On March 6 and 7, 2017, Gartner will host its European Identity & Access Management Summit at the Park Plaza Westminster Bridge Hotel in London. The exciting agenda will cover foundational strategies in identity and access management (IAM), ways to enhance and advance your IAM program, IAM in the digital age and much more.

Top Three Attractions at the Gartner IAM Summit

Featured speakers will include IAM experts from IBM Security, who will be giving away swag and educational materials at the IBM booth. Below is a guide to the must-attend sessions and must-have swag at the Gartner IAM Summit.

Watch the on-demand webinar: How to Know if Cloud IAM is Your Perfect Match

1. Learn About IAM-as-a-Service With the Ultimate IDaaS Kit

If you are coming to the Gartner IAM Summit in London to learn more about the agility, security and cost savings of cloud-delivered identity and access management, don’t pass up the chance to get your free IDaaS Success Kit at the IBM Security Booth.

2. Learn How to Reduce Organizational Risk With IAM Expertise and Actionable Intelligence

Your IAM solution is the cornerstone of your security program because it can answer two critical questions about your users: “Who are they?” and “What are they doing?”

Security experts from IBM will discuss these key questions and how to protect your organization from insider threats in this must-attend session.

3. Learn About IAM’s Important Role in GDPR Compliance

May 25, 2018 is right around the corner, and the heat is on for organizations that are bound to adhere to the European Union’s General Data Protection Regulation (GDPR). Don’t miss this roundtable discussion with IBM Security experts who will discuss how IAM-related controls will play an important role in meeting the new law’s requirements.

  • Session title: “GDPR: The Heat Is on…Yes…but…What’s the IAM Role in It?”
  • Date: March 7, 2017
  • Time: 14:20 to 15:05
  • Speakers: Andrea Rossi, Sridhar Muppidi

Start Your Cloud IAM Journey Today

Can’t make it to the Gartner IAM Summit in London this year? Not to worry! You can watch our on-demand webinar to start learning more about cloud-delivered IAM today.

More from Cloud Security

Is Your Critical SaaS Data Secure?

4 min read - Increasingly sophisticated adversaries create a significant challenge as organizations increasingly use Software-as-a-Service (SaaS), Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS) to deliver applications and services. This mesh of cloud-based applications and services creates new complexities for security teams. But attackers need only one success, while defenders need to succeed 100% of the time. Organizations are contending with an exponential rise in advanced threats that are not only increasing in volume but also sophistication. The IBM Cost of Data Breach Report 2022 found…

4 min read

Rationalizing Your Hybrid Cloud Security Tools

3 min read - As cyber incidents rise and threat landscapes widen, more security tools have emerged to protect the hybrid cloud ecosystem. As a result, security leaders must rapidly assess their hybrid security tools to move toward a centralized toolset and optimize cost without compromising their security posture. Unfortunately, those same leaders face a variety of challenges. One of these challenges is that many security solutions create confusion and provide a false sense of security. Another is that multiple tools provide duplication coverage…

3 min read

New Generation of Phishing Hides Behind Trusted Services

4 min read - The days when email was the main vector for phishing attacks are long gone. Now, phishing attacks occur on SMS, voice, social media and messaging apps. They also hide behind trusted services like Azure and AWS. And with the expansion of cloud computing, even more Software-as-a-Service (SaaS) based phishing schemes are possible. Phishing tactics have evolved faster than ever, and the variety of attacks continues to grow. Security pros need to be aware. SaaS to SaaS Phishing Instead of building…

4 min read

The Importance of Modern-Day Data Security Platforms

4 min read - Data is the backbone of businesses and companies everywhere. Data can range from intellectual property to critical business plans to personal health information or even money itself. At the end of the day, businesses are looking to grow revenue, innovate, and operationalize but to do that, they must ensure that they leverage their data first because of how important and valuable it is to their organization. No matter the industry, the need to protect sensitive and personal data should be…

4 min read