Gartner Identity & Access Management Summit 2018

Page created by Sidney Sanders
 
CONTINUE READING
Gartner Identity & Access Management Summit 2018
Look
       inside for the full agenda helping
   you move your key initiatives forward

Gartner
Identity
& Access
Management
Summit 2018
5 – 6 March / London, UK
gartner.com/eu/iam

                                                 Gartner predicts:
                                             Through 2020, enterprises
                                              without an overarching
                                                 IAM program will
                                               experience 50% more
                                               IAM project failures.

                                                   #GartnerIAM
Gartner Identity & Access Management Summit 2018
“The Gartner IAM Summit sessions
                                                                    inspire us to set our IAM strategy
                                                                    for the next couple of years.
                                                                    Coming back every year is key in
                                                                    validating our strategy and ensuring
                                                                    we make the right adjustments.”
                                                                    Security & Applications Manager

    Make IAM a key factor in
    digital business success
    Transform Operations into Opportunity
    The Identity and Access Management (IAM) industry has evolved to enable organizations
    to break free from the constraints of their previous IAM efforts and think about how IAM
    can help them innovate and drive business change.

    Join us at the Gartner Identity & Access Management Summit 2018, 5 – 6 March, in
    London, UK, and ensure you deliver rapid time to value while striking the right balance
    between the need for agility, cost-effectiveness and control.

    Over four tracks, gain in-depth guidance on how to align IAM with your CIO’s business
    goals, open doors to collaboration and improve user experience across the board.
    Join us to understand the future of IAM and how to make IAM a key factor in digital
    business success.

    Attend the           • Manage privileged access to reduce security risks and increase agility
    Gartner Identity
                         • Plan for success with identity governance and administration
    & Access
    Management           • Understand the various user authentication technologies and strategies
    Summit and
                         • Make the right access management and single sign-on choices
    learn to:
                         • Evaluate IAM from PaaS and IaaS providers
                         • Build or improve federated ID and access management efforts
                         • Take a new approach to establishing and sustaining trust in digital identities

2          #GartnerIAM                                          Gartner Identity & Access Management Summit 2018
Gartner Identity & Access Management Summit 2018
Guest keynote
              Klaus Schweinsberg           The End of Security — How to do Business in a World of Fake Facts,
              Chairman, Centre for         Cyber Threats and Terrorism
              Strategy and Higher          We live in times of uncertainty. The US military once coined for this environment the very
              Leadership                   term “VUca world”. The acronym stands for volatile, uncertain, complex and ambiguous.
                                           Since the beginning of the 21st century VUca needed to be re-interpreted: virtual,
                                           unbound, cybered and artificial. This new VUca world demands a new set of leadership
                                           virtues. companies have to be crystal clear about their aspiration, they need a higher
                                           degree of attention regarding new trends and technologies, they must be authentic and
                                           accurate in all respects and they have to train their management teams to become much
                                           more agile. For companies following these five alphas, times of uncertainty bear more
                                           opportunities than threats.
                                           Klaus Schweinsberg

Gartner keynotes
                                           Embrace Change or Be Disrupted — IAM’s Future Role
              Ant Allan                    IaM is rapidly becoming a key differentiator in the enablement of innovative digital service.
              Research VP                  In response to this, a new generation of IaM leaders will emerge that understand and
                                           realize these benefits. how will the new generation think? What will it do? how will it
                                           evolve? and, how will this generation of leaders be affected by technology evolution in the
                                           years ahead?
                                           Mark Diodati, David Anthony Mahdi and Earl Perkins
              Felix Gaehtgens
              Research Director
                                           The IAM Magic Quadrants and Critical Capabilities
                                           This session is an overview of the IaM-related Gartner Magic Quadrants and critical
                                           capabilities that have been published in the past year.
                                           Felix Gaehtgens, John Girard and Gregg Kreizman
              John Girard
              Research VP
                                           Redefining Trust for the Digital Era
                                           Trust is essential for the success of digital business. It must encompass all of the entities
                                           that participate in business moments, their relationships and their interactions and
                                           everything that brokers those relationships and interactions. This session looks at a new
              Gregg Kreizman               definition of trust and some approaches to enable trust in a decentralized, distributed and
              Research VP                  dynamic world of digital business. This session covers the following:
                                           • What are the fundamental elements of digital trust and why are they important to digital
                                             business?
                                           • How can you ensure that data and application code are trustworthy and trustable?
              David Anthony Mahdi          • What are the most effective ways of establishing and sustaining trust in the people and
              Research Director              other entities you do (digital) business with?
                                           Ant Allan & Felix Gaehtgens

