Gartner Security & Risk Management Summit

28 – 29 March 2023 | Sydney, Australia

Build a resilient security and risk management strategy

The endlessly expanding digital footprint of modern organizations is introducing new security challenges. The pandemic response has accelerated hybrid work and the digitalization of business processes in the cloud. Concurrently, last year experienced sustained big game ransomware attacks, multiple attacks on the digital supply chain, deeply embedded vulnerabilities, and increasing attacks on identity systems. These accumulated security challenges are compounded by a shortage of skilled security staff at all levels. These factors are impacting how security and risk management leaders:

  1. Transform their organization’s security practice to keep pace with business demand and a constantly evolving threat environment
  2. Find the optimal balance between their dual mission of protecting their organization and ensuring cybersecurity proves its value as a strategic business enabler.

Gartner Security & Risk Management Summit helps security and risk management leaders evolve their roles to meet future challenges and elevate their standing in their organizations.

Join us to learn how to:

  • Look beyond traditional approaches to security monitoring, detection and response to manage a wider set of risks
  • Develop your personal effectiveness as a strategic cybersecurity leader and demonstrate clear value in the organization’s cybersecurity investments.
  • Reevaluate your IAM infrastructure with a goal of identifying opportunities for detecting compromise and immediately investigating and responding
  • Partner with other departments to prioritize digital supply chain risk and put pressure on suppliers to demonstrate security best practices
  • Focus security modernization efforts on composable security tools that will provide the most strategic benefit in a cloud-application-centric and hybrid worker future
  • Invest in holistic behavior and culture change programs designed to provoke more secure ways of working

Bring your team to maximize learning - participate in relevant sessions together, or split up to cover more ground and share your take-aways later. Learn more about attending as a team

Define your strategy for agility and resilience in uncertain times

  • Effectively balance the increasing volume, variety and speed of security and risk decisions. 
  • Successfully communicate security risks, challenges and opportunities to senior executives.
  • Assess and transform security programs to become digital business enablers.
  • Prepare for continuous change in the technology and threat landscape.
  • Overcome the barriers of organizational culture, resources and talent to grow and scale your digital initiatives.

Develop security programs to respond to emerging threats and advanced attacks

  • Balance real-world risks with business drivers such as speed, agility, flexibility and performance.
  • Develop and maintain effective security governance across the organization.
  • Establish key metrics and indicators to measure effectiveness of security programs.
  • Anticipate the emergence of advanced attacks that evade traditional security.

Target the risks that matter most in the race to the digital future

  • Build an effective risk management program when investing in digital business.
  • Evolve your risk management practices to stay on top of emerging and enterprise risks.
  • Successfully align risk appetite with business objectives.
  • Use metrics effectively to understand changes in risk exposure.
  • Effectively manage third-party risk.

Select and architect effective security and risk solutions

  • Understand how the characteristics of digital business impact security architecture practices.
  • Enable a tighter alignment between security and business.
  • Develop security architecture frameworks to address compliance demands and evolving IT.
  • Gain insight into the increasingly complex market for security and risk management technologies and services.

Protect critical assets

  • Develop new best practices to secure new enterprise network edges.
  • Keep pace with the changing technology application landscape and evolving data protection regulations.
  • Balance the imperative to rapidly modernize applications with the requirement to protect them.
  • Respond to the challenges of securing sensitive data while expanding the use of cloud services.

Define strategies and deliver projects that will protect workloads, networks, workspaces and endpoints.

  • Protect enterprise workloads on servers, containers and platforms as a service (PaaS).
  • Modernize network security architecture to support a zero trust mindset.
  • Select the right endpoint security product and extended detection and response (XDR) to address ransomware and other attacks.
  • Harden and securely configure personal and enterprise devices, such as laptops and smartphones, for hybrid work.

Gain critical insights to sustain effective IAM programs to provide the right access to the right people

  • Align with business expectations to get buy-in and continued support for IAM programs and policies. 
  • Measure and communicate the value of the IAM program and move from cost center to revenue generation. 
  • Integrate IAM initiatives with established business processes and policies that affect customers and workforce. 
  • Understand the fast-evolving IAM technologies and vendors, and cut through the hype of artificial intelligence (AI), blockchain and the Internet of Things (IoT) to leverage the right solutions. 
  • Manage the complexity and specific risks associated with cloud migration and cloud-based IAM solutions. 
  • Find efficiencies by automating processes.

Network with experts and peers
At Gartner Security & Risk Management Summit, attendees have the opportunity to connect with Gartner experts and industry-leading CISOs, security leaders and risk executives. Exchange ideas and experiences with others in similar roles or from similar organizations. 

Build new relationships, broaden your perspectives and uncover ways to solve problems alongside other security & risk leaders. When you engage with like-minded peers, you'll find opportunities to share your ideas and experiences.

