gartner identity & access management summit 2018 · validating our strategy and ensuring ......

8
Gartner Identity & Access Management Summit 2018 5 – 6 March / London, UK gartner.com/eu/iam Gartner predicts: Through 2020, enterprises without an overarching IAM program will experience 50% more IAM project failures. #GartnerIAM Look inside for the full agenda helping you move your key initiatives forward

Upload: phungkien

Post on 21-Aug-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

Gartner Identity & Access Management Summit 20185 – 6 March / London, UKgartner.com/eu/iam

Gartner predicts:Through 2020, enterprises without an overarching

IAM program will experience 50% more IAM project failures.

#GartnerIAM

Look inside for the full agenda helping you move your key initiatives forward

Gartner Identity & Access Management Summit 2018#GartnerIAM2

Make IAM a key factor in digital business success

Transform Operations into OpportunityThe Identity and Access Management (IAM) industry has evolved to enable organizations to break free from the constraints of their previous IAM efforts and think about how IAM can help them innovate and drive business change.

Join us at the Gartner Identity & Access Management Summit 2018, 5 – 6 March, in London, UK, and ensure you deliver rapid time to value while striking the right balance between the need for agility, cost-effectiveness and control.

Over four tracks, gain in-depth guidance on how to align IAM with your CIO’s business goals, open doors to collaboration and improve user experience across the board. Join us to understand the future of IAM and how to make IAM a key factor in digital business success.

• Manage privileged access to reduce security risks and increase agility

• Plan for success with identity governance and administration

• Understand the various user authentication technologies and strategies

• Make the right access management and single sign-on choices

• Evaluate IAM from PaaS and IaaS providers

• Build or improve federated ID and access management efforts

• Take a new approach to establishing and sustaining trust in digital identities

Attend the Gartner Identity & Access Management Summit and learn to:

“ The Gartner IAM Summit sessions inspire us to set our IAM strategy for the next couple of years. Coming back every year is key in validating our strategy and ensuring we make the right adjustments.”

Security & Applications Manager

Visit gartner.com/eu/iam for updates and to register! 3

Embrace Change or Be Disrupted — IAM’s Future Role IaM is rapidly becoming a key differentiator in the enablement of innovative digital service. In response to this, a new generation of IaM leaders will emerge that understand and realize these benefi ts. how will the new generation think? What will it do? how will it evolve? and, how will this generation of leaders be affected by technology evolution in the years ahead?

Mark Diodati, David Anthony Mahdi and Earl Perkins

The IAM Magic Quadrants and Critical CapabilitiesThis session is an overview of the IaM-related Gartner Magic Quadrants and critical capabilities that have been published in the past year.

Felix Gaehtgens, John Girard and Gregg Kreizman

Redefi ning Trust for the Digital Era Trust is essential for the success of digital business. It must encompass all of the entities that participate in business moments, their relationships and their interactions and everything that brokers those relationships and interactions. This session looks at a new defi nition of trust and some approaches to enable trust in a decentralized, distributed and dynamic world of digital business. This session covers the following:

• What are the fundamental elements of digital trust and why are they important to digital business?

• How can you ensure that data and application code are trustworthy and trustable?

• What are the most effective ways of establishing and sustaining trust in the people and other entities you do (digital) business with?

Ant Allan & Felix Gaehtgens

Gartner keynotes

Guest keynote

Ant AllanResearch VP

Klaus SchweinsbergChairman, Centre for Strategy and Higher Leadership

Felix GaehtgensResearch Director

John GirardResearch VP

Gregg KreizmanResearch VP

David Anthony MahdiResearch Director

“ The Gartner IAM Summit gives something to all. Wherever you are in your IAM journey, Gartner never fails to provide you with best practice, key trends, future predictions and vendors that will help you address your challenges — attending is always a great experience and invaluable to me.” IAM Senior Project Leader

