View By:

Agenda / Track

Monday, March 14, 2022 / 09:30 AM - 10:15 AM PDT

Gartner Opening Keynote: How to Digitally Accelerate When You’re So Freaking Tired

Mary Mesaglio, Managing Vice President, Gartner

It’s 2022 and we thought the long-awaited reopening was finally here. But then, wham. Omicron arrived on the scene. The pandemic sometimes seems like a never-ending story of dashed hopes. Yet, you don’t get to sit this one out. Businesses continue to transform, you must continue to lead your people, and the world doesn’t stop just because you’re tired. And we know you’re tired. This session covers how to continue your digital acceleration while keeping your people – and yourself – safe and whole. It’s a tightrope walk out there.

Monday, March 14, 2022 / 11:00 AM - 11:30 AM PDT

Top Trends in Security and Risk Management

Peter Firstbrook, VP Analyst, Gartner

“Top trends” highlight shifts in the security ecosystem that aren't widely recognized, but are likely to have potential for disruption. This presentation will describe the significant trends in risk management and how organizations are taking advantage of these trends. Key issues include: Top technological improvements in the security product landscape; Trends in creating a top notch security organization; and long-term trends that will influence security strategy

Monday, March 14, 2022 / 11:00 AM - 11:30 AM PDT

Best Practices in Communicating the Business Value of Cybersecurity

Tom Scholtz, Distinguished VP Analyst, Gartner

There are multiple approaches for communicating the business value of cybersecurity and none of them offer a single "best" way. All are relevant to different contexts. This presentation will discuss the characteristics of common approaches such as RO(S)I, price-performance analysis, outcome-driven approach, etc., and provide guidance on how to select the appropriate approach based on context.

Monday, March 14, 2022 / 12:30 PM - 01:00 PM PDT

Address the Top Maturity Gaps in IAM Programs with Insights from Gartner's ITscore

James Hoover, Assoc Principal Analyst, Gartner

Security and Risk leaders struggle to achieve the desired level of maturity across certain key activities that are critical to a healthy IAM function. Failure to address these "top gaps" devalues IAM programs, and increases risk to the enterprise. This session will outline the top gaps IAM programs are experiencing, and provide guidance on how to improve maturity in these critical areas.

Monday, March 14, 2022 / 12:30 PM - 01:00 PM PDT

Outlook for Cloud Security

Patrick Hevesi, VP Analyst, Gartner

Information security is frequently cited as a top obstacle to the adoption of cloud computing, yet improved security is cited as a top driver for adoption of cloud computing. This session will explore the current and future state of cloud security spanning infrastructure, platform and software as a service offerings, including hybrid cloud security and emerging distributed cloud and edge computing security issues.

Monday, March 14, 2022 / 12:30 PM - 01:15 PM PDT

Ask the Expert: From Pandemic to Endemic: How to Keep Teams Safe and Motivated

Mary Mesaglio, Managing Vice President, Gartner

The pandemic is in some ways a story of dashed hopes. This session is focused on tactics that leaders can use to keep their teams motivated, even as the pandemic drags on and everyone is tired. The emphasis is on what that attendees can immediately put into practice.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Monday, March 14, 2022 / 02:30 PM - 03:00 PM PDT

Cybersecurity Mesh Architecture 101

Felix Gaehtgens, VP Analyst, Gartner

With many IT assets now outside traditional enterprise perimeters, IT leaders must rethink security. Enter the cybersecurity mesh architecture, a composable and scalable approach to extend security controls to distributed assets by decoupling policy enforcement from the assets being protected.

Monday, March 14, 2022 / 02:30 PM - 03:00 PM PDT

Security Organization Dynamics

Tom Scholtz, Distinguished VP Analyst, Gartner

There is no such thing as a perfect model for security organizations. Every enterprise must develop its own model, taking into consideration basic principles, practical realities and the challenges of digital transformation. This session will address the following:
. What are the trends and challenges in security organization design?
. What are the factors that influence security organization?
. What are the current best practices and conceptual design models for security organization?

