Top Recommended Sessions

Delivering on needs for Security & Risk Management leaders in 2019

Questions:

 

  1. How do I assess and control the security risks inherent in cloud?
  2. How can you securely maintain, protect, and govern data when faced with increasing security threats and changing data residency and compliance requirements?
  3. How do we create or evolve an adaptive application security program that can support a wide range of development efforts?
  4. What are the best practices around security monitoring and operations to enable effective detection and investigation of attacks?
  5. What’s real and what is the hype around AI/ML in security and risk management?
  6. How can I build a trusted, secure environment that accelerates the pace of digital business and ensure that I have the right security strategy, culture, and structure in place?
  7. How do I evolve my network security strategy to protect my enterprise against the everchanging threat landscape?
  8. How do I strengthen my security architecture to monitor, combat, and respond to ransomware, malware, and advanced threats?
  9. How can I design, implement, and maintain resilience characteristics to transform digital business initiatives into sustainable operations?
  10. How can I design a robust IAM program with a focus on time to value, employee engagement, and customer satisfaction?
  11. How do I implement effective strategies to manage fraud, financial crime, and insider threat?
  12. How are endpoint and mobile security threats changing, and what practices must enterprises adopt in 2019?
  13. How do I prepare for IT, IoT, and OT convergence?
  14. How do I effectively engage with the CEO, board, and business stakeholders, and make security matter to the entire Organization?

1 How do I assess and control the security risks inherent in the cloud?

Relevant Sessions

 

  • Security Patterns and Best Practices for
  • Securing Cloud-Native Applications
  • The State of Network Security in the Cloud Era
  • Keeping Clouds Compliant: Top Five CSP Characteristics for Your Cloud Requisition Playbook
  • Cloud Security Foundational and Advanced Controls
  • Cloud Providers: The New Competitors in the Security Market
  • Office 365 Security Foundational and Advanced Controls
Benefits

 

  • Understand security patterns and best practices for securing cloud-native applications, including container security
  • Understand best practices to rearchitect your networks to enable a smooth transition to the adoption of cloud-based security services
  • Contextualize security and privacy considerations for the cloud and understand what tools to consider to better manage security and privacy compliance activities in the cloud
  • Get prescriptive guidance on what your organization needs to protect your cloud infrastructure and applications and get tips on how to evaluate and build a shortlist for your vendor selections
  • Understand the motivations and strategies of Tier-1 cloud providers in security and analyze how they affect customer purchasing decisions in security
  • Understand advanced security features included in the M365 E5 license suite
Experts

 

  • Sid Deshpande 
  • Steve Riley
  • Khushbu Pratap 
  • John Watts

2 How can you securely maintain, protect, and govern data when faced with increasing security threats and changing data residency and compliance requirements?

Relevant Sessions

 

  • Outlook for Data Security 2019
  • A Successful Data Security Strategy Needs a Financial Risk Assessment
  • Creating a Data Security Governance Strategy
  • The CISO Guide to API Security: Enabling Innovation Without Enabling Attacks and Data Breaches
  • How to Implement a Holistic DLP Strategy
  • Lessons Learned in the Equifax Breach and Other Incidents
  • Handling Privacy Risk in Analytics and Machine Learning
  • Build for Privacy
  • The Evolving Space of Secure Enterprise Data Communications Beyond VPN
Benefits

 

  • Develop security strategies that treat data as a pervasive asset (and liability)
  • Develop financial investment strategies to manage the different data risk categories and apply appropriate investment, management or security actions
  • Understand how a data security governance framework provides business focus and get practical steps to develop a data security governance framework
  • Learn best practices in securing APIs
  • Get best practices on how to monitor, track and manage enterprise data and the best product and service options available today for DLP
  • Get an analysis of recent security breaches, How they happened and what the company’s response was, What worked and what didn’t, What we should learn from the breach
  • Answer your questions when it comes to handling the risk of mining large data sets of personal information for analytics, fraud prevention or undirected discovery
  • Hear lessons learned from the mad rush to the GDPR and how small, strategic changes to the way you plan, design and acquire can make compliance a natural step in your progression
  • Understand the different data communication solutions for your use cases, including application-centric and demand-driven connections
Experts

 

  • Brian Lowans 
  • Steve Riley 
  • Manjunath Bhat
  • Prateek Bhajanka 
  • Nadar Henien
  • Rajpreet Kaur

3 How do we create or evolve an adaptive application security program that can support a wide range of development efforts?