                                                                “The Gartner IAM Summit gives something to all.
                                                                 Wherever you are in your IAM journey, Gartner
                                                                 never fails to provide you with best practice, key
                                                                 trends, future predictions and vendors that will
                                                                 help you address your challenges — attending is
                                                                 always a great experience and invaluable to me.”
                                                                IAM Senior Project Leader

Visit gartner.com/eu/iam for updates and to register!                                                                                  3
Gartner Identity & Access Management Summit 2018
Agenda at a glance                                                                                                                        Agenda as of 1 March 2018 and subject to change

                         07:30 – 19:30   Registration
Monday
          5 March 2018

                         08:15 – 09:00   Tutorial: Learn the Fundamentals of Identity Governance and Administration Brian Iverson   Senior Executive Circle Breakfast: Technology and Market Overview for Unstructured

                         09:15 – 10:00   Opening Keynote: Embrace Change or Be Disrupted – IAM’s Future Role Mark Diodati, David Anthony Mahdi and Earl Perkins

                         10:00 – 10:45   Guest Keynote:The End of Security – The Way to Do Business in a World of Cyber Threats Klaus Schweinsberg

                         10:45 – 11:15   Networking Break in the Solution Showcase

                         11:15 – 12:00   Gartner Keynote: The IAM Magic Quadrants and Critical Capabilities Felix Gaehtgens, John Girard and Gregg Kreizman

                         12:00 – 12:15   Chair’s Remarks Jonathan Care

                         12:15 – 13:30   Lunch Break in the Solution Showcase                                                       12:30 – 13:15 Senior Executive Circle Lunch: When the Enemy Is Your Customer – Fi

                         TRACKS          A. Foundational Strategies in IAM            B. Moving Your IAM Program                    C. Building IAM for the Future                 D. Security, Risk and Privacy
                                                                                         Forward
                         13:30 – 14:15   Manage Privileged Access to Reduce           Evolve Your Identity Architecture to Be Smart, How RPA Is Changing IAM Requirements and Gartner Essentials: Top Cybersecurity Trends
                                         Security Risks and Increase Agility          Modern and Agile                               Shaping the Future of IGA                for 2018
                                         Felix Gaehtgens                              Mary Ruddy                                     Homan Farahmand                          Earl Perkins
                         14:30 – 15:00   Solution Provider Sessions

                         15:00 – 15:30   Networking Break in the Solution Showcase

                         15:30 – 16:15   Strategies for Making the Right Access       Assessing the IAM Capabilities of IoT         Take a New Approach to Establishing and        State of the Threat Landscape, 2018
                                         Management and Single Sign-On Choices        Platforms                                     Sustaining Trust in Digital Identities         Pete Shoard
                                         Gregg Kreizman                               Mark Diodati                                  Ant Allan

                         16:30 – 17:00   Solution Provider Sessions

                         17:15 – 18:00   What Security and IAM Leaders Need to        What Is the Role of AI in the Future of       Reduce Access Risk and Increase Usability      Privacy Pressure: Tame the General Data
                                         Know About Blockchain                        Authentication?                               With Machine Learning                          Protection Regulation Before It Attacks You!
                                         David Mahdi and Jonathan Care                Justin J. Taylor                              Mary Ruddy                                     Ayal Tirosh

                         18:00 – 20:00   Solution Showcase and Networking Reception

                         08:00 – 17:00   Registration
Tuesday
          6 March 2018

                         08:15 – 09:00   What Good Looks Like: Office 365, Azure AD, Best Practices for IAM Reimplementations       Identity Proofing and Substantiation: the New State of Security Monitoring and Analytics,
                                         Identity and the Hybrid Cloud               Mary Ruddy                                     Model for Increasing Trust Assurance          2018
                                         Mark Diodati                                                                               Tricia Phillips                               Pete Shoard
                         09:15 – 09:45   Solution Provider Sessions

