Agenda

Attendees grabbed the latest insights on identity governance and administration, security and privacy at Gartner Identity & Access Management Summit 2023 in Grapevine, TX.

2023 day highlights

Over 3 days attendees had access to unbiased, researched backed Gartner content, as well as guest keynotes, case studies, and solution provider sessions to help build their future-proof identity and access management strategy.  2024's agenda is underway and coming soon. In the meantime, take a look at some highlights from each day of 2023's summit.

Gartner Opening Keynote: Lead Like a Wolf

Speakers:  Tina Nunno, Distinguished VP Analyst

There is no safe middle ground in leadership, only challenging tradeoffs. A wolf learns the difference between calculated risk taking and recklessness, and recognizes that going to extremes can help bring a dark enterprise or situation to the light side. To be a successful wolf leader, you must master the three extreme disciplines of power, manipulation, and warfare.

Guest Keynote: Disability & Innovation

Speaker:  Haben Girma, Disability Rights Lawyer and Author

Disabled people are the largest historically underrepresented group, numbering over one billion worldwide. Reaching a group of this scale creates value for everyone. Organizations that prioritize accessibility benefit by gaining access to a much larger audience, improving the experience for both disabled and nondisabled people, and facilitating further innovation. Join us for an engaging presentation where Haben Girma will share how she became an advocate and what we can do to make our communities more inclusive.

Featured Session: Identity-First Security as the North Star for Your IAM Reimplementation

Speaker:  Mary Ruddy, VP Analyst

Many organizations are reimplementing identity and access management. This session will show how organizations can use the principles of Identity-First Security to guide the prioritization and design of their best practice IAM reimplementations.

Featured Session: CIEM is Paving the Way for Identity Fabric Immunity in the Cloud. What's Next?

Speaker:  Henrique Teixeira, Sr Director Analyst

The identity infrastructure in most organizations is too brittle to survive a targeted attack. Over 80% of organizations have suffered an identity related breach in the last 12 months. The fragility is in large part related to incomplete, misconfigured or vulnerable elements in the identity fabric. Identity fabric immunity applies the concept of digital immune systems to identity infrastructure to minimize defects and failures.

Guest Keynote: Your Brain Is Good at Inclusion — Except When It’s Not

Speaker: Dr. Steve Robbins, Chief Curiosity Cultivator at S.L. Robbins and Associates

This dynamic and eye-opening session provides an innovative, neuroscience-based look at the benefits of creating inclusive workplaces, using the fields of cognitive neuroscience, social-psychology, and communication (among others). Dr. Robbins will delve into the hard-wired human need to belong – and what happens when that need is not met.  Leaders will walk away energized with a clear DE&I strategy, the positive impact it will have on their organization and how it will empower their teams and key stakeholders to view DE&I as vital to success, not just something that is an afterthought.

Gartner Keynote: Outlook for Identity and Access Management, 2023

Speaker: Homan Farahmand, VP Analyst

Digital identity requirements and importance are growing, as organizations are migrating their infrastructure and apps to the cloud. Enterprises anticipate innovations to enable continuous, dynamic, and intelligent IAM controls, while bracing for emerging decentralized identity impact and potential Web 3 business model disruption. This session discusses key trends and IAM outlook in the coming years.

Featured Session: How Identity Gets a Seat at the Grown Up Table

Speaker: Rebecca Archambault, Sr Director Analyst

Leaders responsible for IAM are generally not accustomed to recognizing and communicating the influence that IAM has on business outcomes or associating IAM with environmental, organization or social change. It is time for identity to be recognized as a valued strategic partner that contributes to the delivery of organizational goals and objectives.

A look back at 2023's agenda

View By:

A look back at 2023's agenda

Sunday, March 19, 2023 / 01:00 PM - 06:30 PM CDT

Registration

Registration hours for the day

Monday, March 20, 2023 / 07:30 AM - 09:30 AM CDT

Attendee Breakfast

Join other attendees for breakfast before the day's sessions.

Monday, March 20, 2023 / 07:30 AM - 07:30 PM CDT

Registration

Registration hours for the day

Monday, March 20, 2023 / 09:30 AM - 10:15 AM CDT

Gartner Opening Keynote: Lead Like a Wolf

Tina Nunno, Distinguished VP Analyst, Gartner

As a leader, are you a predator or prey, and what should you aspire to be? Technology executives are more visible now than ever before, this can be both an opportunity and a challenge. This session will explore how being a wolf can make you a better leader for your team and a great asset for your organization. Before this session find out yours at Gartner.com/wolfcio and learn more about what your results mean during the keynote.

Monday, March 20, 2023 / 10:15 AM - 11:00 AM CDT

Refreshment Break

Join us for refreshments in a brief break between sessions.

Monday, March 20, 2023 / 10:15 AM - 06:30 PM CDT

Engagement Zone by Arcon

Engagement Zone by Arcon

Monday, March 20, 2023 / 10:15 AM - 06:30 PM CDT

Engagement Zone by Okta

Engagement Zone by Okta

Monday, March 20, 2023 / 10:15 AM - 06:30 PM CDT

Engagement Zone by Transmit Security

Engagement Zone by Transmit Security

Monday, March 20, 2023 / 10:15 AM - 07:30 PM CDT

Exhibit Showcase Open Hours

Visit the Exhibit Showcase to evaluate industry offerings that can move your business forward. Engage with your peers, Gartner experts, and exhibitors. Attend a theater session to see technology in action.

Monday, March 20, 2023 / 10:30 AM - 10:50 AM CDT

SAP: True Enterprise CIAM Powers Growth, Data Privacy, and Security

Ratul Shah, GLOBAL HEAD OF PRODUCT MARKETING SAP CUS, SAP

Guy Kronenthal, SVP , GM OF CUSTOMER DATA SOLUTION, CX,, SAP - GERMANY GCO

Ready to increase growth, speed market expansion, prepare for the next M&A, and protect customers as you grow to hundreds of millions of profiles? Discover SAP CIAM solutions: True enterprise offerings that help you start fast and grow fast. Easily use NC/LC tools to integrate into any business process and deploy to hundreds of digital properties with zero downtime. Power billions of consumer and partner interactions across your landscape to fuel personalized engagements based on zero-party data. Elevate security, experience, and data privacy with an all-in-one identity and consent platform.

Monday, March 20, 2023 / 10:30 AM - 10:50 AM CDT

Okta: To Phish or Not to Phish: Which MFA Is the Answer?

Yuliya Gorbunova, SR DIRECTOR OF PRODUCT, Okta

Large organizations continue to fall for credential phishing attacks and experience breaches because of newer, ingenious attacks involving dynamic interactions with the victims such as proxy based adversary attacks. Join us as we break down the latest industry requirements and dive into the technical requirements for true phishing resistance, as defined by NIST, to ensure your MFA won’t issue your credentials to a fake phishing web page. We’ll also share Okta’s latest innovations that advance our ability to prevent attacks with phishing resistant authenticators and authentication flows.

Monday, March 20, 2023 / 11:00 AM - 11:20 AM CDT

Technical Insights: Is Light IGA Right for Your IAM Needs?

Nat Krishnan, Sr Director Analyst, Gartner

Light alternatives to IGA suites can be used for reducing costs or to augment an existing IGA suite to add niche capabilities. This session will discuss whether light IGA tools can be considered as the primary IGA solution for an organization.

Monday, March 20, 2023 / 11:00 AM - 11:30 AM CDT

Guidance for Successful IGA Deployments

Brian Guthrie, Director Analyst, Gartner

Identity governance and administration systems is one of the most expensive IAM components an organization will ever purchase. It is a foundational component of an IAM program. However, it is extremely complex and one of the costliest when considering the total cost of ownership. This session will cover IGA deployment methodology to ensure your project stays on time, within professional services budget and avoid lengthy overruns.

Monday, March 20, 2023 / 11:00 AM - 11:30 AM CDT

How to Be Successful With Privileged Access Management

Felix Gaehtgens, VP Analyst, Gartner

This breakout serves not just as an introduction but is also ideal for those who already have a PAM program and are looking to mature it. The following topics are covered: why is PAM such a crucial piece of any security program? How should you leverage PAM? How can you raise your security posture by using a just-in-time PAM and zero standing privileges approach?

Monday, March 20, 2023 / 11:00 AM - 11:30 AM CDT

Identity-First Security as the North Star for Your IAM Reimplementation

Mary Ruddy, VP Analyst, Gartner

Many organizations are reimplementing identity and access management. This session will show how organizations can use the principles of Identity-First Security to guide the prioritization and design of their best practice IAM reimplementations.

Monday, March 20, 2023 / 11:00 AM - 11:30 AM CDT

The State of Access Management, 2023

Michael Kelley, Sr Director Analyst, Gartner

Access management tools are offering an array of increasingly converged technologies. This session will cover the progression and maturity of access management tools and how they will help you achieve identity first security strategies.

Monday, March 20, 2023 / 11:00 AM - 11:30 AM CDT

Top Trends in Cybersecurity, 2023

Patrick Hevesi, VP Analyst, Gartner

“Top trends” highlight shifts in the security ecosystem that aren't widely recognized, but are likely to have potential for disruption. This presentation will describe the significant trends in risk management and how organizations are taking advantage of these trends. Key issues include technological improvements in the security capability landscape, trends in creating a high-performing security organization; and long-term trends that will influence security strategy.

Monday, March 20, 2023 / 11:00 AM - 11:45 AM CDT

Ask the Expert: Discovering, Managing and Controlling Workload Identities

Erik Wahlstrom, Sr Director Analyst, Gartner

Come to this session prepared to ask questions about workload identities. How should identities, secrets, keys and certificates be discovered, managed and maintained for applications, services, containers and VMs in an hybrid and multicloud environment?

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, March 20, 2023 / 11:00 AM - 11:45 AM CDT

Ask the Expert: Architecting Identity-First Security and Zero Trust Implementations

David Chase, Sr Director Analyst, Gartner

A chance to ask an analyst your questions on implementing identity first and zero trust.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, March 20, 2023 / 11:00 AM - 12:30 PM CDT

Workshop: Defining a Successful IAM Program

Rebecca Archambault, Sr Director Analyst, Gartner

During this workshop, IAM leaders will learn the importance and steps required for defining a well-crafted IAM program. The session will include exercises to help leaders create their own IAM vision.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, March 20, 2023 / 11:45 AM - 12:15 PM CDT

Beyond Identity: What is Needed for a Modern Authentication Solution

Patrick McBride, CMO, Beyond Identity

In this discussion and Q&A session Dr. Zero Trust, Chase Cunningham provides some perspective/updates on Zero Trust and the importance of identity management as a fundamental element of your zero trust architecture. Spoiler alert, Identity professionals can become the hero in a story about simultaneously improving end user experience and reducing risk. The discussion will delve into issues with legacy MFA approaches and what companies will need from a modern authentication solution.

Monday, March 20, 2023 / 11:45 AM - 12:15 PM CDT

Microsoft: 3 Effective Strategies to Start Reducing Identity Risk Today 

Pamela Dingle, DIRECTOR OF IDENTITY STANDARDS, Microsoft

Identity is the new battleground and protecting every layer of identity is critical to securing your organization’s infrastructure from attacks. Security, identity, cloud and app teams must work together to implement a holistic approach that expands across all identities, both human and non-human. Join us to explore three actions you can implement today to track your identity risks, automate governance, and protect against phishing attacks. Learn about future trends for identity in an evolving threat landscape – one targeting users and apps across multiple clouds.  

Monday, March 20, 2023 / 11:45 AM - 12:15 PM CDT

Cisco Secure: Chutes and Ladders: How is Zero Trust Playing Out?

