• Mobile Security - Gartner Cyber Security Conference

    Would you invite a hacker to test your security?...

    …hear from the people that did!

    View Case Study Line Up
  • Mobile Security - Gartner Cyber Security Conference

    GDPR: Will You be Compliant by May 2018?

    Hear from Privacy & GDPR expert, Bart Willemsen on how attending the Gartner Security & Risk Management Summit can help you safe guard your organization from astronomical fines and reputational damage.

    Learn More
  • Mobile Security - Gartner Cyber Security Conference

    2017 Agenda Live

    Six comprehensive tracks to cover all your security and risk management key priorities: Threat Landscape, GDPR, Cloud, Application, Mobile, Data, Network Security and more...

    View Agenda
  • Mobile Security - Gartner Cyber Security Conference

    Guest Speakers Confirmed

    Address threats in today’s security Landscape with a different perspective 

    Learn More

Manage Risk. Build Trust. Embrace Change.

Agility. Efficiency. Productivity. Profit.
Digital business can yield many benefits, but it also exposes organizations to new threats and risks. Today’s security and risk practitioners face unprecedented challenges in dealing with the volume and velocity of digital business interactions.
 
To realize the full potential of digital business, security and risk leaders must deliver a program that establishes the enterprise, with its systems and employees, as a trusted participant in the digital economy. This requires organizations to use adaptive security architectures capable of leveraging intelligence and intelligent systems to enable context-aware security controls. Building resilient digital business systems that are versatile and dynamic allows security and risk leaders to prepare for and head off increasingly dangerous cyberthreats.
 
At the Gartner Security & Risk Management Summit you’ll learn how to use proven practices as well as innovative technologies and methods to help manage increasing cybersecurity risks without unnecessarily inhibiting the business.
 

View benefits at Security & Risk Management Summit for individuals in the following roles:
Roles include:
  • Security strategy
  • Security investments
  • Board and stakeholder approval
  • Organization & culture
  • Transforming security for digital business
     
Chief Information Security Officers (CISO)
Roles include:
  • IT Risk management strategy
  • Operational Technology risk management
  • Governance, Risk & Compliance (GRC)
  • IT vendor risk management
Chief Risk Officers, Chief Privacy Officers, Compliance Leaders
Roles include:
  • Cloud, IoT & mobile security
  • Network security
  • Security awareness
  • Threat intelligence and protection
  • Vulnerability Management
  • Identity & Access Management
  • Vendor selection
Security Leaders and Architects
Roles include:
  • BCM strategy
  • Disaster recovery management
  • Crisis Management
  • BCM governance
Business Continuity and Disaster Recovery Executives

What You Will Learn


  • Gain insights to stay ahead of expanding scopes of responsibility & threats
  • Align security & risk strategies with enterprise objectives
  • Apply the latest techniques to tackle risks in cloud, OT, IoT and IT
  • Maximize enterprise ROI by using the latest BCM and enterprise resilience practices
  • Build a culture that drives security performance through employee engagement

See what attendees have said about what they learned

Features & Benefits


  • Gartner Analyst Sessions: Gartner analysts presenting select research, targeted to your priorities
  • Gartner Analyst One-on-One Meetings: Sit privately for 30 minutes with a Gartner analyst specializing in a topic you'd like to discuss
  • Analyst-User Roundtables: Hear how your colleagues from various industries tackle problems similar to yours
  • End-User Case Studies: We invite a number of end users to personally present leading-edge case studies and answer questions
  • Workshops: Intimate workshops provide an opportunity to drill down on specific "how to" topics in a small group environment
  • Exhibitor Access: Exclusive access to select exhibitors to make informed decisions
  • Solution Provider Sessions: Sponsor-led sessions feature some of the market's most fascinating solutions
  • Face-to-Face Sponsor Meetings: Discuss your technology requirements with qualified solutions providers
  • Group Rate Discount: Maximize your learning by attending as a group 
  • Network With Peers: Hundreds of senior business and IT leaders will convene to interact and share their knowledge and objectives 