The End of Security — How to do Business in a World of Fake Facts, Cyber Threats and TerrorismWe live in times of uncertainty. The US military once coined for this environment the very term “VUca world”. The acronym stands for volatile, uncertain, complex and ambiguous. Since the beginning of the 21st century VUca needed to be re-interpreted: virtual, unbound, cybered and artifi cial. This new VUca world demands a new set of leadership virtues. companies have to be crystal clear about their aspiration, they need a higher degree of attention regarding new trends and technologies, they must be authentic and accurate in all respects and they have to train their management teams to become much more agile. For companies following these fi ve alphas, times of uncertainty bear more opportunities than threats.

Klaus Schweinsberg

Gartner Identity & Access Management Summit 2018#GartnerIAM4

07:30 – 19:30 Registration

08:15 – 09:00 Tutorial: Learn the Fundamentals of Identity Governance and Administration Brian Iverson Senior Executive Circle Breakfast: Technology and Market Overview for Unstructured Data Classification Marc-Antoine Meunier

09:15 – 10:00 Opening Keynote: Embrace Change or Be Disrupted – IAM’s Future Role Mark Diodati, David Anthony Mahdi and Earl Perkins

10:00 – 10:45 Guest Keynote:The End of Security – The Way to Do Business in a World of Cyber Threats Klaus Schweinsberg

10:45 – 11:15 Networking Break in the Solution Showcase

11:15 – 12:00 Gartner Keynote: The IAM Magic Quadrants and Critical Capabilities Felix Gaehtgens, John Girard and Gregg Kreizman

12:00 – 12:15 Chair’s Remarks Jonathan Care

12:15 – 13:30 Lunch Break in the Solution Showcase 12:30 – 13:15 Senior Executive Circle Lunch: When the Enemy Is Your Customer – Fighting First-Party Fraud Tricia Phillips

TRACKS A. Foundational Strategies in IAM B. Moving Your IAM Program Forward

C. Building IAM for the Future D. Security, Risk and Privacy Workshops Analyst-User Roundtables

13:30 – 14:15 Manage Privileged Access to Reduce Security Risks and Increase Agility Felix Gaehtgens

Evolve Your Identity Architecture to Be Smart, Modern and Agile Mary Ruddy

How RPA Is Changing IAM Requirements and Shaping the Future of IGA Homan Farahmand

Gartner Essentials: Top Cybersecurity Trends for 2018 Earl Perkins

13:45 – 15:15 Workshop: Experiences From Implementing Mobile Identity John Girard

13:30 – 14:30 Roundtable: Managing Workforce and Consumers With a Consolidated IAM Program Kevin K. Kampman

14:30 – 15:00 Solution Provider Sessions

15:00 – 15:30 Networking Break in the Solution Showcase15:15 – 16:15 Roundtable: Grandpa PKI Is Dancing Again – This Time With IoT Erik Wahlstrom

15:30 – 16:15 Strategies for Making the Right Access Management and Single Sign-On Choices Gregg Kreizman

Assessing the IAM Capabilities of IoT Platforms Mark Diodati

Take a New Approach to Establishing and Sustaining Trust in Digital Identities Ant Allan

State of the Threat Landscape, 2018 Pete Shoard

16:30 – 17:00 Solution Provider Sessions 16:30 – 18:00 Workshop: Jump-Start Development of Your Organization’s IAM Program Vision Kevin K. Kampman

17:15 – 18:00 What Security and IAM Leaders Need to Know About Blockchain David Mahdi and Jonathan Care

What Is the Role of AI in the Future of Authentication? Justin J. Taylor

Reduce Access Risk and Increase Usability With Machine Learning Mary Ruddy

Privacy Pressure: Tame the General Data Protection Regulation Before It Attacks You! Ayal Tirosh

18:00 – 20:00 Solution Showcase and Networking Reception

08:00 – 17:00 Registration 08:00 – 09:30 Workshop: How to Implement a Two-Layer Enterprise Role Management Framework Brian Iverson

