Gartner Identity & Access Management Summit 2018
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
Look inside for the full agenda helping you move your key initiatives forward Gartner Identity & Access Management Summit 2018 5 – 6 March / London, UK gartner.com/eu/iam Gartner predicts: Through 2020, enterprises without an overarching IAM program will experience 50% more IAM project failures. #GartnerIAM
“The Gartner IAM Summit sessions inspire us to set our IAM strategy for the next couple of years. Coming back every year is key in validating our strategy and ensuring we make the right adjustments.” Security & Applications Manager Make IAM a key factor in digital business success Transform Operations into Opportunity The Identity and Access Management (IAM) industry has evolved to enable organizations to break free from the constraints of their previous IAM efforts and think about how IAM can help them innovate and drive business change. Join us at the Gartner Identity & Access Management Summit 2018, 5 – 6 March, in London, UK, and ensure you deliver rapid time to value while striking the right balance between the need for agility, cost-effectiveness and control. Over four tracks, gain in-depth guidance on how to align IAM with your CIO’s business goals, open doors to collaboration and improve user experience across the board. Join us to understand the future of IAM and how to make IAM a key factor in digital business success. Attend the • Manage privileged access to reduce security risks and increase agility Gartner Identity • Plan for success with identity governance and administration & Access Management • Understand the various user authentication technologies and strategies Summit and • Make the right access management and single sign-on choices learn to: • Evaluate IAM from PaaS and IaaS providers • Build or improve federated ID and access management efforts • Take a new approach to establishing and sustaining trust in digital identities 2 #GartnerIAM Gartner Identity & Access Management Summit 2018
Guest keynote Klaus Schweinsberg The End of Security — How to do Business in a World of Fake Facts, Chairman, Centre for Cyber Threats and Terrorism Strategy and Higher We live in times of uncertainty. The US military once coined for this environment the very Leadership term “VUca world”. The acronym stands for volatile, uncertain, complex and ambiguous. Since the beginning of the 21st century VUca needed to be re-interpreted: virtual, unbound, cybered and artificial. This new VUca world demands a new set of leadership virtues. companies have to be crystal clear about their aspiration, they need a higher degree of attention regarding new trends and technologies, they must be authentic and accurate in all respects and they have to train their management teams to become much more agile. For companies following these five alphas, times of uncertainty bear more opportunities than threats. Klaus Schweinsberg Gartner keynotes Embrace Change or Be Disrupted — IAM’s Future Role Ant Allan IaM is rapidly becoming a key differentiator in the enablement of innovative digital service. Research VP In response to this, a new generation of IaM leaders will emerge that understand and realize these benefits. how will the new generation think? What will it do? how will it evolve? and, how will this generation of leaders be affected by technology evolution in the years ahead? Mark Diodati, David Anthony Mahdi and Earl Perkins Felix Gaehtgens Research Director The IAM Magic Quadrants and Critical Capabilities This session is an overview of the IaM-related Gartner Magic Quadrants and critical capabilities that have been published in the past year. Felix Gaehtgens, John Girard and Gregg Kreizman John Girard Research VP Redefining Trust for the Digital Era Trust is essential for the success of digital business. It must encompass all of the entities that participate in business moments, their relationships and their interactions and everything that brokers those relationships and interactions. This session looks at a new Gregg Kreizman definition of trust and some approaches to enable trust in a decentralized, distributed and Research VP dynamic world of digital business. This session covers the following: • What are the fundamental elements of digital trust and why are they important to digital business? • How can you ensure that data and application code are trustworthy and trustable? David Anthony Mahdi • What are the most effective ways of establishing and sustaining trust in the people and Research Director other entities you do (digital) business with? Ant Allan & Felix Gaehtgens “The Gartner IAM Summit gives something to all. Wherever you are in your IAM journey, Gartner never fails to provide you with best practice, key trends, future predictions and vendors that will help you address your challenges — attending is always a great experience and invaluable to me.” IAM Senior Project Leader Visit gartner.com/eu/iam for updates and to register! 3
