gartner identity & access management summit 2017 · pdf filegartner identity & access...

5
Gartner Identity & Access Management Summit 2017 6 – 7 March / London, UK gartner.com/eu/iam #GartnerIAM Reimagine IAM to Accelerate Digital Business A lot has changed for the IAM professional in the last year, are you up to the challenge? Look inside for a full agenda helping you move your key initiatives forward

Upload: trinhnhi

Post on 20-Mar-2018

224 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Gartner Identity & Access Management Summit 2017 · PDF fileGartner Identity & Access Management Summit 2017 6 – 7 March / London, UK #GartnerIAM Reimagine IAM to Accelerate Digital

Gartner Identity & Access ManagementSummit 20176 – 7 March / London, UKgartner.com/eu/iam

#GartnerIAM

Reimagine IAM to Accelerate Digital Business

A lot has changed for the IAM professional in the last year, are you up to the challenge?

Look inside for a full agenda helping you move your key initiatives forward

Page 2: Gartner Identity & Access Management Summit 2017 · PDF fileGartner Identity & Access Management Summit 2017 6 – 7 March / London, UK #GartnerIAM Reimagine IAM to Accelerate Digital

Gartner Identity & Access Management Summit 2017 Visit gartner.com/eu/iam for updates and to register! #GartnerIAM#GartnerIAM

Reimagine your IAM program to support and enable a new digital business reality. At the Gartner Identity & Access Management Summit 2017, 6 – 7 March, in London, UK, you will learn how to transition your IAM program into one that’s fast, flexible and economical. This year’s agenda addresses mounting data security and privacy concerns, and offers help on navigating organizational politics to achieve real change — an increasingly critical capability that few IAM leaders have mastered. Whether you are new to IAM or looking for advanced strategies, you will walk away with what you need to know to deliver simple, modular, scalable IAM solutions that support consumer IAM, the Internet of Things (IoT) and digital business opportunities.

Reimagine IAM to Accelerate Digital BusinessBring your IAM program into the age of digital business

Key benefits of attending

• Understandtheimpactofcloud,mobility, social and big data on IAM and vice versa

• LearnwhereandhowIAMfitswithinthe larger context of solving business-relevant problems and positioning the business for success

•Gainbest-practiceusecasesandpractical advice for IAM governance that provide real value to your enterprise

• DiscoverIAMdeliveryalternativesandtheir maturity and applicability for your enterprise

• Takecompliancereportingtothenextlevel by leveraging identity and access intelligence

• Createamoreaccess-accountableandtransparent organizational culture for your enterprise

Consumer IAM virtual track ConsumerIAM(CIAM)differssignificantlyfromthetraditionalworkforceIAMinscaleandfunction.Learnhow you can create and manage business-enhancing customer experience across multiple channels with specialized content and opportunities to connect and learnfrompeerswithinthefield.

Case studies Hear real life examples of implementation and lessons learnt from leading IAM experts in diverse industries.

Industry coverage • Government • FinancialServices

Strategic direction and industry expertise

Guest keynote

Criminals A traditional organized crime syndicate must be able to wield violence in order to competeinthemarketplace.Cybercriminalsbycontrastdonotneedacapacityforviolence. This means that cyber malfeasance has attracted a very different set of charactersandskills—thisrepresentsasignificantbreakinthesociologyoforganizedcrime.MishaGlennyprofilesthemotivations,abilitiesandsocialbackgroundsofsomeofthe many cyber criminals he has interviewed and explains how one of the greatest challenges facing law enforcement around the world these days is the fusion of traditional organized crime groups with the skills of cyber criminals.

MishaGlennyisanaward-winninginvestigativejournalist,authorandbroadcasterandanassociateprofessoratColumbiaUniversity’sHarrimanInstitute.Mr.Glennyisoneoftheworld’sleadingexpertsoncybercrimeandonglobalmafianetworks.

His recent books, Dark Market: Cyberthieves, Cybercops and You and McMafia: Journey through the Global Criminal Underworld were highly acclaimed, translated into over 30 languagesandshort-listedfortheFTBusinessBookoftheYear,andtheLionelGelberPrize for International Affairs. McMafia alsoledtoMr.Glenny’s2009TEDTalkonthesubject.

Gartner keynote

Roadmap/State of IAM 2017 IAMhasevolvedtobemorethanjustasetofprocesses,peopleandtechnologiesthatsupportoperationalefficiencyandsecurityeffectiveness.ThesearestillimportantIAMbusiness drivers, but digital business requires IAM that empowers the organization for change. This roadmap presentation helps you understand the current state of IAM, the increasinginterplayoftheIAMmarketsandadjacentsecurityandmobilitymarkets,andthe trends that will affect every IAM program.