08:15 – 09:00 What Good Looks Like: Office 365, Azure AD, Identity and the Hybrid CloudMark Diodati

Best Practices for IAM Reimplementations Mary Ruddy

Identity Proofing and Substantiation: the New Model for Increasing Trust Assurance Tricia Phillips

State of Security Monitoring and Analytics, 2018 Pete Shoard

08:15 – 09:15 Roundtable: How to Get IAM Policies Right Kevin K. Kampman

09:15 – 09:45 Solution Provider Sessions 09:15 – 10:15 Roundtable: MDM, EMM, and UEM–Are We Ready for a Single Console? John Girard

10:00 – 10:30 The Walking Dead: Lay Passwords to RestAnt Allan

Best Practices for Engaging With IAM Professional Services Firms Brian Iverson

How To Evaluate Cloud-Based IAM Services From Microsoft, Google, and Amazon Web Services Gregg Kreizman

How Crypto-Agility and Post-Quantum Cryptography Will Affect Security Projects Mark Horvath

10:15 – 11:45 Workshop: How to Select the Right SSO Solution for Your Hybrid Organization Mary Ruddy

10:30 – 11:00 Networking Break in the Solution Showcase10:45 – 11:45 Roundtable: Systematic Cryptographic Risks, Avoiding Surprises While Staying Agile Mark Horvath

11:00 – 11:45 Choosing the Right Consumer IAM Solution Gregg Kreizman

Amazon Web Services and Microsoft Azure: An Identity Capabilities Assessment Mark Diodati

Architecting Blockchain-Enabled Decentralized Identity Homan Farahmand

Aligning Security and Risk Management With the Bimodal Enterprise Jeremy D’Hoinne

12:00 – 12:30 Solution Provider Sessions

12:30 – 13:45 Lunch Break in the Solution Showcase 12:30 – 13:15 Senior Executive Circle Lunch: The Digital Security Organization Needed for IoT Innovation Earl Perkins

13:45 – 14:15 Successful Mobilization in a Digital World Requires Revamping Your IAM Strategy John Girard

Secure Privileged Access in an IaaS Environment Homan Farahmand

Don’t Treat Your Customer Like a Criminal: Build Trust Through Behavioral Analytics Tricia Phillips

Detecting Intruders Using Network Behavior Analytics Jeremy D’Hoinne

14:30 – 15:00 Case Study: How Statoil Is Taking IAM Matters Into Their Own HandsDeric Stroud

Master the Politics of IAM Program Management Kevin K. Kampman

Integrate Identity With Microservices-Based Applications Erik Wahlstrom

Why You Need to Consider Data Privacy When Building Your IoT Initiative David Anthony Mahdi

15:00 – 15:45 Networking Break in the Solution Showcase

15:45 – 16:30 Closing Keynote: Redefining Trust for the Digital Era Ant Allan and Felix Gaehtgens

Mon

day

5 M

ar

ch

201

8Tu

esda

y6

Ma

rc

h 2

018

Agenda at a glance

Analyst interactionAnalyst one-on-one meetings* complimentary consulting with a Gartner analyst of your choice

Analyst-user roundtable discussions* Moderated by Gartner analysts for exchanging ideas and best practices with your peers

Workshops* Small group sessions that drill down on specific topics with a how-to focus

* Space is limited and preregistration is required for these session types.

