Agenda
Monday, 13 February, 2023 / 11:00 AM - 11:30 AM IST
Abhyuday Data, Director Analyst, Gartner
Identity-first security has emerged as a theme in many major security initiatives and policies. Supporting these initiatives as well as delivering on business requirements for smooth, simple and secure access, and authentication decisions requires disparate IAM elements to work in concert. This session will provide an update on the major themes in IAM to ensure that your IAM decisions in 2023 will support the strategy of the future.
Monday, 13 February, 2023 / 02:30 PM - 02:50 PM IST
Abhyuday Data, Director Analyst, Gartner
Through a selection of relevant Gartner insights and complementary methodologies, we will provide insight into the latest updates in the privileged access management market.
Monday, 13 February, 2023 / 04:00 PM - 04:30 PM IST
Thomas Lintemuth, VP Analyst, Gartner
Enterprises are shifting to hybrid work environments to enable anywhere, anytime access to resources that are located everywhere -- in SaaS, in public cloud IaaS with some workloads in the traditional data center. A SASE strategy enables users, devices and branches zero trust access to resources, regardless of location. This session will lay out a strategic timeframe and roadmap for SASE adoption.
Tuesday, 14 February, 2023 / 11:15 AM - 11:45 AM IST
Anil Bhandari, Chief Mentor, ARCON
An increase in the types of digital identities, coupled with multi-cloud adoption, has added complexity to managing identities and privileges. How does one get future-ready, to address these new-age challenges? An Identity-centric security strategy centers on effective governance with zero trust, that simplifies and unifies critical aspects of Access Management (AM), Identity Governance Administration (IGA) and Privileged Access Management (PAM). Join us to explore the benefits of a Converged Identity security approach that is outcome-driven, and looks to ditch the silos of key IAM components.
Tuesday, 14 February, 2023 / 02:45 PM - 03:15 PM IST
Organizations are expected to adopt services from 3 or more public cloud providers & expect 2x growth in number of all identities managed annually. 63% of 1500 organizations in multi-cloud environments have been a victim of a successful identity-related cybersecurity attack. With cloud attack as a foremost concern, it is imperative to constantly and ruthlessly secure access for all identities & monitor them throughout their lifecycle. Find out how a holistic and robust Identity Security strategy based on privilege controls can secure access for any identity – human & machine – anywhere.
Monday, 13 February, 2023 / 11:00 AM - 11:30 AM IST
Manjunath Bhat, VP Analyst, Gartner
The number an complexity of tools and techniques that make up good application security practices can be overwhelming. There are various application security testing tools, threat modeling processes, security requirements, as well as runtime security controls that need to be considered. This session will review the tools and practices that are essential to any application security program.
Tuesday, 14 February, 2023 / 10:30 AM - 11:15 AM IST
Manjunath Bhat, VP Analyst, Gartner
Attackers are targeting software development systems, open-source artifacts and DevOps pipelines to compromise software supply chains. In this Ask the Expert session, we will answer questions on emerging trends such as software bill of materials, hermetic pipelines and binary authorization to mitigate risks both for internally developed applications and externally procured software.
Tuesday, 14 February, 2023 / 02:00 PM - 02:30 PM IST
Dennis Xu, Sr Director Analyst, Gartner
This session will discuss the evolution of Office 365 into Microsoft 365 and the security, identity and compliance features that all organizations must implement. We will discuss third-party options as well as the built in native Microsoft features along with strengths and weaknesses of each.
Tuesday, 14 February, 2023 / 02:45 PM - 03:15 PM IST
Organizations are expected to adopt services from 3 or more public cloud providers & expect 2x growth in number of all identities managed annually. 63% of 1500 organizations in multi-cloud environments have been a victim of a successful identity-related cybersecurity attack. With cloud attack as a foremost concern, it is imperative to constantly and ruthlessly secure access for all identities & monitor them throughout their lifecycle. Find out how a holistic and robust Identity Security strategy based on privilege controls can secure access for any identity – human & machine – anywhere.
Tuesday, 14 February, 2023 / 04:30 PM - 05:00 PM IST
Manjunath Bhat, VP Analyst, Gartner
There are millions of open-source software projects in the world. Which ones are in your software? And what security, operational, and legal risks do they pose? Getting control and managing a myriad of risks requires information, process changed, and automated tools to spot and help remediate problems. In this session, we'll examine the various changes you should consider, along with the tools that can help in getting control.
Monday, 13 February, 2023 / 11:00 AM - 11:30 AM IST
Charlie Winckless, Sr Director Analyst, Gartner
Cloud security remains a top priority. This presentation summarizes the problems, recommended processes and new product types to address three key issues: What are the unique risks associated with public cloud service providers, and how can they be controlled? What are the unique security challenges of IaaS and how can they be mitigated? What are the unique control challenges of SaaS and how can they be addressed?
Monday, 13 February, 2023 / 11:45 AM - 12:15 PM IST
As cyber threats evolve, so should your cybersecurity. Keeping a predominantly human-powered solution at the helm of your enterprise's security is leaving you at risk of costly cyber threats. In the current economic landscape, organizations can't afford to be subject to such risks. Attend this fireside chat with Security Leaders who have embraced autonomous cybersecurity that’s purpose-built to protect their organization from current and future threats.
Monday, 13 February, 2023 / 02:30 PM - 03:00 PM IST
Richard Bartley, VP Analyst, Gartner
How do you decide on which cloud security controls to deploy? The bewildering array of cloud security patterns can make common approaches to cloud security daunting. This session presents practical steps toward designing the right set of native and vendor layered cloud security components for your organization.
