Your IAM Journey: The Road to Efficiency, Agility and Customer Value

The Gartner Identity & Access Management Summit 2018 is the premier gathering for IT and business executives responsible for IAM systems, policies & solutions that ensure effective network access control, data loss prevention & business continuity for all users of enterprise systems & information assets.  

  • Leverage best practices in IAM systems and identity governance to align with business priorities and deliver business value
  • Use the right IAM, IGA and authentication tools and platforms to enable best in class capabilities
  • Understand emerging IAM technologies and next practices to take automation, privileged access management, and IoT integration to the next level

Gartner IAM Summit was designed for individuals in the following roles:
Roles Include:
  • CISOs and CIOs
  • IAM Program manager
  • Program management
  • Building IAM program
  • Getting stakeholder buy-in
  • Baseline services that must be deployed
  • Marketing the program
IAM Leaders
Roles Include:
  • IAM planners and implementers
  • Systems integrators
  • Authentication
  • Privileged accounts
  • Governance and administration
  • Single sign-on
IAM Architects
Roles Include:
  • CISOs
  • IAM leaders
  • Network security
  • Mobile security
  • Endpoint security
Security Leaders

What You Will Learn


  • Understand the impact of cloud, mobility, social and big data on IAM and vice versa
  • Learn where and how IAM fits within the larger context of solving business-relevant problems and positioning the business for success
  • Gain best practice use cases and practical advice for IAM governance that provide real value to your enterprise
  • Discover IAM delivery alternatives, their maturity and applicability for your enterprise
  • Learn to take compliance reporting to the next step by leveraging identity and access intelligence
  • Create a more access accountable and transparent organizational culture for your enterprise

See what attendees have said about what they learned

Features & Benefits


  • Gartner Analyst SessionsGartner analysts presenting select research, targeted to your priorities
  • Gartner Analyst One-on-One Meetings: Sit privately for 30 minutes with a Gartner analyst specializing in a topic you'd like to discuss
  • Analyst-User Roundtables: Hear how your colleagues from various industries tackle problems similar to yours
  • WorkshopsIntimate workshops provide an opportunity to drill down on specific "how to" topics in a small group environment
  • End-User Case Studies: Real-world examples from leading industry experts
  • Industry Forums: Get tailored sessions aligned to healthcare, financial services, government, energy and utilities, and consumer
  • TechInsights sessions: Guidance for the toughest security architecture projects, delivered by Gartner for Technical Professionals analysts
  • Solution Showcase: Learn about the latest cutting-edge solutions — from the best-of-breed providers and up-and-comers
  • Solution Provider Sessions: Marketplace offerings from solution providers
  • Group Rate Discount: Maximize your learning by attending as a group and receive a group discount

What's Included



*Online preregistration is required for one-on-ones, workshops and analyst-user roundtables (AURs).
Reserve your place early, as space is limited.
 

Frequently Asked Questions


Get answers to your questions here

   


Agenda

We are currently building the agenda and program for our 2018 Gartner Identity & Access Management Summit. Please see below for our 2018 Track Descriptions. To get an idea of what you can expect, please see below what we covered in 2017.  
 

Hot Topics

  • Single Sign-on
  • Identity Governance Administration
  • Privileged Access Management
  • User Authentication Methods
  • Data Access Governance

2018 Conference Track Coverage

Track A: IAM Strategy and Program Management
A sound IAM strategy and an effective IAM program management are the foundation of success in today’s highly dynamic digital business environment where innovation is constant and business requirements are ever-changing. Get the information you need to align your IAM strategy with corporate goals, build an IAM roadmap with attainable milestones, organize project resources and measure project success. Learn how to avoid common pitfalls through best practices and lessons learned from successful and not-so-successful IAM programs.

Track B: Identity Administration
Identity governance and administration help organizations reduce operational overhead, streamline business operations, minimize risk and comply with regulations; however, the managed identity environment is growing in both complexity and volume. Recognize the challenges of identity administration and explore how next-generation identity architecture and technology innovations help solve these challenges. Get practical methods and long-term strategies to administer and govern identities.

