View By:

2019  Agenda / Industry

Drive IAM success — no matter your industry. Your industry-related challenges are unique. Our session recommendations provide the actionable guidance you need to impact your organization's mission critical priorities. Explore 65+ conference sessions below:

 

Monday, December 09, 2019 04:15 PM|Monday, December 09, 2019 05:00 PM

Tutorial: Ten Steps for IAM Program Management

David Collinson, Sr Director Analyst, Gartner

What are the top ten things leaders of IAM organizations need to think about for running a successful IAM program?

Monday, December 09, 2019 04:15 PM|Monday, December 09, 2019 05:00 PM

Tutorial: Building a B2C Identity Proofing Strategy

Akif Khan, Sr Director Analyst, Gartner

Authenticating the identity of new users in the B2C environment is a significant business challenge.A range of techniques are available - checking against credit data; looking up in public records; checking social media history; authenticating government ID plus selfie. What vendors and capabilities exist in this space, and how can they be weaved together to give an assurance of identity appropriate to different use cases?

Tuesday, December 10, 2019 11:45 AM|Tuesday, December 10, 2019 12:30 PM

Top Trends in CIAM Solution Design

Mary Ruddy, VP Analyst, Gartner

The imperative to streamline operations, unify customer experience and enable digital transformation requires continual improvements to consumer identity and access management systems. Technical professionals designing CIAM solutions must understand key trends, features and evolving vendor offerings.

Tuesday, December 10, 2019 02:00 PM|Tuesday, December 10, 2019 02:45 PM

Ask the Expert: Modern Authorization Solutions

Homan Farahmand, Sr Director Analyst, Gartner

Authorization architecture is constantly evolving as organizations digitize their assets and run more workload in hybrid-IT and/or multicloud environments. This is while automation technologies that orchestrate access to business and infrastructure services increasingly require a dynamic authorization decision making. In this session we discuss how ABAC can be applied to address these requirements.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Tuesday, December 10, 2019 02:00 PM|Tuesday, December 10, 2019 03:30 PM

Workshop: Selecting the Right Employee SSO Solution for Your Evolving Organization

David Chase, Sr Director Analyst, Gartner

Modern architectures and applications place additional demands on access management tools. This workshop will introduce access management evaluation criteria guidelines and discuss what features you should look for and what vendors to consider for your next employee access management solution.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Tuesday, December 10, 2019 02:00 PM|Tuesday, December 10, 2019 03:30 PM

Workshop: Selecting the Right CIAM Solution

Mary Ruddy, VP Analyst, Gartner

The right customer identity and access management solution is key to providing a great user experience, and securing customer data and privacy. In this workshop we will discuss what factors and features to consider, and which vendors to shortlist when looking for your new CIAM solution.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Tuesday, December 10, 2019 04:45 PM|Tuesday, December 10, 2019 05:30 PM

Ask the Expert: Privileged Access Management

Michael Kelley, Sr Director Analyst, Gartner

This session is a discussion about privileged access management (PAM) technologies, implementations, new approaches, and strategies needed to make your PAM efforts successful. Attendees should come prepared to ask questions.
Focus will be scope, discovery, and determining appropriate access by using the principle of least privilege

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, December 11, 2019 09:15 AM|Wednesday, December 11, 2019 10:00 AM

The Hitchhiker's Guide to Office 365 IAM (TechDemo)

Mark Diodati, Managing Vice President, Gartner

Microsoft Office 365 is the collaboration hub for most organizations. Azure AD — the identity backbone for Office 365 and Azure IaaS — is a complex ecosystem with on-premises and cloud components. This session will illustrate best practices for user management, multifactor authentication, single sign-on, conditional access, security and Office 365 group management, and third-party integration.

Wednesday, December 11, 2019 09:15 AM|Wednesday, December 11, 2019 10:00 AM

Passwordless Authentication Is Already Here, It's Just Unevenly Distributed

Ant Allan, VP Analyst, Gartner

There are many different ways to eliminate passwords to significantly improve UX/CX, enhance security, or both, but technology constraints make a universal approach elusive. IAM must take pains to craft a cohesive strategy across key use cases.● What are the key drivers for passwordless authentication?● What options are available and what value do they provide?● Is it possible to completely eliminate passwords – and if it is, is it always desirable?

Wednesday, December 11, 2019 10:45 AM|Wednesday, December 11, 2019 12:15 PM

Workshop: Planning Your IAM Reimplementation

David Chase, Sr Director Analyst, Gartner

Many organizations are reimplementing identity and access management. This document provides technical professionals with guidance on best practices and common pitfalls. It includes perspectives on key issues such as the use of IDaaS versus COTS versus open source versus homegrown solutions.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, December 11, 2019 11:15 AM|Wednesday, December 11, 2019 12:00 PM

Leveraging CARTA and CIAM to Prevent Fraud and Protect Privacy

Michael Kelley, Sr Director Analyst, Gartner

After Facebook privacy scandals, and publicity around so many data breaches, consumers and the public opinion have pushed the industry to do the inconceivable: to entertain the idea that #thefutureisprivate. How continuous adaptive risk and trust assessment (CARTA) for CIAM can help prevent internal fraud, achieve a more private future, and a better customer experience. Security and Risk management leaders will fail in their mission to secure customer interactions through CIAM platforms without CARTA.

Wednesday, December 11, 2019 11:15 AM|Wednesday, December 11, 2019 12:00 PM

Ask the Expert: Multifactor Authentication

Paul Rabinovich, Sr Director Analyst, Gartner

Ant Allan, VP Analyst, Gartner

Analysts will answer questions regarding FIDO, WebAuthN, Windows Hello for Business and multifactor authentication (MFA).

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, December 11, 2019 11:15 AM|Wednesday, December 11, 2019 12:00 PM

Modernize Your IGA Solution Architecture

Paul Mezzera, Sr Director Analyst, Gartner

Identity governance and administration (IGA) systems have existed for several decades, but many IGA deployments are struggling to keep pace with new digital business demands. Organizations need to evaluate and adopt next-generation technologies that support cloud, mobile, DevOps, AI, analytics, and cybersecurity initiatives. In this session, Gartner will explore IGA technology trends and modern IGA architectures.

Wednesday, December 11, 2019 02:15 PM|Wednesday, December 11, 2019 03:00 PM

Ask the Expert: Privacy Landscape in the United States

Bernard Woo, Sr Director Analyst, Gartner

This session will allow SRM leaders with a focus on privacy to gain insight into this rapidly changing landscape across the U.S. and what best practices leading organizations are establishing to prepare and thrive in a rapidly changing space.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, December 11, 2019 02:45 PM|Wednesday, December 11, 2019 03:30 PM

Identity Multiverse: See Your Role Management Process in 3D

Henrique Teixeira, Sr Director Analyst, Gartner

Enterprise role management is not only about the tools. Learn how to combine a traditional bi-dimensional enterprise role management framework with 3 parallel universes of Identities, Accounts and Entitlements to unlock a tri-dimensional approach for role management. A combination of the Hats and Buckets approach with the 3 planes of Identities

Wednesday, December 11, 2019 02:45 PM|Wednesday, December 11, 2019 03:30 PM

To MFA for Office 365 ... and Beyond!

Ant Allan, VP Analyst, Gartner

What’s the best option for MFA for O365? This is a recurring question — typically (sadly) after an O365 phishing attack or actual breach. But it’s often a lead-in to a broader discussion about the choice of MFA to support broader SaaS and legacy use cases.

● What are the best MFA and access management approaches for SaaS and legacy use cases?

● Is it best to stick with Microsoft or choose a third-party tool?

● Why might a discrete authentication vendor be indicated?

Thursday, December 12, 2019 09:00 AM|Thursday, December 12, 2019 10:30 AM

Workshop: IT Score for Identity and Access Management

David Collinson, Sr Director Analyst, Gartner

Maturing competency levels require stakeholder's collaboration to identify the optimal alignment with IT and business goals and requirements. This workshop will help IAM leaders learn how to use Gartner's new IT Score Survey and Tool to facilitate for developing maturity roadmaps and action plans.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, December 12, 2019 10:00 AM|Thursday, December 12, 2019 10:45 AM

Creating Trust and Safety on the Internet

Jonathan Care, Sr Director Analyst, Gartner

The Internet, like any other society, is plagued with the kind of jerks who enjoy the electronic equivalent of writing on other people's walls with spraypaint, tearing their mailboxes off, or just sitting in the street blowing their car horns. Some people try to get real work done over the Internet, and others have sensitive or proprietary data they must protect." Successful e-business - whether retail, financial (or other) services, social platforms, sharing economy all make use of this untrustworthy medium.
What does trust and safety mean?
Where is it applicable?
How do we know where it is being applied?
What can we observe?
What can we measure? Since mulling this idea on client inquiries we have seen the industry start to gain traction around this idea in 2019. .
What does trust and safety mean?
Where is it applicable?
How do we know where it is being applied?
What can we observe? What can we measure?

Thursday, December 12, 2019 10:00 AM|Thursday, December 12, 2019 10:45 AM

Evaluation Criteria for PAM Requirements and Vendor Offerings

Homan Farahmand, Sr Director Analyst, Gartner

PAM is an essential, but complex, IAM discipline. It includes privileged credential management, session management (human) and services access management (nonhuman). It also includes privileged elevation and delegation for endpoints, governance, automation, audit and analytics capabilities. This session presents evaluation criteria to use when defining your requirement and making product decisions.

Thursday, December 12, 2019 11:45 AM|Thursday, December 12, 2019 12:30 PM

Enabling the Customer Experience With Fraud Management

Akif Khan, Sr Director Analyst, Gartner

Consumers have unrelenting expectations for smooth and friction-free experiences when dealing with retailers and financial institutions. This is often at odds with the various antifraud mechanisms that security leaders have implemented. A new approach is required to reduce tension between CX and fraud management, and instead blend a spectrum of technologies to deliver the fluid experience that most customers want and deserve.