Agenda at a glance Agenda as of 1 March 2018 and subject to change 07:30 – 19:30 Registration Monday 5 March 2018 08:15 – 09:00 Tutorial: Learn the Fundamentals of Identity Governance and Administration Brian Iverson Senior Executive Circle Breakfast: Technology and Market Overview for Unstructured 09:15 – 10:00 Opening Keynote: Embrace Change or Be Disrupted – IAM’s Future Role Mark Diodati, David Anthony Mahdi and Earl Perkins 10:00 – 10:45 Guest Keynote:The End of Security – The Way to Do Business in a World of Cyber Threats Klaus Schweinsberg 10:45 – 11:15 Networking Break in the Solution Showcase 11:15 – 12:00 Gartner Keynote: The IAM Magic Quadrants and Critical Capabilities Felix Gaehtgens, John Girard and Gregg Kreizman 12:00 – 12:15 Chair’s Remarks Jonathan Care 12:15 – 13:30 Lunch Break in the Solution Showcase 12:30 – 13:15 Senior Executive Circle Lunch: When the Enemy Is Your Customer – Fi TRACKS A. Foundational Strategies in IAM B. Moving Your IAM Program C. Building IAM for the Future D. Security, Risk and Privacy Forward 13:30 – 14:15 Manage Privileged Access to Reduce Evolve Your Identity Architecture to Be Smart, How RPA Is Changing IAM Requirements and Gartner Essentials: Top Cybersecurity Trends Security Risks and Increase Agility Modern and Agile Shaping the Future of IGA for 2018 Felix Gaehtgens Mary Ruddy Homan Farahmand Earl Perkins 14:30 – 15:00 Solution Provider Sessions 15:00 – 15:30 Networking Break in the Solution Showcase 15:30 – 16:15 Strategies for Making the Right Access Assessing the IAM Capabilities of IoT Take a New Approach to Establishing and State of the Threat Landscape, 2018 Management and Single Sign-On Choices Platforms Sustaining Trust in Digital Identities Pete Shoard Gregg Kreizman Mark Diodati Ant Allan 16:30 – 17:00 Solution Provider Sessions 17:15 – 18:00 What Security and IAM Leaders Need to What Is the Role of AI in the Future of Reduce Access Risk and Increase Usability Privacy Pressure: Tame the General Data Know About Blockchain Authentication? With Machine Learning Protection Regulation Before It Attacks You! David Mahdi and Jonathan Care Justin J. Taylor Mary Ruddy Ayal Tirosh 18:00 – 20:00 Solution Showcase and Networking Reception 08:00 – 17:00 Registration Tuesday 6 March 2018 08:15 – 09:00 What Good Looks Like: Office 365, Azure AD, Best Practices for IAM Reimplementations Identity Proofing and Substantiation: the New State of Security Monitoring and Analytics, Identity and the Hybrid Cloud Mary Ruddy Model for Increasing Trust Assurance 2018 Mark Diodati Tricia Phillips Pete Shoard 09:15 – 09:45 Solution Provider Sessions 10:00 – 10:30 The Walking Dead: Lay Passwords to Rest Best Practices for Engaging With IAM How To Evaluate Cloud-Based IAM Services How Crypto-Agility and Post-Quantum Ant Allan Professional Services Firms From Microsoft, Google, and Amazon Web Cryptography Will Affect Security Projects Brian Iverson Services Mark Horvath Gregg Kreizman 10:30 – 11:00 Networking Break in the Solution Showcase 11:00 – 11:45 Choosing the Right Consumer IAM Solution Amazon Web Services and Microsoft Azure: Architecting Blockchain-Enabled Aligning Security and Risk Management With Gregg Kreizman An Identity Capabilities Assessment Decentralized Identity the Bimodal Enterprise Mark Diodati Homan Farahmand Jeremy D’Hoinne 12:00 – 12:30 Solution Provider Sessions 12:30 – 13:45 Lunch Break in the Solution Showcase 12:30 – 13:15 Senior Executive Circle Lunch: The Digital Security Organization Need 13:45 – 14:15 Successful Mobilization in a Digital World Secure Privileged Access in an IaaS Don’t Treat Your Customer Like a Criminal: Detecting Intruders Using Network Behavior Requires Revamping Your IAM Strategy Environment Build Trust Through Behavioral Analytics Analytics John Girard Homan Farahmand Tricia Phillips Jeremy D’Hoinne 14:30 – 15:00 Case Study: How Statoil Is Taking IAM Master the Politics of IAM Program Integrate Identity With Microservices-Based Why You Need to Consider Data Privacy Matters Into Their Own Hands Management Applications When Building Your IoT Initiative Deric Stroud Kevin K. Kampman Erik Wahlstrom David Anthony Mahdi 15:00 – 15:45 Networking Break in the Solution Showcase 15:45 – 16:30 Closing Keynote: Redefining Trust for the Digital Era Ant Allan and Felix Gaehtgens Analyst interaction Analyst one-on-one meetings* Analyst-user roundtable Workshops* Complimentary consulting with a discussions* Small group sessions that drill Gartner analyst of your choice Moderated by Gartner analysts down on specific topics with a for exchanging ideas and best how-to focus practices with your peers * Space is limited and preregistration is required for these session types. 4 #GartnerIAM Gartner Identity & Access Management Summit 2018