Wolfgang Goerlich, ADVISORY CISO, Cisco

The digital-first customer experience and remote-first workforce has pushed enhanced identity governance and zero trust from buzzword to reality. And yet, much of the conversation is still heavy on theory and light on practice. Cisco and Cyentia completed a global study of high-level practices which measurably contribute to a more successful cybersecurity program based on a rigorous survey of nearly 5,000 practitioners. We analyzed commonalities of organizations implementing and operating ZT. We'll share how ZT is working in the real world, and what the best of the best programs have in common

Monday, March 20, 2023 / 11:45 AM - 12:15 PM CDT

Broadcom Software: Implementing a Modern Identity Fabric

Vadim Lander, CTO and Distinguished Engineer, CA

Kanishak Varshney, Senior Director of IAM, Ameriprise Financial

Evolving your existing Identity and Access Management solution is required to address today's applications and environments. Join us in the session as Vadim Lander, Chief Architect and CTO at Broadcom Software, speaks with one of our customers about their journey to modernize their Identity Fabric for both their consumers and their employees.

Monday, March 20, 2023 / 11:45 AM - 12:15 PM CDT

Okta: Driving Growth and Customer Loyalty Through the Modernization of Consumer Identity

Tom Malta, Financial Services Strategic Advisor, Okta

Chris Rich, PRODUCT MANAGEMENT DIRECTOR, MASSMUTUAL FINANCIAL GROUP

Evolving consumer preferences and disruptions in financial services are rapidly transforming how the industry captures customer loyalty and drives growth. Identity is a crucial tool for financial service organizations as they seek to outpace industry challenges and provide secure, streamlined digital experiences for both their customers and employees.

Join this interactive fireside chat with Chris Rich from MassMutual to learn about their IAM modernization journey. Learn about the initial driving factors behind MassMutual’s modernization and why they selected Okta.

Monday, March 20, 2023 / 11:45 AM - 12:15 PM CDT

CyberArk: Don’t Just Manage Identities, Secure Them

Chris Moore, SVP Global Channels, CyberArk

Avinash Rajeev, Director, PricewaterhouseCoopers

Bilal Mujahid, VICE PRESIDENT INFORMATION SECURITY ENGI, CONTINENTAL CASUALTY COMPANY

Every identity is a gateway to your organization’s most valuable resources. Privileged users are no longer just IT admins. Almost any identity can have high-value or high-level access. Add the complexities of hybrid work, multi-cloud and rapidly increasing numbers of human and machine identities, how can you ensure that the right users securely access the right resources at the right time? This panel discusses how a robust Identity Security strategy incorporating intelligent privilege controls can enable Zero Trust principles and help organizations to be 3x more likely to mitigate attacks.

Monday, March 20, 2023 / 11:45 AM - 12:15 PM CDT

One Identity: Reduce Your Attack Surface by Making Obsolete IAM Tools Relevant Again

Larry Chinski, VP, GLOBAL CUSTOMER ADVOCACY, One Identity

Digital and social attacks have become much easier as hackers focus on targeting mismanaged credentials in lieu of physical devices. Historical IAM tools have been deployed in conjunction with physical devices to build a robust security posture. However, with the abnormally high amount of remote workers, organizations are forced to build a next generation security posture almost completely around identity which makes individually deployed IAM tools much less effective. In this session, we will discuss how to leverage individual IAM tools together to implement the next generation IAM platform.

Monday, March 20, 2023 / 11:45 AM - 12:30 PM CDT

ETSS: Identity as a Digital Transformation Accelerant, moderated by SailPoint

Ryan Boulais, VP AND CISO, AES

Grady Summers, EVP PRODUCT, SailPoint

Companies who embrace an uncompromising approach to identity security are best positioned to secure their business from the myriad of threats targeting the critical intersection between identities and technology access. Hear from Grady and Ryan as they discuss how organizations are actively putting identity security at the foundation of their enterprise cyber security efforts. Ryan has also led identity programs at two Fortune 500 companies and will discuss best practices and successful outcomes realized, including secure acceleration of their digital transformation efforts today.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, March 20, 2023 / 12:30 PM - 01:00 PM CDT

Stopping Account Takeover Attacks

Akif Khan, VP Analyst, Gartner

Account takeover (ATO) attacks keep IAM leaders up at night. Attackers are not breaking and entering, they are not exploiting vulnerabilities - they are simply using stolen credentials on login pages for corporate systems, online banking and more. In this session, the focus will be on how to build a layered defense of complementary capabilities to mitigate the risks of ATO attacks.

Monday, March 20, 2023 / 12:30 PM - 01:00 PM CDT

The State of Privileged Access Management (PAM), 2023

James Hoover, Principal Analyst, Gartner

This session will outline the current state and emerging trends in the market for privileged access management.

Monday, March 20, 2023 / 12:30 PM - 01:00 PM CDT

Top Practices for Strengthening Your CIAM Strategy

Nat Krishnan, Sr Director Analyst, Gartner

What is Customer IAM (CIAM)? What are the key considerations for an effective CIAM strategy? We will discuss recommended top practices around CIAM, how to take your CIAM strategy to the next level and how to plan for the best user experience to achieve your goals.

Monday, March 20, 2023 / 12:30 PM - 01:00 PM CDT

Start Using the Most Overlooked IGA Feature to Significantly Improve Security

David Collinson, Sr Director Analyst, Gartner

Whilst segregation of duty controls are key to preventing fraud, they can also be used very effectively in the security arena. This session will explore the changing scope and supporting technologies to prevent toxic combinations impacting your organization financially but perhaps more importantly also from a security perspective.

Monday, March 20, 2023 / 12:30 PM - 01:00 PM CDT

A Pragmatic Approach to Implementing a Zero Trust Security Architecture

John Watts, VP Analyst, Gartner

Changes in the threat landscape and the ineffectiveness of current security architectures have created significant interest in zero trust security architectures. This presentation will explore zero trust and zero trust networking, and extend these concepts to operating systems, applications, users and data. Topics will include NIST architectures for zero trust as well as technologies and vendors providing solutions.

Monday, March 20, 2023 / 12:30 PM - 01:15 PM CDT

Ask the Expert: Access Management

Brian Guthrie, Director Analyst, Gartner

Access management tools are the key to ubiquitous application access, enabling any user to access any application, anytime and anywhere. Gartner has identified a five-step approach to create a modern, efficient access management strategy that serves the needs of all user segments. This session gives you an opportunity to ask questions about that approach for your broader access management strategy.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, March 20, 2023 / 12:30 PM - 01:15 PM CDT

Ask the Expert: Leading Practices for Authorization and Access Policy Management

Nathan Harris, Sr Director Analyst, Gartner

Every organization does authorization, but managing authorization well remains a substantial challenge across industries. In this session Gartner analyst Nathan Harris will answer questions related to authorization and access policy management approaches that are working well and where companies are finding the best overall value. Specific topics included are RBAC, ABAC, run time vs. admin time authorization and externalized authorization.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, March 20, 2023 / 12:45 PM - 02:30 PM CDT

Attendee Lunch

Join other attendees for lunch and take advantage of the opportunity to network and catch up on the day's activities so far.

Monday, March 20, 2023 / 01:15 PM - 01:35 PM CDT

ForgeRock US: Solving Passwordless for Enterprise Challenges

Chip Hughes, VP, Workforce Segment Strategy, ForgeRock

Stuart Proffitt, Senior Director, Sales Engineering, ForgeRock

Damon Mcdougald, ACCENTURE LEADERSHIP, Accenture

In today’s modern workforce, the need for passwordless authentication as a cybersecurity defense is an ever increasing requirement. But implementing a passwordless solution for enterprises is a challenge. The combination of modern and legacy integrations creates the need for a full featured passwordless solution that can be implemented over time with the complete enterprise in mind.

During this session, ForgeRock will focus on its new passwordless capabilities and the steps to implement a solution to make passwordless a success.

Monday, March 20, 2023 / 01:15 PM - 01:35 PM CDT

PlainID: Driving Zero Trust and Identity-First Security with Authorization

Mickey Martin, DIRECTOR OF PRODUCT OUTREACH, PlainID

PlainID will cover how enterprises deliver dynamic controls for Identity-First Security in a consistent, continuous, and contextual manner by externalizing Authorization. Centralized policy management and distributed enforcement enables enterprises to:
• Fully leverage all identity information in every layer of the tech stack
• Standardize access control and drive effective Zero Trust across applications, API gateways, microservices and data
• Simplify how access policies are created, managed, and enforced by security and business stakeholders

Monday, March 20, 2023 / 01:15 PM - 02:00 PM CDT

Sponsored Lunch Address: Maximizing the Business Value from Underutilized IAM Data in Your Enterprise, sponsored by IBM

Kevin Pratt, SR. MANAGING CONSULTANT, IBM

IAM tools have access to a wealth of data that enterprises are not fully leveraging to their advantage. IAM data can enhance our Threat Management and IDR capabilities, automate our security workflows, strengthen our identity governance models, and provide valuable insights to the business. However, many organizations need help organizing, managing, and effectively using this data. Join IBM’s Sr. Managing Consultant to hear the best practices our clients have implemented to leverage this untapped data.

Monday, March 20, 2023 / 01:40 PM - 02:00 PM CDT

Beyond ID: Sabre’s Journey to Digital Identity Modernization

Neeraj Methi, VP, SOLUTIONS, BeyondID

Kristin Coop, RISK & SECURITY, SABRE, INC.-TX-USA

A high-quality user experience has been a focal point for companies engaging in new digital initiatives. But the digital front door is where every interaction begins, making Identity Management the most important technology in your architecture. It gives companies the opportunity to deliver a seamless, robust user experience while protecting user’s data and keeping access secure.

“Never trust, always verify” is the guiding principle behind Zero Trust. In today’s environment, people are the perimeter, not firewalls. Trust is now predicated on identity and access, whether it’s a user, a web service, or a device, rather than the familiar “moat” around the company’s network.

Deploying an Identity Fabric architecture gives organizations the flexibility and consistency to support identities across a distributed, multi-cloud environment. It also adds cohesion to separate IAM services while reducing costs and speeding up deployment.

Join Neeraj Methi, Vice President of Solutions for Beyond ID as he explores the importance and benefits of the User Experience, Zero Trust and Identity Fabric.

Monday, March 20, 2023 / 01:40 PM - 02:00 PM CDT

Fischer Identity: Zero Trust Simplified!

Jerry Chapman, CHIEF IDENTITY OFFICER, Fischer Identity

There are too many defined perimeters for Zero Trust! Identity is the Only Perimeter! Come see how Fischer has simplified Zero Trust with the first functional Zero Trust Identity solution. You will see how Fischer has incorporated Identity, Security and Risk as an answer to how to do Zero Trust!

Monday, March 20, 2023 / 02:05 PM - 02:25 PM CDT

Cyolo: 3 Challenging Areas of High Risk & Concrete Steps to Manage them Safely

Samuel Hill, DIRECTOR - PRODUCT MARKETING, Cyolo

High Risk Access, where a user can connect and could cause enormous damage, exists across almost every organization. These are users that you must connect to things that you probably don't really want to! There are some common situations where security controls struggle to keep up with the demands of the business. This session will cover three challenging areas of high-risk and will include a discussion of recommended security controls to apply to lower the risk level. At the end, you will have concrete steps to safely connect everything, everywhere, with no exceptions.

Monday, March 20, 2023 / 02:05 PM - 02:25 PM CDT

Optimal IdM: An IAM Approach to Azure AD Licensing Management

Jeff Bohren, HEAD OF ENGINEERING, OPTIMAL IDM

Azure AD Licenses are often granted in an ad hoc manner. This results in unnecessary costs and possible security issues in Azure AD implementations. This presentation will show how an Identity and Access Management approach can help you achieve a better and more secure Azure AD License Management solution. This presentation will show how to determine if you have granted licenses that are not being used, and to determine how licenses are being granted. This presentation will cover Office365 and other Azure AD licenses.

Monday, March 20, 2023 / 02:30 PM - 03:00 PM CDT

The State of IAM Program Management, 2023

Rebecca Archambault, Sr Director Analyst, Gartner

The establishment and delivery of an IAM Program is vital to delivering Identity First security. Whether you are new to identity or delivering identity and access management currently, you need to understand and communicate the role that identity plays within your organization to enable your workforce, customers and business partners to deliver their strategic initiatives.

