All 2025 Conference Sessions

Gartner Identity & Access Management Summit 2025 dives deep into key topics for IAM around program management, agentic AI, optimizing resources and more to help you address your organization's mission-critical challenges.

2025 Conference Theme

Identity at the Core

In the face of geopolitical volatility and economic uncertainties, IAM is at the core of business operations and cybersecurity, ensuring resilience through secure interactions among people, machines and organizations. Gartner Identity & Access Management Summit provides  guidance on building scalable and efficient IAM infrastructures in today's complex environment.

Explore our conference sessions below, all developed with this theme in mind.

Hear from Gartner VP Analyst and Conference Chair, Homan Farahmand, on what makes Gartner Identity & Access Management Summit an essential conference for leaders in the IAM field.

Find Conference Sessions
There are dozens of sessions happening each day. Filter to see sessions that align with your role and interests. After registering for the conference, craft your agenda and book priority sessions — all through Conference Navigator.

Show Filters

Filter Sessions Cancel
Showing 11 Sessions
Clear All
Monday, December 08, 2025

11:00 AM - 11:30 AM CST

Guidance for Successful Privileged Access Management Deployment

Abhyuday Data, Director Analyst, Gartner
In this breakout session, we'll explore the critical importance of privileged access management (PAM), its essential objectives and how to reap out the right benefits from a PAM implementation . We'll discuss how to adapt your internal processes and operating model to effectively support PAM tools and provide strategies to enhance your PAM maturity. ... Show More Show Less

12:30 PM - 01:15 PM CST

Ask the Expert: How to Modernize Machine IAM?

Steve Wessels, Director Analyst, Gartner
Current machine identity and access management (IAM) practices are fragmented and insufficient, leading to potential security and compliance risks. To address these challenges, IAM leaders should enhance and unify their existing approaches to better secure machine identities. Additionally, it is essential to modernize machine IAM practices in collaboration with all stakeholders, emphasizing just-in-time credentialing, proactive management of technology debt, and continuous monitoring to safeguard critical assets. ... Show More Show Less

02:30 PM - 03:15 PM CST

Ask the Expert: How to Assess IAM Architecture as a System of Systems

Homan Farahmand, VP Analyst, Gartner
To reduce inefficiency and risk, identity architects need a comprehensive strategy that addresses technical debt and integrates point solutions. In this session we answer your questions about assessing your IAM architecture to support zero-trust initiatives and enhance systems interoperability. ... Show More Show Less
Tuesday, December 09, 2025

10:30 AM - 11:15 AM CST

Ask the Expert: Understanding Cloud Providers' IAM Capabilities to Enhance Cybersecurity Controls

Yemi Davies, Director Analyst, Gartner
IAM is crucial yet complex in cloud security. AWS, Azure, and GCP each use distinct IAM models, requiring leaders to navigate varying tools, terms, and limits. Mastery of each provider’s IAM approach is key to securing access across diverse cloud environments. ... Show More Show Less

12:00 PM - 12:30 PM CST

Technical Insights: How to Manage Admin Privileges on Endpoints

Gautham Mudra, Sr Director Analyst, Gartner
Unrestricted local admin rights on Windows, Unix/Linux, MacOS endpoints present a huge attack surface posing significant cybersecurity risks. This presentation provides operational guidance to identity architects to manage endpoint privileges and address concerns about increased friction and productivity loss. ... Show More Show Less

02:00 PM - 02:30 PM CST

Market Insights for Privileged Access Management

Abhyuday Data, Director Analyst, Gartner
This session will provide insights into the latest updates on the Magic Quadrant and Critical Capabilities for the privileged access management market. Show Less

03:45 PM - 04:30 PM CST

Ask the Expert: How to Integrate IGA With PAM, Access Management and CSPs

Gautham Mudra, Sr Director Analyst, Gartner
IGA that is siloed from other identity and access management components impacts the quality of governance. Identity architects must integrate IGA with other IAM components, such as access management, privileged access management and cloud infrastructure to enable centralized governance. ... Show More Show Less
Wednesday, December 10, 2025

10:30 AM - 12:00 PM CST

Workshop: Mastering the PAM Critical Capabilities and Developing a Vendor Short List

This workshop will walk attendees through the critical capabilities of PAM tools as described in Gartner's research report in order to better understand their applicability to their organizations requirements. We will then review the PAM MQ vendors strengths and weaknesses to develop a short list for further evaluation. Attendees will walk away with a solid understanding of critical capabilities and have identified a short list of vendors to consider for subsequent evaluation and selection. ... Show More Show Less

12:00 PM - 12:45 PM CST

Ask the Expert: How to Get Started With PAM?

Michael Kelley, Sr Director Analyst, Gartner
Are you just beginning on your journey to PAM? Join a panel of peers and a Gartner expert to discuss strategies, and things that worked and didn't work. Show Less

... Show More Show Less
Items per page: 19 of 11 Items
1 of 1 Pages

Sorry, no sessions match your criteria. Please refine your filters to display sessions.

“Comprehensive coverage over what many consider to be a niche security topic. Insightful discussion on best practices, major players and up-and-coming solution providers.”

Brian Curl
CISO, Rogers Corporation

Discover what it’s like to experience Gartner IAM Summit.

Learn more about Gartner Identity & Access Management Summit 2025.

Get our latest conference schedules and updates and sent straight to your inbox.

By clicking the "Continue" button, you are agreeing to the Gartner Terms of Use and Privacy Policy.

Contact Information

All fields are required.