Gartner Identity & Access Management Summit 2015

Transcription

EARLY-BIRDDiscountSave 300 by16 January 2015GartnerIdentity & AccessManagement Summit 201516 – 17 March London, UK gartnerevent.com/eu/iamSuccessful IAM — Simple, Business Driven and SecureKey benefits of attending Simplify your IAM initiatives for greater success Master building a secure yet agile IAM program Fulfil your compliance requirements Anticipate digital-age needs and priorities

Successful IAM — Simple,Business Driven and SecureEstablish an IAM program to advance existing strategies for a digital futureEven well-established identity and access management (IAM) programs struggle with today’s increasinglycomplex implementations that all too often expand far beyond their original scope, strain budgets and failto deliver results. Today, success lies in simplifying IAM initiatives to deliver value as quickly as possible.At Gartner Identity & Access Management Summit 2015, 16 – 17 March, in London, you’ll gain theinsight you need to address difficult and complex IAM issues by laying out the proper foundations,highlighting the opportunities and demonstrating how to tackle old and new challenges alike.Key learnings: Understand the impact of cloud, mobility, social andbig data on IAM and vice versa Learn where and how IAM fits within the larger contextof solving business relevant problems and positioningthe business for success Discover IAM delivery alternatives, their maturity andapplicability for your enterprise Hear best practice use cases and practical advicefor IAM governance that provide real value toyour enterprise Learn to take compliance reporting to the next step byleveraging identity and access intelligence Create a more accountable and transparentorganizational culture for your enterpriseJoin us at Gartner Identity & Access Management Summit 2015 to build an IAM success road mapdefined by business objectives that clear the way for digital-age opportunity.2Who should attendEarn CPE creditsTo see what job titles this Summit is aimedat please visit gartnerevent.com/eu/iam.Advance your professional knowledgeat the IAM Summit and earn CPEcredits from the following organizations:Gartner Identity & Access Management Summit 2015

Registration and pricingNeed more information?3 easy ways to registerVisit gartnerevent.com/eu/iam for:Web: gartnerevent.com/eu/iam Agenda Speakers — Gartner analysts, guest keynotes, case studiesEmail: emea.registration@gartner.com Event approval toolsTelephone: 44 20 88792430 See who’s attendingPricing Sessions mapped to your key priorities Venue information and hotel discountEarly-bird price: 2,150 VAT(ends 16 January 2015)Standard Price: 2,475 VATKeynotesPublic Sector Price: 1,950 VATGuest Keynote: ‘Musical Implementation Strategy’ —A Disruptive Method of Simplification!Miha has gone through so many years of performing experience andresearch to invent his science of translating the process of amasterpiece, into a leadership journey, to help managers to look atdilemmas and challenges of their daily work from a fresh and differentperspective. Miha’s main objective during his presentation will be to ensure thatdelegates experience — through the music — how to lead the change processtowards a desired goal, and discover the right strategy for overcoming resistance.A Gartner ticket covers both days of theSummit. Contact your account manager oremail emea.events@gartner.com toregister using a ticket.Gartner clientsMiha Pogacnik, World Recognized celebrity Speaker, classical concert Violinist,Entrepreneur, cultural Ambassador and Leadership GuruGartner Opening Keynote: Stop the Finger-Pointing: The IAM Role EcosystemFrom Voltaire on, great thinkers have realized that striving for the ideal needlesslydistracts us from finding workable solutions that meet most of our needs. As digitalbusiness massively drives up the scale and complexity of IT, seeking the perfectIAM solution becomes even more futile. This session looks at the issues from theviewpoints of the IAM leader, the consultant and the vendor, and identifies thesimple approaches that can deliver significant business value within realisticbudgets and timescales.Felix Gaehtgens, Brian Iverson, Steve Krapes, Lori Robinson and Ray WagnerWHY AttEnD A GARtnER EVEnt?Build a successful strategy Get validation from Gartneranalysts Meet with suppliers tosupport your tactical planningExpand your peer network Innovate and problem-solvewith like-minded peers Join the largest, mostinfluential network of its kindGrow in your role Get content and solutionsthat are most relevant to youWHAt MAKEs GARtnER EVEnts unIQuE?Our analysts Analyst-led presentations Analyst one-on-oneconsultations Analyst-facilitatedroundtablesGroup rate discountMaximize learning by participating togetherin relevant sessions or splitting up to covermore topics, sharing your session takeaways later.Complimentary registrations: 1 for every 3 paid registrations 2 for every 5 paid registrations 3 for every 7 paid registrationsFor more information, emailemea.teamsend@gartner.com or contactyour Gartner account manager.VenuePark Plaza Westminster Bridge200 Westminster Bridge RoadLondon, UK SE1 7UTPhone: 44 844 415 6780www.parkplaza.comGartner Hotel Room RatePrices start from 169 per night atPark PlazaOur research 100% independent andobjective Proven and reliable Relevant to your role Lead more effectively — anddevelop your teamVisit gartnerevent.com/eu/iam for updates and to register!Money-back GuaranteeIf you are not completely satisfied with thisGartner conference, please notify us inwriting within 15 days of the conferenceand we will refund 100% of yourregistration fee.3