Monday, 13 February, 2023 / 03:15 PM - 03:45 PM IST
Organizations across all sectors are recognizing the value of technology innovation to drive gains and stay ahead. Accelerating your organization’s digital transformation and technology initiatives can however look like a monumental challenge in today’s climate, where change is the only constant. Join this fireside chat, in partnership with Sudip Banerjee, Field CTO to learn how IT leaders can break down roadblocks, to drive a digital first mindset across the organization.
Monday, 13 February, 2023 / 04:00 PM - 04:30 PM IST
Thomas Lintemuth, VP Analyst, Gartner
Enterprises are shifting to hybrid work environments to enable anywhere, anytime access to resources that are located everywhere -- in SaaS, in public cloud IaaS with some workloads in the traditional data center. A SASE strategy enables users, devices and branches zero trust access to resources, regardless of location. This session will lay out a strategic timeframe and roadmap for SASE adoption.
Monday, 13 February, 2023 / 04:00 PM - 04:45 PM IST
Dennis Xu, Sr Director Analyst, Gartner
Come join your peers for a round table discussion on cloud security. Someone might have fixed the issue that you are struggling with, or they might have a better way to automate that security check. You might be evaluating the same CNAPP tool at the moment. Come share with your peers your unique cloud security journey.
Tuesday, 14 February, 2023 / 11:15 AM - 11:45 AM IST
Kumar Mehta, Founder and Chief Development Officer, Versa Networks Inc
The term Zero Trust in today’s security paradigm is used to define a plethora of security products and technologies. Two of the most popular terms used in relation to this are Zero Trust Architecture and Zero Trust Network Access. Normally, security architects are not aware of the differences between the two and the fact that ZTNA is only a component of the overall Zero Trust Architecture. This session will strive to explain ZTA,ZTNA and their relationship with each other.We will also discuss the evaluation criteria and the criticality of selecting the right ZTNA solution for your requirements
Tuesday, 14 February, 2023 / 02:00 PM - 02:30 PM IST
Dennis Xu, Sr Director Analyst, Gartner
This session will discuss the evolution of Office 365 into Microsoft 365 and the security, identity and compliance features that all organizations must implement. We will discuss third-party options as well as the built in native Microsoft features along with strengths and weaknesses of each.
Tuesday, 14 February, 2023 / 02:45 PM - 03:15 PM IST
Cyber Resilience provides a high-level holistic strategy that includes cyber security standards, guidelines, people, business processes and technology solutions. This session provides a context around where Cyber Recovery solution fits into your overall Security and Cyber Resilience strategy using the NIST CyberSecurity Framework. Cyber Recovery provides additional layers of physical and logical security at both the solution, system and data/file level to ensure critical data can be preserved with integrity, confidentiality and to ensure it is available when needed for recovery. The session focusses upon Protecting critical data from cyber threats and away from the attack surface with the ability to recover data with ease, speed and accuracy.
Tuesday, 14 February, 2023 / 02:45 PM - 03:15 PM IST
Organizations are expected to adopt services from 3 or more public cloud providers & expect 2x growth in number of all identities managed annually. 63% of 1500 organizations in multi-cloud environments have been a victim of a successful identity-related cybersecurity attack. With cloud attack as a foremost concern, it is imperative to constantly and ruthlessly secure access for all identities & monitor them throughout their lifecycle. Find out how a holistic and robust Identity Security strategy based on privilege controls can secure access for any identity – human & machine – anywhere.
Tuesday, 14 February, 2023 / 03:45 PM - 04:15 PM IST
Charlie Winckless, Sr Director Analyst, Gartner
Cloud security remains a challenge; we have to protect data when it is out of our control. This session will address the emerging trends in cloud security, what they bring to your organization and how to use them most effectively. Security is seen as an obstruction to cloud adoption; this will show you how to enable without losing protection.
Tuesday, 14 February, 2023 / 04:30 PM - 05:00 PM IST
Abhyuday Data, Director Analyst, Gartner
Emerging risks and top security trends are driving innovation in security and risk management. Among many new areas in security that are emerging, which ones should you focus on? This session will explore high-impact emerging technologies in security and risk management.
Monday, 13 February, 2023 / 09:30 AM - 10:15 AM IST
Deepti Gopal, Director Analyst, Gartner
Christopher Mixter, VP, Research, Gartner
Every year, Gartner produces impactful predictions across all practices. This presentation will compile the top predictions prepared by our cybersecurity experts for the year 2022-2023. Security and risk management leaders should monitor these trends to be successful in the digital era especially as most recognize that global change could potentially be one crisis away.
Monday, 13 February, 2023 / 11:45 AM - 12:15 PM IST
Joseph Carson, CHIEF SECURITY SCIENTIST & ADVISORY CISO, Delinea
Following the digital footprints of a malicious hacker and uncovering their attack path. This is a journey inside the mind of an ethical hacker's response to a ransomware incident that brought a business to a full stop, discovering the evidence left behind to uncover the attack path and the techniques used. I will cover a real-world ransomware incident response showing the techniques used and why, and the evidence left behind. Joseph Carson, CSS & Advisory CISO at Delinea, will take you through the mind of a hacker and follow the footsteps that led to a damaging Crylock ransomware attack.
Monday, 13 February, 2023 / 12:30 PM - 01:15 PM IST
Paul Furtado, VP Analyst, Gartner
Join this discussion on security and risk best practices for mid-size enterprises. Midsize enterprises are defined as organizations between $50 million and $1 billion in annual revenue and fewer than 1,000 employees. This session is a good fit for you if your organization has between five and 50 people in IT and an IT budget between $5 million and $30 million.
