Accelerate learning and build a shared vision by attending as a group

Organizations are becoming more agile and composable. Identity and access management (IAM) leaders must deliver resilient IAM services that support improved operational resilience, modularity, distributed cloud, enhanced user experience and resilience against changing attack vectors. It is imperative for IAM leaders, enterprise architects and security leaders to balance security and compliance requirements with great user experience, extending identity and access, and fraud controls to a wider audience outside the organization.

There is no better environment for stakeholders to align, learn and network

Divide and conquer

Split up to attend more sessions designed for every member of your team.

Evaluate vendors and solution providers

Compare solutions for all stakeholders across your business.

Meet as a team with experts

Discuss your challenges and validate your strategies. 

Buy more, save more

Group Rate Discount

Save on registration when you attend the conference with your colleagues.

  • 1 for every 3 paid registrations
  • 2 for every 5 paid registrations
  • 3 for every 7 paid registrations
  • 4 for every 10 paid registrations

For more information, email GlobalConferences@gartner.com or contact your Gartner representative. 

Tips for attending a virtual conference as a team

Align your vision as you forge strong relationships and a deeper, shared understanding with your colleagues and peers to help drive your strategies forward.

  • Have a team-planning call to set key objectives.
  • Decide a strategy for how to divide and conquer the agenda (which sessions you attend collectively could be as important).
  • Agree on how you will share key learning.
  • Create a document repository for notes, slides, etc., on Google Drive or other file-sharing platform.
  • Add colleagues to your expert one-on-ones.
  • Create a Microsoft Teams/Slack/Google Hangout channel to stay in touch during the conference.
  • Share sessions with your teammates — make notes of times they would find especially helpful.
  • Make a plan to virtually share a coffee or lunch break together as a team.
  • Set up a.m./p.m. calls to discuss what you hope to learn, what you did learn, and stay connected.
  • Set up a call to review key take-aways and create an action plan for how you will apply what you have learned. What are you going to start doing/stop doing/do differently as a result of what you have learned?
  • Create a shortlist of must-see sessions you missed and schedule time to view them in the next week or two while the conference is still fresh in your mind.
  • Connect on LinkedIn with any peers you met during the conference.
  • Schedule follow-up meetings with any exhibitors that piqued your interest (through the Attendee Portal).

Suggested sessions by role

  • Ask the Expert: Crafting a Compelling Story to Influence Stakeholders
  • Cool or Not? Emerging IAM Technologies You Should Know About
  • IAM Leaders’ Guide to Privileged Access Management
  • The State of Access Management, 2021
  • Workshop: Defining Metrics for Your IAM Program
  • IT Leaders Guide to IAM Program Management
  • Outlook for Cloud Security
  • State of Fraud Detection
  • Accelerate Your IAM Using DevOps and Agile Approaches
  • Ask the Expert: Consent Management and Data Residency — Two Criticaleye Privacy Priorities for IAM Leaders
  • Technical Insights: Machine Learning and Analytics for IAM — What Is Real Now?
  • Ask the Expert: Access Management Strategies, Risks and Best Practices
  • Halfway to Star Trek: A Professional’s Guide to Predicting the Future
  • The State of Identity Proofing and Affirmation
  • Contract Negotiation Clinic: Six Steps to Strategize Software and SaaS Negotiations for Cost Optimization and Risk Mitigation
  • Outlook for Data Security
  • Choosing the Right IAM Professional Services Vendor
  • Ask the Expert: Privileged Access Management
  • What Happens When the Second Half of the Internet Comes Online

View Full Agenda

  • Cool or Not? Emerging IAM Technologies You Should Know About
  • The State of Access Management, 2021
  • How to Choose a PAM Solution
  • Managing Machine Identities, Secrets, Keys and Certificates
  • Technical Insights: Machine Learning and Analytics for IAM — What Is Real Now?
  • Halfway to Star Trek: A Professional’s Guide to Predicting the Future
  • Outlook for Data Security
  • Technical Insights: Managing Privileged Access in Multicloud Infrastructure
  • Technical Insights: Best Practices for Microservices IAM
  • The VPN Is Dead: Long Live Zero Trust Network Access
  • Technical Insights: Architecting a Better CIAM User Experience
  • Architecting Modern Authentication and Authorization Strategies for Your APIs
  • Modernize Your IGA Solution Architecture
  • Security Organization Dynamics

View Full Agenda

  • Ask the Expert: Crafting a Compelling Story to Influence Stakeholders
  • Ask the Expert: Managing External Identities Through CIAM
  • State of User Authentication, 2021
  • Top Trends in Security and Risk Management
  • Ask the Expert: How Can You Enable Business Access to Data While Mitigating Privacy and Security Risks?
  • Ask the Expert: Security in the Cloud Is Still a Shared Responsibility
  • Best Practices for CIAM
  • Take Three Steps Toward Passwordless Authentication
  • Managing Machine Identities, Secrets, Keys and Certificates
  • Outlook for Cloud Security
  • Halfway to Star Trek: A Professional’s Guide to Predicting the Future
  • Outlook for Privacy, 2022
  • Science Fiction or Reality: Decentralized and Bring Your Own Identity
  • Solving the Challenges of Modern Remote Access in a Post-COVID-19 World
  • Outlook for Data Security
  • The VPN Is Dead: Long Live Zero Trust Network Access
  • Face Value: Biometric Authentication Risks and Opportunities
  • Security Organization Dynamics
  • What Happens When the Second Half of the Internet Comes Online

View Full Agenda

Ready to bring your team?

Start by reserving your space now.