• Mobile Security - Gartner Cyber Security Conference

    Agendas based on your role and priorities

    - Chief Information Security Officers (CISOs)
    - Risk Management and Compliance
    - IT Security
    - Security Architecture

    View now
  • Mobile Security - Gartner Cyber Security Conference

    Get practical insights from your peers

    In case studies from Heartland Payment Systems, QBE Insurance & Curtin University

    View sessions
  • Mobile Security - Gartner Cyber Security Conference

    Introducing the Financial Services Forum

    A Gartner training forum for Financial Services security and risk professionals.

    Learn more
  • Mobile Security - Gartner Cyber Security Conference

    Gartner analyst spotlight: Cloud

    If cloud is your priority view suggested Gartner analysts and sessions to help you establish a robust cloud security strategy.

    Learn more

Build Trust and Resilience at the Speed of Business

The 10th annual Gartner Security & Risk Management Summit will provide you with the proven practices and strategies that you need to maintain cost-effective security and risk programs to support digital business and drive enterprise success. 

Build the trust and resilience needed to seize opportunities, reduce risks, and deploy new security models. 

Gartner Security & Risk Management Summit is designed for individuals with the following roles and responsibilities:
Roles include:
  • Security & risk management
  • Business/IT security alignment
  • IT/OT security integration
  • Governance & policy setting
  • Creating a risk-aware culture
  • People-centric security
Chief Information Security Officer (CISO)
Roles include:
  • Chief Risk Officer (CRO)
  • IT risk professionals
  • Digital risks in financial services
  • Operational technology risks
  • GRC application strategy
  • Information governance
  • Big data litigation & regulatory risks
Risk Management
Roles include:
  • Chief Privacy Officer
  • Security professionals
  • Identity & access management
  • Security technology professional
  • Business continuity & IT disaster recovery professionals
  • Network security manager
  • Finance, audit, legal risk & compliance managers
Information Security Professionals
Roles include:
  • Cloud computing security
  • Mobile application & security
  • Data security
  • Social media & security
  • Consumerization
  • Advanced targeted threats
  • Incident response
  • Cybersecurity
  • Addressing emerging threats
Technical Professionals

What You Will Learn


  • Gain role-specific strategies, tools and insights to stay ahead of expanding scopes of responsibility and increasing threats
  • Align security and risk management strategies with enterprise objectives 
  • Assure compliance with new regulatory, compliance and privacy requirements 
  • Learn how to apply the latest techniques to tackle risks in cloud, OT, IoT and IT
  • Maximize enterprise ROI by using the latest enterprise resilience practices 

See what attendees have said about what they learned

Features & Benefits


  • Gartner Analyst Sessions: Gartner analysts presenting select research, targeted to your priorities
  • Gartner Analyst One-on-One Meeting: Sit privately for 30 minutes with a Gartner analyst specializing in a topic you'd like to discuss
  • Analyst-User Roundtables: Hear how your colleagues from various industries tackle problems similar to yours
  • Ask the Practitioner Roundtables: These roundtable discussions, led by your peer, will enable you to interact with others facing the same challenges to discuss best practices and
    share experiences
  • End-User Case Studies: We invite a number of end users to personally present leading-edge case studies and answer questions
  • Workshops: Intimate workshops provide an opportunity to drill down on specific "how to" topics in a small group environment
  • Exhibitor Access: Exclusive access to select exhibitors to make informed decisions
  • Solution Provider Sessions: Sponsor-led sessions feature some of the market's most fascinating solutions
  • Face-to-Face Sponsor Meetings: Discuss your technology requirements with qualified solutions providers
  • Group Rate Discount: Maximize your learning by attending as a group 
  • Network With Peers: Hundreds of senior business and IT leaders will convene to interact and share their knowledge and objectives 
  • Gartner CISO Circle: Created exclusively for CISOs, you'll be joined together with the world’s foremost security and risk leaders to share in thought-leading peer networking and information exchange
  • Earn CPE Credits: Earn CPE credits toward ISC2, ISACA and DRII certification programs by attending the Summit

What's Included


  • Gartner Analyst Sessions
  • Gartner Analyst One-on-One Meeting
  • Analyst-User Roundtables
  • Ask the Practitioner Roundtables
  • End-User Case Studies
  • Workshops
  • Gartner CISO Circle (by application only)
  • Networking lunches and receptions
  • One-year access to  Events On Demand
  • Agenda planning through Gartner Events Navigator
  • Exhibitor access at the Solution Showcase
  • Solution Provider Sessions

Frequently Asked Questions


Get answers to your questions here

 


Agenda

The comprehensive 2016 agenda addresses the latest threats, flexible new security architectures, governance strategies, the CISO role and more. It’s a unique opportunity to reinvent your approach to security and risk for the digital age based on Gartner’s practical recommendations and trusted independent research. 
 