Monday, 13 February, 2023 / 02:30 PM - 03:15 PM IST
Steve Santos, Sr Director Analyst, Gartner
Join this ask the experts session to get answers to key questions around risk-based vulnerability management. This session will offer answers to questions such as:
- how to do RBVM with process
- how to do RBVM with tools
- Best practices for RBVM
Monday, 13 February, 2023 / 02:30 PM - 04:00 PM IST
William Candrick, Director Analyst, Gartner
Your executives only care about risk, value, and cost. Why would you speak to them about anything else? This workshop will walk through the steps of identifying business processes and outcomes, aligning supporting technology stacks, and creating outcome-driven metrics to put cybersecurity in a business context.
Monday, 13 February, 2023 / 03:15 PM - 03:45 PM IST
Organizations across all sectors are recognizing the value of technology innovation to drive gains and stay ahead. Accelerating your organization’s digital transformation and technology initiatives can however look like a monumental challenge in today’s climate, where change is the only constant. Join this fireside chat, in partnership with Sudip Banerjee, Field CTO to learn how IT leaders can break down roadblocks, to drive a digital first mindset across the organization.
Monday, 13 February, 2023 / 04:00 PM - 04:30 PM IST
Paul Furtado, VP Analyst, Gartner
Gartner has observed a new approach to detecting and mitigating Insider Risk. Early detection and nudge-based intervention prove more cost effective than the traditional "detect, deter, destroy" model beloved by legacy security leaders. In this presentation, we outline how the new approach is not only better for the revenue line, it is also better for organizational culture and employee effectiveness.
Monday, 13 February, 2023 / 05:00 PM - 05:45 PM IST
Roberta Witty, VP Analyst, Gartner
Refocus corporate security initiatives and efforts — from a futile effort to prevent breaches and to accepting the inevitability of breaches. We will define how to learn from normal accident theory to build a culture of resilience that is capable of reducing or eliminating business impacts from security breaches. This culture is built on characteristics and disciplines, which we will define in actionable terms.
Tuesday, 14 February, 2023 / 10:30 AM - 11:00 AM IST
Deepti Gopal, Director Analyst, Gartner
Gartner’s annual surveys collect data from thousands of CIOs on what matters most to them.
Join this session to learn:
• What’s most important to them
• How they are adapting to the fast-changing environment around them
• Implications for security and risk leaders
Tuesday, 14 February, 2023 / 10:30 AM - 11:00 AM IST
William Candrick, Director Analyst, Gartner
No one can tell you what your metrics should be … until now. Gartner has developed and vetted a prioritized list of metrics to describe the value of your cybersecurity program to satisfy the most challenging audiences including your board, CFO, COO, customers, partners and regulators. And we are working on benchmarks for each.
- What cybersecurity metrics should I measure?
- How can I use metrics to drive governance?
Tuesday, 14 February, 2023 / 10:30 AM - 12:30 PM IST
Christopher Mixter, VP, Research, Gartner
Rahul Balakrishnan, Director, Research, Gartner
CISOs report frustration that the time and effort their teams invest in quantifying cyber risk rarely drives risk owners to take action. In this interactive Research Discussion, exclusively for CISO Circle participants, you’ll network with peers on their cyber risk quantification efforts and discover how to use CRQ to effectively influence business decision making. This session will feature a deep-dive into Verizon’s CRQ practice, which delivers trustworthy, timely, and empowering guidance to risk owners without major investment in new data and skills…and without the need to conduct scenario likelihood calculations.
Tuesday, 14 February, 2023 / 11:15 AM - 11:45 AM IST
Craig Adams, Chief of Product and Engineering, RECORDED FUTURE-MA
Threat Landscapes are constantly changing and keeping up with emerging security risks can feel like a daunting task. How do you know if you are covered when new threats are emerging? Join us to learn how organisations can tap on security intelligence to help understand the cyber threat landscape better and also increase organisations’ operational efficiency in threat prevention and risk mitigation- the important missing piece of your architecture if you are without it.
Tuesday, 14 February, 2023 / 12:00 PM - 12:30 PM IST
Paul Furtado, VP Analyst, Gartner
Midsize enterprise (MSE) IT leaders face significant security challenges when trying to deliver IT services with small IT teams (usually fewer than 30 people) and limited IT budgets (usually less than $20 million). Join us for a discussion of the top trends that MSE IT leaders responsible for security and risk management should prioritize to stay current and proactive in protecting the organization and managing risk effectively.
Monday, 13 February, 2023 / 02:30 PM - 03:00 PM IST
Wam Voster, VP Analyst, Gartner
2021 showed that attacks are moving closer to operational or mission-critical environments where cyber-physical systems (CPS) live. Whether they are born of OT/IT convergence or from IoT, IIoT, or Smart "X" efforts, CPS are everywhere and mandate different approaches to security than IT systems.
What are the top 10 must-dos to protect them?
Tuesday, 14 February, 2023 / 04:30 PM - 05:00 PM IST
Abhyuday Data, Director Analyst, Gartner
Emerging risks and top security trends are driving innovation in security and risk management. Among many new areas in security that are emerging, which ones should you focus on? This session will explore high-impact emerging technologies in security and risk management.
