gartner identity & access management summit...

12
9 – 10 March 2011 Park Plaza Westminster Bridge, London, UK europe.gartner.com/iam Gartner Identity & Access Management Summit 2011 Early-bird savings: Register by 7 January 2011 and save €300 Improve Your Identity and Access IQ to Improve IAM and Business Performance Authentication Cloud Computing Challenges & Opportunities Enterprise Single Sign-On Entitlement Management Governance, Risk and Compliance IAM Architecture IAM Program Management Identity and Access Intelligence Improved Time-to-Value for IAM Password Management Privilege Management Role Management Stakeholder Engagement and Support User Provisioning Web Access Management HOT TOPICS

Upload: vuongngoc

Post on 01-Sep-2018

242 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Gartner Identity & Access Management Summit 2011imagesrv.gartner.com/summits/docs/emea/identity-access/iam11... · Gartner Identity & Access Management Summit 2011 ... Gartner Identity

9 – 10 March 2011Park Plaza Westminster Bridge, London, UKeurope.gartner.com/iam

Gartner Identity & Access Management Summit 2011

Early-bird savings: Register by 7 January 2011 and save €300

Improve Your Identity and Access IQ to Improve IAM and Business Performance

Authentication

Cloud Computing Challenges & Opportunities

Enterprise Single Sign-On

Entitlement Management

Governance, Risk and Compliance

IAM Architecture

IAM Program Management

Identity and Access Intelligence

Improved Time-to-Value for IAM

Password Management

Privilege Management

Role Management

Stakeholder Engagement and Support

User Provisioning

Web Access Management

HOT TOPICS

Page 2: Gartner Identity & Access Management Summit 2011imagesrv.gartner.com/summits/docs/emea/identity-access/iam11... · Gartner Identity & Access Management Summit 2011 ... Gartner Identity

9 – 10 March 2011 • London • europe.gartner.com/iam

2 Register today at europe.gartner.com/iam or call +44 20 8879 2430

Introduction

Table of contents

Who should attend

2–3 Introduction and Overview

4 Gartner Research: Meet the Analysts

5 Plenary and End-User Sessions

6-8 Summit Agenda: The Tracks and Sessions

9 The Summit Experience

10 Solution Showcase

11 How to Register

Senior business and IT professionals with a brief to grow the business and drive innovation will benefit from the IAM Summit, including:

• ChiefInformationSecurityOfficers

• ChiefSecurityOfficers

• ChiefRiskOfficers

• VPs,DirectorsandManagers of IT Security

• IAMProjectManagers

• ITQualityandComplianceOfficers

• ITSecurity,Audit,RiskManagers and Specialists

• EnterpriseandSolutionArchitects

As well as representatives from leading suppliers of IT security solutions, products and services.

ImproveYourIdentityandAccessIQtoImprove IAM and Business PerformanceIntelligence is one of the three pillars of IAM, but until recently it has had much less attention than administration or access. This must change. An improved identityandaccessintelligencequotientwilldeliverbenefits,notjustwithinyourIAM program, but throughout your organization.

Identity and access intelligence (IAI) technology initiatives — focused on auditing, monitoring and analytics — have a shorter “time to business value” than those focused on administration automation or access management. Good IAI improves the performance of IAM activities, even when those are still based on largely manual processes, and offers corrective controls, even for activities beyond an organizations’ direct control — for example, in the cloud.

IAI can more quickly satisfy growing compliance, regulatory, privacy and e-discovery imperatives and feeds directly into IT, and enterprise, governance, risk and compliance (GRC) management initiatives. More strategic is the recognition of IAI as a rich cache of essential business intelligence for improved business processes, decision making and performance management.

The Gartner Identity & Access Management Summit is the premier gathering for IT and business professionals responsible for creating, implementing, and improving IAM programs at their organizations. While IAI is our overarching theme, the 2011 program offers timely and critical information on everything from IAM fundamentals to leading-edge solutions that will enable efficient delivery of effective security, facilitate a more accountable and transparent organizational culture, and provide greater business value.

Ant Allan ResearchVP Gartner

Ray Wagner ManagingVP Gartner

Page 3: Gartner Identity & Access Management Summit 2011imagesrv.gartner.com/summits/docs/emea/identity-access/iam11... · Gartner Identity & Access Management Summit 2011 ... Gartner Identity

Gartner Identity & Access Management Summit 2011

3Register by 7 January 2011 and save €300

Event Overview

New 2011 Priorities for Identity & Access ManagementRefreshed and redesigned based upon extensive research with IAM professionals in Europe, the 2011 agenda has been rebuilt to ensure it can deliver the following benefits to you and to your organization:

Save Money•Receive the latest market

assessments: gain in-depth and unbiased information regarding the vendors and technologies in the IAM space to allow you to select your investments.