MondayTuesday17 March 201516 March 2015Agenda at a glance07:30 – 20:00Registration and Information08:00 – 08:30Tutorial: IAM 101Tutorial: Digital Security Defined for IAM Practitioners Earl PerkinsAnmol SinghLor08:45 – 09:45 Summit Opening and Gartner Opening Keynote: Stop the Finger-Pointing: The IAM Role Ecosystem Felix Gaehtgens, Brian Iverson, Steve Krapes, Lori09:45 – 10:15Refreshment Break in the Solution Showcase10:15 – 10:45Industry Panel10:45 – 11:45Guest Keynote: 'Musical Implementation Strategy' — A Disruptive Method of Simplification! Miha Pogacnik, World Recognized Celebrity Speaker, Classical11:45 – 13:15Lunch in the Solution ShowcaseTracksA. IAM FoundationsB. Moving Ahead with YourIAM ProgramC. The Future of IAMD. Making IAM Secure13:15 – 14:00Renew Your Full Blown IDM:Heaven or Hell? András Solt, Headof Information Security Department,MKB Bank Zrt.Simplifying User AuthenticationSimplifyingAnt Allan User AuthenticationAnt AllanPrivacy and the Internet of Things:Risks, Benefits and How to AvoidCrossing the Creepy LineCarsten CasperTop Security Trends and TakeawaysTopSecurityfor 2014andTrends2015 andEarl TakeawaysPerkinsfor 2014 and 2015 Earl Perkins14:15 – 14:45Solution Provider Sessions15:00 – 15:45Seven Supporting Services ThatApplication Owners Will Demandfrom the IAM Team Steve KrapesHow DSM Implemented IdentityManagement — Inclusion ofBusiness and HR DisciplineRemi Diris and Jeroen Pijpers, r People-Centric Security: CaseTechnical Insights:Door? andandStudies and Best PracticesAdaptive AccessAccess ControlsControlstotoVerifyVerifyandand Tom ScholtzAuthenticateConsumers TrentTrentHenryHenryAuthenticate Consumers15:45 – 16:15Refreshment Break in the Solution Showcase16:15 – 16:45Solution Provider Sessions17:00 – 17:30 Grab the Low-Hanging Fruit toSimplify Your IAM ProgramSteve KrapesGiving Your IAM to Someone ElseUsing IDaaS Gregg KreizmanTechnical Insights: LeveragingSocial Identities to Enable Business:'BYOI' Mary RuddyWhere is my (Identity) Data? GlobalIT Infrastructure and Local PrivacyConcerns Carsten Casper17:45 – 18:15Bad Practices: IAM Horror StoriesFelix GaehtgensHow to Win the Data Breach WarWith Behavioural Analytics Avivah LitanTechnical Insights: Consumer IdentityData: The New Gold? Lori RobinsonThe Cyber Threat LandscapeJeremy D’Hoinne18:15 – 20:00Networking Reception in the Solution Showcase07:30 – 17:00Registration and Information08:00 – 08:45How to Start an IAM ProgramSteve KrapesSingle Sign-on: Start Simply andInexpensively THEN get Fancy!Gregg KreizmanEnd-User Case StudyThe DarkDark SideSide ofof thethe NexusNexus andand thetheTheDigital WorkplaceWorkplace TomTom ScholtzScholtzDigital09:00 – 09:45Achieving Success With RoleManagement Brian IversonTechnical Insights: Selecting the RightIdentity Governance and AdministrationTool for the Job Lori RobinsonHow IAM Can Help Tame the DigitalHow IAM Can Help Tame the DigitalDragon Ant Allan and Felix GaehtgensDragon Ant Allan and Felix GaehtgensEnd-User Case Study09:45 – 10:15Refreshment Break in the Solution Showcase10:15 – 10:45Solution Provider Sessions11:00 – 11:30What Stakeholders Really WantFrom Your IAM ProgramBrian IversonTechnical Insights: DeployingIdentity Functions to Protect APIsMary RuddyData Confidentiality Compromised:Identity Assurance RevisitedAvivah LitanIdentity and Security Intelligence:Bringing them Together with SIEMJeremy D’Hoinne11:45 – 12:15Solution Provider Sessions12:15 – 13:30Lunch in the Solution Showcase13:30 – 14:15The One Trick That Will ImproveYour IGA Tool DeploymentsBrian IversonData Access Governance for Datain the Wild Earl PerkinsFuture-proofing IAMIAMFuture-proofingGreggKreizmanGregg KreizmanHow BYOD is Shaping MobileSecurity Dionisio Zumerle14:30 – 15:00Successfully Selecting an IAMVendor Felix GaehtgensTechnical Insights: How to ArchitectYour Authentication Infrastructure forMobility Trent HenrySecuring Telephony Interactionswith Voice Biometrics and PhonePrinting Avivah LitanThe Five Styles of Advanced ThreatThe Five Styles of Advanced ThreatDefense Jeremy D’HoinneDefense Jeremy D’Hoinne15:00 – 15:30Refreshment Break in the Solution Showcase15:30 – 16:00iPhones, iPads, Androids SSO,VPN, DLP, SWG AchievingEnterprise Mobility SecurelyDionisio Zumerle16:15 – 17:004Recommended agendasessions for each key issue:The Identity of Things for the Internet of Things Earl PerkinsThe Identity of Things for the Internet of Things Earl PerkinsStop Protecting Your Applications:It’s Time for Them to ProtectThemselves Joseph FeimanSummit Close and Gartner Closing Keynote: Simplified IAM — Where do we go From Here? Felix Gaehtgens and Lori RobinsonGartner Identity & Access Management Summit 2015