Monday, March 20, 2023 / 02:30 PM - 03:00 PM CDT

Go Passwordless Whenever You Can, Wherever You Can

Ant Allan, VP Analyst, Gartner

To improve security and enhance UX, many organizations are already implementing various styles of passwordless authentication across a variety of use cases. This session will look to address the following questions. How can IAM leaders choose among the many passwordless approaches? Which approaches are most effective? Which approaches are feasible in which use cases? How do you deal with legacy applications? How can you craft a cohesive strategy across multiple use cases?

Monday, March 20, 2023 / 02:30 PM - 03:00 PM CDT

CEO Panel: The Journey of 2 Founder-CEOs: The Gartner Interview

Mark McClain, CEO and Founder, SailPoint

Andre Durand, CEO and Founder, Ping Identity

Join us for a wide-ranging and thought-provoking conversation with Andre Durand, founder and CEO of Ping Identity and Mark McClain, founder and CEO of SailPoint. Mr. McClain founded SailPoint in 2005 and closed a deal to sell his company in 2022 for 6.9 billion dollars. Mr. Durand founded Ping Identity in 2002 and also led the acquisition of his company for 2.8 billion dollars in 2022. For the first time together on stage, we will learn what motivated and what challenged them during the journey of launching startup identity companies, going through investment rounds and IPOs, and bringing their companies back into private equity.

Monday, March 20, 2023 / 02:30 PM - 03:15 PM CDT

Ask the Expert: Privileged Access Management

Felix Gaehtgens, VP Analyst, Gartner

Privileged access is the prime cause of breaches, yet more people than ever require it for their work. Requirements for PAM are evolving rapidly to include hybrid-multicloud scenarios and machine identities. Bring your questions about trends and best practices to this session.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, March 20, 2023 / 02:30 PM - 03:30 PM CDT

Contract Negotiation Clinic: Follow Gartner's Top 10 Tips, Tactics and Tricks for Negotiation Success

Jo Ann Rosenberger, Distinguished VP, Advisory, Gartner

This session will demonstrate and guide IT and IAM leaders involved in the negotiation planning process how to incorporate ten “must know” tips, tactics and “tricks” into the negotiation plan to optimize pricing, discounts and contract terms. Attendees will receive ready-to-use checklists, templates, and worksheets for optimizing future negotiations with existing, new and emerging vendors.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, March 20, 2023 / 03:15 PM - 03:45 PM CDT

BeyondTrust: Cyber-Defense Strategies to Protect Cloud Resources & Identities

Morey Haber, CSO, BeyondTrust

Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed, and serviced from the cloud. Attackers have also realigned their efforts, focusing on staying undetected, quickly monetizing exploitations, and publicly shaming organizations after successful breaches. BeyondTrust Chief Security Officer (CSO), Morey J.Haber will offer best practices for minimizing these increasingly exploited cloud attack vectors. Join him to learn cutting edge strategies for building the optimal cloud defense for your organizations unique cloud environment and identities.

Monday, March 20, 2023 / 03:15 PM - 03:45 PM CDT

ForgeRock US: Never Login Again: The Path to Passwordless is Paved with Orchestration

Darryl Jones, VP Product Management, ForgeRock

Brian Mozinski, DIRECTOR, PwC

Passwordless authentication is gaining momentum with good reason. Users love it and would-be intruders hate it. So why hasn’t it caught on more quickly? Many enterprises are saddled with legacy technology, identity silos, and complex policies. But now you can orchestrate and scale passwordless journeys for your customers using contextual factors, such as user location, behavior, and device — driven by continuous AI-powered orchestration. Join this session to explore the evolution to passwordless and how to enable it for your legitimate users while reducing the risk of unauthorized access.

Monday, March 20, 2023 / 03:15 PM - 03:45 PM CDT

Omada: Panel Discussion - How to Confidently Deploy and Scale a Modern IGA Program

Tye Mcglynn, DIRECTOR OF IAM, Guidewire

Michael Garrett, CEO, Omada

Jason Murphy, SR DIRECTOR NETWORK AND SECURITY SERVIC, DFIN SOLUTIONS

Join Jason Murphy, Sr. Director of Network and Security Services from Donnelly Financial Solutions, and Tye McGlynn, Director of IAM at Guidewire Software, for a panel discussion on how to approach, deploy, and scale an IGA program. Moderated by Omada CEO Michael Garrett, they will delve into critical topics like:

- The importance of getting organizational buy-in for any IAM program
- Where to start on the IGA journey
- How to implement and scale while minimizing impact on other projects
- Key metrics to track value delivered
- How to automate IGA tasks like access reviews
- And more!

Monday, March 20, 2023 / 03:15 PM - 03:45 PM CDT

RSA: Intelligent Identity in the AI Era

Dave Taku, SENIOR DIRECTOR PRODUCT MANAGEMENT, RSA

Join RSA to learn how combining real-time context, machine learning, and identity analytics can produce a smarter, safer, and more secure identity platform. We’ll detail the insights learned from nearly 20 years of experience, describe the key elements of the intelligent identity platform as voiced by our customers, and show how Identity Intelligence enables a secure and practical Zero Trust architecture without sacrificing user convenience. These insights will help organizations develop an intelligent identity platform strategy able to mitigate today’s modern cybersecurity attacks.

Monday, March 20, 2023 / 03:15 PM - 03:45 PM CDT

SailPoint: Nationwide Looks to AI-driven Identity Security as a Business Enabler

Buzz Woeckener, DIRECTOR IDENTITY GOVERNANCE AND ADMINIS, Nationwide

Ben Cody, SVP PRODUCT MANAGEMENT, SailPoint

In today’s accelerating modern digital age, companies need to automate and transform their identity security programs and processes; it is essential not only to IT and security, but to the business itself. Modernizing your identity security program can help boost operational efficiency, comply with rising cybersecurity and privacy regulations, and reduce cybersecurity risks. See how Nationwide is harnessing the power of AI and machine learning to transform their identity security program by easily managing, securing, and certifying access across their large, complex enterprise.

Monday, March 20, 2023 / 03:15 PM - 03:45 PM CDT

WSO2: CIAM Beyond AM. Multi-Experience Apps, a Unified Customer View, and Digital Doubles

Geethika Cooray, VP & GENERAL MGR - IAM, WSO2

Joshua Gohman, VP, INFORMATION SECURITY, Asure Software

Organizations are looking beyond making customer registration and log in simple to deliver unified authentication across multi-experience applications. This requires a set of capabilities beyond access management to unify disparate user stores, databases and apps across enterprises. The unified customer view can be leveraged to provide a truly personalized experience at any customer interaction point.

Hear how WSO2’s CIAM Suite goes beyond the CIAM basics and learn from a customer that will discuss what they’ve accomplished with WSO2.

Monday, March 20, 2023 / 03:15 PM - 03:45 PM CDT

Radiant Logic: Identity Data, Observability & Analytics - The Road to Identity First Security

John Pritchard, CHIEF PRODUCT OFFICER, Radiant Logic

Sebastien Faivre, CTO, Brainwave

Data is foundational to business intelligence-but how do you translate that into identity governance? Today’s enterprise has unprecedented levels of real-time, rich identity data across multiple parallel sources. More data leads to more predictive power in machine learning algorithms. These runtime data driven insights can become a central component to a systematic compliance and risk management strategy. This session will highlight how identity data can be used to uncover patterns, anomalies, and outliers and radically improve decision making, supporting your Identity First Security strategy.

Monday, March 20, 2023 / 03:15 PM - 04:00 PM CDT

ETSS: 3 Rewards of Securing Access with Zero Trust moderated by Cisco Secure

Brian Verenkoff, DIRECTOR OF SYSTEMS ENGINEERING, Cisco

Derived from the past, present and future, learn about the best practices around Securing Access with Zero Trust. While many organizations have begun their journey to zero trust, the elements and opportunities are changing. In this session, we’ll review where zero trust is today, where it is going tomorrow, and how to plan for the zero trust of the future.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, March 20, 2023 / 04:00 PM - 04:30 PM CDT

IGA Your Way — Market Guide for Identity Governance and Administration

Rebecca Archambault, Sr Director Analyst, Gartner

Identity and access management leaders should use this Market Guide to make decisions about identity governance and administration products, as well as anticipate future trends, features and integration capabilities in the IGA market.

Monday, March 20, 2023 / 04:00 PM - 04:30 PM CDT

Technical Insights: Improve Customer Identity Corroboration With Passive Behavioral Biometrics

Paul Rabinovich, Sr Director Analyst, Gartner

Customer-facing applications are vulnerable to increasingly sophisticated attacks that are threatening organizations. In this session, we will demonstrate how organizations can use passive behavioral biometrics to reduce fraud and improve customer identity corroboration.

Monday, March 20, 2023 / 04:00 PM - 04:30 PM CDT

Technical Insights: Privileged Access Management for Cloud

Nat Krishnan, Sr Director Analyst, Gartner

Privileged Access Management (PAM) is critical in enabling zero trust strategies by managing privileged access across your organization. This session will cover the unique features that PAM offers for securing privileged access to cloud environments and how PAM can be used in conjunction with adjacent technologies

Monday, March 20, 2023 / 04:00 PM - 04:30 PM CDT

The State of Attribute-Based Authorization, 2023

Felix Gaehtgens, VP Analyst, Gartner

Attribute-based authorization technology has been in a renaissance period, with many new technologies, vendors and specifications seeing the light within the last year. This session shines a light on the current market for externalized, attribute-based authorization, including open source initiatives.

Monday, March 20, 2023 / 04:00 PM - 04:45 PM CDT

Ask the Expert: CIEM, ITDR and Identity Fabric Immunity

Henrique Teixeira, Sr Director Analyst, Gartner

Emerging approaches like cloud infrastructure entitlement management (CIEM) plays an important role in security posture management, and when combined with identity threat detection and response (ITDR), it adds protection mechanisms to the identity infrastructure. Ask me anything about CIEM, ITDR, and protection elements of the identity fabric immunity.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, March 20, 2023 / 04:30 PM - 05:15 PM CDT

Refreshment Break

Join us for refreshments in a brief break between sessions.

Monday, March 20, 2023 / 04:45 PM - 05:05 PM CDT

QOMPLX: Assume Breach: Layering Prevention & Detection for Comprehensive Identity Security

Derek Melber, VP OF PRODUCT ENGAGEMENT AND OUTREACH, QOMPLX, Inc.

Identity systems are under attack like never before with attackers who simply login and elevate privilege. Learn where MFA and PAM work, and how you can improve your attack detection capabilities to get a complete identity security solution. Additionally, understand how you can improve your overall identity security posture by ensuring identities are secured, your attack detections are comprehensive, and your response is tried and true.

• Why MFA is not enough
• Why you need to assume breach
• What ITDR actually means
• Why the best ITDR programs include prevention along with detection

Monday, March 20, 2023 / 04:45 PM - 05:05 PM CDT

Silverfort: The Identity Security Blind Spot: MFA and ITDR for Legacy Systems and Service Accounts

Hed Kovetz, CEO & Co-Founder, Silverfort

MFA and other identity security controls are very effective in protecting web apps and modern systems, but until now they couldn’t be applied to legacy systems, command-line interfaces, service accounts, OT systems and many other sensitive resources. These ‘blind spots’ are extensively leveraged in data breaches and ransomware attacks, and also prevent meeting regulatory and cyber insurance requirements. In this session we will show how identity security controls, ranging from the traditional MFA to the emerging ITDR, can now be extended to critical resources that couldn’t be protected before.

Monday, March 20, 2023 / 05:15 PM - 06:00 PM CDT

Guest Keynote: Disability & Innovation

Haben Girma, Disability Rights Lawyer and Author,

Disabled people are the largest historically underrepresented group, numbering over one billion worldwide. Reaching a group of this scale creates value for everyone. Organizations that prioritize accessibility benefit by gaining access to a much larger audience, improving the experience for both disabled and nondisabled people, and facilitating further innovation. Join us for an engaging presentation where Haben Girma will share how she became an advocate and what we can do to make our communities more inclusive.

