• CISO Leadership Skills

    Are you prepared to address security threats?

    Don’t get caught by another cybersecurity attack.

    Learn More
  • CISO Leadership Skills

    Former CIA Director Offers Insights Into New Cyber Threats

    Hear from John Brennan on options for protecting privacy, national security and future prosperity.

    Learn More
  • CISO Leadership Skills

    Strategic Direction & Industry Expertise

    Hear from leading security experts in diverse industries.

    Preview Case Studies
  • CISO Leadership Skills

    Address escalating risk exposure

    Build a trusted, resilient environment while giving your organization the freedom to innovate. 

    View Event Brochure

Manage Risk. Build Trust. Embrace Change.

The premier gathering of security, risk management and business continuity management leaders,
Gartner Security & Risk Management Summit 2017 delivers the insight you need to guide your organization to a secure digital business future.

The comprehensive agenda addresses:

  • The latest threats
  • Flexible new security architectures
  • Governance strategies
  • The chief information security officer role and more

It’s a unique opportunity to reinvent your approach to security and risk for the digital age, based on Gartner’s trusted independent research and practical recommendations.

View a sample list of registered companies. 

Gartner Security & Risk Management Summit was designed for individuals in the following roles:
Roles include:
  • Security & risk management
  • Business/IT security alignment
  • IT/OT security integration
  • Governance and policy setting
  • Creating a risk-aware culture
  • People-centric security  
CIOs, CSOs, CISOs, CROs, CPOs and their teams
Roles include:
  • BCM program management
  • BCM standards and organization
  • Supplier management/third party risk
  • BCM metrics
  • Cloud service provider risk
  • IT-DRM exercise automation
  • 24/7 and continuous application availability
  • Data replication alternatives and strategies
Business continuity and IT disaster recovery managers
Roles include:
  • Digital risks in financial services
  • Operational technology risks
  • GRC application strategy
  • Information governance
  • Big data litigation and regulatory risks
Governance, risk and compliance consultants
Roles include:
  • Mobile application & security
  • Social media & security
  • Consumerization
  • Advanced targeted threats  
  • Incident response
  • Cybersecurity
  • Cloud computing security
  • Addressing emerging threats
Network security manager, security executives and directors

What You Will Learn


  • Gain insights to stay ahead of expanding scopes of responsibility & threats
  • Align security & risk strategies with enterprise objectives
  • Apply the latest techniques to tackle risks in cloud, OT, IoT and IT
  • Maximize enterprise ROI by using the latest BCM and enterprise resilience practices
  • Build a culture that drives security performance through employee engagement

See what attendees have said about why they learned

Features & Benefits


  • Gartner Analyst Sessions: Gartner analysts presenting select research, targeted to your priorities
  • Gartner Analyst One-on-One Meetings: Sit privately for 30 minutes with a Gartner analyst specializing in a topic you'd like to discuss
  • Analyst-User Roundtables: Hear how your colleagues from various industries tackle problems similar to yours
  • End-User Case Studies: We invite a number of end users to personally present leading-edge case studies and answer questions
  • Workshops: Intimate workshops provide an opportunity to drill down on specific "how to" topics in a small group environment
  • Exhibitor Access: Exclusive access to select exhibitors to make informed decisions
  • Solution Provider Sessions: Sponsor-led sessions feature some of the market's most fascinating solutions
  • Face-to-Face Sponsor Meetings: Discuss your technology requirements with qualified solutions providers
  • Group Rate Discount: Maximize your learning by attending as a group 
  • Network With Peers: Hundreds of senior business and IT leaders will convene to interact and share their knowledge and objectives 
  • CISO Invitational Boardroom Program: By invitation only, participants can meet with solution providers in an intimate setting and network with peers in the CISO role
  • Gartner CISO Circle: Created exclusively for CISOs, you'll be joined together with the world’s foremost security and risk leaders to share in thought-leading peer networking and information exchange
  • Earn CPE credits: Earn CPE credits toward ISC2, ISACA, DRII, and BCI certification programs by attending the summit

Frequently Asked Questions


Get answers to your questions here
​     


Agenda

The 2017 Gartner Security & Risk Management Summit agenda features six comprehensive programs to cover your security and risk management key priorities and challenges. At the conference you'll learn how to embrace change and manage increasing cybersecurity risks.
 


Plan your experience:

Need help planning your Agenda? Receive Agenda Recommendations from the Gartner Event Concierge team

Already registered? Login to personalize your agenda. ​

 

Chief Information Security Officer (CISO) Programs

Are you the most senior security decision maker in your enterprise? 
If so, you may qualify for the CISO Circle or CISO Invitational Boardroom, members-only leadership experiences for new, existing, and emerging CISOs. 

CISO Circle
The CISO Circle provides chief information security officers (CISOs) an enhanced experience through exclusive presentations. Participants have the chance to form valuable peer connections, hone their leadership skills and understand how to best advance business objectives with successful IT innovation.

Invitational Boardroom Program
By invitation only, the Gartner Invitational Boardroom Program gives participants the opportunity to meet with solution providers in an intimate setting and network with peers in the CISO role. 

Find out more.

