. Learn how taking an integrated approach to passwordless—across all key credentials, operating systems, and IAM ecosystems—can help close those gaps and deliver phishing-resistant workflows, lower friction, and a path to Zero Trust.
Tuesday, August 23, 2022 / 02:45 PM - 03:15 PM PDT
Adam Gunther, SVP AND CPO, GLOBAL IDENTITY AND FRAUD, Equifax, Inc.
5% of CFOs think they have a fraud problem. 100% of CFOs have a revenue problem. Businesses striving to be at the forefront of digital transformation can evolve their identity and access management from a risk and operational concern to an opportunity for better customer engagement. This session will focus on real and tangible ways in which you can leverage identity and account data to better understand your customers, enhance loyalty, and drive revenue.
Tuesday, August 23, 2022 / 02:45 PM - 03:15 PM PDT
Geethika Cooray, VP & GM IAM BU, WSO2
B2B Customer Identity and Access Management (CIAM) transforms how businesses interact with third parties such as customers, partners, distributors, brokers, etc. within their value delivery chain. Traditional CIAM solutions that focus mostly on B2C needs fall short when it comes to tackling the more sophisticated requirements of B2B. This session will demonstrate use cases of how WSO2’s CIAM has helped leading organizations worldwide to connect with their extended value chain profitably. You’ll hear firsthand from WSO2 customer Nutanix about their B2B journey.
Tuesday, August 23, 2022 / 02:45 PM - 03:15 PM PDT
Peter Muller, PRINCIPAL SECURITY ARCHITECT, IAM, DocuSign
Nicholas Brown, CRO, Hitachi ID
DocuSign is executing a major greenfield Identity Governance program. This session will cover DocSign's approach from identifying and analyzing existing manual processes to rolling out reliably automated solutions that enables the business to scale rapidly. It's a multi-year undertaking that, by design, also adapts to the company’s changing priorities and accompanies all of the major initiatives where identity is key.
Tuesday, August 23, 2022 / 02:45 PM - 03:15 PM PDT
Anil Bhandari, Chief Mentor, Arcon Techsolutions
Amid the increasing pace of digitization, a growing number of organizations are managing their workloads on the basis of hybrid model. A Hybrid model by design leads to dispersion of the corporate data across different environment. While security components like multifactor authentication (MFA), Single Sign-On (SSO), among others, provide strong layers of security around data, having a Corporate Identity related threat detection and response mechanism which is based on data contextual model enables the organization build a proactive information security posture.
Tuesday, August 23, 2022 / 02:45 PM - 03:30 PM PDT
Identity is the apex control for network security. Attackers continue to exploit existing vulnerabilities for profit by increasing attack surfaces through cloud services. Our session addresses the crucial need for attack surface monitoring & lateral movement detection to identify potential threats, mis-configurations, and attacker techniques.
Join this ETSS with QOMPLX to learn:
>How cloud providers and other vendors can extend attack surfaces
>Attacker techniques that compromise on-premise Active Directory or cloud services
>Best practices for threat identification and network defense
Tuesday, August 23, 2022 / 03:30 PM - 04:00 PM PDT
Ramon Krikken, Managing Vice President, Gartner
Solid IAM programs are crucial to zero trust strategies. Without IAM, zero trust strategies are doomed to fail. In this session, you will learn:
- High-level zero trust strategy and its relation to IAM programs
- How zero trust and identity architectures fit together
- Practical zero trust technologies implementations and their impact on identity
Tuesday, August 23, 2022 / 03:30 PM - 04:00 PM PDT
Erik Wahlstrom, Sr Director Analyst, Gartner
In this technical session we will establish an agile and composable identity fabric that supports API access control that consists of multiple types of identity tools and components that together enable encryption, authentication and authorization for your distributed APIs.
Tuesday, August 23, 2022 / 03:30 PM - 04:00 PM PDT
Felix Gaehtgens, VP Analyst, Gartner
Through a selection of relevant Gartner insights and complementary methodologies, we will provide insight into latest updates in the privileged access management market.
Tuesday, August 23, 2022 / 03:30 PM - 04:00 PM PDT
Ant Allan, VP Analyst, Gartner
The twilight of the passwords has long been foretold but is now, at last, upon us. Security and UX are key drivers for passwordless authentication. But how can IAM leaders choose among the many passwordless approaches? Which are the most effective? Where do novel methods add value? What is the role of FIDO2? How does passwordless authentication fit with zero trust, adaptive access and the identity fabric? How can you craft a cohesive strategy across multiple use cases?