                         10:00 – 10:30   The Walking Dead: Lay Passwords to Rest      Best Practices for Engaging With IAM          How To Evaluate Cloud-Based IAM Services       How Crypto-Agility and Post-Quantum
                                         Ant Allan                                    Professional Services Firms                   From Microsoft, Google, and Amazon Web         Cryptography Will Affect Security Projects
                                                                                      Brian Iverson                                 Services                                       Mark Horvath
                                                                                                                                    Gregg Kreizman
                         10:30 – 11:00   Networking Break in the Solution Showcase

                         11:00 – 11:45   Choosing the Right Consumer IAM Solution     Amazon Web Services and Microsoft Azure:      Architecting Blockchain-Enabled                Aligning Security and Risk Management With
                                         Gregg Kreizman                               An Identity Capabilities Assessment           Decentralized Identity                         the Bimodal Enterprise
                                                                                      Mark Diodati                                  Homan Farahmand                                Jeremy D’Hoinne

                         12:00 – 12:30   Solution Provider Sessions

                         12:30 – 13:45   Lunch Break in the Solution Showcase                                                       12:30 – 13:15 Senior Executive Circle Lunch: The Digital Security Organization Need

                         13:45 – 14:15   Successful Mobilization in a Digital World   Secure Privileged Access in an IaaS           Don’t Treat Your Customer Like a Criminal:     Detecting Intruders Using Network Behavior
                                         Requires Revamping Your IAM Strategy         Environment                                   Build Trust Through Behavioral Analytics       Analytics
                                         John Girard                                  Homan Farahmand                               Tricia Phillips                                Jeremy D’Hoinne

                         14:30 – 15:00   Case Study: How Statoil Is Taking IAM        Master the Politics of IAM Program            Integrate Identity With Microservices-Based    Why You Need to Consider Data Privacy
                                         Matters Into Their Own Hands                 Management                                    Applications                                   When Building Your IoT Initiative
                                         Deric Stroud                                 Kevin K. Kampman                              Erik Wahlstrom                                 David Anthony Mahdi

                         15:00 – 15:45   Networking Break in the Solution Showcase

                         15:45 – 16:30   Closing Keynote: Redefining Trust for the Digital Era Ant Allan and Felix Gaehtgens

Analyst interaction
                  Analyst one-on-one meetings*                                        Analyst-user roundtable                                               Workshops*
                  Complimentary consulting with a                                     discussions*                                                          Small group sessions that drill
                  Gartner analyst of your choice                                      Moderated by Gartner analysts                                         down on specific topics with a
                                                                                      for exchanging ideas and best                                         how-to focus
                                                                                      practices with your peers                                 * Space is limited and preregistration is required for
                                                                                                                                                   these session types.

4                                 #GartnerIAM                                                                                   Gartner Identity & Access Management Summit 2018
When attending this event, please refer to the Gartner Events
                         mobile app for the most up-to-date session and location information
                                                                                                                 Agenda tracks
                                                                                                                 A. Foundational Strategies in IAM
                                                                                                                 Every program needs a solid foundation. This track will
 Data Classification Marc-Antoine Meunier
                                                                                                                 provide the information you need to properly plan and
                                                                                                                 organize your IaM program, create or restart an IaM
                                                                                                                 strategy and ensure that processes and controls are
                                                                                                                 implemented to gain real business benefits. We will provide
                                                                                                                 time-proven and emerging best practices, with a focus on
                                                                                                                 doing the simple and right things first, and will help you
                                                                                                                 avoid a number of pitfalls.
ighting First-Party Fraud Tricia Phillips