Gregg Kreizman, Lori Robinson and Jonathan Care

Keynote sessions

Misha Glenny Award-winning investigative journalist, author and broadcaster

Gregg Kreizman Research Vice President

Lori Robinson Research VP

Jonathan Care Research Director

For the most up to date

information about our agenda,

speakers and sessions please

visit our website

gartner.com/eu/iam

“ It has been extremely inspiring to attend the IAM Summit, especially the new ways of looking at the identities and Internet of Things; in that respect it has given me a lot of food for thought to bring to my organization.” Senior IT Specialist, Nordea

“ As always, Gartner analysts demonstrate they have their finger on the pulse of what’s happening in security and identity, deep insights and deep info.” Head of Product, Eirnin Consulting

Page 3: Gartner Identity & Access Management Summit 2017 · PDF fileGartner Identity & Access Management Summit 2017 6 – 7 March / London, UK #GartnerIAM Reimagine IAM to Accelerate Digital

Gartner Identity & Access Management Summit 2017 Visit gartner.com/eu/iam for updates and to register!#GartnerIAM #GartnerIAM#GartnerIAM

Agenda at a glance When attending this event, please refer to the Gartner Events mobile app for the most up to date session and location information.

07:00 – 18:30 Registration

08:15–09:00 TechInsightsTutorial:ASystematicandPracticalApproachtoOptimizingAuthorization Architecture Homan Farahmand

Tutorial: IAM 101 Neil Wynne TechInsightsTutorial:GettingOffice365andAzureActiveDirectoryRight Mark Diodati

09:15–10:15 Opening Keynote: Roadmap/State of IAM 2017 Gregg Kreizman, Lori Robinson and Jonathan Care

10:15 – 10:45 RefreshmentBreakintheSolutionShowcase

TRACKS A. Foundational Strategies in IAM B. Moving Your IAM Program Forward

C. Building IAM for the Future D. Beyond the Checkbox: Security, Risk and Privacy

Workshops Analyst-User Roundtables

10:45 – 11:30 CreatingaCompellingVisionforYourIAMProgram Perry Carpenter

TheThirdWaveandBeyond:TrustedIdentitiesinOnline,MobileandDigitalBusiness Ant Allan

TechInsights: The Important Role ofConsumerIAMintheDigitalTransformation Lori Robinson

PrivacyPressure:TametheGeneralDataProtectionRegulationBeforeItAttacksYou Bart Willemsen

10:30 – 11:30 Roundtable: ExperiencesFromImplementingandSupportingIdentityinaMobileWorkplace Rob Smith

11:45–12:15 SolutionProviderSessions

12:15–13:30 LunchintheSolutionShowcase NetworkingLunch—FinancialServices (Registration required)

13:30 – 14:15 MakingtheRightChoicesfor AccessManagementandSingleSign-On Gregg Kreizman

TechInsights:UtilizeIdentityAnalyticstoImproveIAMControlsandThwartAttacks Lori Robinson

Identity and Access Managerment in theDigitalBusiness Ant Allan

GartnerEssentials:TopCybersecurityTrendsfor2017 Earl Perkins

13:30 – 15:00 Workshop: HowtoDefineMetricsforYourIAMProgram Kevin Kampman

13:30 – 14:30 Roundtable: IAMIssuesforGovernment David Mahdi

14:30 – 15:00 SolutionProviderSessions

15:15–16:00 HowMetricsShouldDriveYourIAMProgram’sBusinessCase Kevin Kampman

TechInsights: Authentication, Authorization and the Identity of Things Erik Wahlstrom

ThingCommerce—WhenThingsBecomeCustomers Jason Daigler

StateofCloudSecurity2017 Claudio Neiva

15:15 – 16:45 Workshop: HowtoImplementaTwo-LayerEnterpriseRoleManagementFramework Brian Iverson

15:15 – 16:15 Roundtable: IAMIssuesforFinancialServices Earl Perkins

16:15–16:45 TothePoint:BeattheOdds—PlanforSuccessWithIdentityGovernanceandAdministration Felix Gaehtgens

CaseStudy TothePoint:SuccessfulMobilizationinaDigitalWorldRequiresRevampingYourIAMStrategy Rob Smith

