We’ve got your cybersecurity needs covered

While we build the agenda, take a look at the type of research you can expect at Gartner Security & Risk Management Summit 2022.

Get the tools you need to craft and implement a security strategy for the digital age, hone your leadership skills and shift how the whole organization approaches security. Join us for a comprehensive update on the latest threats and solutions in cybersecurity.

By 2026, 30% of large organizations will have publicly shared environmental, social and governance (ESG) goals focused on cybersecurity, up from less than 2% in 2021.

Gartner Predicts

8 Ways You Could Be Inviting a Cybersecurity Attack

Often systemic and cultural issues between IT and non-IT executives, not technical competency or funding, that leave organizations exposed to cybersecurity attacks. You can reduce the risk of cyberattacks by addressing these 8 leading causes of failure within your organization.

Top Strategic Technology Trends for 2022: Cybersecurity Mesh

The cybersecurity mesh architecture (CSMA) approach tries to solve the long-standing challenges of distinct security products working side by side but not really working together. That situation creates a siloed approach with different technologies and skill sets required to operate many different products.

Opportunities and challenges:

  • The cybersecurity mesh architecture (CSMA) provides a foundational support layer that enables distinct security services to work together to create a dynamic security environment.
  • CSMA provides a more consistent security posture to support increased agility for the composable enterprise. As organizations invest in new technology to enable digitalization, CSMA provides a flexible and scalable security foundation that provides bolt-on security for assets in hybrid and multicloud environments.
  • CSMA creates a better defensive posture through a collaborative approach between integrated security tools and detective and predictive analytics. The outcome is enhanced responsiveness to breaches and attacks.
  • Cybersecurity technology delivered through this model takes less time to deploy and maintain, while minimizing the potential for security dead ends that cannot support future needs. This frees cybersecurity teams for more value-added activities.

Cybersecurity, privacy, risk management and more will be covered in depth at this year's conference. Seats are filling fast. View Pricing

Stay informed with Gartner

Get conference email updates.
Contact Information

All fields are required.

  • Step 2 of 2