Monday, March 14, 2022 / 02:30 PM - 03:15 PM PDT

Ask the Expert: How to build your Cloud Security Strategy and Architecture

Patrick Hevesi, VP Analyst, Gartner

Come ask the expert any question on the acronym soup in Cloud Security - CASB, SSE, CSPM, CWPP, CNAPP, SASE, CSMA, CIEM and IAM. How the different products work, any questions on where to start and how to build your cloud security architecture.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Monday, March 14, 2022 / 04:00 PM - 04:30 PM PDT

How to Make a Great Decision, Every Time

Mary Mesaglio, Managing Vice President, Gartner

CIOs make critical decisions every day — decisions that impact the viability and success of the organization, and the quality of life of the people who work there. Make those decisions count by understanding how to frame and evaluate your options using proven frameworks for every type of decision.

Tuesday, March 15, 2022 / 10:30 AM - 11:00 AM PDT

Gain a Critical Advantage Over Cybercrimes Through Diversity, Equity and Inclusion

Stephanie Stoudt-Hansen, VP Analyst, Gartner

Workplace and supplier diversity is at the forefront of organizations’ minds. Beyond the ethical and moral benefits, DEI can protect against an increasingly broad range of cyber attacks. We will discuss the business case for DEI, how to develop a one-page DEI strategy and how to grow your employee and supplier diverse base.

Tuesday, March 15, 2022 / 10:30 AM - 12:00 PM PDT

Workshop: Defining Meaningful Metrics for IAM

Kevin Kampman, Sr Director Analyst, Gartner

Knowing what metrics matter to your IAM stakeholders is critical to prioritizing, developing and monitoring IAM features. Metrics identify the success of individual projects and where attention and improvements must take place. To succeed, they must be terms the stakeholder recognizes and understand. They should also align with or influence other initiatives. Learn how to set proper expectations.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Tuesday, March 15, 2022 / 12:00 PM - 12:30 PM PDT

Connect Business Value and Identity Management

Kevin Kampman, Sr Director Analyst, Gartner

Leaders responsible for IAM generally focus on the technical benefits of an IAM solution rather than its impact on the organization's goals and objectives. They are not accustomed to recognizing and accommodating the influence IAM has on business outcomes or associating IAM with environmental, organization or social change. These skills are critical to an initiative with IAM's scope and breadth.

Tuesday, March 15, 2022 / 12:00 PM - 12:45 PM PDT

Ask the Expert: How Diversity, Equity and Inclusion Can Give Your IAM Program the Edge

Stephanie Stoudt-Hansen, VP Analyst, Gartner

Improving diversity, equity and inclusion within IAM and security teams can go beyond moral arguments, into business cases built on better protection for your organization, and better talent and motivation for your team. Bring your questions to this session, and find out how to craft a DE&I strategy that can have positive impact to your business across multiple dimensions.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Tuesday, March 15, 2022 / 03:30 PM - 04:00 PM PDT

An IAM Program is Critical to a Zero Trust Strategy

John Watts, Sr Director, Analyst, Gartner

Solid IAM programs are crucial to zero trust strategies. Without IAM, zero trust strategies are doomed to fail. In this session, you will learn:
- High level zero trust strategy and its relation to IAM programs
- How zero trust and identity architectures fit together
- Practical zero trust technologies implementations and their impact on identity

Tuesday, March 15, 2022 / 05:15 PM - 05:45 PM PDT

Who Do You Want to Be Post-Crisis? Actions for Leaders

Mary Mesaglio, Managing Vice President, Gartner

There is a lot of corporate soul searching going on right now. Some enterprises are doubling down on their values while others are adopting new ones. In all cases, values are inspiring and exciting, but not enough on their own to drive change. This session covers the values-to-action pyramid, walking through practical ways to turn values into everyday behaviors.

