A look back at 2022's agenda
View By:
A look back at 2022's agenda
Monday, August 22, 2022 / 09:30 AM - 10:15 AM PDT
Gartner Opening Keynote: How to Digitally Accelerate When You’re So Freaking Tired
Mary Mesaglio, Managing Vice President, Gartner
It’s 2022 and we thought the long-awaited reopening was finally here. But then, wham. Omicron arrived on the scene. The pandemic sometimes seems like a never-ending story of dashed hopes. Yet, you don’t get to sit this one out. Businesses continue to transform, you must continue to lead your people, and the world doesn’t stop just because you’re tired. And we know you’re tired. This session covers how to continue your digital acceleration while keeping your people – and yourself – safe and whole. It’s a tightrope walk out there.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Monday, August 22, 2022 / 11:00 AM - 11:30 AM PDT
Top Cybersecurity Trends
Manuel Acosta, Sr Director, Advisory, Gartner
“Top trends” highlight shifts in the security ecosystem that aren't widely recognized, but are likely to have potential for disruption. This presentation will describe the significant trends in risk management and how organizations are taking advantage of these trends. Key issues include: Top technological improvements in the security product landscape; Trends in creating a top notch security organization; and long-term trends that will influence security strategy
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Monday, August 22, 2022 / 11:00 AM - 11:30 AM PDT
Best Practices in Communicating the Business Value of Cybersecurity
Tom Scholtz, Distinguished VP Analyst, Gartner
There are multiple approaches for communicating the business value of cybersecurity and none of them offer a single "best" way. All are relevant to different contexts. This presentation will discuss the characteristics of common approaches such as RO(S)I, price-performance analysis, outcome-driven approach, etc., and provide guidance on how to select the appropriate approach based on context.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Monday, August 22, 2022 / 11:00 AM - 11:30 AM PDT
Connect Business Value and Identity Management
Rebecca Archambault, Sr Director Analyst, Gartner
Leaders responsible for IAM generally focus on the technical benefits of an IAM solution rather than its impact on the organization's goals and objectives. They are not accustomed to recognizing and accommodating the influence IAM has on business outcomes or associating IAM with environmental, organization or social change. These skills are critical to an initiative with IAM's scope and breadth.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Monday, August 22, 2022 / 11:00 AM - 11:45 AM PDT
Ask the Expert: How Diversity, Equity and Inclusion Can Give Your IAM Program the Edge
Tobi Bet, Sr Director Analyst, Gartner
Improving diversity, equity and inclusion within IAM and security teams can go beyond moral arguments, into business cases built on better protection for your organization, and better talent and motivation for your team. Bring your questions to this session, and find out how to craft a DE&I strategy that can have positive impact to your business across multiple dimensions.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Monday, August 22, 2022 / 12:30 PM - 01:00 PM PDT
Address the Top Maturity Gaps in IAM Programs with Insights from Gartner's ITscore
Rebecca Archambault, Sr Director Analyst, Gartner
Security and Risk leaders struggle to achieve the desired level of maturity across certain key activities that are critical to a healthy IAM function. Failure to address these "top gaps" devalues IAM programs, and increases risk to the enterprise. This session will outline the top gaps IAM programs are experiencing, and provide guidance on how to improve maturity in these critical areas.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Monday, August 22, 2022 / 12:30 PM - 01:00 PM PDT
Outlook for Cloud Security
Patrick Hevesi, VP Analyst, Gartner
Information security is frequently cited as a top obstacle to the adoption of cloud computing, yet improved security is cited as a top driver for adoption of cloud computing. This session will explore the current and future state of cloud security spanning infrastructure, platform and software as a service offerings, including hybrid cloud security and emerging distributed cloud and edge computing security issues.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Monday, August 22, 2022 / 02:30 PM - 03:00 PM PDT
Cybersecurity Mesh Architecture 101
Felix Gaehtgens, VP Analyst, Gartner
With many IT assets now outside traditional enterprise perimeters, IT leaders must rethink security. Enter the cybersecurity mesh architecture, a composable and scalable approach to extend security controls to distributed assets by decoupling policy enforcement from the assets being protected.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Monday, August 22, 2022 / 02:30 PM - 03:00 PM PDT
Security Organization Dynamics
Tom Scholtz, Distinguished VP Analyst, Gartner
There is no such thing as a perfect model for security organizations. Every enterprise must develop its own model, taking into consideration basic principles, practical realities and the challenges of digital transformation. This session will address the following:
. What are the trends and challenges in security organization design?
