Gartner Identity & Access Management Summit

4 – 5 March 2024 | London, U.K.

Identity-First Security:
Simplify. Enable. Protect.

In a world where the traditional corporate network perimeter has become obsolete — the identity infrastructure has become the new battleground for bad actors. Identity and access management (IAM) models that rely on legacy approaches to manage identities of users and machines across growing lists of applications and environments have become complex and ill-equipped to adapt to changing needs of business and technological advancements. Security leaders must evolve their IAM toward an identity-first approach that puts identity-based controls at the heart of your organization’s protection architecture to enhance its cybersecurity posture, while delivering digital transformation and business value.

Join a community of experts and IAM leaders at Gartner Identity & Access Management Summit and participate in interactive and collaborative sessions, share experiences and access the latest research to equip you with a detailed plan that helps bring your organization into the identity-first era.

Hear from past attendees on why this conference is a must-attend for IAM leaders. 

Gain critical insights to sustain effective IAM programs to provide the right access to the right people — and identify the leading providers of IAM products and services to benefit the organization.
 
  • Align with business expectations to get buy-in and continued support for IAM programs and policies. 
  • Measure and communicate the value of the IAM program and move from cost center to revenue generation. 
  • Integrate IAM initiatives with established business processes and policies that affect customers and workforce. 
  • Understand the fast-evolving IAM technologies and vendors, and cut through the hype of AI, blockchain and the Internet of Things (IoT) to leverage the right solutions. 
  • Manage the complexity and specific risks associated with cloud migration and cloud-based IAM solutions. 
  • Find efficiencies by automating processes.

Engineer IAM solutions to deliver capabilities aligned with the organization’s security, cost and business objectives.

  • Understand the business requirements and outcomes to implement the most effective technologies, standards and best practices. 
  • Leverage better cloud capabilities and manage complexity created by cloud. 
  • Architect solutions for new, more dynamic environments: agile, DevOps, containers, microservices, stateless architectures, APIs. 
  • Stay up to speed on new technology: AI/analytics, robotic process automation (RPA), blockchain. 
  • Manage technical integration with broader applications.

Understand new tech and market trends impacting IAM to guide overall strategy for investments in technology, resources and programs.

  • Obtain funding, and assess and justify the value and cost of IAM programs. 
  • Adapt IAM strategy to broader digital transformation. 
  • Align IAM initiatives with the organization’s security, applications, data and digital business strategies. 
  • Enable the business to be more agile, responsive and customer-driven. 
  • Cut through the hype around AI, RPA, IoT and blockchain to make the right investment decisions. 
  • Ensure protection against increasing threats, privacy and compliance regulations.
  • Guide transition of IAM from cost center to business enablement.

Network with experts and peers

At Gartner Identity & Access Management Summit, attendees have the opportunity to connect with Gartner experts and industry-leading IAM professionals, IAM architects and engineers and security professionals. Exchange ideas and experiences with others in similar roles or from similar organizations. 

Build new relationships, broaden your perspectives and uncover ways to solve problems alongside other IAM leaders. When you engage with like-minded peers, you'll find opportunities to share your ideas and experiences.

Highlights:

  • Roundtables.* Join your IAM executive peers from leading organizations and various industries to discuss relevant topics inspired by the latest research in these small-group sessions, moderated by a Gartner expert.  
  • End-user case studies. Detailed and documented case studies, by Gartner invitation, reveal lessons from your peers during their own organization’s implementations.
  • Peer conversations. Join peer-to-peer discussions organically throughout the conference. With more than 1,200 attendees consisting of IAM and security leaders, discover how others are tackling the challenges you face every day.  

*Preregistration is required. These sessions are available to end-users only; space is limited.

Prioritize what to accelerate, unlock resources for digital investments, make meaningful cultural changes and so much more. No matter where you are on your digital business acceleration journey, we’re here to help you get to your destination faster — with confidence.

Lean back and listen
Expect the best speakers, brightest minds and the latest big ideas. These sessions provide the inspiration and actionable insight to transform your most critical priorities into business results.