What's Included


  • Gartner analyst sessions
  • Gartner analyst one-on-one meetings
  • Analyst-user roundtables
  • End-user case studies
  • Workshops
  • Networking lunches and receptions
  • Agenda planning through Events Navigator
  • Exhibitor access at the solution showcase
  • Solution provider sessions

Frequently Asked Questions


Get answers to your questions here

​       


Agenda

The 2017 Gartner Security & Risk Management Summit agenda features six comprehensive tracks to cover all your security and risk management key priorities and challenges. At the conference you'll learn how to embrace change and manage increasing cybersecurity risks
 

Exclusive CISO Circle

To help support CISOs across a range of industry sectors, we’ve developed the CISO Circle* – an exclusive forum unique to attendees at the Gartner Security & Risk Management Summit.
 
The CISO Circle provides you with strategic insight as well as practical “how-to” guidance to help you address your most immediate and pressing challenges and to prepare for the future. It also provides you with the opportunity to attend exclusive Roundtables facilitated by our leading analysts to share experiences and understand how your fellow CISOs are overcoming technical and business challenges.

As a member, you’ll also benefit from role-specific tools to help you build business cases, address board imperatives, manage service providers and organizational change. The CISO Circle is designed to help you strike the all-important, sensitive balance between information security and protection, and business innovation and trust.

To join the CISO Circle, simply submit your application when you register to attend the Gartner Security & Risk Management Summit. Places are limited, so be sure to secure your participation as soon as possible.

*Eligibility: CISOs, CROs, Chief Privacy Officers, or most senior Security / Risk Executives in user organizations of more than $250M (or 1000 employees for Public Sector).

Learn More

2017 Hot Topics

  • Cybersecurity, threat management and context-aware digital trust
  • Risks and opportunities of emerging technologies: smart machines, AI, IoT and OT
  • Data governance and Data security and risk governance
  • Enabling safer cloud computing
  • Informed risk governance
  • Security analytics, advanced attack detection and incident response
  • Privacy and data security
  • People-centric security strategies
  • Agile strategies to secure digital business
  • Adaptive security architecture
  • Mobile security and ByoD for digital business
  • Protecting vital infrastructure
  • Identity governance and access management

Deep Dive into Event Sessions
 

2017 Programs

Featured agenda programs include:

A. Chief Information Security Officer (CISO) Program: Paving the Way for Algorithmic Business
As businesses go digital, the “control everything” approach does not work anymore. Join us for the CISO Program to identify how you can fortify your position as a recognized business leader, strong communicator and go-to problem solver for digital business innovation.

B. Risk Management and Compliance Program: Managing Risk on the Road to Digital
Digital risks are expanding as more data and technologies are woven into the fabric of the business. The evolving European compliance and regulatory landscape compounds the complexity of these risks. This program highlights the risks and complexities that you should expect when transitioning to digital business. Learn new methods to mitigate these risk management challenges and to transition from recovery to resilience.

C. Security Program: Building Trust and Resilience with Agile Security
Security programs must evolve to support new use cases, without neglecting legacy infrastructure that continues to sustain the organization. Sessions in this program cover the emerging trends and state-of-the-art security practices as well as technologies for cloud, data, application, endpoints, mobile and network security. Get practical strategies to build a trusted, resilient environment for digital business and agile IT.

Virtual Tracks
  • Cloud Security: Transitioning Safely From On-Premises to the Cloud
  • Data Security: Protecting Your Critical Assets
  • TechInsights: Building Secure Digital Architecture
  • Business Continuity Management: Transitioning from Recovery to Resilience
  • Security Analytics: Catching All Threats

Download Suggested Agendas for the above and more
The only event in security worth attending!

