Show
A look back at 2022's agendaView By:A look back at 2022's agendaMonday, August 22, 2022 / 09:30 AM - 10:15 AM PDT Gartner Opening Keynote: How to Digitally Accelerate When You’re So Freaking TiredMary Mesaglio, Managing Vice President, Gartner It’s 2022 and we thought the long-awaited reopening was finally here. But then, wham. Omicron arrived on the scene. The pandemic sometimes seems like a never-ending story of dashed hopes. Yet, you don’t get to sit this one out. Businesses continue to transform, you must continue to lead your people, and the world doesn’t stop just because you’re tired. And we know you’re tired. This session covers how to continue your digital acceleration while keeping your people – and yourself – safe and whole. It’s a tightrope walk out there. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Monday, August 22, 2022 / 11:00 AM - 11:30 AM PDT Top Cybersecurity TrendsManuel Acosta, Sr Director, Advisory, Gartner “Top trends” highlight shifts in the security ecosystem that aren't widely recognized, but are likely to have potential for disruption. This presentation will describe the significant trends in risk management and how organizations are taking advantage of these trends. Key issues include: Top technological improvements in the security product landscape; Trends in creating a top notch security organization; and long-term trends that will influence security strategy Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Monday, August 22, 2022 / 11:00 AM - 11:30 AM PDT Best Practices in Communicating the Business Value of CybersecurityTom Scholtz, Distinguished VP Analyst, Gartner There are multiple approaches for communicating the business value of cybersecurity and none of them offer a single "best" way. All are relevant to different contexts. This presentation will discuss the characteristics of common approaches such as RO(S)I, price-performance analysis, outcome-driven approach, etc., and provide guidance on how to select the appropriate approach based on context. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Monday, August 22, 2022 / 11:00 AM - 11:30 AM PDT Connect Business Value and Identity ManagementRebecca Archambault, Sr Director Analyst, Gartner Leaders responsible for IAM generally focus on the technical benefits of an IAM solution rather than its impact on the organization's goals and objectives. They are not accustomed to recognizing and accommodating the influence IAM has on business outcomes or associating IAM with environmental, organization or social change. These skills are critical to an initiative with IAM's scope and breadth. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Monday, August 22, 2022 / 11:00 AM - 11:45 AM PDT Ask the Expert: How Diversity, Equity and Inclusion Can Give Your IAM Program the EdgeTobi Bet, Sr Director Analyst, Gartner Improving diversity, equity and inclusion within IAM and security teams can go beyond moral arguments, into business cases built on better protection for your organization, and better talent and motivation for your team. Bring your questions to this session, and find out how to craft a DE&I strategy that can have positive impact to your business across multiple dimensions. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Monday, August 22, 2022 / 12:30 PM - 01:00 PM PDT Address the Top Maturity Gaps in IAM Programs with Insights from Gartner's ITscoreRebecca Archambault, Sr Director Analyst, Gartner Security and Risk leaders struggle to achieve the desired level of maturity across certain key activities that are critical to a healthy IAM function. Failure to address these "top gaps" devalues IAM programs, and increases risk to the enterprise. This session will outline the top gaps IAM programs are experiencing, and provide guidance on how to improve maturity in these critical areas. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Monday, August 22, 2022 / 12:30 PM - 01:00 PM PDT Outlook for Cloud SecurityPatrick Hevesi, VP Analyst, Gartner Information security is frequently cited as a top obstacle to the adoption of cloud computing, yet improved security is cited as a top driver for adoption of cloud computing. This session will explore the current and future state of cloud security spanning infrastructure, platform and software as a service offerings, including hybrid cloud security and emerging distributed cloud and edge computing security issues. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Monday, August 22, 2022 / 02:30 PM - 03:00 PM PDT Cybersecurity Mesh Architecture 101Felix Gaehtgens, VP Analyst, Gartner With many IT assets now outside traditional enterprise perimeters, IT leaders must rethink security. Enter the cybersecurity mesh architecture, a composable and scalable approach to extend security controls to distributed assets by decoupling policy enforcement from the assets being protected. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Monday, August 22, 2022 / 02:30 PM - 03:00 PM PDT Security Organization DynamicsTom Scholtz, Distinguished VP Analyst, Gartner There is no such thing as a perfect model for security organizations. Every enterprise must develop its own model, taking into consideration basic principles, practical realities and the challenges of digital transformation. This session will address the following: Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Monday, August 22, 2022 / 02:30 PM - 03:15 PM PDT Ask the Expert: How to build your Cloud Security Strategy and ArchitecturePatrick Hevesi, VP Analyst, Gartner Come ask the expert any question on the acronym soup in Cloud Security - CASB, SSE, CSPM, CWPP, CNAPP, SASE, CSMA, CIEM and IAM. How the different products work, any questions on where to start and how to build your cloud security architecture. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Monday, August 22, 2022 / 04:00 PM - 04:30 PM PDT How to Make a Great Decision, Every TimeMary Mesaglio, Managing Vice President, Gartner CIOs make critical decisions every day — decisions that impact the viability and success of the organization, and the quality of life of the people who work there. Make those decisions count by understanding how to frame and evaluate your options using proven frameworks for every type of decision. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Tuesday, August 23, 2022 / 10:30 AM - 11:00 AM PDT Ransomware Is Changing — Are You Ready?Paul Furtado, VP Analyst, Gartner Ransomware attacks have been morphing. Techniques used by the bad actors are changing. During this presentation, we will provide insight into the new tactics being used by the bad actors not only to access your environment, but what they are doing with your data once exfiltrated. Finally, we will also provide current data on the financial impact of a ransomware attack. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Tuesday, August 23, 2022 / 10:30 AM - 11:00 AM PDT Gain a Critical Advantage Over Cybercrimes Through Diversity, Equity and InclusionTobi Bet, Sr Director Analyst, Gartner Workplace and supplier diversity is at the forefront of organizations’ minds. Beyond the ethical and moral benefits, DEI can protect against an increasingly broad range of cyber attacks. We will discuss the business case for DEI, how to develop a one-page DEI strategy and how to grow your employee and supplier diverse base. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Tuesday, August 23, 2022 / 02:00 PM - 03:30 PM PDT Workshop: Defining Meaningful Metrics for IAMRebecca Archambault, Sr Director Analyst, Gartner Brian Guthrie, Director Analyst, Gartner Knowing what metrics matter to your IAM stakeholders is critical to prioritizing, developing and monitoring IAM features. Metrics identify the success of individual projects and where attention and improvements must take place. To succeed, they must be terms the stakeholder recognizes and understand. They should also align with or influence other initiatives. Learn how to set proper expectations. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Tuesday, August 23, 2022 / 03:30 PM - 04:00 PM PDT An IAM Program Is Critical to a Zero Trust StrategyRamon Krikken, Managing Vice President, Gartner Solid IAM programs are crucial to zero trust strategies. Without IAM,
zero trust strategies are doomed to fail. In this session, you will learn: Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Tuesday, August 23, 2022 / 03:30 PM - 04:15 PM PDT Ask the Expert: Ransomware Is Changing — Are You Ready?Paul Furtado, VP Analyst, Gartner Ransomware attacks have been morphing. Techniques used by the bad actors are changing. Come ask our experts how you can best protect, defend and respond to this threat Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Tuesday, August 23, 2022 / 03:30 PM - 04:15 PM PDT Ask the Expert: How to Keep Teams Safe and Motivated When in Constant Crisis ModeMary Mesaglio, Managing Vice President, Gartner It’s hard to be a leader right now. The world seems be lurching from crisis to crisis. There’s not time to adjust, let alone recover. This session is focused on the practical: tactics that leaders can use to keep their teams motivated, even as everyone is exhausted and the crises multiply. The emphasis is on what that attendees can immediately put into practice. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Tuesday, August 23, 2022 / 05:15 PM - 05:45 PM PDT Who Do You Want to Be Post-Crisis? Actions for LeadersMary Mesaglio, Managing Vice President, Gartner There is a lot of corporate soul searching going on right now. Some enterprises are doubling down on their values while others are adopting new ones. In all cases, values are inspiring and exciting, but not enough on their own to drive change. This session covers the values-to-action pyramid, walking through practical ways to turn values into everyday behaviors. