Explore this year’s tracks

View tracks for IAM executives and dive into last year’s sessions while we work on the full 2026 agenda.

Learn more about Gartner Identity & Access Management Summit 2026.

Get our latest conference schedules, updates and insights sent straight to your inbox.

By clicking the "Continue" button, you are agreeing to the Gartner Terms of Use and Privacy Policy.

Contact Information

All fields are required.

2026 Conference Tracks at a Glance

This year’s conference theme is Identity at the Core, underscoring identity’s crucial role in business and cybersecurity mission success, as the technology landscape is disrupted with the advent of AI. IAM ensures secure access, while supporting zero trust and resilience. Explore our tracks all developed with this theme in mind.

Track A. IAM Program Management and Leadership

Organizations should embrace an "identity-first business strategy" for operational efficiency and competitive edge. This track offers guidance on creating and maintaining a formal IAM program, vital for supporting business and cybersecurity goals.

Track B. Access Management and Authentication

Access management enables secure and resilient access for anyone or anything to anywhere. This track provides insights into identity verification, authentication, authorization, MFA, single sign-on, identity federation and API access.

Track C. Identity Governance and Administration (IGA)

This track provides insight into best practices and enhancement on ways to improve your IGA initiative to enable user access quickly while hardening security posture and access compliance.

background wave background wave background wave
Look back at 2025 Conference Sessions
Over a hundred conference sessions were presented at Gartner Identity & Access Management Summit 2025. While we work to develop this year's agenda, filter to see sessions that align with your role and interests.

Show Filters

Filter Sessions Cancel
Showing 119 Sessions
Clear All
Monday, 24 March, 2025

09:30 AM - 10:15 AM GMT

Gartner Opening Keynote: Identity Amplified: Toward Identity-First Business

Felix Gaehtgens, VP Analyst, Gartner
Rebecca Archambault, Sr Director Analyst, Gartner
Ant Allan, VP Analyst, Gartner
Business leaders acknowledge IAM's significance for mission success. More people outside the IAM team are getting involved in IAM, and are taking some authority and management of IAM assets. IAM and security leaders must understand and navigate implementing and operating a scalable IAM infrastructure. This is challenging due to complexity, diverse expectations, and evolving requirements. The goal is to elevate the importance of identity as a key discipline, like applications, data and infrastructure. ... Show More Show Less

10:30 AM - 10:50 AM GMT

Silverfort: PAM Without Pain - A New Way to Secure Privileged Users & Service Accounts

Ron Rasin, CHIEF STRATEGY OFFICER, Silverfort
Kev Smith, EMEA PRINCIPAL SALES ENGINEER, Silverfort
Protecting privileged access of both human and non-human identities (NHIs) is critical for enterprise security. Yet, the complex architecture of PAM, its endless onboarding efforts, and the ease by which attackers bypass it, leave many accounts unprotected. In this session, we will present a new technology that overcomes these limitations, and enables discovery and protection for privileged users and service accounts instantly—and with less operational impact. ... Show More Show Less

10:30 AM - 10:50 AM GMT

Identity Threat Protection: Okta's AI Revolution in Identity Security

Stephen Bennett, SR. SOLUTIONS ENGINEER, Okta
The identity landscape is under siege. AI-powered threats are evolving faster than traditional security measures can adapt, leaving organizations vulnerable to unprecedented risks. Okta's AI-powered Identity Threat Protection represents a paradigm shift in cybersecurity defense.
In this session, we'll unveil how artificial intelligence is transforming identity security from a reactive to a predictive discipline. Join Okta's Senior Solution Engineer, Stephen Bennett, to reimagine identity security in the age of artificial intelligence.
... Show More Show Less

11:00 AM - 12:30 PM GMT

Workshop: How to Evaluate CIAM Vendors?

Nat Krishnan, Sr Director Analyst, Gartner
Mehmet Yaliman, Director Analyst, Gartner
CIAM is not limited to Security. It also enables business teams achieve growth by improving user experience. Selecting the right CIAM tool is challenging though as the vendor tools vary widely in B2B support, developer tools, and external integrations. During this session, participants will review the solution criteria for CIAM to evaluate and compare different vendor tools. ... Show More Show Less

11:00 AM - 11:30 AM GMT

Technical Insights: Generative AI and IAM

Homan Farahmand, VP Analyst, Gartner
We are in the early days of generative AI (GenAI) deployment in enterprise and its application in identity and access management (IAM), this fast-moving technology can quickly evolve and change the IAM threat landscape and how we implement and operate IAM controls. Join this session to learn the initial steps companies can take to use GenAI as part of their IAM systems and how to build access control for GenAI assistants. ... Show More Show Less

11:00 AM - 11:45 AM GMT

Ask the Expert: IGA Integration With PAM, Access Management and IaaS

Gautham Mudra, Sr Director Analyst, Gartner
Identity governance and administration (IGA) is one of the core pillars of identity and access management (IAM). Implementing IGA in a silo leads to inefficient identity governance. This session will discuss the architecture for IGA integration with other critical IAM tools, such as privileged access management (PAM), access management and integration as a service (IaaS). ... Show More Show Less

11:00 AM - 11:30 AM GMT

Technical Insights: Machine (Workload) IAM

Erik Wahlstrom, VP Analyst, Gartner
Organizations often have more workloads than humans. This session provides the best practice to manage these, focusing on discovery, management, authentication, authorization and federation. Show Less

11:00 AM - 12:30 PM GMT

Workshop: How to Build and Execute the Best RFP for a PAM Product

Nayara Sangiorgio, Principal Analyst, Gartner
This workshop will help you by practically walking you through the stages of preparing the RFP for an privileged access management product. Attendees will leave with a practical approach to a successful RFP. ... Show More Show Less

11:00 AM - 11:45 AM GMT

Ask the Expert: How to Implement Multifactor Authentication

David Chase, Sr Director Analyst, Gartner
This session will explain a step-by-step process to examine the requirements for MFA and strategies for mitigating the inevitable issues which will occur. Show Less

... Show More Show Less
Items per page: 19 of 119 Items
1 of 13 Pages

Sorry, no sessions match your criteria. Please refine your filters to display sessions.

“The conference wasn’t just about theory — it offered actionable take-aways that we could immediately implement. Whether you’re modernizing your IAM approach, navigating compliance or strengthening cloud security, this conference delivers practical, cutting-edge insights.” 

Dominik Beier
Architekt, Munich Re 

Discover what it’s like to experience #GartnerIAM