•Minimum expenditure for maximized value: Gartner will show you the best practices that create outcomes with the greatest advantage from your investment.

Save Time•Learn, analyze, evaluate:

decide your next steps on the basis of a wealth of gained insight delivered to you in a concise and packed two days.

•Tried, tested, successful: you’ll receive the most up-to-date answers to all the latest and ongoing challenges in IAM and guidance on how you could and should respond.

Gain Resources•Demonstrate value to

the business: the 2011 keynote shows how IAM can establish its worth to theoverallobjectivesoftheorganization and to your business leaders.

•Win stakeholder support: learn the comprehensive answers to help you win over colleagues and leaders within the organization so you can progress with your goals.

Gain Confidence• Best practice not just best

guesses: based on thousands of client interactions the advice you will receive will give you market-leading knowledge and benchmarks for your work.

•Be your most vital resource: develop your expertise, contacts and awareness keeping you at the cutting edge of the subjectareaandabletofurther your career success.

•Gartner Magic Quadrant Sessions – fast-paced, focused and intense these sessions focus on vendor and technology updates and guidance.

•Brand New Tutorial Sessions taking place on the morning of day one will cover the overall market evolution and latest product developments occurring giving you a full overview before the Summit commences. Gartner will show you the best practices that create outcomes with the greatest advantage from your investment.

•Gartner Consulting and Gartner for Enterprise IT Leaders bring a wealth of practical know-how and real-world evidence that will deliver to you in interactive workshops providing you with bespoke feedback and advice on the issues.

•External Content Experts will also be present delivering workshops tackling the developments around biometrics and converged physical and logical security respectively.

•QA Roundtables Alongside the traditional Gartner Analyst/User Roundtables where you can speak to your peers in a moderated environment, there will also be a series ofQARoundtables in which you can question the analysts directly and learn from the questions posed by your peers.

• Self-Assessment Workshop The Gartner analysts will be delivering guidance on the the Gartner ITScore IAM maturity model including a self-assessment workshop in which they will guide you on where you can find improvements and how to realize that progress.

NEW Sessions for 2011

“ Well organized, with excellent speakers and good topics.”

Project maNager, magyar com services

Key Benefits

Page 4: Gartner Identity & Access Management Summit 2011imagesrv.gartner.com/summits/docs/emea/identity-access/iam11... · Gartner Identity & Access Management Summit 2011 ... Gartner Identity

9 – 10 March 2011 • London • europe.gartner.com/iam

Register today at europe.gartner.com/iam or call +44 20 8879 24304

Gartner Research

Ant AllanResearchVP

Mark NicolettVPDistinguishedAnalyst

Perry CarpenterResearchDirector

Earl PerkinsResearchVP

Joseph FeimanVP&GartnerFellow

James RichardsonResearchDirector

Gregg KreizmanResearchDirector

Tom ScholtzResearchVP

Avivah LitanVPDistinguishedAnalyst

Ray WagnerManagingVP

Focus Areas: User authentication; Shared-account password management; Superuser privilege management; IAM program management

Focus Areas: Security information and event management (SIEM); Patch management; Vulnerabilitymanagement;Networkaccesscontrol

Focus Areas: Compliance and risk-related technologies and processes; Cost optimization strategies for access management; Identity administration; User provisioning; enterprise single sign on

Focus Areas: Identity management products and services; IAM processes; Identity and privacy issues; Oracle and SAP security and identity frameworks; Web services, SOA and SaaS security andidentityissues;Virtualizationinfrastructures

Focus Areas: Application security, technologies and methodologies enabling the development of secure applications

Focus Areas: Business intelligence, corporate performance management

Focus Areas: Enterprise single sign-on (ESSO); Electronic signature; Security architecture; FederationandUser-centricidentityframeworks(UCIFs)

Focus Areas: Security strategy; Security architecture; Security organization; Investment justification;Secureoutsourcing;BCP/DRP

Focus Areas: Identity theft related fraud; Web fraud detection; Enterprise fraud and misuse management; Anti-phishing solutions; Consumer authentication applications; B2C Web-payment software and payment gateways

Focus Areas: Web access management; Identity federation; Rights management

Meet the Analysts

Worldwide expertise at your fingertips – your questions on Identity and Access Management answered

Gartner analysts draw constantly from the real-life challenges and solutions experiences by more than 45,000 clients worldwide. The value of resource, combines with out deep analysis of technology vendors, is unrivalled.

