• Mobile Security - Gartner Cyber Security Conference

    Agenda available

    Create a custimized agenda based on your
    current challenges and key intiatives 

    View Agenda
  • Mobile Security - Gartner Cyber Security Conference

    Gartner Predicts Security & Risk

    "By 2020, 30% of Global 2000 companies will 
    have been directly compromised by an independent 
    group of cyber activists or cybercriminals"

    View More Security & Risk Gartner Predictions
  • Mobile Security - Gartner Cyber Security Conference

    Brochure available

    View the brochure to discover whats new, what to expect and plan your time onsite!

    View Brochure
  • Mobile Security - Gartner Cyber Security Conference

    View the 5 agenda programs

    Discover how the programs are structrued and where best to utilize your time

    View Agenda Programs

Manage Risk and Deliver Security in a Digital World

Validate your security and risk management strategy, so you can see what needs to be improved, kept the same, or changed in your approach for a clear vision into the future.

View key benefits at Security & Risk Management Summit for individuals in the following roles
Discover how to:
  • Develop an integrated IT security & risk management strategy that aligns with business needs and supports business goals
  • Improve communications with the business and board of directors as well as the IT organization
  • Develop a risk management program that reduces risk without inhibiting business operations
  • Reduce firefighting in order to focus on strategic goals
C Level & Team
Discover how to:
  • Develop and maintain an effective security program
  • Address hot topics such as cloud and mobile
  • Encompass OT and Internet of Things
  • Setup efficient solutions and avoid security breaches because of misconfigurations
  • Leave with knowledge of the most efficient tools and best practices to run network security operational tasks
CISOs & Security Directors/Managers
Discover how to:
  • Anticipate the unanticipated
  • Develop an action plan to reinforce a discipline of risk management and mitigation, response and recovery in the corporate culture with a growing need for business resilience
  • Control emerging risks from the Nexus of Forces
  • Leave with knowledge and advice on technologies and strategies to improve governance, manage risk and compliance
BCM & Disaster Recovery Managers
Discover how to:
  • Control emerging risks from the Nexus of Forces
  • Leave with knowledge and advice on technologies and strategies to improve governance, manage risk and compliance
  • Comply with a variety of global rules, regulations and laws
  • Control early mitigation of emerging risks
Financial Services

What You Will Learn

  • Structure and manage each of your individual IT risk programs
  • Make IT risk programs more efficient and effective
  • Select approaches and vendor solutions
  • Articulate security and risk requirements in business language
  • Integrate BCM with overall risk and security programs
  • Architect an overall security and risk management strategy aligned to business needs
  • Create a more risk-aware organizational culture that supports risk management initiatives
  • Meet compliance regulations and leverage master data to manage risk

See what attendees have said about what they learned

Features & Benefits

  • Gartner Analyst Sessions: Gartner analysts presenting select research, targeted to your priorities
  • Gartner Analyst One-on-One Meetings: Sit privately for 30 minutes with a Gartner analyst specializing in a topic you'd like to discuss
  • Analyst-User Roundtables: Hear how your colleagues from various industries tackle problems similar to yours
  • End-User Case Studies: We invite a number of end users to personally present leading-edge case studies and answer questions
  • Workshops: Intimate workshops provide an opportunity to drill down on specific "how to" topics in a small group environment
  • Exhibitor Access: Exclusive access to select exhibitors to make informed decisions
  • Solution Provider Sessions: Sponsor-led sessions feature some of the market's most fascinating solutions
  • Face-to-Face Sponsor Meetings: Discuss your technology requirements with qualified solutions providers
  • Group Rate Discount: Maximize your learning by attending as a group 
  • Network With Peers: Hundreds of senior business and IT leaders will convene to interact and share their knowledge and objectives 

What's Included

  • Gartner Analyst Sessions
  • Gartner Analyst One-on-One Meetings
  • Analyst-User Roundtables
  • End-User Case Studies
  • Workshops
  • Networking lunches and receptions
  • Agenda planning through Events Navigator
  • Exhibitor access at the Solution Showcase
  • Solution Provider Sessions

Frequently Asked Questions

Get answers to your questions here


Ensuring the effectiveness of your security and risk management strategy is a critical component to your organization's success. The 2015 agenda has 4 comprehensive tracks to drill down on your hottest Security & Risk Management topics based on your role, experience level and key focus.

View specific benefits, sessions and analysts for: 
View sessions to help answer 3 of your key security priorities
  • How do I gain the leadership skills I need, and make the right decisions in the digital business? 
  • How can I gain insight into the most effective security technologies to protect my organizations as we look to embrace new opportunities? 
  • How can I improve efficiency, optimize risk management processes and ensure compliance within my organization?

View a highlighted agenda with suggested sessions for small to medium businesses


2015 Tracks

  • Track A: Chief Information Security Officer (CISO) Program 
  • Track B: Risk Management and Compliance Program 
  • Track C: Security Manager Program: Technology, Trends and Operations
  • Track D: Business Continuity Management Program and the Internet of Things Program 

Customize your personalized agenda and view the 2015 Agenda at a Glance
The only event in security worth attending!