Wednesday, March 16, 2022 / 09:00 AM - 09:30 AM PDT

Outlook for Data Security

Ramon Krikken, Distinguished VP Analyst, Gartner

This session covers current trends and emerging topics in the area of data security. From databases to cloud applications, threats are rapidly evolving and countermeasures slowly follow. Planning a data-centric roadmap for security governance and security architecture is a critical component of any security and risk management program.

Wednesday, March 16, 2022 / 09:00 AM - 10:30 AM PDT

Workshop: Defining a Successful IAM Program

Abhyuday Data, Sr Principal Analyst, Gartner

Kevin Kampman, Sr Director Analyst, Gartner

During this workshop IAM leaders will learn the importance, and what steps are required for the definition of a well-crafted IAM Program. The session will include exercises for creating your own IAM vision.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, March 16, 2022 / 09:00 AM - 10:30 AM PDT

Workshop: Turn Lessons Learned From Recent Supply Chain Attacks Into an Action Plan

Peter Firstbrook, VP Analyst, Gartner

Gartner experts have compiled the key learnings from recent supply chain attacks. We will examine both familiar and novel techniques the attackers used to carry out massive scale attacks and stay undetected for up to six months. Attendees will learn how to better identify and respond to these and similar exploits and take away an actionable plan for their own organization.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, March 16, 2022 / 10:30 AM - 11:00 AM PDT

Selecting the Right IAM Professional Services Firm

Kevin Kampman, Sr Director Analyst, Gartner

Choosing the right identity and access management (IAM) consulting, integration and managed services partners will influence a successful outcome for your initiative. Make sure you understand the mutual expectations and roles to define and accomplish your goals, and how to evaluate your partner capabilities. Cement these expectations in a statement of work that provides project guidance.

Wednesday, March 16, 2022 / 10:30 AM - 11:00 AM PDT

Outlook for Identity and Access Management

Tricia Phillips, Sr Director Analyst, Gartner

Identity and access management has reached a tipping point with the distribution of workforce and customer access. The decentralization of objects and assets demands a flexible and centralized response with a reliance on flexible orchestration, and policy enforcement which supports a low-friction, zero-trust approach.

Wednesday, March 16, 2022 / 10:30 AM - 11:00 AM PDT

Top Trends in Privacy

Bernard Woo, Sr Director Analyst, Gartner

Dive into five top trends in privacy and privacy tech. What are leading organizations focused on, what are the best capabilities to develop and what should you expect from your tech. We'll cover use cases, vendors and cost — enough to provide you with clear next steps to take to your teams.

Wednesday, March 16, 2022 / 11:30 AM - 12:15 PM PDT

Keynote: Stop Treating Security Like Magic and Security People Like Wizards

Michael Kelley, Sr Director Analyst, Gartner

Refocus corporate security initiatives and efforts — from a futile effort to prevent breaches to accepting the inevitability of breaches. We will define how to learn from normal accident theory to build a culture of resilience, capable of reducing or eliminating business impacts from security breaches. This culture is built on characteristics and disciplines which we will define in actionable terms.

Monday, March 14, 2022 / 11:00 AM - 12:30 PM PDT

Workshop: How Best to Build and Execute an RFP for an IGA Product

David Collinson, Sr Director Analyst, Gartner

This workshop will help you by practically taking you through the stages of preparing for an RFP for an IGA product. Attendees will leave with a practical approach to a succesful RFP.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Monday, March 14, 2022 / 12:30 PM - 01:00 PM PDT

Do Privileged Access Management Right: How to Build an Effective and Mature PAM Program

Felix Gaehtgens, VP Analyst, Gartner

Many organizations struggle with PAM after some small initial success, can't manage to get further. This session: sheds light on: Why is PAM such a crucial piece of any security program? What are the common pitfalls? What should you do in the near, medium and long term?

Monday, March 14, 2022 / 02:30 PM - 03:15 PM PDT

Ask the Expert: How do I Automate all these Identity Governance and Administration tasks?