Advisory Board

• GuyAndersson,Head of IAM, Nordea

•OlivierFontaine,ITProjectManager,EU Commission

•MarkJaroski,Systems Architect – Identity, World Health Organization

• RolandMueller,Technical Architect, AXA Technology Services

• VegardSkaret,DBASecurity, Statens Innkrevingssentral

Gartner Analyst One-on-One MeetingsYou have the opportunity at the Summit to spend 30 minutes privately discussing a topic of your choice with a Gartner analyst who specializes in that area.

I have found Gartner speakers very informative and knowledgeable on the subject of IAM. I have found that they are able to provide a broad depth on different vendors.

iam coNsultaNt,Fujitsu

Page 5: Gartner Identity & Access Management Summit 2011imagesrv.gartner.com/summits/docs/emea/identity-access/iam11... · Gartner Identity & Access Management Summit 2011 ... Gartner Identity

Gartner Identity & Access Management Summit 2011

5Register by 7 January 2011 and save €300

Plenary and End-User Sessions:

Gartner Opening Keynote: Transforming IAM: The New BI Connection

As IAM establishes relevance in IT, one need only look to the CIO’s strategic initiatives list to see opportunities for IAM to deliver more business value than ever. We can transform IAM’s role from that of utility to an active participation in day-to-day business by taking advantage of the wealth of information and knowledge IAM has gathered about the identity and access experience. An understanding of business intelligence (BI) process and principles can shed new light on leveraging IAM information to directly address business intelligence needs.

James Richardson

Gartner Closing Keynote: Beyond Intelligence: Wither IAM?

The evolution of IAM is not so much that that pullsinothertechnologies,suchasDLPandSIEM, but is more like water seeking its own level. Other functional attractors are pulling IAM to then. IAM’s future may be to fade away gracefully as a discrete infrastructure with the component functions and capabilities being absorbed into BI, service management, and so on. This session will discuss:

•Whatarethebusinessneedsandtechnology changes behind this evolution?

•WhichIAMtechnologieswillsurvive as “living fossils”?

•WillanythingremainofIAMasawhole?

Earl Perkins

Guru Keynote: Your Business Versus Organized Crime: First Principles for Protection

Crimeisabusinessand“Laundrymen”authorJeffreyRobinson—oneoftheworld’snotedexperts on fraud and money laundering — says that the single best way businesses can protect themselves from organized criminals is by understanding the basic principles of the criminal’s business — that, like all businesses, they need cash flow and reinvestment. If you can interrupt the cash flow and stop them from reinvesting, you can bankrupt them. Easier said thandone,Jeffreyofferscurrentexamplesandreal solutions to give businesses a new eye onto the criminals’ methods and intentions.

Jeffrey Robinson, FraudandMoneyLaunderingExpert

End-User Case Studies:The Summit features several end-user case study presentations, with senior IT and business executives from leading organizations from a range of industries and countries designed as use cases you can compare against your own approaches and as benchmarks for your thinking.

Building the IAM Architecture: the Roadmap for Success

EffectiveIAMisfarmorethanjustpurchasingatool.Startingwiththe e-business environment for customers and agents and now beingrolledouttointernalemployeesDeltaLloydhasembeddeda clear vision in service of their ultimate goals. This session will explore the new concepts everyone had to adapt to, the quick wins achieved and the longer-term architecture strategy.

Jan Witteveen, IT Architect, Delta Lloyd Group

Introducing Successful Access Management

Moving from data models, through the necessary definitions and processes required to embed effective and efficient access management within a large organization, Serge Moreno will demonstrate how to manage such implementation, to ensure success (pointing out the critical success factors) and to evade pitfalls.

Serge Moreno, Information security Officer, S.A Carrefour

IAM@Daimler: Fit for the Future

Utilizing a range of solutions including private IAM in the cloud, centrally hosted IAM services and a strong focus on user friendliness andenablingthebusiness,Daimlerhasovercomechallengesaround the variety of platforms in use within the organization, the requirements of Security and segregation of duties.

