• Mobile Security - Gartner Cyber Security Conference

    Mark Your Calendar

    Gartner Security & Risk Management Summit 2017
    September 18-19

    Save the date
  • Mobile Security - Gartner Cyber Security Conference

    Register Now and Save

    Early Bird Now Open
    Save €325 when you register before 21 July 2017 

    Register now
  • Mobile Security - Gartner Cyber Security Conference

    Stay Connected

    Access key information and hear what everyone is saying about the event

    Follow #GartnerSEC
  • Mobile Security - Gartner Cyber Security Conference

    Stay Ahead

    Get the latest news and updates on the agenda first.

    Sign-up Here

Manage Risk. Build Trust. Embrace Change.

Agility. Efficiency. Productivity. Profit.
Digital business can yield many benefits, but it also exposes organizations to new threats and risks. Today’s security and risk practitioners face unprecedented challenges in dealing with the volume and velocity of digital business interactions.
To realize the full potential of digital business, security and risk leaders must deliver a program that establishes the enterprise, with its systems and employees, as a trusted participant in the digital economy. This requires organizations to use adaptive security architectures capable of leveraging intelligence and intelligent systems to enable context-aware security controls. Building resilient digital business systems that are versatile and dynamic allows security and risk leaders to prepare for and head off increasingly dangerous cyberthreats.
At the Gartner Security & Risk Management Summit you’ll learn how to use proven practices as well as innovative technologies and methods to help manage increasing cybersecurity risks without unnecessarily inhibiting the business.

View benefits at Security & Risk Management Summit for individuals in the following roles:
Roles include:
  • Security strategy
  • Security investments
  • Board and stakeholder approval
  • Organization & culture
  • Transforming security for digital business
Chief Information Security Officers (CISO)
Roles include:
  • IT Risk management strategy
  • Operational Technology risk management
  • Governance, Risk & Compliance (GRC)
  • IT vendor risk management
Chief Risk Officers, Chief Privacy Officers, Compliance Leaders
Roles include:
  • Cloud, IoT & mobile security
  • Network security
  • Security awareness
  • Threat intelligence and protection
  • Vulnerability Management
  • Identity & Access Management
  • Vendor selection
Security Leaders and Architects
Roles include:
  • BCM strategy
  • Disaster recovery management
  • Crisis Management
  • BCM governance
Business Continuity and Disaster Recovery Executives

What You Will Learn

  • Gain insights to stay ahead of expanding scopes of responsibility & threats
  • Align security & risk strategies with enterprise objectives
  • Apply the latest techniques to tackle risks in cloud, OT, IoT and IT
  • Maximize enterprise ROI by using the latest BCM and enterprise resilience practices
  • Build a culture that drives security performance through employee engagement

See what attendees have said about what they learned

Features & Benefits

  • Gartner Analyst Sessions: Gartner analysts presenting select research, targeted to your priorities
  • Gartner Analyst One-on-One Meetings: Sit privately for 30 minutes with a Gartner analyst specializing in a topic you'd like to discuss
  • Analyst-User Roundtables: Hear how your colleagues from various industries tackle problems similar to yours
  • End-User Case Studies: We invite a number of end users to personally present leading-edge case studies and answer questions
  • Workshops: Intimate workshops provide an opportunity to drill down on specific "how to" topics in a small group environment
  • Exhibitor Access: Exclusive access to select exhibitors to make informed decisions
  • Solution Provider Sessions: Sponsor-led sessions feature some of the market's most fascinating solutions
  • Face-to-Face Sponsor Meetings: Discuss your technology requirements with qualified solutions providers
  • Group Rate Discount: Maximize your learning by attending as a group 
  • Network With Peers: Hundreds of senior business and IT leaders will convene to interact and share their knowledge and objectives 

What's Included

  • Gartner analyst sessions
  • Gartner analyst one-on-one meetings
  • Analyst-user roundtables
  • End-user case studies
  • Workshops
  • Networking lunches and receptions
  • Agenda planning through Events Navigator
  • Exhibitor access at the solution showcase
  • Solution provider sessions

Frequently Asked Questions

Get answers to your questions here


We are currently preparing our 2017 Gartner Security & Risk Management Summit agenda which will feature comprehensive tracks that address the hottest topics within security, the latest threats in the market, new flexible security architectures, governance strategies, the CISO role and more.