 

What's new for 2016

  • Expanded agenda with focus on Security Architecture: A deep dive into the architectures and solutions for security professionals
  • “State of the Market Series”: Gartner’s view on the state of industry for security and risk
  • Gartner "Essentials”: Core Gartner content that is essential for all security and risk professionals
  • Gartner CISO Circle: Exclusive content and networking programs for CISOs

Tracks

AGENDA TRACKS

​Chief Information Security Officer (CISO) Program

HOT TOPICS: Establish and maintain governance, Manage bimodal risks, Effective communication, Demonstrate value, Improve soft skills, Prepare for the future, Identity and access management

The acceleration toward digital business has presented CISOs with new challenges. They must understand the goals of the business, quickly identify and assess the associated risks, and communicate the relevant risks to the business in business terms. The CISO Program helps you become a recognized business leader, superstar communicator and facilitator, and problem-solver. 

The Risk Management and Compliance Program 
HOT TOPICS: Risk management and the cloud, The risk manager of tomorrow, Technologies and digital risk, Aligning with business goals, Developing an integrated risk management program, Threat landscape 

Digital risks are increasing as newer data sources and technologies are woven into the fabric of the business. As organizations adopt more cloud technology and explore more digital business opportunities, existing risk management strategies and practices become quickly outdated. This program highlights risks and complexities that you should expect in transitioning to digital business, as well as methods for mitigating these new risk management challenges.

The IT Security Program ​
HOT TOPICS: Cybersecurity, Enabling a safer cloud, Mobile security for digital business, Protecting critical data, Emerging security technologies, IoT, Network and endpoint security challenges, Building a resilient infrastructure

Get practical methods and long-term strategies to build a more trusted and resilient environment for digital business and to support an IT organization that’s more agile than ever. Sessions cover emerging trends and state-of-the-art practices and technologies for cloud, mobile, data, application endpoint and network security.

NEW! TechInsights: Security Architecture
HOT TOPICS: Addressing cloud serviced adoption risk, Safety and security in IoT, Application security, Improving the measurement and management of risk, Optimizing SIEM and threat intelligence tools, Privileged account management

The demands on information security and IT risk practitioners are ever increasing. Not only does the attack and threat landscape change constantly, but organizations’ digital business objectives accelerate the adoption of current and emerging technology. Learn technical and tactical insights that enable risk-aware, business-outcome-focused architectures and solutions. 

VIRTUAL TRACKS

Cloud Security 

Use of public cloud computing is no longer an "if," but a "when" and "where." Maximizing the benefits of cloud computing and emerging technologies requires the application of traditional security and risk management skills in new contexts, using new technologies, new processes and even new IT mindsets. This virtual track addresses some of these issues to help you establish a robust cloud security strategy.

Application and Data Security
As attackers exploit the application layer, applications that process the to-be-protected data should be securely developed, tested for security vulnerabilities and protected in production. Encryption, CASBs, DCAP and DLP are just some of the resources available to professionals. This track covers the strategies and challenges that direct the selection of solutions to manage risks across the digital business.

Endpoint and Mobile Security
IT leaders face a chaos of multiplatform, mobile and personal ownership challenges amid increasingly chaotic work styles. A balanced endpoint security plan must account for applications, data, OS and platform-specific capabilities. Heterogeneity is a fact of life, and one-size-fits-all solutions are unrealistic. This track addresses some of these challenges and provides opportunities to assess your options from multiple points of view.

Identity and Access Management
With identity a sustaining element of digital business, IAM is a critical obligation for business leaders, security and risk professionals, and IT staff. IAM leaders must align IAM initiatives with the organization's security, applications, data and digital business strategies. They are obligated to ensure their efforts are complementary to the organization's broader IT issues. This virtual track addresses the approaches for managing users' identities, privileges, access and centers on the technologies and best practices that support security, risk and business outcomes.
 

Hot topics

  • Cloud Security
  • Mobile Security
  • Application Security
  • Data Security
  • Security Awareness
  • Risk Management
  • Cybersecurity
  • Internet of Things
  • Endpoint Security
  • Identity and Access Management
The only event in security worth attending!

- Security Governance, Sogei



Speakers

Listen to inspirational guest keynote speakers; hear from Gartner-invited end-user case study speakers – real practitioners with real-world knowledge; and learn from Gartner analysts – the foremost experts in their areas of focus. 