Dr Barbara Mandl, Senior Manager Identity Management, Daimler

Cyber Warfare – Cyber Crime: the Threat to Critical National Infrastructure and the Economy

Cyber crime has increased exponentially developing into a highly complex underground economy generating professional quality software tools, legitimate businesses that provide protection to cyber criminals, sophisticated stock manipulation schemes and a sense of community among criminals. Paul’s presentation, will better inform organizations as to the state of the threats present, the links to cyber warfare and the threats from rogue nations to our critical national infrastructure, economy and way of life.

Paul C Dwyer, Security GRC Principal, Eircom

Extending Active Directory to UNIX and Linux for Compliance and Streamlined Administration

Amadeus migrated to large-scale distributed systems for intensive data processing and needed to implement identity and access controls that would sustain their high level of security and assure continued regulatory compliance after the transition. This presentation discusses the considerations that led them to their solution and the issues that accompanied deployment on thousands of servers.

Patrick O’Connor, Principal Systems A/P Operating Systems, Amadeus Data Processing

Presented by Gartner and Guests these presentations will give you a high level thinking that can steer, innovate and re-fresh your entire approach.

Gartner Keynote Addresses

Page 6: Gartner Identity & Access Management Summit 2011imagesrv.gartner.com/summits/docs/emea/identity-access/iam11... · Gartner Identity & Access Management Summit 2011 ... Gartner Identity

9 – 10 March 2011 • London • europe.gartner.com/iam

6 Register today at europe.gartner.com/iam or call +44 20 8879 2430

Summit Sessions — Track 11Improving Maturity, Ensuring SuccessThis track presents the best practices, tools, technologies and recommendations for every level of IAM program maturity, including foundational steps in IAM program initiation and governance, IAMarchitecture,technologychoices,vendorselectionandprojectmanagement.

Building Your IAM Program

EmbarkingonanIAMjourneycan be extremely daunting. The path can be treacherous and is littered with the carcasses of fallen programs. This session seeks to help you navigate this path, providing practical guidance based on the successes and failures of those who have gone before.

• Calibratingyourcompass(developing vision and goals)

• Amapoftheterrain(standardtools, technologies, and practices)

• Criticalsurvivalskills(whattodoincrisis situations – e.g., cost cutting)

Perry Carpenter

Assessing the Maturity of Your IAM Program

Many large global enterprises have made significant investments in IAM initiatives to address service levels, cost containment and regulatory compliance. However, few have yet undertaken any formal maturity assessment of their IAM programs. Immature IAM programs are likely to be inefficient and ineffective and fail to deliver their full business value.

•Whatarethekeyindicators of progressing maturity?

• Howcanyouformallyassessthematurity of their IAM programs?

• Howcanyouusethatassessment to drive IAM program improvements?

Ray Wagner

Improving IAM Processes Is a Business Imperative

Much has been written about IAM technology and IAM services. But at its most fundamental level, IAM is actually a set of

key processes that IT and the business employ to manage the identity lifecycle. This presentation explores those key processes and how they are affected by other IT and business processes.

•Whatarethekeyprocesses of IAM?

•WhateffecthavekeyIAMprocesses had on IAM products and organization – and vice versa?

• Howshouldenterprisesleverageformal IAM process to address their IAM program maturity?

Earl Perkins

Architecting IAM for Success

FocusingonlyonIAMtoolselection can be a recipe for failedprojects,wastedresourcesand lack of business alignment. By developing IAM architecture as part of broader security and enterprise architecture program, enterprises can strategically improve identity-oriented business processes, information flows and technology implementations.

•Whatarethemost-effectivecontents and structures for security architecture?

•Whataresomehelpfulconceptualmodeling techniques for analyzing and selecting controls?

•Howshouldenterprisespractically model IAM architectures to ensure linkage to the business strategy, and to adequately address risks?

Gregg Kreizmann, Tom Scholtz

Looking Forward: Best Practices for User Administration

ItisonethingtojustifyIAMadministration tools from an

operations perspective, but it can be entirely different proposition tojustifyandarchitectIAMadministration with “the business” in mind. So, how can you deploy these tools in a way that will further your organization’s business goals?Joinustofindout.

• Different“lenses”resultindifferent expectations and deliverables

•WherecanIAMadministrationtools help “the business” and/or advance the organization’s forward-looking goals?

•WheredoIgofromhere?

Perry Carpenter

Improving Identity Assurance: Best Practices for User Authentication

Authentication is foundational to other IAM functions such as authorization and audit. Yet legacy passwords, which are vulnerable to a wide variety of attacks, are still widely used in all but the highest-risk use cases. Methods that provide higher levels of assurance and accountability are surely needed. Nevertheless,eventhemostrobust authentication method can be insufficient and complementary safeguards are essential.