Thursday, December 12, 2019 11:45 AM|Thursday, December 12, 2019 12:30 PM

Leverage Just-in-Time Approaches to Improve PAM

Michael Kelley, Sr Director Analyst, Gartner

While PAM is a mature capability, new approaches for a just in time (JIT) approach hold promise to both increase security around privileged access and simplify the way privileged access is controlled and used.

Thursday, December 12, 2019 11:45 AM|Thursday, December 12, 2019 12:30 PM

Best Practices for Mobile Identity

Rob Smith, Sr Director Analyst, Gartner

Mobility brings constant chaos with users trying to access applications and data from new and potentially unknown devices and locations. This session will cover how this chaos impacts identity and what organizations should be doing as best practices to ensure proper authentication.

Monday, December 09, 2019 03:15 PM|Monday, December 09, 2019 04:00 PM

Tutorial: Why Fraud Matters and What to Do About It

Jonathan Care, Sr Director Analyst, Gartner

Fraud has historically been seen as a separate problem from information security and IT security. Yet for some time, it’s been clear that serious and organized fraud rings are using the same tricks as seen in advanced hacking attempts. Security and risk management leaders attending this will benefit from learning how to align their fraud, risk and technical security resources and how improved intelligence can assist in this complex task.

Monday, December 09, 2019 04:15 PM|Monday, December 09, 2019 05:00 PM

Tutorial: Ten Steps for IAM Program Management

David Collinson, Sr Director Analyst, Gartner

What are the top ten things leaders of IAM organizations need to think about for running a successful IAM program?

Monday, December 09, 2019 04:15 PM|Monday, December 09, 2019 05:00 PM

Tutorial: Building a B2C Identity Proofing Strategy

Akif Khan, Sr Director Analyst, Gartner

Authenticating the identity of new users in the B2C environment is a significant business challenge.A range of techniques are available - checking against credit data; looking up in public records; checking social media history; authenticating government ID plus selfie. What vendors and capabilities exist in this space, and how can they be weaved together to give an assurance of identity appropriate to different use cases?

Tuesday, December 10, 2019 07:00 AM|Tuesday, December 10, 2019 08:15 AM

Industry Networking Breakfast: Finance & Banking

Network with your industry peers over breakfast. Discuss with them the most effective ways to fight fraud, protect privacy, or enable a low-friction, real time mobile, online banking experience and more.

This session is reserved for end users organizations in the financial services industry. (e.g Banks, Insurance, Credit Card companies etc...)

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Tuesday, December 10, 2019 11:45 AM|Tuesday, December 10, 2019 12:30 PM

Top Trends in CIAM Solution Design

Mary Ruddy, VP Analyst, Gartner

The imperative to streamline operations, unify customer experience and enable digital transformation requires continual improvements to consumer identity and access management systems. Technical professionals designing CIAM solutions must understand key trends, features and evolving vendor offerings.

Tuesday, December 10, 2019 02:00 PM|Tuesday, December 10, 2019 02:45 PM

Ask the Expert: Modern Authorization Solutions

Homan Farahmand, Sr Director Analyst, Gartner

Authorization architecture is constantly evolving as organizations digitize their assets and run more workload in hybrid-IT and/or multicloud environments. This is while automation technologies that orchestrate access to business and infrastructure services increasingly require a dynamic authorization decision making. In this session we discuss how ABAC can be applied to address these requirements.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Tuesday, December 10, 2019 02:00 PM|Tuesday, December 10, 2019 03:30 PM

Workshop: Selecting the Right Employee SSO Solution for Your Evolving Organization

David Chase, Sr Director Analyst, Gartner

Modern architectures and applications place additional demands on access management tools. This workshop will introduce access management evaluation criteria guidelines and discuss what features you should look for and what vendors to consider for your next employee access management solution.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Tuesday, December 10, 2019 02:00 PM|Tuesday, December 10, 2019 03:30 PM

Workshop: Selecting the Right CIAM Solution

Mary Ruddy, VP Analyst, Gartner

The right customer identity and access management solution is key to providing a great user experience, and securing customer data and privacy. In this workshop we will discuss what factors and features to consider, and which vendors to shortlist when looking for your new CIAM solution.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Tuesday, December 10, 2019 02:45 PM|Tuesday, December 10, 2019 03:30 PM

Mastering Consumer Consent and Preference Management

Bernard Woo, Sr Director Analyst, Gartner

What a consumer wants and what they are asking for are often two very different things. Much of what we serve our clients hinges on the information they provide us and what they then allow us to do with it. Consent and preference management capabilities are at the heart of this bespoke experience. Marketing leaders will have the opportunity to see the capabilities in this space and some of the vendors who support a new breed of privacy-preserving offering.

Tuesday, December 10, 2019 04:45 PM|Tuesday, December 10, 2019 05:15 PM

Best Practices for CIAM

David Mahdi, Sr Director Analyst, Gartner

What are companies doing for CIAM? What are the primary considerations for a company planning to move from a “build it” to a “buy it” CIAM capability? How can you differentiate yourself from your competitors through a superior CIAM portal that your customers love? What are the main considerations, and how is privacy regulation impacting these decisions? We will discuss best practices around CIAM, what the main considerations are, how to plan for the best user experience and which vendors you can partner with to achieve your goals.

Tuesday, December 10, 2019 04:45 PM|Tuesday, December 10, 2019 05:15 PM

Selecting Optimal Authentication Methods for Your Organization

Paul Rabinovich, Sr Director Analyst, Gartner

Not all authentication methods provide the same level of trust. In this session we will discuss how to choose the right method based on your environment, application risk, UX, technology availability and integration options.

Tuesday, December 10, 2019 04:45 PM|Tuesday, December 10, 2019 05:30 PM

Ask the Expert: Privileged Access Management

Michael Kelley, Sr Director Analyst, Gartner

This session is a discussion about privileged access management (PAM) technologies, implementations, new approaches, and strategies needed to make your PAM efforts successful. Attendees should come prepared to ask questions.
Focus will be scope, discovery, and determining appropriate access by using the principle of least privilege

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, December 11, 2019 09:15 AM|Wednesday, December 11, 2019 10:00 AM

The Hitchhiker's Guide to Office 365 IAM (TechDemo)

Mark Diodati, Managing Vice President, Gartner

Microsoft Office 365 is the collaboration hub for most organizations. Azure AD — the identity backbone for Office 365 and Azure IaaS — is a complex ecosystem with on-premises and cloud components. This session will illustrate best practices for user management, multifactor authentication, single sign-on, conditional access, security and Office 365 group management, and third-party integration.

Wednesday, December 11, 2019 09:15 AM|Wednesday, December 11, 2019 10:00 AM

Passwordless Authentication Is Already Here, It's Just Unevenly Distributed

Ant Allan, VP Analyst, Gartner

There are many different ways to eliminate passwords to significantly improve UX/CX, enhance security, or both, but technology constraints make a universal approach elusive. IAM must take pains to craft a cohesive strategy across key use cases.● What are the key drivers for passwordless authentication?● What options are available and what value do they provide?● Is it possible to completely eliminate passwords – and if it is, is it always desirable?

Wednesday, December 11, 2019 09:15 AM|Wednesday, December 11, 2019 10:00 AM

The Evolution of Digital Identity in a B2C World

Jonathan Care, Sr Director Analyst, Gartner

Not all B2C interactions involve formal authentication of identity using credentials and tokens.
How has the concept of digital identity evolved? How do businesses today identify customers in digital interactions for the purposes of fraud detection, advertising and improving customer experience?
How can combinations of attributes (name, email, IP address, phone number), device telemetry, behavioral biometrics, public records data and verification of physical documents be combined to create digital identities with sufficient trust levels for use cases ranging from e-commerce to banking? Introducing the concept of the identity graph. Taking a Zachman approach this pitch will focus on the conceptual/logical aspects of identity, looking at how identity is used, how it is a multi faceted jewel, and how identity verification on a graph is two nodes measuring the quality of the interstices.

Wednesday, December 11, 2019 09:15 AM|Wednesday, December 11, 2019 10:00 AM

Managing a Successful PAM Program

Felix Gaehtgens, VP Analyst, Gartner

Success with a PAM program is a mixed bag for most companies, finding PAM a challenging implementation. Before you even purchase a tool, fundamental tasks must be taken on to ensure success later in the process. We will talk about what those basic building blocks are for finding success in managing your PAM risk later on.

Wednesday, December 11, 2019 10:45 AM|Wednesday, December 11, 2019 12:15 PM

Workshop: Best Practices Learned from Mobile Identity Implementations

Rob Smith, Sr Director Analyst, Gartner

This workshop discusses real-world experiences on solving the challenges associated with identifying users and devices in a mobile landscape. It also discusses the convergence of mobility management and identity management technologies and the implications this poses to the digital workplace.
Key Issues:
Do I need to implement mobile identity?
If so, how?
What are the best practices in deploying it?

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, December 11, 2019 11:15 AM|Wednesday, December 11, 2019 12:00 PM

Leveraging CARTA and CIAM to Prevent Fraud and Protect Privacy

Michael Kelley, Sr Director Analyst, Gartner

After Facebook privacy scandals, and publicity around so many data breaches, consumers and the public opinion have pushed the industry to do the inconceivable: to entertain the idea that #thefutureisprivate. How continuous adaptive risk and trust assessment (CARTA) for CIAM can help prevent internal fraud, achieve a more private future, and a better customer experience. Security and Risk management leaders will fail in their mission to secure customer interactions through CIAM platforms without CARTA.

