Explore the latest conference topics and stay ahead.
We’ve got your security operations and services needs covered
While we build the agenda, take a look at the type of research you can expect at Gartner Security & Risk Management Summit 2022.
Get the tools you need to cover the people, processes, technologies and services needed to identify and manage vulnerabilities and to monitor, detect and respond to cybersecurity threats and incidents.
Through 2025, 30% of critical infrastructure organizations will experience a security breach that will result in the halting of an operations- or mission-critical cyber-physical system.
17 Network Security Concepts and Acronyms You Need to Know
Changes in network architecture require new approaches to network security that combine reliable stalwarts with new technologies. This article is a primer on the key concepts to understand a modern network security architecture.
How to Build and Operate a Modern Security Operations Center
As you seek to improve operational performance in the area of threat detection and response, adopting an ad hoc method of operations will show its limitations. Security and risk management technical professionals can use this guide to learn how to build and operate a more formal security operations center.
A security operations center (SOC) will lose its ability to perform over time unless it has a built-in growth plan that keeps its people, process and technology aligned with the ever-changing threat landscape.
A modern SOC must include detection capabilities that, instead of relying solely on alerts, can leverage advanced analytics across a large and wide range of telemetry to detect threats.
A modern SOC must include capabilities to analyze data to detect attacks, rather than just relying on alerts from reporting technologies.
Using service providers with maturity in security operations and tools integrations can be a fast path to a better performing SOC with mature capabilities.
It’s not possible to build an SOC solely based on automation, and those who try are disappointed.
Security operations, cybersecurity, privacy, risk management and more are covered in depth at this year's conference. Seats are filling fast. View Pricing