• Howcanpasswordssatisfyconflicting risk, compliance and usability needs?

• Howdodifferentauthenticationmethods measure up against needs for increased assurance and accountability?

•Whyisauthenticationaloneinadequate and what can you do about it?

Ant Allan

Essentials: If you are at the early stages of your IAM initiatives, these sessions will help you to navigate through the necessary steps towards building a successful strategy.

Intermediate: These sessions will focus on building capabilities and/or skills that improve your IAM initiatives.

Advanced: If you are an advanced practitioner of IAM professional, these sessions are designed to take your initiatives to the next level.

Practical: We understand your need for tactical information you can action straight away. These sessions focus on how to, do’s and don’ts and best practices.

Strategic: These sessions focus on the strategic insight supporting the development and implementation of your plan of action.

Business: These sessions focus on IAM from the business perspective.

Page 7: Gartner Identity & Access Management Summit 2011imagesrv.gartner.com/summits/docs/emea/identity-access/iam11... · Gartner Identity & Access Management Summit 2011 ... Gartner Identity

Gartner Identity & Access Management Summit 2011

7Register by 7 January 2011 and save €300

Summit Sessions — Track 22EmbracingChange,IncreasingValueThis track explores the trends — such as cloud computing — that are changing business needs and the ways in which IAM can and must be delivered and examines the transition of IAM into a full business intelligence resource for the enterprise.

Improving IAM Value Through Identity and Access Intelligence

IAM possesses a treasure-trove of data and information not only about identity creation and administration, but also the myriad ways it is used to gain access to critical enterprise knowledge or to enhance the user experience. This presentation explores how a new generation of collection, correlation, and analytics tools is converting what was once an IT tool for IT into knowledge for business intelligence and business process improvement.

•WhatIAMinformationreallyexists today and in what form?

•Whatmarkettoolsare available today to set the stage for IAI generation?

• WhatisthefutureoftheIAIexperience in enterprises, and effects will it have on business intelligence and business process?

Earl Perkins

Using SIEM to Enable Identity Intelligence

SIEM technology provides broad scope user activity monitoring that complements IAM audit functions. When SIEM operates with the identity context that is provided through integration with IAM policies, it can deliver exception monitoring that enables the early detection of a targeted attack.

•Whatarethecapabilitiesandlimitations of identity and access management audit functions?

• HowdoesSIEMtechnologycomplement IAM audit ?

• HowshouldorganizationsselectSIEM vendors and deploy SIEM technology?

Mark Nicolett

Moving from Security Silos to Enterprise Security Intelligence

Today’s security concept is based on noncohesive vulnerability scanning and monitoring of unrelated stovepipes: networks, databases, desktops and applications. Analysis is limited to log and reports reviews. This concept should be transformed into enterprise security intelligence (ESI), enabling interaction and correlation of different security technologies to increase accuracy and breadth of detection and protection. It also requires the integration and correlation of security and contextual information to bridge security with key enterprise values, thereby enabling optimal decision-making.

•Whatchallengesdoestheexistingsiloed security concept face?

• HowcanESIsolvethosechallenges?

•WhatESItechnologies,practicesand vendors are emerging, and when will they mature?

Joe Feiman

Delivering IAM to Enterprise Customers and Partners

Identifying and authenticating users outside the enterprise often requires a less-intrusive but equally effective set of tools that inside users requires. This session will explore the processes, tools and vendors that help enterprises discover, manage and authenticate external user identities.

•Whataretheparticularchallengesand threats that managing external user identities pose?

•Whatarebestpracticesforidentifying and authenticating external users in an increasingly diverse and mobile environment?

• Howwillthismarketevolve, and what solutions can we expect in the future?

Avivah Litan

Managing Identity in the Cloud

Enterprises have been working to bring internal identity and access management under control. Outsourcing applications and using SaaS can create new identity islands, add complexity and introduce security vulnerabilities. This presentation provides strategic and tactical guidance for reducing IAM complexity in dynamic, increasingly distributed environments.

•Whatproblemsarebeingcreated when applications management is moved to the cloud?

•Whatarethetraditionalandemerging methods for resolving these problems?

•Whataretheappropriatetechniques, tools and standards to support the most prevalent scenarios and use cases?

Gregg Kreizman

Embrace Emerging IAM Administration and Intelligence Trends to Improve Time-to-Value

The IAM administration and intelligence markets are undergoing radical changes. This session will explore the driving forces behind these changes, and will provide you the practical guidance in making these changes work for you.