1IAM simplification2IAM Advantage3secure IAMAt the summit, please refer to the agenda handout providedfor the most up to date session and location informationSimplification of IAMrii Robinson and Ray WagnerThe 3 Key IssuesFacing IAMExecutivesTodayl Concert Violinist, Entrepreneur, Cultural Ambassador and Leadership GuruWorkshops13:30 – 15:00 Technical Insights:Building a Constituent-aware IAMInfrastructure Lori Robinson15:15 – 16:45 Applications and DataSecurity Beyond IAM Joseph Feiman1Actualsimplification of yourIAM initiative — the‘how’ and ‘why bother’of simplificationRoundtables13:00 – 14:00 Developing the KeyCompetencies of the IAM Team Tom Scholtz14:45 – 15:45 What Can we ExpectFrom the Upcoming EU Data ProtectionRegulation? carsten casper2using IAMto gain an advantagefrom the opportunitiesof digital business17:00 – 18:30 Creating Your 15-MinuteRisk Management Presentation for theBoard Tom Scholtz16:45 – 17:45Brian IversonSelling IAM to the Business08:15 – 09:45 Choosing Tools to ManagePrivileged Accounts Anmol Singh10:15 – 11:45 Technical Insights:I’ve Already Invested in PKI — How CanI Reuse it for Mobility and the Internet ofThings? Trent Henry12:45 – 14:15 The Gartner ITScoreMaturity Model for IAM Ant Allan andAnmol Singh08:00 – 09:00 IT, OT and Physical IAM —Is it Time for Integration? Earl PerkinsAgenda as of 24 November 2014,and subject to change3Making yourbusiness securethrough effective IAM— preparing for the‘Identity of things’10:45 – 11:45 Open Source IAMFelix Gaehtgens and Gregg Kreizman13:15 – 14:15 Presenting a Hard Targetto Attackers — Operationally EffectiveVulnerability Management Jeremy D’HoinneVisit gartnerevent.com/eu/iam for updates and to register!5