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Wednesday, August 24, 2022 / 09:00 AM - 09:30 AM PDT Outlook for Identity and Access ManagementHenrique Teixeira, Sr Director Analyst, Gartner Identity and access management has reached a tipping point with the distribution of workforce and customer access. The decentralization of objects and assets demands a flexible and centralized response with a reliance on flexible orchestration, and policy enforcement which supports a low-friction, zero-trust approach. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Wednesday, August 24, 2022 / 09:00 AM - 09:30 AM PDT Protection From the Risk Within — Managing Insider RiskPaul Furtado, VP Analyst, Gartner One of the biggest risks to our security accesses our systems on a daily basis. This presentation will focus on providing guidance on building an effective insider risk program. We will discuss the tools, tactics and techniques to balance the needs of the business with user's privacy. Recommendations will also be made on how to present the program effectively to leadership and end users. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Wednesday, August 24, 2022 / 09:00 AM - 09:30 AM PDT Top Trends in PrivacyBernard Woo, Sr Director Analyst, Gartner Dive into five top trends in privacy and privacy tech. What are leading organizations focused on, what are the best capabilities to develop and what should you expect from your tech. We'll cover use cases, vendors and cost — enough to provide you with clear next steps to take to your teams. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Wednesday, August 24, 2022 / 09:00 AM - 09:30 AM PDT Outlook for Data SecurityRamon Krikken, Managing Vice President, Gartner This session covers current trends and emerging topics in the area of data security. From databases to cloud applications, threats are rapidly evolving and countermeasures slowly follow. Planning a data-centric roadmap for security governance and security architecture is a critical component of any security and risk management program. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Wednesday, August 24, 2022 / 09:00 AM - 10:30 AM PDT Workshop: Defining a Successful IAM ProgramRebecca Archambault, Sr Director Analyst, Gartner Brian Guthrie, Director Analyst, Gartner During this workshop IAM leaders will learn the importance, and what steps are required for the definition of a well-crafted IAM Program. The session will include exercises for creating your own IAM vision. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Wednesday, August 24, 2022 / 09:00 AM - 10:30 AM PDT Workshop: Turn Lessons Learned From Recent Supply Chain Attacks Into an Action PlanManuel Acosta, Sr Director, Advisory, Gartner Gartner experts have compiled the key learnings from recent supply chain attacks. We will examine both familiar and novel techniques the attackers used to carry out massive scale attacks and stay undetected for up to six months. Attendees will learn how to better identify and respond to these and similar exploits and take away an actionable plan for their own organization. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Wednesday, August 24, 2022 / 11:30 AM - 12:15 PM PDT Gartner Keynote: Stop Treating Security Like Magic and Security People Like WizardsTom Scholtz, Distinguished VP Analyst, Gartner Refocus corporate security initiatives and efforts — from a futile effort to prevent breaches to accepting the inevitability of breaches. We will define how to learn from normal accident theory to build a culture of resilience, capable of reducing or eliminating business impacts from security breaches. This culture is built on characteristics and disciplines which we will define in actionable terms. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Monday, August 22, 2022 / 11:00 AM - 12:30 PM PDT Workshop: How Best to Build and Execute an RFP for an IGA ProductDavid Collinson, Sr Director Analyst, Gartner Gautham Mudra, Sr Director Analyst, Gartner This workshop will help you by practically taking you through the stages of preparing for an RFP for an IGA product. Attendees will leave with a practical approach to a succesful RFP. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Monday, August 22, 2022 / 12:30 PM - 01:00 PM PDT Do Privileged Access Management Right: How to Build an Effective and Mature PAM ProgramFelix Gaehtgens, VP Analyst, Gartner Many organizations struggle with PAM after some small initial success, can't manage to get further. This session sheds light on: Why is PAM such a crucial piece of any security program? What are the common pitfalls? What should you do in the near, medium and long term? Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Monday, August 22, 2022 / 02:30 PM - 03:15 PM PDT Ask the Expert: How do I Automate all these Identity Governance and Administration tasks?Gautham Mudra, Sr Director Analyst, Gartner IGA is often used as a tool to automate various manual processes - up to and including the use of robots and AI. This session will give you an opportunity to ask questions around automation and IGA; Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Monday, August 22, 2022 / 04:00 PM - 04:30 PM PDT Practical Applications of Decentralized Identity and Verifiable ClaimsHoman Farahmand, VP Analyst, Gartner Decentralized identity and verifiable claims will disrupt IAM by enabling a shared trust model, protocol-based controls, and decentralized identity data exchange. In this session we discuss how organizations can leverage these technologies to drive efficiency in identity verification and data exchange for business processes in digital ecosystems. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Monday, August 22, 2022 / 04:00 PM - 04:45 PM PDT Ask the Expert: What are the Best Practices for Privileged Access Management?Felix Gaehtgens, VP Analyst, Gartner Privileged access is the prime cause of breaches, yet more people than ever require it for their work. Requirements for PAM are evolving quickly to include hybrid multicloud scenarios and machine identities. Bring your questions about trends, best practices to this session. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Tuesday, August 23, 2022 / 10:05 AM - 10:25 AM PDT Market Guide for Identity Governance and AdministrationRebecca Archambault, Sr Director Analyst, Gartner *This session is also featured on Theater 2, Exhibit Showcase. Identity and Access Management leaders should use this Market Guide to aid in making decisions about identity governance and administration products. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Tuesday, August 23, 2022 / 10:30 AM - 11:00 AM PDT Guidance for Privileged Access ManagementHoman Farahmand, VP Analyst, Gartner PAM is a complex cyber defense discipline that requires careful technical planning for coverage areas. In this session we discuss the basic and emerging controls architecture to drive a zero standing privilege model for multi-cloud and hybrid environments. This includes PAM best practices and what works practically, considering organizational challenges and tools limitations. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Tuesday, August 23, 2022 / 10:30 AM - 11:00 AM PDT What’s Next in Cloud Identity Risks? CIEM and BeyondHenrique Teixeira, Sr Director Analyst, Gartner Entitlement management used to be a manageable problem. However, with the explosion of many thousands of permissions per identity in cloud infrastructures, legacy IAM approaches are no longer sufficient. Join this session to learn what cloud infrastructure entitlement management means, and how can it help to mitigate identity risks in the cloud. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Tuesday, August 23, 2022 / 10:30 AM - 11:15 AM PDT Ask the Expert: Consent and preference management in a diverse privacy environmentBernard Woo, Sr Director Analyst, Gartner Privacy regulations are increasing including either data residency or data localization requirements. This session is an opportunity for you ask questions about managing customer consent and preferences in such a rapidly evolving environment. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Tuesday, August 23, 2022 / 12:00 PM - 12:30 PM PDT How to Choose and Deploy an Identity Governance and Administration (IGA) SolutionDavid Collinson, Sr Director Analyst, Gartner This session will help provide IAM leaders with best practice advice to both select and then deploy an IGA tool. Starting with what an IGA tool comprises of, and working methodically through the stages of the buying journey it will help IAM leaders select the right product for their organization. The second part of the presentation will then focus on how to succesfully deploy it. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Tuesday, August 23, 2022 / 03:30 PM - 04:00 PM PDT Insights from the Magic Quadrant and Critical Capabilities for Privileged Access ManagementFelix Gaehtgens, VP Analyst, Gartner Through a selection of relevant Gartner insights and complementary methodologies, we will provide insight into latest updates in the privileged access management market. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Wednesday, August 24, 2022 / 10:30 AM - 11:00 AM PDT Segregation of Duty Controls (That Most IGA Tools Have) Are Pretty Cool — So Why Limit Them Only to Finance?David Collinson, Sr Director Analyst, Gartner Whilst segregation of duty controls are key to preventing fraud, they can also be used very effectively in the