Agenda as of 1 March 2018 and subject to change

Visit gartner.com/eu/iam for updates and to register! 5

SolutionsSolution ShowcaseMeet with today’s leading and emerging IaM solution providers, all under one roof, and get the latest information and demonstrations on new products and services

Solution provider sessionsGet an inside view of current marketplace offerings from the solution providers that develop them and clients who deploy them

Face-to-face solution provider meetingsWalk away with actionable solutions from the vendors you’re most interested in

07:30 – 19:30 Registration

08:15 – 09:00 Tutorial: Learn the Fundamentals of Identity Governance and Administration Brian Iverson Senior Executive Circle Breakfast: Technology and Market Overview for Unstructured Data Classifi cation Marc-Antoine Meunier

09:15 – 10:00 Opening Keynote: Embrace Change or Be Disrupted – IAM’s Future Role Mark Diodati, David Anthony Mahdi and Earl Perkins

10:00 – 10:45 Guest Keynote:The End of Security – The Way to Do Business in a World of Cyber Threats Klaus Schweinsberg

10:45 – 11:15 Networking Break in the Solution Showcase

11:15 – 12:00 Gartner Keynote: The IAM Magic Quadrants and Critical Capabilities Felix Gaehtgens, John Girard and Gregg Kreizman

12:00 – 12:15 Chair’s Remarks Jonathan Care

12:15 – 13:30 Lunch Break in the Solution Showcase 12:30 – 13:15 Senior Executive Circle Lunch: When the Enemy Is Your Customer – Fighting First-Party Fraud Tricia Phillips

TRACKS A. Foundational Strategies in IAM B. Moving Your IAM Program Forward

C. Building IAM for the Future D. Security, Risk and Privacy Workshops Analyst-User Roundtables

13:30 – 14:15 Manage Privileged Access to Reduce Security Risks and Increase AgilityFelix Gaehtgens

Evolve Your Identity Architecture to Be Smart, Modern and Agile Mary Ruddy

How RPA Is Changing IAM Requirements and Shaping the Future of IGA Homan Farahmand

Gartner Essentials: Top Cybersecurity Trends for 2018 Earl Perkins

13:45 – 15:15 Workshop: Experiences From Implementing Mobile IdentityJohn Girard

13:30 – 14:30 Roundtable: Managing Workforce and Consumers With a Consolidated IAM Program Kevin K. Kampman

14:30 – 15:00 Solution Provider Sessions

15:00 – 15:30 Networking Break in the Solution Showcase15:15 – 16:15 Roundtable:Grandpa PKI Is Dancing Again – This Time With IoTErik Wahlstrom

15:30 – 16:15 Strategies for Making the Right Access Management and Single Sign-On ChoicesGregg Kreizman

Assessing the IAM Capabilities of IoT Platforms Mark Diodati

Take a New Approach to Establishing and Sustaining Trust in Digital IdentitiesAnt Allan

State of the Threat Landscape, 2018Pete Shoard

16:30 – 17:00 Solution Provider Sessions 16:30 – 18:00 Workshop: Jump-Start Development of Your Organization’s IAM Program VisionKevin K. Kampman

17:15 – 18:00 What Security and IAM Leaders Need to Know About BlockchainDavid Mahdi and Jonathan Care

What Is the Role of AI in the Future of Authentication?Justin J. Taylor

Reduce Access Risk and Increase Usability With Machine LearningMary Ruddy

Privacy Pressure: Tame the General Data Protection Regulation Before It Attacks You!Ayal Tirosh

18:00 – 20:00 Solution Showcase and Networking Reception

08:00 – 17:00 Registration 08:00 – 09:30 Workshop: How to Implement a Two-Layer Enterprise Role Management FrameworkBrian Iverson

08:15 – 09:00 What Good Looks Like: Offi ce 365, Azure AD, Identity and the Hybrid CloudMark Diodati

Best Practices for IAM ReimplementationsMary Ruddy

Identity Proofi ng and Substantiation: the New Model for Increasing Trust AssuranceTricia Phillips

State of Security Monitoring and Analytics, 2018Pete Shoard

08:15 – 09:15 Roundtable:How to Get IAM Policies RightKevin K. Kampman

09:15 – 09:45 Solution Provider Sessions 09:15 – 10:15 Roundtable: MDM, EMM, and UEM–Are We Ready for a Single Console? John Girard