. What are the factors that influence security organization?
. What are the current best practices
and conceptual design models for security organization?
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Monday, August 22, 2022 / 02:30 PM - 03:15 PM PDT
Ask the Expert: How to build your Cloud Security Strategy and Architecture
Patrick Hevesi, VP Analyst, Gartner
Come ask the expert any question on the acronym soup in Cloud Security - CASB, SSE, CSPM, CWPP, CNAPP, SASE, CSMA, CIEM and IAM. How the different products work, any questions on where to start and how to build your cloud security architecture.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Monday, August 22, 2022 / 04:00 PM - 04:30 PM PDT
How to Make a Great Decision, Every Time
Mary Mesaglio, Managing Vice President, Gartner
CIOs make critical decisions every day — decisions that impact the viability and success of the organization, and the quality of life of the people who work there. Make those decisions count by understanding how to frame and evaluate your options using proven frameworks for every type of decision.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Tuesday, August 23, 2022 / 10:30 AM - 11:00 AM PDT
Ransomware Is Changing — Are You Ready?
Paul Furtado, VP Analyst, Gartner
Ransomware attacks have been morphing. Techniques used by the bad actors are changing. During this presentation, we will provide insight into the new tactics being used by the bad actors not only to access your environment, but what they are doing with your data once exfiltrated. Finally, we will also provide current data on the financial impact of a ransomware attack.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Tuesday, August 23, 2022 / 10:30 AM - 11:00 AM PDT
Gain a Critical Advantage Over Cybercrimes Through Diversity, Equity and Inclusion
Tobi Bet, Sr Director Analyst, Gartner
Workplace and supplier diversity is at the forefront of organizations’ minds. Beyond the ethical and moral benefits, DEI can protect against an increasingly broad range of cyber attacks. We will discuss the business case for DEI, how to develop a one-page DEI strategy and how to grow your employee and supplier diverse base.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Tuesday, August 23, 2022 / 02:00 PM - 03:30 PM PDT
Workshop: Defining Meaningful Metrics for IAM
Rebecca Archambault, Sr Director Analyst, Gartner
Brian Guthrie, Director Analyst, Gartner
Knowing what metrics matter to your IAM stakeholders is critical to prioritizing, developing and monitoring IAM features. Metrics identify the success of individual projects and where attention and improvements must take place. To succeed, they must be terms the stakeholder recognizes and understand. They should also align with or influence other initiatives. Learn how to set proper expectations.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Tuesday, August 23, 2022 / 03:30 PM - 04:00 PM PDT
An IAM Program Is Critical to a Zero Trust Strategy
Ramon Krikken, Managing Vice President, Gartner
Solid IAM programs are crucial to zero trust strategies. Without IAM,
zero trust strategies are doomed to fail. In this session, you will learn:
- High-level zero trust strategy and its relation to IAM programs
- How zero trust and identity architectures fit together
- Practical zero trust technologies implementations and their impact on identity
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Tuesday, August 23, 2022 / 03:30 PM - 04:15 PM PDT
Ask the Expert: Ransomware Is Changing — Are You Ready?