Monday, 13 February, 2023 / 03:15 PM - 03:45 PM IST
Dave Lewis, GLOBAL ADVISORY CISO, Cisco Systems
Security debt, is “the accumulation of the patches missed, the risks accepted, and the configurations misapplied,” is a serious and common problem for many organizations. Organisations should look to strategies like the zero-trust model, trust but verify, sanitation of inputs and outputs, and of course, make sure to execute patches instead of pushing it onto the next person. The longer organizations wait to address risks, the harder it is to address them to eliminate debt, organizations should create defined and repeatable processes with plans for action.
At this session, the attendees will get more in-depth information on :
1 The best practices to reduce security risk.
2 Zero trust model for the enterprise to manage user authentication.
3 Managing deprecated systems to reduce the risk to the enterprise thereby building security resilience.
Tuesday, 14 February, 2023 / 02:00 PM - 02:30 PM IST
Richard Bartley, VP Analyst, Gartner
This session will discuss the reference architecture and dive deep into how to build the cybersecurity mesh architecture (CSMA). We will discuss the evolution of best-of-breed to the new CSMA along with pros and cons of each approach. Finally, we will discuss the vendor landscape from larger security vendors with full stacks to open source/distributed CSM solutions.
Tuesday, 14 February, 2023 / 02:00 PM - 02:30 PM IST
Charlie Winckless, Sr Director Analyst, Gartner
Check in to make sure you are current on network security offerings and how they complement each other, but stay to see how they are evolving and what new technologies will transform your current processes over the next few years.
Tuesday, 14 February, 2023 / 02:45 PM - 03:15 PM IST
Today’s enterprises aren’t just looking for a unifying architecture that can bring their fragmented infrastructure and deployments under control. They need a system that makes deploying new technologies and services secure and straightforward. This requires more than workarounds connecting disparate security technologies. Join this session to learn how a broad, integrated, and automated cybersecurity mesh platform can provide centralized management and visibility, supports and interoperates across a vast ecosystem of solutions, and automatically adapts to dynamic changes in the network.
Monday, 13 February, 2023 / 11:45 AM - 12:15 PM IST
Hitesh Menghnani, SENIOR PRODUCT MANAGER, Trellix
The endpoint attack surface is constantly expanding through the move to the cloud, the increase of remote workers, and a disappearing network perimeter. More and more endpoints are under attack by more sophisticated threats such as ransomware, supply chain attacks and advanced persistent threats that go undetected with siloed security tools.
Join this session to learn more about how the integration of a complete Endpoint Security stack with XDR can help prioritize threat alerts by breaking the security silos and correlating Endpoint Security, Data Security, Network Security & Email Security
Monday, 13 February, 2023 / 02:30 PM - 03:00 PM IST
Ravisha Chugh, Principal Analyst, Gartner
Data security is a top priority. This session covers current trends and emerging topics specific to data security. How organizations handle and consume data continues to rapidly evolve. Databases and cloud applications introduce rapidly evolving threats with with countermeasures following slowly. Planning to use data as the focus of security governance and security architecture roadmaps is critical for any security and risk management program.
Tuesday, 14 February, 2023 / 12:00 PM - 12:30 PM IST
Ravisha Chugh, Principal Analyst, Gartner
Data breach is now more of a reality than a threat which can expose personal and corporate intellectual property. CIOs, CISOs and general counsel are teaming together to improve readiness for this reality. This session will provide insights to actionable and proactive steps to reduce exposure by establishing knowledge of your data to align with access expectations and life cycle management.
Tuesday, 14 February, 2023 / 02:00 PM - 02:45 PM IST
Ravisha Chugh, Principal Analyst, Gartner
Ask any questions you have regarding DLP - including vendors in the market, market trends, how to choose the right solution or any best practices for implementing it.
Tuesday, 14 February, 2023 / 02:45 PM - 03:15 PM IST
Prianshu Khandwala, LEAD- INFORMATION SECURITY, UPL Ltd
With data regulations becoming more complex and localised, and companies managing data centres and cloud services on a global scale, how do organisations ensure their strategies for data protection safeguard them from today’s data security threats?
Drawing on their experience, Prianshu Khandwala, Information Security Lead at UPL and Raghunandan Koushik, Regional Director at Fortra, discuss the data protection challenges faced by global organisations, sharing ways to identify threats to data security and highlighting best practices for building a robust data protection framework.
Tuesday, 14 February, 2023 / 02:45 PM - 03:15 PM IST
Cyber Resilience provides a high-level holistic strategy that includes cyber security standards, guidelines, people, business processes and technology solutions. This session provides a context around where Cyber Recovery solution fits into your overall Security and Cyber Resilience strategy using the NIST CyberSecurity Framework. Cyber Recovery provides additional layers of physical and logical security at both the solution, system and data/file level to ensure critical data can be preserved with integrity, confidentiality and to ensure it is available when needed for recovery. The session focusses upon Protecting critical data from cyber threats and away from the attack surface with the ability to recover data with ease, speed and accuracy.
Monday, 13 February, 2023 / 11:45 AM - 12:15 PM IST
Hitesh Menghnani, SENIOR PRODUCT MANAGER, Trellix
The endpoint attack surface is constantly expanding through the move to the cloud, the increase of remote workers, and a disappearing network perimeter. More and more endpoints are under attack by more sophisticated threats such as ransomware, supply chain attacks and advanced persistent threats that go undetected with siloed security tools.