Take a look at what we presented at the 2016 conference to better understand the areas we cover:

CISO Program

Created exclusively for Chief Information Security Officers (CISOs), the Gartner CISO Circle offers exclusive sessions and networking for the most senior security and risk leaders at the event. 

The CISO Circle experience includes:
  • 2 CISO sessions
  • 1 Workshop
  • 1 CISO exclusive networking lunch
  • Exclusive opportunities to meet with guest keynotes
  • Priority keynote seating

Eligibility: CISOs, CROs, Chief Privacy Officers, or most senior Security / Risk Executives in user organizations of more than $250M (or 1000 employees for Public Sector).

Application and qualification for the program included in registration. You must be registered for the Gartner Security & Risk Management Summit 2016 in order to attend the CISO Circle. 

2017 Hot Topics

  • Cybersecurity, threat management and context-aware digital trust
  • Risks and opportunities of emerging technologies: smart machines, AI, IoT and OT
  • Data governance and Data security and risk governance
  • Enabling safer cloud computing
  • Informed risk governance
  • Security analytics, advanced attack detection and incident response
  • Privacy and data security
  • People-centric security strategies
  • Agile strategies to secure digital business
  • Adaptive security architecture
  • Mobile security and ByoD for digital business
  • Protecting vital infrastructure
  • Identity governance and access management

2017 Programs

Featured agenda programs include:

A. Chief Information Security Officer (CISO) Program: Paving the Way for Algorithmic Business
As businesses go digital, the “control everything” approach does not work anymore. Join us for the CISO Program to identify how you can fortify your position as a recognized business leader, strong communicator and go-to problem solver for digital business innovation.

B. Risk Management and Compliance Program: Managing Risk on the Road to Digital
Digital risks are expanding as more data and technologies are woven into the fabric of the business. The evolving European compliance and regulatory landscape compounds the complexity of these risks. This program highlights the risks and complexities that you should expect when transitioning to digital business. Learn new methods to mitigate these risk management challenges and to transition from recovery to resilience.

C. Security Program: Building Trust and Resilience with Agile Security
Security programs must evolve to support new use cases, without neglecting legacy infrastructure that continues to sustain the organization. Sessions in this program cover the emerging trends and state-of-the-art security practices as well as technologies for cloud, data, application, endpoints, mobile and network security. Get practical strategies to build a trusted, resilient environment for digital business and agile IT.

Virtual Tracks
  • Cloud Security: Transitioning Safely From On-Premises to the Cloud
  • Data Security: Protecting Your Critical Assets
  • TechInsights: Building Secure Digital Architecture
  • Business Continuity Management: Transitioning from Recovery to Resilience
  • Security Analytics: Catching All Threats
The only event in security worth attending!

- Security Governance, Sogei

Key Take-Aways from the 2016 Conference

More than 700 attendees participated in on-site benefits, heard the latest security and risk management presentations from the Gartner Research community on today’s most pressing topics, attended workshops run by expert analysts and industry leaders, heard real-life experiences during peer case studies, engaged in analyst-user roundtables and one-on-one meetings with Gartner analysts, and checked out the latest solutions at the Solution Showcase.

Key Take-Aways from the 2016 Conference

  • Gain the role-specific tools and strategies to stay ahead of expanding scopes of responsibility and increasing threats
  • Align security and risk management strategies with enterprise objectives
  • Assure compliance with new regulatory, compliance, privacy and e-discovery requirements
  • Apply the latest techniques to tackle risks in cloud, OT, IoT and IT
  • Maximize enterprise ROI by using the latest BCM and enterprise resilience practices
  • Build a culture that drives security performance through employee engagement


Listen to inspirational guest keynote speakers; hear from Gartner-invited end-user case study speakers – real practitioners with real-world knowledge; and learn from Gartner analysts – the foremost experts in their areas of focus.

