• Mobile Security - Gartner Cyber Security Conference

    Mark Your Calendar

    Gartner Security & Risk Management Summit 2017
    September 18-19

    Save the date
  • Mobile Security - Gartner Cyber Security Conference

    Register Now and Save

    Early Bird Now Open
    Save €325 when you register before 21 July 2017 

    Register now
  • Mobile Security - Gartner Cyber Security Conference

    Stay Connected

    Access key information and hear what everyone is saying about the event

    Follow #GartnerSEC
  • Mobile Security - Gartner Cyber Security Conference

    Stay Ahead

    Get the latest news and updates on the agenda first.

    Sign-up Here

Manage Risk. Build Trust. Embrace Change.

Agility. Efficiency. Productivity. Profit.
Digital business can yield many benefits, but it also exposes organizations to new threats and risks. Today’s security and risk practitioners face unprecedented challenges in dealing with the volume and velocity of digital business interactions.
To realize the full potential of digital business, security and risk leaders must deliver a program that establishes the enterprise, with its systems and employees, as a trusted participant in the digital economy. This requires organizations to use adaptive security architectures capable of leveraging intelligence and intelligent systems to enable context-aware security controls. Building resilient digital business systems that are versatile and dynamic allows security and risk leaders to prepare for and head off increasingly dangerous cyberthreats.
At the Gartner Security & Risk Management Summit you’ll learn how to use proven practices as well as innovative technologies and methods to help manage increasing cybersecurity risks without unnecessarily inhibiting the business.

View benefits at Security & Risk Management Summit for individuals in the following roles:
Roles include:
  • Security strategy
  • Security investments
  • Board and stakeholder approval
  • Organization & culture
  • Transforming security for digital business
Chief Information Security Officers (CISO)
Roles include:
  • IT Risk management strategy
  • Operational Technology risk management
  • Governance, Risk & Compliance (GRC)
  • IT vendor risk management
Chief Risk Officers, Chief Privacy Officers, Compliance Leaders
Roles include:
  • Cloud, IoT & mobile security
  • Network security
  • Security awareness
  • Threat intelligence and protection
  • Vulnerability Management
  • Identity & Access Management
  • Vendor selection
Security Leaders and Architects
Roles include:
  • BCM strategy
  • Disaster recovery management
  • Crisis Management
  • BCM governance
Business Continuity and Disaster Recovery Executives

What You Will Learn

  • Gain insights to stay ahead of expanding scopes of responsibility & threats
  • Align security & risk strategies with enterprise objectives
  • Apply the latest techniques to tackle risks in cloud, OT, IoT and IT
  • Maximize enterprise ROI by using the latest BCM and enterprise resilience practices
  • Build a culture that drives security performance through employee engagement

See what attendees have said about what they learned

Features & Benefits

  • Gartner Analyst Sessions: Gartner analysts presenting select research, targeted to your priorities
  • Gartner Analyst One-on-One Meetings: Sit privately for 30 minutes with a Gartner analyst specializing in a topic you'd like to discuss
  • Analyst-User Roundtables: Hear how your colleagues from various industries tackle problems similar to yours
  • End-User Case Studies: We invite a number of end users to personally present leading-edge case studies and answer questions
  • Workshops: Intimate workshops provide an opportunity to drill down on specific "how to" topics in a small group environment
  • Exhibitor Access: Exclusive access to select exhibitors to make informed decisions
  • Solution Provider Sessions: Sponsor-led sessions feature some of the market's most fascinating solutions
  • Face-to-Face Sponsor Meetings: Discuss your technology requirements with qualified solutions providers
  • Group Rate Discount: Maximize your learning by attending as a group 
  • Network With Peers: Hundreds of senior business and IT leaders will convene to interact and share their knowledge and objectives 

What's Included

  • Gartner analyst sessions
  • Gartner analyst one-on-one meetings
  • Analyst-user roundtables
  • End-user case studies
  • Workshops
  • Networking lunches and receptions
  • Agenda planning through Events Navigator
  • Exhibitor access at the solution showcase
  • Solution provider sessions

Frequently Asked Questions

Get answers to your questions here


We are currently preparing our 2017 Gartner Security & Risk Management Summit agenda which will feature comprehensive tracks that address the hottest topics within security, the latest threats in the market, new flexible security architectures, governance strategies, the CISO role and more.

Take a look at what we presented at the 2016 conference to better understand the areas we cover:

CISO Program

Created exclusively for Chief Information Security Officers (CISOs), the Gartner CISO Circle offers exclusive sessions and networking for the most senior security and risk leaders at the event. 

The CISO Circle experience includes:
  • 2 CISO sessions
  • 1 Workshop
  • 1 CISO exclusive networking lunch
  • Exclusive opportunities to meet with guest keynotes
  • Priority keynote seating

Eligibility: CISOs, CROs, Chief Privacy Officers, or most senior Security / Risk Executives in user organizations of more than $250M (or 1000 employees for Public Sector).

Application and qualification for the program included in registration. You must be registered for the Gartner Security & Risk Management Summit 2016 in order to attend the CISO Circle. 

2017 Hot Topics

  • Cybersecurity, threat management and context-aware digital trust
  • Risks and opportunities of emerging technologies: smart machines, AI, IoT and OT
  • Data governance and Data security and risk governance
  • Enabling safer cloud computing
  • Informed risk governance
  • Security analytics, advanced attack detection and incident response
  • Privacy and data security
  • People-centric security strategies
  • Agile strategies to secure digital business
  • Adaptive security architecture
  • Mobile security and ByoD for digital business
  • Protecting vital infrastructure
  • Identity governance and access management

Previous Programs

Below are a few programs we have run at our previous Security and Risk Management Events:

A. Chief Information Security Officer (CISO) Program: The CISO as a Business Leader
The acceleration toward digital business has presented CISOs with new challenges. They must understand the goals of the business, quickly identify and assess the associated risks, and communicate the relevant risks to the business in business terms. The CISO program helps you become a recognized business leader, superstar communicator and facilitator, and problem-solver.