Tuesday, August 23, 2022 / 03:30 PM - 04:00 PM PDT
Melissa Carvalho, Canada Ambassador, Women in Identity
Kimberly Sutherland, Board Member, Women in Identity
The cornerstone of the digital world is trust! More than one billion people worldwide lack a basic verifiable identity. Without recognizable and consistent proof of identity there can be no financial, health, citizen or digital inclusion. The Women in Identity “Code of Conduct” initiative was established to set guiding principles and an implementation framework for organizations. This presentation will provide practical and pragmatic methods to becoming a truly inclusive sector.
Tuesday, August 23, 2022 / 03:30 PM - 04:15 PM PDT
Mary Mesaglio, Managing Vice President, Gartner
It’s hard to be a leader right now. The world seems be lurching from crisis to crisis. There’s not time to adjust, let alone recover. This session is focused on the practical: tactics that leaders can use to keep their teams motivated, even as everyone is exhausted and the crises multiply. The emphasis is on what that attendees can immediately put into practice.
Tuesday, August 23, 2022 / 03:30 PM - 04:15 PM PDT
Paul Furtado, VP Analyst, Gartner
Ransomware attacks have been morphing. Techniques used by the bad actors are changing. Come ask our experts how you can best protect, defend and respond to this threat
Tuesday, August 23, 2022 / 04:05 PM - 04:25 PM PDT
David Bullas, Director of Solutions Engineering, Authomize
Identity solutions across Access Management (AM), IaaS, SSO, Identity Providers (IdPs), and SaaS apps are all under attack by malicious actors seeking to undermine critical identity infrastructure. Join us to learn how you can detect and respond to threats such as:
1. SaaS identity and access threats like data exfiltration by permissions manipulation, privilege escalations, and using service accounts to create back-doors
2. Lifecycle threats like partial off-boarding, inactive accounts, and privilege creep
3.IdP attacks like stealing passwords, admin impersonation, and proxying SSO connections
Tuesday, August 23, 2022 / 04:05 PM - 04:25 PM PDT
Naren Jangid, FOUNDER & CEO, RAAH Technologies Inc
The IAM space is confusing and complex, where your decisions have severe impacts on your company. Selecting the best IAM products from a saturated pool, budgeting for the IAM program to accurately project ROIs, and building and maintaining in-house band-aid solutions are challenges you face every day. This session is for the IT leader who wants to clear the clutter to build functional, and scalable identity programs. We will address the various tiers of technical complexity in Privileged, Workforce, Partner, and Customer Identity environments.
Tuesday, August 23, 2022 / 04:30 PM - 05:00 PM PDT
Do you understand how your identity technologies align to your business? Identity Management program is a significant financial investment that takes years to fully realize the benefit. Two issues remain: The ability to deploy identity technology across all applications, and the ability to see real time information that provides the detail necessary to understand the cross-functional benefits of your Identity program. Learn how to connect the rest of your enterprise to your existing IAM program, and, to gain Visibility to the programmatic benefits of your IAM efforts.
Tuesday, August 23, 2022 / 04:30 PM - 05:00 PM PDT
Jim Taylor, CHIEF PRODUCT OFFICER, RSA
Learn how SecurID customers are addressing current challenges and preparing for the future of IAM. Continuous change—including fully remote workforces, new enterprise users, a growing attack surface and greater complexity—are reshaping work, becoming more entrenched and increasing risk. Inadequate IT stacks built on perimeter-based access and passwords no longer address the challenges resulting from SaaS applications, IT Disaggregation, the API economy, microservices and Cloud serverless. See how CISOs are future-proofing their business for a technological step change with next-gen IAM.
Tuesday, August 23, 2022 / 04:30 PM - 05:00 PM PDT
Enterprises today have structures that have changed than what traditionally it used to be. From remote workers across the globe, enterprise mobile apps, distributed supply chains and innumerable IoT devices and bringing everything under one identity platform needs a centralized approach. Identity orchestration could be a game changer for enterprises! Join us to go deeper about Identity Orchestration, current IAM program scenarios, drivers and enablers of orchestration in IAM, and how enterprises are doing it.