When attending this event, please refer to the Gartner Events mobile app for the most up-to-date session and location information Agenda tracks A. Foundational Strategies in IAM Every program needs a solid foundation. This track will Data Classification Marc-Antoine Meunier provide the information you need to properly plan and organize your IaM program, create or restart an IaM strategy and ensure that processes and controls are implemented to gain real business benefits. We will provide time-proven and emerging best practices, with a focus on doing the simple and right things first, and will help you avoid a number of pitfalls. ighting First-Party Fraud Tricia Phillips Workshops Analyst-User Roundtables B. Moving Your IAM Program Forward You have IaM experience. You’ve established your IaM 13:30 – 14:30 Roundtable: program and you have created the roadmap. It’s time to 13:45 – 15:15 Workshop: Managing Workforce and Consumers With a get busy on your projects and move forward. In this track, Experiences From Implementing Mobile Identity Consolidated IAM Program Kevin K. Kampman John Girard we will identify best practices, help you avoid pitfalls, and we will help with tools and service selection in dynamic IaM markets. 15:15 – 16:15 Roundtable: Grandpa PKI Is Dancing Again – This Time With IoT Erik Wahlstrom C. Building IAM for the Future as organizations position themselves for the digital age, 16:30 – 18:00 Workshop: IaM programs are faced with new business demands and Jump-Start Development of Your Organization’s IAM expectations. Business transparency, openness and IoT’s Program Vision enablement at the edge are forcing IaM leaders to Kevin K. Kampman reimagine IaM and how they have been managing their programs. In this track, we explore how digital business will accelerate changes in IaM program management, technology delivery and scale to address changes 08:00 – 09:30 Workshop: in business. How to Implement a Two-Layer Enterprise Role 08:15 – 09:15 Roundtable: Management Framework How to Get IAM Policies Right D. Beyond the Checkbox: Security, Risk and Privacy Brian Iverson Kevin K. Kampman It is now clear that, for digital business to succeed, 09:15 – 10:15 Roundtable: security, risk, privacy and IaM must be aligned. There are MDM, EMM, and UEM–Are We Ready for a Single process, organizational, functional and technology 10:15 – 11:45 Workshop: Console? John Girard overlaps that should be considered so that you can How to Select the Right SSO Solution for Your Hybrid Organization maximize your investments and have a robust, Mary Ruddy multifaceted approach to IaM, infrastructure protection, 10:45 – 11:45 Roundtable: and risk management, and privacy protection. In this track, Systematic Cryptographic Risks, Avoiding Surprises we cover the security disciplines that align with IaM along While Staying Agile Mark Horvath with the most important security trends. ded for IoT Innovation Earl Perkins Alumni attendee General attendee prebooking opens on prebooking opens on 22 January 2018 5 February 2018 Solutions Solution Showcase Solution provider sessions Face-to-face solution provider Meet with today’s leading and Get an inside view of current meetings emerging IaM solution providers, all marketplace offerings from the Walk away with actionable under one roof, and get the latest solution providers that develop solutions from the vendors you’re information and demonstrations on them and clients who deploy them most interested in new products and services Visit gartner.com/eu/iam for updates and to register! 5