Relevant Sessions
 
  • Outlook for Application Security 2019
  • Define Your Mobile Application Security Strategy
  • Security Patterns and Best Practices for Securing Cloud-Native Applications
  • Navigating the Technology Landscape of Web Application Protection
  • Magic Quadrant for Application Security Testing
  • The CISO Guide to API Security: Enabling Innovation Without Enabling
  • Attacks and Data Breaches
  • Office 365 Security Foundational and Advanced Controls
Benefits

 

  • Get insights on the outlook for application vulnerabilities and application security programs, as well as the newest developments in the application security practices and technologies.
  • Learn how applications can be protected on the inside without requiring external components to be installed on the device
  • Understand security patterns and best practices for securing cloud-native applications, including container security
  • Understand common attack patterns the technologies useful in mitigating each type of attack and what adjustments must be made for cloud-native application development
  • Learn about the market and leading vendors in the application security testing space
  • Learn best practices in securing APIs
  • Understand advanced security features included in the M365 E5 license suite
Experts

 

  • Dale Gardner 
  • Manjunath Bhat
  • Sid Deshpande

4 What are the best practices around security monitoring and operations to enable effective detection and investigation of attacks?

Relevant Sessions

 

  • What’s My Managed Security Services Provider Actually Doing?
  • Magic Quadrant for Security Information and Event Management
  • How to Get Started Creating Security Use Cases for Your SIEM
  • How to Select an MSSP
  • Best Practices of Engaging a Vulnerability Assessment Penetration Testing Consulting Player in India
  • Creating Security Monitoring Use Cases with the MITRE ATT&CK Framework
  • Further Evolution of Modern SOC: Automation, Delegation, Analytics
Benefits

 

  • Get clarity on the difference between what MSSPs promise, what they can deliver, and how your organization can get the best value out of an MSS relationship
  • Understand how to shorten the deployment cycle and transfer responsibility for managing a SIEM tool’s platform by leveraging SaaS or hosted SIEM solution options
  • Get actionable and pragmatic approach to developing security use cases for your SIEM
  • Understand what service performance metrics are valuable to receive from an MSSP and how to define service customization requirements
  • Understand the vendor landscape for VAPT and best practices for VAPT engagement
  • Learn how to create security monitoring use cases, and get a starting list of use cases for your SIEM deployment
  • Understand if you can rely on automation, where to outsource and delegate and if SOAR tools can really automate your SOC
Experts

 

  • Gorka Sadowski 
  • Rajpreet Kaur,
  • Prateek Bhajanka
  • Sid Deshpande

5 What’s real and what is the hype around AI/ML in security and risk management?

Relevant Sessions

 

  • The Role of Artificial Intelligence in Security and Risk Management
  • Handling Privacy Risk in Analytics and Machine Learning
Benefits

 

  • Comprehend the state of AI and machine learning usage in various security and risk management areas
  • Answer your questions when it comes to handling the risk of mining large data sets of personal information for analytics, fraud prevention or undirected discovery
Experts

 

  • Nader Henein

6 How can I build a trusted, secure environment that accelerates the pace of digital business and ensure that I have the right security strategy, culture, and structure in place?

Relevant Sessions

 

  • Define Cybersecurity for Your Organization — And Why You Should Care to Do So
  • Introducing the Gartner Information Security Function Operating Model
  • Manage Cybersecurity With Business- Facing Services and Descriptions
  • Gartner Closing Keynote: Mastering the Art of the Political Discussion
  • Gartner Opening Keynote: From Managing Risk and Security to Enabling Value Creation
  • CISO Circle: Creating a One-Page Cybersecurity Strategy That Actually Works 
Benefits

 

  • Get clarity on the definition of cybersecurity, its taxonomy and critical areas of coverage, and establish a common language with vendors and providers
  • Understand the Gartner Operating Model for the Information Security Function and use it to deliver against your operational and strategic objectives
  • Learn how to write business-centric value statements for risk and security to bridge the knowledge gap with executives
  • Get practical techniques for managing the potential conflict with business stakeholders and reaching a successful outcome
  • Learn how to think differently about their role in value preservation and value creation, and how finding sweet spots in a human to machine continuum can help
  • Learn how to craft a simple, easy to use one-page strategy to propel your program to success
Experts

 

  • Khushbu Pratap 
  • Wam Voster 
  • Brian Reed
  • Sid Deshpande
  • Jeffrey Wheatman

7 How do I evolve my network security strategy to protect my enterprise against the everchanging threat landscape?

Relevant Sessions

 

  • The State of Network Security in the Cloud Era
  • The Role of Network Traffic Analysis in Today’s Threat Environment
  • Innovation in Network Security Moving From Preventing to Detecting
Benefits

 

  • Understand best practices to rearchitect your networks to enable a smooth transition to the adoption of cloud-based security services
  • Hear about the latest trends in network-based advanced threat detection, including new techniques for anomaly detection and will learn about the key vendors in the market
  • Learn how to evolve your products for success through detection
Experts

 

  • John Watts
  • Nat Smith

How do I strengthen my security architecture to monitor, combat, and respond to ransomware, malware, and advanced threats?