  Workshops                                           Analyst-User Roundtables                                   B. Moving Your IAM Program Forward
                                                                                                                 You have IaM experience. You’ve established your IaM
                                                      13:30 – 14:30 Roundtable:
                                                                                                                 program and you have created the roadmap. It’s time to
  13:45 – 15:15 Workshop:                             Managing Workforce and Consumers With a                    get busy on your projects and move forward. In this track,
  Experiences From Implementing Mobile Identity       Consolidated IAM Program Kevin K. Kampman
  John Girard                                                                                                    we will identify best practices, help you avoid pitfalls, and
                                                                                                                 we will help with tools and service selection in dynamic
                                                                                                                 IaM markets.
                                                      15:15 – 16:15 Roundtable:
                                                      Grandpa PKI Is Dancing Again – This Time With IoT
                                                      Erik Wahlstrom                                             C. Building IAM for the Future
                                                                                                                 as organizations position themselves for the digital age,
  16:30 – 18:00 Workshop:                                                                                        IaM programs are faced with new business demands and
  Jump-Start Development of Your Organization’s IAM                                                              expectations. Business transparency, openness and IoT’s
  Program Vision
                                                                                                                 enablement at the edge are forcing IaM leaders to
  Kevin K. Kampman
                                                                                                                 reimagine IaM and how they have been managing their
                                                                                                                 programs. In this track, we explore how digital business
                                                                                                                 will accelerate changes in IaM program management,
                                                                                                                 technology delivery and scale to address changes
  08:00 – 09:30 Workshop:                                                                                        in business.
  How to Implement a Two-Layer Enterprise Role
                                                      08:15 – 09:15 Roundtable:
  Management Framework
                                                      How to Get IAM Policies Right                              D. Beyond the Checkbox: Security, Risk and Privacy
  Brian Iverson
                                                      Kevin K. Kampman                                           It is now clear that, for digital business to succeed,
                                                      09:15 – 10:15 Roundtable:                                  security, risk, privacy and IaM must be aligned. There are
                                                      MDM, EMM, and UEM–Are We Ready for a Single                process, organizational, functional and technology
  10:15 – 11:45 Workshop:                             Console?
                                                      John Girard                                                overlaps that should be considered so that you can
  How to Select the Right SSO Solution for Your
  Hybrid Organization                                                                                            maximize your investments and have a robust,
  Mary Ruddy                                                                                                     multifaceted approach to IaM, infrastructure protection,
                                                      10:45 – 11:45 Roundtable:                                  and risk management, and privacy protection. In this track,
                                                      Systematic Cryptographic Risks, Avoiding Surprises         we cover the security disciplines that align with IaM along
                                                      While Staying Agile
                                                      Mark Horvath
                                                                                                                 with the most important security trends.

ded for IoT Innovation    Earl Perkins

                                                                                                                    Alumni attendee            General attendee
                                                                                                                    prebooking opens on        prebooking opens on
                                                                                                                    22 January 2018            5 February 2018

              Solutions
                         Solution Showcase                                                  Solution provider sessions                    Face-to-face solution provider
                         Meet with today’s leading and                                      Get an inside view of current                 meetings
                         emerging IaM solution providers, all                               marketplace offerings from the                Walk away with actionable
                         under one roof, and get the latest                                 solution providers that develop               solutions from the vendors you’re
                         information and demonstrations on                                  them and clients who deploy them              most interested in
                         new products and services

              Visit gartner.com/eu/iam for updates and to register!                                                                                                           5
Solution Showcase
Develop a “shortlist” of technology providers who can meet your particular needs. We offer you exclusive access to
some of the world’s leading technology and service solution providers.

Premier

CyberArk is the only security company focused on             Entersekt is an innovator in push-based authentication     ForgeRock®, the leader in digital identity                 Cybercriminals are growing in number and
eliminating the most advanced cyber threats; those           and app security. The company’s one-of-a-kind              management, transforms how organizations build             sophistication, rendering traditional perimeter solutions
that use insider privileges to attack the heart of the       approach harnesses the power of digital certificate        trusted relationships with people, services, and things.   powerless against today’s advanced threats.IBM
enterprise. Dedicated to stopping attacks before             technology with the convenience of mobile phones           Monetise customer relationships, address stringent         Security, with close to 8,000 dedicated professionals
they stop business, CyberArk proactively secures             to provide financial services companies and their          regulations for privacy and consent (GDPR, PSD2,           in more than 130 countries, delivers next-generation
against cyber threats before attacks can escalate            customers with full protection from online fraud. Built    Open Banking, etc), and leverage the internet of           intelligent, integrated security technology and services
and do irreparable damage.                                   on open technologies for high availability, scalability,   things with ForgeRock. We serve hundreds of brands,        to out-think cybercriminals, detect threats and respond
www.cyberark.com                                             and simple integration, Entersekt’s patented security      including Morningstar, Vodafone, Toyota, TomTom,           quickly to breaches. We focus on the most critical needs
                                                             products protect millions of devices and transactions      and Pearson, as well as governments like Norway,           of more than 10,000 clients: transforming security
                                                             daily, while complying with the world’s most stringent     Canada, and Belgium. www.forgerock.com                     programs; optimizing and automating operations and
                                                             regulatory guidelines. www.entersekt.com                                                                              incident response systems; and protecting their most
                                                                                                                                                                                   critical and valuable information. www.ibm.com