Solution Showcase Develop a “shortlist” of technology providers who can meet your particular needs. We offer you exclusive access to some of the world’s leading technology and service solution providers. Premier CyberArk is the only security company focused on Entersekt is an innovator in push-based authentication ForgeRock®, the leader in digital identity Cybercriminals are growing in number and eliminating the most advanced cyber threats; those and app security. The company’s one-of-a-kind management, transforms how organizations build sophistication, rendering traditional perimeter solutions that use insider privileges to attack the heart of the approach harnesses the power of digital certificate trusted relationships with people, services, and things. powerless against today’s advanced threats.IBM enterprise. Dedicated to stopping attacks before technology with the convenience of mobile phones Monetise customer relationships, address stringent Security, with close to 8,000 dedicated professionals they stop business, CyberArk proactively secures to provide financial services companies and their regulations for privacy and consent (GDPR, PSD2, in more than 130 countries, delivers next-generation against cyber threats before attacks can escalate customers with full protection from online fraud. Built Open Banking, etc), and leverage the internet of intelligent, integrated security technology and services and do irreparable damage. on open technologies for high availability, scalability, things with ForgeRock. We serve hundreds of brands, to out-think cybercriminals, detect threats and respond www.cyberark.com and simple integration, Entersekt’s patented security including Morningstar, Vodafone, Toyota, TomTom, quickly to breaches. We focus on the most critical needs products protect millions of devices and transactions and Pearson, as well as governments like Norway, of more than 10,000 clients: transforming security daily, while complying with the world’s most stringent Canada, and Belgium. www.forgerock.com programs; optimizing and automating operations and regulatory guidelines. www.entersekt.com incident response systems; and protecting their most critical and valuable information. www.ibm.com TM One Identity helps organizations get identity and Our mission is to simplify how enterprises provide As the market leader for identity virtualization, SailPoint, the leader in enterprise identity access management (IAM) right. With a unique secure and seamless digital experiences. For the Radiant Logic delivers simple, logical and standards- management, brings the Power of Identity to combination of offerings including a portfolio of identity world’s largest organizations, we help prevent based access to all identity within an organization. customers around the world. As both an industry governance, access management and privileged security breaches, increase employee and partner RadiantOne FID, our federated identity service pioneer and market leader in identity governance, management, and identity as a service that help productivity and provide personalized customer based on virtualization, provides fully integrated, SailPoint delivers security, operational efficiency organizations reach their full potential, unimpeded experiences. Enterprises choose Ping for our identity customizable identity views built from disparate and compliance to enterprises with complex IT by security yet safeguarded against threats. One expertise, open standards leadership, partnership data silos, driving critical authentication and environments. www.sailpoint.com Identity has proven to be a company unequalled in its with companies like Microsoft, Amazon and Google, authorization decisions for WAM, federation and commitment to its customers’ long-term IAM success. and collaboration with customers like Boeing, Cisco, cloud deployments. www.radiantlogic.com More than 7,500 customers worldwide depend on Disney, GE, Kraft Foods, Walgreens and over half of One Identity solutions to manage more than 125 the Fortune 100. www.pingidentity.com million identities wherever it might reside. www.quest.com/one-identity Platinum Brainwave GRC is a software vendor, leader in Centrify redefines security from a static perimeter- Consumers, citizens and employees increasingly Gigya helps 700 leading businesses build trusted Identity Analytics, present in Europe and North based approach to protecting millions of scattered expect anywhere-anytime experiences – whether digital relationships with 1.3 billion consumers. With America. The Brainwave Identity GRC solution connections in a hybrid enterprise. As the only making purchases, crossing borders, accessing our customer identity and preference management enables organizations to mitigate their security risks industry recognised leader in PIM and IDaaS, e-gov services or logging onto corporate networks. solutions, businesses identify customers across and answer compliance requirements effortlessly Centrify provides a single platform to secure each They also expect the ecosystems that allow devices, build rich, privacy-compliant customer by automating