Speakers Featuring This Year

  • Ant Allan
    Ant Allan

    Research VP


  • Gregg Kreizman
    Gregg Kreizman

    Research VP


  • Tom Scholtz
    Tom Scholtz

    Research VP


  • Rob McMillan
    Rob McMillan

    Research Director


  • Earl Perkins
    Earl Perkins

    Research VP


Conference Chair

Jeremy D'Hoinne
Jeremy D'Hoinne

Research VP

As a Research Director for infrastructure protection, Jeremy D'Hoinne assists Chief Information Security Officers and their teams to develop strategies to protect against advanced threats. Mr. D'Hoinne's research focuses on network security, including technologies such as network and web application firewalls, IPS, sandboxing, and network traffic analysis. 

Mr. D'Hoinne also collaborates with Gartner risk management and workforce management team on organizational challenges, such as security skills shortage, or how security organizations adapt to bimodal IT.
Prior to joining Gartner, Mr. D'Hoinne has helped a network security vendor to create a network firewall, mixing innovations with improvements and enterprises' feedback. He has defined several product lines and software versions, providing his company with a strong roadmap and message supporting its technology. 

Using his previous experiences in penetration testing and R&D development, Mr. D'Hoinne has also developed a set of zero-day protections against various network threats.


What We Hear About Our Speakers

“It is great to engage with peers who have the same challenges but are working together through events like this and sharing knowledge to address and highlight issues and solutions”
“Very useful sessions – good references on key topics providing my with a new perspective to take back to my IT and Business Leadership Team”
“Provided a clear and new insight into the governance and compliance areas that is required, great face to face chats with vendors to see what is available in the market”
“The GDPR take away was very useful and the Gartner Analyst was very good at addressing all the key points and actions needed going forward – best sessions I have ever been to”
“Great opportunity to catch up on the latest thinking in security & IT Risk Management. Very relevant and though provoking”
“The event provides very good insight about the relevant and current technology trends and security issues.”
“I am new to industrial security and this event has given my a good overview of the security landscape”
“I found the sessions most insightful, clear and focussed. It was exactly what I was looking for when coming here”


Meet the Solution Providers at the Forefront of Security & Risk Management

The Security & Risk Management Summit will help you develop a "short list" of technology and service providers who can meet your particular needs. You'll receive exclusive access to some of the world's leading technology and service providers in a variety of settings.

  • Learn more about the exhibitor experience. 
  • Contact us to learn more about opportunities to exhibit. 




Become an Exhibitor

Take Your Place Among Technology's Key Players
Join us now


Exhibitor Interactions

Read more about how you can interact with our exhibitors

Venue & Travel

London, UK


InterContinental London - The O2
Waterview Drive
London, United Kingdom - SE10 0TW

Special Gartner Hotel Room Rate

A limited number of rooms have been held at the InterContinental – London The O2 Hotel, for attendees of the Gartner Security & Risk Management Summit

Room Rates:
There are three special promotional Gartner rates available: 
Superior - £205 per night (Includes Breakfast) excluding VAT
Club Room - £255 per night (Includes Breakfast) excluding VAT
Club Suite - £355 per night (Includes Breakfast) excluding VAT

To make a booking please book directly via the hotel 

Alternatively you can e-mail your request to groups@iclondon-theo2.com quoting the promotion code: "G6G".

Reservation Office Opening Times:
Monday to Friday: 09:00 - 17:00 (GMT).
Closed on weekends.


Alternative Hotel Recommendations

Please note that Gartner does not hold preferential rates at these hotels

Hilton Canary Wharf
South Quay
Marsh Wall
London E14 9SH
A 5-minute walk from Canary Wharf Tube Station and one stop from North Greenwich on the Jubilee Line

Aloft London Excel
One Eastern Gateway
Royal Victoria Dock
London E16 1FR
A short walk to the Emirates Airline, and a 5 minute walk to the Intercontinental

Park Plaza Westminster Bridge London
200 Westminster Bridge Rd
London SE1 7UT
A short walk to Waterloo Station and 15 minute journey on the Jubilee Line to North Greenwich

Crown Plaza Docklands
Royal Victoria Dock
Western Gateway
London E16 1AL
A 5 minute walk to the Emirates Air Line then a short walk to Intercontinental, The O2

A Note About Accomodations

Gartner has been made aware that a service provider called Exhibition Housing Management has contacted a number of individuals who are attending our conference to offer hotel reservation services. Exhibition Housing Management does not represent Gartner, nor have we authorized them to contact attendees on our behalf. 
Learn more