All 2025 Conference Sessions

Gartner Identity & Access Management Summit 2025 dives deep into key topics for IAM around program management, agentic AI, optimizing resources and more to help you address your organization's mission-critical challenges.

2025 Conference Theme

Identity at the Core

In the face of geopolitical volatility and economic uncertainties, IAM is at the core of business operations and cybersecurity, ensuring resilience through secure interactions among people, machines and organizations. Gartner Identity & Access Management Summit provides  guidance on building scalable and efficient IAM infrastructures in today's complex environment.

Explore our conference sessions below, all developed with this theme in mind.

Hear from Gartner VP Analyst and Conference Chair, Homan Farahmand, on what makes Gartner Identity & Access Management Summit an essential conference for leaders in the IAM field.

Find Conference Sessions
There are dozens of sessions happening each day. Filter to see sessions that align with your role and interests. After registering for the conference, craft your agenda and book priority sessions — all through Conference Navigator.

Show Filters

Filter Sessions Cancel
Showing 15 Sessions
Clear All
Monday, December 08, 2025

11:00 AM - 11:30 AM CST

Guidance for Successful Privileged Access Management Deployment

Abhyuday Data, Director Analyst, Gartner
In this breakout session, we'll explore the critical importance of privileged access management (PAM), its essential objectives and how to reap out the right benefits from a PAM implementation . We'll discuss how to adapt your internal processes and operating model to effectively support PAM tools and provide strategies to enhance your PAM maturity. ... Show More Show Less

12:30 PM - 01:15 PM CST

Ask the Expert: How to Modernize Machine IAM?

Steve Wessels, Director Analyst, Gartner
Current machine identity and access management (IAM) practices are fragmented and insufficient, leading to potential security and compliance risks. To address these challenges, IAM leaders should enhance and unify their existing approaches to better secure machine identities. Additionally, it is essential to modernize machine IAM practices in collaboration with all stakeholders, emphasizing just-in-time credentialing, proactive management of technology debt, and continuous monitoring to safeguard critical assets. ... Show More Show Less

02:30 PM - 03:15 PM CST

Ask the Expert: How to Assess IAM Architecture as a System of Systems

Homan Farahmand, VP Analyst, Gartner
To reduce inefficiency and risk, identity architects need a comprehensive strategy that addresses technical debt and integrates point solutions. In this session we answer your questions about assessing your IAM architecture to support zero-trust initiatives and enhance systems interoperability. ... Show More Show Less

03:15 PM - 03:45 PM CST

BeyondTrust: Maturing Privileged Access for Modern Threats

Morey Haber, CHIEF SECURITY ADVISOR, BeyondTrust
As threats evolve, so does Privileged Access Management (PAM). Modern PAM has evolved into identity security. Identity and user management must mature to meet the demands of cloud, nonhuman identities, and modern attack vectors. It's no longer just about root or admin accounts, but also attacks against identities with a path to privileged access. Join us to explore PAM's evolution and learn the key considerations for securing your organization. ... Show More Show Less
Tuesday, December 09, 2025

10:30 AM - 11:15 AM CST

Ask the Expert: Understanding Cloud Providers' IAM Capabilities to Enhance Cybersecurity Controls

Yemi Davies, Director Analyst, Gartner
IAM is crucial yet complex in cloud security. AWS, Azure, and GCP each use distinct IAM models, requiring leaders to navigate varying tools, terms, and limits. Mastery of each provider’s IAM approach is key to securing access across diverse cloud environments. ... Show More Show Less

11:15 AM - 11:45 AM CST

One Identity: Think AI will solve your IAM challenges? Think again

AI is being marketed as the silver bullet for every enterprise challenge, including IAM. Every vendor claims it will revolutionize your IAM deployment. The truth? It won’t work—or at least, not the way you’re being sold. In this session we will expose why AI struggles in IAM and why blindly trusting AI in IAM is unrealistic. We will also reveal the real role AI can play in todays, next generation IAM framework. ... Show More Show Less

11:15 AM - 11:45 AM CST

CyberArk: Agentic AI Implications to Identity Security and Machine IAM

AI agents are a new identity class—autonomous, often privileged and inheriting risks from humans and machines. CyberArk will explore challenges of agentic AI on identity security, how to secure agentic identities, insights from machine IAM best practices and more. Then McKinsey will share research on agentic AI usage in enterprise organizations, the control frameworks needed to manage them, and how risk management models are evolving in response. ... Show More Show Less

12:00 PM - 12:30 PM CST

Technical Insights: How to Manage Admin Privileges on Endpoints

Gautham Mudra, Sr Director Analyst, Gartner
Unrestricted local admin rights on Windows, Unix/Linux, MacOS endpoints present a huge attack surface posing significant cybersecurity risks. This presentation provides operational guidance to identity architects to manage endpoint privileges and address concerns about increased friction and productivity loss. ... Show More Show Less

02:00 PM - 02:30 PM CST

Market Insights for Privileged Access Management

Abhyuday Data, Director Analyst, Gartner
This session will provide insights into the latest updates on the Magic Quadrant and Critical Capabilities for the privileged access management market. Show Less

... Show More Show Less
Items per page: 19 of 15 Items
1 of 1 Pages

Sorry, no sessions match your criteria. Please refine your filters to display sessions.

“Comprehensive coverage over what many consider to be a niche security topic. Insightful discussion on best practices, major players and up-and-coming solution providers.”

Brian Curl
CISO, Rogers Corporation

Discover what it’s like to experience Gartner IAM Summit.

Learn more about Gartner Identity & Access Management Summit 2025.

Get our latest conference schedules and updates and sent straight to your inbox.

By clicking the "Continue" button, you are agreeing to the Gartner Terms of Use and Privacy Policy.

Contact Information

All fields are required.