audit and control processes and user’s access to apps and infrastructure through this flexibility to be entirely reliable and secure. profiles, and deliver better services, products and providing in-depth analyses on access rights and identity services. Centrify enables over 5,000 Entrust Datacard offers trusted identity and experiences by integrating customer identity data user behaviors. www.brainwave.fr customers, including over half the Fortune 50, to secure transaction technologies that make these into marketing, sales and service applications defend their organizations. The Breach Stops Here. ecosystems possible. www.gigya.com www.centrify.com Silver Atos through its Evidian Suite enables companies With over 50million logins a day, Auth0 provides Avecto is a leader in Privilege Elevation and BeyondTrust is a global cyber security company to empower their identity and access management authentication and a single-view of users across Delegation Management and has enabled over 8 providing privileged access management and agility, enhance security and complies with applications, business and social profiles, reducing million users across many of the world’s biggest vulnerability management solutions for UNIX, Linux, regulations. Evidian IAM suite accelerates the Digital overhead and risk, while improving user experience. brands to successfully work without admin rights Windows and Mac OS operating systems. Transformation. www.evidian.com www.auth0.com and achieve the balance between overlocked and www.beyondtrust.com underlocked environments. www.avecto.com OneLogin simplifies identity and access Consumer and Workforce IAM delivered. Visit Pirean Trusted by governments and enterprises worldwide, More than 30,000 customers worldwide rely on management (IAM) for a more efficient, secure to discover more about 2016’s Security Innovation PrimeKey is leading PKI, digital signatures and RSA’s business-driven security™ strategy for enterprise, delivering an IAM platform in the cloud of the Year and 2017’s Cloud Security Product of applied cryptography vendor. Software and hardware identity and access management, threat detection trusted by thousands of customers. the Year. designed for IoT scale of business. and response, fraud prevention, and GRC. www.onelogin.com www.rsa.com 6 #GartnerIAM Gartner Identity & Access Management Summit 2018
Sponsorship opportunities Pricing & Registration For further information about sponsoring this event: Telephone: +44 1784 267456 Standard price: €2,700 + UK VaT Email: european.exhibits@gartner.com Public sector price: €2,125 + UK VaT 3 ways to register Web: gartner.com/eu/iam Email: emea.registration@gartner.com Phone: +44 20 8879 2430 Micro Focus is the seventh largest pure-play Okta is the leading provider of identity for the Gartner clients software company in the world. We help customers enterprise. Okta Identity Cloud connects and innovate faster with lower risk. With Micro Focus’ protects employees of the world’s largest a Gartner ticket covers all two days of the Summit. security solutions organizations can secure enterprises. It also securely connects enterprises to applications and data, drive identity-centric controls their partners, suppliers and customers. With deep contact your account Manager or email emea.events@ and intelligence, and leverage powerful analytics to integrations to over 5,000 apps, it enables simple gartner.com to register using a ticket. detect known and unknown threats. Find out more and secure access from any device. at www.microfocus.com/solutions/security/ www.okta.com What’s Included In addition to four tracks of the latest analyst research, your conference registration fee includes access to these special features: • A Gartner analyst one-on-one meeting* • Analyst-user roundtables* • Hands-on workshops* • Solution Showcase • Networking lunches and receptions • Agenda planning through Gartner Events Navigator *Online preregistration is required for one-on-ones, roundtables, meet-ups, Senior Executive Circle sessions and workshops. Reserve your place early, as space is limited. Since 2000, Omada has helped customers use identity to create measurable business value. Group Rate Discount Identity, managed the Omada way, simultaneously improves security, efficiency, cost-control, Maximize learning by participating together in relevant and regulatory compliance across cloud and on-premises infrastructures. Built on Microsoft sessions or splitting up to cover more ground, sharing technology, our solutions deliver strong out-of-the- your session take-aways later. box functionality securing