Paul Furtado, VP Analyst, Gartner
Ransomware attacks have been morphing. Techniques used by the bad actors are changing. Come ask our experts how you can best protect, defend and respond to this threat
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Tuesday, August 23, 2022 / 03:30 PM - 04:15 PM PDT
Ask the Expert: How to Keep Teams Safe and Motivated When in Constant Crisis Mode
Mary Mesaglio, Managing Vice President, Gartner
It’s hard to be a leader right now. The world seems be lurching from crisis to crisis. There’s not time to adjust, let alone recover. This session is focused on the practical: tactics that leaders can use to keep their teams motivated, even as everyone is exhausted and the crises multiply. The emphasis is on what that attendees can immediately put into practice.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Tuesday, August 23, 2022 / 05:15 PM - 05:45 PM PDT
Who Do You Want to Be Post-Crisis? Actions for Leaders
Mary Mesaglio, Managing Vice President, Gartner
There is a lot of corporate soul searching going on right now. Some enterprises are doubling down on their values while others are adopting new ones. In all cases, values are inspiring and exciting, but not enough on their own to drive change. This session covers the values-to-action pyramid, walking through practical ways to turn values into everyday behaviors.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Wednesday, August 24, 2022 / 09:00 AM - 09:30 AM PDT
Outlook for Identity and Access Management
Henrique Teixeira, Sr Director Analyst, Gartner
Identity and access management has reached a tipping point with the distribution of workforce and customer access. The decentralization of objects and assets demands a flexible and centralized response with a reliance on flexible orchestration, and policy enforcement which supports a low-friction, zero-trust approach.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Wednesday, August 24, 2022 / 09:00 AM - 09:30 AM PDT
Protection From the Risk Within — Managing Insider Risk
Paul Furtado, VP Analyst, Gartner
One of the biggest risks to our security accesses our systems on a daily basis. This presentation will focus on providing guidance on building an effective insider risk program. We will discuss the tools, tactics and techniques to balance the needs of the business with user's privacy. Recommendations will also be made on how to present the program effectively to leadership and end users.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Wednesday, August 24, 2022 / 09:00 AM - 09:30 AM PDT
Top Trends in Privacy
Bernard Woo, Sr Director Analyst, Gartner
Dive into five top trends in privacy and privacy tech. What are leading organizations focused on, what are the best capabilities to develop and what should you expect from your tech. We'll cover use cases, vendors and cost — enough to provide you with clear next steps to take to your teams.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Wednesday, August 24, 2022 / 09:00 AM - 09:30 AM PDT
Outlook for Data Security
Ramon Krikken, Managing Vice President, Gartner
This session covers current trends and emerging topics in the area of data security. From databases to cloud applications, threats are rapidly evolving and countermeasures slowly follow. Planning a data-centric roadmap for security governance and security architecture is a critical component of any security and risk management program.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Wednesday, August 24, 2022 / 09:00 AM - 10:30 AM PDT
Workshop: Defining a Successful IAM Program
Rebecca Archambault, Sr Director Analyst, Gartner
Brian Guthrie, Director Analyst, Gartner
During this workshop IAM leaders will learn the importance, and what steps are required for the definition of a well-crafted IAM Program. The session will include exercises for creating your own IAM vision.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Wednesday, August 24, 2022 / 09:00 AM - 10:30 AM PDT
Workshop: Turn Lessons Learned From Recent Supply Chain Attacks Into an Action Plan
Manuel Acosta, Sr Director, Advisory, Gartner
Gartner experts have compiled the key learnings from recent supply chain attacks. We will examine both familiar and novel techniques the attackers used to carry out massive scale attacks and stay undetected for up to six months. Attendees will learn how to better identify and respond to these and similar exploits and take away an actionable plan for their own organization.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Wednesday, August 24, 2022 / 11:30 AM - 12:15 PM PDT
Gartner Keynote: Stop Treating Security Like Magic and Security People Like Wizards
Tom Scholtz, Distinguished VP Analyst, Gartner
Refocus corporate security initiatives and efforts — from a futile effort to prevent breaches to accepting the inevitability of breaches. We will define how to learn from normal accident theory to build a culture of resilience, capable of reducing or eliminating business impacts from security breaches. This culture is built on characteristics and disciplines which we will define in actionable terms.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Monday, August 22, 2022 / 11:00 AM - 12:30 PM PDT
Workshop: How Best to Build and Execute an RFP for an IGA Product
David Collinson, Sr Director Analyst, Gartner
Gautham Mudra, Sr Director Analyst, Gartner
This workshop will help you by practically taking you through the stages of preparing for an RFP for an IGA product. Attendees will leave with a practical approach to a succesful RFP.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Monday, August 22, 2022 / 12:30 PM - 01:00 PM PDT
Do Privileged Access Management Right: How to Build an Effective and Mature PAM Program
Felix Gaehtgens, VP Analyst, Gartner
Many organizations struggle with PAM after some small initial success, can't manage to get further. This session sheds light on: Why is PAM such a crucial piece of any security program? What are the common pitfalls? What should you do in the near, medium and long term?
