Gartner identity and access management magic quadrant 2022

Show

A look back at 2022's agenda

View By:

A look back at 2022's agenda

Monday, August 22, 2022 / 09:30 AM - 10:15 AM PDT

Gartner Opening Keynote: How to Digitally Accelerate When You’re So Freaking Tired

Mary Mesaglio, Managing Vice President, Gartner

It’s 2022 and we thought the long-awaited reopening was finally here. But then, wham. Omicron arrived on the scene. The pandemic sometimes seems like a never-ending story of dashed hopes. Yet, you don’t get to sit this one out. Businesses continue to transform, you must continue to lead your people, and the world doesn’t stop just because you’re tired. And we know you’re tired. This session covers how to continue your digital acceleration while keeping your people – and yourself – safe and whole. It’s a tightrope walk out there.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 11:00 AM - 11:30 AM PDT

Manuel Acosta, Sr Director, Advisory, Gartner

“Top trends” highlight shifts in the security ecosystem that aren't widely recognized, but are likely to have potential for disruption. This presentation will describe the significant trends in risk management and how organizations are taking advantage of these trends. Key issues include: Top technological improvements in the security product landscape; Trends in creating a top notch security organization; and long-term trends that will influence security strategy

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 11:00 AM - 11:30 AM PDT

Best Practices in Communicating the Business Value of Cybersecurity

Tom Scholtz, Distinguished VP Analyst, Gartner

There are multiple approaches for communicating the business value of cybersecurity and none of them offer a single "best" way. All are relevant to different contexts. This presentation will discuss the characteristics of common approaches such as RO(S)I, price-performance analysis, outcome-driven approach, etc., and provide guidance on how to select the appropriate approach based on context.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 11:00 AM - 11:30 AM PDT

Connect Business Value and Identity Management

Rebecca Archambault, Sr Director Analyst, Gartner

Leaders responsible for IAM generally focus on the technical benefits of an IAM solution rather than its impact on the organization's goals and objectives. They are not accustomed to recognizing and accommodating the influence IAM has on business outcomes or associating IAM with environmental, organization or social change. These skills are critical to an initiative with IAM's scope and breadth.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 11:00 AM - 11:45 AM PDT

Ask the Expert: How Diversity, Equity and Inclusion Can Give Your IAM Program the Edge

Tobi Bet, Sr Director Analyst, Gartner

Improving diversity, equity and inclusion within IAM and security teams can go beyond moral arguments, into business cases built on better protection for your organization, and better talent and motivation for your team. Bring your questions to this session, and find out how to craft a DE&I strategy that can have positive impact to your business across multiple dimensions.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 12:30 PM - 01:00 PM PDT

Address the Top Maturity Gaps in IAM Programs with Insights from Gartner's ITscore

Rebecca Archambault, Sr Director Analyst, Gartner

Security and Risk leaders struggle to achieve the desired level of maturity across certain key activities that are critical to a healthy IAM function. Failure to address these "top gaps" devalues IAM programs, and increases risk to the enterprise. This session will outline the top gaps IAM programs are experiencing, and provide guidance on how to improve maturity in these critical areas.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 12:30 PM - 01:00 PM PDT

Outlook for Cloud Security

Patrick Hevesi, VP Analyst, Gartner

Information security is frequently cited as a top obstacle to the adoption of cloud computing, yet improved security is cited as a top driver for adoption of cloud computing. This session will explore the current and future state of cloud security spanning infrastructure, platform and software as a service offerings, including hybrid cloud security and emerging distributed cloud and edge computing security issues.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 02:30 PM - 03:00 PM PDT

Cybersecurity Mesh Architecture 101

Felix Gaehtgens, VP Analyst, Gartner

With many IT assets now outside traditional enterprise perimeters, IT leaders must rethink security. Enter the cybersecurity mesh architecture, a composable and scalable approach to extend security controls to distributed assets by decoupling policy enforcement from the assets being protected.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 02:30 PM - 03:00 PM PDT

Security Organization Dynamics

Tom Scholtz, Distinguished VP Analyst, Gartner

There is no such thing as a perfect model for security organizations. Every enterprise must develop its own model, taking into consideration basic principles, practical realities and the challenges of digital transformation. This session will address the following:
. What are the trends and challenges in security organization design?
. What are the factors that influence security organization?
. What are the current best practices and conceptual design models for security organization?