Monday, March 20, 2023 / 06:00 PM - 07:30 PM CDT

Exhibit Showcase Networking Reception

Join us for a networking reception on the Exhibit Showcase where you can engage with your peers, Gartner experts, and exhibitors while enjoying delicious food and beverages. Evaluate industry offerings that can move your business forward. Attend a theater session to see technology in action.

Monday, March 20, 2023 / 06:15 PM - 06:35 PM CDT

Axiomatics: Making Authorization Critical - Top 3 KPIs for Policy-Based Access Control

Mark Cassetta, Chief Product Officer, Axiomatics

As enterprises adopt an identity-first strategy, modernizing their access control strategy from a static model to a dynamic model with policy-based access control (PBAC) is an important piece. But like any transformation, measuring success is key for stakeholders and investors to ensure they reach their desired outcomes.

In this session, identity leaders will gain insight as to how high-performing IAM teams measure the success of their access control modernization initiatives through PBAC and how these efforts can scale across the enterprise.

Monday, March 20, 2023 / 06:15 PM - 06:35 PM CDT

HYPR: Quantifying the Value Drivers for Passwordless Authentication

Jay Roxe, CHIEF MARKETING OFFICER, HYPR Corp.

Best-in-class authentication has been on everyone’s mind; and it’s no surprise. The vast majority of recent breaches can be traced back to the failure of passwords and legacy MFA. With recent guidance for phishing-resistant MFA, organizations have become Passwordless Curious, but may be hesitant to move forward until they can quantify the business case. Join us for this exciting session where we will outline the benefits of implementing phishing-resistant MFA and discuss the quantifiable value drivers which you can champion within your organization.

Monday, March 20, 2023 / 06:40 PM - 07:00 PM CDT

Clear Skye: 4 Benefits of a Mature IGA Program Leveraging ServiceNow

Thad Smith, VP OF SOLUTION ARCHITECTURE, Clear Skye

50% of enterprise organizations plan to integrate IGA with business and process automation over the next 12-18 months. Optimizing identity on a business platform enables organizations to simplify operations, increase efficiency, and improve overall UX, while bolstering security. This session will explore how this approach reduces silos between functional business areas, ensures usability, and accelerates time-to-value all with your existing ServiceNow investment.

Monday, March 20, 2023 / 06:40 PM - 07:00 PM CDT

Yubico: Moving on from Legacy MFA - Phishing-resistant MFA as a Prerequisite for Passwordless

Shakeel Aziz, SOLUTIONS ENGINEER, Yubico

As long as passwords exist, enterprises are vulnerable to account takeover attacks – yet organizations looking to eliminate passwords may not know where to begin their passwordless journey. While passwordless authentication methods—especially those based on FIDO2—are widely available, they are not yet universally supported nor adopted. This lack of a universal approach can cause confusion and complacency. Learn why (and how) organizations should move away from passwords and legacy MFA to advance to and adopt a secure passwordless strategy centered on phishing-resistant MFA in 2023.

Monday, March 20, 2023 / 07:05 PM - 07:25 PM CDT

SEMPERIS: ITDR in the Wild: Hybrid Active Directory Security in Action

Darren Mar-Elia, HEAD OF PRODUCT, Semperis

What does a successful Identity Threat Detection and Response (ITDR) strategy look like?
Active Directory (AD) provides authentication and access to business-critical applications and services for 90% of enterprises. The fact that 9 out of 10 cyberattacks exploit AD indicates a critical risk to organizations in every industry.

Darren Mar-Elia (Semperis’ VP Products) provides real-life examples of successful ITDR strategies and solutions. You’ll learn:
+ Why Active Directory is central to ITDR
+ How organizations are implementing successful ITDR strategies
+ How you can put ITDR into action

Monday, March 20, 2023 / 07:30 PM - 09:30 PM CDT

Networking Reception hosted by Okta & RAAH Technologies

Join Okta & RAAH Technologies at the Glass Cactus for light bites, drinks, games and a live DJ! Stop by Okta's booth #401 to learn more details and get registered! A conference badge is required for entry.

RAAH Technologies, a top partner and technical champion for Okta specializing in Customer Identity Cloud (formerly Auth0) end to end global deployments for any industry.

Tuesday, March 21, 2023 / 07:00 AM - 09:00 AM CDT

Attendee Breakfast

Join other attendees for breakfast before the day's sessions.

Tuesday, March 21, 2023 / 07:00 AM - 06:30 PM CDT

Registration

Registration hours for the day

Tuesday, March 21, 2023 / 09:00 AM - 09:45 AM CDT

Guest Keynote: Your Brain Is Good at Inclusion — Except When It’s Not

Dr. Steve Robbins, Chief Curiosity Cultivator, S.L. Robbins and Associates

This dynamic and eye-opening session provides an innovative, neuroscience-based look at the benefits of creating inclusive workplaces, using the fields of cognitive neuroscience, social-psychology, and communication (among others). Dr. Robbins will delve into the hard-wired human need to belong – and what happens when that need is not met.  Leaders will walk away energized with a clear DE&I strategy, the positive impact it will have on their organization and how it will empower their teams and key stakeholders to view DE&I as vital to success, not just something that is an afterthought.

Tuesday, March 21, 2023 / 09:45 AM - 10:30 AM CDT

Coffee Break

Join us for refreshments in a brief break between sessions.

Tuesday, March 21, 2023 / 09:45 AM - 06:30 PM CDT

Exhibit Showcase Open Hours

Visit the Exhibit Showcase to evaluate industry offerings that can move your business forward. Engage with your peers, Gartner experts, and exhibitors. Attend a theater session to see technology in action.

Tuesday, March 21, 2023 / 09:45 AM - 06:30 PM CDT

Engagement Zone by Arcon

Engagement Zone by Arcon

Tuesday, March 21, 2023 / 09:45 AM - 06:30 PM CDT

Engagement Zone by Transmit Security

Engagement Zone by Transmit Security

Tuesday, March 21, 2023 / 09:45 AM - 06:30 PM CDT

Engagement Zone by Okta

Engagement Zone by Okta

Tuesday, March 21, 2023 / 10:00 AM - 10:20 AM CDT

Curity: Securing APIs and Microservices at Scale

Travis Spencer, CEO, Curity

Security is never a simple task; the same applies to APIs. And even more challenging at scale. It’s naturally easier to protect a few endpoints and microservices than hundreds. As the API ecosystem grows, just starting to use OAuth may not be enough. Proper handling of OAuth tokens, utilising different features, and other non-trivial implementation details must be overcome. To help with these, this talk will describe:
- The different perspectives that should be viewed when assessing the size of an API ecosystem; Common security issues; and
- How to address these security challenges.

Tuesday, March 21, 2023 / 10:00 AM - 10:20 AM CDT

Ermetic: Leveraging CIEM to Secure Cloud Identities and Entitlements at Scale

Thomas Gentsch, Sr. Solution Engineer, Ermetic

A leading cause of cloud security failures is inadequate management of identities, access & privileges which hold the key to accessing applications & data.

With thousands of human & machine identities, configurations & permissions, it’s difficult to visualize & remediate access risk; but CIEM tools can limit the attack surface & help reduce blast radius in case of a breach.

Join Ermetic’s Sr. Sales Engineer Thomas Gentsch to learn about key CIEM capabilities including removing excessive privileges, detecting behavioral anomalies and delivering JIT access to protect your data at scale.

Tuesday, March 21, 2023 / 10:00 AM - 10:30 AM CDT

VIP Book Signing - Steve Robbins (Please note that quantities are limited and participation will be first come, first served)

Dr. Steve Robbins, Chief Curiosity Cultivator, S.L. Robbins and Associates

Join us for an exclusive book signing with Guest Keynote Speaker Steve Robbins. Please note that quantities are limited and participation will be first come, first served.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, March 21, 2023 / 10:30 AM - 11:00 AM CDT

Avoid the Breach With Identity Threat Detection and Response

Henrique Teixeira, Sr Director Analyst, Gartner

Conventional IAM and security prevention controls are not sufficient to protect your identity system itself from cyberattacks. Learn how to enhance your cyberattack preparedness with the emerging discipline of ITDR.

Tuesday, March 21, 2023 / 10:30 AM - 11:00 AM CDT

Crossfire Debate: Live on Stage, IGA Stories From the Trenches

Rebecca Archambault, Sr Director Analyst, Gartner

Brian Guthrie, Director Analyst, Gartner

Gautham Mudra, Sr Director Analyst, Gartner

Nathan Harris, Sr Director Analyst, Gartner

This session will provide an interview-style presentation with participating guests, who will share their thoughts and ideas from the IGA project implementations.

Tuesday, March 21, 2023 / 10:30 AM - 11:00 AM CDT

Cybersecurity Mesh Architecture 101

Patrick Hevesi, VP Analyst, Gartner

With many IT assets now outside traditional enterprise perimeters, IT leaders must rethink security. Enter the cybersecurity mesh architecture with a composable and scalable approach that fosters tighter integration between security controls by creating connections between them. This enables them to share information, intelligence and to act more like a collaborative team in protecting distributed assets.

Tuesday, March 21, 2023 / 10:30 AM - 11:00 AM CDT

The State of Customer IAM, 2023

Mary Ruddy, VP Analyst, Gartner

Demand for customer IAM has increased, due to its importance in converging UX, security and privacy for high-assurance interactions. How is CIAM technology continuing to evolve to meet these new challenges? We will talk about what is available today, and what kinds of things can you expect to take advantage of in the near future.

Tuesday, March 21, 2023 / 10:30 AM - 11:00 AM CDT

Why Is It So Hard To Prove Someone's Identity Online?

Akif Khan, VP Analyst, Gartner

Obtaining confidence in a customer’s or employee's identity is the foundation of identity-first security. Identity and access management (IAM) leaders must understand the current state-of-the-art, balancing assurance needs with friction in the UX, while orchestrating multiple tools and becoming aware of strategic trends on the horizon.

Tuesday, March 21, 2023 / 10:30 AM - 11:15 AM CDT

Ask the Expert: Effective Identity Management for Microsoft 365

Paul Rabinovich, Sr Director Analyst, Gartner

Whether you are just starting on a Microsoft 365 deployment or have had one for some time, threats against your users continue to evolve. IAM controls in Microsoft 365 must adapt accordingly.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, March 21, 2023 / 10:30 AM - 11:15 AM CDT

Ask the Expert: Enterprise Antifragility

Dave Aron, Distinguished VP Analyst, Gartner

Linked to the session on antifragility hacks, in this session we will take questions on the topic of enterprise antifragility: What it is, how to achieve it, hacks to get there and examples.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, March 21, 2023 / 10:30 AM - 12:00 PM CDT

Workshop: How to Use 3 Powerful Financial Models for Negotiation Leverage and Bargaining Power

Jo Ann Rosenberger, Distinguished VP, Advisory, Gartner

IT and IAM leaders will see how to use three financial models for leverage and bargaining power as this workshop demonstrates these financial models through three technology and cloud negotiation scenarios. Attendees will participate in two hands-on activities where they will receive ready-to-use templates and checklists to be used during the workshop to enhance their negotiation playbooks.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, March 21, 2023 / 10:30 AM - 12:00 PM CDT

Workshop: Selecting the Right Employee SSO Solution for Your Organization

David Chase, Sr Director Analyst, Gartner

Modern architectures and applications place additional demands on access management tools. This workshop will introduce access management evaluation criteria guidelines, and discuss what features you should look for and what vendors to consider for your next employee access management solution.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, March 21, 2023 / 11:15 AM - 11:45 AM CDT

Bravura Security: Blue Cross Blue Shield's Journey From Passwords to Passwordless

Phillip Boyd, SR. INFRASTRUCTURE DESIGN ENGINEER, BCBSNC

What's next for Blue Cross Blue Shield on its journey to dial in its password and passwordless management strategy? When it's on-premises password solution aged out, risk symptoms showed up as employee frustration, a swamped help desk, and falling behind in the IT refresh cycle. Blue Cross Blue Shield of North Carolina transformed its core password management strategy with a modern SaaS solution. It delivered a frictionless employee experience that not only reduced the company's risk but also reduced help desk volume by 80% to date. Now the company is evaluating its leap to passwordless.

