All 2025 Conference Sessions

Gartner Identity & Access Management Summit 2025 dives deep into key topics for IAM around program management, agentic AI, optimizing resources and more to help you address your organization's mission-critical challenges.

2025 Conference Theme

Identity at the Core

In the face of geopolitical volatility and economic uncertainties, IAM is at the core of business operations and cybersecurity, ensuring resilience through secure interactions among people, machines and organizations. Gartner Identity & Access Management Summit provides  guidance on building scalable and efficient IAM infrastructures in today's complex environment.

Explore our conference sessions below, all developed with this theme in mind.

Hear from Gartner VP Analyst and Conference Chair, Homan Farahmand, on what makes Gartner Identity & Access Management Summit an essential conference for leaders in the IAM field.

Find Conference Sessions
There are dozens of sessions happening each day. Filter to see sessions that align with your role and interests. After registering for the conference, craft your agenda and book priority sessions — all through Conference Navigator.

Show Filters

Filter Sessions Cancel
Showing 93 Sessions
Clear All
Monday, December 08, 2025

09:30 AM - 10:15 AM CST

Gartner Opening Keynote: Identity at the Core

Michael Kelley, Sr Director Analyst, Gartner
Akif Khan, VP Analyst, Gartner
Amid geopolitical volatility and economic uncertainties, Identity and Access Management (IAM) is crucial for business operations and cybersecurity, ensuring resilience through secure interactions among people, machines, and organizations. As digital innovations like cloud computing and AI evolve, IAM adapts to counter emerging cyber threats. The Identity and Access Management Summit offers leaders guidance on building scalable, efficient IAM infrastructures in today's complex environment. ... Show More Show Less

11:00 AM - 11:45 AM CST

Ask the Expert: How to Adopt Decentralized Identity and Verifiable Credentials

Homan Farahmand, VP Analyst, Gartner
Decentralized identity and verifiable credentials technology and architecture are continuously evolving. However, adoption can be challenging. In this session, we address your questions about adoption issues, including practical use cases, ecosystem modeling, governance frameworks, and technology maturity and evaluation. ... Show More Show Less

11:00 AM - 12:30 PM CST

Workshop: Finding Your Identity Stamp of Approval for Enterprise Applications

Mehmet Yaliman, Director Analyst, Gartner
In the evolving landscape of enterprise applications, ensuring that these are capable of integrating with your identity and access management environment becomes crucial. Identity professionals are tasked with setting IAM-related requirements for an identity stamp of approval in the procurement process. This workshop will help you define IAM requirements for enterprise applications and explore compensating controls. ... Show More Show Less

11:00 AM - 11:30 AM CST

Guidance for Successful Privileged Access Management Deployment

Abhyuday Data, Director Analyst, Gartner
In this breakout session, we'll explore the critical importance of privileged access management (PAM), its essential objectives and how to reap out the right benefits from a PAM implementation . We'll discuss how to adapt your internal processes and operating model to effectively support PAM tools and provide strategies to enhance your PAM maturity. ... Show More Show Less

11:00 AM - 11:30 AM CST

Guidance for Workforce Identity Verification

James Hoover, Sr Principal Analyst, Gartner
Where and how should IDV be incorporated into workforce IAM? What technical and cultural considerations must be taken into account that are unique from regulatory or compliance IDV scenarios. ... Show More Show Less

11:00 AM - 12:30 PM CST

Workshop: How to Build and Execute an Effective RFP for IGA

Brian Guthrie, Director Analyst, Gartner
This workshop will help you by practically taking you through the stages of preparing the RFP for an identity governance and administration product. Attendees will leave with a practical approach to a successful RFP. ... Show More Show Less

11:00 AM - 11:30 AM CST

High-Value AI Use Cases for IAM

Nathan Harris, Sr Director Analyst, Gartner
While AI holds the promise for automation and efficiency, not all IAM use cases are equally suited for AI enablement. This session will walk through Gartner research related to AI for IAM use cases, including agentic AI, and help IAM leaders focus AI adoption plans on the most beneficial use cases. ... Show More Show Less

11:00 AM - 11:45 AM CST

Roundtable: How to Plan Now for the Future of IAM?

Zachary Smith, Sr Principal, Research, Gartner
While organizations are reconfiguring trust on the basis of identity, cyber criminals and threat actors are increasingly targeting identities. "Identity is the new perimeter" is a lived reality for security teams rather than a catchphrase. Learn from your peers how CISOs and heads of IAM are using strategic opportunities to embrace identity-first security and prepare IAM for the coming strategic realities. ... Show More Show Less

11:00 AM - 11:30 AM CST

Technical Insights: Workload Access Management and API Access Control Architectures

Erik Wahlstrom, VP Analyst, Gartner
Platform engineering teams need your guidance on how to add managed workload identities to all new workloads and architect modern API access control standards that provide strong identity issuance, authentication, authorization, and federation. In this session, we will chart the path for modern workload IAM with capabilities that do not rely on legacy practices and help developers get to a security-by-designed, "hello, world" as quickly as possible. ... Show More Show Less

... Show More Show Less
Items per page: 19 of 93 Items
1 of 10 Pages

Sorry, no sessions match your criteria. Please refine your filters to display sessions.

“Comprehensive coverage over what many consider to be a niche security topic. Insightful discussion on best practices, major players and up-and-coming solution providers.”

Brian Curl
CISO, Rogers Corporation

Discover what it’s like to experience Gartner IAM Summit.

Learn more about Gartner Identity & Access Management Summit 2025.

Get our latest conference schedules and updates and sent straight to your inbox.

By clicking the "Continue" button, you are agreeing to the Gartner Terms of Use and Privacy Policy.

Contact Information

All fields are required.