Tuesday, August 23, 2022 / 04:30 PM - 05:00 PM PDT
David Mahdi, CSO, Sectigo
Many CISOs and IAM leaders are doing their jobs with numerous siloed and incompatible solutions. Consolidation is a powerful approach but it's simply not possible when many vendors use closed and proprietary solutions. With the volume of digital identities growing exponentially, businesses need a modern approach to secure and manage their identities across complex IT infrastructures. Join this session to learn about the new ways to establish digital trust for human and machine identities leveraging Gartner’s Cybersecurity Mesh, and to gain visibility and lifecycle control for those identities.
Tuesday, August 23, 2022 / 04:30 PM - 05:00 PM PDT
Mickey Martin, DIRECTOR OF PRODUCT OUTREACH, PlainID
The enterprise perimeter is now its data objects, APIs, applications, and its users are now the workforce, customers, partners and in many cases, machines. In this new, decentralized, and highly segmented world, CISOs and IAM leaders find themselves struggling with multiple systems and interfaces that control the most basic question: Who has access to what and when?
In this session we will present a new architecture for Identity First Security based on centralized Access and Authorization Policy Management Platform, and discuss pro and cons, specific real-world implementations and more.
Tuesday, August 23, 2022 / 04:30 PM - 05:00 PM PDT
Lawrence Wolf, Managing Partner, Edgile
Ashish Chandra, GM and Practice Head, Wipro
As organizations continue their digital transformation, identity governance and administration (IGA) needs to account for ALL identities, not just employees. The cloud journey requires re-baselining IAM technologies and processes and developing a well-thought-out strategy to ensure key stakeholder buy-in. Join us as we discuss how two Fortune 100 companies transformed their IGA program with a strategy, roadmap, and business case. You’ll learn IGA best practices and how to effectively operate an IGA program with managed services.
Tuesday, August 23, 2022 / 04:30 PM - 05:15 PM PDT
Steve Hunt, Executive Advisor, Ravé Strategy
Learn the keys to excellence practiced at the best-run and most cyber-resilient organizations in the world. Steve Hunt, an inductee into the ISSA Hall of Fame, joined by a special guest from the FBI, will share their insights gleaned from cyber-crimes at hundreds of companies to discover steps you can take today to boost your organization’s resilience. Learn what you can do to protect the organization while also driving management to give you more budget. Everyone will leave this session feeling more empowered about their work-life, with actionable practical steps to be taken now.
Tuesday, August 23, 2022 / 05:15 PM - 05:45 PM PDT
Ant Allan, VP Analyst, Gartner
With more than 300 vendors in the user authentication market, choosing one or more vendors to fit your needs across a variety of use cases for employees and customers can be fraught with difficulty. How can you identify the most effective authentication methods (with or without passwords)? Where can you find the ablest providers among the IAM marketverse? Do you need to look beyond the methods already available within your IAM infrastructure?
Tuesday, August 23, 2022 / 05:15 PM - 05:45 PM PDT
Erik Wahlstrom, Sr Director Analyst, Gartner
In a world where identity is the only perimeter, identity-first security has become an imperative. IAM must be deployed more cohesively as a composable, distributed, resilient identity fabric. Organizations should also apply IAM best practices to more of their applications and services and to the IAM infrastructure itself.
Tuesday, August 23, 2022 / 05:15 PM - 05:45 PM PDT
Nat Krishnan, Sr Director Analyst, Gartner
Organizations with ITSM are looking for specific Identity Governance and Administration features to complement their current workflows. This research will discuss approaches to adding features, such as Identity lifecycle, Access reviews, and Access requests, leveraging ITSM instead of using IGA as a standalone service.
Tuesday, August 23, 2022 / 05:15 PM - 05:45 PM PDT
Mary Mesaglio, Managing Vice President, Gartner
There is a lot of corporate soul searching going on right now. Some enterprises are doubling down on their values while others are adopting new ones. In all cases, values are inspiring and exciting, but not enough on their own to drive change. This session covers the values-to-action pyramid, walking through practical ways to turn values into everyday behaviors.
Tuesday, August 23, 2022 / 05:15 PM - 05:45 PM PDT
Cynthia Phillips, Sr Director Analyst, Gartner
Technology leaders must skillfully lead change to support the strategic and digital transformation needs of the enterprise. This session will provide insights from change psychology that can help motivate employees through the transformation journey and make change STICK.