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Monday, August 22, 2022 / 02:30 PM - 03:15 PM PDT
Ask the Expert: How do I Automate all these Identity Governance and Administration tasks?
Gautham Mudra, Sr Director Analyst, Gartner
IGA is often used as a tool to automate various manual processes - up to and including the use of robots and AI. This session will give you an opportunity to ask questions around automation and IGA;
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Monday, August 22, 2022 / 04:00 PM - 04:30 PM PDT
Practical Applications of Decentralized Identity and Verifiable Claims
Homan Farahmand, VP Analyst, Gartner
Decentralized identity and verifiable claims will disrupt IAM by enabling a shared trust model, protocol-based controls, and decentralized identity data exchange. In this session we discuss how organizations can leverage these technologies to drive efficiency in identity verification and data exchange for business processes in digital ecosystems.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Monday, August 22, 2022 / 04:00 PM - 04:45 PM PDT
Ask the Expert: What are the Best Practices for Privileged Access Management?
Felix Gaehtgens, VP Analyst, Gartner
Privileged access is the prime cause of breaches, yet more people than ever require it for their work. Requirements for PAM are evolving quickly to include hybrid multicloud scenarios and machine identities. Bring your questions about trends, best practices to this session.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Tuesday, August 23, 2022 / 10:05 AM - 10:25 AM PDT
Market Guide for Identity Governance and Administration
Rebecca Archambault, Sr Director Analyst, Gartner
*This session is also featured on Theater 2, Exhibit Showcase.
Identity and Access Management leaders should use this Market Guide to aid in making decisions about identity governance and administration products.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Tuesday, August 23, 2022 / 10:30 AM - 11:00 AM PDT
Guidance for Privileged Access Management
Homan Farahmand, VP Analyst, Gartner
PAM is a complex cyber defense discipline that requires careful technical planning for coverage areas. In this session we discuss the basic and emerging controls architecture to drive a zero standing privilege model for multi-cloud and hybrid environments. This includes PAM best practices and what works practically, considering organizational challenges and tools limitations.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Tuesday, August 23, 2022 / 10:30 AM - 11:00 AM PDT
What’s Next in Cloud Identity Risks? CIEM and Beyond
Henrique Teixeira, Sr Director Analyst, Gartner
Entitlement management used to be a manageable problem. However, with the explosion of many thousands of permissions per identity in cloud infrastructures, legacy IAM approaches are no longer sufficient. Join this session to learn what cloud infrastructure entitlement management means, and how can it help to mitigate identity risks in the cloud.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Tuesday, August 23, 2022 / 10:30 AM - 11:15 AM PDT
Ask the Expert: Consent and preference management in a diverse privacy environment
Bernard Woo, Sr Director Analyst, Gartner
Privacy regulations are increasing including either data residency or data localization requirements. This session is an opportunity for you ask questions about managing customer consent and preferences in such a rapidly evolving environment.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Tuesday, August 23, 2022 / 12:00 PM - 12:30 PM PDT
How to Choose and Deploy an Identity Governance and Administration (IGA) Solution
David Collinson, Sr Director Analyst, Gartner
This session will help provide IAM leaders with best practice advice to both select and then deploy an IGA tool. Starting with what an IGA tool comprises of, and working methodically through the stages of the buying journey it will help IAM leaders select the right product for their organization. The second part of the presentation will then focus on how to succesfully deploy it.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Tuesday, August 23, 2022 / 03:30 PM - 04:00 PM PDT
Insights from the Magic Quadrant and Critical Capabilities for Privileged Access Management
Felix Gaehtgens, VP Analyst, Gartner
Through a selection of relevant Gartner insights and complementary methodologies, we will provide insight into latest updates in the privileged access management market.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Wednesday, August 24, 2022 / 10:30 AM - 11:00 AM PDT
Segregation of Duty Controls (That Most IGA Tools Have) Are Pretty Cool — So Why Limit Them Only to Finance?
