• CISO Leadership Skills

    View Just-Released 2016 Agenda

    Comprehensive tracks that drill down on your hottest security and risk topics

    View Agenda
  • CISO Leadership Skills

    Advance your CISO leadership skills

    Check out exclusive opportunities for CISOs to gain effective
    commincation and leadership skills for success.
     

    Learn more
  • CISO Leadership Skills

    Earn CPE Credits

    Earn CPE credits towards (ISC)2, ISACA,
    DRII, and BCI Certification Programs
     

    Learn More

Build Trust and Resilience at the Speed of Business

Gartner Security and Risk Management Summit 2016 provides you with the proven practices and strategies you need to maintain cost-effective security and risk programs to support digital business and drive enterprise success.  Build the trust and resilience needed to seize opportunities, reduce risks, and deploy new security models.



 

Gartner Security & Risk Management Summit was designed for individuals in the following roles:
Roles include:
  • Security & risk management
  • Business/IT security alignment
  • IT/OT security integration
  • Governance and policy setting
  • Creating a risk-aware culture
  • People-centric security  
CIOs, CSOs, CISOs, CROs, CPOs and their teams
Roles include:
  • BCM program management
  • BCM standards and organization
  • Supplier management/third party risk
  • BCM metrics
  • Cloud service provider risk
  • IT-DRM exercise automation
  • 24/7 and continuous application availability
  • Data replication alternatives and strategies
Business continuity and IT disaster recovery managers
Roles include:
  • Digital risks in financial services
  • Operational technology risks
  • GRC application strategy
  • Information governance
  • Big data litigation and regulatory risks
Governance, risk and compliance consultants
Roles include:
  • Mobile application & security
  • Social media & security
  • Consumerization
  • Advanced targeted threats  
  • Incident response
  • Cybersecurity
  • Cloud computing security
  • Addressing emerging threats
Network security manager, security executives and directors

What You Will Learn


  • Gain insights to stay ahead of expanding scopes of responsibility & threats
  • Align security & risk strategies with enterprise objectives
  • Apply the latest techniques to tackle risks in cloud, OT, IoT and IT
  • Maximize enterprise ROI by using the latest BCM and enterprise resilience practices
  • Build a culture that drives security performance through employee engagement

See what attendees have said about why they learned

Features & Benefits


  • Gartner Analyst Sessions: Gartner analysts presenting select research, targeted to your priorities
  • Gartner Analyst One-on-One Meetings: Sit privately for 30 minutes with a Gartner analyst specializing in a topic you'd like to discuss
  • Analyst-User Roundtables: Hear how your colleagues from various industries tackle problems similar to yours
  • End-User Case Studies: We invite a number of end users to personally present leading-edge case studies and answer questions
  • Workshops: Intimate workshops provide an opportunity to drill down on specific "how to" topics in a small group environment
  • Exhibitor Access: Exclusive access to select exhibitors to make informed decisions
  • Solution Provider Sessions: Sponsor-led sessions feature some of the market's most fascinating solutions
  • Face-to-Face Sponsor Meetings: Discuss your technology requirements with qualified solutions providers
  • Group Rate Discount: Maximize your learning by attending as a group 
  • Network With Peers: Hundreds of senior business and IT leaders will convene to interact and share their knowledge and objectives 
  • CISO Invitational Boardroom Program: By invitation only, participants can meet with solution providers in an intimate setting and network with peers in the CISO role
  • Gartner CISO Circle: Created exclusively for CISOs, you'll be joined together with the world’s foremost security and risk leaders to share in thought-leading peer networking and information exchange
  • Earn CPE credits: Earn CPE credits toward ISC2, ISACA and DRII certification programs by attending the summit

What's Included


  • Gartner Analyst Sessions
  • Gartner Analyst One-on-One Meetings
  • Analyst-User Roundtables
  • End-User Case Studies
  • Workshops
  • Gartner CISO Circle (by application only)
  • Gartner Invitational Boardroom Program (by invite only)
  • Networking breakfasts, lunches and receptions
  • One-year access to  Events On Demand
  • Agenda planning through Events Navigator
  • Exhibitor access at the Solution Showcase
  • Solution Provider Sessions

Frequently Asked Questions


Get answers to your questions here


Agenda

We're preparing our 2016 agenda which will feature comprehensive tracks to drill down on your hottest security and risk topics based on your role, experience level and key focus.


 

2016 Tracks

Chief Information Security Officer (CISO) Program 
The acceleration toward digital business has presented CISOs with new challenges. They must understand the goals of the business, quickly identify and assess the associated risks, and communicate the relevant risks to the business in business terms. The CISO program helps you become a recognized business leader, superstar communicator and facilitator, and problem-solver.

IT Security Program
Get practical methods and long-term strategies to build a more trusted and resilient environment for digital business and to support an IT organization that’s more agile than ever. Sessions cover emerging trends and state-of-the-art practices and technologies for cloud, mobile, data, application endpoint and network security.

TechInsights: Security Architecture Track
The demands on information security and IT risk practitioners are ever increasing. Not only does the attack and threat landscape change constantly, but organizations’ digital business objectives accelerate the adoption of current and emerging technology. Learn technical and tactical insights that enable risk-aware, business-outcome-focused architectures and solutions.

