Skip navigation
Industry Events

Mobile, Cloud & IoT at the 2014 Gartner Identity & Access Management Summit

We’re headed back to the Gartner Identity & Access Management (IAM) Summit this year from December 2-4 hosted at the Caesar’s Palace in Las Vegas. Last year, we attended the conference in Los Angeles to learn more about BYOD and SaaS adoption challenges, delivering better customer and partner experiences, IAM best practices and more.

This year, we’re looking forward to learning about mobile, cloud, IAM as a service, the Internet of Things (IoT), and other challenges to IAM. There will be a number of guest keynote speakers, including:

  • Cory Doctorow, Journalist, Science Fiction Author, Activist and Blogger
  • David Pogue, EHost of "Nova ScienceNow" and Yahoo Tech Columnist
  • Jeremy Wiltz, Deputy Assistant Director at FBI

Visit Duo Security at Gartner IAM!

Visit our exhibitor booth #425 to learn more about Duo Security’s two-factor authentication solution, and our latest product announcements.

  • Mobile Controls - Enable even greater security for phone-as-token methods by restricting which platforms and versions are allowed to be used in your organization.
  • API Edition - A completely customizable two-factor authentication solution for developers building web or mobile apps.
  • U2F (Universal 2nd Factor) - We joined Google, Yubico and other FIDO-alliance members to provide businesses and consumers with a standardized, secure two-factor solution.

Are you looking for a ticket to the event? Duo can help.
Use code IAMSP23 to get $300 off registration!

Find out more about the summit tracks and a summary of some of the sessions in each track:

####IAM Foundations This track will provide you with best practices for planning your IAM strategy and program to ensure you gain real business benefits.

Some of the sessions include:

  • Grab the Low-Hanging Fruit to Simplify Your IAM Program - This session guides you with selection criteria for IAM product features in order to satisfy stakeholders.
  • The Success Factor: Meeting the Challenges of Large-Scale Enterprise IAM - This session provides insight into building and operating a single sign-on (SSO) or role-based access control (RBAC) on a large scale.

####Moving Your IAM Initiatives Forward This track helps you move forward after establishing an IAM program and set of projects. You’ll learn how to leverage tools and fill gaps for a successful IAM infrastructure.

Some of the sessions include:

  • Simplifying User Authentication - This session helps you choose the best authentication methods with trust, cost and UX in mind.
  • Single Sign-On: Start Simply and Inexpensively, THEN Get Fancy - This session provides advice for starting an SSO project as cloud and mobile applications have added complexity to enterprise environments.

####Future of IAM This track explores how cloud, mobile, social, information, digital business and the Internet of Things can be leveraged and supported by IAM.

Some of these sessions include:

  • The Identity of Things for the Internet of Things - This session covers how IoT has brought new risks and threats, and the top IAM concerns brought on by expanding IoT.
  • Securing Mobility in the Future: Selling to Management Now - This session helps IT planners with a mobile bring your own device (BYOD) environment, as well as how to sell mobile security to management and users alike.

####Technical Insights: Your Technology Blueprint This track will provide insight into identity governance and administration, authorization, cloud and identity, using identity to protect APIs, privacy and identity externalization including social identity.

Some of the sessions will include:

  • Strangers at Your Door? Utilizing Identity Proofing and Adaptive Access Controls to Verify and Authenticate Consumers - This session discusses how to prevent fraud and mitigate risks with identity proofing and adaptive access control solutions.
  • Workshop: Managing Users in the Cloud - This workshop will help solve certain challenges associated with provisioning to cloud apps, including managing user accounts and privileges.

####Making IAM Secure This track will provide advice on IAM and threat protection security in order to maximize your investments, as well as insight into the most important security trends.

Some of the sessions will include:

  • The Cyberthreat Landscape - This session will analyze new security solutions to help defend your enterprise against attacks introduced by BYOD and mobility trends, including how to secure personal devices that are rarely on the corporate network.
  • Enterprise Mobility Security Failures, Trends and Threats - This session answers questions about the mobile security landscape, including top security failures in enterprise mobility, real-world mobile threats and more.

Hope to see you there!