The landscape of identity and access management is constantly changing, with new technologies and challenges emerging every day. In 2025, keeping up with these developments is crucial for IAM and security leaders. 

This list outlines the must-attend events across 2025, including vendor-neutral industry events and vendor-hosted events, where you can explore the latest trends, innovations, and best practices in identity management. Whether you're looking to deepen your expertise or stay ahead of industry shifts, these gatherings offer valuable opportunities to connect, learn, and prepare for the future.

Industry Events

These vendor-neutral events provide unbiased insights into the latest trends, technologies, and best practices without being tied to any specific vendor's products. By attending, you gain a broad perspective on the industry, network with a diverse group of professionals, and discover solutions that best fit your organization's unique needs. Attending vendor-neutral events is an asset for anyone looking to stay ahead in the ever-evolving identity and access management (IAM) field.

  1. Identiverse

    • Description: A premier annual conference focused exclusively on the identity industry, covering topics like authentication, authorization, and identity management.

    • Website: identiverse.com



  2. FIDO Authenticate

    • Description: Organized by the FIDO Alliance, this conference is dedicated to the advancement of authentication technologies and standards, focusing on reducing the world's reliance on passwords.

    • Website: authenticatecon.com



  3. Gartner Identity & Access Management Summit

    • Description: Organized by Gartner, this summit discusses the latest trends, challenges, and solutions in identity and access management (IAM).

    • Website: gartner.com



  4. European Identity & Cloud Conference

    • Description: Hosted by KuppingerCole Analysts, this event focuses on digital identity, cybersecurity, and cloud computing.

    • Website: kuppingercole.com



  5. RSA Conference

    • Description: A leading cybersecurity event that includes tracks on identity management, authentication, and access control.

    • Website: rsaconference.com



  6. Connect

    • Description: Focuses on the fusion of physical and digital identity in the global marketplace, including biometrics and secure credentials.

    • Website: connectidexpo.com



  7. ID4Africa

    • Description: A forum promoting the adoption of robust and responsible identity systems in Africa, with global relevance.

    • Website: id4africa.com



  8. Internet Identity Workshop (IIW)

    • Description: An unstructured conference where attendees set the agenda to discuss the future of identity on the internet.

    • Website: internetidentityworkshop.com



  9. Black Hat Conference

    • Description: A leading information security event that often features identity security topics.

    • Website: blackhat.com



  10. KNOW Identity Conference

    • Description: Explores the future of identity, trust, and the data economy.

    • Website: oneworldidentity.com



  11. Biometric Summit

    • Description: Focuses on biometric technology innovations and their applications in identity verification and security.

    • Website: biometricsummit.com

Vendor-Specific Identity Events

Vendor-hosted events offer a deep dive into the specific tools and platforms your organization may already be using. These events are invaluable for learning about the latest features, updates, and the future direction of your IAM vendor's offerings. They also provide an opportunity to meet and collaborate with fellow customers who are working with a similar technology stack, allowing you to share specific experiences, challenges, and solutions that can enhance your use of the vendor's products.

  1. Oktane (hosted by Okta)

    • Description: Okta's annual conference focusing on identity, security, and digital transformation.

    • Website: okta.com/oktane



  2. Microsoft Ignite

    • Description: Microsoft's flagship event, covering topics including identity and access management within Microsoft's ecosystem.

    • Website: microsoft.com/ignite



  3. ForgeRock Identity Live

    • Description: ForgeRock's conference showcasing innovations in digital identity and access management.

    • Website: forgerock.com/events



  4. SailPoint Navigate

    • Description: SailPoint's annual conference focusing on identity governance and administration.

    • Website: sailpoint.com/navigate



  5. CyberArk Impact

    • Description: CyberArk's global conference dedicated to privileged access management and identity security.

    • Website: cyberark.com/impact



  6. One Identity UNITE

    • Description: One Identity's user and partner conference covering identity governance, access management, and privileged management solutions.

    • Website: oneidentity.com/unite



  7. IBM Think

    • Description: IBM's annual conference that includes sessions on identity management, security, and enterprise technology.

    • Website: ibm.com/think



  8. Ping Identity Summit

    • Description: Ping Identity's event focusing on intelligent identity solutions for secure access.

    • Website: pingidentity.com



  9. Oracle OpenWorld

    • Description: Oracle's flagship conference covering a wide range of enterprise technologies, including identity management solutions.

    • Website: oracle.com/openworld



  10. Micro Focus Universe

    • Description: Micro Focus's annual event covering identity management, security, and IT operations.

    • Website: microfocus.com/universe



  11. Entrust Engage

    • Description: Entrust's event focusing on identity verification, secure transactions, and digital security.

    • Website: entrust.com/engage



  12. Thales Security Summit

    • Description: Thales's event covering data protection, identity, and access management solutions.

    • Website: thalesgroup.com



  13. Cisco Live

    • Description: Cisco's annual conference that includes sessions on network security and identity services.

    • Website: ciscolive.com



  14. Dell Technologies World

    • Description: Dell's event covering a range of technologies, including security and identity management.

