February 23, 2017 By Anna Seacat 2 min read

On March 6 and 7, 2017, Gartner will host its European Identity & Access Management Summit at the Park Plaza Westminster Bridge Hotel in London. The exciting agenda will cover foundational strategies in identity and access management (IAM), ways to enhance and advance your IAM program, IAM in the digital age and much more.

Top Three Attractions at the Gartner IAM Summit

Featured speakers will include IAM experts from IBM Security, who will be giving away swag and educational materials at the IBM booth. Below is a guide to the must-attend sessions and must-have swag at the Gartner IAM Summit.

Watch the on-demand webinar: How to Know if Cloud IAM is Your Perfect Match

1. Learn About IAM-as-a-Service With the Ultimate IDaaS Kit

If you are coming to the Gartner IAM Summit in London to learn more about the agility, security and cost savings of cloud-delivered identity and access management, don’t pass up the chance to get your free IDaaS Success Kit at the IBM Security Booth.

2. Learn How to Reduce Organizational Risk With IAM Expertise and Actionable Intelligence

Your IAM solution is the cornerstone of your security program because it can answer two critical questions about your users: “Who are they?” and “What are they doing?”

Security experts from IBM will discuss these key questions and how to protect your organization from insider threats in this must-attend session.

3. Learn About IAM’s Important Role in GDPR Compliance

May 25, 2018 is right around the corner, and the heat is on for organizations that are bound to adhere to the European Union’s General Data Protection Regulation (GDPR). Don’t miss this roundtable discussion with IBM Security experts who will discuss how IAM-related controls will play an important role in meeting the new law’s requirements.

  • Session title: “GDPR: The Heat Is on…Yes…but…What’s the IAM Role in It?”
  • Date: March 7, 2017
  • Time: 14:20 to 15:05
  • Speakers: Andrea Rossi, Sridhar Muppidi

Start Your Cloud IAM Journey Today

Can’t make it to the Gartner IAM Summit in London this year? Not to worry! You can watch our on-demand webinar to start learning more about cloud-delivered IAM today.

More from Identity & Access

Taking the complexity out of identity solutions for hybrid environments

4 min read - For the past two decades, businesses have been making significant investments to consolidate their identity and access management (IAM) platforms and directories to manage user identities in one place. However, the hybrid nature of the cloud has led many to realize that this ultimate goal is a fantasy. Instead, businesses must learn how to consistently and effectively manage user identities across multiple IAM platforms and directories. As cloud migration and digital transformation accelerate at a dizzying pace, enterprises are left…

“Authorized” to break in: Adversaries use valid credentials to compromise cloud environments

4 min read - Overprivileged plaintext credentials left on display in 33% of X-Force adversary simulations Adversaries are constantly seeking to improve their productivity margins, but new data from IBM X-Force suggests they aren’t exclusively leaning on sophistication to do so. Simple yet reliable tactics that offer ease of use and often direct access to privileged environments are still heavily relied upon. Today X-Force released the 2023 Cloud Threat Landscape Report, detailing common trends and top threats observed against cloud environments over the past…

Artificial intelligence threats in identity management

4 min read - The 2023 Identity Security Threat Landscape Report from CyberArk identified some valuable insights. 2,300 security professionals surveyed responded with some sobering figures: 68% are concerned about insider threats from employee layoffs and churn 99% expect some type of identity compromise driven by financial cutbacks, geopolitical factors, cloud applications and hybrid work environments 74% are concerned about confidential data loss through employees, ex-employees and third-party vendors. Additionally, many feel digital identity proliferation is on the rise and the attack surface is…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today