All 2026 Conference Sessions

Gartner Identity & Access Management Summit 2026 dives deep into key topics for IT leaders around program management, agentic AI, optimizing resources and more to help you address your organization's mission-critical challenges.

2026 Conference Theme

Identity at the Core

In the face of geopolitical volatility and economic uncertainties, IAM is at the core of business operations and cybersecurity, ensuring resilience through secure interactions among people, machines and organizations. Gartner Identity & Access Management Summit provides guidance on building scalable and efficient IAM infrastructures in today’s complex environment.

Explore our conference sessions below, all developed with this theme in mind.

Option 1
Option 2

Hear from top Gartner IAM experts on what makes Gartner Identity & Access Management Summit an essential conference for leaders in the IAM field.

Find Conference Sessions

There are hundreds of sessions happening each day. Filter to see sessions that align with your role and interests. After registering for the conference, craft your agenda and book priority sessions — all through Gartner Conference Navigator.

Show Filters

Filter Sessions Cancel
Showing 7 Sessions
Clear All
Monday, 09 March, 2026

11:00 AM - 11:45 AM GMT

Ask the Expert: How to Modernize Machine IAM?

Steve Wessels, Director Analyst, Gartner
Current machine identity and access management (IAM) practices are fragmented and insufficient, leading to potential security and compliance risks. To address these challenges, IAM leaders should enhance and unify their existing approaches to better secure machine identities. Additionally, it is essential to modernize machine IAM practices in collaboration with all stakeholders, emphasizing just-in-time credentialing, proactive management of technology debt, and continuous monitoring to safeguard critical assets. ... Show More Show Less

11:00 AM - 11:30 AM GMT

Guidance for Successful Privileged Access Management Deployment

Homan Farahmand, VP Analyst, Gartner
In this breakout session, we'll explore the critical importance of privileged access management (PAM), its essential objectives and how to reap out the right benefits from a PAM implementation . We'll discuss how to adapt your internal processes and operating model to effectively support PAM tools and provide strategies to enhance your PAM maturity. ... Show More Show Less

02:30 PM - 03:00 PM GMT

Technical Insights: How to Manage Admin Privileges on Endpoints

Gautham Mudra, Sr Director Analyst, Gartner
Unrestricted local admin rights on Windows, Unix/Linux, MacOS endpoints present a huge attack surface posing significant cybersecurity risks. This presentation provides operational guidance to identity architects to manage endpoint privileges and address concerns about increased friction and productivity loss. ... Show More Show Less

02:30 PM - 04:00 PM GMT

Workshop: Mastering the PAM Critical Capabilities and Developing a Vendor Short List

This workshop will walk attendees through the critical capabilities of PAM tools as described in Gartner's research report in order to better understand their applicability to their organizations requirements. We will then review the PAM MQ vendors strengths and weaknesses to develop a short list for further evaluation. Attendees will walk away with a solid understanding of critical capabilities and have identified a short list of vendors to consider for subsequent evaluation and selection. ... Show More Show Less
Tuesday, 10 March, 2026

10:30 AM - 11:15 AM GMT

Ask the Expert: How to Integrate IGA With PAM, Access Management and CSPs

Gautham Mudra, Sr Director Analyst, Gartner
IGA that is siloed from other identity and access management components impacts the quality of governance. Identity architects must integrate IGA with other IAM components, such as access management, privileged access management and cloud infrastructure to enable centralized governance. ... Show More Show Less

12:00 PM - 12:30 PM GMT

Reduce Access Attack Surface Through Just-In-Time Privileged Access

Explore tackling excessive and standing privileges, which lead to breaches despite Privileged Access Management (PAM) tools. This presentation highlights limitations of traditional PAM practices like vaulting credentials and emphasizes adopting Just-Enough-Privilege (JEP) and Just-In-Time (JIT) strategies. Learn to evaluate JIT and JEP strategies through traditional PAM tools and new JITP solutions, focusing on cloud-centric environments. ... Show More Show Less

02:45 PM - 03:15 PM GMT

Market Insights for Privileged Access Management

This session will provide insights into the latest updates on the Magic Quadrant and Critical Capabilities for the privileged access management market. Show Less

... Show More Show Less
Items per page: 19 of 7 Items
1 of 0 Pages

Sorry, no sessions match your criteria. Please refine your filters to display sessions.

“The conference wasn’t just about theory — it offered actionable take-aways that we could immediately implement. Whether you’re modernizing your IAM approach, navigating compliance or strengthening cloud security, this conference delivers practical, cutting-edge insights.” 

Dominik Beier
Architekt, Munich Re 

Discover what it’s like to experience #GartnerIAM

Learn more about Gartner Identity & Access Management Summit 2026.

Get our latest conference schedules, updates and insights sent straight to your inbox.

By clicking the "Continue" button, you are agreeing to the Gartner Terms of Use and Privacy Policy.

Contact Information

All fields are required.