Tuesday, March 21, 2023 / 11:15 AM - 11:45 AM CDT

IBM: Journey of a Health Insurance Company in Securing Access for 1.5M+ Customers

Marcelo Oks, SECURITY ARCHITECT, OSDE

Customers expect a seamless journey when digitally interacting with businesses. Businesses want a single view of their customers. And developers want to build applications quickly. How do you grant everyone's wish? Hear from the Lead Security Architect at OSDE, Argentina's largest Health Insurance Company, on how they went from a highly coupled, low availability system to a modern Consumer IAM supporting over 1.5M Customers. With centralized authentication, frictionless access to multiple apps from one login, and integration with third-party apps - everyone has their wish granted!

Tuesday, March 21, 2023 / 11:15 AM - 11:45 AM CDT

Ivanti: Focus On What Matters Most - Risk

Rob Lesieur, PRODUCT MARKETING, Ivanti

Security practitioners and vendors have historically struggled to relate the expense, efforts and results of cybersecurity that effectively communicates the value to the organizations who consume it. Value has been pitched in terms of worst-case scenarios that percolate to the top of the collective consciousness of the market in instances where there are severely negative outcomes. In this session, we’ll explore how the concept of risk can be applied to cybersecurity strategy and execution to bring clarity and understanding to the entire organization.

Tuesday, March 21, 2023 / 11:15 AM - 11:45 AM CDT

Ping Identity: From Concept To Reality - Decentralized Identity

Loren Russon, SENIOR VICE PRESIDENT OF PRODUCT & TECHN, Ping Identity

Today’s identity systems are a centralized collection of user data that require businesses to integrate, secure and maintain them. According to the Verizon DBIR, more than 80% of breaches start with compromised credentials. Decentralized identity represents a massive paradigm shift that will reduce the need for organizations to collect personally identifiable information, protect the privacy of users’ data, and let them control how their identity-related information is collected and stored. We’ll explore various use cases for how to take this concept and make it a reality.

Tuesday, March 21, 2023 / 11:15 AM - 11:45 AM CDT

SAVIYNT: Identity Management Evolution: Customer Views of Converged Identity Platforms

Jaime Lewis-Gross, VP, Solution Engineering, Saviynt

John Lawson, IAM PLATFORM OWNER, Kiewit Corporation

Paul Schnarr, SR MANAGER IDENTITY ACCESS MANAGEMENT, Seagen

Kenny Grunewaldt, INFORMATION SECURITY DIRECTOR, SANFORD HEALTH NETWORK

This panel discussion will examine the advantages and features of a converged identity platform. Participants will gain insight into converged identity platforms, including identity access management, privileged access, application access, and third-party governance.

The panel will explore how a converged identity platform addresses a wide range of use cases while providing optimal user experience, high ROI, and low cost of ownership.

The discussion will benefit IT and security professionals, business leaders, and compliance officers looking to enhance their organization's identity security.

Tuesday, March 21, 2023 / 11:15 AM - 11:45 AM CDT

Simeio: From Ad Hoc to Advanced: A Journey Towards Identity Program Maturity

Christopher Schueler, CEO, Simeio

Alfred Bonilla, DIRECTOR, CLOUD ACCESS MANAGEMENT, MasterCard Worldwide

Kelli Hepburn, GLOBAL HEAD OF IAM, Aegon Transamerica

Asif Savvas, Chief Product Officer, Simeio

Identity security program maturity determines the capability of an organization to manage its identity and access management risks. To attain the maturity, organizations undergo many hurdles from balancing security with ease of use and productivity to ensuring compliance with regulations and standards, to keeping pace with ever evolving threats. This speaking engagement will focus on the journey of organizations in attaining IAM program maturity, the challenges and assessing them, and find solutions to remove the obstacles, and measuring the success.

Tuesday, March 21, 2023 / 11:15 AM - 11:45 AM CDT

Transmit Security: Breaking Identity Silos - How Identity Orchestration Helped TIAA Consolidate CIAM

David Mahdi, Chief Identity Officer, Transmit Security

Gaurav Kothari, Director, Digital Identity Services and, TIAA

Identity siloes expose gaps in intelligence that organizations often struggle to fill with complex code and new services. This multiplies the time and cost of development and maintenance. Learn from TIAA in how orchestrating workflows for diverse customer scenarios enabled them to eliminate 60,000 lines of code, shrink the time required to create new controls from months to hours and reduce call center time. Discover how to consolidate and bridge the gaps between siloed providers — and how your teams and your customers can benefit as a result.

Tuesday, March 21, 2023 / 11:15 AM - 12:00 PM CDT

ETSS: Cyber Security Physics - Breaking the Attack Chain, moderated by BeyondTrust

Morey Haber, CSO, BeyondTrust

Learn the how you can break the attack chain and establish a solid foundation for security project success

• Common attack chain entry points
• Practical steps you can take to block entry
• How PAM ensures project success

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, March 21, 2023 / 12:00 PM - 12:20 PM CDT

So What Exactly Is (and Isn't) IGA and How Is It Different From Access Management?

David Collinson, Sr Director Analyst, Gartner

This is a session to introduce what IGA is and is not, and how it differs and interacts with access management tools. Ideal for individuals that are being asked to take on responsibilities in this area or for senior leaders to be given a high-level introduction in to these capabilities.

Tuesday, March 21, 2023 / 12:00 PM - 12:30 PM CDT

Insights From the Magic Quadrant and Critical Capabilities for Privileged Access Management

Felix Gaehtgens, VP Analyst, Gartner

James Hoover, Principal Analyst, Gartner

Through a selection of relevant Gartner insights and complementary methodologies, we will provide insight into latest updates in the privileged access management market.

Tuesday, March 21, 2023 / 12:00 PM - 12:30 PM CDT

Technical Insights: (Re)implement the Right Identity Protocol in Your Apps, Services and APIs

Erik Wahlstrom, Sr Director Analyst, Gartner

What modern identity protocol should you implement in your applications and services, such as OAuth 2.0, OpenID Connect, SAML, OPA, FIDO? How do you do it at scale? In this technical session we will define what protocol to use for what specific use case.

Tuesday, March 21, 2023 / 12:00 PM - 12:30 PM CDT

Weaponize Risk Appetite to Drive Risk Decisions

Paul Proctor, Distinguished VP Analyst, Gartner

Risk appetite fails when it is expressed in fuzzy, imprecise terms. Repositioning risk appetite in the context of investment and value delivery creates a measurable scale of risk that powers a new type of governance. Concrete assertions of risk appetite make executive decisions binding.

Tuesday, March 21, 2023 / 12:00 PM - 12:30 PM CDT

Maximizing Business Value with IAM Maturity Assessment

Nathan Harris, Sr Director Analyst, Gartner

Security and risk leaders struggle to deliver demonstrable business value from their IAM investments. Maturity Assessment approaches hold promise for improving business value delivery, but realization of this improved business value is inconsistent. This session will outline Gartner's IT Score for IAM and practical steps for applying it effectively to increase business value delivery.

Tuesday, March 21, 2023 / 12:00 PM - 12:30 PM CDT

Case Study: The Identity at the Center Podcast Goes Inside the Belly of the Gartner IAM Beast

Jim McDonald, Director, RSM US LLP

Jeff Steadman, Director, RSM US LLP

In this session, Identity at the Center podcast hosts Jim McDonald and Jeff Steadman interview Gartner Identity & Access Management (IAM) analysts Henrique Teixeira and Rebecca Archambault. You'll learn their IAM origin stories and about their path to becoming Gartner analysts. You'll also hear opinions on past, present, and future IAM trends across access management, identity governance, privileged access, and more with questions sourced straight from the podcast's global audience. It will be an entertaining and informative conversation with audience participation throughout that will provide a unique experience for attendees.

Tuesday, March 21, 2023 / 12:00 PM - 12:45 PM CDT

Ask the Expert: IGA Deployments

Nat Krishnan, Sr Director Analyst, Gartner

This is an ask the expert session where you can ask any questions around IGA deployment — how to get started; common issues; how to keep the business engaged; reporting; and any other issues.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, March 21, 2023 / 12:00 PM - 12:45 PM CDT

Ask the Expert: Top Trends & Predictions in Cybersecurity

Oscar Isaka, Sr Director Analyst, Gartner

Join us in this session to discuss the top trends and predictions in cybersecurity for 2023. You will have the opportunity to ask questions and have a healthy discussion with Gartner experts and peers.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, March 21, 2023 / 12:15 PM - 02:00 PM CDT

Attendee Lunch

Join other attendees for lunch and take advantage of the opportunity to network and catch up on the day's activities so far.

Tuesday, March 21, 2023 / 12:45 PM - 01:05 PM CDT

Keyfactor: State of Machine Identity Management 2023: Key Trends, Takeaways, and Best Practices

Christopher Hickman, CHIEF SECURITY OFFICER, Keyfactor

Did you know that 92% of organizations still experience outages caused by expired certificates? In this session, Chris Hickman, Chief Security Officer of Keyfactor, will reveal the findings of this year’s State of Machine Identity Management Report, conducted with Ponemon Institute. Join this session to learn about key trends in PKI, signing, and certificate management, what your organization can do to build an effective strategy for managing machine identities, and how to mitigate the risks of outages, audit findings, and security incidents caused by mismanaged machine identities.

Tuesday, March 21, 2023 / 12:45 PM - 01:05 PM CDT

Quest Software: An Adversary’s View on Active Directory Security & How to Make Attackers Work Harder

Ryan Bechtloff, SALES ENGINEER, Specter Ops

Decades of Active Directory have established the backbone of identity for the modern enterprise and despite our best efforts to push to the cloud, it's not going anywhere anytime soon. In this talk, we'll provide the adversary perspective of Active Directory and why existing efforts in AD security have done little to stop attackers. We'll show you how attackers think about exploiting Active Directory and where to invest effort that will make attackers achieving their objectives much more difficult.

Tuesday, March 21, 2023 / 12:45 PM - 01:30 PM CDT

Sponsored Lunch Address: A Large Bank’s Identity Modernization Journey, hosted by Edgile + Wipro

Lawrence Wolf, Managing Partner, Edgile

Craig Glogower, PROJECT ENGINEERING - IAM, First Citizens Bank

Ashish Chandra, GM AND PRACTICE HEAD, Wipro

As organizations continue their digital transformation, IGA needs to account for ALL identities – employees, contractors, customers, vendors, dealers and more. The cloud journey requires re-baselining IAM technologies and processes and developing a well-thought-out strategy to ensure key stakeholder buy-in and continued program momentum. We will highlight a large bank’s Identity modernization journey from developing a sound strategy, business case and roadmap, to solution implementation through effectively managing Identity operations with managed services.

Tuesday, March 21, 2023 / 01:00 PM - 01:30 PM CDT

ARCON: Ditch Siloed IAM: Convergence, a Must For Identity Threat Detection & Response

Anil Bhandari, Chief Mentor, Arcon Techsolutions

An increase in the types of digital identities, coupled with multi-cloud adoption, has added complexity to managing identities and privileges. How does one get future-ready, to address these new-age challenges? An Identity-centric security strategy centers on effective governance with zero trust, that simplifies and unifies critical aspects of Access Management (AM), Identity Governance Administration (IGA) and Privileged Access Management (PAM). Join us to explore the benefits of a Converged Identity security approach that is outcome-driven, and looks to ditch the silos of key IAM components.

Tuesday, March 21, 2023 / 01:00 PM - 01:30 PM CDT

Optiv: 3 Steps to Accelerate Identity Modernization

Ellen Schmidt, PRACTICE MANAGER, Optiv

Steve Szulczewski, ADVISOR - IAM, Optiv

Organizations are accelerating their journey to the cloud to enable access from anywhere, anytime. However, many organizations still struggle to manage the right level of workforce and customer access that enables business operations without compromising security. To address this challenge, IAM leaders must rethink their IAM strategy beyond tools and siloed cybersecurity initiatives and adopt an identity program that aligns security requirements, business needs, and user adoption. You will learn 3 effective steps that are required to create a modern and effective IAM program.