David Collinson, Sr Director Analyst, Gartner

IGA is often used as a tool to automate various manual processes - up to and including the use of robots and AI. This session will give you an opportunity to ask questions around automation and IGA;

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Monday, March 14, 2022 / 04:00 PM - 04:30 PM PDT

Practical Applications of Decentralized Identity and Verifiable Claims

Homan Farahmand, Sr Director Analyst, Gartner

Decentralized identity and verifiable claims will disrupt IAM by enabling a shared trust model, protocol-based controls, and decentralized identity data exchange. In this session we discuss how organizations can leverage these technologies to drive efficiency in identity verification and data exchange for business processes in digital ecosystems.

Monday, March 14, 2022 / 04:00 PM - 04:45 PM PDT

Ask the Expert: What are the Best Practices for Privileged Access Management?

Felix Gaehtgens, VP Analyst, Gartner

Privileged access is the prime cause of breaches, yet more people than ever require it for their work. Requirements for PAM are evolving quickly to include hybrid multicloud scenarios and machine identities. Bring your questions about trends, best practices to this session.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Tuesday, March 15, 2022 / 10:30 AM - 11:00 AM PDT

Guidance for Privileged Access Management

Homan Farahmand, Sr Director Analyst, Gartner

PAM is a complex cyber defense discipline that requires careful technical planning for coverage areas. In this session we discuss the basic and emerging controls architecture to drive a zero standing privilege model for multi-cloud and hybrid environments. This includes PAM best practices and what works practically, considering organizational challenges and tools limitations.

Tuesday, March 15, 2022 / 10:30 AM - 12:00 PM PDT

Workshop: How to Develop and Maintain a Dynamic IGA Role Model

Nat Krishnan, Sr Director Analyst, Gartner

This workshop will provide a detailed exploration of Gartner's Two-Layer role modeling framework and provide practical guidance to achieve efficiency and flexibility, and address role management challenges such as overentitlement, role proliferation, and violations of least privilege principle.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Tuesday, March 15, 2022 / 12:00 PM - 12:30 PM PDT

How to Choose and Deploy an Identity Governance and Administration (IGA) Solution

David Collinson, Sr Director Analyst, Gartner

This session will help provide IAM leaders with best practice advice to both select and then deploy an IGA tool. Starting with what an IGA tool comprises of, and working methodically through the stages of the buying journey it will help IAM leaders select the right product for their organization. The second part of the presentation will then focus on how to succesfully deploy it.

Tuesday, March 15, 2022 / 02:00 PM - 02:30 PM PDT

What’s Next in Cloud Identity Risks? CIEM and Beyond

Henrique Teixeira, Sr Director Analyst, Gartner

Entitlement management used to be a manageable problem. However, with the explosion of many thousands of permissions per identity in cloud infrastructures, legacy IAM approaches are no longer sufficient. Join this session to learn what cloud infrastructure entitlement management means, and how can it help to mitigate identity risks in the cloud.

Tuesday, March 15, 2022 / 02:00 PM - 02:45 PM PDT

Ask the Expert: Consent and preference management in a diverse privacy environment

Bernard Woo, Sr Director Analyst, Gartner

Privacy regulations are increasing including either data residency or data localization requirements. This session is an opportunity for you ask questions about managing customer consent and preferences in such a rapidly evolving environment.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Tuesday, March 15, 2022 / 03:30 PM - 04:00 PM PDT

Insights from the Magic Quadrant and Critical Capabilities for Privileged Access Management

Felix Gaehtgens, VP Analyst, Gartner

Through a selection of relevant Gartner insights and complementary methodologies, we will provide insight into latest updates in the privileged access management market.

Tuesday, March 15, 2022 / 05:15 PM - 05:45 PM PDT

Leverage ITSM for IGA

Nat Krishnan, Sr Director Analyst, Gartner

Organizations with ITSM are looking for specific Identity Governance and Administration features to complement their current workflows. This research will discuss approaches to adding features, such as Identity lifecycle, Access reviews, and Access requests, leveraging ITSM instead of using IGA as a standalone service.