Join this session to learn more about how the integration of a complete Endpoint Security stack with XDR can help prioritize threat alerts by breaking the security silos and correlating Endpoint Security, Data Security, Network Security & Email Security
Monday, 13 February, 2023 / 11:45 AM - 12:15 PM IST
As cyber threats evolve, so should your cybersecurity. Keeping a predominantly human-powered solution at the helm of your enterprise's security is leaving you at risk of costly cyber threats. In the current economic landscape, organizations can't afford to be subject to such risks. Attend this fireside chat with Security Leaders who have embraced autonomous cybersecurity that’s purpose-built to protect their organization from current and future threats.
Monday, 13 February, 2023 / 12:30 PM - 01:00 PM IST
Franz Hinner, Sr Director Analyst, Gartner
Endpoint now covers a wide variety of devices, and organisations invest heavily in trying to secure them. So why is it that malware attacks such as ransomware are still so prevalent. We discuss how securing the endpoint needs to go beyond protecting the individual endpoint, to protect the diverse range of endpoints that make up an organisation.
Tuesday, 14 February, 2023 / 10:30 AM - 11:00 AM IST
Deepti Gopal, Director Analyst, Gartner
Gartner’s annual surveys collect data from thousands of CIOs on what matters most to them.
Join this session to learn:
• What’s most important to them
• How they are adapting to the fast-changing environment around them
• Implications for security and risk leaders
Monday, 13 February, 2023 / 11:00 AM - 11:30 AM IST
Abhyuday Data, Director Analyst, Gartner
Identity-first security has emerged as a theme in many major security initiatives and policies. Supporting these initiatives as well as delivering on business requirements for smooth, simple and secure access, and authentication decisions requires disparate IAM elements to work in concert. This session will provide an update on the major themes in IAM to ensure that your IAM decisions in 2023 will support the strategy of the future.
Monday, 13 February, 2023 / 11:45 AM - 12:15 PM IST
Chris Hockings, EXECUTIVE SECURITY SPECIALIST, IBM
In a rapidly-evolving security landscape with new challenges every day, you need a trusted partner that moves with you.
IBM Security is designed for enterprises like yours. An open platform that moves in step with your ever-changing footprint, backed by AI and automation to always keep you one step ahead. From predicting threats to protecting data, working across vendors, or across the world. No matter where your business is headed, we’ll keep you moving forward, every move you make.
Tuesday, 14 February, 2023 / 11:15 AM - 11:45 AM IST
Anil Bhandari, Chief Mentor, ARCON
An increase in the types of digital identities, coupled with multi-cloud adoption, has added complexity to managing identities and privileges. How does one get future-ready, to address these new-age challenges? An Identity-centric security strategy centers on effective governance with zero trust, that simplifies and unifies critical aspects of Access Management (AM), Identity Governance Administration (IGA) and Privileged Access Management (PAM). Join us to explore the benefits of a Converged Identity security approach that is outcome-driven, and looks to ditch the silos of key IAM components.
Tuesday, 14 February, 2023 / 04:30 PM - 05:00 PM IST
Abhyuday Data, Director Analyst, Gartner
Emerging risks and top security trends are driving innovation in security and risk management. Among many new areas in security that are emerging, which ones should you focus on? This session will explore high-impact emerging technologies in security and risk management.
Monday, 13 February, 2023 / 04:00 PM - 04:30 PM IST
Thomas Lintemuth, VP Analyst, Gartner
Enterprises are shifting to hybrid work environments to enable anywhere, anytime access to resources that are located everywhere -- in SaaS, in public cloud IaaS with some workloads in the traditional data center. A SASE strategy enables users, devices and branches zero trust access to resources, regardless of location. This session will lay out a strategic timeframe and roadmap for SASE adoption.
Tuesday, 14 February, 2023 / 11:15 AM - 11:45 AM IST
Zero Trust Architecture has emerged as an important topic within the field of cybersecurity. However, implementation of Zero Trust has been challenging for many organisations. The quick fix mentality of considering Zero Trust as a one-stop technology that can be purchased and plugged into an existing environment being the primary reason. In our session, learn about Zoho Corp's journey to Zero Trust and our practical approaches to implement the Zero Trust maturity model. We will also discuss the culture change that is required and how to provide a simplified, secure experience to the end users.
Tuesday, 14 February, 2023 / 02:00 PM - 02:30 PM IST
Charlie Winckless, Sr Director Analyst, Gartner
Check in to make sure you are current on network security offerings and how they complement each other, but stay to see how they are evolving and what new technologies will transform your current processes over the next few years.
Tuesday, 14 February, 2023 / 02:45 PM - 03:15 PM IST
Prianshu Khandwala, LEAD- INFORMATION SECURITY, UPL Ltd
With data regulations becoming more complex and localised, and companies managing data centres and cloud services on a global scale, how do organisations ensure their strategies for data protection safeguard them from today’s data security threats?
Drawing on their experience, Prianshu Khandwala, Information Security Lead at UPL and Raghunandan Koushik, Regional Director at Fortra, discuss the data protection challenges faced by global organisations, sharing ways to identify threats to data security and highlighting best practices for building a robust data protection framework.
Tuesday, 14 February, 2023 / 02:45 PM - 03:15 PM IST
Cyber Resilience provides a high-level holistic strategy that includes cyber security standards, guidelines, people, business processes and technology solutions. This session provides a context around where Cyber Recovery solution fits into your overall Security and Cyber Resilience strategy using the NIST CyberSecurity Framework. Cyber Recovery provides additional layers of physical and logical security at both the solution, system and data/file level to ensure critical data can be preserved with integrity, confidentiality and to ensure it is available when needed for recovery. The session focusses upon Protecting critical data from cyber threats and away from the attack surface with the ability to recover data with ease, speed and accuracy.