TothePoint:StateofDataSecurity Neil Wynne

16:45–17:15 RefreshmentBreakintheSolutionShowcase

17:15 – 18:00 Guest Keynote: Criminals Misha Glenny

18:00–20:00 SolutionShowcaseandNetworkingReception

07:00 – 18:30 Registration

08:30–09:15 BuildinganEffectiveandRisk-AwarePrivileged Access Management Solution Felix Gaehtgens

DriveBusinessResultsandImprovedCXWithCustomerJourney Analytics Jason Daigler

TechInsights:BuildinganAgileIGAInfrastructurewithIGA-as-a-Service Homan Farahmand

ProtectingYourWebsiteAgainstDDoSandOtherThreats Claudio Neiva

08:30 – 10:00 Workshop: AvoidHeadachesandDoaPrivacyImpactAssessmentQuickScan Bart Willemsen

09:30–10:15 CaseStudy IAMasaService(IDaaS)isReadyforYourOrganization;AreYouReadyforIDaaS? Gregg Kreizman

TechInsights: An Identity Tale of Two IaaS:AWSandAzure Mark Diodati

PCIPoint-to-PointEncryption2.0:What’sinItforUs? Jonathan Care

09:30 – 10:30 Roundtable: Buyvs.Build:ChoosingtheRightApproachforYourNewAuthenticationSolution Ant Allan

10:15 – 10:45 RefreshmentBreakintheSolutionShowcase

10:45 – 11:15 SolutionProviderSessions

11:30–12:15 BestPracticesforEngagingWithIAMProfessionalServicesFirms Brian Iverson

EnhancingDataLossPrevention,DealingWithRansomware:WhyIdentityandDataSecurityNeedtoConverge David Mahdi

CaseStudy AbsoluteIdentityProofingIsDead:UseDynamicIdentityAssessmentInstead Jonathan Care

11:15 – 12:45 Workshop: GotAccessCertFatigue?HowtoImplementanEffectiveAccessCertificationProgram Lori Robinson

11:30 – 12:30 Roundtable: LessonsLearnedWhenDeployingPrivileged Access Management Technology Mark Diodati

12:15–13:45 LunchintheSolutionShowcase NetworkingLunch—Government (Registration required)

13:45 – 14:30 The IAM Magic Quadrants and CriticalCapabilities Felix Gaehtgens, Gregg Kreizman, Brian Iverson and Rob Smith

OpenSesame!TheImpactofMobileandCloudonPhysicalAccessControlSystems Ant Allan and David Mahdi

TechInsights:Blockchain—TheMythsandRealitiesofDecentralizedIdentity Homan Farahmand

RoadmapConvergence:TheStateofIoTandOTSecurity Earl Perkins

13:45 – 15:15 Workshop: EssentialCommunicationandConflictResolutionSkillsforSecurityLeaders Perry Carpenter

13:45 – 14:45 Roundtable: ConsumerIdentityandAccessManagement Lori Robinson

14:45 – 15:15 SolutionProviderSessions

15:30–16:00 TothePoint:WatchOut!IdentifyandStayClearofTheseCommonIAMPitfalls Felix Gaehtgens

TechInsights:Future-ProofingYourDirectoryServicesStrategytoSupportConsumerIAM,IoTandCloud Erik Wahlstrom

TothePoint:Value(for)YourCustomers—HowPrivacyRelatestoMarketingandConsentBart Willemsen

TothePoint:MoveBeyond“Awareness”toSecurityandPrivacyCultureManagement Perry Carpenter

15:30 – 16:30 Roundtable: LeadingasanIAMArchitectintheDigitalArea Homan Farahmand

16:15–17:00 Closing Keynote

Mon

day

6MARCH2017

Tues

day

7MARCH2017

#GartnerIAM

Agenda as of 12 January 2017 and subject to change Agenda tracks

A. Foundational Strategies in IAM LearnhowtoproperlyplanandorganizeyourIAMprogram,createorrestartan IAM strategy and ensure processes and controls are implemented to gain businessbenefits.Gettime-provenandemergingbestpracticesfocusedondoingthesimpleandrightthingsfirstandavoidingpitfalls.

B. Moving Your IAM Program Forward YouhaveIAMexperience.YouhaveestablishedyourIAMprogramandroadmap.It’stimetogetbusyonyourprojectsandmoveforward.Weshowyou best practices and how to avoid pitfalls, and help you with tool and service selection in dynamic IAM markets.