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 02:30 PM - 03:15 PM PDT

Ask the Expert: How to build your Cloud Security Strategy and Architecture

Patrick Hevesi, VP Analyst, Gartner

Come ask the expert any question on the acronym soup in Cloud Security - CASB, SSE, CSPM, CWPP, CNAPP, SASE, CSMA, CIEM and IAM. How the different products work, any questions on where to start and how to build your cloud security architecture.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 04:00 PM - 04:30 PM PDT

How to Make a Great Decision, Every Time

Mary Mesaglio, Managing Vice President, Gartner

CIOs make critical decisions every day — decisions that impact the viability and success of the organization, and the quality of life of the people who work there. Make those decisions count by understanding how to frame and evaluate your options using proven frameworks for every type of decision.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 10:30 AM - 11:00 AM PDT

Ransomware Is Changing — Are You Ready?

Paul Furtado, VP Analyst, Gartner

Ransomware attacks have been morphing. Techniques used by the bad actors are changing. During this presentation, we will provide insight into the new tactics being used by the bad actors not only to access your environment, but what they are doing with your data once exfiltrated. Finally, we will also provide current data on the financial impact of a ransomware attack.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 10:30 AM - 11:00 AM PDT

Gain a Critical Advantage Over Cybercrimes Through Diversity, Equity and Inclusion

Tobi Bet, Sr Director Analyst, Gartner

Workplace and supplier diversity is at the forefront of organizations’ minds. Beyond the ethical and moral benefits, DEI can protect against an increasingly broad range of cyber attacks. We will discuss the business case for DEI, how to develop a one-page DEI strategy and how to grow your employee and supplier diverse base.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 02:00 PM - 03:30 PM PDT

Workshop: Defining Meaningful Metrics for IAM

Rebecca Archambault, Sr Director Analyst, Gartner

Brian Guthrie, Director Analyst, Gartner

Knowing what metrics matter to your IAM stakeholders is critical to prioritizing, developing and monitoring IAM features. Metrics identify the success of individual projects and where attention and improvements must take place. To succeed, they must be terms the stakeholder recognizes and understand. They should also align with or influence other initiatives. Learn how to set proper expectations.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 03:30 PM - 04:00 PM PDT

An IAM Program Is Critical to a Zero Trust Strategy

Ramon Krikken, Managing Vice President, Gartner

Solid IAM programs are crucial to zero trust strategies. Without IAM, zero trust strategies are doomed to fail. In this session, you will learn:
- High-level zero trust strategy and its relation to IAM programs
- How zero trust and identity architectures fit together
- Practical zero trust technologies implementations and their impact on identity

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 03:30 PM - 04:15 PM PDT

Ask the Expert: Ransomware Is Changing — Are You Ready?

Paul Furtado, VP Analyst, Gartner

Ransomware attacks have been morphing. Techniques used by the bad actors are changing. Come ask our experts how you can best protect, defend and respond to this threat

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 03:30 PM - 04:15 PM PDT

Ask the Expert: How to Keep Teams Safe and Motivated When in Constant Crisis Mode

Mary Mesaglio, Managing Vice President, Gartner

It’s hard to be a leader right now. The world seems be lurching from crisis to crisis. There’s not time to adjust, let alone recover. This session is focused on the practical: tactics that leaders can use to keep their teams motivated, even as everyone is exhausted and the crises multiply. The emphasis is on what that attendees can immediately put into practice.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 05:15 PM - 05:45 PM PDT

