Gartner Identity & Access Management Summit

March 20 – 22, 2023 | Grapevine, TX

Beyond IAM: Enable Identity-First Security

Identity is foundational to cybersecurity and the running of your business — from remote work to customer access. Conventional approaches to identity and access management (IAM) are no longer sufficient as organizations operate in an escalating threat environment in which the perimeter has become porous and zero trust is no longer optional.

Adopting an identity-first security mindset means putting identity-based controls at the heart of your organization’s protection architecture and expanding capabilities around threat detection and response. Gartner Identity & Access Management Summit 2023 helps IAM and security leaders make the right decisions about which identity-first security initiatives to prioritize, how to modernize existing staffing models and whether to invest in new tools to take their organization’s security posture into the identity-first era.

Bring your team to maximize learning — participate in relevant sessions together, or split up to cover more ground and share your take-aways later. Learn more about attending as a team. 

Gain critical insights to sustain effective IAM programs to provide the right access to the right people — and identify the leading providers of IAM products and services to benefit the organization.

  • Align with business expectations to get buy-in and continued support for IAM programs and policies. 
  • Measure and communicate the value of the IAM program and move from cost center to revenue generation. 
  • Integrate IAM initiatives with established business processes and policies that affect customers and workforce. 
  • Understand the fast-evolving IAM technologies and vendors, and cut through the hype of artificial intelligence (AI), blockchain and the Internet of Things (IoT) to leverage the right solutions. 
  • Manage the complexity and specific risks associated with cloud migration and cloud-based IAM solutions. 
  • Find efficiencies by automating processes.

Engineer IAM solutions to deliver capabilities aligned with the organization’s security, cost and business objectives.

  • Understand the business requirements and outcomes to implement the most effective technologies, standards and best practices. 
  • Leverage better cloud capabilities and manage complexity created by cloud. 
  • Architect solutions for new, more dynamic environments: agile, DevOps, containers, microservices, stateless architectures, APIs. 
  • Stay up to speed on new technology: AI/analytics, robotic process automation (RPA), blockchain. 
  • Manage technical integration with broader applications.

Understand new tech and market trends impacting IAM to guide overall strategy for investments in technology, resources and programs.

  • Obtain funding, and assess and justify the value and cost of IAM programs. 
  • Adapt IAM strategy to broader digital transformation. 
  • Align IAM initiatives with the organization’s security, applications, data and digital business strategies. 
  • Enable the business to be more agile, responsive and customer-driven. 
  • Cut through the hype around AI, RPA, IoT and blockchain to make the right investment decisions. 
  • Ensure protection against increasing threats, privacy and compliance regulations.
  • Guide transition of IAM from cost center to business enablement.

Network with experts and peers
At Gartner Identity & Access Management Summit, attendees have the opportunity to connect with Gartner experts and industry-leading IAM professionals, IAM architects and engineers, and security professionals. Exchange ideas and experiences with others in similar roles or from similar organizations. 

Build new relationships, broaden your perspectives and uncover ways to solve problems alongside other IAM leaders. When you engage with like-minded peers, you'll find opportunities to share your ideas and experiences.

Highlights

  • Roundtable sessions:* Join your IAM executive peers from leading organizations and various industries to discuss relevant topics inspired by the latest research in these small-group sessions, moderated by a Gartner expert. 
  • End-user case studies: By Gartner invitation only, these detailed and documented case studies reveal lessons from your peers during the implementations of their own organizations.
  • Peer conversations: Join peer-to-peer discussions organically throughout the conference. With over 1,200 attendees of IAM and security leaders, discover how others are tackling the challenges you face every day. 

*Preregistration is required. These sessions are available to end users only; space is limited.

Prioritize what to accelerate, unlock resources for digital investments, make meaningful cultural changes and so much more. No matter where you are on your digital business acceleration journey, we’re here to help you get to your destination faster — with confidence.
 

Lean back and listen

Expect the best speakers, brightest minds and the latest big ideas. These sessions provide the inspiration and actionable insight to transform your mission-critical priorities into business results.

Highlights:

  • Guest Speakers. Hear firsthand experience from guest keynote speakers and guest speakers.
  • Gartner Magic Quadrant™ sessions. Explore Magic Quadrants for Privileged Access Management, Access Management and more.
  • Solution Provider sessions. When you’re looking to address a specific issue, these strategic roadmap presentations and user-case studies provide real-world insight. 
     

