• Mobile Security - Gartner Cyber Security Conference

    Save the Date

    Gartner Security & Risk Management Summit
    12 – 13 September 2016 | London, UK

    Add to Your Calendar
  • Mobile Security - Gartner Cyber Security Conference

    Earn CPE Credits

    Earn CPE credits towards (ISC)2, ISACA and DRII

    Learn More
  • Mobile Security - Gartner Cyber Security Conference

    View 2015 Agenda

    Take a look at sessions from 2015

    View Agenda

Deliver effective security more efficiently

Gartner Security & Risk Management Summit 2016 provides you with best practices and strategies so you can maintain cost-effective security and risk programs in order to support digital business and drive enterprise success.

View key benefits at Security & Risk Management Summit for individuals in the following roles
Roles include:
  • Strategic planning for information security
  • Business/IT security alignment
  • IT/OT security integration
  • Governance and policy setting  
  • Creating a risk-aware culture
  • People-centric security
CIOs, CSOs, CISOs, CROs, CPOs and their teams
Roles include:
  • BCM Program Management
  • BCM Standards and Organization
  • Supplier Management/Third Party Risk
  • BCM Metrics
  • Cloud Service Provider Risk
  • IT-DRM exercise automation
  • 24/7 and Continuous application availability
  • Data Replication Alternatives and Strategies
Business continuity and IT disaster recovery managers
Roles include:
  • Digital Risks in Financial Services
  • Operational Technology Risks
  • GRC Application Strategy
  • Information Governance
  • Big Data Litigation and Regulatory Risks
Governance, risk and compliance consultants
Roles include:
  • Mobile Application & Security
  • Social Media & Security
  • Consumerization
  • Advanced Targeted Threats  
  • Incident Response
  • Cybersecurity
  • Cloud Computing Security
  • Addressing Emerging Threats
Network security manager, security executives and directors

What You Will Learn

  • Structure and manage each of your individual IT risk programs
  • Make IT risk programs more efficient and effective
  • Select approaches and vendor solutions
  • Articulate security and risk requirements in business language
  • Integrate BCM with overall risk and security programs
  • Architect an overall security and risk management strategy aligned to business needs
  • Create a more risk-aware organizational culture that supports risk management initiatives
  • Meet compliance regulations and leverage master data to manage risk

See what attendees have said about what they learned

Features & Benefits

  • Gartner Analyst Sessions: Gartner analysts presenting select research, targeted to your priorities
  • Gartner Analyst One-on-One Meetings: Sit privately for 30 minutes with a Gartner analyst specializing in a topic you'd like to discuss
  • Analyst-User Roundtables: Hear how your colleagues from various industries tackle problems similar to yours
  • End-User Case Studies: We invite a number of end users to personally present leading-edge case studies and answer questions
  • Workshops: Intimate workshops provide an opportunity to drill down on specific "how to" topics in a small group environment
  • Exhibitor Access: Exclusive access to select exhibitors to make informed decisions
  • Solution Provider Sessions: Sponsor-led sessions feature some of the market's most fascinating solutions
  • Face-to-Face Sponsor Meetings: Discuss your technology requirements with qualified solutions providers
  • Group Rate Discount: Maximize your learning by attending as a group 
  • Network With Peers: Hundreds of senior business and IT leaders will convene to interact and share their knowledge and objectives 

What's Included

  • Gartner Analyst Sessions
  • Gartner Analyst One-on-One Meetings
  • Analyst-User Roundtables
  • End-User Case Studies
  • Workshops
  • Networking lunches and receptions
  • Agenda planning through Events Navigator
  • Exhibitor access at the Solution Showcase
  • Solution Provider Sessions

Frequently Asked Questions

Get answers to your questions here


We're preparing our 2016 agenda which will feature comprehensive tracks to drill down on your hottest security and risk management topics based on your role, experience level and key focus.

2015 Tracks

  • Chief Information Security Officer (CISO) Program 
  • Risk Management and Compliance Program 
  • Security Manager Program: Technology, Trends and Operations
  • Business Continuity Management Program and the Internet of Things Program 

2015 Hot Topics

  • Cloud security
  • Application, network and infrastructure security
  • Mobile security
  • Cybersecurity
  • Digital business security and risk management
  • Operational technology (OT) security and risk management
  • Organizational resilience through BCM
  • Risk management and compliance
  • Security Awareness and training
The only event in security worth attending!

- Security Governance, Sogei

Key Take-Aways from the 2015 Conference

More than 500 attendees participated in on-site benefits, heard the latest security and risk management presentations from the Gartner Research community on today’s most pressing topics, attended workshops run by expert analysts and industry leaders, heard real-life experiences during peer case studies, engaged in analyst-user roundtables and one-on-one meetings with Gartner analysts, and checked out the latest solutions at the Solution Showcase.

Key Take-Aways from the 2015 Conference

  • Gain the role-specific tools and strategies to stay ahead of expanding scopes of responsibility and increasing threats
  • Align security and risk management strategies with enterprise objectives
  • Assure compliance with new regulatory, compliance, privacy and e-discovery requirements
  • Apply the latest techniques to tackle risks in cloud, OT, IoT and IT
  • Maximize enterprise ROI by using the latest BCM and enterprise resilience practices
  • Build a culture that drives security performance through employee engagement


Listen to inspirational guest keynote speakers; hear from Gartner-invited end-user case study speakers – real practitioners with real-world knowledge; and learn from Gartner analysts – the foremost experts in their areas of focus. 

Highlighted Speakers From the 2015 Conference

  • Ant Allan
    Ant Allan

    Research VP


  • John Girard
    John Girard

    VP Distringuished Analyst


  • Ramon Krikken
    Ramon Krikken

    Research VP


  • Debra Logan
    Debra Logan

    VP & Gartner Fellow


  • Paul Proctor
    Paul Proctor

    VP Distringuished Analyst


  • John Wheeler
    John Wheeler

    Research Director


  • Roberta Witty
    Roberta Witty

    Research VP


What We Hear About Our Speakers

Gartner put on an excellent keynote, that not only demonstrated the security journey of the past but how we should use those experiences to take a more realistic approach to security today

- Senior IAM Technician, Standard Life PLC


Meet the Solution Providers at the Forefront of Security & Risk Management

The Security & Risk Management Summit will help you develop a "short list" of technology and service providers who can meet your particular needs. You'll receive exclusive access to some of the world's leading technology and service providers in a variety of settings.

  • Learn more about the exhibitor experience. 
  • Contact us to learn more about opportunities to exhibit. 

Become an Exhibitor

Take Your Place Among Technology's Key Players
Join us now


Exhibitor Interactions

Read more about how you can interact with our exhibitors

Venue & Travel

London, UK


InterContinental London - The O2
1 Waterview Drive
Greenwich Peninsula
SE10 0TWP. 0203 740 5411
E. sales@iclondon-theo2.com

InterContinental London - The O2
Waterview Drive
London, United Kingdom - SE10 0TW

A Note About Accomodations

Gartner has been made aware that a service provider called Exhibition Housing Management has contacted a number of individuals who are attending our conference to offer hotel reservation services. Exhibition Housing Management does not represent Gartner, nor have we authorized them to contact attendees on our behalf. 
Learn more