- Security Governance, Sogei

Hear why to attend from Dionisio Zumerle, Gartner analyst and Conference chair

Optimize Your Attendance

You'll be able to add these Gartner exclusives to your agenda:

  • Admission to all Keynote sessions
  • Gartner Analyst One-on-Ones
  • Analyst User RoundTables
  • Workshops
  • End-User Case Studies
  • Solution Provider Showcase


Listen to inspirational guest keynote speakers; hear from Gartner-invited end-user case study speakers – real practitioners with real-world knowledge; and learn from Gartner analysts – the foremost experts in their areas of focus. 

2015 Speakers

  • Ant Allan
    Ant Allan

    Research VP


  • Mario de Boer
    Mario de Boer

    Research VP


  • John Girard
    John Girard

    VP Distringuished Analyst


  • Ramon Krikken
    Ramon Krikken

    Research VP


  • Debra Logan
    Debra Logan

    VP & Gartner Fellow


  • Earl Perkins
    Earl Perkins

    Research VP


  • Paul Proctor
    Paul Proctor

    VP Distringuished Analyst


  • Gayla Sullivan
    Gayla Sullivan

    Research VP


  • Christian Byrnes
    Christian Byrnes

    Managing VP


  • Carsten Casper
    Carsten Casper

    Managing VP


  • Joerg Fritsch
    Joerg Fritsch

    Research Director


  • Jeremy D'Hoinne
    Jeremy D'Hoinne

    Research Director


  • Peter Firstbrook
    Peter Firstbrook

    Research VP


  • Felix Gaehtgens
    Felix Gaehtgens

    research Director


  • Erik Heidt
    Erik Heidt

    Research Director


  • Neil MacDonald
    Neil MacDonald

    VP Distinguished Analyst


  • Tom Scholtz
    Tom Scholtz

    VP & Gartner Fellow


  • John Wheeler
    John Wheeler

    Research Director


  • Roberta Witty
    Roberta Witty

    Research VP


Reevaluate your security and risk strategies and investments for the digital age

Dionisio Zumerle
Dionisio Zumerle

Research Director

Digital business technologies and the Internet of Things are creating new threats and risks even as regulatory compliance and legal risks continue to escalate, and sophisticated cyber threats challenge even the best security strategies. Every business is now a digital business, and every business must become proficient at risk assessment and mitigation, the foundation of success in the digital age.

This year’s summit delivers the latest research and recommendations across security and risk management priorities, and provides you with solutions to the latest hot topics.

What’s new for 2015
  • Revamped agenda featuring 85% new content
  • First ever presentation of Magic Quadrant for Operational Risk Management
  • Industry forums with dedicated content and analysts for key industries, including healthcare, financial services, government, energy/utilities and education
  • Focused sessions on crisis and incident management
  • Content tailored for Small and Medium Businesses
  • Expanded opportunity to network with your peers

The intersection of IT, operational technology and the Internet of Things is spawning a new generation of threats. Join us for the latest strategies to help you anticipate risk, mitigate its impact and enable successful business outcomes.

Watch Dionisio Zumerle preview this year’s theme, hot topics and agenda

What We Hear About Our Speakers

Gartner put on an excellent keynote, that not only demonstrated the security journey of the past but how we should use those experiences to take a more realistic approach to security today

- Senior IAM Technician, Standard Life PLC


Meet the Solution Providers at the Forefront of Security & Risk Management

The Security & Risk Management Summit will help you develop a "short list" of technology and service providers who can meet your particular needs. You'll receive exclusive access to some of the world's leading technology and service providers in a variety of settings.

  • Learn more about the exhibitor experience. 
  • Contact us to learn more about opportunities to exhibit. 




Become an Exhibitor

Take Your Place Among Technology's Key Players
Join us now


Exhibitor Interactions

Read more about how you can interact with our exhibitors

Venue & Travel

London, UK


Park Plaza Westminster Bridge
200 Westminster Bridge Road
London, UK SE1 7UT
Phone: +44 844 415 6780
Park Plaza Westminster Bridge

Park Plaza Westminster Bridge
200 Westminster Bridge Road
London, United Kingdom - SE1 7UT


Special Gartner Hotel Room Rate
A limited number of rooms have been held at the Park Plaza Westminster Bridge Hotel for attendees of the Gartner Security & Risk Management Summit.
There are two special promotional Gartner rates available: Superior Room - £175 per night (Includes Breakfast) Studio Room- £195 per night (Includes Breakfast)
Please note that these rates are based on single occupancy and excludes VAT. In order to secure accommodation at the preferred rate please click on the link below:


Alternatively, you can either e-mail your request gartnerconference@pphe.com or call the Park Plaza Westminster Bridge in-house reservations office on +44 844 415 6780, quoting the promotion code GART130915.

Reservation Office opening times are:
Monday to Friday between 08:00 - 19:00 (London Time)
Saturday between 09:00 - 17:30 (London Time)

Park Plaza County Hall
1 Addington Street
London, United Kingdom

A Note About Accomodations

Gartner has been made aware that a service provider called Exhibition Housing Management has contacted a number of individuals who are attending our conference to offer hotel reservation services. Exhibition Housing Management does not represent Gartner, nor have we authorized them to contact attendees on our behalf. 
Learn more