10:00 – 10:30 The Walking Dead: Lay Passwords to RestAnt Allan

Best Practices for Engaging With IAM Professional Services FirmsBrian Iverson

How To Evaluate Cloud-Based IAM Services From Microsoft, Google, and Amazon Web ServicesGregg Kreizman

How Crypto-Agility and Post-Quantum Cryptography Will Affect Security ProjectsMark Horvath

10:15 – 11:45 Workshop: How to Select the Right SSO Solution for Your Hybrid OrganizationMary Ruddy

10:30 – 11:00 Networking Break in the Solution Showcase10:45 – 11:45 Roundtable:Systematic Cryptographic Risks, Avoiding Surprises While Staying AgileMark Horvath

11:00 – 11:45 Choosing the Right Consumer IAM SolutionGregg Kreizman

Amazon Web Services and Microsoft Azure: An Identity Capabilities AssessmentMark Diodati

Architecting Blockchain-Enabled Decentralized IdentityHoman Farahmand

Aligning Security and Risk Management With the Bimodal EnterpriseJeremy D’Hoinne

12:00 – 12:30 Solution Provider Sessions

12:30 – 13:45 Lunch Break in the Solution Showcase 12:30 – 13:15 Senior Executive Circle Lunch: The Digital Security Organization Needed for IoT Innovation Earl Perkins

13:45 – 14:15 Successful Mobilization in a Digital World Requires Revamping Your IAM StrategyJohn Girard

Secure Privileged Access in an IaaS EnvironmentHoman Farahmand

Don’t Treat Your Customer Like a Criminal: Build Trust Through Behavioral AnalyticsTricia Phillips

Detecting Intruders Using Network Behavior AnalyticsJeremy D’Hoinne

14:30 – 15:00 Case Study: How Statoil Is Taking IAM Matters Into Their Own HandsDeric Stroud

Master the Politics of IAM Program ManagementKevin K. Kampman

Integrate Identity With Microservices-Based ApplicationsErik Wahlstrom

Why You Need to Consider Data Privacy When Building Your IoT InitiativeDavid Anthony Mahdi

15:00 – 15:45 Networking Break in the Solution Showcase

15:45 – 16:30 Closing Keynote: Redefi ning Trust for the Digital Era Ant Allan and Felix Gaehtgens

Agenda tracks

A. Foundational Strategies in IAMEvery program needs a solid foundation. This track will provide the information you need to properly plan and organize your IaM program, create or restart an IaM strategy and ensure that processes and controls are implemented to gain real business benefi ts. We will provide time-proven and emerging best practices, with a focus on doing the simple and right things fi rst, and will help you avoid a number of pitfalls.

B. Moving Your IAM Program ForwardYou have IaM experience. You’ve established your IaM program and you have created the roadmap. It’s time to get busy on your projects and move forward. In this track, we will identify best practices, help you avoid pitfalls, and we will help with tools and service selection in dynamic IaM markets.

C. Building IAM for the Futureas organizations position themselves for the digital age, IaM programs are faced with new business demands and expectations. Business transparency, openness and IoT’s enablement at the edge are forcing IaM leaders to reimagine IaM and how they have been managing their programs. In this track, we explore how digital business will accelerate changes in IaM program management, technology delivery and scale to address changes in business.

D. Beyond the Checkbox: Security, Risk and PrivacyIt is now clear that, for digital business to succeed, security, risk, privacy and IaM must be aligned. There are process, organizational, functional and technology overlaps that should be considered so that you can maximize your investments and have a robust, multifaceted approach to IaM, infrastructure protection, and risk management, and privacy protection. In this track, we cover the security disciplines that align with IaM along with the most important security trends.

Alumni attendee prebooking opens on 22 January 2018

General attendee prebooking opens on 5 February 2018

When attending this event, please refer to the Gartner Events mobile app for the most up-to-date session and location information

Gartner Identity & Access Management Summit 2018#GartnerIAM6

Solution ShowcaseDevelop a “shortlist” of technology providers who can meet your particular needs. We offer you exclusive access to some of the world’s leading technology and service solution providers.

