• CISO Leadership Skills

    Is your organization prepared?

    A serious security incident is
    a question of “when,” not “if”. 

    Learn more.
  • CISO Leadership Skills

    Join us in 2017

    Save the date for Gartner Security & Risk Management Summit 2017, June 12 - 15, in National Harbor, MD

     

    Learn More
  • CISO Leadership Skills

    Register today
    and save

    Save $300 when you register by April 14, 2017. 

    Register Today
  • CISO Leadership Skills

    View 2016 Trip Report

    View the key take-aways in the trip report
     

    View Report

Manage Risk. Build Trust. Embrace Change.

The premier gathering of security, risk management and business continuity management leaders,
Gartner Security & Risk Management Summit 2017 delivers the insight you need to guide your organization to a secure digital business future. The comprehensive agenda addresses the latest threats, flexible new security architectures, governance strategies, the chief information security officer role and more. It’s a unique opportunity to reinvent your approach to security and risk for the digital age, based on Gartner’s trusted independent research and practical recommendations.

Gartner Security & Risk Management Summit was designed for individuals in the following roles:
Roles include:
  • Security & risk management
  • Business/IT security alignment
  • IT/OT security integration
  • Governance and policy setting
  • Creating a risk-aware culture
  • People-centric security  
CIOs, CSOs, CISOs, CROs, CPOs and their teams
Roles include:
  • BCM program management
  • BCM standards and organization
  • Supplier management/third party risk
  • BCM metrics
  • Cloud service provider risk
  • IT-DRM exercise automation
  • 24/7 and continuous application availability
  • Data replication alternatives and strategies
Business continuity and IT disaster recovery managers
Roles include:
  • Digital risks in financial services
  • Operational technology risks
  • GRC application strategy
  • Information governance
  • Big data litigation and regulatory risks
Governance, risk and compliance consultants
Roles include:
  • Mobile application & security
  • Social media & security
  • Consumerization
  • Advanced targeted threats  
  • Incident response
  • Cybersecurity
  • Cloud computing security
  • Addressing emerging threats
Network security manager, security executives and directors

What You Will Learn


  • Gain insights to stay ahead of expanding scopes of responsibility & threats
  • Align security & risk strategies with enterprise objectives
  • Apply the latest techniques to tackle risks in cloud, OT, IoT and IT
  • Maximize enterprise ROI by using the latest BCM and enterprise resilience practices
  • Build a culture that drives security performance through employee engagement

See what attendees have said about why they learned

Features & Benefits


  • Gartner Analyst Sessions: Gartner analysts presenting select research, targeted to your priorities
  • Gartner Analyst One-on-One Meetings: Sit privately for 30 minutes with a Gartner analyst specializing in a topic you'd like to discuss
  • Analyst-User Roundtables: Hear how your colleagues from various industries tackle problems similar to yours
  • End-User Case Studies: We invite a number of end users to personally present leading-edge case studies and answer questions
  • Workshops: Intimate workshops provide an opportunity to drill down on specific "how to" topics in a small group environment
  • Exhibitor Access: Exclusive access to select exhibitors to make informed decisions
  • Solution Provider Sessions: Sponsor-led sessions feature some of the market's most fascinating solutions
  • Face-to-Face Sponsor Meetings: Discuss your technology requirements with qualified solutions providers
  • Group Rate Discount: Maximize your learning by attending as a group 
  • Network With Peers: Hundreds of senior business and IT leaders will convene to interact and share their knowledge and objectives 
  • CISO Invitational Boardroom Program: By invitation only, participants can meet with solution providers in an intimate setting and network with peers in the CISO role
  • Gartner CISO Circle: Created exclusively for CISOs, you'll be joined together with the world’s foremost security and risk leaders to share in thought-leading peer networking and information exchange
  • Earn CPE credits: Earn CPE credits toward ISC2, ISACA, DRII, and BCI certification programs by attending the summit

What's Included


  • Gartner Analyst Sessions
  • Gartner Analyst One-on-One Meetings
  • Analyst-User Roundtables
  • End-User Case Studies
  • Workshops
  • Gartner CISO Circle (by application only)
  • Gartner Invitational Boardroom Program (by invite only)
  • Networking breakfasts, lunches and receptions
  • Agenda planning through Events Navigator
  • Exhibitor access at the Solution Showcase
  • Solution Provider Sessions

Frequently Asked Questions


Get answers to your questions here
​   


Agenda

We are preparing our 2017 agenda featuring six comprehensive tracks to cover your security and risk managment key priorites and challenges. See what we covered last year to get an understanding of the breadth of coverage:
 

