October 27, 2016 By Anna Seacat 2 min read

The 2016 Gartner Identity & Access Management Summit will be held from Nov. 29 to Dec. 1 at Caesars Palace in Las Vegas. The agenda has been recently updated and is packed full of exciting sessions, fun networking experiences and valuable learning events.

Four Can’t-Miss Events at the 2016 Gartner IAM Summit

Below are a few Gartner IAM Summit experiences you won’t want to miss.

1. Lunch & Learn

This event is for chief information security officers (CISOs), chief technology officers (CTOs), chief information officers (CIOs) or anyone who answers to them. Do you know everything you need to know about cloud-based identity and access management? If not, come and enjoy a delicious lunch while you learn the “6 Things Every CISO Should Know About IDaaS.”

Our Lunch & Learn takes place on Tuesday, Nov. 29, from 11:45 a.m. to 12:15 p.m. in the Octavius 7 room.

2. Free 30-Minute IAM Services Consultation

There is no better place or time to get answers to your IAM questions than at the Gartner IAM Summit. Catching a moment of an expert’s time, however, can be a challenge. Luckily, IBM is offering free 30-minute consultations with leading experts in the field.

Ready to reserve a time for your private consultation? Stop by the IBM Security booth No. 301 anytime from Tuesday, Nov. 29 to Thursday, Dec. 1.

3. Must-Attend Solution Provider Session

Join this lively discussion with IAM experts who will answer two seemingly simple questions about your users: Who are they and what are they doing? The theme guiding this discussion will be “Security Starts With People.” Topics covered will include IAM security expertise, actionable intelligence and emerging technologies.

You can attend this session at the Gartner IAM Summit on Wednesday, Nov. 30, at 3:15 p.m. in the August III room.

4. The Most-Coveted Swag Bag at the Gartner IAM Summit 2016

Who needs one more stress ball? Flimsy sunglasses, anyone? Pass on those cheap trinkets and run to the IBM Security booth, where the first 100 people to fill in the blank below will get a free IDaaS Success Kit:

IBM Cloud Identity Service can reduce your IAM costs up to ____ percent. Need a hint? Watch this short Cloud IAM video for the answer.

Tickets are in limited supply, so reserve yours before they’re gone! You can get your IDaaS Success Kit at the IBM Security booth No. 301 from Tuesday, Nov. 29 to Thursday, Dec. 1.

Assess Your IAM Needs in Mere Minutes

More from Identity & Access

Another category? Why we need ITDR

5 min read - Technologists are understandably suffering from category fatigue. This fatigue can be more pronounced within security than in any other sub-sector of IT. Do the use cases and risks of today warrant identity threat detection and response (ITDR)? To address this question, we work backwards from the vulnerabilities, threats, misconfigurations and attacks that IDTR specializes in providing visibility into. As identity threat detection and response (ITDR) technology evolves, one of the most common queries we get is: “Why do we need…

Access control is going mobile — Is this the way forward?

2 min read - Last year, the highest volume of cyberattacks (30%) started in the same way: a cyber criminal using valid credentials to gain access. Even more concerning, the X-Force Threat Intelligence Index 2024 found that this method of attack increased by 71% from 2022. Researchers also discovered a 266% increase in infostealers to obtain credentials to use in an attack. Family members of privileged users are also sometimes victims.“These shifts suggest that threat actors have revalued credentials as a reliable and preferred…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today