TM

CyberArk is the only security company focused on eliminating the most advanced cyber threats; those that use insider privileges to attack the heart of the enterprise. Dedicated to stopping attacks before they stop business, CyberArk proactively secures against cyber threats before attacks can escalate and do irreparable damage.www.cyberark.com

Brainwave GRC is a software vendor, leader in Identity Analytics, present in Europe and North America. The Brainwave Identity GRC solution enables organizations to mitigate their security risks and answer compliance requirements effortlessly by automating audit and control processes and providing in-depth analyses on access rights and user behaviors. www.brainwave.fr

Avecto is a leader in Privilege Elevation and Delegation Management and has enabled over 8 million users across many of the world’s biggest brands to successfully work without admin rights and achieve the balance between overlocked and underlocked environments. www.avecto.com

With over 50million logins a day, Auth0 provides authentication and a single-view of users across applications, business and social profiles, reducing overhead and risk, while improving user experience.www.auth0.com

Atos through its Evidian Suite enables companies to empower their identity and access management agility, enhance security and complies with regulations. Evidian IAM suite accelerates the Digital Transformation. www.evidian.com

OneLogin simplifies identity and access management (IAM) for a more efficient, secure enterprise, delivering an IAM platform in the cloud trusted by thousands of customers. www.onelogin.com

One Identity helps organizations get identity and access management (IAM) right. With a unique combination of offerings including a portfolio of identity governance, access management and privileged management, and identity as a service that help organizations reach their full potential, unimpeded by security yet safeguarded against threats. One Identity has proven to be a company unequalled in its commitment to its customers’ long-term IAM success. More than 7,500 customers worldwide depend on One Identity solutions to manage more than 125 million identities wherever it might reside. www.quest.com/one-identity

Entersekt is an innovator in push-based authentication and app security. The company’s one-of-a-kind approach harnesses the power of digital certificate technology with the convenience of mobile phones to provide financial services companies and their customers with full protection from online fraud. Built on open technologies for high availability, scalability, and simple integration, Entersekt’s patented security products protect millions of devices and transactions daily, while complying with the world’s most stringent regulatory guidelines. www.entersekt.com

Centrify redefines security from a static perimeter-based approach to protecting millions of scattered connections in a hybrid enterprise. As the only industry recognised leader in PIM and IDaaS, Centrify provides a single platform to secure each user’s access to apps and infrastructure through identity services. Centrify enables over 5,000 customers, including over half the Fortune 50, to defend their organizations. The Breach Stops Here.www.centrify.com

BeyondTrust is a global cyber security company providing privileged access management and vulnerability management solutions for UNIX, Linux, Windows and Mac OS operating systems. www.beyondtrust.com

Consumer and Workforce IAM delivered. Visit Pirean to discover more about 2016’s Security Innovation of the Year and 2017’s Cloud Security Product of the Year.

Our mission is to simplify how enterprises provide secure and seamless digital experiences. For the world’s largest organizations, we help prevent security breaches, increase employee and partner productivity and provide personalized customer experiences. Enterprises choose Ping for our identity expertise, open standards leadership, partnership with companies like Microsoft, Amazon and Google, and collaboration with customers like Boeing, Cisco, Disney, GE, Kraft Foods, Walgreens and over half of the Fortune 100. www.pingidentity.com

ForgeRock®, the leader in digital identity management, transforms how organizations build trusted relationships with people, services, and things. Monetise customer relationships, address stringent regulations for privacy and consent (GDPR, PSD2, Open Banking, etc), and leverage the internet of things with ForgeRock. We serve hundreds of brands, including Morningstar, Vodafone, Toyota, TomTom, and Pearson, as well as governments like Norway, Canada, and Belgium. www.forgerock.com

Consumers, citizens and employees increasingly expect anywhere-anytime experiences – whether making purchases, crossing borders, accessing e-gov services or logging onto corporate networks. They also expect the ecosystems that allow this flexibility to be entirely reliable and secure. Entrust Datacard offers trusted identity and secure transaction technologies that make these ecosystems possible.