Tuesday, August 23, 2022 / 05:45 PM - 07:15 PM PDT
Join us for a networking reception on the Exhibit Showcase where you can engage with your peers, Gartner experts, and exhibitors while enjoying delicious food and beverages. Evaluate industry offerings that can move your business forward. Attend a theater session to see technology in action.
Tuesday, August 23, 2022 / 06:00 PM - 06:20 PM PDT
Joseph Salazar, TECHNICAL MARKETING, SentinelOne
Almost all attacks rely on credential abuse and privilege escalation to infiltrate and move laterally. Current identity protection solutions safeguard privileged credentials or secure authentication processes but leave gaps that new solutions must address. Identity Visibility solutions reduce the attack surface by identifying exposed credentials, domain controller vulnerabilities, and cloud overprovisioning. Identity Detection & Response (IDR) solutions add Active Directory and credential protection from theft and misuse. Join this session to learn about identity attacks and how to stop them.
Tuesday, August 23, 2022 / 06:00 PM - 06:20 PM PDT
Jason Ellis, Advisory Director, Integral Partners, LLC
Integral Partners will preview their complimentary IAM Essentials Advisory workshop, which provides a practical approach to IAM strategy development and building a secure program. Providing an understanding of how IAM technologies and best practices should fit into a high-level roadmap using the "3 pillars" of an IAM strategy, workshops are tailored to fit each organization's interests. Topics include an IAM "big picture" overview, components within a program, the IAM Maturity Model, creating a PAM report card, cyber insurance, demystifying Zero Trust, the marketplace, and building a roadmap.
Tuesday, August 23, 2022 / 06:25 PM - 06:45 PM PDT
Managed Services for IAM are an innovative and efficient approach to leverage a standardized level of security by utilizing factory patterns. However, DevOps working models require flexibility to enable independent development teams to act individually. It is crucial to ensure that central MSP approaches do not conflict or slow down agile development. Learn our session and learn more about 1) the role of IAM Managed Services in Zero Trust, 2) How IAM factory patterns enable DevOps teams 3) How MSP supports the execution of a Zero Trust Strategy on a global scale
Tuesday, August 23, 2022 / 06:25 PM - 06:45 PM PDT
Arick Goomanovsky, CBO & Co-Founder, Ermetic
Mismanagement of identities, entitlements & privileges is now a leading cause of cloud breaches. With thousands of human & machine identities, configurations & permissions, it’s extremely difficult to visualize & remediate access risk.
Gartner has recognized a new category of security solutions - Cloud Infrastructure Entitlements Management - to limit the attack surface & help you reduce your blast radius in case of a breach.
Join Ermetic’s CBO & Co-Founder, Arick Goomanovesky, to learn how to manage identities & privileges, achieve least privilege & protect your data at scale.
Tuesday, August 23, 2022 / 06:50 PM - 07:10 PM PDT
Sony Abraham, VP DIGITAL IDENTITY, opentext
Dennis Mcdermott, SALES & MARKETING LEADER, IDENTITY MANAG, OpenText
Businesses have been digitally transforming inside the four walls of their enterprise to increase efficiency. But businesses looking to grow, enter new markets, and operate more efficiently need to digitize outside the enterprise – across business networks. Digital B2B ecosystem adoption is rising, but many initiatives fail to meet expectations due to security complexity and cost.
Join us to learn how a zero-trust distributed identity platform can secure access for users, assets and applications across diverse ecosystems comprised of thousands organizations and millions of users – at scale.
Tuesday, August 23, 2022 / 06:50 PM - 07:10 PM PDT
Andre Ferraz, CEO, incognia
Banks and Fintechs are competing for mobile users and are challenged to balance user experience with security. This session outlines how location behavior combined with device intelligence enables zero factor authentication (0FA) and the opportunity to eliminate friction for more than 90% of legitimate users, leaving MFA for high risk users. In reviewing data from 200 million devices with Incognia deployed, André will explain how the combination of location and device intelligence creates a unique identity that offers stronger security and very low false positive rates on mobile.
Wednesday, August 24, 2022 / 07:00 AM - 09:00 AM PDT
Wednesday, August 24, 2022 / 07:00 AM - 12:15 PM PDT
Registration and information hours for the day.