- Security Governance, Sogei

Key Take-Aways from the 2016 Conference


More than 700 attendees participated in on-site benefits, heard the latest security and risk management presentations from the Gartner Research community on today’s most pressing topics, attended workshops run by expert analysts and industry leaders, heard real-life experiences during peer case studies, engaged in analyst-user roundtables and one-on-one meetings with Gartner analysts, and checked out the latest solutions at the Solution Showcase.

Key Take-Aways from the 2016 Conference

  • Gain the role-specific tools and strategies to stay ahead of expanding scopes of responsibility and increasing threats
  • Align security and risk management strategies with enterprise objectives
  • Assure compliance with new regulatory, compliance, privacy and e-discovery requirements
  • Apply the latest techniques to tackle risks in cloud, OT, IoT and IT
  • Maximize enterprise ROI by using the latest BCM and enterprise resilience practices
  • Build a culture that drives security performance through employee engagement



Speakers

Listen to inspirational guest keynote speakers; hear from Gartner-invited end-user case study speakers – real practitioners with real-world knowledge; and learn from Gartner analysts – the foremost experts in their areas of focus.

Featured Speakers

  • Glenn Greenwald
    Glenn Greenwald

    Co-Founder of The Intercept; Journalist; Constitutional Lawyer and Best-Selling Author

    Read profile

  • Chris Hadfield
    Chris Hadfield

    Astronaut/First Canadian Commander of the International Space Station

    Read profile

  • Neil MacDonald
    Neil MacDonald

    VP Distinguished Analyst

    Gartner

    Read profile

Exhibitors

Meet the Solution Providers at the Forefront of Security & Risk Management

The Security & Risk Management Summit will help you develop a "short list" of technology and service providers who can meet your particular needs. You'll receive exclusive access to some of the world's leading technology and service providers in a variety of settings.

  • Learn more about the exhibitor experience. 
  • Contact us to learn more about opportunities to exhibit. 

Premier


Platinum


Silver


Become an Exhibitor


Take Your Place Among Technology's Key Players
Join us now

 

Exhibitor Interactions


Read more about how you can interact with our exhibitors

Venue & Travel

London, UK

Venue

InterContinental London - The O2
Waterview Drive
London, United Kingdom - SE10 0TW


Special Gartner Hotel Room Rate


A limited number of rooms have been held at the InterContinental – London The O2 Hotel, for attendees of the Gartner Security & Risk Management Summit

Room Rates:
There are three special promotional Gartner rates available: 
Superior - £205 per night (Includes Breakfast) excluding VAT
Club Room - £255 per night (Includes Breakfast) excluding VAT
Club Suite - £355 per night (Includes Breakfast) excluding VAT

Bookings:
To make a booking please book directly via the hotel 

Alternatively you can e-mail your request to groups@iclondon-theo2.com quoting the promotion code: "G6G".

Reservation Office Opening Times:
Monday to Friday: 09:00 - 17:00 (GMT).
Closed on weekends.

 

Alternative Hotel Recommendations


Please note that Gartner does not hold preferential rates at these hotels

Hilton Canary Wharf
South Quay
Marsh Wall
London E14 9SH
A 5-minute walk from Canary Wharf Tube Station and one stop from North Greenwich on the Jubilee Line

Aloft London Excel
One Eastern Gateway
Royal Victoria Dock
London E16 1FR
A short walk to the Emirates Airline, and a 5 minute walk to the Intercontinental

Park Plaza Westminster Bridge London
200 Westminster Bridge Rd
London SE1 7UT
A short walk to Waterloo Station and 15 minute journey on the Jubilee Line to North Greenwich

Crown Plaza Docklands
Royal Victoria Dock
Western Gateway
London E16 1AL
A 5 minute walk to the Emirates Air Line then a short walk to Intercontinental, The O2

A Note About Accomodations


Gartner has been made aware that a service provider called Exhibition Housing Management has contacted a number of individuals who are attending our conference to offer hotel reservation services. Exhibition Housing Management does not represent Gartner, nor have we authorized them to contact attendees on our behalf. 
Learn more