Wednesday, December 11, 2019 11:15 AM|Wednesday, December 11, 2019 12:00 PM

Ask the Expert: Multifactor Authentication

Paul Rabinovich, Sr Director Analyst, Gartner

Ant Allan, VP Analyst, Gartner

Analysts will answer questions regarding FIDO, WebAuthN, Windows Hello for Business and multifactor authentication (MFA).

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, December 11, 2019 11:15 AM|Wednesday, December 11, 2019 12:00 PM

Modernize Your IGA Solution Architecture

Paul Mezzera, Sr Director Analyst, Gartner

Identity governance and administration (IGA) systems have existed for several decades, but many IGA deployments are struggling to keep pace with new digital business demands. Organizations need to evaluate and adopt next-generation technologies that support cloud, mobile, DevOps, AI, analytics, and cybersecurity initiatives. In this session, Gartner will explore IGA technology trends and modern IGA architectures.

Wednesday, December 11, 2019 11:15 AM|Wednesday, December 11, 2019 12:00 PM

Building Modern Identity Into your Apps (TechDemo)

Erik Wahlstrom, Sr Director Analyst, Gartner

There are many ways modern identity protocols such as OAuth 2.0 and OpenID Connect can be built into mobile applications, services and SPAs (single-page applications). In this TechDemo we will look how common best practices for integrating modern identity protocols are built into applications and services.

Wednesday, December 11, 2019 02:00 PM|Wednesday, December 11, 2019 03:30 PM

Workshop: Choosing the Right Cloud MFA Offering

Paul Rabinovich, Sr Director Analyst, Gartner

Multifactor authentication (MFA) is an effective means to mitigate impersonation attacks, but how do you select an MFA solution? This workshop will help you to home in on the vendors that can address your organization’s requirements for authentication methods, adaptive access, administration, application integration and UX.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, December 11, 2019 02:15 PM|Wednesday, December 11, 2019 03:00 PM

Ask the Expert: Privacy Landscape in the United States

Bernard Woo, Sr Director Analyst, Gartner

This session will allow SRM leaders with a focus on privacy to gain insight into this rapidly changing landscape across the U.S. and what best practices leading organizations are establishing to prepare and thrive in a rapidly changing space.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, December 11, 2019 02:45 PM|Wednesday, December 11, 2019 03:30 PM

IT Leaders Guide to IAM Program Management

David Collinson, Sr Director Analyst, Gartner

IT Leaders often struggle to know where to begin and how to initiate a well-run IAM program. This session will help you by taking you through the initial steps, best practice and learnings from organisations that have been through this process before

Wednesday, December 11, 2019 02:45 PM|Wednesday, December 11, 2019 03:30 PM

Identity Multiverse: See Your Role Management Process in 3D

Henrique Teixeira, Sr Director Analyst, Gartner

Enterprise role management is not only about the tools. Learn how to combine a traditional bi-dimensional enterprise role management framework with 3 parallel universes of Identities, Accounts and Entitlements to unlock a tri-dimensional approach for role management. A combination of the Hats and Buckets approach with the 3 planes of Identities

Thursday, December 12, 2019 09:00 AM|Thursday, December 12, 2019 10:30 AM

Workshop: IT Score for Identity and Access Management

David Collinson, Sr Director Analyst, Gartner

Maturing competency levels require stakeholder's collaboration to identify the optimal alignment with IT and business goals and requirements. This workshop will help IAM leaders learn how to use Gartner's new IT Score Survey and Tool to facilitate for developing maturity roadmaps and action plans.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, December 12, 2019 10:00 AM|Thursday, December 12, 2019 10:45 AM

Identity Analytics, Machine Learning and AI Are Changing the Game

Mary Ruddy, VP Analyst, Gartner

Our digital environment has become too complex for humans to control system access without the help of smarter analytics. Advancements in identity analytics can help simplify and improve multiple identity and access management activities. Identity analytics, including machine learning, can process vast amounts of data to detect and respond to risks in a more automated and timely fashion. In this session, we will discuss how machine learning can be applied to many IAM use cases .

Thursday, December 12, 2019 10:00 AM|Thursday, December 12, 2019 10:45 AM

Decentralizing the Business of Identity

David Mahdi, Sr Director Analyst, Gartner

How decentralized identity, and the power of zero knowledge claims and zero knowledge proofs carry promise to disrupt traditional validation structures like Equifax and others, putting control back in the hands of the consumer. While this view is many years into the future, we are seeing the elements of this coming together with modern blockchain-based identity approaches.

Thursday, December 12, 2019 10:00 AM|Thursday, December 12, 2019 10:45 AM

Evaluation Criteria for PAM Requirements and Vendor Offerings

Homan Farahmand, Sr Director Analyst, Gartner

PAM is an essential, but complex, IAM discipline. It includes privileged credential management, session management (human) and services access management (nonhuman). It also includes privileged elevation and delegation for endpoints, governance, automation, audit and analytics capabilities. This session presents evaluation criteria to use when defining your requirement and making product decisions.

Thursday, December 12, 2019 10:00 AM|Thursday, December 12, 2019 10:45 AM

Creating Trust and Safety on the Internet

Jonathan Care, Sr Director Analyst, Gartner

The Internet, like any other society, is plagued with the kind of jerks who enjoy the electronic equivalent of writing on other people's walls with spraypaint, tearing their mailboxes off, or just sitting in the street blowing their car horns. Some people try to get real work done over the Internet, and others have sensitive or proprietary data they must protect." Successful e-business - whether retail, financial (or other) services, social platforms, sharing economy all make use of this untrustworthy medium.
What does trust and safety mean?
Where is it applicable?
How do we know where it is being applied?
What can we observe?
What can we measure? Since mulling this idea on client inquiries we have seen the industry start to gain traction around this idea in 2019. .
What does trust and safety mean?
Where is it applicable?
How do we know where it is being applied?
What can we observe? What can we measure?

Thursday, December 12, 2019 11:45 AM|Thursday, December 12, 2019 12:30 PM

Enabling the Customer Experience With Fraud Management

Akif Khan, Sr Director Analyst, Gartner

Consumers have unrelenting expectations for smooth and friction-free experiences when dealing with retailers and financial institutions. This is often at odds with the various antifraud mechanisms that security leaders have implemented. A new approach is required to reduce tension between CX and fraud management, and instead blend a spectrum of technologies to deliver the fluid experience that most customers want and deserve.

Thursday, December 12, 2019 11:45 AM|Thursday, December 12, 2019 12:30 PM

Leverage Just-in-Time Approaches to Improve PAM

Michael Kelley, Sr Director Analyst, Gartner

While PAM is a mature capability, new approaches for a just in time (JIT) approach hold promise to both increase security around privileged access and simplify the way privileged access is controlled and used.

Thursday, December 12, 2019 11:45 AM|Thursday, December 12, 2019 12:30 PM

Best Practices for Mobile Identity

Rob Smith, Sr Director Analyst, Gartner

Mobility brings constant chaos with users trying to access applications and data from new and potentially unknown devices and locations. This session will cover how this chaos impacts identity and what organizations should be doing as best practices to ensure proper authentication.

Tuesday, December 10, 2019 10:45 AM|Tuesday, December 10, 2019 12:15 PM

Workshop: Practical Privacy — Handling Subject Rights Under the CCPA

Bernard Woo, Sr Director Analyst, Gartner

The CCPA introduces extensive challenges when handling personal information; this raises the baseline not only in California but across the entire U.S. landscape. This session will give security and risk management leaders the capabilities to prepare, maintain and evolve the organization's privacy program not only for compliance with the new laws but also to develop a competitive edge to drive depth and breadth in their customer base.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Tuesday, December 10, 2019 02:00 PM|Tuesday, December 10, 2019 03:30 PM

Workshop: Selecting the Right Employee SSO Solution for Your Evolving Organization

David Chase, Sr Director Analyst, Gartner

Modern architectures and applications place additional demands on access management tools. This workshop will introduce access management evaluation criteria guidelines and discuss what features you should look for and what vendors to consider for your next employee access management solution.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Tuesday, December 10, 2019 02:00 PM|Tuesday, December 10, 2019 03:30 PM

Workshop: Selecting the Right CIAM Solution

Mary Ruddy, VP Analyst, Gartner

The right customer identity and access management solution is key to providing a great user experience, and securing customer data and privacy. In this workshop we will discuss what factors and features to consider, and which vendors to shortlist when looking for your new CIAM solution.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Tuesday, December 10, 2019 04:45 PM|Tuesday, December 10, 2019 05:15 PM

Best Practices for CIAM

David Mahdi, Sr Director Analyst, Gartner

What are companies doing for CIAM? What are the primary considerations for a company planning to move from a “build it” to a “buy it” CIAM capability? How can you differentiate yourself from your competitors through a superior CIAM portal that your customers love? What are the main considerations, and how is privacy regulation impacting these decisions? We will discuss best practices around CIAM, what the main considerations are, how to plan for the best user experience and which vendors you can partner with to achieve your goals.

Tuesday, December 10, 2019 04:45 PM|Tuesday, December 10, 2019 05:15 PM

Selecting Optimal Authentication Methods for Your Organization

Paul Rabinovich, Sr Director Analyst, Gartner

Not all authentication methods provide the same level of trust. In this session we will discuss how to choose the right method based on your environment, application risk, UX, technology availability and integration options.

Tuesday, December 10, 2019 04:45 PM|Tuesday, December 10, 2019 05:30 PM

Ask the Expert: Privileged Access Management

Michael Kelley, Sr Director Analyst, Gartner

This session is a discussion about privileged access management (PAM) technologies, implementations, new approaches, and strategies needed to make your PAM efforts successful. Attendees should come prepared to ask questions.
Focus will be scope, discovery, and determining appropriate access by using the principle of least privilege

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, December 11, 2019 07:00 AM|Wednesday, December 11, 2019 07:45 AM

Industry Networking Breakfast: Government

Network with your industry peers over breakfast and discuss issues specific to federal, local government and public sector, from public cloud migration challenges to creating a more seamless citizen experience.

