All 2025 Conference Sessions

Gartner Identity & Access Management Summit 2025 dives deep into key topics for IAM around program management, agentic AI, optimizing resources and more to help you address your organization's mission-critical challenges.

2025 Conference Theme

Identity at the Core

In the face of geopolitical volatility and economic uncertainties, IAM is at the core of business operations and cybersecurity, ensuring resilience through secure interactions among people, machines and organizations. Gartner Identity & Access Management Summit provides  guidance on building scalable and efficient IAM infrastructures in today's complex environment.

Explore our conference sessions below, all developed with this theme in mind.

Hear from Gartner VP Analyst and Conference Chair, Homan Farahmand, on what makes Gartner Identity & Access Management Summit an essential conference for leaders in the IAM field.

Find Conference Sessions
There are dozens of sessions happening each day. Filter to see sessions that align with your role and interests. After registering for the conference, craft your agenda and book priority sessions — all through Conference Navigator.

Show Filters

Filter Sessions Cancel
Showing 20 Sessions
Clear All
Monday, December 08, 2025

10:30 AM - 10:50 AM CST

Axiomatics: Zero Trust for AI - The Many Facets of Access Control for MCP, Agents, Bots, and more

David Brossard, CHIEF TECHNOLOGY OFFICER, Axiomatics
AI is revolutionizing work, creating opportunities, and boosting customer experiences. With great power comes an even greater need to secure access to the data & services we’re now running with the help of AI. How do you make sure your team gets the right insights without peeking into data they’re not entitled to? We will show how runtime authorization can help and provide attendees with a roadmap to secure the use of AI within the enterprise. ... Show More Show Less

11:00 AM - 11:30 AM CST

High-Value AI Use Cases for IAM

Nathan Harris, Sr Director Analyst, Gartner
While AI holds the promise for automation and efficiency, not all IAM use cases are equally suited for AI enablement. This session will walk through Gartner research related to AI for IAM use cases, including agentic AI, and help IAM leaders focus AI adoption plans on the most beneficial use cases. ... Show More Show Less

11:45 AM - 12:15 PM CST

Ping Identity: Securely Embrace the New Agentic Channel

As AI agents emerge as a new digital channel, identity is the key to unlocking trust, personalization, and seamless engagement. From customer loyalty to digital commerce, organizations must evolve beyond human-only journeys to also enable secure, frictionless experiences for agentic identities.
Join Ping Identity to explore how Identity for AI Agents enables secure, personalized, and frictionless interactions across humans, businesses, and AI.
... Show More Show Less

11:45 AM - 12:15 PM CST

Opti: From Roles to Reasoning: The Dawn of AI-Native IAM

Traditional IAM models - roles, groups, and permissions, were built for manual control, not dynamic enterprise needs. We’ll share lessons from building an AI-native IAM system that enables individualized, context-aware, just-in-time access. Attendees will gain practical insight into agent design, reliability, and how to avoid alert fatigue with precise, auditable access decisions, all based on a real-world case study. ... Show More Show Less

12:30 PM - 01:15 PM CST

Ask the Expert: How to Use Privacy-Enhancing Technologies to Reduce AI Risks

Bernard Woo, VP Analyst, Gartner
The risks of exposing personal data must be mitigated in order to gain the trust of customers and employees over the deployment of AI, particularly tools like GenAI. Participate in this session to ask questions about how privacy-enhancing technologies represent a fundamental set of tools for reducing privacy risks when using or developing AI solutions. ... Show More Show Less

01:15 PM - 01:35 PM CST

Curity: Securing the Non-Human Internet: OAuth in the Age of AI

As AI evolves, actors consuming identities are no longer just humans. Autonomous agents now connect, permissions linger beyond their purpose, and ephemeral processes appear and vanish in an instant. OAuth can adapt to protect privacy, reduce risk, and restore control Join this session to understand how to secure what’s no longer visible, controllable, or even alive. ... Show More Show Less

02:05 PM - 02:25 PM CST

Opal Security: Governing Agents, Machines, and Humans in the Age of AI

As AI coding assistants and autonomous agents gain deeper access to source control, CI/CD pipelines, and production systems, code itself is becoming an identity—an untracked actor capable of exfiltration, impersonation, or privilege escalation. Drawing from work with AI-forward enterprises, this session explores how to govern these agentic identities across their full lifecycle using policy-as-code, just-in-time, and human-in-the-loop frameworks. ... Show More Show Less

02:30 PM - 03:00 PM CST

How AI Innovations Are Transforming the IAM Market

Tarun Rohilla, Director Analyst, Gartner
As IAM reaches a pivotal moment, this presentation explores how AI is revolutionizing this market. Discover how generative AI is transforming human-IAM interactions and learn strategies for constructing access controls tailored for AI agents. Engage with trends like decentralized identity and verifiable credentials that are shaping the future of IAM. Join us to explore advanced topics that will empower you to solve complex IAM challenges and stay ahead in this rapidly evolving market landscape. ... Show More Show Less

07:00 PM - 07:20 PM CST

Sectigo: Automate Certificate Management for the 47-Day Lifecycle Shift.

Digital trust relies on certificates, and automation is now essential as lifespans shrink and complexity grows. With certificate lifespans shrinking to 47 days, organizations face mounting complexity in digital trust management. This session will demonstrate how automation can boost your ROI by up to 4x through a practical 5-step blueprint for full certificate automation and crypto agility for a seamless transition to post-quantum cryptography. ... Show More Show Less

... Show More Show Less
Items per page: 19 of 20 Items
1 of 2 Pages

Sorry, no sessions match your criteria. Please refine your filters to display sessions.

“Comprehensive coverage over what many consider to be a niche security topic. Insightful discussion on best practices, major players and up-and-coming solution providers.”

Brian Curl
CISO, Rogers Corporation

Discover what it’s like to experience Gartner IAM Summit.

Learn more about Gartner Identity & Access Management Summit 2025.

Get our latest conference schedules and updates and sent straight to your inbox.

By clicking the "Continue" button, you are agreeing to the Gartner Terms of Use and Privacy Policy.

Contact Information

All fields are required.