• CISO Leadership Skills

    Don't Miss Out!

    Only a few weeks left to register and join
    over 3,000 of your security and risk peers

    Register Today
  • CISO Leadership Skills

    Meet One-on-One with a Gartner Analyst

    Sit privately for 30 minutes with a Gartner analyst specializing in a topic you'd like to discuss
     

    Learn More
  • CISO Leadership Skills

    2016 Guest Keynotes

    Hear from General Colin Powell and Lewis Pugh

     

    View Profiles
  • CISO Leadership Skills

    Build up your security strategy

    View the just-released infographic!

    View Infographic

Build Trust and Resilience at the Speed of Business

Gartner Security and Risk Management Summit 2016 provides you with the proven practices and strategies you need to maintain cost-effective security and risk programs to support digital business and drive enterprise success.  Build the trust and resilience needed to seize opportunities, reduce risks, and deploy new security models.



 

Gartner Security & Risk Management Summit was designed for individuals in the following roles:
Roles include:
  • Security & risk management
  • Business/IT security alignment
  • IT/OT security integration
  • Governance and policy setting
  • Creating a risk-aware culture
  • People-centric security  
CIOs, CSOs, CISOs, CROs, CPOs and their teams
Roles include:
  • BCM program management
  • BCM standards and organization
  • Supplier management/third party risk
  • BCM metrics
  • Cloud service provider risk
  • IT-DRM exercise automation
  • 24/7 and continuous application availability
  • Data replication alternatives and strategies
Business continuity and IT disaster recovery managers
Roles include:
  • Digital risks in financial services
  • Operational technology risks
  • GRC application strategy
  • Information governance
  • Big data litigation and regulatory risks
Governance, risk and compliance consultants
Roles include:
  • Mobile application & security
  • Social media & security
  • Consumerization
  • Advanced targeted threats  
  • Incident response
  • Cybersecurity
  • Cloud computing security
  • Addressing emerging threats
Network security manager, security executives and directors

What You Will Learn


  • Gain insights to stay ahead of expanding scopes of responsibility & threats
  • Align security & risk strategies with enterprise objectives
  • Apply the latest techniques to tackle risks in cloud, OT, IoT and IT
  • Maximize enterprise ROI by using the latest BCM and enterprise resilience practices
  • Build a culture that drives security performance through employee engagement

See what attendees have said about why they learned

Features & Benefits


  • Gartner Analyst Sessions: Gartner analysts presenting select research, targeted to your priorities
  • Gartner Analyst One-on-One Meetings: Sit privately for 30 minutes with a Gartner analyst specializing in a topic you'd like to discuss
  • Analyst-User Roundtables: Hear how your colleagues from various industries tackle problems similar to yours
  • End-User Case Studies: We invite a number of end users to personally present leading-edge case studies and answer questions
  • Workshops: Intimate workshops provide an opportunity to drill down on specific "how to" topics in a small group environment
  • Exhibitor Access: Exclusive access to select exhibitors to make informed decisions
  • Solution Provider Sessions: Sponsor-led sessions feature some of the market's most fascinating solutions
  • Face-to-Face Sponsor Meetings: Discuss your technology requirements with qualified solutions providers
  • Group Rate Discount: Maximize your learning by attending as a group 
  • Network With Peers: Hundreds of senior business and IT leaders will convene to interact and share their knowledge and objectives 
  • CISO Invitational Boardroom Program: By invitation only, participants can meet with solution providers in an intimate setting and network with peers in the CISO role
  • Gartner CISO Circle: Created exclusively for CISOs, you'll be joined together with the world’s foremost security and risk leaders to share in thought-leading peer networking and information exchange
  • Earn CPE credits: Earn CPE credits toward ISC2, ISACA, DRII, and BCI certification programs by attending the summit

What's Included


  • Gartner Analyst Sessions
  • Gartner Analyst One-on-One Meetings
  • Analyst-User Roundtables
  • End-User Case Studies
  • Workshops
  • Gartner CISO Circle (by application only)
  • Gartner Invitational Boardroom Program (by invite only)
  • Networking breakfasts, lunches and receptions
  • One-year access to  Events On Demand
  • Agenda planning through Events Navigator
  • Exhibitor access at the Solution Showcase
  • Solution Provider Sessions

Frequently Asked Questions


Get answers to your questions here


Agenda

The comprehensive 2016 agenda addresses the latest threats, flexible new security architectures, governance strategies, the CISO role and more. It’s a unique opportunity to reinvent your approach to security and risk for the digital age based on Gartner’s practical recommendations and trusted independent research.
 


 

2016 Tracks

Chief Information Security Officer (CISO) Program 
The acceleration toward digital business has presented CISOs with new challenges. They must understand the goals of the business, quickly identify and assess the associated risks, and communicate the relevant risks to the business in business terms. The CISO program helps you become a recognized business leader, superstar communicator and facilitator, and problem-solver.

IT Security Program
Get practical methods and long-term strategies to build a more trusted and resilient environment for digital business and to support an IT organization that’s more agile than ever. Sessions cover emerging trends and state-of-the-art practices and technologies for cloud, mobile, data, application endpoint and network security.