This session is reserved for end user organizations in the government and public sector.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, December 11, 2019 09:15 AM|Wednesday, December 11, 2019 10:00 AM

The Hitchhiker's Guide to Office 365 IAM (TechDemo)

Mark Diodati, Managing Vice President, Gartner

Microsoft Office 365 is the collaboration hub for most organizations. Azure AD — the identity backbone for Office 365 and Azure IaaS — is a complex ecosystem with on-premises and cloud components. This session will illustrate best practices for user management, multifactor authentication, single sign-on, conditional access, security and Office 365 group management, and third-party integration.

Wednesday, December 11, 2019 09:15 AM|Wednesday, December 11, 2019 10:00 AM

Passwordless Authentication Is Already Here, It's Just Unevenly Distributed

Ant Allan, VP Analyst, Gartner

There are many different ways to eliminate passwords to significantly improve UX/CX, enhance security, or both, but technology constraints make a universal approach elusive. IAM must take pains to craft a cohesive strategy across key use cases.● What are the key drivers for passwordless authentication?● What options are available and what value do they provide?● Is it possible to completely eliminate passwords – and if it is, is it always desirable?

Wednesday, December 11, 2019 09:15 AM|Wednesday, December 11, 2019 10:00 AM

Ask the Expert: Preparing for Future IGA Technologies

Homan Farahmand, Sr Director Analyst, Gartner

IGA requirements are changing rapidly. Organizations are often mandated to address competing requirements such as increasing IGA coverage while reducing the cost and enhancing user experience. There are also emerging requirements in the cloud for dynamic identity governance and user management. In this session, we discuss the art of possible to handle these requirements in short- and long-term.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, December 11, 2019 09:15 AM|Wednesday, December 11, 2019 10:00 AM

Managing a Successful PAM Program

Felix Gaehtgens, VP Analyst, Gartner

Success with a PAM program is a mixed bag for most companies, finding PAM a challenging implementation. Before you even purchase a tool, fundamental tasks must be taken on to ensure success later in the process. We will talk about what those basic building blocks are for finding success in managing your PAM risk later on.

Wednesday, December 11, 2019 11:15 AM|Wednesday, December 11, 2019 12:00 PM

Leveraging CARTA and CIAM to Prevent Fraud and Protect Privacy

Michael Kelley, Sr Director Analyst, Gartner

After Facebook privacy scandals, and publicity around so many data breaches, consumers and the public opinion have pushed the industry to do the inconceivable: to entertain the idea that #thefutureisprivate. How continuous adaptive risk and trust assessment (CARTA) for CIAM can help prevent internal fraud, achieve a more private future, and a better customer experience. Security and Risk management leaders will fail in their mission to secure customer interactions through CIAM platforms without CARTA.

Wednesday, December 11, 2019 11:15 AM|Wednesday, December 11, 2019 12:00 PM

Ask the Expert: Multifactor Authentication

Paul Rabinovich, Sr Director Analyst, Gartner

Ant Allan, VP Analyst, Gartner

Analysts will answer questions regarding FIDO, WebAuthN, Windows Hello for Business and multifactor authentication (MFA).

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, December 11, 2019 11:15 AM|Wednesday, December 11, 2019 12:00 PM

Modernize Your IGA Solution Architecture

Paul Mezzera, Sr Director Analyst, Gartner

Identity governance and administration (IGA) systems have existed for several decades, but many IGA deployments are struggling to keep pace with new digital business demands. Organizations need to evaluate and adopt next-generation technologies that support cloud, mobile, DevOps, AI, analytics, and cybersecurity initiatives. In this session, Gartner will explore IGA technology trends and modern IGA architectures.

Wednesday, December 11, 2019 11:15 AM|Wednesday, December 11, 2019 12:00 PM

Building Modern Identity Into your Apps (TechDemo)

Erik Wahlstrom, Sr Director Analyst, Gartner

There are many ways modern identity protocols such as OAuth 2.0 and OpenID Connect can be built into mobile applications, services and SPAs (single-page applications). In this TechDemo we will look how common best practices for integrating modern identity protocols are built into applications and services.

Wednesday, December 11, 2019 02:00 PM|Wednesday, December 11, 2019 03:30 PM

Workshop: Choosing the Right Cloud MFA Offering

Paul Rabinovich, Sr Director Analyst, Gartner

Multifactor authentication (MFA) is an effective means to mitigate impersonation attacks, but how do you select an MFA solution? This workshop will help you to home in on the vendors that can address your organization’s requirements for authentication methods, adaptive access, administration, application integration and UX.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, December 11, 2019 02:15 PM|Wednesday, December 11, 2019 03:00 PM

Ask the Expert: Privacy Landscape in the United States

Bernard Woo, Sr Director Analyst, Gartner

This session will allow SRM leaders with a focus on privacy to gain insight into this rapidly changing landscape across the U.S. and what best practices leading organizations are establishing to prepare and thrive in a rapidly changing space.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, December 11, 2019 02:45 PM|Wednesday, December 11, 2019 03:30 PM

IT Leaders Guide to IAM Program Management

David Collinson, Sr Director Analyst, Gartner

IT Leaders often struggle to know where to begin and how to initiate a well-run IAM program. This session will help you by taking you through the initial steps, best practice and learnings from organisations that have been through this process before

Wednesday, December 11, 2019 02:45 PM|Wednesday, December 11, 2019 03:30 PM

Identity Multiverse: See Your Role Management Process in 3D

Henrique Teixeira, Sr Director Analyst, Gartner

Enterprise role management is not only about the tools. Learn how to combine a traditional bi-dimensional enterprise role management framework with 3 parallel universes of Identities, Accounts and Entitlements to unlock a tri-dimensional approach for role management. A combination of the Hats and Buckets approach with the 3 planes of Identities

Wednesday, December 11, 2019 02:45 PM|Wednesday, December 11, 2019 03:30 PM

To MFA for Office 365 ... and Beyond!

Ant Allan, VP Analyst, Gartner

What’s the best option for MFA for O365? This is a recurring question — typically (sadly) after an O365 phishing attack or actual breach. But it’s often a lead-in to a broader discussion about the choice of MFA to support broader SaaS and legacy use cases.

● What are the best MFA and access management approaches for SaaS and legacy use cases?

● Is it best to stick with Microsoft or choose a third-party tool?

● Why might a discrete authentication vendor be indicated?

Thursday, December 12, 2019 09:00 AM|Thursday, December 12, 2019 10:30 AM

Workshop: IT Score for Identity and Access Management

David Collinson, Sr Director Analyst, Gartner

Maturing competency levels require stakeholder's collaboration to identify the optimal alignment with IT and business goals and requirements. This workshop will help IAM leaders learn how to use Gartner's new IT Score Survey and Tool to facilitate for developing maturity roadmaps and action plans.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, December 12, 2019 10:00 AM|Thursday, December 12, 2019 10:45 AM

Decentralizing the Business of Identity

David Mahdi, Sr Director Analyst, Gartner

How decentralized identity, and the power of zero knowledge claims and zero knowledge proofs carry promise to disrupt traditional validation structures like Equifax and others, putting control back in the hands of the consumer. While this view is many years into the future, we are seeing the elements of this coming together with modern blockchain-based identity approaches.

Thursday, December 12, 2019 10:00 AM|Thursday, December 12, 2019 10:45 AM

Evaluation Criteria for PAM Requirements and Vendor Offerings

Homan Farahmand, Sr Director Analyst, Gartner

PAM is an essential, but complex, IAM discipline. It includes privileged credential management, session management (human) and services access management (nonhuman). It also includes privileged elevation and delegation for endpoints, governance, automation, audit and analytics capabilities. This session presents evaluation criteria to use when defining your requirement and making product decisions.

Thursday, December 12, 2019 11:45 AM|Thursday, December 12, 2019 12:30 PM

Enabling the Customer Experience With Fraud Management

Akif Khan, Sr Director Analyst, Gartner

Consumers have unrelenting expectations for smooth and friction-free experiences when dealing with retailers and financial institutions. This is often at odds with the various antifraud mechanisms that security leaders have implemented. A new approach is required to reduce tension between CX and fraud management, and instead blend a spectrum of technologies to deliver the fluid experience that most customers want and deserve.

Thursday, December 12, 2019 11:45 AM|Thursday, December 12, 2019 12:30 PM

Leverage Just-in-Time Approaches to Improve PAM

Michael Kelley, Sr Director Analyst, Gartner

While PAM is a mature capability, new approaches for a just in time (JIT) approach hold promise to both increase security around privileged access and simplify the way privileged access is controlled and used.

Thursday, December 12, 2019 11:45 AM|Thursday, December 12, 2019 12:30 PM

Guidance for Decentralized Identity Adoption

Homan Farahmand, Sr Director Analyst, Gartner

In this session we provide a quick overview of decentralized identity architecture, including key components such as identity networks and blockchain, services, protocols, and agents. Then we provide example use cases and solutions for B2E (workforce), B2B (business entities), and B2C (consumers) scenarios. We conclude by discussing lessons learned to adopt decentralized identity based on our research.

Monday, December 09, 2019 04:15 PM|Monday, December 09, 2019 05:00 PM

Tutorial: Ten Steps for IAM Program Management

David Collinson, Sr Director Analyst, Gartner

What are the top ten things leaders of IAM organizations need to think about for running a successful IAM program?