easy adoption, long term value, and optimized ROI. www.omada.net Complimentary registrations • 1 for every 3 paid registrations • 2 for every 5 paid registrations • 3 for every 7 paid registrations For more information, email emea.registration@gartner.com or contact your Gartner account manager. Bomgar’s secure access solutions enable Hitachi ID Systems delivers access governance and organizations to protect critical systems whilst identity administration solutions to organizations improving productivity, through providing quick and globally, and are used to secure access to systems secure access to endpoints and managing privileged in the enterprise and in the cloud. credentials. www.bomgar.com www.hitachi-id.com Summit Venue Gartner hotel room rate From £225 per night at Royal Lancaster London Lancaster Terrace, London W2 2TY Book your room at: gartner.com/eu/iam Exhibitor list as of 1 March 2018 and subject to change Visit gartner.com/eu/iam for updates and to register! 7
Meet the Analysts Ant Allan Jonathan Care Jeremy D’Hoinne Research VP Research Director Research VP Managing identities, privileges, access and trust; Application and data security; Security and risk Network security (e.g., network and web application Identity and access management program management; Security monitoring and operations; firewalls, IPS, sandboxing and network traffic Managing identities, privileges, access and trust; analysis); Organizational challenges, such as security Information security management program skills shortage or how security organizations adapt to bimodal IT Mark Diodati Homan Farahmand Felix Gaehtgens Research VP Research Director Research Director Managing identities, privileges, access and trust; Identity governance and administration (IGA); API Managing identities, privileges, access, trust and Cloud computing; Office 365, Google Apps for Gateway tools; Customer identity management; governance Work or other Cloud Office initiatives; Modernizing Blockchain and decentralized applications (Dapp) application architecture and infrastructure John Girard Brian Iverson Kevin Kampman VP, Distinguished Analyst Research Director Research Director Business security and privacy solutions for wireless Identity governance and administration (IGA); Developing IAM strategy, establishing programs, and mobile road warriors, extranet, remote offices Managing accounts and entitlements in distributed metrics and demonstrating success; Implementing and teleworkers systems; Provisioning, access requests, role-based role and policy management; Building IAM maturity access control (RBAC) and access certification Gregg Kreizman David Mahdi Marc-Antoine Meunier Research VP Research Director Research Director Single sign-on (SSO); Access management; Identity Identity assurance, strategy and planning, X.509 Data classification, data access governance, data- federation and standards; Identity as a Service, certificate management, SSL, SSH and mobile; centric audit and protection, and data masking Consumer IAM Hosted or on-premises PKI technology; IoT (Internet of Things); Blockchain, data security Earl Perkins Tricia Phillips Mary E. Ruddy Research VP Research Director Research VP Digital security strategy and planning for Fraud prevention and management including: Single sign-on, identity federation, modern operational technology (OT), Internet of Things strategy, legacy fraud prevention tools and IAM architecture, API gateways, web access (IoT); Governance and practice for the organization operations, emerging technology and services, management (WAM) and consumer IAM design and implementation, chargeback management, and fraud analytics Pete Shoard Ayal Tirosh Erik Wahlstrom Research Director Senior Research Analyst Research Director Analysis of managed security service providers Strategies for application security and digital Identity of Things for the Internet of Things; (MSSPs) and security monitoring technologies such workplace security Public-key infrastructure (PKI); Identity federation as SIEM and behavioral analytics (UEBA) (SAML, OAuth2, SCIM); Cloud directories; User authentication Gartner analyst one-on-one meetings, roundtables and workshops help you work through challenges and gain new ideas. Both are included in your registration, but space is limited, so book now and secure your place. Terms and conditions © 2017 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of To view our Gartner events terms and Gartner, Inc. or its affiliates. For more information, email info@gartner.com or visit gartner.com. conditions, visit gartner.com/eu/iam
You can also read