• Howdidwegethere?

•What’sgoingon?

•WhatshouldIdo?

Perry Carpenter

gartNer Predicts:

The use of discrete, specialized authentication hardware is declining rapidly and will be involved in fewer than 10% of all authentication events by 2013.

”gartNer Predicts:

Enterprises are rapidly shifting their IAM efforts from a tactical focus on administration to a strategic focus on intelligence.

Page 8: Gartner Identity & Access Management Summit 2011imagesrv.gartner.com/summits/docs/emea/identity-access/iam11... · Gartner Identity & Access Management Summit 2011 ... Gartner Identity

9 – 10 March 2011 • London • europe.gartner.com/iam

8 Register today at europe.gartner.com/iam or call +44 20 8879 2430

Best Practices Workshops

Gartner Workshops

Gartner Workshop: Understanding How Compliance Drives IAM Initiatives in Europe

Legalandregulatorycompliancehasbeena significant driver for IAM initiatives in many enterprises. This interactive workshop session allows participants to work together, facilitated by a Gartner analyst, to identify the pertinent laws and regulations, to understand what kinds of IAM controls are required to meet compliance needs, and to formulate effective IAM initiatives for compliance.

Ant Allan, Tom Scholtz

Gartner Workshop: Getting Your IAM Business Plan Off to a Good Start

Getting “buy in” for your IAM program is critical. This interactive workshop will help each participant explore the unique value-propositions of their IAM program and then to capture and articulate the value in a way that resonates across all areas of the organization. Participants will discuss the drivers behind IAM programs, which of those resonate best with specific individuals or departments with their organizations, and how to create and articulate business cases across these constituencies.

Perry Carpenter

Gartner Workshop: IAM Program Maturity Assessment

This interactive workshop session allows participants to work together, facilitated by a Gartner analyst, to assess their organizations’ IAM program maturity using the Gartner ITScore for Identity and Access Management maturity assessment methodology and a workbook based on the ITScore diagnostic tool.

Ant Allan, Ray Wagner

Workshop: Converged Security Maturity Model: How to Really Understand What Threats You May Not Even be Considering

The maturity model (developed as an Open Source Standard by the speakers), will be of significant value in helping companies

evaluate their security profile and make progress in responding more effectively to converged threats to their IAM strategies. The model considers Governance in terms of strategy, metrics, compliance and training. The converged security environment will be explored together with the importance of staff training and raising awareness of converged security threats. Social Engineering, integrated penetration testing, security convergence audits, converged security risk assessments and converged security systems analysis will also be examined to understand their role in a Converged Security Environment.

Sarb Sembhi, Immediate Past-President ISACA London and James Willison, Convergence Lead for ASIS

Gartner Consulting WorkshopsGartner Consulting Workshop: IAM in the Cloud

Cloud Computing Service Providers are starting to offer attractive IAM services. Take advantage of a rare opportunity to share your own and learn about other users’ experiences using Cloud IAM services and also discover Gartner’s recommendations for how to avoid embarrassment.

Ian Head and Doug Simmons, Gartner Consulting

Gartner Consulting Workshop: Why do IAM Programs Fail?

Gartner Consulting has seen the good, the bad and the ugly in the delivery of IAM programsobjectives.Exchangeexperienceswith Gartner and your peers to appreciate the failure signals, embrace the success factors and understand the implications of both. Leavetheworkshopwithinsightintohowothers achieve IAM best practices.

David Lello, Doug Simmons and Terry Bebbington, Gartner Consulting

Gartner for Enterprise Leader’sWorkshopGartner for Enterprise IT Leaders Workshop: IAM Business Alignment, Design and Deployment Challenges

According to the vendors, this IAM product suite will be deployed in no time and work like a charm — right?

Wrong! Hear real world experiences, best and worst practices in IAM alignment, expectation, strategy, design and development shared by Gartner Best Practices Council for Information Security and Risk Executives. This panel discussion will help you avoid common pitfalls as these brave members have been there and done that.

Ash Ahuja, Leadership Partner, Gartner for Enterprise IT Leaders, Information Security & Risk Council

Biometrics Workshop

Biometrics Workshop: The Seven Pillars of Biometric Understanding

DelegateswhoattendthisspecialsessionfrombiometricpioneerandveteranJulianAshbournwillenjoyauniqueinsightintobiometric technology, its integration into larger systems, associated human factors and the resolution of various myths and assumptions. In addition, they will be introduced to new concepts and ways of thinking around the usage of biometrics in the contemporary business world and society in general. This will be a unique and invaluable interactive session for those in both the public and private sector.