Monday, December 09, 2019 04:15 PM|Monday, December 09, 2019 05:00 PM

Tutorial: Building a B2C Identity Proofing Strategy

Akif Khan, Sr Director Analyst, Gartner

Authenticating the identity of new users in the B2C environment is a significant business challenge.A range of techniques are available - checking against credit data; looking up in public records; checking social media history; authenticating government ID plus selfie. What vendors and capabilities exist in this space, and how can they be weaved together to give an assurance of identity appropriate to different use cases?

Tuesday, December 10, 2019 11:45 AM|Tuesday, December 10, 2019 12:30 PM

Top Trends in CIAM Solution Design

Mary Ruddy, VP Analyst, Gartner

The imperative to streamline operations, unify customer experience and enable digital transformation requires continual improvements to consumer identity and access management systems. Technical professionals designing CIAM solutions must understand key trends, features and evolving vendor offerings.

Tuesday, December 10, 2019 02:00 PM|Tuesday, December 10, 2019 02:45 PM

Ask the Expert: Modern Authorization Solutions

Homan Farahmand, Sr Director Analyst, Gartner

Authorization architecture is constantly evolving as organizations digitize their assets and run more workload in hybrid-IT and/or multicloud environments. This is while automation technologies that orchestrate access to business and infrastructure services increasingly require a dynamic authorization decision making. In this session we discuss how ABAC can be applied to address these requirements.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Tuesday, December 10, 2019 02:00 PM|Tuesday, December 10, 2019 03:30 PM

Workshop: Selecting the Right Employee SSO Solution for Your Evolving Organization

David Chase, Sr Director Analyst, Gartner

Modern architectures and applications place additional demands on access management tools. This workshop will introduce access management evaluation criteria guidelines and discuss what features you should look for and what vendors to consider for your next employee access management solution.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Tuesday, December 10, 2019 02:00 PM|Tuesday, December 10, 2019 03:30 PM

Workshop: Selecting the Right CIAM Solution

Mary Ruddy, VP Analyst, Gartner

The right customer identity and access management solution is key to providing a great user experience, and securing customer data and privacy. In this workshop we will discuss what factors and features to consider, and which vendors to shortlist when looking for your new CIAM solution.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Tuesday, December 10, 2019 03:30 PM|Tuesday, December 10, 2019 04:30 PM

Roundtable: Establish an Agile Model for IGA App Onboarding

Felix Gaehtgens, VP Analyst, Gartner

Henrique Teixeira, Sr Director Analyst, Gartner

Application onboarding continues to be a challenging activity of IGA projects. It can be time consuming and expensive. How to leverage an agile continuous delivery approach for creating a best-practices-driven factory model for integrating new apps to your IGA infrastructure. How small prototyping and frequent improvement sprints can help you achieve continuous value when onboarding apps.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Tuesday, December 10, 2019 04:45 PM|Tuesday, December 10, 2019 05:15 PM

Accelerate Your IAM Using DevOps and Agile Approaches

Kevin Kampman, Sr Director Analyst, Gartner

IAM adoption has traditionally been seen as a monolithic and waterfall style deployment activity. These characteristics are changing as the needs of the business preclude extended investment and adoption. Learn how organizations have used DevOps and Agile approaches to improve alignment with business requirements and practices.

Tuesday, December 10, 2019 04:45 PM|Tuesday, December 10, 2019 05:15 PM

Selecting Optimal Authentication Methods for Your Organization

Paul Rabinovich, Sr Director Analyst, Gartner

Not all authentication methods provide the same level of trust. In this session we will discuss how to choose the right method based on your environment, application risk, UX, technology availability and integration options.

Tuesday, December 10, 2019 04:45 PM|Tuesday, December 10, 2019 05:30 PM

Ask the Expert: Privileged Access Management

Michael Kelley, Sr Director Analyst, Gartner

This session is a discussion about privileged access management (PAM) technologies, implementations, new approaches, and strategies needed to make your PAM efforts successful. Attendees should come prepared to ask questions.
Focus will be scope, discovery, and determining appropriate access by using the principle of least privilege

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, December 11, 2019 09:15 AM|Wednesday, December 11, 2019 10:00 AM

The Hitchhiker's Guide to Office 365 IAM (TechDemo)

Mark Diodati, Managing Vice President, Gartner

Microsoft Office 365 is the collaboration hub for most organizations. Azure AD — the identity backbone for Office 365 and Azure IaaS — is a complex ecosystem with on-premises and cloud components. This session will illustrate best practices for user management, multifactor authentication, single sign-on, conditional access, security and Office 365 group management, and third-party integration.

Wednesday, December 11, 2019 09:15 AM|Wednesday, December 11, 2019 10:00 AM

Passwordless Authentication Is Already Here, It's Just Unevenly Distributed

Ant Allan, VP Analyst, Gartner

There are many different ways to eliminate passwords to significantly improve UX/CX, enhance security, or both, but technology constraints make a universal approach elusive. IAM must take pains to craft a cohesive strategy across key use cases.● What are the key drivers for passwordless authentication?● What options are available and what value do they provide?● Is it possible to completely eliminate passwords – and if it is, is it always desirable?

Wednesday, December 11, 2019 09:15 AM|Wednesday, December 11, 2019 10:00 AM

Managing a Successful PAM Program

Felix Gaehtgens, VP Analyst, Gartner

Success with a PAM program is a mixed bag for most companies, finding PAM a challenging implementation. Before you even purchase a tool, fundamental tasks must be taken on to ensure success later in the process. We will talk about what those basic building blocks are for finding success in managing your PAM risk later on.

Wednesday, December 11, 2019 10:45 AM|Wednesday, December 11, 2019 12:15 PM

Workshop: Best Practices Learned from Mobile Identity Implementations

Rob Smith, Sr Director Analyst, Gartner

This workshop discusses real-world experiences on solving the challenges associated with identifying users and devices in a mobile landscape. It also discusses the convergence of mobility management and identity management technologies and the implications this poses to the digital workplace.
Key Issues:
Do I need to implement mobile identity?
If so, how?
What are the best practices in deploying it?

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, December 11, 2019 10:45 AM|Wednesday, December 11, 2019 12:15 PM

Workshop: Planning Your IAM Reimplementation

David Chase, Sr Director Analyst, Gartner

Many organizations are reimplementing identity and access management. This document provides technical professionals with guidance on best practices and common pitfalls. It includes perspectives on key issues such as the use of IDaaS versus COTS versus open source versus homegrown solutions.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, December 11, 2019 11:15 AM|Wednesday, December 11, 2019 12:00 PM

Leveraging CARTA and CIAM to Prevent Fraud and Protect Privacy

Michael Kelley, Sr Director Analyst, Gartner

After Facebook privacy scandals, and publicity around so many data breaches, consumers and the public opinion have pushed the industry to do the inconceivable: to entertain the idea that #thefutureisprivate. How continuous adaptive risk and trust assessment (CARTA) for CIAM can help prevent internal fraud, achieve a more private future, and a better customer experience. Security and Risk management leaders will fail in their mission to secure customer interactions through CIAM platforms without CARTA.

Wednesday, December 11, 2019 11:15 AM|Wednesday, December 11, 2019 12:00 PM

Ask the Expert: Multifactor Authentication

Paul Rabinovich, Sr Director Analyst, Gartner

Ant Allan, VP Analyst, Gartner

Analysts will answer questions regarding FIDO, WebAuthN, Windows Hello for Business and multifactor authentication (MFA).

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, December 11, 2019 11:15 AM|Wednesday, December 11, 2019 12:00 PM

Modernize Your IGA Solution Architecture

Paul Mezzera, Sr Director Analyst, Gartner

Identity governance and administration (IGA) systems have existed for several decades, but many IGA deployments are struggling to keep pace with new digital business demands. Organizations need to evaluate and adopt next-generation technologies that support cloud, mobile, DevOps, AI, analytics, and cybersecurity initiatives. In this session, Gartner will explore IGA technology trends and modern IGA architectures.

Wednesday, December 11, 2019 11:15 AM|Wednesday, December 11, 2019 12:00 PM

Building Modern Identity Into your Apps (TechDemo)

Erik Wahlstrom, Sr Director Analyst, Gartner

There are many ways modern identity protocols such as OAuth 2.0 and OpenID Connect can be built into mobile applications, services and SPAs (single-page applications). In this TechDemo we will look how common best practices for integrating modern identity protocols are built into applications and services.

Wednesday, December 11, 2019 02:00 PM|Wednesday, December 11, 2019 03:30 PM

Workshop: Choosing the Right Cloud MFA Offering

Paul Rabinovich, Sr Director Analyst, Gartner

Multifactor authentication (MFA) is an effective means to mitigate impersonation attacks, but how do you select an MFA solution? This workshop will help you to home in on the vendors that can address your organization’s requirements for authentication methods, adaptive access, administration, application integration and UX.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, December 11, 2019 02:15 PM|Wednesday, December 11, 2019 03:00 PM

Ask the Expert: Privacy Landscape in the United States

Bernard Woo, Sr Director Analyst, Gartner

This session will allow SRM leaders with a focus on privacy to gain insight into this rapidly changing landscape across the U.S. and what best practices leading organizations are establishing to prepare and thrive in a rapidly changing space.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, December 11, 2019 02:45 PM|Wednesday, December 11, 2019 03:30 PM

Identity Multiverse: See Your Role Management Process in 3D

Henrique Teixeira, Sr Director Analyst, Gartner

Enterprise role management is not only about the tools. Learn how to combine a traditional bi-dimensional enterprise role management framework with 3 parallel universes of Identities, Accounts and Entitlements to unlock a tri-dimensional approach for role management. A combination of the Hats and Buckets approach with the 3 planes of Identities

Thursday, December 12, 2019 07:00 AM|Thursday, December 12, 2019 07:45 AM

Industry Networking Breakfast: Healthcare

Network with your industry peers over breakfast. Discuss pressing issue facing the healthcare industry.