Business Continuity Management (BCM) Program
The increasing complexity and interconnectedness of the world means that organizations must implement new approaches and solutions for ensuring the continuity of business. Learn how to anticipate the unexpected and establish a disciplined approach of proactive risk management and recovery planning in the organizational culture to support business resilience.

Risk Management and Compliance Program
Digital risks are increasing as newer data sources and technologies are woven into the fabric of the business. As organizations adopt more cloud technology and explore more digital business opportunities, existing risk management strategies and practices become quickly outdated. This program highlights risks and complexities that you should expect in transitioning to digital business, as well as methods for mitigating these new risk management challenges.

The Marketplace for Security Program
This program provides technology providers, investors and the media real-world, thought-leading insights on the state of the security market, future growth opportunities, how to create differentiated value and understanding the mindset of security buyers.

2016 Hot Topics

  • Enabling a safer cloud
  • Mobile security for digital business
  • Security and risk strategy
  • Cybersecurity
  • Internet of Things, network and endpoint security challenges
  • Crisis/incident command and management
  • Regulatory changes on global business operations
  • Recovery from a targeted cyberattack
  • Transitioning from recovery to resilience
  • Governance, risk and compliance
  • Emerging security technologies
  • Optimizing security information and event management and threat intelligence tools

Key Take-Aways from the 2015 Conference


Image At the 21st annual Gartner Security & Risk Management Summit, attendees participated in on-site benefits, heard the latest IT security and risk management presentations from the Gartner research community on today’s most pressing topics, attended workshops run by expert analysts and industry leaders, heard real-life experiences during peer case studies, engaged in analyst-user roundtables and one-on-one meetings with Gartner analysts, and checked out the latest solutions at the Solution Showcase.
The only event in security worth attending!

- Security Governance, Sogei

Optimize Your Attendance


You'll be able to add these Gartner exclusives to your agenda:

  • Admission to all Keynote sessions
  • Gartner Analyst One-on-Ones
  • Analyst User RoundTables
  • Workshops
  • End-User Case Studies
  • Solution Provider Showcase
  • Gartner CISO Circle
  • Gartner CISO Invitational Boardroom Program



Speakers

Listen to inspirational guest keynote speakers; hear from Gartner-invited end-user case study speakers – real practitioners with real-world knowledge; and learn from Gartner analysts – the foremost experts in their areas of focus. 

Highlighted Speakers From the 2015 Conference

  • Ant Allan
    Ant Allan

    Research VP

    Gartner

  • Debra Logan
    Debra Logan

    VP & Gartner Fellow

    Gartner

  • Paul Proctor
    Paul Proctor

    VP Distinguished Analyst

    Gartner

  • Roberta Witty
    Roberta Witty

    Research VP

    Gartner

What We Hear About Our Speakers


Gartner put on an excellent keynote, that not only demonstrated the security journey of the past but how we should use those experiences to take a more realistic approach to security today

- Senior IAM Technician, Standard Life PLC

Exhibitors

Meet the Solution Providers at the Forefront of Security & Risk Management

The Gartner Security & Risk Management Summit will help you develop a "short list" of technology and service providers who can meet your particular needs. You'll receive exclusive access to some of the world's leading technology and service providers in a variety of settings.

  • Learn more about the exhibitor experience
  • Contact us to learn more about opportunities to exhibit

Venue & Travel

National Harbor, MD

Venue

Gaylord National Resort & Convention Center
201 Waterfront St.
National Harbor, MD, United States - 20745


Accommodations

Special Gartner Hotel Room Rate:
We have reserved a limited block of hotel rooms for attendees of the Gartner Security & Risk Management Summit at the price of $265 (plus tax and resort fee) per night for single or double occupancy. The deadline for the special room rate is May 12th at 5:00 p.m. EST.

To book your reservation, please log back into your registration profile in your gartner.com account and select “Make Hotel Reservation.”   Please note, you must be a registered attendee in order to book a hotel reservation. 

Reservation & Cancellation Policies:
Please be advised, there is a mandatory 2 night minimum stay at Gaylord National Resort. 

To change or cancel your hotel reservation without penalty you may do so before May 12th, by contacting the Gartner Registration Help Desk, Monday - Friday, 6:00 a.m. - 6:00 p.m. via phone: 866.405.2511 or +1 650.226.0825, or email: us.registration@gartner.com

Cancellations are allowed up to May 12th at 5:00 p.m. EST without penalty. After 5:00 p.m. EST on May 12th the Gaylord National Resort will charge the minimum night stay (2 nights).  Any cancellation made after May 12th at 5:00 p.m. EST will NOT receive a refund. 

Government Rates:
There are a limited number of government rate rooms available at the Gaylord Texan Resort. These are for U.S. government officials and military travelers that require the federal per diem lodging rate. A valid Government or Military ID will be required at check-in upon arrival. Government Rooms are subject to the cancellation policies outlined above.

A Note About Accomodations


Gartner has been made aware that a service provider called Exhibition Housing Management has contacted a number of individuals who are attending our conference to offer hotel reservation services. Exhibition Housing Management does not represent Gartner, nor have we authorized them to contact attendees on our behalf. 
Learn more