Download Interactive Analyst Guide

Highlighted Speakers

  • Robert O. Carr
    Robert O. Carr

    CEO and Founder

    Heartland Payments Systems

    Read profile

  • Claude Mandy
    Claude Mandy

    Senior Information Security Officer

    QBE Insurance

    Read profile

  • Richard Addiscott
    Richard Addiscott

    Director IT Planning, Governance & Security

    Curtin University

    Read profile

  • Lieutenant General David Morrison AO
    Lieutenant General David Morrison AO

    Australia's Former Chief of Army and Australian of the Year 2016

    Read profile

  • Andrew Macleod
    Andrew Macleod

    Organizational Leader and Former Managing Director of Good Super

    Read profile

Exhibitors

Meet the Solution Providers at the Forefront of Security & Risk Management

The Security & Risk Management Summit will help you develop a "short list" of technology and service providers who can meet your particular needs. You'll receive exclusive access to some of the world's leading technology and service providers in a variety of settings.

  • Learn more about the exhibitor experience. 
  • Contact us to learn more about opportunities to exhibit. 

Premier


Platinum


Silver


Become an Exhibitor


Take Your Place Among Technology's Key Players
Join us now

 

Exhibitor Interactions


Read more about how you can interact with our exhibitors

Venue & Travel

Sydney, Australia

Venue

The  Hilton Hotel Sydney is offering very competitive rates to attendees at this Gartner summit. Room rates are $306 AUD (room only rate). A credit card is required to secure your booking and prepayment of one night is required. In order to book please click here to be taken to Hilton Sydney’s dedicated booking page. Bookings must be made before 18 August 2016. For any queries about hotel bookings please contact Jessica Benn at the Hilton Sydney on +61 2 9265 6050 or Jessica.Benn@Hilton.com .

The Hilton Sydney hotel is located right in the heart of the Sydney CBD on George Street, close to shopping, entertainment and corporate offices. Just 30 minutes from Sydney International and Domestic airports and only 50m from Town Hall Station, Hilton Sydney is ideally located for business or leisure .

Hilton Sydney Hotel
488 George Street
Sydney, Australia - NSW 2000

PARKING 
The car park for the Hilton Hotel is owned and managed by Secure Parking and is located on Pitt St. Due to one way road systems on George Street, please note that car access to Sydney Hilton is via Pitt Street only. Please program 255 Pitt Street if using a car navigational device. Hilton Valet Parking is available ($68 for 24 hours) or enter the car park directly at casual parking rates. 

CAR PARKING RATES 
Hilton offers guests and event attendees a special discounted rate of $51.20 (per entry). Please validate your ticket at reception to get this discounted rate. Prices subject to change, without prior notice 

MONDAY – FRIDAY (casual hourly rates) 

  • 0 – 0.5 hours $8.00
  • 0.5 hour – 1 hour $29.00
  • 1 hour – 2 hours $65.00
  • 2 hours – 3 hours $79.00
  • 3 + hours $84.00 

DIRECTIONS 
Getting to the Hilton Sydney hotel from Sydney International AirportBy TaxiFrom Sydney Airport, taxis are available to take you directly to the Hilton Sydney hotel. The journey normally takes around 30 minutes and costs approximately $45-$50.By CarEnter Sydney via the Eastern Distributor, take the William Street exit and travel along William Street into Park Street, turn right into Pitt Street. The Hilton Sydney hotel driveway, valet parking and car park are located 50 meters on the left side of Pitt Street. Please program 255 Pitt Street if using a car navigational device. There is a secure underground car park located at Hilton Sydney.By TrainAs an environmentally friendly hotel with a focus on sustainability we recommend you take the Train for direct, convenient access to the hotel from the airport and most other locations. There is a Train Station located at both the Sydney Domestic and International Airports with a direct line to the city. Exit the train at Town Hall Station and the Hilton Sydney hotel is located adjacent to the Victoria Galleries, entry via Pitt Street or George Street, Travelling time is around 25 minutes and costs approximately $15 per person each way.By BusFrom Sydney Domestic and International Airports a shuttle bus is available in front of the Arrivals Hall. The cost is approximately $16-$18 per person each way. Advance booking is not required, however for a shuttle bus transfer from Hilton Sydney to the airport pre-booking is required. 

Alternatively for local travel within Sydney to the Hilton hotel, the Transport NSW webpage offers useful information and a travel planner — 131500.com.au


Please Note


Due to George Street construction by NSW Government, travel times and routes may alter prior to your attendance at the Gartner Security & Risk Management Summit. For further information on the George St construction please visit the NSW Government website.