2017 Content Coverage

  • Chief Information Security Officer (CISO) Program: Paving the Way for Algorithmic Business    
    As businesses go digital, the “control everything” approach won’t work anymore. CISOs must recognize business goals, and assess and communicate risks in business terms. Learn how to cement your role as a business leader, communicator and go-to problem solver.
  • Security Trends and Capabilities Program: Building Trust and Resilience With Agile Security
    Get practical strategies to build a trusted, resilient environment for digital business and agile IT. As new business practices bring new threats, security must evolve — without neglecting legacy infrastructure. Learn how to support the new and improve the old.
  • TechInsights: Security Architecture Program — Real-World Tactics to Enable Secure Digital Business
    Demands on security and risk keep increasing as digital business accelerates and threats evolve. These tactical recommendations help you enable risk-aware, business-outcome-focused architectures and solutions for today’s changing IT and business environments.
  • Business Continuity Management (BCM) Program: Transitioning From Recovery to Resilience
    Anticipate the unexpected and establish a proactive plan for business resilience. This program explores how to articulate the impacts of business disruptions, set stakeholder expectations and define a process for effective recovery and continuity of operations.
  • Risk Management and Compliance Program: Managing Risk on the Road to Digital
    Digital risks are expanding as more data and technologies are woven into the fabric of the business. The evolving compliance and regulatory landscape compounds the complexity of these risks. This program highlights new digital risks and how to mitigate them.
  • Marketplace for Security Program: Understanding Market Forces, Trends and Disruptors
    Designed for security technology providers, investors and media, this program explores the state of the security marketplace and growth opportunities. Learn what defines differentiated, compelling enterprise security products, services and customer interactions.

Download the 2017 program descriptions.

2017 Hot Topics

  • Cybersecurity, threat management and context-aware digital trust
  • Enabling safer cloud computing
  • Risks and opportunities of smart machines, artificial intelligence, the Internet of Things and operational technology
  • Data security and risk governance
  • Mobile security for digital business
  • Protecting vital infrastructure
  • Privacy and data security
  • Informed risk governance
  • Adaptive security architecture
  • People-centric security strategies
  • Agile strategies to secure digital business
The only event in security worth attending!

- Security Governance, Sogei

Optimize Your Attendance


You'll be able to add these Gartner exclusives to your agenda:

  • Admission to all Keynote sessions
  • Gartner Analyst One-on-Ones
  • Analyst User RoundTables
  • Workshops
  • End-User Case Studies
  • Solution Provider Showcase
  • Gartner CISO Circle
  • Gartner CISO Invitational Boardroom Program



Speakers

Listen to inspirational guest keynote speakers; hear from Gartner-invited end-user case study speakers – real practitioners with real-world knowledge; and learn from Gartner analysts – the foremost experts in their areas of focus. 

Just announced! John Brennan, CIA Director (2013–2017) to deliver Guest Keynote

Highlighted Speakers

  • John Brennan
    John Brennan

    Director

    Central Intelligence Agency

    Read profile

  • Keith O'Sullivan
    Keith O'Sullivan

    VP/CISO Global Information Security

    Time Inc.

    Read profile

  • Lewis Pugh
    Lewis Pugh

    Ocean advocate, a maritime lawyer and one of the worlds leading inspirational speakers

    Read profile

Keynotes

End User Case Study

Gartner Analysts

Exhibitors

Meet the Solution Providers at the Forefront of Security & Risk Management

The Gartner Security & Risk Management Summit will help you develop a "short list" of technology and service providers who can meet your particular needs. You'll receive exclusive access to some of the world's leading technology and service providers in a variety of settings.

  • Learn more about the exhibitor experience
  • Contact us to learn more about opportunities to exhibit

Venue & Travel

National Harbor, MD

Venue

Gaylord National Resort & Convention Center
201 Waterfront St.
National Harbor, MD, United States - 20745


Accomodations


At this time, the Gartner hotel reservation site is closed. If you need to make a new reservation, or change or cancel an existing reservation, please contact the hotel directly starting on Wednesday, May 17, 2017 and reference the “Gartner Security and Risk Management Summit.”

Gaylord National Resort & Convention Center
Reservations: 301-965-4000

Residence Inn National Harbor
Reservations: 301-749-4755

Hampton Inn & Suites National Harbor
Reservations: 301-567-3531

AC Hotel by Marriott National Harbor
Reservations: 301-749-2299

MGM National Harbor
Reservations: 301-971-5000

Hilton Alexandria Old Town
Reservations: 703-837-0440

Embassy Suites Alexandria
Reservations: 703-684-5900

SpringHill Suites Alexandria Old Town/Southwest
Reservations: 703-317-0013

Courtyard Alexandria Old Town/Southwest
Reservations: 703-329-2323

Residence Inn Alexandria Old Town/Duke Street
Reservations: 703-548-5474

Hilton Garden Inn Alexandria Old Town
Reservations: 703-302-8300

Sheraton Suites Old Town Alexandria
Reservations: 703-836-4700

The Alexandrian, Autograph Collection
Reservations: 703-549-6080

For more information, please reference our FAQ document.

 

Accommodations & Privacy Advisory


Gartner has been made aware that service providers, such as Exhibition Housing Management, have contacted a number of individuals who are attending our conference to offer hotel reservation services
and/or sell copies of the confidential attendee list. 

Please note that Gartner has NOT authorized them, or anyone else, to contact attendees on our behalf, nor does Gartner share/sell attendee contact information to anyone. 
Learn more on how to protect yourself from scamming attempts. ​