Trusted by governments and enterprises worldwide, PrimeKey is leading PKI, digital signatures and applied cryptography vendor. Software and hardware designed for IoT scale of business.

As the market leader for identity virtualization, Radiant Logic delivers simple, logical and standards-based access to all identity within an organization. RadiantOne FID, our federated identity service based on virtualization, provides fully integrated, customizable identity views built from disparate data silos, driving critical authentication and authorization decisions for WAM, federation and cloud deployments. www.radiantlogic.com

Cybercriminals are growing in number and sophistication, rendering traditional perimeter solutions powerless against today’s advanced threats.IBM Security, with close to 8,000 dedicated professionals in more than 130 countries, delivers next-generation intelligent, integrated security technology and services to out-think cybercriminals, detect threats and respond quickly to breaches. We focus on the most critical needs of more than 10,000 clients: transforming security programs; optimizing and automating operations and incident response systems; and protecting their most critical and valuable information. www.ibm.com

More than 30,000 customers worldwide rely on RSA’s business-driven security™ strategy for identity and access management, threat detection and response, fraud prevention, and GRC.www.rsa.com

Gigya helps 700 leading businesses build trusted digital relationships with 1.3 billion consumers. With our customer identity and preference management solutions, businesses identify customers across devices, build rich, privacy-compliant customer profiles, and deliver better services, products and experiences by integrating customer identity data into marketing, sales and service applicationswww.gigya.com

SailPoint, the leader in enterprise identity management, brings the Power of Identity to customers around the world. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments. www.sailpoint.com

Premier

Platinum

Silver

Visit gartner.com/eu/iam for updates and to register! 77

Sponsorship opportunitiesFor further information about sponsoring this event:Telephone: +44 1784 267456Email: [email protected]

Exhibitor list as of 1 March 2018 and subject to change

Standard price: €2,700 + UK VaT

Public sector price: €2,125 + UK VaT

3 ways to register Web: gartner.com/eu/iam

Email: [email protected]

Phone: +44 20 8879 2430

Gartner clients a Gartner ticket covers all two days of the Summit. contact your account Manager or email [email protected] to register using a ticket.

Summit Venue

Gartner hotel room rateFrom £225 per night at Royal Lancaster LondonLancaster Terrace, London W2 2TY

Book your room at: gartner.com/eu/iam

Pricing & Registration

What’s IncludedIn addition to four tracks of the latest analyst research, your conference registration fee includes access to these special features:

• A Gartner analyst one-on-one meeting*

• Analyst-user roundtables*

• Hands-on workshops*

• Solution Showcase

• Networking lunches and receptions

• Agenda planning through Gartner Events Navigator* Online preregistration is required for one-on-ones, roundtables, meet-ups, Senior Executive Circle sessions and workshops. Reserve your place early, as space is limited.

Group Rate DiscountMaximize learning by participating together in relevant sessions or splitting up to cover more ground, sharing your session take-aways later.

Complimentary registrations

• 1 for every 3 paid registrations

• 2 for every 5 paid registrations

• 3 for every 7 paid registrations

For more information, email [email protected] or contact your Gartner account manager.

