Next week is our Identity and Access Management Summit. I wanted to give you a sneak peek at what the team will be bringing to LA. See you Sunday!
|Fundamentals of User Provisioning and Identity and Access Governance||Tutorial||Heidi Wachs|
|Authorization Architectures||Tutorial||Ian Glazer|
|Beyond Join, Move, Leave: Implications of Identity and Access Management in the Modern Era||Track E: IAM in the Modern Era||Ian Glazer|
|How to Build a Modern Federation Architecture for a Cloud, Mobile and Social World||Workshop||Mary Ruddy|
|Are Your Users Sick of Typing Passwords on Mobile Devices? Give ‘Em SSO Now!||Track E: IAM in the Modern Era||Trent Henry|
|The Role of Enterprise Identity in Public and Private Clouds||Track E: IAM in the Modern Era||Nick Nikols|
|Shared Experiences with Identity Governance and Administration||Roundtable||Ian Glazer and Heidi Wachs|
|What About Everyone Else? Managing Non-Employee Identities||Track E: IAM in the Modern Era||Mary Ruddy|
|Adaptive Access Control: Holy Grail, Snake Oil or the Next Big Thing?||Track E: IAM in the Modern Era||Trent Henry|
|Saving Privacy in the Cloud||Track E: IAM in the Modern Era||Heidi Wachs|
|Where has Your PKI Been – Where is it Going?||Roundtable||Trent Henry|
|The March Towards Externalized and Finer-Grained Authorization||Roundtable||Ian Glazer|
|How to Cope With Two Sides of BYOD: Bring Your Own Device and Bring Your Own (Personal) Data||Track E: IAM in the Modern Era||Trent Henry and Heidi Wachs|
|Privileged Account Management for Private Cloud and IaaS Environments||Track B: IAM in the Trenches||Nick Nikols|
|Putting Strategy Into Action||Ant Allan, Ian Glazer, Gregg Kreizman, Mark Nicolett, Earl Perkins||Keynote|
|Mobile Devices, Identity and Access Management||Roundtable||Trent Henry and Heidi Wachs|
Read Complimentary Relevant Research
Predicts 2017: Artificial Intelligence
Artificial intelligence is changing the way in which organizations innovate and communicate their processes, products and services. Practical...
View Relevant Webinars
How to Live Without Mobile Device Management
This webinar addresses the growing trend of users refusing to have enterprise management of their mobile devices due to privacy concerns....
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.