David Collinson, Sr Director Analyst, Gartner
Whilst segregation of duty controls are key to preventing fraud, they can also be used very effectively in the
security arena.
This session will explore the changing scope and supporting technologies to prevent toxic combinations impacting your organization financially and also from a security perspective.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Monday, August 22, 2022 / 10:30 AM - 10:50 AM PDT
Magic Quadrant for Access Management 2022
Brian Guthrie, Director Analyst, Gartner
This session will present the Magic Quadrant and Critical Capabilities for Access Management market, 2022. This session will be repeated on Tuesday morning at 10:00am.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Monday, August 22, 2022 / 11:00 AM - 11:30 AM PDT
The State of Access Management, 2022
Erik Wahlstrom, Sr Director Analyst, Gartner
Access Management technologies are enablers of Identity First security. What has been changing in the market, driving the need to account for new user constituencies, and new work models? How is access management technology continuing to evolve to meet these new challenges? We will talk about what is available today, and what kinds of things can you expect to take advantage of in the near future.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Monday, August 22, 2022 / 11:00 AM - 11:45 AM PDT
Ask the Expert: What is Zero Trust?
Ramon Krikken, Managing Vice President, Gartner
Zero trust is an overloaded marketing term. What is really mean by "zero trust" and as an IAM leader, why should I care?
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Monday, August 22, 2022 / 12:30 PM - 01:00 PM PDT
How to Mature Your Microsoft 365 Identity Management
Paul Rabinovich, Sr Director Analyst, Gartner
Implementing hybrid identity for Microsoft 365 and protecting employee, administrator and partner access can be daunting. This session will guide you through best practices for Microsoft 365 IAM.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Monday, August 22, 2022 / 02:30 PM - 03:00 PM PDT
How to Choose an Access Management Solution: Using the MQ and Beyond
Henrique Teixeira, Sr Director Analyst, Gartner
Access management solutions are mature, rich with features and offer a broadened scope that overlaps with many adjacent areas. Learn how to better use the AM MQ and a five-step approach to select a long-lasting, cost-efficient AM solution.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Monday, August 22, 2022 / 04:00 PM - 04:30 PM PDT
Best Practices for Improving Access Management
David Chase, Sr Director Analyst, Gartner
Access management is a key part of identity first security. Organizations need to optimize AM activities in the context of broader identity, security and business goals, for example as part of an identity first security, zero-trust or cloud first initiatives.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Monday, August 22, 2022 / 04:00 PM - 04:45 PM PDT
Ask the Expert: Effective Identity Management for Microsoft 365
Paul Rabinovich, Sr Director Analyst, Gartner
Whether you are just starting on a Microsoft 365 deployment or have had one for some time, threats against your users continue to evolve. IAM controls in Microsoft 365 must adapt accordingly.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Tuesday, August 23, 2022 / 10:00 AM - 10:20 AM PDT
Magic Quadrant for Access Management 2021 (Repeat)
Brian Guthrie, Director Analyst, Gartner
This session will present the Magic Quadrant and Critical Capabilities for Access Management market, 2022.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Tuesday, August 23, 2022 / 10:30 AM - 12:00 PM PDT
Workshop: Selecting the Right Employee SSO Solution for Your Evolving Organization
David Chase, Sr Director Analyst, Gartner
Modern architectures and applications place additional demands on access management tools. This workshop will introduce access management evaluation criteria guidelines and discuss what features you should look for and what vendors to consider for your next employee access management solution.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Tuesday, August 23, 2022 / 02:00 PM - 02:30 PM PDT
Top Practices for Strengthening Your CIAM Strategy
Henrique Teixeira, Sr Director Analyst, Gartner
What are companies doing for CIAM? How can you differentiate yourself from your competitors through a superior CIAM portal that your customers love? What are the main considerations, and how is privacy regulation impacting these decisions? We will discuss top practices around CIAM, how to take your CIAM initiative to the next level and how to plan for the best user experience to achieve your goals.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Tuesday, August 23, 2022 / 02:00 PM - 02:30 PM PDT
Active Directory in Transition: Gartner Survey Results and Analysis
Paul Rabinovich, Sr Director Analyst, Gartner