Who Do You Want to Be Post-Crisis? Actions for Leaders

Mary Mesaglio, Managing Vice President, Gartner

There is a lot of corporate soul searching going on right now. Some enterprises are doubling down on their values while others are adopting new ones. In all cases, values are inspiring and exciting, but not enough on their own to drive change. This session covers the values-to-action pyramid, walking through practical ways to turn values into everyday behaviors.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, August 24, 2022 / 09:00 AM - 09:30 AM PDT

Outlook for Identity and Access Management

Henrique Teixeira, Sr Director Analyst, Gartner

Identity and access management has reached a tipping point with the distribution of workforce and customer access. The decentralization of objects and assets demands a flexible and centralized response with a reliance on flexible orchestration, and policy enforcement which supports a low-friction, zero-trust approach.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, August 24, 2022 / 09:00 AM - 09:30 AM PDT

Protection From the Risk Within — Managing Insider Risk

Paul Furtado, VP Analyst, Gartner

One of the biggest risks to our security accesses our systems on a daily basis. This presentation will focus on providing guidance on building an effective insider risk program. We will discuss the tools, tactics and techniques to balance the needs of the business with user's privacy. Recommendations will also be made on how to present the program effectively to leadership and end users.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, August 24, 2022 / 09:00 AM - 09:30 AM PDT

Bernard Woo, Sr Director Analyst, Gartner

Dive into five top trends in privacy and privacy tech. What are leading organizations focused on, what are the best capabilities to develop and what should you expect from your tech. We'll cover use cases, vendors and cost — enough to provide you with clear next steps to take to your teams.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, August 24, 2022 / 09:00 AM - 09:30 AM PDT

Outlook for Data Security

Ramon Krikken, Managing Vice President, Gartner

This session covers current trends and emerging topics in the area of data security. From databases to cloud applications, threats are rapidly evolving and countermeasures slowly follow. Planning a data-centric roadmap for security governance and security architecture is a critical component of any security and risk management program.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, August 24, 2022 / 09:00 AM - 10:30 AM PDT

Workshop: Defining a Successful IAM Program

Rebecca Archambault, Sr Director Analyst, Gartner

Brian Guthrie, Director Analyst, Gartner

During this workshop IAM leaders will learn the importance, and what steps are required for the definition of a well-crafted IAM Program. The session will include exercises for creating your own IAM vision.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, August 24, 2022 / 09:00 AM - 10:30 AM PDT

Workshop: Turn Lessons Learned From Recent Supply Chain Attacks Into an Action Plan

Manuel Acosta, Sr Director, Advisory, Gartner

Gartner experts have compiled the key learnings from recent supply chain attacks. We will examine both familiar and novel techniques the attackers used to carry out massive scale attacks and stay undetected for up to six months. Attendees will learn how to better identify and respond to these and similar exploits and take away an actionable plan for their own organization.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, August 24, 2022 / 11:30 AM - 12:15 PM PDT

Gartner Keynote: Stop Treating Security Like Magic and Security People Like Wizards

Tom Scholtz, Distinguished VP Analyst, Gartner

Refocus corporate security initiatives and efforts — from a futile effort to prevent breaches to accepting the inevitability of breaches. We will define how to learn from normal accident theory to build a culture of resilience, capable of reducing or eliminating business impacts from security breaches. This culture is built on characteristics and disciplines which we will define in actionable terms.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 11:00 AM - 12:30 PM PDT

Workshop: How Best to Build and Execute an RFP for an IGA Product

David Collinson, Sr Director Analyst, Gartner

Gautham Mudra, Sr Director Analyst, Gartner

This workshop will help you by practically taking you through the stages of preparing for an RFP for an IGA product. Attendees will leave with a practical approach to a succesful RFP.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 12:30 PM - 01:00 PM PDT

Do Privileged Access Management Right: How to Build an Effective and Mature PAM Program

Felix Gaehtgens, VP Analyst, Gartner

Many organizations struggle with PAM after some small initial success, can't manage to get further. This session sheds light on: Why is PAM such a crucial piece of any security program? What are the common pitfalls? What should you do in the near, medium and long term?