security arena. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Monday, August 22, 2022 / 10:30 AM - 10:50 AM PDT Magic Quadrant for Access Management 2022Brian Guthrie, Director Analyst, Gartner This session will present the Magic Quadrant and Critical Capabilities for Access Management market, 2022. This session will be repeated on Tuesday morning at 10:00am. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Monday, August 22, 2022 / 11:00 AM - 11:30 AM PDT The State of Access Management, 2022Erik Wahlstrom, Sr Director Analyst, Gartner Access Management technologies are enablers of Identity First security. What has been changing in the market, driving the need to account for new user constituencies, and new work models? How is access management technology continuing to evolve to meet these new challenges? We will talk about what is available today, and what kinds of things can you expect to take advantage of in the near future. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Monday, August 22, 2022 / 11:00 AM - 11:45 AM PDT Ask the Expert: What is Zero Trust?Ramon Krikken, Managing Vice President, Gartner Zero trust is an overloaded marketing term. What is really mean by "zero trust" and as an IAM leader, why should I care? Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Monday, August 22, 2022 / 12:30 PM - 01:00 PM PDT How to Mature Your Microsoft 365 Identity ManagementPaul Rabinovich, Sr Director Analyst, Gartner Implementing hybrid identity for Microsoft 365 and protecting employee, administrator and partner access can be daunting. This session will guide you through best practices for Microsoft 365 IAM. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Monday, August 22, 2022 / 02:30 PM - 03:00 PM PDT How to Choose an Access Management Solution: Using the MQ and BeyondHenrique Teixeira, Sr Director Analyst, Gartner Access management solutions are mature, rich with features and offer a broadened scope that overlaps with many adjacent areas. Learn how to better use the AM MQ and a five-step approach to select a long-lasting, cost-efficient AM solution. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Monday, August 22, 2022 / 04:00 PM - 04:30 PM PDT Best Practices for Improving Access ManagementDavid Chase, Sr Director Analyst, Gartner Access management is a key part of identity first security. Organizations need to optimize AM activities in the context of broader identity, security and business goals, for example as part of an identity first security, zero-trust or cloud first initiatives. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Monday, August 22, 2022 / 04:00 PM - 04:45 PM PDT Ask the Expert: Effective Identity Management for Microsoft 365Paul Rabinovich, Sr Director Analyst, Gartner Whether you are just starting on a Microsoft 365 deployment or have had one for some time, threats against your users continue to evolve. IAM controls in Microsoft 365 must adapt accordingly. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Tuesday, August 23, 2022 / 10:00 AM - 10:20 AM PDT Magic Quadrant for Access Management 2021 (Repeat)Brian Guthrie, Director Analyst, Gartner This session will present the Magic Quadrant and Critical Capabilities for Access Management market, 2022. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Tuesday, August 23, 2022 / 10:30 AM - 12:00 PM PDT Workshop: Selecting the Right Employee SSO Solution for Your Evolving OrganizationDavid Chase, Sr Director Analyst, Gartner Modern architectures and applications place additional demands on access management tools. This workshop will introduce access management evaluation criteria guidelines and discuss what features you should look for and what vendors to consider for your next employee access management solution. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Tuesday, August 23, 2022 / 02:00 PM - 02:30 PM PDT Top Practices for Strengthening Your CIAM StrategyHenrique Teixeira, Sr Director Analyst, Gartner What are companies doing for CIAM? How can you differentiate yourself from your competitors through a superior CIAM portal that your customers love? What are the main considerations, and how is privacy regulation impacting these decisions? We will discuss top practices around CIAM, how to take your CIAM initiative to the next level and how to plan for the best user experience to achieve your goals. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Tuesday, August 23, 2022 / 02:00 PM - 02:30 PM PDT Active Directory in Transition: Gartner Survey Results and AnalysisPaul Rabinovich, Sr Director Analyst, Gartner Gartner clients often ask if they can drop their Active Directory and migrate to a cloud-based identity service. Technology is already in place to support this journey, but do real-world Active Directory customers actually take it? In this session we will share the results of a Gartner survey about the future of Active Directory as seen by end-user organizations. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Tuesday, August 23, 2022 / 05:15 PM - 05:45 PM PDT Improve IAM Architecture by Embracing 10 Identity Fabric PrinciplesErik Wahlstrom, Sr Director Analyst, Gartner In a world where identity is the only perimeter, identity-first security has become an imperative. IAM must be deployed more cohesively as a composable, distributed, resilient identity fabric. Organizations should also apply IAM best practices to more of their applications and services and to the IAM infrastructure itself. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Wednesday, August 24, 2022 / 10:30 AM - 11:00 AM PDT Enabling Identity-First Security With Policy-Based AuthorizationHoman Farahmand, VP Analyst, Gartner Policy-based authorization has become a focal point for developing the next generation of identity-centric access controls. It includes both human and machine use cases supporting access to modern apps, computing units, data objects and underlying networks. In this session we discuss key use cases, policy management, and policy enforcement patterns to enhance security model of digital systems. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Wednesday, August 24, 2022 / 10:30 AM - 11:00 AM PDT Pre-recorded session: How to Architect CIAM and Select the Right VendorsNat Krishnan, Sr Director Analyst, Gartner Due to unforeseeable circumstances, Nat Krishnan is unable to travel to the conference. Mr. Krishnan delivered this session in May at the Gartner Identity & Access Management Summit in London, U.K., and the recording of his presentation will played on screen. As requirements for great CIAM become more sophisticated, best practices for architecting CIAM and selecting vendors are evolving. This session will focus on the broadening scope of CIAM deployment architecture, selection criteria and vendors you should consider for your short lists. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Monday, August 22, 2022 / 12:30 PM - 01:00 PM PDT State of User Authentication, 2022Paul Furtado, VP Analyst, Gartner User authentication is at the heart of account protection for both consumer and workforce use cases, but cutting through the noise about passwordless authentication, hardware tokens and biometric authentication can be difficult. This session separates hype from the reality, theoretical from possible, and provides context of how to think about and invest in new user authentication technologies. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Monday, August 22, 2022 / 02:30 PM - 03:15 PM PDT Ask the Expert: Which Modern Identity Protocols Should I Use? OAuth 2.0, OIDC, OPA, JWT or SCIM?Erik Wahlstrom, Sr Director Analyst, Gartner Application modernization and zero-trust strategies demand modern identity protocols. But what modern identity protocol should I use for my use-case? Bring your own questions to this session about the usage and deployment about modern identity protocols such as OAuth 2.0, OpenID Connect, OPA, JWT or SCIM? Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Tuesday, August 23, 2022 / 12:00 PM - 12:30 PM PDT Preventing ATO FraudBernard Woo, Sr Director Analyst, Gartner In this presentation, Gartner will address the prevalent new fraud threat that is keeping end user leaders awake at night. In this presentation we will explore an overview of ATO fraud, what the impact is to financial institutions and end users, and what action plan can be initiated to address this new issue Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Tuesday, August 23, 2022 / 12:00 PM - 12:30 PM PDT Your Next MFA Solution Will Be Cloud-Based. How Do You Pick the Best One?Paul Rabinovich, Sr Director Analyst, Gartner Everyone agrees that MFA is a must when it comes to protection against account takeover attacks, but MFA requirements evolve. In this session we will discuss results of Gartner's most recent solution comparison of capabilities of six leading cloud-based MFA vendors. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Tuesday, August 23, 2022 / 03:30 PM - 04:00 PM PDT Passwörterdämmerung Redux — Take 3 Steps Towards Passwordless AuthenticationPaul Rabinovich, Sr Director Analyst, Gartner The twilight of the passwords has long been foretold but is now, at last, upon us. Security and UX are key drivers for passwordless authentication. But how can IAM leaders choose among the many passwordless approaches? Which are the most effective? Where do novel methods add value? What is the role of FIDO2? How does passwordless authentication fit with zero trust, adaptive access and the identity fabric? How can you craft a cohesive strategy across multiple use cases? Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Tuesday, August 23, 2022 / 05:15 PM - 05:45 PM PDT How to Choose a User Authentication VendorPaul Rabinovich, Sr Director Analyst, Gartner With more than 300 vendors in the user authentication market, choosing one or more vendors to fit your needs across a variety of use cases for employees and customers can be fraught with difficulty. How can you identify the most effective authentication methods (with or without passwords)? Where can you find the ablest providers among the IAM marketverse? Do you need to look beyond the methods already available within your IAM infrastructure? Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Wednesday, August 24, 2022 / 10:30 AM - 11:00 AM PDT The Pitfalls of Implementing Multifactor AuthenticationDavid Chase, Sr Director Analyst, Gartner Multifactor authentication has become a priority for mitigating account takeover attacks. This breakout will discuss the top pitfalls organizations experience and how to avoid them. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Monday, August 22, 2022 / 10:30 AM - 10:50 AM PDT Hype Cycle for Digital Identity, 2022Felix Gaehtgens, VP Analyst, Gartner This Hype Cycle for identity and access management (IAM) emphasizes the maturation of innovations that deliver security, risk management and business value for customer and workforce IAM. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Monday, August 22, 2022 / 04:00 PM - 04:45 PM PDT Ask the Expert: Everything You Always Wanted to Know About CIEM, that You Can't Find on GoogleHenrique Teixeira, Sr Director Analyst, Gartner CIEM is a breakaway theme in IAM, leveraging identity analytics and AI to help mitigate cloud identity risks. As the number of vendors proliferate, and not a lot of success stories exist yet, it becomes hard to differentiate fact from fiction. Bring your own questions about CIEM, cloud identity, AI and analytics in IAM. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Tuesday, August 23, 2022 / 10:30 AM - 11:00 AM PDT The State of Artificial Intelligence in Security and Risk ManagementFelix Gaehtgens, VP Analyst, Gartner This session covers why everyone speaks about how artificial intelligence might solve security and risk management challenges, but struggle when asked to provide a concrete example. It will show examples of what we call AI today. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Tuesday, August 23, 2022 / 12:00 PM - 12:30 PM PDT Machine Identities, Secrets, Keys and Certificates — The Team, the Process and the ToolsErik Wahlstrom, Sr Director Analyst, Gartner In this session we will look at a best-of-breed verses all-in-one tooling discussions of the expanding portfolio of tools that manage our machine identities, secrets, keys and certificates. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Tuesday, August 23, 2022 / 02:00 PM - 02:30 PM PDT Schrödinger’s CAT — Using Continuous Adaptive Trust to Distinguish Between Users and AttackersDavid Chase, Sr Director Analyst, Gartner In quantum physics there is a famous thought experiment in which you don’t know if a cat is alive or dead until you open the box containing it. Similarly, you may not truly know – until it is too late – if the person accessing your systems is your employee or customer or an attacker. How does CAT let you resolve this with greater confidence than legacy MFA? How does CAT fit within zero trust and adaptive access approaches? Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Tuesday, August 23, 2022 / 03:30 PM - 04:00 PM PDT API Access Control 201: Architect a Modern API Access Control StrategyErik Wahlstrom, Sr Director Analyst, Gartner In this technical session we will establish an agile and composable identity fabric that supports API access control that consists of multiple types of identity tools and components that together enable encryption, authentication and authorization for your distributed APIs. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Wednesday, August 24, 2022 / 09:00 AM - 09:45 AM PDT Ask the Expert: How do I Manage my Machine Identities?Erik Wahlstrom, Sr Director Analyst, Gartner Organizations find themselves needing to manage and provide best practices for how to handle the machine identities for a growing number of workloads. Bring your own questions to this session on how to manage secrets, keys and certificates in a hybrid and multi cloud environment. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. What is the future of identity and access management?Identity & Access Management (IAM) tools
Importantly, IAM tools bring the benefit of the latest in data and analytics capabilities, automation and Artificial Intelligence (AI), helping organisations to shift from reactive to proactive risk management, and gain enhanced efficiencies via informed decision making.
What is the difference between IGA and IAM?Specifically, it notes, 'IGA differs from IAM in that it allows organizations to not only define and enforce IAM policy, but also connect IAM functions to meet audit and compliance requirements.
Is CyberArk an IAM tool?CyberArk
The IAM solution gets solid marks for capabilities, value, ease of deployment, and support. It's one of the best products on the market for adaptive access control.
What is the IAM framework?Identity and access management (IAM) is a framework of business processes, policies and technologies that facilitates the management of electronic or digital identities. With an IAM framework in place, information technology (IT) managers can control user access to critical information within their organizations.
|