                                                                                                                                                           TM

One Identity helps organizations get identity and            Our mission is to simplify how enterprises provide         As the market leader for identity virtualization,          SailPoint, the leader in enterprise identity
access management (IAM) right. With a unique                 secure and seamless digital experiences. For the           Radiant Logic delivers simple, logical and standards-      management, brings the Power of Identity to
combination of offerings including a portfolio of identity   world’s largest organizations, we help prevent             based access to all identity within an organization.       customers around the world. As both an industry
governance, access management and privileged                 security breaches, increase employee and partner           RadiantOne FID, our federated identity service             pioneer and market leader in identity governance,
management, and identity as a service that help              productivity and provide personalized customer             based on virtualization, provides fully integrated,        SailPoint delivers security, operational efficiency
organizations reach their full potential, unimpeded          experiences. Enterprises choose Ping for our identity      customizable identity views built from disparate           and compliance to enterprises with complex IT
by security yet safeguarded against threats. One             expertise, open standards leadership, partnership          data silos, driving critical authentication and            environments. www.sailpoint.com
Identity has proven to be a company unequalled in its        with companies like Microsoft, Amazon and Google,          authorization decisions for WAM, federation and
commitment to its customers’ long-term IAM success.          and collaboration with customers like Boeing, Cisco,       cloud deployments. www.radiantlogic.com
More than 7,500 customers worldwide depend on                Disney, GE, Kraft Foods, Walgreens and over half of
One Identity solutions to manage more than 125               the Fortune 100. www.pingidentity.com
million identities wherever it might reside.
www.quest.com/one-identity

Platinum

Brainwave GRC is a software vendor, leader in                Centrify redefines security from a static perimeter-       Consumers, citizens and employees increasingly             Gigya helps 700 leading businesses build trusted
Identity Analytics, present in Europe and North              based approach to protecting millions of scattered         expect anywhere-anytime experiences – whether              digital relationships with 1.3 billion consumers. With
America. The Brainwave Identity GRC solution                 connections in a hybrid enterprise. As the only            making purchases, crossing borders, accessing              our customer identity and preference management
enables organizations to mitigate their security risks       industry recognised leader in PIM and IDaaS,               e-gov services or logging onto corporate networks.         solutions, businesses identify customers across
and answer compliance requirements effortlessly              Centrify provides a single platform to secure each         They also expect the ecosystems that allow                 devices, build rich, privacy-compliant customer
by automating audit and control processes and                user’s access to apps and infrastructure through           this flexibility to be entirely reliable and secure.       profiles, and deliver better services, products and
providing in-depth analyses on access rights and             identity services. Centrify enables over 5,000             Entrust Datacard offers trusted identity and               experiences by integrating customer identity data
user behaviors. www.brainwave.fr                             customers, including over half the Fortune 50, to          secure transaction technologies that make these            into marketing, sales and service applications
                                                             defend their organizations. The Breach Stops Here.         ecosystems possible.                                       www.gigya.com
                                                             www.centrify.com

Silver

Atos through its Evidian Suite enables companies             With over 50million logins a day, Auth0 provides           Avecto is a leader in Privilege Elevation and              BeyondTrust is a global cyber security company
to empower their identity and access management              authentication and a single-view of users across           Delegation Management and has enabled over 8               providing privileged access management and
agility, enhance security and complies with                  applications, business and social profiles, reducing       million users across many of the world’s biggest           vulnerability management solutions for UNIX, Linux,
regulations. Evidian IAM suite accelerates the Digital       overhead and risk, while improving user experience.        brands to successfully work without admin rights           Windows and Mac OS operating systems.
Transformation. www.evidian.com                              www.auth0.com                                              and achieve the balance between overlocked and             www.beyondtrust.com
                                                                                                                        underlocked environments. www.avecto.com