Gartner clients often ask if they can drop their Active Directory and migrate to a cloud-based identity service. Technology is already in place to support this journey, but do real-world Active Directory customers actually take it? In this session we will share the results of a Gartner survey about the future of Active Directory as seen by end-user organizations.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Tuesday, August 23, 2022 / 05:15 PM - 05:45 PM PDT
Improve IAM Architecture by Embracing 10 Identity Fabric Principles
Erik Wahlstrom, Sr Director Analyst, Gartner
In a world where identity is the only perimeter, identity-first security has become an imperative. IAM must be deployed more cohesively as a composable, distributed, resilient identity fabric. Organizations should also apply IAM best practices to more of their applications and services and to the IAM infrastructure itself.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Wednesday, August 24, 2022 / 10:30 AM - 11:00 AM PDT
Enabling Identity-First Security With Policy-Based Authorization
Homan Farahmand, VP Analyst, Gartner
Policy-based authorization has become a focal point for developing the next generation of identity-centric access controls. It includes both human and machine use cases supporting access to modern apps, computing units, data objects and underlying networks. In this session we discuss key use cases, policy management, and policy enforcement patterns to enhance security model of digital systems.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Wednesday, August 24, 2022 / 10:30 AM - 11:00 AM PDT
Pre-recorded session: How to Architect CIAM and Select the Right Vendors
Nat Krishnan, Sr Director Analyst, Gartner
Due to unforeseeable circumstances, Nat Krishnan is unable to travel to the conference. Mr. Krishnan delivered this session in May at the Gartner Identity & Access Management Summit in London, U.K., and the recording of his presentation will played on screen.
As requirements for great CIAM become more sophisticated, best practices for architecting CIAM and selecting vendors are evolving. This session will focus on the broadening scope of CIAM deployment architecture, selection criteria and vendors you should consider for your short lists.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Monday, August 22, 2022 / 12:30 PM - 01:00 PM PDT
State of User Authentication, 2022
Paul Furtado, VP Analyst, Gartner
User authentication is at the heart of account protection for both consumer and workforce use cases, but cutting through the noise about passwordless authentication, hardware tokens and biometric authentication can be difficult. This session separates hype from the reality, theoretical from possible, and provides context of how to think about and invest in new user authentication technologies.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Monday, August 22, 2022 / 02:30 PM - 03:15 PM PDT
Ask the Expert: Which Modern Identity Protocols Should I Use? OAuth 2.0, OIDC, OPA, JWT or SCIM?
Erik Wahlstrom, Sr Director Analyst, Gartner
Application modernization and zero-trust strategies demand modern identity protocols. But what modern identity protocol should I use for my use-case? Bring your own questions to this session about the usage and deployment about modern identity protocols such as OAuth 2.0, OpenID Connect, OPA, JWT or SCIM?
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Tuesday, August 23, 2022 / 12:00 PM - 12:30 PM PDT
Preventing ATO Fraud
Bernard Woo, Sr Director Analyst, Gartner
In this presentation, Gartner will address the prevalent new fraud threat that is keeping end user leaders awake at night. In this presentation we will explore an overview of ATO fraud, what the impact is to financial institutions and end users, and what action plan can be initiated to address this new issue
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Tuesday, August 23, 2022 / 12:00 PM - 12:30 PM PDT
Your Next MFA Solution Will Be Cloud-Based. How Do You Pick the Best One?
Paul Rabinovich, Sr Director Analyst, Gartner
Everyone agrees that MFA is a must when it comes to protection against account takeover attacks, but MFA requirements evolve. In this session we will discuss results of Gartner's most recent solution comparison of capabilities of six leading cloud-based MFA vendors.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Tuesday, August 23, 2022 / 03:30 PM - 04:00 PM PDT
Passwörterdämmerung Redux — Take 3 Steps Towards Passwordless Authentication
Paul Rabinovich, Sr Director Analyst, Gartner
The twilight of the passwords has long been foretold but is now, at last, upon us. Security and UX are key drivers for passwordless authentication. But how can IAM leaders choose among the many passwordless approaches? Which are the most effective? Where do novel methods add value? What is the role of FIDO2? How does passwordless authentication fit with zero trust, adaptive access and the identity fabric? How can you craft a cohesive strategy across multiple use cases?