C. Building IAM for the Future IAM programs are faced with new business demands and expectations in the digital age, forcing IAM leaders to rethink how they manage their programs. ExplorehowdigitalbusinesswillacceleratechangesinIAMprogrammanagement, technology delivery and scale.

D. Beyond the Checkbox: Security, Risk and Privacy Fordigitalbusinesstosucceed,security,risk,privacyandIAMmustbealigned. In this track, you’ll discover the security disciplines that align with IAM along with the most important security trends.

Agenda Key

Analyst interaction

Analyst one-on-one meetings* Complimentaryconsulting withaGartneranalyst of your choice

Analyst-user roundtable discussions* ModeratedbyGartner analysts for exchanging ideas and best practices with your peers

Workshops* Small-scaleandinteractive; drilldownonspecifictopics with a how-to focus

*Spaceislimitedand preregistration is required for these session types. Alumni attendeeprebookingopenson23January2017.Prebookingforgeneralattendeesopenson6February2017.

Solutions

Solution Showcase Meet with today’s leading and emerging IAM solution providers, all under one roof, and get the latest information and demonstrations on new products and services

Solution provider sessions Getaninsideviewofcurrentmarketplace offerings from the solution providers that develop them and clients who deploy them

Face-to-face solution provider meetings Walk away with actionable solutions from the vendors you’re most interested in

Page 4: Gartner Identity & Access Management Summit 2017 · PDF fileGartner Identity & Access Management Summit 2017 6 – 7 March / London, UK #GartnerIAM Reimagine IAM to Accelerate Digital

Gartner Identity & Access Management Summit 2017 Visit gartner.com/eu/iam for updates and to register!#GartnerIAM #GartnerIAM

Solution ShowcaseDevelopa“shortlist”oftechnologyproviderswhocanmeetyourparticularneeds. We offer you exclusive access to some of the world’s leading technology and service solution providers in a variety of settings.

Sponsorship opportunitiesForfurtherinformationaboutsponsoringthisevent: Telephone: +441784267456 Email: [email protected]

Premier

Platinum

Silver

TM

CyberArk is the only security company that proactively stops the most advanced cyber threats — those that exploit insider privileges to attack the heart of the enterprise. The company has pioneered a new category of targeted security solutions to protect against cyber threats before attacks can escalate and do irreparable business damage. www.cyberark.com

Brainwave GRC is a European leading software vendor focused on Identity Analytics and intelligence. We help businesses to fight against cyber-risks, detect insider threats, and fraud with next-generation GRC solutions. Brainwave strengthens the IS security by a preventive and predictive analysis of the risks to which the company is exposed, wherever the applications and data are on-premise or in the cloud. www.brainwave.fr

Consumers, citizens and employees increasingly expect anywhere-anytime experiences — whether making purchases, crossing borders, accessing e-gov services or logging onto corporate networks. Entrust Datacard offers the trusted identity and secure transaction technologies that make those experiences reliable and secure. More than 2,000 Entrust Datacard employees serve customers in 150 countries worldwide. www.entrustdatacard.com

Gigya’s Customer Identity Management platform helps 700+ companies build trusted digital relationships with more than 1.1 billion consumers. Identify and engage customers across devices; consolidate data into rich, privacy-compliant customer profiles, and integrate data into marketing and service applications to provide better services, products and experiences. www.gigya.com

Okta is the foundation for secure connections between people and technology. By harnessing the power of the cloud, Okta allows people to access applications on any device at any time, while still enforcing strong security protections. It integrates directly with an organization’s existing directories, identity systems, and +5000 applications. www.okta.com

Covisint is a Cloud Platform for building Identity and Internet of Things applications. Our Cloud Platform technology facilitates the rapid development of identification, authorization, and connection of complex networks of people, systems, and things. Covisint enables companies to build scalable cloud applications for sharing trusted information across complex product ecosystems. www.covisint.com

Atos through its Bull Technologies Evidian IAM Suite enables companies to improve their agility, enhance security and comply with regulations while accelerating their Digital Journey. www.evidian.com

Hitachi ID Systems delivers access governance and identity administration solutions to organizations globally, and are used to secure access to systems in the enterprise and in the cloud. www.hitachi-id.com

OneLogin, the innovator in Cloud Identity and Access Management (IAM), provides the industry’s fastest, easiest and most secure solution for managing internal and external users across all devices and applications. www.onelogin.com

SSH Communications Security is the leading provider of identity access management solutions for the governance of the most critical access to your on premise and cloud environments. www.ssh.com