Wednesday, August 24, 2022 / 09:00 AM - 09:30 AM PDT
Ramon Krikken, Managing Vice President, Gartner
This session covers current trends and emerging topics in the area of data security. From databases to cloud applications, threats are rapidly evolving and countermeasures slowly follow. Planning a data-centric roadmap for security governance and security architecture is a critical component of any security and risk management program.
Wednesday, August 24, 2022 / 09:00 AM - 09:30 AM PDT
Bernard Woo, Sr Director Analyst, Gartner
Dive into five top trends in privacy and privacy tech. What are leading organizations focused on, what are the best capabilities to develop and what should you expect from your tech. We'll cover use cases, vendors and cost — enough to provide you with clear next steps to take to your teams.
Wednesday, August 24, 2022 / 09:00 AM - 09:30 AM PDT
Henrique Teixeira, Sr Director Analyst, Gartner
Identity and access management has reached a tipping point with the distribution of workforce and customer access. The decentralization of objects and assets demands a flexible and centralized response with a reliance on flexible orchestration, and policy enforcement which supports a low-friction, zero-trust approach.
Wednesday, August 24, 2022 / 09:00 AM - 09:30 AM PDT
Patrick Hevesi, VP Analyst, Gartner
This session will continue from introduction to the cybersecury mesh concept and dive deep into how to build the cybersecurity mesh architecture (CSMA). We will discuss the evolution of best-of-breed to the new CSMA along with pros and cons of each approach. Finally, we will discuss the vendor landscape from larger security vendors with full stacks to open source/distributed CSM solutions.
Wednesday, August 24, 2022 / 09:00 AM - 09:30 AM PDT
Paul Furtado, VP Analyst, Gartner
One of the biggest risks to our security accesses our systems on a daily basis. This presentation will focus on providing guidance on building an effective insider risk program. We will discuss the tools, tactics and techniques to balance the needs of the business with user's privacy. Recommendations will also be made on how to present the program effectively to leadership and end users.
Wednesday, August 24, 2022 / 09:00 AM - 09:45 AM PDT
Erik Wahlstrom, Sr Director Analyst, Gartner
Organizations find themselves needing to manage and provide best practices for how to handle the machine identities for a growing number of workloads. Bring your own questions to this session on how to manage secrets, keys and certificates in a hybrid and multi cloud environment.
Wednesday, August 24, 2022 / 09:00 AM - 10:30 AM PDT
Rebecca Archambault, Sr Director Analyst, Gartner
Brian Guthrie, Director Analyst, Gartner
During this workshop IAM leaders will learn the importance, and what steps are required for the definition of a well-crafted IAM Program. The session will include exercises for creating your own IAM vision.
Wednesday, August 24, 2022 / 09:00 AM - 10:30 AM PDT
Peter Firstbrook, VP Analyst, Gartner
Gartner experts have compiled the key learnings from recent supply chain attacks. We will examine both familiar and novel techniques the attackers used to carry out massive scale attacks and stay undetected for up to six months. Attendees will learn how to better identify and respond to these and similar exploits and take away an actionable plan for their own organization.
Wednesday, August 24, 2022 / 09:00 AM - 11:30 AM PDT
Are you ready to challenge your peers, and become the next IAM Smackdown champion?
Play Battle of the Brains to win the championship belt! Taking place at the Sath IDHub booth throughout the show, all participants win a prize.
IDHub - Simply Powerful, Identity Management.
Wednesday, August 24, 2022 / 09:00 AM - 11:30 AM PDT
Engagement Zone sponsored by Okta, Inc.
Wednesday, August 24, 2022 / 09:00 AM - 11:30 AM PDT
Engagement Zone sponsored by Transmit Security
Wednesday, August 24, 2022 / 09:45 AM - 10:05 AM PDT
Katie Pelton, Agile Change Transformation Practice Manager, Optiv Inc.
Any level of change can be difficult to adopt, especially if it requires real or perceived disruption(s) and evolving your IAM program comes with continual change to people and processes throughout your organization. Learn how to integrate Organizational Change Management (OCM) into your IAM program to improve the ROI and adoption of IAM initiatives, maturing your IAM program.