    • Website: delltechnologiesworld.com



  15. VMware Explore

    • Description: VMware's event (formerly VMworld) with sessions on virtualization, cloud, and identity management.

    • Website: vmware.com/explore



  16. Amazon AWS re:Invent

    • Description: AWS's annual conference with tracks on cloud security and identity management services.

    • Website: reinvent.awsevents.com



  17. Google Cloud Next

    • Description: Google's event covering cloud services, including identity and security solutions.

    • Website: cloud.withgoogle.com/next



  18. SecurID RSA Conference

    • Description: Focused on SecurID's identity and access management solutions.

    • Website: securid.com

Additional Identity & Cybersecurity Events

Exploring cybersecurity events beyond the IAM niche can greatly benefit your team's overall effectiveness. While these conferences may not focus solely on identity management, they cover a range of topics that intersect with or complement IAM efforts. Attending such events helps you stay informed about broader security trends, emerging threats, and innovative defense strategies, enabling you to integrate this knowledge into your IAM practices for a more comprehensive security posture.

  1. CyberTech Global

    • Description: Covers a wide range of cybersecurity topics, including identity management and protection.

    • Website: cybertechconference.com



  2. European Cyber Security Conference

    • Description: Discusses various aspects of cybersecurity, including identity and access management.

    • Website: forum-europe.com



  3. Smart Card Alliance Events

    • Description: Focus on smart card technology, identity verification, and secure transactions.

    • Website: securetechalliance.org



  4. Mobile World Congress (MWC)

    • Description: While broader in scope, MWC often includes significant content on mobile identity and security.

    • Website: mwcbarcelona.com



  5. ISSE (Information Security Solutions Europe)

    • Description: Addresses various information security topics, including identity management.

    • Website: isse.eu.com



  6. HID Global Events

    • Description: HID Global hosts events focusing on secure identity solutions, access control, and authentication.

    • Website: hidglobal.com/events



  7. NetIQ/OpenText Events

    • Description: Events covering identity and access management solutions provided by NetIQ, now part of OpenText.

    • Website: opentext.com/events

About Natoma

Natoma enables enterprises to adopt AI agents securely. The secure agent access gateway empowers organizations to unlock the full power of AI, by connecting agents to their tools and data without compromising security.

Leveraging a hosted MCP platform, Natoma provides enterprise-grade authentication, fine-grained authorization, and governance for AI agents with flexible deployment models and out-of-the-box support for 100+ pre-built MCP servers.

You may also be interested in:

A confused user looking at two options

MCP Access Control: OPA vs Cedar — The Definitive Guide

Two policy engines dominate the MCP access control landscape: Open Policy Agent (OPA) with its Rego language, and AWS Cedar. Unpack both and review when to use which.

A confused user looking at two options

MCP Access Control: OPA vs Cedar — The Definitive Guide

Two policy engines dominate the MCP access control landscape: Open Policy Agent (OPA) with its Rego language, and AWS Cedar. Unpack both and review when to use which.

A confused user looking at two options

MCP Access Control: OPA vs Cedar — The Definitive Guide

Two policy engines dominate the MCP access control landscape: Open Policy Agent (OPA) with its Rego language, and AWS Cedar. Unpack both and review when to use which.

A stylized depiction of a globe with a security shield symbol

Practical Examples: Mitigating AI Security Threats with MCP and A2A

Explore examples of prominent AI-related security threats—such as Prompt Injection, Data Exfiltration, and Agent Impersonation—and illustrate how MCP and A2A support mitigation of these threats.

A stylized depiction of a globe with a security shield symbol

Practical Examples: Mitigating AI Security Threats with MCP and A2A

Explore examples of prominent AI-related security threats—such as Prompt Injection, Data Exfiltration, and Agent Impersonation—and illustrate how MCP and A2A support mitigation of these threats.

A stylized depiction of a globe with a security shield symbol

Practical Examples: Mitigating AI Security Threats with MCP and A2A

Explore examples of prominent AI-related security threats—such as Prompt Injection, Data Exfiltration, and Agent Impersonation—and illustrate how MCP and A2A support mitigation of these threats.

A stylized depiction of five interlinked cubes and a lock icon

Understanding MCP and A2A: Essential Protocols for Secure AI Agent Integration

Explore what MCP and A2A are, how they work together, and why they are essential, yet not sufficient on their own—for secure, scalable AI agent deployments in the enterprise.

A stylized depiction of five interlinked cubes and a lock icon

Understanding MCP and A2A: Essential Protocols for Secure AI Agent Integration

Explore what MCP and A2A are, how they work together, and why they are essential, yet not sufficient on their own—for secure, scalable AI agent deployments in the enterprise.

A stylized depiction of five interlinked cubes and a lock icon

Understanding MCP and A2A: Essential Protocols for Secure AI Agent Integration

Explore what MCP and A2A are, how they work together, and why they are essential, yet not sufficient on their own—for secure, scalable AI agent deployments in the enterprise.