Julian Ashbourn

WorkshopsWhether you are a newcomer to IAM, on an IAM “master,” it’s always beneficial to share ideas and best practices. The IAM Summit includes a series of workshops addressing some of the key IAM challenges facing organizations today. Specifically designed to be highly interactive, these workshops will facilitate peer to peer exchange and networking combines with expert advice of Gartner’s analysts.

Please note that workshops are strictly reserved for end-users only and are on a first-come, first-served basis.

Page 9: Gartner Identity & Access Management Summit 2011imagesrv.gartner.com/summits/docs/emea/identity-access/iam11... · Gartner Identity & Access Management Summit 2011 ... Gartner Identity

Gartner Identity & Access Management Summit 2011

9Register by 7 January 2011 and save €300

The Summit Experience

Exploiting Government Identity Management Initiatives

Gregg Kreizman

Articulating the Business Value of IAM

Tom Scholtz

Engaging Business Stakeholders and Managing Expectations

Ray Wagner

Customer Identity and Authentication Issues in Financial Services

Avivah Litan

User Administration, Provisioning, Roles and Entitlements

Earl Perkins

Gartner Analyst/User Roundtables

The Identity and Access Management Scenario

The IAM Scenario introduces many of the themes, trends, and technologies in the IAM Market in 2010, as well as providing a general overview of the Gartner research in Identity and Access Management.

• WhataretherealgoalsofIAM?

• Whatdoesitmeantohavea“mature”IAM program?

• Howcanorganizationsmovefrom one maturity level to the next?

Ray Wagner

Fathoming the Jellyfish: Understanding the Gartner IAM Taxonomy and Capability Models

While IAM aspires to a simple, systematic approach to managing users’ identities and entitlements it has spawned a plethora of technologies that address different parts of the whole. This tutorial session explores the Gartner frameworks that elucidate the differences in function and scope.

• Whatarethekeyfunctionsthat IAM performs?

• HowdoIAMtoolsdifferintheirfunctional capabilities?

• HowdoIAMtoolsdifferintheirscopeand applicability to different systems?

Ant Allan

Tutorials

Choosing SSO Products and Vendors

Gregg Kreizman

Choosing User Provisioning Vendors

Perry Carpenter

Choosing Authentication Vendors

Ant Allan

Choosing Consumer Authentication and Fraud Detection Vendors

Avivah Litan

Choosing Security Information and Event Management Vendors

Mark Nicolett

Will Your Job Vaporize Into The Cloud?Joseph Feiman

MagicQuadrantSessions

QA Session: Authentication

Ant Allan, Avivah Litan

QA Session: SSO and Identity Federation

Gregg Kreizman, Ray Wagner

QA Session: IAM Intelligence and Analytics

Earl Perkins, James Richardson and Joe Feiman

Q&ARoundtables

Your Summit — Your agenda! With a wealth of sessions, it is helpful to have a tool to build your own agenda focusing on your own needs. The online Agenda Builder helps you select the sessions most relevant to you and add them to your calendar and to build in networking and reflection time into your schedule. Go to ab.gartner.com/iame5 to view the full agenda

“ The most comprehensive view into IAM I’ve experienced.”

vP oF iNFormatioN techNology, hds retail North america

Page 10: Gartner Identity & Access Management Summit 2011imagesrv.gartner.com/summits/docs/emea/identity-access/iam11... · Gartner Identity & Access Management Summit 2011 ... Gartner Identity

9 – 10 March 2011 • London • europe.gartner.com/iam

Register today at europe.gartner.com/iam or call +44 20 8879 243010

Solution Showcase

Meet the technology and service providers at the forefront of Identity and Access ManagementWe offer you exclusive access to some of the world’s leading technology and service solution providers in a variety ofsettings.VisittheSolutionShowcase,attendtheSolutionProviderSessionsandjoinintheNetworkingReception for informal relationship building.

Premier Sponsor Platinum Sponsors

Cyber-Ark® Software a global information security company that specializing in protecting and managing privileged users, applications and highly-sensitive information to improve compliance, productivity and protect organizations against insider threats. With its award-winning Privileged Identity Management (PIM) and Highly-Sensitive Information Management software, organizations effectively manage and govern application access while demonstrating returns on security investments.

www.cyber-ark.com

NovellIdentityandSecurityManagementsolutionsmanage identities, automate provisioning, manage access to applications, and enforce and prove regulatory compliance. We deliver all this in a way that interoperates and integrates with your current applications and operating systems.