Monday, 13 February, 2023 / 11:00 AM - 11:30 AM IST
Thomas Lintemuth, VP Analyst, Gartner
Zero-trust strategies for network security have gained notable popularity in recent years. However, organizations need to avoid "silver bullet" thinking and build strategies based on their desired business outcome. This session will highlight the forces that shape network security, threats that need to be addressed, and how to think about zero trust and SASE as part of an overall network security strategy.
Monday, 13 February, 2023 / 11:45 AM - 12:15 PM IST
Hitesh Menghnani, SENIOR PRODUCT MANAGER, Trellix
The endpoint attack surface is constantly expanding through the move to the cloud, the increase of remote workers, and a disappearing network perimeter. More and more endpoints are under attack by more sophisticated threats such as ransomware, supply chain attacks and advanced persistent threats that go undetected with siloed security tools.
Join this session to learn more about how the integration of a complete Endpoint Security stack with XDR can help prioritize threat alerts by breaking the security silos and correlating Endpoint Security, Data Security, Network Security & Email Security
Monday, 13 February, 2023 / 04:00 PM - 04:30 PM IST
Thomas Lintemuth, VP Analyst, Gartner
Enterprises are shifting to hybrid work environments to enable anywhere, anytime access to resources that are located everywhere -- in SaaS, in public cloud IaaS with some workloads in the traditional data center. A SASE strategy enables users, devices and branches zero trust access to resources, regardless of location. This session will lay out a strategic timeframe and roadmap for SASE adoption.
Tuesday, 14 February, 2023 / 11:15 AM - 11:45 AM IST
Zero Trust Architecture has emerged as an important topic within the field of cybersecurity. However, implementation of Zero Trust has been challenging for many organisations. The quick fix mentality of considering Zero Trust as a one-stop technology that can be purchased and plugged into an existing environment being the primary reason. In our session, learn about Zoho Corp's journey to Zero Trust and our practical approaches to implement the Zero Trust maturity model. We will also discuss the culture change that is required and how to provide a simplified, secure experience to the end users.
Tuesday, 14 February, 2023 / 11:15 AM - 11:45 AM IST
Kumar Mehta, Founder and Chief Development Officer, Versa Networks Inc
The term Zero Trust in today’s security paradigm is used to define a plethora of security products and technologies. Two of the most popular terms used in relation to this are Zero Trust Architecture and Zero Trust Network Access. Normally, security architects are not aware of the differences between the two and the fact that ZTNA is only a component of the overall Zero Trust Architecture. This session will strive to explain ZTA,ZTNA and their relationship with each other.We will also discuss the evaluation criteria and the criticality of selecting the right ZTNA solution for your requirements
Tuesday, 14 February, 2023 / 02:00 PM - 02:30 PM IST
Charlie Winckless, Sr Director Analyst, Gartner
Check in to make sure you are current on network security offerings and how they complement each other, but stay to see how they are evolving and what new technologies will transform your current processes over the next few years.
Tuesday, 14 February, 2023 / 02:45 PM - 03:15 PM IST
Today’s enterprises aren’t just looking for a unifying architecture that can bring their fragmented infrastructure and deployments under control. They need a system that makes deploying new technologies and services secure and straightforward. This requires more than workarounds connecting disparate security technologies. Join this session to learn how a broad, integrated, and automated cybersecurity mesh platform can provide centralized management and visibility, supports and interoperates across a vast ecosystem of solutions, and automatically adapts to dynamic changes in the network.
Tuesday, 14 February, 2023 / 04:30 PM - 05:00 PM IST
Abhyuday Data, Director Analyst, Gartner
Emerging risks and top security trends are driving innovation in security and risk management. Among many new areas in security that are emerging, which ones should you focus on? This session will explore high-impact emerging technologies in security and risk management.
Tuesday, 14 February, 2023 / 12:00 PM - 12:30 PM IST
Ravisha Chugh, Principal Analyst, Gartner
Data breach is now more of a reality than a threat which can expose personal and corporate intellectual property. CIOs, CISOs and general counsel are teaming together to improve readiness for this reality. This session will provide insights to actionable and proactive steps to reduce exposure by establishing knowledge of your data to align with access expectations and life cycle management.
Monday, 13 February, 2023 / 09:30 AM - 10:15 AM IST
Deepti Gopal, Director Analyst, Gartner
Christopher Mixter, VP, Research, Gartner
Every year, Gartner produces impactful predictions across all practices. This presentation will compile the top predictions prepared by our cybersecurity experts for the year 2022-2023. Security and risk management leaders should monitor these trends to be successful in the digital era especially as most recognize that global change could potentially be one crisis away.
Monday, 13 February, 2023 / 11:00 AM - 11:45 AM IST
Steve Santos, Sr Director Analyst, Gartner
This session intends to help clients who want to design security architecture to directly address business needs, addressing all stakeholder needs. The session will cover establishing a strategic architecture upon which logical requirements and specifications can be developed to facilitate security component selection.
Monday, 13 February, 2023 / 02:30 PM - 03:00 PM IST
Deepti Gopal, Director Analyst, Gartner
Consistent, practical strategic planning is a prerequisite for security and risk management leaders establishing and supporting the credibility of their security programs. This presentation:
- Introduces a generic security strategy planning process
- Shares the unique best practices associated with security strategy planning
- Provides practical advice on communicating the strategy to stakeholders.
Tuesday, 14 February, 2023 / 10:30 AM - 11:00 AM IST
Deepti Gopal, Director Analyst, Gartner
Gartner’s annual surveys collect data from thousands of CIOs on what matters most to them.