Bomgar’s leading privileged access and identity management solutions improve productivity and security by enabling secure, controlled connections to any system or device, anywhere in the world. www.bomgar.com

Omada Identity Suite is an all-in-one solution for identity management and access governance that enables organizations to achieve compliance, reduce risk exposure, and maximize efficiency. www.omada.net

Recognized experts in Identity and Access Management, we deliver best practice solutions through Software and Consulting Services, supporting organizations in enabling people to securely access systems and services. www.pirean.com

Saviynt’s next generation platform provides risk and intelligence-based IGA, creating fine-grained governance and real-time control of both cloud and on-premise environments. www.saviynt.com

WALLIX is a privileged access management specialist which helps organizations protect and secure their critical IT assets including data, servers, terminals and connected devices. www.wallix.com

PrimeKey is leading PKI and applied cryptography vendor, delivering software and hardware systems fit for IoT scale. Designed, developed and manufactured in Sweden and Germany. www.primekey.se

Gemalto’s SafeNet Identity and Data Protection solutions are trusted by the largest most respected brands to protect their data and identities. Gemalto ensures the authenticity of your banking transactions, safeguards health records, protects the purchase of your cup of coffee, and helps organizations control risk, manage security, and maintain compliance. https://safenet.gemalto.com/multi-factor-authentication/

IBM Security, with 7,500 dedicated professionals in 133 countries, delivers intelligent, integrated security technology and services to out-think cybercriminals, detect threats and respond quickly to breaches. We focus on our clients’ most critical needs: transforming their security programs; optimizing security operations and response systems; and protecting critical information. www.ibm.com

As the market leader for identity virtualization, Radiant Logic delivers simple, logical and standards-based access to all identity within an organization. RadiantOne FID, our federated identity service based on virtualization, provides fully integrated, customizable identity views built from disparate data silos, driving critical authentication and authorization decisions for WAM, federation and cloud deployments. www.radiantlogic.com

The ForgeRock Identity Platform™ transforms the way millions of customers, prospects, and citizens interact with businesses and governments online, providing better security, building relationships, and enabling new cloud, mobile, and IoT offerings from any device or connected thing. ForgeRock® customer identity serves hundreds of brands globally, like Morningstar, Vodafone, GEICO, and the government of Norway. For more information visit http://www.forgerock.com and follow us on Twitter @ForgeRock www.forgerock.com

Micro Focus is a global enterprise software company helping customers innovate faster with lower risk. NetIQ is the security portfolio of Micro Focus. Our Identity-Powered Security solutions help organizations secure access to sensitive information and reduce the complexity of demonstrating regulatory compliance and manage access governance through integrated identity and security analytics. www.microfocus.com

Did you know Microsoft spends over $1B in R&D on Security every year? With the introduction of their Enterprise Mobility and Security solutions, Microsoft has leveraged it’s investments to quickly become the market leader in protecting companies from the latest security challenges while enabling employees to remain productive on their favourite devices and applications. Over 38,000 companies have already partnered with Microsoft to implement an identity-driven security solution that offers protection without compromising productivity. www.microsoft.com

Ping Identity is the leader in Identity Defined Security for the borderless enterprise, allowing the right people to access the right things, securely and seamlessly. Protecting over 1.3 billion identities from data centers around the globe, Ping allows employees, customers and partners the freedom to access the Cloud and on-premise applications they need with an enterprise IDaaS solution that includes multi-factor authentication, single sign-on and access security. www.pingidentity.com

One Identity solutions eliminate the complexities and time-consuming processes often required to govern identities, manage privileged accounts and control access. Our solutions enhance business agility while addressing your IAM challenges with on-premises, cloud and hybrid environments by defining a clear path to governance, access control and privileged management, empowering business managers to make access decisions, leveraging modular, integrated components to start building from anywhere and deploying IAM solutions and achieve ROI in weeks – not months or years –accelerating business operations. www.quest.com/one-identity

SailPoint, the undisputed leader in identity governance, brings the Power of Identity™ to enterprise customers around the world. The company pioneered the identity governance market, and provides an integrated set of cloud-based services, including compliance controls, provisioning, password management, single sign-on and data access governance. www.sailpoint.com

Exhibitor list as of 10 January 2017 and subject to change

Standard price: €2,625+UKVAT

Public sector price: €2,075+UKVAT

3 ways to register Web: gartner.com/eu/iam

Email: [email protected]

Phone: +442088792430

Gartner clients AGartnerticketcoversalltwodaysoftheSummit.ContactyourAccountManageroremailemea.events@gartner.com to register using a ticket.

