All 2026 IAM Conference Sessions

Gartner Identity & Access Management Summit 2026 dives deep into key topics for IT leaders around program management, agentic AI, optimizing resources and more to help you address your organization's mission-critical challenges.

2026 IAM Conference Theme

Identity at the Core

In the face of geopolitical volatility and economic uncertainties, IAM is at the core of business operations and cybersecurity, ensuring resilience through secure interactions among people, machines and organizations. Gartner Identity & Access Management Summit provides guidance on building scalable and efficient IAM infrastructures in today’s complex environment.

Explore our conference sessions below, all developed with this theme in mind.

Hear from top Gartner IAM experts on what makes Gartner Identity & Access Management Summit an essential conference for leaders in the IAM field.

Find Conference Sessions

There are hundreds of sessions happening each day. Filter to see sessions that align with your role and interests. After registering for the conference, craft your agenda and book priority sessions — all through Gartner Conference Navigator.

Show Filters

Filter Sessions Cancel
Showing 22 Sessions
Clear All
Monday, 09 March, 2026

10:30 AM - 10:50 AM GMT

Silverfort: Most Privileged Users Aren’t People, How Vaultless PAM Can Protect All

Rob Ainscough, CHIEF IDENTITY SECURITY ADVISOR - EMEA, Silverfort
Privileged access used to be a human problem. Admins, root accounts, shared passwords. Meanwhile, the attack surface has changed. While Active Directory remains central, protection must now extend to machine identities and agentic AI. In this session, learn why attackers succeed against privileged accounts and how a modern, vaultless PAM approach can build a confident & resilient core that contains risk & protects every type of identity, fast. ... Show More Show Less

11:00 AM - 11:45 AM GMT

Ask the Expert: How to Modernize Machine IAM?

Steve Wessels, Director Analyst, Gartner
Current machine identity and access management (IAM) practices are fragmented and insufficient, leading to potential security and compliance risks. To address these challenges, IAM leaders should enhance and unify their existing approaches to better secure machine identities. Additionally, it is essential to modernize machine IAM practices in collaboration with all stakeholders, emphasizing just-in-time credentialing, proactive management of technology debt, and continuous monitoring to safeguard critical assets. ... Show More Show Less

11:00 AM - 11:30 AM GMT

Guidance for Successful Privileged Access Management Deployment

Gautham Mudra, Sr Director Analyst, Gartner
In this breakout session, we'll explore the critical importance of privileged access management (PAM), its essential objectives and how to reap out the right benefits from a PAM implementation . We'll discuss how to adapt your internal processes and operating model to effectively support PAM tools and provide strategies to enhance your PAM maturity. ... Show More Show Less

12:30 PM - 12:50 PM GMT

BeyondTrust: Maturing Privileged Access for Modern Threats

Morey Haber, CHIEF SECURITY ADVISOR, BeyondTrust
As threats evolve, so does Privileged Access Management (PAM). Modern PAM has evolved into identity security. Identity and user management must mature to meet the demands of cloud, nonhuman identities, and modern attack vectors. It's no longer just about root or admin accounts, but also attacks against identities with a path to privileged access. Join us to explore PAM's evolution and learn the key considerations for securing your organization. ... Show More Show Less

01:45 PM - 02:15 PM GMT

One Identity: Think AI will solve your IAM challenges? Think Again

Rob Byrne, FIELD STRATEGIST, One Identity
Participate in this interactive session, hosted by One Identity, to learn how others are tackling the NHI topic in key areas such as planning, classification, inventory, and lifecycle. Be prepared to share your NHI driven desires, pains, approaches and gain insights from industry peers in a round table format. You will learn you’re not alone and gain valuable insights to forge a clearer path to a secure and unified approach to Non-Human Identity management. ... Show More Show Less

01:45 PM - 02:15 PM GMT

SSH: A New Era of Modern PAM in a Dynamic World – Ephemeral Zero Standing Access

Rami Raulas, CEO, SSH Communications security
As organizations struggle to secure privileged access management (PAM) in dynamic, zero-trust environments, traditional PAM falls short. This session explores how ephemeral identity, execution, and connectivity enable real-time, policy-driven access. Hear how leading organizations eliminated standing privileges, reduced operational complexity, and achieved measurable improvements in security and compliance. ... Show More Show Less

01:45 PM - 02:15 PM GMT

Saviynt: The State of Identity Security 2026

Henrique Teixeira, Senior VP of Strategy, Saviynt Inc.
Simon Gooch, Sr. VP, Field CIO, Saviynt Inc.
Identity security continues to expand beyond traditional user access controls and into the broader fabric of how organizations secure people, systems, and AI-driven workloads. In 2026, several new forces are reshaping the landscape: the shift toward platformization 2.0, the rise of model context protocol (MCP) as a foundation for secure interoperability, and the rapid growth of modern machine IAM. At the same time, visibility and intelligence are becoming essential for reducing blind spots, and AI governance is emerging as a core
discipline to ensure trust in autonomous systems. This session will present the top identity security trends for 2026, highlighting the technologies and practices that leaders must understand to prepare their organizations for the next phase of identity-driven security.
... Show More Show Less

02:30 PM - 03:15 PM GMT

Ask the Expert: How to Assess IAM Architecture as a System of Systems

Homan Farahmand, VP Analyst, Gartner
To reduce inefficiency and risk, identity architects need a comprehensive strategy that addresses technical debt and integrates point solutions. In this session we answer your questions about assessing your IAM architecture to support zero-trust initiatives and enhance systems interoperability. ... Show More Show Less

02:30 PM - 03:00 PM GMT

Technical Insights: How to Manage Admin Privileges on Endpoints

Gautham Mudra, Sr Director Analyst, Gartner
Unrestricted local admin rights on Windows, Unix/Linux, MacOS endpoints present a huge attack surface posing significant cybersecurity risks. This presentation provides operational guidance to identity architects to manage endpoint privileges and address concerns about increased friction and productivity loss. ... Show More Show Less

... Show More Show Less
Items per page: 19 of 22 Items
1 of 2 Pages

Sorry, no sessions match your criteria. Please refine your filters to display sessions.

“The conference wasn’t just about theory — it offered actionable take-aways that we could immediately implement. Whether you’re modernizing your IAM approach, navigating compliance or strengthening cloud security, this conference delivers practical, cutting-edge insights.” 

Dominik Beier
Architekt, Munich Re 

Discover what it’s like to experience #GartnerIAM

Learn more about Gartner Identity & Access Management Summit 2026.

Get our latest conference schedules, updates and insights sent straight to your inbox.

By clicking the "Continue" button, you are agreeing to the Gartner Terms of Use and Privacy Policy.

Contact Information

All fields are required.