This session is reserved for end users from the heathcare field, including payer, payee and biotech.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, December 12, 2019 09:00 AM|Thursday, December 12, 2019 10:30 AM

Workshop: IT Score for Identity and Access Management

David Collinson, Sr Director Analyst, Gartner

Maturing competency levels require stakeholder's collaboration to identify the optimal alignment with IT and business goals and requirements. This workshop will help IAM leaders learn how to use Gartner's new IT Score Survey and Tool to facilitate for developing maturity roadmaps and action plans.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, December 12, 2019 10:00 AM|Thursday, December 12, 2019 10:45 AM

Identity Analytics, Machine Learning and AI Are Changing the Game

Mary Ruddy, VP Analyst, Gartner

Our digital environment has become too complex for humans to control system access without the help of smarter analytics. Advancements in identity analytics can help simplify and improve multiple identity and access management activities. Identity analytics, including machine learning, can process vast amounts of data to detect and respond to risks in a more automated and timely fashion. In this session, we will discuss how machine learning can be applied to many IAM use cases .

Thursday, December 12, 2019 10:00 AM|Thursday, December 12, 2019 10:45 AM

Decentralizing the Business of Identity

David Mahdi, Sr Director Analyst, Gartner

How decentralized identity, and the power of zero knowledge claims and zero knowledge proofs carry promise to disrupt traditional validation structures like Equifax and others, putting control back in the hands of the consumer. While this view is many years into the future, we are seeing the elements of this coming together with modern blockchain-based identity approaches.

Thursday, December 12, 2019 10:00 AM|Thursday, December 12, 2019 10:45 AM

Creating Trust and Safety on the Internet

Jonathan Care, Sr Director Analyst, Gartner

The Internet, like any other society, is plagued with the kind of jerks who enjoy the electronic equivalent of writing on other people's walls with spraypaint, tearing their mailboxes off, or just sitting in the street blowing their car horns. Some people try to get real work done over the Internet, and others have sensitive or proprietary data they must protect." Successful e-business - whether retail, financial (or other) services, social platforms, sharing economy all make use of this untrustworthy medium.
What does trust and safety mean?
Where is it applicable?
How do we know where it is being applied?
What can we observe?
What can we measure? Since mulling this idea on client inquiries we have seen the industry start to gain traction around this idea in 2019. .
What does trust and safety mean?
Where is it applicable?
How do we know where it is being applied?
What can we observe? What can we measure?

Thursday, December 12, 2019 11:45 AM|Thursday, December 12, 2019 12:30 PM

Enabling the Customer Experience With Fraud Management

Akif Khan, Sr Director Analyst, Gartner

Consumers have unrelenting expectations for smooth and friction-free experiences when dealing with retailers and financial institutions. This is often at odds with the various antifraud mechanisms that security leaders have implemented. A new approach is required to reduce tension between CX and fraud management, and instead blend a spectrum of technologies to deliver the fluid experience that most customers want and deserve.

Thursday, December 12, 2019 11:45 AM|Thursday, December 12, 2019 12:30 PM

Leverage Just-in-Time Approaches to Improve PAM

Michael Kelley, Sr Director Analyst, Gartner

While PAM is a mature capability, new approaches for a just in time (JIT) approach hold promise to both increase security around privileged access and simplify the way privileged access is controlled and used.

Thursday, December 12, 2019 11:45 AM|Thursday, December 12, 2019 12:30 PM

Best Practices for Mobile Identity

Rob Smith, Sr Director Analyst, Gartner

Mobility brings constant chaos with users trying to access applications and data from new and potentially unknown devices and locations. This session will cover how this chaos impacts identity and what organizations should be doing as best practices to ensure proper authentication.

Thursday, December 12, 2019 11:45 AM|Thursday, December 12, 2019 12:30 PM

Guidance for Decentralized Identity Adoption

Homan Farahmand, Sr Director Analyst, Gartner

In this session we provide a quick overview of decentralized identity architecture, including key components such as identity networks and blockchain, services, protocols, and agents. Then we provide example use cases and solutions for B2E (workforce), B2B (business entities), and B2C (consumers) scenarios. We conclude by discussing lessons learned to adopt decentralized identity based on our research.

Monday, December 09, 2019 04:15 PM|Monday, December 09, 2019 05:00 PM

Tutorial: Ten Steps for IAM Program Management

David Collinson, Sr Director Analyst, Gartner

What are the top ten things leaders of IAM organizations need to think about for running a successful IAM program?

Tuesday, December 10, 2019 11:45 AM|Tuesday, December 10, 2019 12:30 PM

Top Trends in CIAM Solution Design

Mary Ruddy, VP Analyst, Gartner

The imperative to streamline operations, unify customer experience and enable digital transformation requires continual improvements to consumer identity and access management systems. Technical professionals designing CIAM solutions must understand key trends, features and evolving vendor offerings.

Tuesday, December 10, 2019 02:00 PM|Tuesday, December 10, 2019 02:45 PM

Ask the Expert: Modern Authorization Solutions

Homan Farahmand, Sr Director Analyst, Gartner

Authorization architecture is constantly evolving as organizations digitize their assets and run more workload in hybrid-IT and/or multicloud environments. This is while automation technologies that orchestrate access to business and infrastructure services increasingly require a dynamic authorization decision making. In this session we discuss how ABAC can be applied to address these requirements.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Tuesday, December 10, 2019 02:00 PM|Tuesday, December 10, 2019 03:30 PM

Workshop: Selecting the Right Employee SSO Solution for Your Evolving Organization

David Chase, Sr Director Analyst, Gartner

Modern architectures and applications place additional demands on access management tools. This workshop will introduce access management evaluation criteria guidelines and discuss what features you should look for and what vendors to consider for your next employee access management solution.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Tuesday, December 10, 2019 03:30 PM|Tuesday, December 10, 2019 04:30 PM

Roundtable: Establish an Agile Model for IGA App Onboarding

Felix Gaehtgens, VP Analyst, Gartner

Henrique Teixeira, Sr Director Analyst, Gartner

Application onboarding continues to be a challenging activity of IGA projects. It can be time consuming and expensive. How to leverage an agile continuous delivery approach for creating a best-practices-driven factory model for integrating new apps to your IGA infrastructure. How small prototyping and frequent improvement sprints can help you achieve continuous value when onboarding apps.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Tuesday, December 10, 2019 04:45 PM|Tuesday, December 10, 2019 05:15 PM

Best Practices for CIAM

David Mahdi, Sr Director Analyst, Gartner

What are companies doing for CIAM? What are the primary considerations for a company planning to move from a “build it” to a “buy it” CIAM capability? How can you differentiate yourself from your competitors through a superior CIAM portal that your customers love? What are the main considerations, and how is privacy regulation impacting these decisions? We will discuss best practices around CIAM, what the main considerations are, how to plan for the best user experience and which vendors you can partner with to achieve your goals.

Tuesday, December 10, 2019 04:45 PM|Tuesday, December 10, 2019 05:15 PM

Accelerate Your IAM Using DevOps and Agile Approaches

Kevin Kampman, Sr Director Analyst, Gartner

IAM adoption has traditionally been seen as a monolithic and waterfall style deployment activity. These characteristics are changing as the needs of the business preclude extended investment and adoption. Learn how organizations have used DevOps and Agile approaches to improve alignment with business requirements and practices.

Tuesday, December 10, 2019 04:45 PM|Tuesday, December 10, 2019 05:15 PM

Lead the Way With Agile for IAM Program Initiatives

David Collinson, Sr Director Analyst, Gartner

How can PAM, AM, IGA and Authentication initiatives benefit from an Agile approach? What are the areas that most lend themselves to Agile, and what are things to be aware of when adopting Agile at a departmental level?

Wednesday, December 11, 2019 09:15 AM|Wednesday, December 11, 2019 10:00 AM

The Evolution of Digital Identity in a B2C World

Jonathan Care, Sr Director Analyst, Gartner

Not all B2C interactions involve formal authentication of identity using credentials and tokens.
How has the concept of digital identity evolved? How do businesses today identify customers in digital interactions for the purposes of fraud detection, advertising and improving customer experience?
How can combinations of attributes (name, email, IP address, phone number), device telemetry, behavioral biometrics, public records data and verification of physical documents be combined to create digital identities with sufficient trust levels for use cases ranging from e-commerce to banking? Introducing the concept of the identity graph. Taking a Zachman approach this pitch will focus on the conceptual/logical aspects of identity, looking at how identity is used, how it is a multi faceted jewel, and how identity verification on a graph is two nodes measuring the quality of the interstices.

Wednesday, December 11, 2019 09:15 AM|Wednesday, December 11, 2019 10:00 AM

The Hitchhiker's Guide to Office 365 IAM (TechDemo)

Mark Diodati, Managing Vice President, Gartner

Microsoft Office 365 is the collaboration hub for most organizations. Azure AD — the identity backbone for Office 365 and Azure IaaS — is a complex ecosystem with on-premises and cloud components. This session will illustrate best practices for user management, multifactor authentication, single sign-on, conditional access, security and Office 365 group management, and third-party integration.

