All 2025 Conference Sessions

Gartner Identity & Access Management Summit 2025 dives deep into key topics for IAM around program management, agentic AI, optimizing resources and more to help you address your organization's mission-critical challenges.

2025 Conference Theme

Identity at the Core

In the face of geopolitical volatility and economic uncertainties, IAM is at the core of business operations and cybersecurity, ensuring resilience through secure interactions among people, machines and organizations. Gartner Identity & Access Management Summit provides  guidance on building scalable and efficient IAM infrastructures in today's complex environment.

Explore our conference sessions below, all developed with this theme in mind.

Hear from Gartner VP Analyst and Conference Chair, Homan Farahmand, on what makes Gartner Identity & Access Management Summit an essential conference for leaders in the IAM field.

Find Conference Sessions
There are dozens of sessions happening each day. Filter to see sessions that align with your role and interests. After registering for the conference, craft your agenda and book priority sessions — all through Conference Navigator.

Show Filters

Filter Sessions Cancel
Showing 11 Sessions
Clear All
Monday, December 08, 2025

11:00 AM - 11:30 AM CST

High-Value AI Use Cases for IAM

Nathan Harris, Sr Director Analyst, Gartner
While AI holds the promise for automation and efficiency, not all IAM use cases are equally suited for AI enablement. This session will walk through Gartner research related to AI for IAM use cases, including agentic AI, and help IAM leaders focus AI adoption plans on the most beneficial use cases. ... Show More Show Less

02:30 PM - 03:00 PM CST

Enhance Security and Resiliency by Extending the Discipline of ITDR

Mary Ruddy, Distinguished VP Analyst, Gartner
Identity Threat Detection and Response is a discipline that brings a security mindset to protecting the core identity infrastructure itself. In this session, we will discuss extending these concepts to protecting more of your organization's digital assets. ... Show More Show Less

02:30 PM - 03:15 PM CST

Ask the Expert: How to Assess IAM Architecture as a System of Systems

Homan Farahmand, VP Analyst, Gartner
To reduce inefficiency and risk, identity architects need a comprehensive strategy that addresses technical debt and integrates point solutions. In this session we answer your questions about assessing your IAM architecture to support zero-trust initiatives and enhance systems interoperability. ... Show More Show Less

04:00 PM - 04:30 PM CST

Accelerate IAM Value Delivery Using Data Management

Nathan Harris, Sr Director Analyst, Gartner
IAM is a data-heavy and/or data-dependent discipline, yet most programs lack a dedicated focus on data management and engineering. This session will outline top practices for IAM programs to improve overall capabilities using data management top practices. ... Show More Show Less

07:00 PM - 07:20 PM CST

SpecterOps: Attackers are bypassing your identity controls. Learn what + how to fix.

Jared Atkinson, CHIEF TECHNOLOGY OFFICER, SPECTEROPS
Justin Kohler, CHIEF PRODUCT OFFICER, SpecterOps
Recent breaches show how quickly attackers can pivot from on-prem to cloud to threaten the enterprise and bypass security controls like PAM, CAP and ITDR. In this session, we’ll explain the inexplicable advantage the attacker seems to have and how to use the same attack path mapping practice as part of your identity-first security strategy. By visualizing the attacker’s map, IAM leaders can remove the attacker’s advantage and retake control. ... Show More Show Less
Tuesday, December 09, 2025

12:00 PM - 12:45 PM CST

Ask the Expert: How to Improve Data Management for IAM

Nathan Harris, Sr Director Analyst, Gartner
While understanding and acceptance that IAM is very a data-driven discipline is growing, many IAM program remain challenged in regard to achieving sufficient levels of visibility and data quality to deliver strong security and business enablement results. This interactive session is an opportunity for participants to ask questions of a Gartner expert with expertise in data management and engineering top practices specifically for IAM programs/teams. ... Show More Show Less

02:45 PM - 03:15 PM CST

Axiad: Quantify Identity RiskMitigation & Financial Impact now, PQC Ready Tomorrow

Identity risk spans humans and machines, yet most organizations struggle to see and quantify the risk. Join this expert panel on how to free up resources, get budget, and improve security with practical insights on:
• Visibility Across Human & Non-Human Identities
• Quantified Identity Risk Scoring
• Identity Risk Financial Modeling with FAIR
• Automated Prioritization & Mitigation
• PKI, Certificates, and PQC Readiness
... Show More Show Less

03:45 PM - 04:15 PM CST

Protect Your Organization by Prioritizing IAM Hygiene

Rebecca Archambault, Sr Director Analyst, Gartner
Conventional identity and access management and security preventive controls are insufficient to protect identity systems from attack. To enhance cyberattack preparedness, security and risk management leaders face challenges in visualizing and prioritizing IAM hygiene, leaving their organizations vulnerable to credential compromise and breaches. This session focuses on the prevention lane of ITDR and provides guidelines around accountability of risk along with how to best prioritize remediation tasks. ... Show More Show Less

04:30 PM - 05:00 PM CST

Technical Insights: Workload Identity Management - Resolve IAM Technical Debt

Erik Wahlstrom, VP Analyst, Gartner
How do I discover, monitor, and manage my workload identities and their associated accounts and credentials? In this session, we will discuss the process, the evolving toolset, how to identify your blind spots and what type of tool is fit for purpose. ... Show More Show Less

... Show More Show Less
Items per page: 19 of 11 Items
1 of 1 Pages

Sorry, no sessions match your criteria. Please refine your filters to display sessions.

“Comprehensive coverage over what many consider to be a niche security topic. Insightful discussion on best practices, major players and up-and-coming solution providers.”

Brian Curl
CISO, Rogers Corporation

Discover what it’s like to experience Gartner IAM Summit.

Learn more about Gartner Identity & Access Management Summit 2025.

Get our latest conference schedules and updates and sent straight to your inbox.

By clicking the "Continue" button, you are agreeing to the Gartner Terms of Use and Privacy Policy.

Contact Information

All fields are required.