All 2025 Conference Sessions

Gartner Identity & Access Management Summit 2025 dives deep into key topics for IAM around program management, agentic AI, optimizing resources and more to help you address your organization's mission-critical challenges.

2025 Conference Theme

Identity at the Core

In the face of geopolitical volatility and economic uncertainties, IAM is at the core of business operations and cybersecurity, ensuring resilience through secure interactions among people, machines and organizations. Gartner Identity & Access Management Summit provides  guidance on building scalable and efficient IAM infrastructures in today's complex environment.

Explore our conference sessions below, all developed with this theme in mind.

Hear from Gartner VP Analyst and Conference Chair, Homan Farahmand, on what makes Gartner Identity & Access Management Summit an essential conference for leaders in the IAM field.

Find Conference Sessions
There are dozens of sessions happening each day. Filter to see sessions that align with your role and interests. After registering for the conference, craft your agenda and book priority sessions — all through Conference Navigator.

Show Filters

Filter Sessions Cancel
Showing 18 Sessions
Clear All
Monday, December 08, 2025

11:00 AM - 12:30 PM CST

Workshop: How to Build and Execute an Effective RFP for IGA

Brian Guthrie, Director Analyst, Gartner
This workshop will help you by practically taking you through the stages of preparing the RFP for an identity governance and administration product. Attendees will leave with a practical approach to a successful RFP. ... Show More Show Less

11:45 AM - 12:15 PM CST

DigiCert: How PKI and IAM Can Save the Digital World

The world of IAM depends on PKI as a cornerstone of intelligent trust to provide secure interactions for all digital identities. But AI and quantum computing are changing the game for both. Join DigiCert to learn how you can:
-Modernize your PKI with automation for security, resiliency, and scale
-Combine the best of both PKI and IAM worlds to thrive in a post-quantum, AI-powered world.
... Show More Show Less

01:40 PM - 02:00 PM CST

Fischer Identity: Future-Proofing Identity Programs for a Volatile Digital World

Mark Cox, AVP, IAM STRATEGIC ADVISORY SERVICES, Fischer Identity
In today’s volatile and AI-driven environment, identity is the foundation of business resilience. As organizations modernize, the ability to adapt quickly without sacrificing governance or compliance is key. This session explores how future-ready IAM programs leverage automation, data accuracy, and intelligent policy design to strengthen security, enable agility, and sustain operational continuity. ... Show More Show Less

02:05 PM - 02:25 PM CST

Opal Security: Governing Agents, Machines, and Humans in the Age of AI

As AI coding assistants and autonomous agents gain deeper access to source control, CI/CD pipelines, and production systems, code itself is becoming an identity—an untracked actor capable of exfiltration, impersonation, or privilege escalation. Drawing from work with AI-forward enterprises, this session explores how to govern these agentic identities across their full lifecycle using policy-as-code, just-in-time, and human-in-the-loop frameworks. ... Show More Show Less

02:30 PM - 03:15 PM CST

Ask the Expert: How to Assess IAM Architecture as a System of Systems

Homan Farahmand, VP Analyst, Gartner
To reduce inefficiency and risk, identity architects need a comprehensive strategy that addresses technical debt and integrates point solutions. In this session we answer your questions about assessing your IAM architecture to support zero-trust initiatives and enhance systems interoperability. ... Show More Show Less

02:30 PM - 03:00 PM CST

Technical Insights: Best Practices for Improving IGA Access Certification

Gautham Mudra, Sr Director Analyst, Gartner
Implementing best practices for access certification can reduce certification fatigue, minimize security breaches and enhance compliance posture. This presentation will enable identity architects to centralize IGA controls and improve access certification outcomes. ... Show More Show Less

03:15 PM - 03:45 PM CST

SailPoint Technologies: Charting the course: Adaptive identity for a dynamic world

Identity security is a dynamic challenge requiring an adaptive approach. Learn how identity, data and security enable continuous risk assessment, fine-tuned access, and real-time responses. Join SailPoint and a leading customer to explore strategies and real-world stories of adaptive identity in action. Gain insights and tools to strengthen security, streamline practices, and future-proof your organization. ... Show More Show Less

04:00 PM - 04:45 PM CST

Ask the Expert: Microsoft 365 Copilot — How to Manage Adoption and Governance Challenges

Max Goss, Sr Director Analyst, Gartner
Microsoft 365 Copilot continues to be one of the most talked about GenAI solutions. But while many are piloting it, less are looking to scale it across their organization. Join this interactive session to understand the current adoption and governance challenges, and learn the best practices to overcome them. ... Show More Show Less

04:00 PM - 04:30 PM CST

Workforce IAM Begins with Candidates and HR

Emi Chiba, Sr Principal Analyst, Gartner
Candidate fraud is on the rise, with remote IT roles most at risk. This is a problem not only for organizational security, but for IAM leaders as hiring managers. This session provides practical guidance on how to respond and collaborate with HR to strengthen workforce IAM from candidacy through employment. ... Show More Show Less

... Show More Show Less
Items per page: 19 of 18 Items
1 of 2 Pages

Sorry, no sessions match your criteria. Please refine your filters to display sessions.

“Comprehensive coverage over what many consider to be a niche security topic. Insightful discussion on best practices, major players and up-and-coming solution providers.”

Brian Curl
CISO, Rogers Corporation

Discover what it’s like to experience Gartner IAM Summit.

Learn more about Gartner Identity & Access Management Summit 2025.

Get our latest conference schedules and updates and sent straight to your inbox.

By clicking the "Continue" button, you are agreeing to the Gartner Terms of Use and Privacy Policy.

Contact Information

All fields are required.