Wednesday, December 11, 2019 09:15 AM|Wednesday, December 11, 2019 10:00 AM

Ask the Expert: Preparing for Future IGA Technologies

Homan Farahmand, Sr Director Analyst, Gartner

IGA requirements are changing rapidly. Organizations are often mandated to address competing requirements such as increasing IGA coverage while reducing the cost and enhancing user experience. There are also emerging requirements in the cloud for dynamic identity governance and user management. In this session, we discuss the art of possible to handle these requirements in short- and long-term.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, December 11, 2019 10:45 AM|Wednesday, December 11, 2019 12:15 PM

Workshop: Planning Your IAM Reimplementation

David Chase, Sr Director Analyst, Gartner

Many organizations are reimplementing identity and access management. This document provides technical professionals with guidance on best practices and common pitfalls. It includes perspectives on key issues such as the use of IDaaS versus COTS versus open source versus homegrown solutions.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, December 11, 2019 11:15 AM|Wednesday, December 11, 2019 12:00 PM

Leveraging CARTA and CIAM to Prevent Fraud and Protect Privacy

Michael Kelley, Sr Director Analyst, Gartner

After Facebook privacy scandals, and publicity around so many data breaches, consumers and the public opinion have pushed the industry to do the inconceivable: to entertain the idea that #thefutureisprivate. How continuous adaptive risk and trust assessment (CARTA) for CIAM can help prevent internal fraud, achieve a more private future, and a better customer experience. Security and Risk management leaders will fail in their mission to secure customer interactions through CIAM platforms without CARTA.

Wednesday, December 11, 2019 11:15 AM|Wednesday, December 11, 2019 12:00 PM

Ask the Expert: Multifactor Authentication

Paul Rabinovich, Sr Director Analyst, Gartner

Ant Allan, VP Analyst, Gartner

Analysts will answer questions regarding FIDO, WebAuthN, Windows Hello for Business and multifactor authentication (MFA).

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, December 11, 2019 11:15 AM|Wednesday, December 11, 2019 12:00 PM

Modernize Your IGA Solution Architecture

Paul Mezzera, Sr Director Analyst, Gartner

Identity governance and administration (IGA) systems have existed for several decades, but many IGA deployments are struggling to keep pace with new digital business demands. Organizations need to evaluate and adopt next-generation technologies that support cloud, mobile, DevOps, AI, analytics, and cybersecurity initiatives. In this session, Gartner will explore IGA technology trends and modern IGA architectures.

Wednesday, December 11, 2019 02:15 PM|Wednesday, December 11, 2019 03:00 PM

Ask the Expert: Privacy Landscape in the United States

Bernard Woo, Sr Director Analyst, Gartner

This session will allow SRM leaders with a focus on privacy to gain insight into this rapidly changing landscape across the U.S. and what best practices leading organizations are establishing to prepare and thrive in a rapidly changing space.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, December 11, 2019 02:45 PM|Wednesday, December 11, 2019 03:30 PM

Best Practices for Microservices IAM

David Chase, Sr Director Analyst, Gartner

Identity of microservices is a rapidly evolving and challenging topic. In a zero-trust framework, microservices has to be authenticated and authorized. This breakout will discuss the latest best practices of identity and microservices.

Thursday, December 12, 2019 07:00 AM|Thursday, December 12, 2019 07:45 AM

Industry Networking Breakfast: Manufacturing

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, December 12, 2019 09:00 AM|Thursday, December 12, 2019 10:30 AM

Workshop: IT Score for Identity and Access Management

David Collinson, Sr Director Analyst, Gartner

Maturing competency levels require stakeholder's collaboration to identify the optimal alignment with IT and business goals and requirements. This workshop will help IAM leaders learn how to use Gartner's new IT Score Survey and Tool to facilitate for developing maturity roadmaps and action plans.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, December 12, 2019 11:45 AM|Thursday, December 12, 2019 12:30 PM

Enabling the Customer Experience With Fraud Management

Akif Khan, Sr Director Analyst, Gartner

Consumers have unrelenting expectations for smooth and friction-free experiences when dealing with retailers and financial institutions. This is often at odds with the various antifraud mechanisms that security leaders have implemented. A new approach is required to reduce tension between CX and fraud management, and instead blend a spectrum of technologies to deliver the fluid experience that most customers want and deserve.

Thursday, December 12, 2019 11:45 AM|Thursday, December 12, 2019 12:30 PM

Guidance for Decentralized Identity Adoption

Homan Farahmand, Sr Director Analyst, Gartner

In this session we provide a quick overview of decentralized identity architecture, including key components such as identity networks and blockchain, services, protocols, and agents. Then we provide example use cases and solutions for B2E (workforce), B2B (business entities), and B2C (consumers) scenarios. We conclude by discussing lessons learned to adopt decentralized identity based on our research.

Monday, December 09, 2019 03:15 PM|Monday, December 09, 2019 04:00 PM

Tutorial: Why Fraud Matters and What to Do About It

Jonathan Care, Sr Director Analyst, Gartner

Fraud has historically been seen as a separate problem from information security and IT security. Yet for some time, it’s been clear that serious and organized fraud rings are using the same tricks as seen in advanced hacking attempts. Security and risk management leaders attending this will benefit from learning how to align their fraud, risk and technical security resources and how improved intelligence can assist in this complex task.

Monday, December 09, 2019 04:15 PM|Monday, December 09, 2019 05:00 PM

Tutorial: Ten Steps for IAM Program Management

David Collinson, Sr Director Analyst, Gartner

What are the top ten things leaders of IAM organizations need to think about for running a successful IAM program?

Monday, December 09, 2019 04:15 PM|Monday, December 09, 2019 05:00 PM

Tutorial: Building a B2C Identity Proofing Strategy

Akif Khan, Sr Director Analyst, Gartner

Authenticating the identity of new users in the B2C environment is a significant business challenge.A range of techniques are available - checking against credit data; looking up in public records; checking social media history; authenticating government ID plus selfie. What vendors and capabilities exist in this space, and how can they be weaved together to give an assurance of identity appropriate to different use cases?

Tuesday, December 10, 2019 11:45 AM|Tuesday, December 10, 2019 12:30 PM

Top Trends in CIAM Solution Design

Mary Ruddy, VP Analyst, Gartner

The imperative to streamline operations, unify customer experience and enable digital transformation requires continual improvements to consumer identity and access management systems. Technical professionals designing CIAM solutions must understand key trends, features and evolving vendor offerings.

Tuesday, December 10, 2019 11:45 AM|Tuesday, December 10, 2019 12:30 PM

Me, Myself and I: Is Biometric Authentication Ready for Prime Time?

Ant Allan, VP Analyst, Gartner

Early promises of easy, secure and universal authentication through unique personal traits have been unfulfilled for decades, but in the past 10 years we have seen a surge in interest and adoption.

● How is biometric authentication differ from other orthodox methods?

● Where is biometric authentication adding most value today?

● Are biometric methods the way forward for every enterprise?

Tuesday, December 10, 2019 02:00 PM|Tuesday, December 10, 2019 03:30 PM

Workshop: Selecting the Right Employee SSO Solution for Your Evolving Organization

David Chase, Sr Director Analyst, Gartner

Modern architectures and applications place additional demands on access management tools. This workshop will introduce access management evaluation criteria guidelines and discuss what features you should look for and what vendors to consider for your next employee access management solution.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Tuesday, December 10, 2019 02:00 PM|Tuesday, December 10, 2019 03:30 PM

Workshop: Selecting the Right CIAM Solution

Mary Ruddy, VP Analyst, Gartner

The right customer identity and access management solution is key to providing a great user experience, and securing customer data and privacy. In this workshop we will discuss what factors and features to consider, and which vendors to shortlist when looking for your new CIAM solution.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Tuesday, December 10, 2019 02:45 PM|Tuesday, December 10, 2019 03:30 PM

Mastering Consumer Consent and Preference Management

Bernard Woo, Sr Director Analyst, Gartner

What a consumer wants and what they are asking for are often two very different things. Much of what we serve our clients hinges on the information they provide us and what they then allow us to do with it. Consent and preference management capabilities are at the heart of this bespoke experience. Marketing leaders will have the opportunity to see the capabilities in this space and some of the vendors who support a new breed of privacy-preserving offering.

Tuesday, December 10, 2019 04:45 PM|Tuesday, December 10, 2019 05:15 PM

Best Practices for CIAM

David Mahdi, Sr Director Analyst, Gartner

What are companies doing for CIAM? What are the primary considerations for a company planning to move from a “build it” to a “buy it” CIAM capability? How can you differentiate yourself from your competitors through a superior CIAM portal that your customers love? What are the main considerations, and how is privacy regulation impacting these decisions? We will discuss best practices around CIAM, what the main considerations are, how to plan for the best user experience and which vendors you can partner with to achieve your goals.

Tuesday, December 10, 2019 04:45 PM|Tuesday, December 10, 2019 05:15 PM

Accelerate Your IAM Using DevOps and Agile Approaches

Kevin Kampman, Sr Director Analyst, Gartner

IAM adoption has traditionally been seen as a monolithic and waterfall style deployment activity. These characteristics are changing as the needs of the business preclude extended investment and adoption. Learn how organizations have used DevOps and Agile approaches to improve alignment with business requirements and practices.

Tuesday, December 10, 2019 04:45 PM|Tuesday, December 10, 2019 05:15 PM

Selecting Optimal Authentication Methods for Your Organization

Paul Rabinovich, Sr Director Analyst, Gartner

Not all authentication methods provide the same level of trust. In this session we will discuss how to choose the right method based on your environment, application risk, UX, technology availability and integration options.

Tuesday, December 10, 2019 04:45 PM|Tuesday, December 10, 2019 05:30 PM

Ask the Expert: Privileged Access Management

Michael Kelley, Sr Director Analyst, Gartner

This session is a discussion about privileged access management (PAM) technologies, implementations, new approaches, and strategies needed to make your PAM efforts successful. Attendees should come prepared to ask questions.
Focus will be scope, discovery, and determining appropriate access by using the principle of least privilege

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, December 11, 2019 09:15 AM|Wednesday, December 11, 2019 10:00 AM

The Hitchhiker's Guide to Office 365 IAM (TechDemo)

Mark Diodati, Managing Vice President, Gartner

Microsoft Office 365 is the collaboration hub for most organizations. Azure AD — the identity backbone for Office 365 and Azure IaaS — is a complex ecosystem with on-premises and cloud components. This session will illustrate best practices for user management, multifactor authentication, single sign-on, conditional access, security and Office 365 group management, and third-party integration.

