February 23, 2017 By Anna Seacat 2 min read

On March 6 and 7, 2017, Gartner will host its European Identity & Access Management Summit at the Park Plaza Westminster Bridge Hotel in London. The exciting agenda will cover foundational strategies in identity and access management (IAM), ways to enhance and advance your IAM program, IAM in the digital age and much more.

Top Three Attractions at the Gartner IAM Summit

Featured speakers will include IAM experts from IBM Security, who will be giving away swag and educational materials at the IBM booth. Below is a guide to the must-attend sessions and must-have swag at the Gartner IAM Summit.

Watch the on-demand webinar: How to Know if Cloud IAM is Your Perfect Match

1. Learn About IAM-as-a-Service With the Ultimate IDaaS Kit

If you are coming to the Gartner IAM Summit in London to learn more about the agility, security and cost savings of cloud-delivered identity and access management, don’t pass up the chance to get your free IDaaS Success Kit at the IBM Security Booth.

2. Learn How to Reduce Organizational Risk With IAM Expertise and Actionable Intelligence

Your IAM solution is the cornerstone of your security program because it can answer two critical questions about your users: “Who are they?” and “What are they doing?”

Security experts from IBM will discuss these key questions and how to protect your organization from insider threats in this must-attend session.

3. Learn About IAM’s Important Role in GDPR Compliance

May 25, 2018 is right around the corner, and the heat is on for organizations that are bound to adhere to the European Union’s General Data Protection Regulation (GDPR). Don’t miss this roundtable discussion with IBM Security experts who will discuss how IAM-related controls will play an important role in meeting the new law’s requirements.

  • Session title: “GDPR: The Heat Is on…Yes…but…What’s the IAM Role in It?”
  • Date: March 7, 2017
  • Time: 14:20 to 15:05
  • Speakers: Andrea Rossi, Sridhar Muppidi

Start Your Cloud IAM Journey Today

Can’t make it to the Gartner IAM Summit in London this year? Not to worry! You can watch our on-demand webinar to start learning more about cloud-delivered IAM today.

More from Identity & Access

From federation to fabric: IAM’s evolution

15 min read - In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that process (technically possible, not always advisable). But what is the next step in our evolution towards greater interoperability between our applications, services and systems?Identity and…

X-Force Threat Intelligence Index 2024 reveals stolen credentials as top risk, with AI attacks on the horizon

4 min read - Every year, IBM X-Force analysts assess the data collected across all our security disciplines to create the IBM X-Force Threat Intelligence Index, our annual report that plots changes in the cyber threat landscape to reveal trends and help clients proactively put security measures in place. Among the many noteworthy findings in the 2024 edition of the X-Force report, three major trends stand out that we’re advising security professionals and CISOs to observe: A sharp increase in abuse of valid accounts…

Web injections are back on the rise: 40+ banks affected by new malware campaign

8 min read - Web injections, a favored technique employed by various banking trojans, have been a persistent threat in the realm of cyberattacks. These malicious injections enable cyber criminals to manipulate data exchanges between users and web browsers, potentially compromising sensitive information. In March 2023, security researchers at IBM Security Trusteer uncovered a new malware campaign using JavaScript web injections. This new campaign is widespread and particularly evasive, with historical indicators of compromise (IOCs) suggesting a possible connection to DanaBot — although we…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today