Courion’s Access Assurance solutions are used by over 12 million users worldwide to quickly and easily solve their most complex identity and access management, risk and compliance challenges.

www.courion.com

QuestSoftwaresimplifiesandreduces the cost of managing IT across physical, virtual and cloud environments for more than 100,000 customers worldwide.

www.quest.com

Nexusprovidesworldleadingsolutions for Identity and Access Management. Security and ease-of-use are the foundation of our products and services.

www.nexussafe.com

SailPoint’s identity governance technology empowers organizations to mitigate risk, lower costs and ensure compliance providing 360-degree views into enterprise-wide user access and automating key processes.

www.sailpoint.com

CA Technologies is an IT management software and solutions company with expertise across all IT environments—from mainframe and distributed, to virtual and cloud. Our products enable customers to manage and secure IT environments and deliver more flexible IT services. Our innovative products and services provide the insight and control essential for IT organizations topowerbusinessagility.ThemajorityoftheGlobalFortune500relieson CA Technologies to manage evolving IT ecosystems.

http://ca.com/security

Silver Sponsors

Sponsorship OpportunitiesIf your organization is interested in sponsoring this event, please contact Nasar Butt for further details. Telephone: +44 1784 267280 E-mail: [email protected]

“ The solution area provides a great way to meet the industry experts.”

delivery maNager, skyPe

Page 11: Gartner Identity & Access Management Summit 2011imagesrv.gartner.com/summits/docs/emea/identity-access/iam11... · Gartner Identity & Access Management Summit 2011 ... Gartner Identity

Gartner Identity & Access Management Summit 2011

11Register by 7 January 2011 and save €300

How to Register

PricingEarly Bird Price €1,895+UKVAT(offerends7January2011)

Standard Price €2,195+UKVAT

Public Sector Price €1,695+UKVAT

Eligibility for the Public Sector Price will be verified, proof of public sector status will be required. Price cannot be applied retrospectively.

Public SectorNationalGovernment,LocalGovernment;Non-FinancialPublicEnterprises;Charities;Public Administration: Health and Education.

Pricing correct as of November 2010

Benefits

1 Team meeting with a Gartner analyst (end-users only)

2 Optional team meeting(s) with select executives from vendor organizations

3 Advice and support on building personalized agendas for your team

4 10+ free audio sessions from the GartnerEventsOnDemandproductwww.gartnereventsondemand.com

5 Complimentary team lounge and meeting space (based on team size, terms and conditions apply)

6 Concierge service pre-event and on-site

7Discountsonregistrationrates

Summit Team DiscountOffers• 4 for the price of 3

• 7 for the price of 5

• 10 for the price of 7

To register a team please e-mail [email protected] or contact your Gartner Account Manager.

Please note that teams must be registered at the same time and we can only guarantee availability of team benefits if the team is registered at least three weeks in advance of the Event.

Team Attendance Gartner Events has designed an experience that will help teams of 4 to 25 maximize their Summit experience while on-site and long after the event concludes.

How to Register

Online: europe.gartner.com/iam

Telephone: +44 20 8879 2430

E-mail: [email protected]

Connect with and Joinouronlinecommunity.GetthelatestSummitupdatesandnetworkwithfellowdelegates — visit europe.gartner.com/iam for more details and sign-up. Follow #GartnerIAM on Twitter.

Page 12: Gartner Identity & Access Management Summit 2011imagesrv.gartner.com/summits/docs/emea/identity-access/iam11... · Gartner Identity & Access Management Summit 2011 ... Gartner Identity

Register by 7January2010forEarly-Bird savings

Build your own agenda online now

Book a 30 minute One-on-One meeting with your preferred Gartner analyst

Join our online communities with

and

#GartnerIAM

Return address: Gartner, PO Box 754, North Shields, NE29 1EJ, United Kingdom

Cert no. SA-COC-001683

GartnerUKLtd.isacompanyregisteredinEngland&Waleswiththeregistrationnumber2266016.The registered office is Tamesis, The Glanty, Egham, Surrey, TW20 9AW, United Kingdom.

Your Event Reminders

Gartner Identity & Access Management Summit 20119 – 10 March 2011ParkPlazaWestminsterBridge,London,UKeurope.gartner.com/iam