Explore this year’s tracks

View tracks for IAM executives and dive into last year’s sessions while we work on the full 2026 agenda.

Learn more about Gartner Identity & Access Management Summit 2026.

Get our latest conference schedules, updates and insights sent straight to your inbox.

By clicking the "Continue" button, you are agreeing to the Gartner Terms of Use and Privacy Policy.

Contact Information

All fields are required.

2026 Conference Tracks at a Glance

This year’s conference theme is Identity at the Core, underscoring identity’s crucial role in business and cybersecurity mission success, as the technology landscape is disrupted with the advent of AI. IAM ensures secure access, while supporting zero trust and resilience. Explore our tracks all developed with this theme in mind.

Track A. IAM Program Management and Leadership

Organizations should embrace an "identity-first business strategy" for operational efficiency and competitive edge. This track offers guidance on creating and maintaining a formal IAM program, vital for supporting business and cybersecurity goals.

Track B. Access Management and Authentication

Access management enables secure and resilient access for anyone or anything to anywhere. This track provides insights into identity verification, authentication, authorization, MFA, single sign-on, identity federation and API access.

Track C. Identity Governance and Administration (IGA)

This track provides insight into best practices and enhancement on ways to improve your IGA initiative to enable user access quickly while hardening security posture and access compliance.

background wave background wave background wave
Look back at 2025 Conference Sessions
Over a hundred conference sessions were presented at Gartner Identity & Access Management Summit 2025. While we work to develop this year's agenda, filter to see sessions that align with your role and interests.

Show Filters

Filter Sessions Cancel
Showing 39 Sessions
Clear All
Monday, 24 March, 2025

11:00 AM - 11:30 AM GMT

Technical Insights: Generative AI and IAM

Homan Farahmand, VP Analyst, Gartner
We are in the early days of generative AI (GenAI) deployment in enterprise and its application in identity and access management (IAM), this fast-moving technology can quickly evolve and change the IAM threat landscape and how we implement and operate IAM controls. Join this session to learn the initial steps companies can take to use GenAI as part of their IAM systems and how to build access control for GenAI assistants. ... Show More Show Less

11:00 AM - 11:30 AM GMT

Technical Insights: Machine (Workload) IAM

Erik Wahlstrom, VP Analyst, Gartner
Organizations often have more workloads than humans. This session provides the best practice to manage these, focusing on discovery, management, authentication, authorization and federation. Show Less

11:00 AM - 11:30 AM GMT

Technical Insights: Top Generative AI Adoption Security Risks and Mitigations

Kevin Schmidt, Director Analyst, Gartner
Is that SaaS-delivered generative AI (GenAI) app secure to use? Are you building GenAI apps securely using cloud-hosted large language models? Join this session to hear about the top security risks of GenAI, including resilience, data loss, prompt injection, output risk, data poisoning, retrieval risk, and how you should mitigate these risks to ensure a safe and secure GenAI adoption journey. ... Show More Show Less

11:00 AM - 11:30 AM GMT

Market Insights for Access Management 2024 to 2025

Brian Guthrie, Director Analyst, Gartner
This session will present the Magic Quadrant and Critical Capabilities for the access management market. Show Less

11:00 AM - 11:30 AM GMT

Technical Insights: Implementing Effective Certificate Management to Prevent Business Interruptions

Paul Rabinovich, VP Analyst, Gartner
Organizations routinely experience outages stemming from unmanaged certificates. In this session, we will discuss how organizations can manage their certificate estate using discovery, automation and crypto-agility. ... Show More Show Less

11:45 AM - 12:15 PM GMT

Guidance for Communicating the Value of IAM to the C-Suite

You can't deliver digital transformation or protect the organization without a strong identity foundation. This session will help IAM leaders better communicate their value to security posture and how identity enables the business, using outcome-driven metrics. Defensibility with key stakeholders like customers, shareholders and regulators will be the key to success. ... Show More Show Less

11:45 AM - 12:15 PM GMT

Guidance for Continuous Adaptive Trust to Enhance Your Identity Fabric

Ant Allan, VP Analyst, Gartner
Even when adaptive access approaches exploit increasingly sophisticated analytics, authentication decisions still rely on the binary outcomes of orthodox authentication methods. In this session, we will strip authentication back to its first principles to understand the need for and benefits of an analytics-centric approach that dynamically evaluates a range of evidence supporting identity claims. ... Show More Show Less

11:45 AM - 12:15 PM GMT

Demystifying Identity-First and Zero-Trust Strategies

Nathan Harris, Sr Director Analyst, Gartner
Identity-first security is foundational to zero-trust strategies; without it, zero-trust strategies will fail. This session dives into the gap zero-trust implementations leave when attackers target identities, how identity underpins all trust access policies, the role of identity threat detection and response in filling gaps in a zero-trust implementation, and provides real-world advice on identity starting points and priorities. ... Show More Show Less

02:30 PM - 03:00 PM GMT

Guidance for Building Quantum Resiliency

Sarah Almond, Director Analyst, Gartner
We are rapidly entering the age of usable quantum computing and its increasing threat to the existing methods of encryption, privacy and data security. In this session, we will examine reliable methods for building resiliency into your data security program to protect against the existing and future developments of quantum computing and some of the many benefits of using quantum-safe encryption. ... Show More Show Less

... Show More Show Less
Items per page: 19 of 39 Items
1 of 4 Pages

Sorry, no sessions match your criteria. Please refine your filters to display sessions.

“The conference wasn’t just about theory — it offered actionable take-aways that we could immediately implement. Whether you’re modernizing your IAM approach, navigating compliance or strengthening cloud security, this conference delivers practical, cutting-edge insights.” 

Dominik Beier
Architekt, Munich Re 

Discover what it’s like to experience #GartnerIAM