Bomgar’s secure access solutions enable organizations to protect critical systems whilst improving productivity, through providing quick and secure access to endpoints and managing privileged credentials. www.bomgar.com

Hitachi ID Systems delivers access governance and identity administration solutions to organizations globally, and are used to secure access to systems in the enterprise and in the cloud. www.hitachi-id.com

Micro Focus is the seventh largest pure-play software company in the world. We help customers innovate faster with lower risk. With Micro Focus’ security solutions organizations can secure applications and data, drive identity-centric controls and intelligence, and leverage powerful analytics to detect known and unknown threats. Find out more at www.microfocus.com/solutions/security/

Okta is the leading provider of identity for the enterprise. Okta Identity Cloud connects and protects employees of the world’s largest enterprises. It also securely connects enterprises to their partners, suppliers and customers. With deep integrations to over 5,000 apps, it enables simple and secure access from any device.www.okta.com

Since 2000, Omada has helped customers use identity to create measurable business value. Identity, managed the Omada way, simultaneously improves security, effi ciency, cost-control, and regulatory compliance across cloud and on-premises infrastructures. Built on Microsoft technology, our solutions deliver strong out-of-the-box functionality securing easy adoption, long term value, and optimized ROI. www.omada.net

Platinum

Silver

© 2017 Gartner, Inc. and/or its affiliates. all rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. For more information, email [email protected] or visit gartner.com.

Ant Allan Research VP

Managing identities, privileges, access and trust; Identity and access management program

Jonathan Care Research Director

Application and data security; Security and risk management; Security monitoring and operations; Managing identities, privileges, access and trust; Information security management program

Jeremy D’Hoinne Research VP

Network security (e.g., network and web application firewalls, IPS, sandboxing and network traffic analysis); Organizational challenges, such as security skills shortage or how security organizations adapt to bimodal IT

Marc-Antoine Meunier Research Director

Data classification, data access governance, data-centric audit and protection, and data masking

Tricia Phillips Research Director

Fraud prevention and management including: strategy, legacy fraud prevention tools and operations, emerging technology and services, design and implementation, chargeback management, and fraud analytics

Felix Gaehtgens Research Director

Managing identities, privileges, access, trust and governance

Brian Iverson Research Director

Identity governance and administration (IGA); Managing accounts and entitlements in distributed systems; Provisioning, access requests, role-based access control (RBAC) and access certification

John Girard VP, Distinguished Analyst

Earl Perkins Research VP

Business security and privacy solutions for wireless and mobile road warriors, extranet, remote offices and teleworkers

Digital security strategy and planning for operational technology (OT), Internet of Things (IoT); Governance and practice for the organization

Mark Diodati Research VP

Managing identities, privileges, access and trust; Cloud computing; Office 365, Google Apps for Work or other Cloud Office initiatives; Modernizing application architecture and infrastructure

Homan Farahmand Research Director

Identity governance and administration (IGA); API Gateway tools; Customer identity management; Blockchain and decentralized applications (Dapp)

Kevin Kampman Research Director

Developing IAM strategy, establishing programs, metrics and demonstrating success; Implementing role and policy management; Building IAM maturity

Gregg Kreizman Research VP

Single sign-on (SSO); Access management; Identity federation and standards; Identity as a Service, Consumer IAM

David Mahdi Research Director

Identity assurance, strategy and planning, X.509 certificate management, SSL, SSH and mobile; Hosted or on-premises PKI technology; IoT (Internet of Things); Blockchain, data security

Mary E. Ruddy Research VP

Single sign-on, identity federation, modern IAM architecture, API gateways, web access management (WAM) and consumer IAM

Pete Shoard Research Director

Analysis of managed security service providers (MSSPs) and security monitoring technologies such as SIEM and behavioral analytics (UEBA)

Erik Wahlstrom Research Director

Identity of Things for the Internet of Things; Public-key infrastructure (PKI); Identity federation (SAML, OAuth2, SCIM); Cloud directories; User authentication

Ayal Tirosh Senior Research Analyst

Strategies for application security and digital workplace security

Meet the Analysts

Gartner analyst one-on-one meetings, roundtables and workshops help you work through challenges and gain new ideas. Both are included in your registration, but space is limited, so book now and secure your place.

Terms and conditions To view our Gartner events terms and conditions, visit gartner.com/eu/iam