Homan Farahmand
Guest moderator

Homan Farahmand

Sr Director Analyst
Homan Farahmand is a Senior Director Analyst within Gartner for Technical Professionals (GTP) covering digital identity and access management (IAM) modernization and emerging technologies adoption including decentralized web and blockchain platforms/protocols.
Read More Read Less
Tuesday, December 10, 2019 02:00 PM|Tuesday, December 10, 2019 02:45 PM
Ask the Expert: Modern Authorization Solutions

Authorization architecture is constantly evolving as organizations digitize their assets and run more workload in hybrid-IT and/or multicloud environments. This is while automation technologies that orchestrate access to business and infrastructure services increasingly require a dynamic authorization decision making. In this session we discuss how ABAC can be applied to address these requirements.

Tuesday, December 10, 2019 04:45 PM|Tuesday, December 10, 2019 05:30 PM
Ask the Expert: Preparing for Future IGA Technologies

IGA requirements are changing rapidly. Organizations are often mandated to address competing requirements such as increasing IGA coverage while reducing the cost and enhancing user experience. There are also emerging requirements in the cloud for dynamic identity governance and user management. In this session, we discuss the art of possible to handle these requirements in short- and long-term.

Wednesday, December 11, 2019 11:15 AM|Wednesday, December 11, 2019 12:00 PM
Evaluation Criteria for PAM Requirements and Vendor Offerings

PAM is an essential, but complex, IAM discipline. It includes privileged credential management, session management (human) and services access management (nonhuman). It also includes privileged elevation and delegation for endpoints, governance, automation, audit and analytics capabilities. This session presents evaluation criteria to use when defining your requirement and making product decisions.

Thursday, December 12, 2019 10:00 AM|Thursday, December 12, 2019 10:45 AM
Guidance for Decentralized Identity Adoption

In this session we provide a quick overview of decentralized identity architecture, including key components such as identity networks and blockchain, services, protocols, and agents. Then we provide example use cases and solutions for B2E (workforce), B2B (business entities), and B2C (consumers) scenarios. We conclude by discussing lessons learned to adopt decentralized identity based on our research.

Meet the experts face to face.