Tuesday, March 21, 2023 / 01:00 PM - 01:30 PM CDT

PlainID: Driving Cybersecurity Resilience with Next-Gen Authorization

Gal Helemski, CO-FOUNDER AND CTO/CPO, PlainID

Modern business initiatives call for modern access control requirements. As enterprises face a rapidly growing volume of identities and data, they must identify an access control solution that can keep up with business demand and a growing attack surface. Centralized Authorization management with distributed enforcement, built on a Policy-based Access Control framework, simplifies/standardizes the approach to Authorization enterprise-wide. Learn: How Next-Gen Authorization impacts cybersecurity resilience Why business teams are working with security teams to drive business outcomes.


Tuesday, March 21, 2023 / 01:00 PM - 01:45 PM CDT

ETSS: Two Sides of the Same Coin - PAM for OT & IT, moderated by WALLIX

Didier Lesteven, COO, Wallix

Walter Lewis, SENIOR VICE PRESIDENT NA SALES, Wallix

Richard Weeks, SVP GLOBAL ALLIANCES & AMERICAS CHANNELS, Wallix USA

Today’s enterprises may have an operating boundary between Information Technology and Operational Technology computing. These have grown in parallel, based on different budgets, network protocols and Subject Matter Experts required to maintain operational readiness. In theory, cybersecurity should respect no computing boundaries within a domain, yet these “fiefdoms” exist, creating additional cost and complexity.
This session will introduce WALLIX cutting-edge PAM capabilities to protect both IT & OT in the face of today’s threats. We'll discuss architecture, cost and common use cases.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, March 21, 2023 / 01:10 PM - 01:30 PM CDT

iC Consult: 20 Impactful Minutes on Reliable Identity​

Aaron Lentz, VP - ADVISORY & STRATEGY, ICSYNERGY INTERNATIONAL LP

Saurabh Sharma, PRINCIPAL, iC Consult

The fluidity of the identity market, the ever-evolving threat landscape, & maturing feature sets can be challenging to keep up with. Add to that the evolving enterprise culture, resource constraints, hiring and retaining skilled talent, and external factors (e.g. Covid, recession fears, etc.). In this session we’ll explore how to simplify an identity and access management program by focusing on value, building for scale, overcoming hurdles, & taking advantage of the growing Identity industry. We will also share how some of the large enterprises are tackling today's Identity & access challenges

Tuesday, March 21, 2023 / 01:10 PM - 01:30 PM CDT

RAAH: Don't Buy First, Plan First: Achieving Success with Customer IAM

Naren Jangid, FOUNDER & CEO, RAAH Technologies Inc

Building a CIAM program requires understanding specific use cases & needs. Many orgs mistakenly buy software before evaluating needs, leading to wasted resources & a delay in delivering value to the program. Attend this session to learn how to assess business & tech needs, prepare for digital transformations, leverage customer data, build identity-centric business ecosystems, and plan CIAM strategy and cost. Walk away with foundational knowledge to build a successful program over buying a toolset.

Tuesday, March 21, 2023 / 01:35 PM - 01:55 PM CDT

Alcor: Propel Enterprise Identity Governance and Administration to the Next Level

Pulkit Agrawal, MANAGER - MARKETING & PRODUCTS, Alcor Solutions, Inc.

Imagine a world where Identity Governance and Administration (IGA) is transformed - where end-to-end automation and improved compliance are the norms. With AccessFlow, a SOC-certified, cloud-based solution, built on the ServiceNow platform, this world is within reach. Our solution offers streamlined access management, proactive risk management, and complete visibility all while leveraging the performance, security, and user-friendly interface of ServiceNow. Join us as we demonstrate how AccessFlow can skyrocket your organization’s approach to Access Management and Identity Governance.

Tuesday, March 21, 2023 / 01:35 PM - 01:55 PM CDT

StrongDM: Eliminating Credentials to Make Users, Admins & Security More Productive

Justin Mccarthy, CTO, StrongDM

How did we get into the situation where users can’t access what they need to work, admins are overwhelmed with manual tasks, and no one has visibility into who has access to what and whether they even should? By removing credentials from the equation and creating a secure path of least resistance you can measurably move your organization closer to true least privilege and have the receipts to prove it. All while making everyone’s job better. You’re probably thinking, “easier said than done.” No worry, we’ll show you how.

Tuesday, March 21, 2023 / 02:00 PM - 02:30 PM CDT

Best Practices in Communicating the Business Value of Cybersecurity

Bernard Woo, VP Analyst, Gartner

There are multiple approaches for communicating the business value of cybersecurity, but none of them offer a single "best" way as all are relevant to different contexts. This presentation will discuss the characteristics of common approaches such as RO(S)I, price-performance analysis, outcome-driven approach, etc., and provide guidance on selecting the appropriate approach based on context.

Tuesday, March 21, 2023 / 02:00 PM - 02:30 PM CDT

Crossfire Debate: Live on Stage, Decentralized Identity Adoption Strategy in the Coming Years

Homan Farahmand, VP Analyst, Gartner

Erik Wahlstrom, Sr Director Analyst, Gartner

Michael Kelley, Sr Director Analyst, Gartner

In this lively crossfire debate, we discuss decentralized identity and related technologies development, challenges, and how fast they will mature over the next few years. The panelist also offers their opinion on alternative adoption strategies in the coming years to reap the benefits while avoiding expensive mistakes.

Tuesday, March 21, 2023 / 02:00 PM - 02:30 PM CDT

Hype Cycle for Digital Identity

Felix Gaehtgens, VP Analyst, Gartner

This Hype Cycle for Digital Identity emphasizes the maturation of innovations that enable and deliver digital identity services.

Tuesday, March 21, 2023 / 02:00 PM - 02:30 PM CDT

The State of User Authentication, 2023: What it Is, Why It Matters, How It Will Change

Ant Allan, VP Analyst, Gartner

User authentication is a cornerstone of identity-first security, and digital identity for workforce and customers. Market hype about passwordless, risk-based and continuous authentication can be daunting. This session will help IAM leaders understand the value of authentication, the shift to continuous adaptive trust, and where this fits with zero trust, adaptive access and the identity fabric.

Tuesday, March 21, 2023 / 02:00 PM - 02:30 PM CDT

Technical Insights: The Pitfalls of MFA and How to Avoid Them

David Chase, Sr Director Analyst, Gartner

Authentication is often the most impactful to user experience. Adding multifactor authentication is critical for improving security, but it must be done carefully to avoid disastrous user experiences.

Tuesday, March 21, 2023 / 02:00 PM - 02:45 PM CDT

Ask the Expert: IAM Program Management

Rebecca Archambault, Sr Director Analyst, Gartner

Organizations understand the important role that identity plays in their cybersecurity program, however security and risk management leaders aren't clear on where to begin. For those who have a defined IAM program, their efforts often stall, limiting their ability to mature their IAM capabilities. Bring your questions to this session, where we can talk about initiating or enhancing your IAM program.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, March 21, 2023 / 02:00 PM - 03:30 PM CDT

Workshop: Defining Great Metrics for IAM

David Collinson, Sr Director Analyst, Gartner

Knowing what metrics matter to your IAM stakeholders is critical to prioritizing, developing and monitoring IAM features. Metrics identify the success of individual projects, and where attention and improvements must take place. To succeed, they must be terms that the stakeholders recognize and understand. They should also align with or influence other initiatives. This workshop will enable you to learn how to set proper expectations.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, March 21, 2023 / 02:00 PM - 03:30 PM CDT

Workshop: Sharpen IT Influence in the Board Room With Risk, Value, and Cost

Paul Proctor, Distinguished VP Analyst, Gartner

Technology investments in a business context create better business outcomes. Balancing risk, value and cost is central to all business decision-making and a powerful lens to drive IT priorities and investments. Gartner’s RVC model and outcome-driven metrics help the modern CIO link technology investments back to business outcomes.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, March 21, 2023 / 02:45 PM - 03:15 PM CDT

Axiad: A Pragmatic Path to Phishing Resistance with Certificate-Based Authentication

Bassam Al-Khalidi, CO-CEO, Axiad IDS, Inc.

Dave Przybylo, Principal Architect, Cybersecurity, CarMax

Phishing resistance is a top priority for 1 in 2 security executives for 2023. With a sharp increase in attacks last year, plus the U.S. White House OMB and CISA strongly advocating for greater efforts to become more phishing resistant, it’s easy to see why. IAM systems can help, but without certificate-based authentication (CBA), most of these systems fall short. In this session, learn how to supplement your existing investments in IAM with CBA—to add phishing resistance, deliver value, and improve your overall cybersecurity posture without ripping and replacing.

Tuesday, March 21, 2023 / 02:45 PM - 03:15 PM CDT

Digicert: Invisible Authentication - Simplifying Access and Improving Security

Brian Trzupek, SVP PRODUCT, DIGICERT - UT

In this session, Brian Trzupek will discuss “invisible authentication” as a strategy to improve end user experience, reduce the IT support burden, and improve security posture related to authentication to IT services and applications. Invisible authentication is governed by certificate-mediated rather than password-governed access. Brian will explore how organizations are:
-Automating certificate provisioning for authentication to services such as WiFi and VPN
-Achieving instant revocation and remediation to eliminate security gaps
-Managing last-mile installation to end-user applications

Tuesday, March 21, 2023 / 02:45 PM - 03:15 PM CDT

IDMWORKS: Future Proofing Your Identity Investment, Strategy and Delivery

Bill Willis, FIELD CTO, IDMWORKS

You've spent the money to manage the identities of the business, now what?

- Will it stand the test of time?
- Did we position the products to maximize their capabilities?
- Is the Identity Strategy in lock step with the company's security vision and posture?

Tuesday, March 21, 2023 / 02:45 PM - 03:15 PM CDT

SSH: How To Become Passwordless in a Borderless World?

Miikka Sainio, CTO, SSH Communications Security

To improve security and ensure compliance, organizations are moving away from static perimeter-based cyber defense to a Zero Trust model, where there are no passwords or keys nor implicitly trusted users, connections, applications, servers, or devices. The increased need for remote work, multi-cloud environments & 3rd party access have created the need for solutions that are passwordless and borderless.

Join this session to learn how you can:

- Get rid of all passwords
- Move past rotating secrets
- Forget SMS-based MFA
- Base your access on identities
- Monitor, verify and control 24/7

Tuesday, March 21, 2023 / 02:45 PM - 03:15 PM CDT

Tuebora: Ease of Deployment: Making IGA Fun Again?

Brian Iverson, CHIEF PRODUCT OFFICER, Tuebora

Punishing, frustrating, expensive, tedious. We are all accustomed to hearing these words in conversations about IGA. That doesn’t sound like fun. Was IGA ever fun? It can be with the right mindset and tooling. This session will cover sources of friction in the deployment and operation of IGA solutions, and present techniques that should accelerate your execution and let you have some fun along the way.

Tuesday, March 21, 2023 / 02:45 PM - 03:15 PM CDT

Veza: Case Study - Wynn Resorts’ Identity-first Strategy for Achieving Continuous Compliance

Rich Dandliker, CHIEF STRATEGIST, VEZA

David Tyburski, CHIEF INFORMATION SECURITY OFFICER, Wynn Resorts

Companies are storing data across more cloud systems than ever before. This increases the attack surface and the burden of managing access for any human and machine identities. Join us to hear David Tyburski, VP of Information Security & CISO, Wynn Resorts, detail Wynn’s innovative strategy for automating the management of access permissions for 20,000 identities and hundreds of apps, enabling Wynn to maintain least privilege for their global organization. David will discuss how Veza plays a critical role in automating privileged access to data, moving towards continuous compliance, improving user off-boarding security processes, and reducing privilege sprawl across all systems.