Summit Venue

Gartner hotel room rateFrom £195 per night at Park Plaza, Westminster 200WestminsterBridgeRd,Lambeth,LondonSE17UT

Phone:08444156780

Please quote code: GART01

Pricing & Registration

What’s IncludedIn addition to four tracks of the latest analyst research, your conference registration fee includes access to these special features:

• ConsumerIAM(CIAM)—virtualtrack

• AGartneranalystone-on-onemeeting*

• Analyst-userroundtables*

• Hands-onworkshops*

• SolutionShowcase

• Networkinglunchesandreceptions

• AgendaplanningthroughGartnerEventsNavigator

*Online preregistration is required for one-on-ones, roundtables and workshops. Reserve your place early, as space is limited.

Group Rate DiscountMaximize learning by participating together in relevant sessions or splitting up to cover more ground, sharing your session take-aways later.

Complimentary registrations

• 1forevery3paidregistrations

• 2forevery5paidregistrations

• 3forevery7paidregistrations

Formoreinformation,emailemea.registration@gartner.comorcontactyourGartneraccountmanager.

Page 5: Gartner Identity & Access Management Summit 2017 · PDF fileGartner Identity & Access Management Summit 2017 6 – 7 March / London, UK #GartnerIAM Reimagine IAM to Accelerate Digital

©2017Gartner,Inc.and/oritsaffiliates.Allrightsreserved.GartnerisaregisteredtrademarkofGartner,Inc.oritsaffiliates.Formoreinformation,[email protected].

Ant Allan Research VP

Managing identities, privileges, access and trust; Identity and access management program

Jonathan Care Research Director

Application and data security; Security and risk management; Security monitoring and operations; Managing identities, privileges, access and trust; Information security management program

Perry Carpenter Research Director

Identity and access management; Security awareness and training; Phishing mitigation; Managing emerging threats and trends; Go-to-market strategies for security vendors

Claudio Neiva Research Director

Network security technologies; SIEM operations; Information security; Intrusion prevention system (IPS), Network access control (NAC)

Earl Perkins Research VP

Digital security strategy and planning for operational technology (OT), Internet of Things (IoT); Governance and practice for the organization

Felix Gaehtgens Research Director

Managing identities, privileges, access and trust; Identity and access management program

Brian Iverson Research Director

Identity and access management; Identity governance and administration (IGA); Managing accounts and entitlements in distributed systems; Provisioning, access requests, role-based access control (RBAC) and access certification

Jason Daigler Research Director

Digital commerce platform vendor selection, vision and strategy; Customer journey analytics strategy and technology

Mark Diodati Research VP

Managing identities, privileges, access and trust; Cloud computing; Office 365, Google Apps for Work or other Cloud Office initiatives; Modernizing application architecture and infrastructure

Homan Farahmand Research Director

Identity governance and administration (IGA); API Gateway tools; Identity and access management (IAM) program; Customer identity management; Blockchain and decentralized applications (Dapp)

Kevin Kampman Research Director

Developing IAM strategy, establishing programs, metrics and demonstrating success; Implementing role and policy management; Building IAM maturity

Gregg Kreizman Research VP

Single Sign-on (SSO); Access Management; Identity federation and standards; Identity as a Service, Consumer IAM

David Mahdi Research Director

Identity assurance, strategy and planning, X.509 certificate management, SSL, SSH and mobile; Hosted or on-premises PKI technology; IoT (Internet of Things); Blockchain, data security

Lori Robinson Research VP

Identity governance and administration; Consumer identity and access management; Privileged access management; Identity analytics

Bart Willemsen Research Director

Privacy management program; Security & risk management; Compliance and privacy concerns (GDPR)

Rob Smith Research Director

Mobile security; MDM decision and deployment; Mobile authentication, VPN/remote access; App containers/app wrapping

Erik Wahlstrom Research Director

Identity of Things for the Internet of Things; Public-key infrastructure (PKI); Identity federation (SAML, OAuth2, SCIM); Cloud directories; User authentication

Neil Wynne Sr Research Analyst

Identity and access management as a service (IDaaS); Email security (secure email gateways, phishing and email encryption); Electronic signatures; Single sign-on (SSO)

Meet the Analysts Gartner analyst one-on-one meetings, roundtables and workshops help you work through challenges and gain new ideas. Both are included in your registration, but space is limited.

Terms and conditions ToviewourGartnereventstermsandconditions, visit gartner.com/eu/iam