2017 Content Coverage

  • Chief Information Security Officer (CISO) Program: Paving the Way for Algorithmic Business    
    As businesses go digital, the “control everything” approach won’t work anymore. CISOs must recognize business goals, and assess and communicate risks in business terms. Learn how to cement your role as a business leader, communicator and go-to problem solver.
  • Security Program: Building Trust and Resilience With Agile Security
    Get practical strategies to build a trusted, resilient environment for digital business and agile IT. As new business practices bring new threats, security must evolve — without neglecting legacy infrastructure. Learn how to support the new and improve the old.
  • TechInsights: Security Architecture Track — Real-World Tactics to Enable Secure Digital Business
    Demands on security and risk keep increasing as digital business accelerates and threats evolve. These tactical recommendations help you enable risk-aware, business-outcome-focused architectures and solutions for today’s changing IT and business environments.
  • Business Continuity Management (BCM) Program: Transitioning From Recovery to Resilience
    Anticipate the unexpected and establish a proactive plan for business resilience. This program explores how to articulate the impacts of business disruptions, set stakeholder expectations and define a process for effective recovery and continuity of operations.
  • Risk Management and Compliance Program: Managing Risk on the Road to Digital
    Digital risks are expanding as more data and technologies are woven into the fabric of the business. The evolving compliance and regulatory landscape compounds the complexity of these risks. This program highlights new digital risks and how to mitigate them.
  • Marketplace for Security Program: Understanding Market Forces, Trends and Disruptors
    Designed for security technology providers, investors and media, this program explores the state of the security marketplace and growth opportunities. Learn what defines differentiated, compelling enterprise security products, services and customer interactions.

2017 Hot Topics

  • Cybersecurity, threat management and context-aware digital trust
  • Enabling safer cloud computing
  • Risks and opportunities of smart machines, artificial intelligence, the Internet of Things and operational technology
  • Data security and risk governance
  • Mobile security for digital business
  • Protecting vital infrastructure
  • Privacy and data security
  • Informed risk governance
  • Adaptive security architecture
  • People-centric security strategies
  • Agile strategies to secure digital business
The only event in security worth attending!

- Security Governance, Sogei

Optimize Your Attendance


You'll be able to add these Gartner exclusives to your agenda:

  • Admission to all Keynote sessions
  • Gartner Analyst One-on-Ones
  • Analyst User RoundTables
  • Workshops
  • End-User Case Studies
  • Solution Provider Showcase
  • Gartner CISO Circle
  • Gartner CISO Invitational Boardroom Program



Speakers

Listen to inspirational guest keynote speakers; hear from Gartner-invited end-user case study speakers – real practitioners with real-world knowledge; and learn from Gartner analysts – the foremost experts in their areas of focus. 

Featured 2016 Analysts

  • Tom Scholtz
    Tom Scholtz

    Vice President and Gartner Fellow

  • Paul Proctor
    Paul Proctor

    Vice President and Distinguished Analyst

  • Roberta Witty
    Roberta Witty

    Vice President

  • Jeffrey Wheatman
    Jeffrey Wheatman

    Director

What We Hear About Our Speakers


Gartner put on an excellent keynote, that not only demonstrated the security journey of the past but how we should use those experiences to take a more realistic approach to security today

- Senior IAM Technician, Standard Life PLC

Exhibitors

Meet the Solution Providers at the Forefront of Security & Risk Management

The Gartner Security & Risk Management Summit will help you develop a "short list" of technology and service providers who can meet your particular needs. You'll receive exclusive access to some of the world's leading technology and service providers in a variety of settings.

  • Learn more about the exhibitor experience
  • Contact us to learn more about opportunities to exhibit

Venue & Travel

National Harbor, MD

Venue

Gaylord National Resort & Convention Center
201 Waterfront St.
National Harbor, MD, United States - 20745


Accomodations


Special Gartner Hotel Room Rate
Gartner has reserved a limited block of hotel rooms for attendees of the Gartner Security and Risk Management Summit at the Gaylord National Resort and Convention Center at the price of $269/night plus resort fees and applicable taxes.
 
Gartner has additional rooms being held exclusively for summit attendees at discounted rates at other hotel properties in the area. Complimentary shuttles will be provided to/from these properties and the Gaylord National.
 
The deadline to book at Gartner’s discounted rates is Friday, May 12, 2017 at 5:00p.m. EDT.
To book your reservation, please log back into your registration profile in your gartner.com account and select “Make Hotel Reservation.”  Please note, you must be a registered attendee in order to book a hotel reservation.  
 
Reservation & Cancellation Policies:
Please be advised, there is a mandatory 2 night minimum stay.
To change or cancel your hotel reservation without penalty you may do so before 5:00p.m. EDT on Friday, May 12, 2017 by logging into your registration profile and selecting “Edit” in the Hotels section or by contacting the Gartner Help Desk, Monday - Friday, 6:00 a.m. - 6:00 p.m. via phone: 866.405.2511 or +1 650.226.0825, or Email: us.registration@gartner.com. 

Cancellations are allowed up to 5:00p.m. EDT on Friday, May 12, 2017 without penalty. If a reservation is cancelled after this time the hotel will charge a non-refundable deposit of the minimum night stay.
  
Government Rates: 
There are a limited number of government rate rooms available at the Gaylord National Resort and Convention Center. Government Rooms are subject to the cancellation policies outlined above. These rooms are for U.S. government officials and military travelers that require the federal per diem lodging rate. A valid US Government or Military ID will be required at check-in upon arrival. Government Rooms are subject to the cancellation policies outlined above.

For more information, please reference our FAQ document
 

Accommodations & Privacy Advisory


Gartner has been made aware that service providers, such as Exhibition Housing Management, have contacted a number of individuals who are attending our conference to offer hotel reservation services and/or sell copies of the confidential attendee list. 
Please note that Gartner has NOT authorized them, or anyone else, to contact attendees on our behalf, nor does Gartner share/sell attendee contact information to anyone. 
Learn more on how to protect yourself from scamming attempts. ​