Join this session to learn:
• What’s most important to them
• How they are adapting to the fast-changing environment around them
• Implications for security and risk leaders
Tuesday, 14 February, 2023 / 12:00 PM - 12:30 PM IST
Paul Furtado, VP Analyst, Gartner
Midsize enterprise (MSE) IT leaders face significant security challenges when trying to deliver IT services with small IT teams (usually fewer than 30 people) and limited IT budgets (usually less than $20 million). Join us for a discussion of the top trends that MSE IT leaders responsible for security and risk management should prioritize to stay current and proactive in protecting the organization and managing risk effectively.
Tuesday, 14 February, 2023 / 02:00 PM - 02:30 PM IST
Christopher Mixter, VP, Research, Gartner
Security and risk management leaders are often treated as scapegoats in cases of breach. By the same token, digital business has propelled security and risk to become a boardroom issue, business units have increased their expectations (and demand) of their leadership, and regulatory demands are often challenging. This session will shed light on the leadership traits that aide in a successful and balanced approach between the demands of the business and the effectiveness of the leader.
Monday, 13 February, 2023 / 11:45 AM - 12:15 PM IST
Joseph Carson, CHIEF SECURITY SCIENTIST & ADVISORY CISO, Delinea
Following the digital footprints of a malicious hacker and uncovering their attack path. This is a journey inside the mind of an ethical hacker's response to a ransomware incident that brought a business to a full stop, discovering the evidence left behind to uncover the attack path and the techniques used. I will cover a real-world ransomware incident response showing the techniques used and why, and the evidence left behind. Joseph Carson, CSS & Advisory CISO at Delinea, will take you through the mind of a hacker and follow the footsteps that led to a damaging Crylock ransomware attack.
Monday, 13 February, 2023 / 11:45 AM - 12:15 PM IST
As cyber threats evolve, so should your cybersecurity. Keeping a predominantly human-powered solution at the helm of your enterprise's security is leaving you at risk of costly cyber threats. In the current economic landscape, organizations can't afford to be subject to such risks. Attend this fireside chat with Security Leaders who have embraced autonomous cybersecurity that’s purpose-built to protect their organization from current and future threats.
Monday, 13 February, 2023 / 04:00 PM - 04:30 PM IST
Angel Berrios, Sr Director Analyst, Gartner
Ransomware is a threat that requires a whole-business approach to defend against and the diversity of tools, techniques, and processes that enterprise security professionals can bring to bear to protect against ransomware can be intimidating. In this session, attendees will learn how to assess their program of ransomware defense and quickly close the gaps that attackers will use to make your organization the next name on their list of victims.
Tuesday, 14 February, 2023 / 10:30 AM - 12:00 PM IST
Franz Hinner, Sr Director Analyst, Gartner
Ransomware is a unique threat, and demands a unique incident response plan. Tabletop exercises, or "role playing games for security professionals," are one of the best ways of creating those plans. In this workshop, we will work through a series of live ransomware-specific tabletop exercises, and help you be the dungeon master your organization needs!
Monday, 13 February, 2023 / 11:45 AM - 12:15 PM IST
Joseph Carson, CHIEF SECURITY SCIENTIST & ADVISORY CISO, Delinea
Following the digital footprints of a malicious hacker and uncovering their attack path. This is a journey inside the mind of an ethical hacker's response to a ransomware incident that brought a business to a full stop, discovering the evidence left behind to uncover the attack path and the techniques used. I will cover a real-world ransomware incident response showing the techniques used and why, and the evidence left behind. Joseph Carson, CSS & Advisory CISO at Delinea, will take you through the mind of a hacker and follow the footsteps that led to a damaging Crylock ransomware attack.
Tuesday, 14 February, 2023 / 10:30 AM - 11:00 AM IST
William Candrick, Director Analyst, Gartner
No one can tell you what your metrics should be … until now. Gartner has developed and vetted a prioritized list of metrics to describe the value of your cybersecurity program to satisfy the most challenging audiences including your board, CFO, COO, customers, partners and regulators. And we are working on benchmarks for each.
- What cybersecurity metrics should I measure?
- How can I use metrics to drive governance?
Tuesday, 14 February, 2023 / 11:15 AM - 11:45 AM IST
Craig Adams, Chief of Product and Engineering, RECORDED FUTURE-MA
Threat Landscapes are constantly changing and keeping up with emerging security risks can feel like a daunting task. How do you know if you are covered when new threats are emerging? Join us to learn how organisations can tap on security intelligence to help understand the cyber threat landscape better and also increase organisations’ operational efficiency in threat prevention and risk mitigation- the important missing piece of your architecture if you are without it.
Tuesday, 14 February, 2023 / 12:00 PM - 12:30 PM IST
Ravisha Chugh, Principal Analyst, Gartner
Data breach is now more of a reality than a threat which can expose personal and corporate intellectual property. CIOs, CISOs and general counsel are teaming together to improve readiness for this reality. This session will provide insights to actionable and proactive steps to reduce exposure by establishing knowledge of your data to align with access expectations and life cycle management.
Tuesday, 14 February, 2023 / 02:45 PM - 03:15 PM IST
Prianshu Khandwala, LEAD- INFORMATION SECURITY, UPL Ltd
With data regulations becoming more complex and localised, and companies managing data centres and cloud services on a global scale, how do organisations ensure their strategies for data protection safeguard them from today’s data security threats?