Wednesday, March 16, 2022 / 09:00 AM - 09:30 AM PDT

Segregation of Duty Controls (that most IGA tools have) are Pretty Cool – So Why Limit them Only to Finance?

David Collinson, Sr Director Analyst, Gartner

Whilst Segregation of Duty controls are key to preventing fraud, they can also be used very effectively in the Security arena.
This session will explore the changing scope and supporting technologies to prevent toxic combinations impacting your organization financially and also from a security perspective.

Monday, March 14, 2022 / 11:00 AM - 11:30 AM PDT

The State of Access Management, 2022

Michael Kelley, Sr Director Analyst, Gartner

Access Management technologies are enablers of Identity First security. What has been changing in the market, driving the need to account for new user constituencies, and new work models? How is access management technology continuing to evolve to meet these new challenges? We will talk about what is available today, and what kinds of things can you expect to take advantage of in the near future.

Monday, March 14, 2022 / 11:00 AM - 11:45 AM PDT

Ask the Expert: Effective Identity Management for Microsoft 365

Paul Rabinovich, Sr Director Analyst, Gartner

Whether you are just starting on a Microsoft 365 deployment or have had one for some time, threats against your users continue to evolve. IAM controls in Microsoft 365 must adapt accordingly.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Monday, March 14, 2022 / 12:30 PM - 01:00 PM PDT

How to Mature Your Microsoft 365 Identity Management

Paul Rabinovich, Sr Director Analyst, Gartner

Implementing hybrid identity for Microsoft 365 and protecting employee, administrator and partner access can be daunting. This session will guide you through best practices for Microsoft 365 IAM.

Monday, March 14, 2022 / 02:30 PM - 03:00 PM PDT

How to Choose an Access Management Solution

Henrique Teixeira, Sr Director Analyst, Gartner

Access management solutions are mature, rich with features and offer a broadened scope that overlaps with many adjacent areas. Learn to use a five-step approach to select a long-lasting, cost-efficient AM solution.

Monday, March 14, 2022 / 02:30 PM - 03:15 PM PDT

Ask the Expert: Is Your CIAM strategy effective in the world of the 'Experience Economy'?

Abhyuday Data, Sr Principal Analyst, Gartner

Henrique Teixeira, Sr Director Analyst, Gartner

CIAM offerings continue to expand to include features like customer identity analytics and consent management, along with maturing access management features like secure customer authentication and API access controls. Bring your own questions about CIAM to discuss recommended practices and how to plan for enriched user experience through CIAM offerings.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Monday, March 14, 2022 / 04:00 PM - 04:30 PM PDT

Best Practices for Improving Access Management

David Chase, Sr Director Analyst, Gartner

Access management is a key part of identity first security. Organizations need to optimize AM activities in the context of broader identity, security and business goals, for example as part of an identity first security, zero-trust or cloud first initiatives.

Tuesday, March 15, 2022 / 10:30 AM - 11:00 AM PDT

Top Practices for Strengthening Your CIAM Strategy

Abhyuday Data, Sr Principal Analyst, Gartner

Mary Ruddy, VP Analyst, Gartner

What are companies doing for CIAM? How can you differentiate yourself from your competitors through a superior CIAM portal that your customers love? What are the main considerations, and how is privacy regulation impacting these decisions? We will discuss top practices around CIAM, how to take your CIAM initiative to the next level and how to plan for the best user experience to achieve your goals.