Relevant Sessions

 

  • Three Scenarios You Should Add to Your Incident Response Plan
  • Learning from the State of the Threat Landscape
  • The Role of Network Traffic Analysis in Today’s Threat Environment
  • Incident Response Scenario for Phishing Attacks
  • How to Redefine Your Email Security Strategy for 2020 and Beyond
  • Improve Your Threat Detection Function with Deception Technologies
Benefits

 

  • Learn what you should add to your incident response plan to better cover incidents of compromised credentials, insider threats and ransomware
  • Get insights on future threat trends and response options
  • Hear about the latest trends in network-based advanced threat detection, including new techniques for anomaly detection and will learn about the key vendors in the market
  • Dive into an incident response scenario that requires for planning, response, and recovery from a phishing attack
  • Understand the components of an effective security strategy, the advantages of evaluating various email security controls as part of a platform rather than individually and best ways to determine which vendors meet your requirements
  • Get Insights on key use cases that deception technologies can be used for
Experts

 

  • John Watts 
  • Brian Reed
  • Neil Wynne
  • Rajpreet Kaur

9 How can I design, implement, and maintain resilience characteristics to transform digital business initiatives into sustainable operations?

Relevant Sessions

 

  • Make the Business Case for Organizational Resilience by Applying Risk-Adjusted Leading Performance Indicators
  • Business Workarounds for Cyberattacks 
Benefits

 

  • Learn how to craft risk-adjusted Leading performance Indicators that will measure the organization’s level of resilience
  • Debate on whether a cyber-attack is an IT/DR issue or a business issue
Experts

 

  • Roberta Witty 
  • Khushbu Pratap

 

10 How can I design a robust IAM program with a focus on time to value, employee engagement, and customer satisfaction?

Relevant Sessions

 

  • Outlook for Identity and Access Management 2019
  • Privileged Access Management Best Practices
Benefits

 

  • Understand how IAM can quickly deliver real business value and support cyber defense and how IAM technology spends will evolve
  • Learn about the PAM Maturity model and tools
Experts

 

  • Abhyuday Data

11 How do I implement effective strategies to manage fraud, financial crime, and insider threat?

Relevant Sessions

 

  • Building Incident Response Scenarios for Insider Threats
  • Handling Privacy Risk in Analytics and Machine Learning
  • Why the CISO Needs to Care About Fraud, and What Can Be Done About It
  • Employee Monitoring — What CISOs Need to Know
Benefits

 

  • Learn how to define insider threat personas, how to begin building scenarios for these personas, and discuss some best practices for success
  • Answer your questions when it comes to handling the risk of mining large data sets of personal information for analytics, fraud prevention or undirected discovery
  • Learn how to align your fraud, risk and technical security resources and how improved intelligence can assist in this complex task
  • Get pointers on what CISOs should know about employee monitoring
Experts

 

  • Brian Reed
  • Nadar Heinen
  • Neil Wynne

12 How are endpoint and mobile security threats changing, and what practices must enterprises adopt in 2019?

Relevant Sessions

 

  • The Endpoint Is the New Perimeter: How to Build an Effective Endpoint Protection Strategy
  • Endpoint Security 101: EPP/EDR Convergence Best Practices
  • Magic Quadrant for Endpoint Protection Platforms
  • Top 10 Best Practices to Secure Android in the Enterprise
Benefits

 

  • Hear about the changing endpoint defensive strategies from detection and response to proactive hardening
  • Learn about the convergence between EDR and EPP and best practices in endpoint security
  • Get an evaluation of vendors in the Endpoint protection space
  • Understand how security and risk management leaders should counter security concerns linked to Android platform fragmentation
Experts

 

  • Lawrence Pingree 
  • Manjunath Bhat

13 How do I prepare for IT, IoT, and OT convergence?

Relevant Sessions

 

  • Top Tips To Secure Your OT
Benefits

 

  • Understand the processes, architecture, and controls to put in place for Securing Operational Technology
Experts

 

  • Wam Voster

14 How do I effectively engage with the CEO, board, and business stakeholders, and make security matter to the entire organization?

Relevant Sessions

 

  • Gartner Opening Keynote: From Managing Risk and Security to Enabling Value Creation
  • CISO Circle: How to Have an Engaging Conversation with Your CEO About Risk
  • Five Questions on Security and Risk That You Must Be Prepared to Answer at Your Board Meetings!
Benefits

 

  • Learn how to think differently about their role in value preservation and value creation, and how finding sweet spots in a human to machine continuum can help
  • Get tools to get your CEO to the table and keep them engaged so that they value the outcome of the decisions we ask for
  • Understand the role of the board and what do they care about, the most common questions that Board Members
  • Ask and how to flip the conversation to educate the Board on issues that they need to know about
Experts

 

  • Jeffrey Wheatman

Do you want to take this information with you?

Explore this year's hot topics