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Tuesday, August 23, 2022 / 05:15 PM - 05:45 PM PDT
How to Choose a User Authentication Vendor
Paul Rabinovich, Sr Director Analyst, Gartner
With more than 300 vendors in the user authentication market, choosing one or more vendors to fit your needs across a variety of use cases for employees and customers can be fraught with difficulty. How can you identify the most effective authentication methods (with or without passwords)? Where can you find the ablest providers among the IAM marketverse? Do you need to look beyond the methods already available within your IAM infrastructure?
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Wednesday, August 24, 2022 / 10:30 AM - 11:00 AM PDT
The Pitfalls of Implementing Multifactor Authentication
David Chase, Sr Director Analyst, Gartner
Multifactor authentication has become a priority for mitigating account takeover attacks. This breakout will discuss the top pitfalls organizations experience and how to avoid them.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Monday, August 22, 2022 / 10:30 AM - 10:50 AM PDT
Hype Cycle for Digital Identity, 2022
Felix Gaehtgens, VP Analyst, Gartner
This Hype Cycle for identity and access management (IAM) emphasizes the maturation of innovations that deliver security, risk management and business value for customer and workforce IAM.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Monday, August 22, 2022 / 04:00 PM - 04:45 PM PDT
Ask the Expert: Everything You Always Wanted to Know About CIEM, that You Can't Find on Google
Henrique Teixeira, Sr Director Analyst, Gartner
CIEM is a breakaway theme in IAM, leveraging identity analytics and AI to help mitigate cloud identity risks. As the number of vendors proliferate, and not a lot of success stories exist yet, it becomes hard to differentiate fact from fiction. Bring your own questions about CIEM, cloud identity, AI and analytics in IAM.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Tuesday, August 23, 2022 / 10:30 AM - 11:00 AM PDT
The State of Artificial Intelligence in Security and Risk Management
Felix Gaehtgens, VP Analyst, Gartner
This session covers why everyone speaks about how artificial intelligence might solve security and risk management challenges, but struggle when asked to provide a concrete example. It will show examples of what we call AI today.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Tuesday, August 23, 2022 / 12:00 PM - 12:30 PM PDT
Machine Identities, Secrets, Keys and Certificates — The Team, the Process and the Tools
Erik Wahlstrom, Sr Director Analyst, Gartner
In this session we will look at a best-of-breed verses all-in-one tooling discussions of the expanding portfolio of tools that manage our machine identities, secrets, keys and certificates.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Tuesday, August 23, 2022 / 02:00 PM - 02:30 PM PDT
Schrödinger’s CAT — Using Continuous Adaptive Trust to Distinguish Between Users and Attackers
David Chase, Sr Director Analyst, Gartner
In quantum physics there is a famous thought experiment in which you don’t know if a cat is alive or dead until you open the box containing it. Similarly, you may not truly know – until it is too late – if the person accessing your systems is your employee or customer or an attacker. How does CAT let you resolve this with greater confidence than legacy MFA? How does CAT fit within zero trust and adaptive access approaches?
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Tuesday, August 23, 2022 / 03:30 PM - 04:00 PM PDT
API Access Control 201: Architect a Modern API Access Control Strategy
Erik Wahlstrom, Sr Director Analyst, Gartner
In this technical session we will establish an agile and composable identity fabric that supports API access control that consists of multiple types of identity tools and components that together enable encryption, authentication and authorization for your distributed APIs.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.
Wednesday, August 24, 2022 / 09:00 AM - 09:45 AM PDT
Ask the Expert: How do I Manage my Machine Identities?
Erik Wahlstrom, Sr Director Analyst, Gartner
Organizations find themselves needing to manage and provide best practices for how to handle the machine identities for a growing number of workloads. Bring your own questions to this session on how to manage secrets, keys and certificates in a hybrid and multi cloud environment.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.