OneLogin simplifies identity and access                      Consumer and Workforce IAM delivered. Visit Pirean         Trusted by governments and enterprises worldwide,          More than 30,000 customers worldwide rely on
management (IAM) for a more efficient, secure                to discover more about 2016’s Security Innovation          PrimeKey is leading PKI, digital signatures and            RSA’s business-driven security™ strategy for
enterprise, delivering an IAM platform in the cloud          of the Year and 2017’s Cloud Security Product of           applied cryptography vendor. Software and hardware         identity and access management, threat detection
trusted by thousands of customers.                           the Year.                                                  designed for IoT scale of business.                        and response, fraud prevention, and GRC.
www.onelogin.com                                                                                                                                                                   www.rsa.com

6                                #GartnerIAM                                                                                            Gartner Identity & Access Management Summit 2018
Sponsorship opportunities                                                                                     Pricing & Registration
   For further information about sponsoring this event:
   Telephone: +44 1784 267456                                                                                    Standard price: €2,700 + UK VaT
   Email: european.exhibits@gartner.com                                                                          Public sector price: €2,125 + UK VaT

                                                                                                                 3 ways to register
                                                                                                                 Web: gartner.com/eu/iam
                                                                                                                 Email: emea.registration@gartner.com
                                                                                                                 Phone: +44 20 8879 2430

Micro Focus is the seventh largest pure-play             Okta is the leading provider of identity for the        Gartner clients
software company in the world. We help customers         enterprise. Okta Identity Cloud connects and
innovate faster with lower risk. With Micro Focus’       protects employees of the world’s largest               a Gartner ticket covers all two days of the Summit.
security solutions organizations can secure              enterprises. It also securely connects enterprises to
applications and data, drive identity-centric controls   their partners, suppliers and customers. With deep      contact your account Manager or email emea.events@
and intelligence, and leverage powerful analytics to     integrations to over 5,000 apps, it enables simple      gartner.com to register using a ticket.
detect known and unknown threats. Find out more          and secure access from any device.
at www.microfocus.com/solutions/security/                www.okta.com

                                                                                                                 What’s Included
                                                                                                                 In addition to four tracks of the latest analyst research,
                                                                                                                 your conference registration fee includes access to these
                                                                                                                 special features:
                                                                                                                 • A Gartner analyst one-on-one meeting*
                                                                                                                 • Analyst-user roundtables*
                                                                                                                 • Hands-on workshops*
                                                                                                                 • Solution Showcase
                                                                                                                 • Networking lunches and receptions
                                                                                                                 • Agenda planning through Gartner Events Navigator
                                                                                                                 *Online preregistration is required for one-on-ones, roundtables,
                                                                                                                  meet-ups, Senior Executive Circle sessions and workshops.
                                                                                                                  Reserve your place early, as space is limited.

Since 2000, Omada has helped customers use
identity to create measurable business value.
                                                                                                                 Group Rate Discount
Identity, managed the Omada way, simultaneously
improves security, efficiency, cost-control,                                                                     Maximize learning by participating together in relevant
and regulatory compliance across cloud and
on-premises infrastructures. Built on Microsoft                                                                  sessions or splitting up to cover more ground, sharing
technology, our solutions deliver strong out-of-the-                                                             your session take-aways later.
box functionality securing easy adoption, long term
value, and optimized ROI. www.omada.net
                                                                                                                 Complimentary registrations
                                                                                                                 • 1 for every 3 paid registrations
                                                                                                                 • 2 for every 5 paid registrations
                                                                                                                 • 3 for every 7 paid registrations
                                                                                                                 For more information, email emea.registration@gartner.com
                                                                                                                 or contact your Gartner account manager.