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 02:30 PM - 03:15 PM PDT

Ask the Expert: How do I Automate all these Identity Governance and Administration tasks?

Gautham Mudra, Sr Director Analyst, Gartner

IGA is often used as a tool to automate various manual processes - up to and including the use of robots and AI. This session will give you an opportunity to ask questions around automation and IGA;

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 04:00 PM - 04:30 PM PDT

Practical Applications of Decentralized Identity and Verifiable Claims

Homan Farahmand, VP Analyst, Gartner

Decentralized identity and verifiable claims will disrupt IAM by enabling a shared trust model, protocol-based controls, and decentralized identity data exchange. In this session we discuss how organizations can leverage these technologies to drive efficiency in identity verification and data exchange for business processes in digital ecosystems.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 04:00 PM - 04:45 PM PDT

Ask the Expert: What are the Best Practices for Privileged Access Management?

Felix Gaehtgens, VP Analyst, Gartner

Privileged access is the prime cause of breaches, yet more people than ever require it for their work. Requirements for PAM are evolving quickly to include hybrid multicloud scenarios and machine identities. Bring your questions about trends, best practices to this session.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 10:05 AM - 10:25 AM PDT

Market Guide for Identity Governance and Administration

Rebecca Archambault, Sr Director Analyst, Gartner

*This session is also featured on Theater 2, Exhibit Showcase.

Identity and Access Management leaders should use this Market Guide to aid in making decisions about identity governance and administration products.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 10:30 AM - 11:00 AM PDT

Guidance for Privileged Access Management

Homan Farahmand, VP Analyst, Gartner

PAM is a complex cyber defense discipline that requires careful technical planning for coverage areas. In this session we discuss the basic and emerging controls architecture to drive a zero standing privilege model for multi-cloud and hybrid environments. This includes PAM best practices and what works practically, considering organizational challenges and tools limitations.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 10:30 AM - 11:00 AM PDT

What’s Next in Cloud Identity Risks? CIEM and Beyond

Henrique Teixeira, Sr Director Analyst, Gartner

Entitlement management used to be a manageable problem. However, with the explosion of many thousands of permissions per identity in cloud infrastructures, legacy IAM approaches are no longer sufficient. Join this session to learn what cloud infrastructure entitlement management means, and how can it help to mitigate identity risks in the cloud.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 10:30 AM - 11:15 AM PDT

Bernard Woo, Sr Director Analyst, Gartner

Privacy regulations are increasing including either data residency or data localization requirements. This session is an opportunity for you ask questions about managing customer consent and preferences in such a rapidly evolving environment.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 12:00 PM - 12:30 PM PDT

How to Choose and Deploy an Identity Governance and Administration (IGA) Solution

David Collinson, Sr Director Analyst, Gartner

This session will help provide IAM leaders with best practice advice to both select and then deploy an IGA tool. Starting with what an IGA tool comprises of, and working methodically through the stages of the buying journey it will help IAM leaders select the right product for their organization. The second part of the presentation will then focus on how to succesfully deploy it.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 03:30 PM - 04:00 PM PDT

Insights from the Magic Quadrant and Critical Capabilities for Privileged Access Management

Felix Gaehtgens, VP Analyst, Gartner

Through a selection of relevant Gartner insights and complementary methodologies, we will provide insight into latest updates in the privileged access management market.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, August 24, 2022 / 10:30 AM - 11:00 AM PDT

Segregation of Duty Controls (That Most IGA Tools Have) Are Pretty Cool — So Why Limit Them Only to Finance?

