All 2025 Conference Sessions

Gartner Identity & Access Management Summit 2025 dives deep into key topics for IAM around program management, agentic AI, optimizing resources and more to help you address your organization's mission-critical challenges.

2025 Conference Theme

Identity at the Core

In the face of geopolitical volatility and economic uncertainties, IAM is at the core of business operations and cybersecurity, ensuring resilience through secure interactions among people, machines and organizations. Gartner Identity & Access Management Summit provides  guidance on building scalable and efficient IAM infrastructures in today's complex environment.

Explore our conference sessions below, all developed with this theme in mind.

Hear from Gartner VP Analyst and Conference Chair, Homan Farahmand, on what makes Gartner Identity & Access Management Summit an essential conference for leaders in the IAM field.

Find Conference Sessions
There are dozens of sessions happening each day. Filter to see sessions that align with your role and interests. After registering for the conference, craft your agenda and book priority sessions — all through Conference Navigator.

Show Filters

Filter Sessions Cancel
Showing 136 Sessions
Clear All
Monday, December 08, 2025

09:30 AM - 10:15 AM CST

Gartner Opening Keynote: Identity at the Core

Michael Kelley, Sr Director Analyst, Gartner
Akif Khan, VP Analyst, Gartner
Identity and access management is at the core of modern business. Shaped by both internal and external forces, IAM is now a key capability that businesses need to compete and thrive - from securing the use of AI agents to safely enabling competitive customer experiences. However, its importance is not always recognised, and IAM leaders must work to address this. Developing and leading a resilient IAM function must now be a central tenet of any IAM team's strategy in order to confidently anchor the business from the core. ... Show More Show Less

10:30 AM - 10:50 AM CST

PlainID: Anatomy of an AI Breach: A Real-life Look at Agentic Access Control Failure

This session deconstructs the anatomy of these new AI-driven security failures. We will look at traditional approaches and the gaps left across the entire AI lifecycle, grounding the analysis in a case study from a Fortune 500 professional services company that extended its strong authorization framework across its agentic AI enterprise systems. Discuss a practical playbook: a modern, Zero Trust framework for governing the entire AI workflow. ... Show More Show Less

10:30 AM - 10:50 AM CST

Axiomatics: Zero Trust for AI - The Many Facets of Access Control for MCP, Agents, Bots, and more

David Brossard, CHIEF TECHNOLOGY OFFICER, Axiomatics
AI is revolutionizing work, creating opportunities, and boosting customer experiences. With great power comes an even greater need to secure access to the data & services we’re now running with the help of AI. How do you make sure your team gets the right insights without peeking into data they’re not entitled to? We will show how runtime authorization can help and provide attendees with a roadmap to secure the use of AI within the enterprise. ... Show More Show Less

11:00 AM - 11:45 AM CST

Ask the Expert: How to Adopt Decentralized Identity and Verifiable Credentials

Homan Farahmand, VP Analyst, Gartner
Decentralized identity and verifiable credentials technology and architecture are continuously evolving. However, adoption can be challenging. In this session, we address your questions about adoption issues, including practical use cases, ecosystem modeling, governance frameworks, and technology maturity and evaluation. ... Show More Show Less

11:00 AM - 11:30 AM CST

Guidance for Successful Privileged Access Management Deployment

Abhyuday Data, Director Analyst, Gartner
In this breakout session, we'll explore the critical importance of privileged access management (PAM), its essential objectives and how to reap out the right benefits from a PAM implementation . We'll discuss how to adapt your internal processes and operating model to effectively support PAM tools and provide strategies to enhance your PAM maturity. ... Show More Show Less

11:00 AM - 11:30 AM CST

Guidance for Workforce Identity Verification

James Hoover, Sr Principal Analyst, Gartner
Where and how should IDV be incorporated into workforce IAM? What technical and cultural considerations must be taken into account that are unique from regulatory or compliance IDV scenarios. ... Show More Show Less

11:00 AM - 11:45 AM CST

Peer Meetup: IAM in Public Sector

Come together for a discussion with peers to discuss best practices and challenges around IAM in the Public Sector. Peer Meetups are networking sessions that allow you to connect and share with a small group of your peers, without Gartner facilitation. Please make every effort to attend your Peer Meetup as other attendees will be looking forward to meeting with you. ... Show More Show Less

11:00 AM - 12:30 PM CST

Workshop: How to Build and Execute an Effective RFP for IGA

Brian Guthrie, Director Analyst, Gartner
This workshop will help you by practically taking you through the stages of preparing the RFP for an identity governance and administration product. Attendees will leave with a practical approach to a successful RFP. ... Show More Show Less

11:00 AM - 11:30 AM CST

High-Value AI Use Cases for IAM

Nathan Harris, Sr Director Analyst, Gartner
While AI holds the promise for automation and efficiency, not all IAM use cases are equally suited for AI enablement. This session will walk through Gartner research related to AI for IAM use cases, including agentic AI, and help IAM leaders focus AI adoption plans on the most beneficial use cases. ... Show More Show Less

... Show More Show Less
Items per page: 19 of 136 Items
1 of 15 Pages

Sorry, no sessions match your criteria. Please refine your filters to display sessions.

“Comprehensive coverage over what many consider to be a niche security topic. Insightful discussion on best practices, major players and up-and-coming solution providers.”

Brian Curl
CISO, Rogers Corporation

Discover what it’s like to experience Gartner IAM Summit.

Learn more about Gartner Identity & Access Management Summit 2025.

Get our latest conference schedules and updates and sent straight to your inbox.

By clicking the "Continue" button, you are agreeing to the Gartner Terms of Use and Privacy Policy.

Contact Information

All fields are required.