Solution ShowcaseSponsorship opportunitiesDevelop a “shortlist” of technology and service providers who can meet your particularneeds. We offer you exclusive access to some of the world’s leading technology andservice solution providers in a variety of settings.For further information aboutsponsoring this event:Telephone: 44 1784 267456Email: european.exhibits@gartner.comPremier sponsorsSilver sponsorsForgeRock , the fastest growing identity relationship managementvendor in the world, is building secure relationships across themodern Web. Focused on using online identities to grow revenue,extend reach, and launch new business models, ForgeRock’s OpenIdentity Stack secures over half a billion identities and powerssolutions for many of the world’s largest companies and governmentorganizations. For more information and free downloads, visitwww.forgerock.com or follow ForgeRock on Twitter atwww.twitter.com/forgerock. www.forgerock.comPing Identity is The Identity Security Company. Ping Identitybelieves secure professional and personal identities underliehuman progress in a connected world. Our identity and accessmanagement platform gives enterprise customers and employeesone-click access to any application from any device. Over 1,000companies, including half of the Fortune 100, rely on ouraward-winning products to make the digital world a betterexperience for billions of people. www.pingidentity.comAxiomatics provides next generation authorization. Oursolutions enable you to effectively manage the new securitychallenges posed by the information sharing andcommunication revolution.www.axiomatics.comPlatinum sponsorsBrainwave is the software vendor specialized in AccessGovernance, Analytics and Audit of people and their accessrights to tackle IT fraud risks and data leakage problems.www.brainwave.frBeta Systems is a leading provider of IAM solutions designed forinternational companies and industries that process large volumesof data. Our highly scalable products deliver proven IGA modulesfor application in the complex, heterogeneous IT environments ofmid-sized businesses and large corporations. We offer the mostcomprehensive cross-platform IAM provisioning solutions in themarket. www.betasystems-iam.comCourion offers an intelligent Identity and Access Managementsolution that equips you with real-time identity and accessinformation so you can quickly and confidently provide open andcompliant access to applications and data, identify and reduce riskas it occurs, streamline compliance activity and expedite audits.www.courion.comWhatever your most urgent IAM challenge may be, Dell Software’smodular and integrated IAM portfolio helps you solve it and build onfrom there. Dell’s IAM solutions enable business-driven governance andadministration of identity, data, and privileged access by empoweringbusiness users with key governance functions. Visit the Dell Software boothto learn more about these solutions for identity and access management intoday’s complex environments. www.dell.com/softwareNetIQ is a enterprise software company. Our portfolio includessolutions for Identity, Security, Access, Governance, and WorkloadManagement for physical, virtual and cloud computingenvironments. http://netiq.comEvidian, the European leader of IAM software helps over 900organizations improve their agility, enhance security andcomply with laws and regulations, while reducing costs.www.evidian.comHitachi ID Systems delivers access governance and identityadministration solutions to organizations globally, and areused to secure access to systems in the enterprise and in thecloud. www.hitachi-id.comTMOracle engineers hardware and software to work together in thecloud and in your data center.For more information about Oracle(NYSE:ORCL), visit oracle.com. www.oracle.comRadiant Logic delivers one global identity to drive business in adistributed world. RadiantOne federated identity system enablescustomizable identity views, driving critical authentication andauthorization decisions for WAM, federation, and clouddeployments. Fortune 1000 companies rely on RadiantOne toreduce administrative effort, simplify integration, and build aflexible and scalable infrastructure. www.radiantlogic.comSailPoint helps the world’s largest organisations securely deliverand effectively manage user access from any device to data andapplications in the datacenter, on mobile devices, and in the cloud.SailPoint’s innovative portfolio delivers integrated identitygovernance, provisioning, and access management on-premises oras a cloud-based service (IDaaS). www.sailpoint.comSSH Communications Security is the company that invented theSSH protocol — the gold standard protocol for data-in-transitsecurity solutions. Over 3,000 customers — including seven of theFortune 10 — trust our solution to enable, monitor, and manageencrypted networks. We operate globally, with headquarters inHelsinki, Finland. www.ssh.comOmada provides adaptable identity management solutionsand helps large global organizations protect sensitivebusiness information, achieve compliance and reduce riskexposure while reducing administrative costs.www.omada.netWith its award-winning IdP, SecureAuth uniquely deliversmulti-factor authentication and single sign-on together in asolution for mobile, cloud, web, and network resources.www.secureauth.com 2015 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. For more information, email info@gartner.com or visit gartner.com.

leveraging identity and access intelligence Create a more accountable and transparent organizational culture for your enterprise 2 Gartner Identity & Access Management Summit 2015 Advance your professional knowledge at the IAM Summit and earn CPE credits from the following organizations: Earn CPE credits To see what job titles this Summit .