Highlights:

  • Roundtable sessions.*  Join your security & risk management peers from leading organizations and various industries to discuss relevant topics inspired by the latest research in these small-group sessions, moderated by a Gartner expert.  
  • Peer conversations. Join peer-to-peer discussions organically throughout the conference. With over 500 CISO and security executives, discover how they are tackling the challenges you face every day.
  • End-user case studies. Detailed and documented case studies, by Gartner invitation, reveal lessons from peers during their own organization’s implementations.
  • Social engagements.  Have fun and build new business relationships with peers as you engage in welcome receptions and special evening events in varied settings.

*Preregistration is required. These sessions are available to end users only; space is limited.

Prioritize what to accelerate, unlock resources for digital investments, make meaningful cultural changes and so much more. No matter where you are on your digital business acceleration journey, we’re here to help you get to your destination faster — with confidence.

Lean back and listen
Best speakers, brightest minds and the latest big ideas. These sessions provided the inspiration and actionable insight to transform the most critical priorities into business results.

Highlights:

  • Guest Speakers. Hear firsthand experience from guest keynote speakers and guest speakers.
  • Magic Quadrant Sessions and Market Guides. Explore Magic Quadrants that help you understand how well technology providers are executing against their stated vision.
  • Solution Provider Sessions. When you’re looking to address a specific issue, these strategic roadmap presentations and user-case studies provide real-world advice. 

Lean in and engage
Facilitated by Gartner experts, these sessions challenge attendees to solve problems together, exchange their viewpoints and get to the core of the business imperatives that drive you and your peers.

Highlights:

  • CISO Circle.* The CISO Circle, a Gartner exclusive, is a dedicated program within the overall agenda designed for Chief Information Security Officers (CISOs) and those serving in the CISO role. Participants have the opportunity to explore new strategies, share innovative ideas, grow their community of peers and have special access to Gartner experts in unique and highly educational, interactive sessions. Learn more & apply.
  • Workshops.* Small-scale and interactive: Collaborate with peers by taking the most important topics and learn how to apply them to your business.
  • Diversity, Equity and Inclusion. Track sessions and interactive experiences focused on issues relevant to diverse identities, including LGBTQ and neurodiversity, as well as corporate sustainability, equity and inclusion.

*Preregistration is required. These sessions are available to end users only. 

Our unbiased Gartner experts help you advance your most critical priorities through industry-leading insights, guidance and tools. Tap their unique expertise to make faster, smarter decisions. 

Gartner one-on-one meetings.* Meet one-on-one with Gartner experts for tailored advice to help you achieve your most critical priorities. These popular meetings offer you the undivided attention of a Gartner expert who will listen and guide you on the matters most critical to your success.

Ask the Expert sessions.* Topic-driven sessions provide a more intimate discussion forum, featuring one Gartner expert and end-user peers posing questions.

*Preregistration is required. These sessions are available to end users only; space is limited.

Security and risk executives face a critical juncture as digital footprints expand and decision-making becomes increasingly decentralized. Join us to hear from top Gartner experts on how to address new risks, prove the value of cybersecurity, elevate your role by recasting the security function, rethink technology, and optimize your response to evolving threats.

Richard Addiscott

Conference Chair and Senior Director Analyst, Gartner

CISO Circle

The CISO Circle is an exclusive program within the overall agenda designed for chief information security officers (CISOs) and chief risk officers (CROs), to explore new strategies, share innovative ideas and grow their community of peers.

Want to stay informed?

Get conference email updates.
Contact Information

All fields are required.

  • Step 2 of 2

    Tracks at a Glance

    Attendees have access to four tracks and two spotlight tracks, all designed to help security and risk management leaders meet the demands of the future. Each track has a particular area of focus to help you deliver on what matters most to you and your organization.

    Track A

    Cybersecurity Leadership

    Faced with a fragmented, interdependent world, cybersecurity leaders have less control over decisions around cyber risk than ever before. This track gives you practical guidance on how to manage security teams, and stakeholders, through the evolving threat landscape.

    Track B

    Infrastructure, Data and Application Security, and Security Operations

    Are you interested in zero-trust identity, API security, the latest in data and applications security? Or are you wondering how automation can standardize your security capabilities? This track provides operational and strategic insight to help you plan a new direction for your security program.

    Track C

    Cyber and IT Risk

    Due to new challenges and lack of agility in program management, cybersecurity leaders struggle to mature their cyber and IT risk management practices beyond conducting assessments. This track highlights the latest trends and tools to help you improve automation and models.

    Track D

    Identity and Access Management

    Identity is a critical foundation for the security of the systems that support our rapidly expanding virtual world. This track ensures you have the tools and insights to support effective identity and fraud initiatives, enabling organizational success.

    Spotlight Track

    Diversity, Equity and Inclusion for Security Initiatives

    Committing to DEI is more than just the right thing to do. It’s been proven that diverse teams and organizations are more successful; they outperform organizations that aren’t as diverse, and they’re more profitable. This spotlight track will help embed greater diversity, equity and inclusion in your leadership and organization.

    Spotlight Track

    Competitive Security Market Dynamics for Product Leaders

    Security product leaders must transform their offerings to be relevant in a new world and culture, rethink strategies and anticipate new buyer needs. This track focuses on helping leaders simplify and reframe current product offerings to succeed in changed markets.

    Ready to register?

    Secure your space now.