Tuesday, March 15, 2022 / 10:30 AM - 11:15 AM PDT

Ask the Expert: Access Management and Decentralized Identity

Michael Kelley, Sr Director Analyst, Gartner

The promise of decentralized identity (DCI). Is privacy and security not possible today? But how close are we, and is this approach viable? We will discuss the maturity of DCI in the market today, as well as possible real world applications for verifiable claims, which will promote the adoption of DCI.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Tuesday, March 15, 2022 / 02:00 PM - 02:30 PM PDT

Active Directory in Transition: Gartner Survey Results and Analysis

Paul Rabinovich, Sr Director Analyst, Gartner

Gartner clients often ask if they can drop their Active Directory and migrate to a cloud-based identity service. Technology is already in place to support this journey, but do real-world Active Directory customers actually take it? In this session we will share the results of a Gartner survey about the future of Active Directory as seen by end-user organizations.

Tuesday, March 15, 2022 / 02:00 PM - 03:30 PM PDT

Workshop: Selecting the Right Employee SSO Solution for Your Evolving Organization

David Chase, Sr Director Analyst, Gartner

Modern architectures and applications place additional demands on access management tools. This workshop will introduce access management evaluation criteria guidelines and discuss what features you should look for and what vendors to consider for your next employee access management solution.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Tuesday, March 15, 2022 / 05:15 PM - 05:45 PM PDT

How to Evolve your Identity Fabric to Achieve Identity First Security

Mary Ruddy, VP Analyst, Gartner

In a world where identity is the only perimeter, identity-first security has become an imperative. IAM must be deployed more cohesively as a composable, distributed, resilient identity fabric. Organizations should also apply IAM best practices to more of their applications and services and to the IAM infrastructure itself.

Tuesday, March 15, 2022 / 05:15 PM - 06:00 PM PDT

Ask the Expert: What is Zero Trust?

John Watts, Sr Director, Analyst, Gartner

Zero trust is an overloaded marketing term. What is really mean by "zero trust" and as an IAM leader, why should I care?

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, March 16, 2022 / 09:00 AM - 09:30 AM PDT

How to Architect CIAM and Select the Right Vendors

Mary Ruddy, VP Analyst, Gartner

As requirements for great CIAM become more sophisticated, best practices for architecting CIAM and selecting vendors are evolving. This session will focus on the broadening scope of CIAM deployment architecture, selection criteria and vendors you should consider for your short lists.

Wednesday, March 16, 2022 / 10:30 AM - 11:00 AM PDT

Enabling Identity First Security with Policy-Based Authorization

Homan Farahmand, Sr Director Analyst, Gartner

Policy-based authorization has become a focal point for developing the next generation of identity-centric access controls. It includes both human and machine use cases supporting access to modern apps, computing units, data objects and underlying networks. In this session we discuss key use cases, policy management, and policy enforcement patterns to enhance security model of digital systems.

Monday, March 14, 2022 / 11:00 AM - 11:30 AM PDT

The State of Fraud Detection in 2021

Jonathan Care, Sr Director Analyst, Gartner

In this presentation Gartner will discuss the state of the fraud detection and prevention market, what best practices we see from end user leaders, and some of the interesting changes to the threat actor landscape

Monday, March 14, 2022 / 12:30 PM - 01:00 PM PDT

State of User Authentication, 2022

Tricia Phillips, Sr Director Analyst, Gartner

User authentication is at the heart of account protection for both consumer and workforce use cases, but cutting through the noise about passwordless authentication, hardware tokens and biometric authentication can be difficult. This session separates hype from the reality, theoretical from possible, and provides context of how to think about and invest in new user authentication technologies.

Monday, March 14, 2022 / 02:30 PM - 03:00 PM PDT

Verifiable Claims and Decentralized Identity, Smoke, Magic, or Reality?

Michael Kelley, Sr Director Analyst, Gartner

The promise of decentralized identity, (DCI) is privacy and security not possible today. But how close are we, and is this approach viable? We will discuss the maturity of DCI in the market today, as well as possible real world applications for verifiable claims, which will promote the adoption of DCI

Monday, March 14, 2022 / 04:00 PM - 04:30 PM PDT

Preventing ATO Fraud

Jonathan Care, Sr Director Analyst, Gartner

In this presentation, Gartner will address the prevalent new fraud threat that is keeping end user leaders awake at night. In this presentation we will explore an overview of ATO fraud, what the impact is to financial institutions and end users, and what action plan can be initiated to address this new issue

Tuesday, March 15, 2022 / 10:30 AM - 11:00 AM PDT

The State of Identity Proofing and Affirmation

Akif Khan, Sr Director Analyst, Gartner

Obtaining confidence in a customer’s or employee's identity is the foundation of identity-first security. IAM leaders must understand the current state-of-the-art, balancing assurance needs with friction in the UX, while orchestrating multiple tools and becoming aware of strategic trends on the horizon.