Wednesday, December 11, 2019 09:15 AM|Wednesday, December 11, 2019 10:00 AM

The Evolution of Digital Identity in a B2C World

Jonathan Care, Sr Director Analyst, Gartner

Not all B2C interactions involve formal authentication of identity using credentials and tokens.
How has the concept of digital identity evolved? How do businesses today identify customers in digital interactions for the purposes of fraud detection, advertising and improving customer experience?
How can combinations of attributes (name, email, IP address, phone number), device telemetry, behavioral biometrics, public records data and verification of physical documents be combined to create digital identities with sufficient trust levels for use cases ranging from e-commerce to banking? Introducing the concept of the identity graph. Taking a Zachman approach this pitch will focus on the conceptual/logical aspects of identity, looking at how identity is used, how it is a multi faceted jewel, and how identity verification on a graph is two nodes measuring the quality of the interstices.

Wednesday, December 11, 2019 09:15 AM|Wednesday, December 11, 2019 10:00 AM

Managing a Successful PAM Program

Felix Gaehtgens, VP Analyst, Gartner

Success with a PAM program is a mixed bag for most companies, finding PAM a challenging implementation. Before you even purchase a tool, fundamental tasks must be taken on to ensure success later in the process. We will talk about what those basic building blocks are for finding success in managing your PAM risk later on.

Wednesday, December 11, 2019 10:45 AM|Wednesday, December 11, 2019 12:15 PM

Workshop: Best Practices Learned from Mobile Identity Implementations

Rob Smith, Sr Director Analyst, Gartner

This workshop discusses real-world experiences on solving the challenges associated with identifying users and devices in a mobile landscape. It also discusses the convergence of mobility management and identity management technologies and the implications this poses to the digital workplace.
Key Issues:
Do I need to implement mobile identity?
If so, how?
What are the best practices in deploying it?

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, December 11, 2019 11:15 AM|Wednesday, December 11, 2019 12:00 PM

Leveraging CARTA and CIAM to Prevent Fraud and Protect Privacy

Michael Kelley, Sr Director Analyst, Gartner

After Facebook privacy scandals, and publicity around so many data breaches, consumers and the public opinion have pushed the industry to do the inconceivable: to entertain the idea that #thefutureisprivate. How continuous adaptive risk and trust assessment (CARTA) for CIAM can help prevent internal fraud, achieve a more private future, and a better customer experience. Security and Risk management leaders will fail in their mission to secure customer interactions through CIAM platforms without CARTA.

Wednesday, December 11, 2019 11:15 AM|Wednesday, December 11, 2019 12:00 PM

Ask the Expert: Multifactor Authentication

Paul Rabinovich, Sr Director Analyst, Gartner

Ant Allan, VP Analyst, Gartner

Analysts will answer questions regarding FIDO, WebAuthN, Windows Hello for Business and multifactor authentication (MFA).

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, December 11, 2019 11:15 AM|Wednesday, December 11, 2019 12:00 PM

Modernize Your IGA Solution Architecture

Paul Mezzera, Sr Director Analyst, Gartner

Identity governance and administration (IGA) systems have existed for several decades, but many IGA deployments are struggling to keep pace with new digital business demands. Organizations need to evaluate and adopt next-generation technologies that support cloud, mobile, DevOps, AI, analytics, and cybersecurity initiatives. In this session, Gartner will explore IGA technology trends and modern IGA architectures.

Wednesday, December 11, 2019 11:15 AM|Wednesday, December 11, 2019 12:00 PM

Building Modern Identity Into your Apps (TechDemo)

Erik Wahlstrom, Sr Director Analyst, Gartner

There are many ways modern identity protocols such as OAuth 2.0 and OpenID Connect can be built into mobile applications, services and SPAs (single-page applications). In this TechDemo we will look how common best practices for integrating modern identity protocols are built into applications and services.

Wednesday, December 11, 2019 02:00 PM|Wednesday, December 11, 2019 03:30 PM

Workshop: Choosing the Right Cloud MFA Offering

Paul Rabinovich, Sr Director Analyst, Gartner

Multifactor authentication (MFA) is an effective means to mitigate impersonation attacks, but how do you select an MFA solution? This workshop will help you to home in on the vendors that can address your organization’s requirements for authentication methods, adaptive access, administration, application integration and UX.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, December 11, 2019 02:45 PM|Wednesday, December 11, 2019 03:30 PM

Identity Multiverse: See Your Role Management Process in 3D

Henrique Teixeira, Sr Director Analyst, Gartner

Enterprise role management is not only about the tools. Learn how to combine a traditional bi-dimensional enterprise role management framework with 3 parallel universes of Identities, Accounts and Entitlements to unlock a tri-dimensional approach for role management. A combination of the Hats and Buckets approach with the 3 planes of Identities

Thursday, December 12, 2019 09:00 AM|Thursday, December 12, 2019 10:30 AM

Workshop: IT Score for Identity and Access Management

David Collinson, Sr Director Analyst, Gartner

Maturing competency levels require stakeholder's collaboration to identify the optimal alignment with IT and business goals and requirements. This workshop will help IAM leaders learn how to use Gartner's new IT Score Survey and Tool to facilitate for developing maturity roadmaps and action plans.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Thursday, December 12, 2019 10:00 AM|Thursday, December 12, 2019 10:45 AM

Identity Analytics, Machine Learning and AI Are Changing the Game

Mary Ruddy, VP Analyst, Gartner

Our digital environment has become too complex for humans to control system access without the help of smarter analytics. Advancements in identity analytics can help simplify and improve multiple identity and access management activities. Identity analytics, including machine learning, can process vast amounts of data to detect and respond to risks in a more automated and timely fashion. In this session, we will discuss how machine learning can be applied to many IAM use cases .

Thursday, December 12, 2019 10:00 AM|Thursday, December 12, 2019 10:45 AM

Decentralizing the Business of Identity

David Mahdi, Sr Director Analyst, Gartner

How decentralized identity, and the power of zero knowledge claims and zero knowledge proofs carry promise to disrupt traditional validation structures like Equifax and others, putting control back in the hands of the consumer. While this view is many years into the future, we are seeing the elements of this coming together with modern blockchain-based identity approaches.

Thursday, December 12, 2019 10:00 AM|Thursday, December 12, 2019 10:45 AM

Evaluation Criteria for PAM Requirements and Vendor Offerings

Homan Farahmand, Sr Director Analyst, Gartner

PAM is an essential, but complex, IAM discipline. It includes privileged credential management, session management (human) and services access management (nonhuman). It also includes privileged elevation and delegation for endpoints, governance, automation, audit and analytics capabilities. This session presents evaluation criteria to use when defining your requirement and making product decisions.

Thursday, December 12, 2019 10:00 AM|Thursday, December 12, 2019 10:45 AM

Creating Trust and Safety on the Internet

Jonathan Care, Sr Director Analyst, Gartner

The Internet, like any other society, is plagued with the kind of jerks who enjoy the electronic equivalent of writing on other people's walls with spraypaint, tearing their mailboxes off, or just sitting in the street blowing their car horns. Some people try to get real work done over the Internet, and others have sensitive or proprietary data they must protect." Successful e-business - whether retail, financial (or other) services, social platforms, sharing economy all make use of this untrustworthy medium.
What does trust and safety mean?
Where is it applicable?
How do we know where it is being applied?
What can we observe?
What can we measure? Since mulling this idea on client inquiries we have seen the industry start to gain traction around this idea in 2019. .
What does trust and safety mean?
Where is it applicable?
How do we know where it is being applied?
What can we observe? What can we measure?

Thursday, December 12, 2019 11:45 AM|Thursday, December 12, 2019 12:30 PM

Enabling the Customer Experience With Fraud Management

Akif Khan, Sr Director Analyst, Gartner

Consumers have unrelenting expectations for smooth and friction-free experiences when dealing with retailers and financial institutions. This is often at odds with the various antifraud mechanisms that security leaders have implemented. A new approach is required to reduce tension between CX and fraud management, and instead blend a spectrum of technologies to deliver the fluid experience that most customers want and deserve.

Thursday, December 12, 2019 11:45 AM|Thursday, December 12, 2019 12:30 PM

Leverage Just-in-Time Approaches to Improve PAM

Michael Kelley, Sr Director Analyst, Gartner

While PAM is a mature capability, new approaches for a just in time (JIT) approach hold promise to both increase security around privileged access and simplify the way privileged access is controlled and used.

Thursday, December 12, 2019 11:45 AM|Thursday, December 12, 2019 12:30 PM

Best Practices for Mobile Identity

Rob Smith, Sr Director Analyst, Gartner

Mobility brings constant chaos with users trying to access applications and data from new and potentially unknown devices and locations. This session will cover how this chaos impacts identity and what organizations should be doing as best practices to ensure proper authentication.

Thursday, December 12, 2019 11:45 AM|Thursday, December 12, 2019 12:30 PM

Guidance for Decentralized Identity Adoption

Homan Farahmand, Sr Director Analyst, Gartner

In this session we provide a quick overview of decentralized identity architecture, including key components such as identity networks and blockchain, services, protocols, and agents. Then we provide example use cases and solutions for B2E (workforce), B2B (business entities), and B2C (consumers) scenarios. We conclude by discussing lessons learned to adopt decentralized identity based on our research.

Registered Attendee
Build Your Agenda

Join us in 2020

Get conference email updates.
Contact Information

All fields are required.

  • Step 2 of 2