Join Security & Risk Leaders at this unique conference and get insights on:

  • CIO and CEO  Insights - understand what is top of mind for those C-levels
  • Security Strategy - develop a cybersecurity and cloud security strategy and vision that stakeholders will understand and relate to
  • Threat Landscape - repond through continious assessment of current threats and how your organization is evolving 
  • Risk Quantification - this year we have an increased focus on risk management to understand which risks matter most. How to quantify risk? What metrics to use? 
  • Future of Security - what will security and risk look like in 2030? What will change? What do you need to put in place to prepare now for the future?
  • AI and Machine Learning - security vendors, as well as attackers, have embraced AI, machine Learning and sophisticated new technologies. How can you use those technologies to protect in an uncertain world? 

Join a community

By attending Gartner Security & Risk Management Summit, you’re joining a community of trailblazers, thought leaders and industry experts pushing the bounds of security and risk. This conference is the one place you can access research-backed sessions, get expert advice on your specific challenges and interact with colleagues — all in one place, over two days.

Gartner experts

Hear directly from the experts behind the latest research and meet with one in a private 30-minute Gartner one-on-one at the conference. 


Connect with 600+ peers and dive into conversations spurred by powerful sessions, including roundtables, workshops, Peer Meetups and more.


Evaluate cutting-edge technology and solution providers during Exhibit Showcase receptions and at solution provider sessions.

Who should attend

Security executives

  • Chief information security officers (CISOs)
  • Chief security officers (CSOs)
  • Security managers, directors and leaders

Governance risk executives

  • Chief risk officers (CROs)
  • Governance managers, directors and leaders
  • Risk management professionals
  • Compliance officers

Network, system, app and data security practicioners

  • IT operations directors
  • IT operations managers
  • Analysts
  • Advisors

Security architects and planners

  • Enterprise architects
  • IT strategists and planners
  • Project managers
  • Developers

CISO Circle Program

The Chief Information Security Officer (CISO) Circle is exclusively available to CISOs and top security & risk management leaders attending the conference.

The CISO Circle is a crafted executive experience: Two days of presentations and discussions with the ability to attend regular sessions at the conference. You will want to quickly secure one of the limited CISO Circle seats by registering for the conference and then applying to the CISO Circle. 

Application and approval needed.

Great experience ... an intense week of workshops, roundtables, fascinating keynotes and great industry-based networking. It provides me with the opportunity to network with other business CISOs and understand best practices.

Michael King

Chief Information Officer, Halfaker and Associates

Want to stay informed?

Get conference email updates.
Contact Information

All fields are required.

  • Step 2 of 2