Lean in and engage

Facilitated by Gartner experts, these sessions challenge you to solve problems together, exchange viewpoints and get to the core of the business imperatives that drive you and your peers.

Highlights:

  • Workshops.* Small-scale and interactive: Collaborate with peers by taking the most important topics and learning how to apply them to your business.
  • Contract Negotiation Clinics.* Negotiation is an art. At the conference, learn how to negotiate the best contracts for your organization, regardless of vendor size.
  • Diversity, equity and inclusion. Track sessions and interactive experiences focus on issues relevant to diverse identities, including LGBTQ and neurodiversity, as well as corporate sustainability, equity and inclusion.

*Preregistration is required. These sessions are available to end users only. 

Our objective Gartner experts help you advance your mission-critical priorities through industry-leading insights, guidance and tools. Tap their unique expertise to make faster, smarter decisions. 

Gartner one-on-one meetings.* Meet one-on-one with Gartner experts for tailored guidance to help you achieve your mission-critical priorities. These popular meetings offer you the undivided attention of a Gartner expert who listens and guides you on the matters most critical to your success.

Ask the Expert sessions.* These topic-driven sessions provide a more intimate discussion forum, featuring one Gartner expert and end-user peers posing questions.

*Preregistration is required. These sessions are available to end users only; space is limited.

Want to stay informed?

Get conference email updates.
Contact Information

All fields are required.

  • Step 2 of 2

    Tracks at a Glance

    Access the latest Gartner research designed specifically to help identity and access management professionals gain critical insights to sustain effective IAM programs to provide the right access to the right people. Each track has a particular area of focus to help you deliver on what matters most to you and your organization.

    Track A

    Identity Governance and Administration (IGA)

    Identity governance and administration (IGA) is a mature, complex IAM market that is changing radically. Get more information on ways to improve your IGA initiative by learning best practices and innovations such as IAM convergence and autonomous and predictive governance, all powered by identity analytics.

    Track B

    Privileged Access Management (PAM)

    Nearly every significant cyber breach in recent years has had something in common, a failure to monitor and control privileged access. Find out why privileged access management (PAM) principles are one of the most significant security approaches for enterprises, protecting secrets and sensitive accesses across the organization.

    Track C

    Access Management

    Access management is the source of trust for identity-first security. Explore how access management capabilities such as authorization, API access control and single sign-on have matured to support the latest demands of digital transformation.

    Track D

    User Authentication and Identity Proofing

    The demand for secure yet smooth digital experience is increasing. This track is essential for understanding how to establish trust in the identity of new and existing users and mitigate the risks of account takeover and other attacks through careful selection and implementation of modern toolsets.

    Track E

    Cybersecurity, Leadership and Strategy

    Security and IAM leaders require understanding the adjacencies and intersections between identity, cloud, privacy and network security, leveraging modern approaches to leadership and strategy. This track will guide you through the information you need to take an identity-first approach to security.

    Track F

    IAM Program Management

    Deploying IAM, leading winning teams, and supporting IAM operations require a broad understanding of IAM strategies. Get the information you need to plan, build, run and govern IAM programs, by aligning IAM to business goals, implementing and integrating identity tools and operationalizing IAM initiatives through maturity and innovation.

    Spotlight Track

    Technical Insights

    This track focuses on deeper technical best practices and insights, composed by research that is tailored to help architects, analysts, engineers, technologists or IAM professionals who are looking to implement the right architectures, solutions and processes.

    Spotlight Track

    Zero Trust

    This track covers research that helps understand how incorporating zero trust principles within your security and IAM programs improves your security posture and increases cyber resilience.

    Spotlight Track

    Future of IAM

    Identity threat detection and response, the cybersecurity mesh, decentralized identities, journey-time orchestration and the identity fabric are examples of trends that are shaping the future of IAM. This track is essential for understanding how to ride the wave of disruption.

    Spotlight Track

    Digital Identity

    This track points to research that includes technologies that enable secure and trusted digital interactions among people, machines and assets, based on a digital representation of people’s and machines’ physical (real-world) and virtual (electronic) identities.

    Spotlight Track

    Cloud Enablement

    Organizations are squarely in the multicloud hybrid era, with resources flung between multiple cloud providers and on-premises applications. The responsibility is to provide sound IAM no matter the cloud environment. Learn how IAM can support and enhance, not hinder, your cloud migration.

    Ready to register?

    Secure your space now.