February 23, 2017 By Anna Seacat 2 min read

On March 6 and 7, 2017, Gartner will host its European Identity & Access Management Summit at the Park Plaza Westminster Bridge Hotel in London. The exciting agenda will cover foundational strategies in identity and access management (IAM), ways to enhance and advance your IAM program, IAM in the digital age and much more.

Top Three Attractions at the Gartner IAM Summit

Featured speakers will include IAM experts from IBM Security, who will be giving away swag and educational materials at the IBM booth. Below is a guide to the must-attend sessions and must-have swag at the Gartner IAM Summit.

Watch the on-demand webinar: How to Know if Cloud IAM is Your Perfect Match

1. Learn About IAM-as-a-Service With the Ultimate IDaaS Kit

If you are coming to the Gartner IAM Summit in London to learn more about the agility, security and cost savings of cloud-delivered identity and access management, don’t pass up the chance to get your free IDaaS Success Kit at the IBM Security Booth.

2. Learn How to Reduce Organizational Risk With IAM Expertise and Actionable Intelligence

Your IAM solution is the cornerstone of your security program because it can answer two critical questions about your users: “Who are they?” and “What are they doing?”

Security experts from IBM will discuss these key questions and how to protect your organization from insider threats in this must-attend session.

3. Learn About IAM’s Important Role in GDPR Compliance

May 25, 2018 is right around the corner, and the heat is on for organizations that are bound to adhere to the European Union’s General Data Protection Regulation (GDPR). Don’t miss this roundtable discussion with IBM Security experts who will discuss how IAM-related controls will play an important role in meeting the new law’s requirements.

  • Session title: “GDPR: The Heat Is on…Yes…but…What’s the IAM Role in It?”
  • Date: March 7, 2017
  • Time: 14:20 to 15:05
  • Speakers: Andrea Rossi, Sridhar Muppidi

Start Your Cloud IAM Journey Today

Can’t make it to the Gartner IAM Summit in London this year? Not to worry! You can watch our on-demand webinar to start learning more about cloud-delivered IAM today.

More from Identity & Access

Access control is going mobile — Is this the way forward?

2 min read - Last year, the highest volume of cyberattacks (30%) started in the same way: a cyber criminal using valid credentials to gain access. Even more concerning, the X-Force Threat Intelligence Index 2024 found that this method of attack increased by 71% from 2022. Researchers also discovered a 266% increase in infostealers to obtain credentials to use in an attack. Family members of privileged users are also sometimes victims.“These shifts suggest that threat actors have revalued credentials as a reliable and preferred…

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

Obtaining security clearance: Hurdles and requirements

3 min read - As security moves closer to the top of the operational priority list for private and public organizations, needing to obtain a security clearance for jobs is more commonplace. Security clearance is a prerequisite for a wide range of roles, especially those related to national security and defense.Obtaining that clearance, however, is far from simple. The process often involves scrutinizing one’s background, financial history and even personal character. Let’s briefly explore some of the hurdles, expectations and requirements of obtaining a…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today