David Collinson, Sr Director Analyst, Gartner

Whilst segregation of duty controls are key to preventing fraud, they can also be used very effectively in the security arena.
This session will explore the changing scope and supporting technologies to prevent toxic combinations impacting your organization financially and also from a security perspective.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 10:30 AM - 10:50 AM PDT

Magic Quadrant for Access Management 2022

Brian Guthrie, Director Analyst, Gartner

This session will present the Magic Quadrant and Critical Capabilities for Access Management market, 2022. This session will be repeated on Tuesday morning at 10:00am.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 11:00 AM - 11:30 AM PDT

The State of Access Management, 2022

Erik Wahlstrom, Sr Director Analyst, Gartner

Access Management technologies are enablers of Identity First security. What has been changing in the market, driving the need to account for new user constituencies, and new work models? How is access management technology continuing to evolve to meet these new challenges? We will talk about what is available today, and what kinds of things can you expect to take advantage of in the near future.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 11:00 AM - 11:45 AM PDT

Ask the Expert: What is Zero Trust?

Ramon Krikken, Managing Vice President, Gartner

Zero trust is an overloaded marketing term. What is really mean by "zero trust" and as an IAM leader, why should I care?

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 12:30 PM - 01:00 PM PDT

How to Mature Your Microsoft 365 Identity Management

Paul Rabinovich, Sr Director Analyst, Gartner

Implementing hybrid identity for Microsoft 365 and protecting employee, administrator and partner access can be daunting. This session will guide you through best practices for Microsoft 365 IAM.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 02:30 PM - 03:00 PM PDT

How to Choose an Access Management Solution: Using the MQ and Beyond

Henrique Teixeira, Sr Director Analyst, Gartner

Access management solutions are mature, rich with features and offer a broadened scope that overlaps with many adjacent areas. Learn how to better use the AM MQ and a five-step approach to select a long-lasting, cost-efficient AM solution.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 04:00 PM - 04:30 PM PDT

Best Practices for Improving Access Management

David Chase, Sr Director Analyst, Gartner

Access management is a key part of identity first security. Organizations need to optimize AM activities in the context of broader identity, security and business goals, for example as part of an identity first security, zero-trust or cloud first initiatives.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 04:00 PM - 04:45 PM PDT

Ask the Expert: Effective Identity Management for Microsoft 365

Paul Rabinovich, Sr Director Analyst, Gartner

Whether you are just starting on a Microsoft 365 deployment or have had one for some time, threats against your users continue to evolve. IAM controls in Microsoft 365 must adapt accordingly.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 10:00 AM - 10:20 AM PDT

Magic Quadrant for Access Management 2021 (Repeat)

Brian Guthrie, Director Analyst, Gartner

This session will present the Magic Quadrant and Critical Capabilities for Access Management market, 2022.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 10:30 AM - 12:00 PM PDT

Workshop: Selecting the Right Employee SSO Solution for Your Evolving Organization

David Chase, Sr Director Analyst, Gartner

Modern architectures and applications place additional demands on access management tools. This workshop will introduce access management evaluation criteria guidelines and discuss what features you should look for and what vendors to consider for your next employee access management solution.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 02:00 PM - 02:30 PM PDT

Top Practices for Strengthening Your CIAM Strategy

Henrique Teixeira, Sr Director Analyst, Gartner

What are companies doing for CIAM? How can you differentiate yourself from your competitors through a superior CIAM portal that your customers love? What are the main considerations, and how is privacy regulation impacting these decisions? We will discuss top practices around CIAM, how to take your CIAM initiative to the next level and how to plan for the best user experience to achieve your goals.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 02:00 PM - 02:30 PM PDT

Active Directory in Transition: Gartner Survey Results and Analysis

Paul Rabinovich, Sr Director Analyst, Gartner

Gartner clients often ask if they can drop their Active Directory and migrate to a cloud-based identity service. Technology is already in place to support this journey, but do real-world Active Directory customers actually take it? In this session we will share the results of a Gartner survey about the future of Active Directory as seen by end-user organizations.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 05:15 PM - 05:45 PM PDT

Improve IAM Architecture by Embracing 10 Identity Fabric Principles

Erik Wahlstrom, Sr Director Analyst, Gartner

In a world where identity is the only perimeter, identity-first security has become an imperative. IAM must be deployed more cohesively as a composable, distributed, resilient identity fabric. Organizations should also apply IAM best practices to more of their applications and services and to the IAM infrastructure itself.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, August 24, 2022 / 10:30 AM - 11:00 AM PDT