We’ll discuss real examples of what works, how to support the value of your IAM investments, and a simple action plan to incorporate OCM into your IAM program – regardless of where your program is today.
Wednesday, August 24, 2022 / 09:45 AM - 10:15 AM PDT
Today’s IAM professionals face a pressing issue—the rise of machine identities and DevOps automation has caused “Secrets Sprawl,” due to the increase of database credentials, certificates, API keys, and other machine secrets within their environments. These machine secrets are kept in siloed point solutions and in multiple DevOps tools, sometimes hardcoded, and saved across on-prem servers as well as multiple cloud providers. In this presentation, Oded Hareven will explore the rise of machine identities, secrets sprawl, and actionable steps that IAM teams can take to address these challenges.
Wednesday, August 24, 2022 / 09:45 AM - 10:15 AM PDT
Bob Pruett, CISO, SecurEnds, Inc.
Managing identities and permissions across all applications is a tough job. It’s getting tougher every day. SecurEnds CEM will give you a consolidated view of all your identities and allow you to perform automated and meaningful user access reviews without weeks of preparation. SecurEnds can turn a compliance checkbox into a powerful tool to protect your enterprise with additional features such as access requests, SOD, and service account management, simplifying your identity tasks quickly.
Wednesday, August 24, 2022 / 09:45 AM - 10:15 AM PDT
Teemu Tunkelo, CEO, SSH Communications Security Oyj
So you have your passwords in a vault and rotated regularly? Unfortunately, this is just the beginning. Join SSH’s CEO Teemu Tunkelo to discover why encryption keys need similar audit attention as passwords, why existing Privileged Access Management (PAM) solutions can’t handle them and what it takes to truly be in control your passwords and keys. Learn how Zero Trust credentials management paves the way for a passworldess and keyless future with minimal management effort and maximum access security.
Wednesday, August 24, 2022 / 09:45 AM - 10:30 AM PDT
Didier Lesteven, COO, Wallix
Richard Weeks, SVP Global Alliances, Wallix USA
According to Gartner, the global PAM market is valued ~$2.4B, representing 40 to 50k companies worldwide that have purchased a PAM solution, while the global market is much larger. Many IT compliance frameworks mandate PAM tools to be deployed to lower risk. Why the large discrepancy? Is it due to the complexity & cost of PAM solutions? Or are there other reasons?
In this moderated discussion, we’ll share perceptions of why PAM deployments aren’t more ubiquitous, while cyberattacks utilizing privileged accounts continue to grow. Key issues include cost, ease of deployment and simplicity.
Wednesday, August 24, 2022 / 10:30 AM - 11:00 AM PDT
Nat Krishnan, Sr Director Analyst, Gartner
As requirements for great CIAM become more sophisticated, best practices for architecting CIAM and selecting vendors are evolving. This session will focus on the broadening scope of CIAM deployment architecture, selection criteria and vendors you should consider for your short lists.
Wednesday, August 24, 2022 / 10:30 AM - 11:00 AM PDT
David Collinson, Sr Director Analyst, Gartner
Whilst segregation of duty controls are key to preventing fraud, they can also be used very effectively in the security arena.
This session will explore the changing scope and supporting technologies to prevent toxic combinations impacting your organization financially and also from a security perspective.
Wednesday, August 24, 2022 / 10:30 AM - 11:00 AM PDT
Homan Farahmand, VP Analyst, Gartner
Policy-based authorization has become a focal point for developing the next generation of identity-centric access controls. It includes both human and machine use cases supporting access to modern apps, computing units, data objects and underlying networks. In this session we discuss key use cases, policy management, and policy enforcement patterns to enhance security model of digital systems.
Wednesday, August 24, 2022 / 10:30 AM - 11:00 AM PDT
David Chase, Sr Director Analyst, Gartner
Multifactor authentication has become a priority for mitigating account takeover attacks. This breakout will discuss the top pitfalls organizations experience and how to avoid them.
Wednesday, August 24, 2022 / 11:30 AM - 12:15 PM PDT
Tom Scholtz, Distinguished VP Analyst, Gartner
Refocus corporate security initiatives and efforts — from a futile effort to prevent breaches to accepting the inevitability of breaches. We will define how to learn from normal accident theory to build a culture of resilience, capable of reducing or eliminating business impacts from security breaches. This culture is built on characteristics and disciplines which we will define in actionable terms.