Identity and Access Management Conferences

Drive digital transformation for your organization

For many enterprises, the rapidly evolving global environment has compressed years-long strategic change into months, even weeks. For others, it has forced them to adopt approaches that they'd previously been cautious about. Whatever the time scale and trajectory of business today, IAM leaders will need to plan for continual change for their organizations.

This disruption, along with continued digital transformation and technical change, is raising the visibility of IAM professionals and creating new challenges for IAM architecture. The economy now relies on IAM systems.

Our conferences give IAM professionals the opportunity to hear from independent experts who can help you craft your strategy for agile, intelligent and automated identity access management that the business can trust to enable rapid change and digital transformation.

Gartner Identity & Access Management Summit

4 – 5 March 2024 | London, U.K.
9 – 10 December 2024 | Grapevine, TX

Gartner Identity & Access Management Summit US 2023 key take-aways

Your role as an IAM or IT leader has never been more important. In addition to responding to change, you have the opportunity to drive change. You can strengthen the trust in your organization by developing solutions to deliver improved agility and business outcomes.

From learning best practices in track sessions, to connecting with peers and experts during interactive experiences, take a look at some key take-aways from our 2023 conference in Grapevine, Texas to see the type of content and networking you can expect in 2024.

Gartner Identity & Access Management Summit

总理今天的聚会IAM leaders offering strategic guidance on rapidly evolving IAM strategies and technologies.
What will be covered in 2023?

Discover what matters most now and how to prepare for what’s ahead. Explore our 2023 conference tracks:

A: Access Management
B: Cybersecurity, Leadership and Strategy
C: Identity Governance and Administration
D: Privileged Access Management
E: User Authentication and Identity Proofing

Spotlight Tracks:

  • Technical Insights
  • Zero Trust
  • Future of IAM
  • Digital Identity
  • Cloud Enablement
Who should attend

Explore how we help you address your top challenges

IAM (Identity & Access Management) for C-level leaders
Enhance agility and responsiveness with your business while guiding the transition of IAM from cost centre to business enablement.

IAM leaders
Learn about the priorities of IAM leaders looking to deliver the effective IAM system the business can trust to enable rapid change and digital transformation.

Architects and technical professionals
Modernize architecture and identity infrastructure strategies to respond to digital business imperatives of agility and scalability.

In addition to focused, useful, on-point presentations, which gave me tips and insights I can implement immediately, I gained new ways to deliver visuals and points that will help me be more persuasive in my organization.

Greg Handrick

Information Security, IAM Leader, Country Financial

Gartner identity and access management conferences give IAM professionals unbiased advice to drive digital business transformation.

Our team of Gartner experts conducts thousands of interactions every year with IAM leaders like you. They use this knowledge to help you address your biggest challenges in areas such as IAM program management, digital identity theft protection, hybrid and multicloud IAM, identity management, governance and administration, security and privacy, and more. Take a deep dive into the technologies and best practices that will help you to drive digital transformation for your organization.

Get thought-leading guidance and practical tools on how to:
  • Gather best practices for a successful cloud migration and digital transformation
  • Understand IAM trends and emerging technologies in the bigger context of data security, risk and business
  • Learn how your IAM program can improve experiences, enhance collaboration, connect new partners to enable rapid change and innovation, advancing MFA (multifactor authentication and fraud detection), including cloud options
  • Learn to make your IAM program more agile and deliver quicker results and continuous improvements
  • Learn about next-generation IAM technologies, architecture and implementation best practices
  • Determine the right requirements for PAM, IGA and identity management solutions

Find content aligned to your roles below

Reinvent the Role of the IAM Leader

Create and implement IAM strategies and policies that ensure the right access to the right people. Articulate the IAM vision, and create a roadmap for successful implementation and coordination of the various processes and technologies involved.

Implement IT security technologies efficiently and effectively

维护我系统的实现ing vendor updates and maintaining policy and workflow configurations. Architect IAM solutions to deliver the right capabilities aligned with the organizations security, cost and business objectives.

Lead your IAM programs in the digital transformation

Learn how to structure and communicate a vision and strategy that corresponds to organizational needs and expectations. Align IAM initiatives with the organization's security, applications, data, and digital business strategies.

Gartner Terms of Use and Privacy Policy.

"> Please check your inbox to confirm your subscription and add the domain @gartner.com to your safe sender list to ensure receipt of future email.

" class="eloqua-text"> Please add the domain @gartner.com to your safe sender list to ensure receipt of future email.

" class="optin-text">

Three key planning considerations for IAM Leaders

Many identity and access management (IAM) trends are not new, but a rapidly shifting environment has accelerated transformation in ways that are greatly impacting IAM teams and plans. The ongoing disruption also highlighted areas of weakness in organizations’ IAM architectures. The sheer number of IAM tools and options have added an additional layer of challenges for data security and risk teams. IAM leaders need to rethink their roadmaps for the future, starting with three key planning considerations.

虽然我的团队处理continued move to cloud, an increase in devices, shifts in IT management and other changes, a massive shift to remote work accelerated these emerging concepts. The traditional enterprise perimeter has all but disappeared, and while secure remote access to on-site and cloud applications exists, many organizations lack all the necessary IAM controls. Remote access increases the attack surface, requiring additional access control management. When a rapid, global shift in the approach to work drove sudden changes to IAM implementations, it revealed that many IAM processes were too rigid and not agile enough to respond quickly to the new environment.

The need to digitalize experiences and interactions has increased, which means IAM teams need to focus more on external users like customers, citizens, patients, residents, students and vendors. How organizations — and therefore IAM teams — must support customers has shifted rapidly. Digital customer interactions not only must be secure and easy to use, they also must enable a broader range of contactless experiences and integrate with more “back office" IAM systems. An example might be enabling travelers to arrive at a hotel, perform digital identity validation, register and gain entrance to their room without interacting with another person. With the increase in remote work, more organizations also need to provide remote employees, gig workers and contractors — some of whom will never come into any office — a way to perform the required level of customer identity proofing.

机器的数量,是否应用程序服务ices, agents or devices interacting with organizations is increasing. Each of these interactions, regardless of their nonhuman status, must be secured and credentials must be managed and maintained. Although organizations require an enterprisewide IAM strategy for handling this challenge, existing organizational barriers and lack of the necessary skills and tools makes this virtually impossible. Development, DevOps, security, IAM and I&O teams have different needs and preferences for tools and processes. Often, IAM teams no longer make identity decisions. Instead, the decisions are increasingly made by other teams.

Not finding what you’re looking for?
Experience Gartner conferences.

Gartner provides world-class conferences across six core business areas to help you master your role, transform your business and tap into an unsurpassed peer network. Gartner conferences bring together forward-thinking leaders like you to explore emerging trends, accelerate your learning and guide near-term decisions.