Enabling Identity-First Security With Policy-Based Authorization

Homan Farahmand, VP Analyst, Gartner

Policy-based authorization has become a focal point for developing the next generation of identity-centric access controls. It includes both human and machine use cases supporting access to modern apps, computing units, data objects and underlying networks. In this session we discuss key use cases, policy management, and policy enforcement patterns to enhance security model of digital systems.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, August 24, 2022 / 10:30 AM - 11:00 AM PDT

Pre-recorded session: How to Architect CIAM and Select the Right Vendors

Nat Krishnan, Sr Director Analyst, Gartner

Due to unforeseeable circumstances, Nat Krishnan is unable to travel to the conference. Mr. Krishnan delivered this session in May at the Gartner Identity & Access Management Summit in London, U.K., and the recording of his presentation will played on screen.

As requirements for great CIAM become more sophisticated, best practices for architecting CIAM and selecting vendors are evolving. This session will focus on the broadening scope of CIAM deployment architecture, selection criteria and vendors you should consider for your short lists.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 12:30 PM - 01:00 PM PDT

State of User Authentication, 2022

Paul Furtado, VP Analyst, Gartner

User authentication is at the heart of account protection for both consumer and workforce use cases, but cutting through the noise about passwordless authentication, hardware tokens and biometric authentication can be difficult. This session separates hype from the reality, theoretical from possible, and provides context of how to think about and invest in new user authentication technologies.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 02:30 PM - 03:15 PM PDT

Ask the Expert: Which Modern Identity Protocols Should I Use? OAuth 2.0, OIDC, OPA, JWT or SCIM?

Erik Wahlstrom, Sr Director Analyst, Gartner

Application modernization and zero-trust strategies demand modern identity protocols. But what modern identity protocol should I use for my use-case? Bring your own questions to this session about the usage and deployment about modern identity protocols such as OAuth 2.0, OpenID Connect, OPA, JWT or SCIM?

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 12:00 PM - 12:30 PM PDT

Preventing ATO Fraud

Bernard Woo, Sr Director Analyst, Gartner

In this presentation, Gartner will address the prevalent new fraud threat that is keeping end user leaders awake at night. In this presentation we will explore an overview of ATO fraud, what the impact is to financial institutions and end users, and what action plan can be initiated to address this new issue

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 12:00 PM - 12:30 PM PDT

Your Next MFA Solution Will Be Cloud-Based. How Do You Pick the Best One?

Paul Rabinovich, Sr Director Analyst, Gartner

Everyone agrees that MFA is a must when it comes to protection against account takeover attacks, but MFA requirements evolve. In this session we will discuss results of Gartner's most recent solution comparison of capabilities of six leading cloud-based MFA vendors.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 03:30 PM - 04:00 PM PDT

Passwörterdämmerung Redux — Take 3 Steps Towards Passwordless Authentication

Paul Rabinovich, Sr Director Analyst, Gartner

The twilight of the passwords has long been foretold but is now, at last, upon us. Security and UX are key drivers for passwordless authentication. But how can IAM leaders choose among the many passwordless approaches? Which are the most effective? Where do novel methods add value? What is the role of FIDO2? How does passwordless authentication fit with zero trust, adaptive access and the identity fabric? How can you craft a cohesive strategy across multiple use cases?

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 05:15 PM - 05:45 PM PDT

How to Choose a User Authentication Vendor

Paul Rabinovich, Sr Director Analyst, Gartner

With more than 300 vendors in the user authentication market, choosing one or more vendors to fit your needs across a variety of use cases for employees and customers can be fraught with difficulty. How can you identify the most effective authentication methods (with or without passwords)? Where can you find the ablest providers among the IAM marketverse? Do you need to look beyond the methods already available within your IAM infrastructure?