Tuesday, March 15, 2022 / 12:00 PM - 12:30 PM PDT

Your Next MFA Solution Will Be Cloud-Based. How Do You Pick the Best One?

Paul Rabinovich, Sr Director Analyst, Gartner

Everyone agrees that MFA is a must when it comes to protection against account takeover attacks, but MFA requirements evolve. In this session we will discuss results of Gartner's most recent solution comparison of capabilities of six leading cloud-based MFA vendors.

Tuesday, March 15, 2022 / 02:00 PM - 02:30 PM PDT

Ten Questions to Ask Your Identity Proofing Vendor

Akif Khan, Sr Director Analyst, Gartner

Identity proofing, be it in a customer or employee context, is critical to establishing trust, enabling access, and possibly meeting regulatory compliance. As such, your choice of identity proofing vendor is a critical one. Use the ten questions outlined in this session to ensure that you are selecting a vendor that best meets your requirements — today and for the future.

Tuesday, March 15, 2022 / 03:30 PM - 04:00 PM PDT

Passwörterdämmerung Redux — Take 3 Steps Towards Passwordless Authentication

Ant Allan, VP Analyst, Gartner

The twilight of the passwords has long been foretold but is now, at last, upon us. Security and UX are key drivers for passwordless authentication. But how can IAM leaders choose among the many passwordless approaches? Which are the most effective? Where do novel methods add value? What is the role of FIDO2? How does passwordless authentication fit with zero trust, adaptive access and the identity fabric? How can you craft a cohesive strategy across multiple use cases?

Tuesday, March 15, 2022 / 03:30 PM - 04:15 PM PDT

Ask the Expert: Identity Proofing and Account Takeover

Jonathan Care, Sr Director Analyst, Gartner

In this session, leading analyst Jonathan Care answers your questions around the challenging identity proofing market, and how this affects the problem of account takeover.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Tuesday, March 15, 2022 / 05:15 PM - 05:45 PM PDT

How to Choose a User Authentication Vendor

Ant Allan, VP Analyst, Gartner

With more than 300 vendors in the user authentication market, choosing one or more vendors to fit your needs across a variety of use cases for employees and customers can be fraught with difficulty. How can you identify the most effective authentication methods (with or without passwords)? Where can you find the ablest providers among the IAM marketverse? Do you need to look beyond the methods already available within your IAM infrastructure?

Tuesday, March 15, 2022 / 05:15 PM - 06:00 PM PDT

Ask the Expert: Which Modern Identity Protocols Should I Use? OAuth 2.0, OIDC, OPA, JWT or SCIM?

Erik Wahlstrom, Sr Director Analyst, Gartner

Application modernization and zero-trust strategies demand modern identity protocols. But what modern identity protocol should I use for my use-case? Bring your own questions to this session about the usage and deployment about modern identity protocols such as OAuth 2.0, OpenID Connect, OPA, JWT or SCIM?

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, March 16, 2022 / 09:00 AM - 09:30 AM PDT

Your Face Is Not a Secret, and Other Truths About Biometric Authentication

Tricia Phillips, Sr Director Analyst, Gartner

There are three categories of authentication factors--Knowledge, Possession, and Inherence. Many organizations dismiss the inherence category due to a fundamental misunderstanding about biometric authentication. This session will break down the benefits and complexities of biometric authentication to ensure that you are making a well informed decision to offer, or exclude this category of factors.