Highlights

  • Guest speakers. Hear firsthand experience from guest keynote speakers and guest speakers.
  • Gartner Magic Quadrant™ sessions. Explore Gartner Magic Quadrant™  sessions for Privileged Access Management, Access Management and more.
  • Solution Provider sessions. When you’re looking to address a specific issue, these strategic roadmap presentations and user-case studies provide real-world insight. 

Lean in and engage
Facilitated by Gartner experts, these sessions challenge you to solve problems together, exchange viewpoints and get to the core of the business imperatives that drive you and your peers.

Highlights

  • Workshops.* Small-scale and interactive — Collaborate with peers by taking the most important topics and learning how to apply them to your business.
  • Contract Negotiation Clinics.* Negotiation is an art. At the conference, learn how to negotiate the best contracts for your organization, regardless of vendor size.
  • Diversity, equity and inclusion. Track sessions and interactive experiences focus on issues relevant to diverse identities, including LGBTQ and neurodiversity, as well as corporate sustainability, equity and inclusion.

*Preregistration is required. These sessions are available to end users only. 

Our unbiased Gartner experts help you advance your most critical priorities through industry-leading insights, guidance and tools. Tap their unique expertise to make faster, smarter decisions. 

Gartner one-on-one meetings.* Meet one-on-one with Gartner experts for tailored advice to help you achieve your most critical priorities. These popular meetings offer you the undivided attention of a Gartner expert who will listen and guide you on the matters most critical to your success.

Ask the Expert sessions.* Topic-driven sessions provide a more intimate discussion forum, featuring one Gartner expert and end-user peers posing questions.

*Preregistration is required. These sessions are available to end users only; space is limited.

Conventional approaches to IAM are struggling to keep up with ever-evolving security threats. Come to Gartner Identity & Access Management Summit to learn how to simplify your architecture, protect your environment and enable business value through an Identity-first security strategy.

David Collinson

Senior Director Analyst, Gartner

Want to stay informed?

Get conference email updates.
Contact Information

All fields are required.

  • Step 2 of 2

    Tracks at a Glance

    Access more than 50 sessions of the latest Gartner research specifically designed to help IAM leaders meet the demands of the future. Each track has a particular area of focus to help you deliver on what matters most to you and your organization.

    Track A

    Identity Governance and Administration

    Get more information on ways to improve your IGA initiative, by learning best practices, and innovations, such as IAM convergence, autonomous and predictive governance, powered by AI/machine learning (ML) and identity analytics.

    View Sessions
    Track B

    Privileged Access Management

    Nearly every significant cyber breach during the past five years has been due to a failure to control privileged access. Find out why privileged access management (PAM) principles are one of the most significant security approaches for enterprises.

    View Sessions
    Track C

    Access Management

    Increased dependence on identities for anytime access requires access management (AM) to be more reliable and resistant to attacks. Explore how AM capabilities such as authorization, API access control and single sign-on have matured to support digital transformation.

    View Sessions
    Track D

    User Authentication and Identity Verification

    In a world of increased risks, organizations must embrace the confluence of identity verification and user authentication with advanced analytics. This track helps you understand how to establish trust and mitigate the risks of account takeover with modern toolsets.

    View Sessions
    Track E

    IAM Program Management

    A well-governed IAM program will enhance your security posture while delivering digital transformation. Get the information to plan, build, run and govern IAM programs, by aligning IAM to business goals, implementing identity tools and operationalizing IAM initiatives.

    View Sessions
    Spotlight Track

    Cybersecurity, Leadership and Strategy

    A successful cybersecurity strategy depends on an integrated IAM program, balancing technology investments, as well as structural and human-centric elements. Understand the role of IAM in in enhancing your security posture without impacting digital transformation.

    View Sessions
    Spotlight Track

    Technical Insights

    This spotlight track offers deeper technical, research-backed best practices tailored to help architects, analysts, engineers, consultants, technologists or general IAM professionals looking for additional inspiration to implement the right architectures, solutions and processes.

    View Sessions

    Ready to register?

    Secure your space now.