Track C: Trust, Authentication and Fraud Prevention​
In a world of increased risk and advanced attacks, organizations must adopt a continuous adaptive risk and trust model that allows for real-time, risk-and-trust-based authentication decisions with adaptive responses. Get information on how to build an IAM system that adapts to support business needs and evolving trust relationships. Learn how analytics, biometrics and other advanced authentication methods help provide frictionless access, while increasing security and preventing fraud.

Track D: Access Management and Authorization
Users want seamless access to their mobile, cloud and enterprise applications. Access management and authorization technologies have evolved to support diversity in authentication methods, adaptive access, mobile computing, internet-connected things and API target systems. Explore how access management technologies have changed and catch up on the latest information on OpenID Connect, OAuth, blockchain and self-sovereign identity.

Track E: Security, Risk and Privacy
The lines of delineation between IAM and its security, risk and privacy peers are diminishing as more identities, data sources and technologies are introduced. The mad rush to comply with the General Data Protection Regulation (GDPR), high-profile security breaches and the expanding threat landscape expose the need for a multifaceted approach to IAM, infrastructure protection, risk management, compliance and privacy protection. This track explores the security and privacy disciplines and the market trends that align with IAM.

Track F: Senior Leadership Circle
Digital business presents IAM leaders with new challenges: They must understand business goals; quickly identify and assess associated risks; and communicate those risks to the business, in business terms. Learn how to become a recognized business leader and a superstar communicator, facilitator and problem solver.

 

"SESSIONS WERE VERY SPECIFIC PROVIDING ACTIONABLE INSIGHT AND RECOMMENDATIONS. THEY WERE ALSO TARGETED TO ORGANIZATIONS WITH DIFFERING LEVELS OF IAM SOPHISTICATION."

- Jon Magers, Information Security Officer Salem Health

Optimize Your Attendance


You'll be able to add these Gartner exclusives to your agenda:

  • Admission to all Keynote sessions
  • Two (30 min) Gartner Analyst One-on-Ones
  • Two Analyst-User Roundtables
  • Two Workshops
  • End-User Case Studies
  • Solution Provider Showcase
  • Breakfast, Lunch, Snacks

 



Speakers

Listen to inspirational guest keynote speakers, hear from Gartner-invited end-user case study speakers, and learn from Gartner analysts – the foremost experts in their areas of focus.

2017 Featured Analysts

  • Felix Gaehtgens
    Felix Gaehtgens

    Research Director

  • Brian Iverson
    Brian Iverson

    Research Director

  • Gregg Kreizman
    Gregg Kreizman

    Research Vice President

  • Mary Ruddy
    Mary Ruddy

    Research Vice President

What We Hear About Our Speakers


"AS ALWAYS, GARTNER ANALYSTS DEMONSTRATE THEY HAVE THEIR FINGER ON THE PULSE OF WHAT'S HAPPENING IN SECURITY AND IDENTITY, DEEP INSIGHTS AND DEEP INFO."

- Brendon Wilson Eirnin Consulting

Exhibitors

Meet the Solution Providers at the Forefront of IAM

Gartner Identity & Access Management Summit will help you develop a "short list" of technology and service providers who can meet your particular needs. You'll receive exclusive access to some of the world's leading technology and service providers in a variety of settings.

  • Learn more about the exhibitor experience.
  • Contact us to learn more about opportunities to exhibit.

Premier


Platinum


Silver


Kiosk


Become an Exhibitor


Take Your Place Among Technology's Key Players
Join us now

 

Exhibitor Interactions


Read more​ about how you can interact with our exhibitors

Venue & Travel

Las Vegas, Nevada

Venue

Caesars Palace
 

Caesars Palace
3570 Las Vegas Blvd. South
Las Vegas, NV, United States - 89109


Accommodations

Please note: Gartner will be reserving a limited block of rooms at Caesars Palace at a discounted rate. Please check back for updates as they become available and the room block opens in July 2018.
 

Accommodations & Privacy Advisory


Gartner has been made aware that service providers, such as Exhibition Housing Management, have contacted a number of individuals who are attending our conference to offer hotel reservation services and/or sell copies of the confidential attendee list. 

Please note that Gartner has NOT authorized them, or anyone else, to contact attendees on our behalf, nor does Gartner share/sell attendee contact information to anyone. 
Learn more on how to protect yourself from scamming attempts. ​