Tuesday, March 21, 2023 / 02:45 PM - 03:15 PM CDT

SecureAuth: MFA is so 80’s – Use Continuous Authentication to Get Invisible MFA

Paul Trulove, CEO, SecureAuth

Remembering the ‘80’s is fun. But using traditional MFA methods that harken back to yesteryear – not so fun. Attend this session to learn about invisible MFA. It provides superior security without the friction of its legacy predecessors. When coupled with a risk-based, passwordless continuous authentication approach, you’ll be able to realize these benefits in record time:
-Massive cost savings of millions of dollars per year
-Delighting users while meeting ZTA and cyber insurance requirements
-Securing all identities across all systems via Device Trust

Tuesday, March 21, 2023 / 02:45 PM - 03:30 PM CDT

ETSS: MFA in Depth – Don’t Get Caught up in MFA Theater, moderated by Delinea

Chris Witeck, VICE PRESIDENT OF PRODUCT MANAGEMENT, Delinea

MFA is one of the most effective methods in stopping attacks dead in their tracks and preventing lateral movement. MFA for SaaS apps or your perimeter are good, but not sufficient in preventing sophisticated attacks, as evidenced by recent breaches and court cases. Join this interactive discussion to deploy MFA-in-depth throughout your enterprise, especially around privileged access – from secrets checkout to machine-login to privilege elevation and more. It’s all part of the PAM deployment journey with the goal of enabling people to get their work done while minimizing opportunity for abuse.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, March 21, 2023 / 03:15 PM - 03:45 PM CDT

Coffee Break

Join us for refreshments in a brief break between sessions.

Tuesday, March 21, 2023 / 03:20 PM - 03:40 PM CDT

Authomize: 4 Steps to Operationalizing ITDR

David Bullas, SENIOR DIRECTOR SALES ENGINEERING, AUTHOMIZE

According to Identity Defined Security Alliance 2022 Trends research, 84% of
identity and security professionals say their organization has experienced an identity-related breach in the last year. Detecting Identity-based risks and threats, such as account takeovers, insider threats, and privilege escalations, and responding to them effectively is essential in enhancing Cyberattack preparedness.

In this session, we will review four steps organizations take to protect their hybrid cloud environment from Identity-based attacks and operationalize Identity Threat Detection and Response (ITDR).

Tuesday, March 21, 2023 / 03:20 PM - 03:40 PM CDT

Identopia: Onboard 100 Applications to SailPoint Within 3 Days-Redefining Impossible!

Ranjeet Gollapudi, CTO, Identopia Inc

Reviewing access is an important component of any Identity Governance and Administration (IGA) program. Onboarding applications into the IGA solution at this point is like a basic pre-requisite to ensure that access from the applications is available to be reviewed. The application onboarding process can be cumbersome when there is a gap between the application teams providing the info and the IGA team developing the integration. This gap can be bridged by giving the application team appropriate tools to provide information that automatically generates the integration within the IGA solution.

Tuesday, March 21, 2023 / 03:45 PM - 04:15 PM CDT

Insights from the Magic Quadrant and Critical Capabilities for Access Management

Brian Guthrie, Director Analyst, Gartner

Michael Kelley, Sr Director Analyst, Gartner

This session will present the Magic Quadrant and Critical Capabilities for the access management market.

Tuesday, March 21, 2023 / 03:45 PM - 04:15 PM CDT

CIEM Is Paving the Way for Identity Fabric Immunity in the Cloud. What's Next?

Henrique Teixeira, Sr Director Analyst, Gartner

Preventive mechanisms offered by emerging technologies like cloud infrastructure entitlement management (CIEM) include security posture principles to handle misconfiguration, vulnerabilities, and general exposure of entitlements in cloud infrastructures. Hygiene and security posture is a must have complement to run time threat detection and response disciplines. Join this session to learn how CIEM is paving the way to smarter strategies for enabling identity fabric immunity.

Tuesday, March 21, 2023 / 03:45 PM - 04:15 PM CDT

How to Combat Inflation During Vendor Negotiations Using Gartner's Four-Step Approach

Jo Ann Rosenberger, Distinguished VP, Advisory, Gartner

Inflationary times create added complexity when negotiating with vendors. Gartner's four-step approach to proactively plan for new and renewal deals can help assess the fairness of increases as well as use data points from economic indicators such as CPI and ECI to customize "should cost" models to use during vendor negotiations. This session will demonstrate these steps by walking through two case study scenarios.

Tuesday, March 21, 2023 / 03:45 PM - 04:15 PM CDT

Technical Insights: Policy-Based Authorization Architecture Patterns

Homan Farahmand, VP Analyst, Gartner

Policy-based authorization has become a focal point for developing the next generation of identity-centric access controls. However, the one-size authorization architecture doesn't fit all authorization use cases. In this session. we review key enterprise policy management requirements and runtime architecture patterns for cloud, API, applications, data & analytics, microservices and other common authorization use cases.

Tuesday, March 21, 2023 / 03:45 PM - 04:15 PM CDT

Use Journey-Time IAM Orchestration to Deliver Better UX

Akif Khan, VP Analyst, Gartner

A typical digital user journey may involve a broad range of IAM tools from identity proofing to authentication to access management to fraud detection. Getting all of these instruments to play in harmony is an increasingly complex challenge. Organizations are buying or building orchestration layers to conduct the symphony. Learn how such orchestration can reduce complexity and improve UX.

Tuesday, March 21, 2023 / 03:45 PM - 04:30 PM CDT

Ask the Expert: User Authentication

Ant Allan, VP Analyst, Gartner

This interactive session enables attendees to ask the Gartner expert and learn from others about any authentication or adjacent topic. Topics covered include requirements definition, the pros and cons of different technologies, passwordless authentication trends, the shift towards continuous adaptive trust, synergies with identity proofing, user experience and life cycle management.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, March 21, 2023 / 04:30 PM - 05:00 PM CDT

Crossfire Debate: Live on Stage, Stories of Running Successful IAM Program — What to Do; What to Avoid!

Brian Guthrie, Director Analyst, Gartner

Rebecca Archambault, Sr Director Analyst, Gartner

David Collinson, Sr Director Analyst, Gartner

Nathan Harris, Sr Director Analyst, Gartner

This will be a lively debate between Gartner analysts with a wealth of practical experience running IAM programs and implementations over several decades. An informal discussion around what worked well; what should be avoided and what we see others doing that is worth a closer look.

Tuesday, March 21, 2023 / 04:30 PM - 05:00 PM CDT

Outlook for Network Security, 2023

John Watts, VP Analyst, Gartner

Users, devices, applications and data are everywhere. Networks are too. As organizations rapidly expand their footprint and support a hybrid workforce, how does network security evolve to keep up? Security and risk management leaders must understand the current trends in network security and make business aligned, risk focused decisions on where best to use network security today.

Tuesday, March 21, 2023 / 04:30 PM - 05:00 PM CDT

Technical Insights: Implement IAM Best Practices for Your Active Directory

Paul Rabinovich, Sr Director Analyst, Gartner

Active Directory is a critical IT asset for an overwhelming majority of organizations. This session will guide you on how to apply current IAM best practices to Active Directory. Among other things, we'll talk about hybridization and cloud, topology optimization, group management, identity governance, privileged access management, MFA, and AD threat detection and response.

Tuesday, March 21, 2023 / 04:30 PM - 05:00 PM CDT

Case Study: Seattle Children's Improves Quality of Life, Reduces Burnout with Access Management

Dr. Zafar Chaudry, Sr. Vice President and Chief Digital and Information Officer, Seattle Children's Hospital

When Dr. Chaudry came to Seattle Children's Hospital, he noticed access and authentication were a problem for clinicians. After process-mapping workflows and consulting experts, doctors, and nurses themselves, Dr. Chaudry determined the right solution. Through implementing password-less single sign-on, about 15 minutes typically spent interacting with technology were shaved off of each clinician's workflow, drastically improving their quality of life. They later implemented a similar multifactor authentication process for the electronic prescribing of controlled substances. This no-click access SSO method coupled with secure MFA improved employees' work-life balance, allowing them to focus more on patient care and less on technology, while enabling security and compliance. Further, these solutions together establish the core for holistic digital identity security. This session will discuss how streamlined identity and access management paves the way to comprehensive digital identity management. This approach lays the groundwork for zero trust and provides room for healthcare organizations to expand upon security from the inside out, with agility and efficiency.

Tuesday, March 21, 2023 / 04:30 PM - 05:00 PM CDT

Case Study: What’s Next for Digital Identity? NIST’s R&D Priorities

Ryan Galluzzo, Digital Identity Program Lead for the Applied Cybersecurity Division, National Institute of Standards and Technology (NIST)

Ryan Galluzzo, the Digital Identity Program lead for NIST’s Applied Cyber Security Division will provide insight into NIST's strategic Digital Identity roadmap and key areas of research and development for the coming years. This discussion will allow organizations to advance their understanding of where NIST is investing resources and how guidance will progress to address key challenge areas including equitable access, user choice, privacy, interoperability, and security. Further, this session will cover critical changes to the Digital Identity Guidelines a DRAFT version of which were published in December of 2022.

Tuesday, March 21, 2023 / 05:00 PM - 06:30 PM CDT

Exhibit Showcase Networking Reception

Join us for a networking reception on the Exhibit Showcase where you can engage with your peers, Gartner experts, and exhibitors while enjoying delicious food and beverages. Evaluate industry offerings that can move your business forward. Attend a theater session to see technology in action.

Tuesday, March 21, 2023 / 05:15 PM - 05:35 PM CDT

1Password: Aggregating Identity as the New Security Perimeter and the Path to Passwordless

Tony Myers, VP PRODUCT MANAGEMENT, 1Password

This session will help IAM leaders understand the value of aggregating authentication above their SSO solution to help expedite and support the transition to the passwordless future. Identity is the new security perimeter, and 1Password aggregates authentication with a human-centric approach that includes both managed and unmanaged applications. As authentication becomes more complex, identity teams need to meet employees, developers, administrators, and customers where they are to ensure adoption and security hygiene.

Tuesday, March 21, 2023 / 05:15 PM - 05:35 PM CDT

Aujas: Managed Services Approach for Cloud IAM Adoption using SailPoint IdentityNow

Mohit Vaish, CHIEF TECHNOLOGY OFFICER, Aujas Cybersecurity

Lars Herhold, CHIEF INFORMATION SECURITY OFFICER, CALYX

RoI and adoption of IAM SaaS can get delayed with common issues like right skills availability and scheduling, readiness of target apps and organizational change management. As SaaS is billed monthly, delays in implementation can significantly increase costs. 

A leading medical imaging company overcame these challenges by leveraging an outcome based IAM Managed Service. The MSP model provided project controls, right expertise at the right time, and metrics driven execution for timely SailPoint IDN implementation as well as a responsive framework for ongoing and evolving business needs.

Tuesday, March 21, 2023 / 05:40 PM - 06:00 PM CDT

Integral Partners: Why IAM is a Program, Not a Project - Understanding the Process, Tools, and Benefits

Jason Ellis, Advisory Director, Integral Partners, LLC

Treating IAM as a project - a one-off initiative that addresses a narrowly defined need can lead to wasted money, effort, and purchases that don't deliver the expected benefits. This can force organizations to eventually revisit IAM and close security and operational gaps not addressed the first time around. This presentation will discuss how and why to build an optimized and integrated identity program.

-What a typical IAM program looks like
-The security and risk outcomes of IAM done well vs not
-Earning buy-in from the organization
-IAM Workshops: How they can help get a program started

Tuesday, March 21, 2023 / 05:40 PM - 06:00 PM CDT

Beyond Identity: Zero Trust Authentication in Action

Kurt Johnson, CHIEF STRATEGY OFFICER, Beyond Identity

The vast majority of authentication methods deployed today fall far short of what is needed for a zero trust environment. Unsophisticated adversaries are now bypassing traditional MFA at scale. Learn how to establish extremely high trust in end-user identities with phish-resistant, FIDO-based MFA. Watch how a modern zero-trust authentication solution is able to establish high trust in both managed and BYOD endpoints by analyzing device risk along with risk signals from EDR/XDR/MDM. See (real) continuous authentication/adaptive trust in action.