B. IT Security Program: Building Trust and Resilience with More Agile Security
Get practical methods and long-term strategies to build a more trusted and resilient environment for digital business and to support an IT organization that’s more agile than ever. Sessions cover emerging trends and state-of-the-art practices and technologies for cloud, mobile, data, application endpoint and network security.

C. Risk Management and Compliance Program: Underpinning the Digital Business Transition
Digital risks are increasing as newer data sources and technologies are woven into the fabric of the business. As organizations adopt more cloud technology and explore more digital business opportunities, existing risk management strategies and practices become quickly outdated. This program highlights risks and complexities that you should expect in transitioning to digital business, as well as methods for mitigating these new risk management challenges.

Virtual Tracks
  • TechInsights: Security Architecture
  • Business Continuity Management
  • Identity and Access Management
  • Cloud Security
  • Mobile Security
  • IoT Security
The only event in security worth attending!

- Security Governance, Sogei

Key Take-Aways from the 2016 Conference

More than 700 attendees participated in on-site benefits, heard the latest security and risk management presentations from the Gartner Research community on today’s most pressing topics, attended workshops run by expert analysts and industry leaders, heard real-life experiences during peer case studies, engaged in analyst-user roundtables and one-on-one meetings with Gartner analysts, and checked out the latest solutions at the Solution Showcase.

Key Take-Aways from the 2016 Conference

  • Gain the role-specific tools and strategies to stay ahead of expanding scopes of responsibility and increasing threats
  • Align security and risk management strategies with enterprise objectives
  • Assure compliance with new regulatory, compliance, privacy and e-discovery requirements
  • Apply the latest techniques to tackle risks in cloud, OT, IoT and IT
  • Maximize enterprise ROI by using the latest BCM and enterprise resilience practices
  • Build a culture that drives security performance through employee engagement


Listen to inspirational guest keynote speakers; hear from Gartner-invited end-user case study speakers – real practitioners with real-world knowledge; and learn from Gartner analysts – the foremost experts in their areas of focus.

Highlighted Speakers from the 2016 Summit

  • Philippe Petit
    Philippe Petit

    World Renowned High Wire Artist and Risk Taker

  • Ramon Krikken
    Ramon Krikken

    Research VP


  • Debra Logan
    Debra Logan

    VP & Gartner Fellow


  • Paul Proctor
    Paul Proctor

    VP Distringuished Analyst


  • John Wheeler
    John Wheeler

    Research Director


  • Roberta Witty
    Roberta Witty

    Research VP


What We Hear About Our Speakers

Gartner put on an excellent keynote, that not only demonstrated the security journey of the past but how we should use those experiences to take a more realistic approach to security today

- Senior IAM Technician, Standard Life PLC


Meet the Solution Providers at the Forefront of Security & Risk Management

The Security & Risk Management Summit will help you develop a "short list" of technology and service providers who can meet your particular needs. You'll receive exclusive access to some of the world's leading technology and service providers in a variety of settings.

  • Learn more about the exhibitor experience. 
  • Contact us to learn more about opportunities to exhibit. 




Become an Exhibitor

Take Your Place Among Technology's Key Players
Join us now


Exhibitor Interactions

Read more about how you can interact with our exhibitors

Venue & Travel

London, UK


InterContinental London - The O2
Waterview Drive
London, United Kingdom - SE10 0TW

Special Gartner Hotel Room Rate

A limited number of rooms have been held at the InterContinental – London The O2 Hotel, for attendees of the Gartner Security & Risk Management Summit

Room Rates:
There are three special promotional Gartner rates available: 
Superior - £205 per night (Includes Breakfast) excluding VAT
Club Room - £255 per night (Includes Breakfast) excluding VAT
Club Suite - £355 per night (Includes Breakfast) excluding VAT

To make a booking please book directly via the hotel 

Alternatively you can e-mail your request to groups@iclondon-theo2.com quoting the promotion code: "G6G".

Reservation Office Opening Times:
Monday to Friday: 09:00 - 17:00 (GMT).
Closed on weekends.


Alternative Hotel Recommendations

Please note that Gartner does not hold preferential rates at these hotels

Hilton Canary Wharf
South Quay
Marsh Wall
London E14 9SH
A 5-minute walk from Canary Wharf Tube Station and one stop from North Greenwich on the Jubilee Line

Aloft London Excel
One Eastern Gateway
Royal Victoria Dock
London E16 1FR
A short walk to the Emirates Airline, and a 5 minute walk to the Intercontinental

Park Plaza Westminster Bridge London
200 Westminster Bridge Rd
London SE1 7UT
A short walk to Waterloo Station and 15 minute journey on the Jubilee Line to North Greenwich

Crown Plaza Docklands
Royal Victoria Dock
Western Gateway
London E16 1AL
A 5 minute walk to the Emirates Air Line then a short walk to Intercontinental, The O2

A Note About Accomodations

Gartner has been made aware that a service provider called Exhibition Housing Management has contacted a number of individuals who are attending our conference to offer hotel reservation services. Exhibition Housing Management does not represent Gartner, nor have we authorized them to contact attendees on our behalf. 
Learn more