Wednesday, March 16, 2022 / 09:00 AM - 09:45 AM PDT

Ask the Expert: Is secure, simple, seamless user authentication possible?

Tricia Phillips, Sr Director Analyst, Gartner

Growing attacks on identity require strong, multi-factor user authentication, but diverse endpoints, complex application environments, and an unwillingness to add friction to the user experience can derail efforts to improve the security of user authentication. Bring your questions about trends and best practices for customer and employee user authentication to this session.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Wednesday, March 16, 2022 / 10:30 AM - 11:00 AM PDT

Top 10 Pitfalls When Deploying MFA

David Chase, Sr Director Analyst, Gartner

Multifactor authentication has become a priority for mitigating account takeover attacks. This breakout will discuss the top pitfalls organizations experience and how to avoid them.

Monday, March 14, 2022 / 11:00 AM - 11:30 AM PDT

Emerging Technologies in IAM

Swati Rakheja, Principal Analyst, Gartner

Henrique Teixeira, Sr Director Analyst, Gartner

The session will cover the key emerging technologies in IAM and how IAM leaders can better prepare themselves for these.

Monday, March 14, 2022 / 11:00 AM - 11:45 AM PDT

Ask the Expert: How do I Manage my Machine Identities?

Erik Wahlstrom, Sr Director Analyst, Gartner

Organizations find themselves needing to manage and provide best practices for how to handle the machine identities for a growing number of workloads. Bring your own questions to this session on how to manage secrets, keys and certificates in a hybrid and multi cloud environment.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Tuesday, March 15, 2022 / 10:30 AM - 11:00 AM PDT

The State of Artificial Intelligence in Security and Risk Management

Felix Gaehtgens, VP Analyst, Gartner

This session covers why everyone speaks about how artificial intelligence might solve security and risk management challenges, but struggle when asked to provide a concrete example. It will show examples of what we call AI today.

Tuesday, March 15, 2022 / 12:00 PM - 12:30 PM PDT

Machine Identities, Secrets, Keys and Certificates – The Team, the Process and the Tools

Erik Wahlstrom, Sr Director Analyst, Gartner

In this session we will look at a best-of-breed verses all-in-one tooling discussions of the expanding portfolio of tools that manage our machine identities, secrets, keys and certificates.

Tuesday, March 15, 2022 / 02:00 PM - 02:30 PM PDT

Schrödinger’s CAT – Using Continuous Adaptive Trust to Distinguish Between Users and Attackers

Ant Allan, VP Analyst, Gartner

In quantum physics there is a famous thought experiment in which you don’t know if a cat is alive or dead until you open the box containing it. Similarly, you may not truly know – until it is too late – if the person accessing your systems is your employee or customer or an attacker. How does CAT let you resolve this with greater confidence than legacy MFA? How does CAT fit within zero trust and adaptive access approaches?

Tuesday, March 15, 2022 / 03:30 PM - 04:00 PM PDT

API Access Control 201: Architect a Modern API Access Control Strategy

Erik Wahlstrom, Sr Director Analyst, Gartner

In this technical session we will establish an agile and composable identity fabric that supports API access control that consists of multiple types of identity tools and components that together enable encryption, authentication and authorization for your distributed APIs.

Wednesday, March 16, 2022 / 10:30 AM - 11:15 AM PDT

Ask the Expert: Everything You Always Wanted to Know About CIEM, that You Can't Find on Google

Henrique Teixeira, Sr Director Analyst, Gartner

CIEM is a breakaway theme in IAM, leveraging identity analytics and AI to help mitigate cloud identity risks. As the number of vendors proliferate, and not a lot of success stories exist yet, it becomes hard to differentiate fact from fiction. Bring your own questions about CIEM, cloud identity, AI and analytics in IAM.

Please Note: based on availability and eligibility you may sign-up for this session via Conference Navigator after you register for this conference.

Want to stay informed?

Get conference email updates.
Contact Information

All fields are required.

  • Step 2 of 2