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, August 24, 2022 / 10:30 AM - 11:00 AM PDT

The Pitfalls of Implementing Multifactor Authentication

David Chase, Sr Director Analyst, Gartner

Multifactor authentication has become a priority for mitigating account takeover attacks. This breakout will discuss the top pitfalls organizations experience and how to avoid them.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 10:30 AM - 10:50 AM PDT

Hype Cycle for Digital Identity, 2022

Felix Gaehtgens, VP Analyst, Gartner

This Hype Cycle for identity and access management (IAM) emphasizes the maturation of innovations that deliver security, risk management and business value for customer and workforce IAM.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, August 22, 2022 / 04:00 PM - 04:45 PM PDT

Ask the Expert: Everything You Always Wanted to Know About CIEM, that You Can't Find on Google

Henrique Teixeira, Sr Director Analyst, Gartner

CIEM is a breakaway theme in IAM, leveraging identity analytics and AI to help mitigate cloud identity risks. As the number of vendors proliferate, and not a lot of success stories exist yet, it becomes hard to differentiate fact from fiction. Bring your own questions about CIEM, cloud identity, AI and analytics in IAM.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 10:30 AM - 11:00 AM PDT

The State of Artificial Intelligence in Security and Risk Management

Felix Gaehtgens, VP Analyst, Gartner

This session covers why everyone speaks about how artificial intelligence might solve security and risk management challenges, but struggle when asked to provide a concrete example. It will show examples of what we call AI today.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 12:00 PM - 12:30 PM PDT

Machine Identities, Secrets, Keys and Certificates — The Team, the Process and the Tools

Erik Wahlstrom, Sr Director Analyst, Gartner

In this session we will look at a best-of-breed verses all-in-one tooling discussions of the expanding portfolio of tools that manage our machine identities, secrets, keys and certificates.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 02:00 PM - 02:30 PM PDT

Schrödinger’s CAT — Using Continuous Adaptive Trust to Distinguish Between Users and Attackers

David Chase, Sr Director Analyst, Gartner

In quantum physics there is a famous thought experiment in which you don’t know if a cat is alive or dead until you open the box containing it. Similarly, you may not truly know – until it is too late – if the person accessing your systems is your employee or customer or an attacker. How does CAT let you resolve this with greater confidence than legacy MFA? How does CAT fit within zero trust and adaptive access approaches?

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, August 23, 2022 / 03:30 PM - 04:00 PM PDT

API Access Control 201: Architect a Modern API Access Control Strategy

Erik Wahlstrom, Sr Director Analyst, Gartner

In this technical session we will establish an agile and composable identity fabric that supports API access control that consists of multiple types of identity tools and components that together enable encryption, authentication and authorization for your distributed APIs.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, August 24, 2022 / 09:00 AM - 09:45 AM PDT

Ask the Expert: How do I Manage my Machine Identities?

Erik Wahlstrom, Sr Director Analyst, Gartner

Organizations find themselves needing to manage and provide best practices for how to handle the machine identities for a growing number of workloads. Bring your own questions to this session on how to manage secrets, keys and certificates in a hybrid and multi cloud environment.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

What is the future of identity and access management?

Identity & Access Management (IAM) tools Importantly, IAM tools bring the benefit of the latest in data and analytics capabilities, automation and Artificial Intelligence (AI), helping organisations to shift from reactive to proactive risk management, and gain enhanced efficiencies via informed decision making.

What is the difference between IGA and IAM?

Specifically, it notes, 'IGA differs from IAM in that it allows organizations to not only define and enforce IAM policy, but also connect IAM functions to meet audit and compliance requirements.

Is CyberArk an IAM tool?

CyberArk The IAM solution gets solid marks for capabilities, value, ease of deployment, and support. It's one of the best products on the market for adaptive access control.

What is the IAM framework?

Identity and access management (IAM) is a framework of business processes, policies and technologies that facilitates the management of electronic or digital identities. With an IAM framework in place, information technology (IT) managers can control user access to critical information within their organizations.