Bomgar’s secure access solutions enable                  Hitachi ID Systems delivers access governance and
organizations to protect critical systems whilst         identity administration solutions to organizations
improving productivity, through providing quick and      globally, and are used to secure access to systems
secure access to endpoints and managing privileged       in the enterprise and in the cloud.
credentials. www.bomgar.com                              www.hitachi-id.com
                                                                                                                 Summit Venue
                                                                                                                 Gartner hotel room rate
                                                                                                                 From £225 per night at Royal Lancaster London
                                                                                                                 Lancaster Terrace, London W2 2TY

                                                                                                                 Book your room at: gartner.com/eu/iam
Exhibitor list as of 1 March 2018 and subject to change

Visit gartner.com/eu/iam for updates and to register!                                                                                                                            7
Meet the Analysts
    Ant Allan                                                                                Jonathan Care                                       Jeremy D’Hoinne
    Research VP                                                                              Research Director                                   Research VP

Managing identities, privileges, access and trust;                                       Application and data security; Security and risk      Network security (e.g., network and web application
Identity and access management program                                                   management; Security monitoring and operations;       firewalls, IPS, sandboxing and network traffic
                                                                                         Managing identities, privileges, access and trust;    analysis); Organizational challenges, such as security
                                                                                         Information security management program               skills shortage or how security organizations adapt
                                                                                                                                               to bimodal IT

    Mark Diodati                                                                             Homan Farahmand                                     Felix Gaehtgens
    Research VP                                                                              Research Director                                   Research Director

Managing identities, privileges, access and trust;                                       Identity governance and administration (IGA); API     Managing identities, privileges, access, trust and
Cloud computing; Office 365, Google Apps for                                             Gateway tools; Customer identity management;          governance
Work or other Cloud Office initiatives; Modernizing                                      Blockchain and decentralized applications (Dapp)
application architecture and infrastructure

    John Girard                                                                              Brian Iverson                                       Kevin Kampman
    VP, Distinguished Analyst                                                                Research Director                                   Research Director

Business security and privacy solutions for wireless                                     Identity governance and administration (IGA);         Developing IAM strategy, establishing programs,
and mobile road warriors, extranet, remote offices                                       Managing accounts and entitlements in distributed     metrics and demonstrating success; Implementing
and teleworkers                                                                          systems; Provisioning, access requests, role-based    role and policy management; Building IAM maturity
                                                                                         access control (RBAC) and access certification

    Gregg Kreizman                                                                           David Mahdi                                         Marc-Antoine Meunier
    Research VP                                                                              Research Director                                   Research Director

Single sign-on (SSO); Access management; Identity                                        Identity assurance, strategy and planning, X.509      Data classification, data access governance, data-
federation and standards; Identity as a Service,                                         certificate management, SSL, SSH and mobile;          centric audit and protection, and data masking
Consumer IAM                                                                             Hosted or on-premises PKI technology; IoT (Internet
                                                                                         of Things); Blockchain, data security

    Earl Perkins                                                                             Tricia Phillips                                     Mary E. Ruddy
    Research VP                                                                              Research Director                                   Research VP

Digital security strategy and planning for                                               Fraud prevention and management including:            Single sign-on, identity federation, modern
operational technology (OT), Internet of Things                                          strategy, legacy fraud prevention tools and           IAM architecture, API gateways, web access
(IoT); Governance and practice for the organization                                      operations, emerging technology and services,         management (WAM) and consumer IAM
                                                                                         design and implementation, chargeback
                                                                                         management, and fraud analytics

    Pete Shoard                                                                              Ayal Tirosh                                         Erik Wahlstrom
    Research Director                                                                        Senior Research Analyst                             Research Director

Analysis of managed security service providers                                           Strategies for application security and digital       Identity of Things for the Internet of Things;
(MSSPs) and security monitoring technologies such                                        workplace security                                    Public-key infrastructure (PKI); Identity federation
as SIEM and behavioral analytics (UEBA)                                                                                                        (SAML, OAuth2, SCIM); Cloud directories; User
                                                                                                                                               authentication

                                              Gartner analyst one-on-one meetings, roundtables and
                                              workshops help you work through challenges and gain
                                              new ideas. Both are included in your registration, but
                                              space is limited, so book now and secure your place.

                                                                                                                                               Terms and conditions
© 2017 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of
                                                                                                                                               To view our Gartner events terms and
Gartner, Inc. or its affiliates. For more information, email info@gartner.com or visit gartner.com.                                            conditions, visit gartner.com/eu/iam
You can also read