TechInsights: Security Architecture Track
The demands on information security and IT risk practitioners are ever increasing. Not only does the attack and threat landscape change constantly, but organizations’ digital business objectives accelerate the adoption of current and emerging technology. Learn technical and tactical insights that enable risk-aware, business-outcome-focused architectures and solutions.

View TechInsights: Security Architecture flier

Business Continuity Management (BCM) Program
The increasing complexity and interconnectedness of the world means that organizations must implement new approaches and solutions for ensuring the continuity of business. Learn how to anticipate the unexpected and establish a disciplined approach of proactive risk management and recovery planning in the organizational culture to support business resilience.

Risk Management and Compliance Program
Digital risks are increasing as newer data sources and technologies are woven into the fabric of the business. As organizations adopt more cloud technology and explore more digital business opportunities, existing risk management strategies and practices become quickly outdated. This program highlights risks and complexities that you should expect in transitioning to digital business, as well as methods for mitigating these new risk management challenges.

The Marketplace for Security Program
This program provides technology providers, investors and the media real-world, thought-leading insights on the state of the security market, future growth opportunities, how to create differentiated value and understanding the mindset of security buyers.

2016 Hot Topics

  • Enabling a safer cloud
  • Mobile security for digital business
  • Security and risk strategy
  • Cybersecurity
  • Internet of Things, network and endpoint security challenges
  • Crisis/incident command and management
  • Regulatory changes on global business operations
  • Recovery from a targeted cyberattack
  • Transitioning from recovery to resilience
  • Governance, risk and compliance
  • Emerging security technologies
  • Optimizing security information and event management and threat intelligence tools

Key Take-Aways from the 2015 Conference


Image At the 21st annual Gartner Security & Risk Management Summit, attendees participated in on-site benefits, heard the latest IT security and risk management presentations from the Gartner research community on today’s most pressing topics, attended workshops run by expert analysts and industry leaders, heard real-life experiences during peer case studies, engaged in analyst-user roundtables and one-on-one meetings with Gartner analysts, and checked out the latest solutions at the Solution Showcase.
The only event in security worth attending!

- Security Governance, Sogei

Optimize Your Attendance


You'll be able to add these Gartner exclusives to your agenda:

  • Admission to all Keynote sessions
  • Gartner Analyst One-on-Ones
  • Analyst User RoundTables
  • Workshops
  • End-User Case Studies
  • Solution Provider Showcase
  • Gartner CISO Circle
  • Gartner CISO Invitational Boardroom Program



Speakers

Listen to inspirational guest keynote speakers; hear from Gartner-invited end-user case study speakers – real practitioners with real-world knowledge; and learn from Gartner analysts – the foremost experts in their areas of focus. 

Highlighted Speakers

  • General Colin Powell
    General Colin Powell

    USA (Ret.)

    Read profile

  • Lewis Pugh
    Lewis Pugh

    Ocean advocate, a maritime lawyer and one of the worlds leading inspirational speakers

    Read profile

  • Paul E. Proctor
    Paul E. Proctor

    VP Distinguished Analyst

    Gartner

    Read profile

  • Tom Scholtz
    Tom Scholtz

    VP & Gartner Fellow

    Gartner

    Read profile

  • Roberta J. Witty
    Roberta J. Witty

    Research VP

    Gartner

    Read profile

Keynotes

End User Case Study Speakers

Gartner Analysts

Exhibitors

Meet the Solution Providers at the Forefront of Security & Risk Management

The Gartner Security & Risk Management Summit will help you develop a "short list" of technology and service providers who can meet your particular needs. You'll receive exclusive access to some of the world's leading technology and service providers in a variety of settings.

  • Learn more about the exhibitor experience
  • Contact us to learn more about opportunities to exhibit

Venue & Travel

National Harbor, MD

Venue

Gaylord National Resort & Convention Center
201 Waterfront St.
National Harbor, MD, United States - 20745


Accommodations

For new hotel reservations please contact the following hotels:
 
Sheraton Suites Old Town Alexandria**- Telephone: 703- 836-4700 or Online Reservations
 
Hotel Monaco Alexandria**- Telephone: 703-549-6080
 
At this time, the Gartner hotel reservation site is closed. If you need to make a reservation, or change an existing reservation please contact the hotel directly and reference “Gartner Security & Risk.”
 
Gaylord National Resort and Convention Center: 301-965-4000. 
Residence Inn National Harbor: 301-749-4755
Hampton Inn National Harbor: 301-567-3531
AC National Harbor Hotel: 301-749-2299
Hilton Alexandria Old Town**:  703-837-0440
Embassy Suites Alexandria**- 703-684-5900
Residence Inn Alexandria Old Town/Duke Street**- 703-548-5474
Courtyard Alexandria Old Town**- 703-329-2323
Springhill Suites Alexandria Old Town: 703-317-0013
 
**Shuttle service will be provided to/from the hotel to the Gaylord National.
 

Accommodations & Privacy Advisory


Gartner has been made aware that service providers, such as Exhibition Housing Management, have contacted a number of individuals who are attending our conference to offer hotel reservation services and/or sell copies of the confidential attendee list. 
Please note that Gartner has NOT authorized them, or anyone else, to contact attendees on our behalf, nor does Gartner share/sell attendee contact information to anyone. 
Learn more on how to protect yourself from scamming attempts. ​