Wednesday, March 22, 2023 / 07:00 AM - 09:00 AM CDT

Attendee Breakfast

Join other attendees for breakfast before the day's sessions.

Wednesday, March 22, 2023 / 07:00 AM - 12:15 PM CDT

Registration

Registration hours for the day

Wednesday, March 22, 2023 / 09:00 AM - 09:30 AM CDT

How Identity Gets a Seat at the Grown Up Table

Rebecca Archambault, Sr Director Analyst, Gartner

Leaders responsible for IAM are generally not accustomed to recognizing and communicating the influence that IAM has on business outcomes or associating IAM with environmental, organization or social change. It is time for identity to be recognized as a valued strategic partner that contributes to the delivery of organizational goals and objectives.

Wednesday, March 22, 2023 / 09:00 AM - 09:30 AM CDT

Outlook for Privacy 2023 — Trends, Technologies and Regulations

Bernard Woo, VP Analyst, Gartner

Privacy has been the biggest catalyst for change in data governance over the past five years. This session will dive into the top trends and technologies, and separate the hype from substance. Come get a sneak peek into the future of privacy and what you should watch out for in coming 12 months.

Wednesday, March 22, 2023 / 09:00 AM - 09:30 AM CDT

Technical Insights: Best Practices for Improving Your Access Management Implementation

David Chase, Sr Director Analyst, Gartner

Organizations struggle with changes to authentication, authorization, architecture and migrating to new access management platforms. In this session, guidance and strategies to handling these changes will be discussed.

Wednesday, March 22, 2023 / 09:00 AM - 09:30 AM CDT

Technical Insights: Your MFA Will be Attacked — Can You Protect It?

Paul Rabinovich, Sr Director Analyst, Gartner

Like all security controls, MFA itself is vulnerable to attacks. Man in the middle, prompt bombing, SIM swaps, social engineering and session hijacking are a few examples of attacks against MFA implementations. In this session, we will discuss common threats and ways to counter them.

Wednesday, March 22, 2023 / 09:00 AM - 09:30 AM CDT

Technical Insights: Workload Identity Management – The Thorny Machine Identity Practice

Erik Wahlstrom, Sr Director Analyst, Gartner

As the number of machines, specifically workloads now outnumber humans, we need to discover, manage, automate and assign owners to service accounts, secrets, keys and certificates. In this technical session we will look at the tools, processes and teams required to manage it.

Wednesday, March 22, 2023 / 09:00 AM - 09:45 AM CDT

Ask the Expert: Customer Identity and Access Management

Mary Ruddy, VP Analyst, Gartner

Customer identity and access management (CIAM) is key to enabling your digital transformation and the foundation of your customers' digital experiences. This session gives you an opportunity to ask questions about CIAM platform features, vendors' complementary tools and best practices. Attendees should come prepared to ask questions about IAM for external users.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, March 22, 2023 / 09:00 AM - 10:30 AM CDT

Workshop: How to Build and Execute Best RFP for an IGA Product

Brian Guthrie, Director Analyst, Gartner

This workshop will help you by practically taking you through the stages of preparing the RFP for an IGA product. Attendees will leave with a practical approach to a successful RFP.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, March 22, 2023 / 09:00 AM - 11:30 AM CDT

Exhibit Showcase Open Hours

Visit the Exhibit Showcase to evaluate industry offerings that can move your business forward. Engage with your peers, Gartner experts, and exhibitors. Attend a theater session to see technology in action.

Wednesday, March 22, 2023 / 09:00 AM - 11:30 AM CDT

Engagement Zone by Arcon

Engagement Zone by Arcon

Wednesday, March 22, 2023 / 09:00 AM - 11:30 AM CDT

Engagement Zone by Transmit Security

Engagement Zone by Transmit Security

Wednesday, March 22, 2023 / 09:45 AM - 10:15 AM CDT

TruU: Why IAM Security is Broken & How Fortune 500's are Adopting ID-First to Fix It

Lucas Budman, CEO, TruU Inc.

Julie Fitton, VP, CHIEF SECURITY OFFICER, Stanley Black & Decker

Hanan Schwartzbord, CSO, Micron

Featuring a Fortune 500 CIO/CISO panel discussing the opportunities, challenges, internal messaging and board communications faced when rolling out an Identity-First passwordless platform and Continuous Adaptive Trust. With more than 100 use-cases and global deployments, the panel will discuss the deployment of Continuous Adaptive Trust for high-value assets and privileged access management. Real practitioners will share their experiences driving user adoption through an "easy button" UX while exponentially increasing an organization’s security posture all while driving costs down 30%.

Wednesday, March 22, 2023 / 09:45 AM - 10:15 AM CDT

Akeyless: Managing the Secrets Behind Machine Identities

Oded Hareven, CEO & CO-FOUNDER,

Miryam Brand, DIRECTOR OF PRODUCT MARKETING, Akeyless

The rise of machine identities and DevOps automation has caused “Secrets Sprawl,” due to the increase of database credentials, certificates, API keys, and other machine secrets.

These machine secrets are kept in siloed point solutions, multiple DevOps tools, hardcoded, and saved across on-prem servers or multiple cloud providers. Secrets sprawl is at the root of the difficulty of tracking, securing and managing machine secrets.

Join CEO, Oded Hareven as he explores the rise of machine identities, secrets sprawl, and actionable steps that IAM teams can take to address these challenges.

Wednesday, March 22, 2023 / 09:45 AM - 10:15 AM CDT

Netwrix: Not Your Grandparent’s IAM - How Our Customers Cut Their IAM Costs

Martin Cannard, VP PRODUCT STRATEGY, Netwrix

Craig Riddell, CISO, Netwrix

Join this session and learn how security leaders were able to effectively resolve their security and cost challenges by: Reducing RDS Infrastructure, Implementation of better licensing models for on-prem vs cloud workloads, and Eliminating, rather than managing, attack surfaces.
In this session, you will hear the ways in which they approached active directory management, zero-standing privilege architecture, and ephemeral accounts to increase security, remove operator friction and reduce license overhead.

Wednesday, March 22, 2023 / 09:45 AM - 10:15 AM CDT

senhasegura: Overcome Any Ransomware Attack With Jiu_JitCISO Leadership

Rogerio Godoy, CMO, senhasegura

Given the rise in attacks, the growing sophistication of these incidents, and the potential financial impact, the morale and burnout of Cybersecurity Teams are increasing. According to Gartner, a key stressor of the work is that often teams are playing a game they can’t win. But there are opportunities for teams to be recognized for putting “points on the board” rather than just blocking opponents. Jiu-JitCISO Leadership is the way to get there.

Wednesday, March 22, 2023 / 09:45 AM - 10:30 AM CDT

ETSS: Secure Passwordless - Yes You Can! Moderated by 1Kosmos

Robert Macdonald, VP PRODUCT MARKETING, 1Kosmos

Javed Shah, SVP Product Management, 1Kosmos

Traditional IAM frameworks are failing miserably. You need only to read your cybersecurity headlines to grasp the depth of the problem. Going passwordless seems to be the latest battle cry to get IT and security leaders out of the whac-a-mole approach to security.

This session is for security leaders looking for a strategy to eliminate passwords. During this time we will explore:
- Why the rush to passwordless authentication often signals a deeper identity issue
- The difference between device based and identity based biometrics
- How to deploy a controlled rollout of passwordless MFA

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, March 22, 2023 / 10:30 AM - 11:00 AM CDT

Outlook for Cloud Security, 2023

Patrick Hevesi, VP Analyst, Gartner

This session will discuss the key concepts of cloud security, strategy and architecture. We will discuss the acronym soup that is cloud security from CASB, SSE, CNAPP, CWPP, CSPM and much more.

Wednesday, March 22, 2023 / 10:30 AM - 11:00 AM CDT

Technical Insights: Identity Fabric — From Here to There

Mary Ruddy, VP Analyst, Gartner

In a world where identity is the only perimeter, more effective identity and access management (IAM) is now an imperative. IAM must be deployed more cohesively as a composable, distributed, resilient identity fabric. This session will explain the 10 identity fabric principles that should guide IAM decisions.

Wednesday, March 22, 2023 / 10:30 AM - 11:00 AM CDT

Technical Insights: API Access Control – In and Behind Your API Gateways

Erik Wahlstrom, Sr Director Analyst, Gartner

Building encryption, authentication and authorization - API access control - strategies that scale requires cross-functional guidance on flows, tokens, attributes and developer enablement. In this technical session, we will define strategies that we must promote and enforce, to protect what's in and behind the API gateway.

Wednesday, March 22, 2023 / 10:30 AM - 11:00 AM CDT

Case Study: How We Overcame CIAM Fragmentation and Put Identity Data to Work

Miguel Furtado, Sr. Manager, Identity Engineering, Blue Shield

: Identity data is the enabler for all future digital experiences, and Blue Shield of California had an ambitious goal. To build a new global data model and shift the focus of identity management away from plans, and to the individual as the attribute anchor. To achieve this a fragmented identity landscape and complex API layer would need to be redesigned, and consolidated. This session will discuss how an identity fabric approach using the pillars of virtualization, simplification, and optimization allowed streamlining of controls, making identity data more accessible, promoting improved user experiences, and enabling developers to focus on strategic work.

Wednesday, March 22, 2023 / 10:30 AM - 11:00 AM CDT

Use Management Hacks to Enable Enterprise Antifragility

Dave Aron, Distinguished VP Analyst, Gartner

Being able to evolve and grow through highly uncertain times is a critical capability that most companies are lacking to the extent needed in the current global context. Implementing initiatives to become more antifragile can be slow and expensive. Use the management "hacks" shared in this session to kickstart your enterprise's antifragility quickly and cheaply.

Wednesday, March 22, 2023 / 10:30 AM - 11:15 AM CDT

Ask the Expert: Measuring the Business Value of Identity and Access Management

Paul Proctor, Distinguished VP Analyst, Gartner

Mapping IAM benefits and capabilities into business outcomes create a roadmap for IAM investments through a business lens. Executives don't care about technology, but they care deeply about how technology supports them. Join this session to understand how measuring the business value of IAM isn't really difficult once you understand how to do it.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, March 22, 2023 / 11:00 AM - 11:30 AM CDT

Coffee Break

Join us for refreshments in a brief break between sessions.

Wednesday, March 22, 2023 / 11:05 AM - 11:25 AM CDT

VERIFF: 3 Ways to Optimize Security for a Remote Workforce

Vinny Gaglioti, SENIOR SOLUTIONS ENGINEER, Veriff

The challenges faced by employers with remote workforces are continuing to evolve - from building and system access, to identity verification, to enhancing security measures. In this session, we will review use cases and hear about the lessons learned by enterprise organizations who have found ways to optimize the security of their systems and deliver controlled employee access in an ever changing world.

Wednesday, March 22, 2023 / 11:05 AM - 11:25 AM CDT

Thales: Self-Sovereign Identity - The Next Step in Privacy-First User Experience

Jason Keenaghan, DIRECTOR OF PRODUCT MANAGEMENT, IAM, Thales

There is a growing momentum around SSI with real value to be captured by individuals, countries, and businesses. When privacy is at stake, SSI puts the individuals back in control of their personal data. Moreover, it helps organizations to operate in an environment they trust and control to significantly reduce KYC and GDPR costs and comply to regional privacy rules which ultimately improves user experience. Join the session to learn more about the ins and outs of SSI.

Wednesday, March 22, 2023 / 11:30 AM - 12:15 PM CDT

Gartner Keynote: Outlook for Identity and Access Management, 2023

Homan Farahmand, VP Analyst, Gartner

Digital identity requirements and importance are growing, as organizations are migrating their infrastructure and apps to the cloud. Enterprises anticipate innovations to enable continuous, dynamic, and intelligent IAM controls, while bracing for emerging decentralized identity impact and potential Web 3 business model disruption. This session discusses key trends and IAM outlook in the coming years.

Join us in 2024

Get conference email updates.
Contact Information

All fields are required.

  • Step 2 of 2