Drawing on their experience, Prianshu Khandwala, Information Security Lead at UPL and Raghunandan Koushik, Regional Director at Fortra, discuss the data protection challenges faced by global organisations, sharing ways to identify threats to data security and highlighting best practices for building a robust data protection framework.
Tuesday, 14 February, 2023 / 03:45 PM - 04:15 PM IST
Wam Voster, VP Analyst, Gartner
From SolarWinds to Kaseya to government bans on specific providers, supply chain security is an area of increased concerns. This session provides an overview of the technology supply chain risk management landscape, and suggested first steps for each category.
Monday, 13 February, 2023 / 12:30 PM - 01:00 PM IST
Eric Ahlm, Sr Director Analyst, Gartner
Security automation isn't a new concept, however, the application of automation to security operations can be a tricky path to decipher. This presentation talks about the practical side of security automation, what sort of uses can lead to big wins, and what sort of uses can lead to massive disappointment.
Tuesday, 14 February, 2023 / 10:30 AM - 11:00 AM IST
Angel Berrios, Sr Director Analyst, Gartner
The MDR market is beginning to get to an initial stage of maturity, but there is still a high level of flux in the types of providers and the coverage of their solutions. During this session, we will offer participants a view into the direction of the market, the alignment with modern ways of working and core questions to ask providers offering these services, about their future.
Tuesday, 14 February, 2023 / 10:30 AM - 11:00 AM IST
Eric Ahlm, Sr Director Analyst, Gartner
Moving from threat prevention to detection and response requires careful planning. Building a modern security operations center (SOC) requires balancing business risk with cost and complexity. This session discusses how to plan, build and operate a modern SOC, including how to best use a service provider, automation and technology platforms such as SIEM.
Tuesday, 14 February, 2023 / 03:45 PM - 04:15 PM IST
Franz Hinner, Sr Director Analyst, Gartner
Extended detection and response, or "XDR," is on every security vendor’s marketing these days. But what is XDR and why do you need it? Is it an architecture or a product, and will it replace stuff you already have? This presentation explains what you need to know about XDR and what you should do about it.
Monday, 13 February, 2023 / 11:45 AM - 12:15 PM IST
Chris Hockings, EXECUTIVE SECURITY SPECIALIST, IBM
In a rapidly-evolving security landscape with new challenges every day, you need a trusted partner that moves with you.
IBM Security is designed for enterprises like yours. An open platform that moves in step with your ever-changing footprint, backed by AI and automation to always keep you one step ahead. From predicting threats to protecting data, working across vendors, or across the world. No matter where your business is headed, we’ll keep you moving forward, every move you make.
Monday, 13 February, 2023 / 03:15 PM - 03:45 PM IST
Dave Lewis, GLOBAL ADVISORY CISO, Cisco Systems
Security debt, is “the accumulation of the patches missed, the risks accepted, and the configurations misapplied,” is a serious and common problem for many organizations. Organisations should look to strategies like the zero-trust model, trust but verify, sanitation of inputs and outputs, and of course, make sure to execute patches instead of pushing it onto the next person. The longer organizations wait to address risks, the harder it is to address them to eliminate debt, organizations should create defined and repeatable processes with plans for action.
At this session, the attendees will get more in-depth information on :
1 The best practices to reduce security risk.
2 Zero trust model for the enterprise to manage user authentication.
3 Managing deprecated systems to reduce the risk to the enterprise thereby building security resilience.
Monday, 13 February, 2023 / 03:15 PM - 03:45 PM IST
Organizations across all sectors are recognizing the value of technology innovation to drive gains and stay ahead. Accelerating your organization’s digital transformation and technology initiatives can however look like a monumental challenge in today’s climate, where change is the only constant. Join this fireside chat, in partnership with Sudip Banerjee, Field CTO to learn how IT leaders can break down roadblocks, to drive a digital first mindset across the organization.
Tuesday, 14 February, 2023 / 11:15 AM - 11:45 AM IST
Anil Bhandari, Chief Mentor, ARCON
An increase in the types of digital identities, coupled with multi-cloud adoption, has added complexity to managing identities and privileges. How does one get future-ready, to address these new-age challenges? An Identity-centric security strategy centers on effective governance with zero trust, that simplifies and unifies critical aspects of Access Management (AM), Identity Governance Administration (IGA) and Privileged Access Management (PAM). Join us to explore the benefits of a Converged Identity security approach that is outcome-driven, and looks to ditch the silos of key IAM components.
Tuesday, 14 February, 2023 / 11:15 AM - 11:45 AM IST
Zero Trust Architecture has emerged as an important topic within the field of cybersecurity. However, implementation of Zero Trust has been challenging for many organisations. The quick fix mentality of considering Zero Trust as a one-stop technology that can be purchased and plugged into an existing environment being the primary reason. In our session, learn about Zoho Corp's journey to Zero Trust and our practical approaches to implement the Zero Trust maturity model. We will also discuss the culture change that is required and how to provide a simplified, secure experience to the end users.
Tuesday, 14 February, 2023 / 11:15 AM - 11:45 AM IST
Kumar Mehta, Founder and Chief Development Officer, Versa Networks Inc
The term Zero Trust in today’s security paradigm is used to define a plethora of security products and technologies. Two of the most popular terms used in relation to this are Zero Trust Architecture and Zero Trust Network Access. Normally, security architects are not aware of the differences between the two and the fact that ZTNA is only a component of the overall Zero Trust Architecture. This session will strive to explain ZTA,ZTNA and their relationship with each other.We will also discuss the evaluation criteria and the criticality of selecting the right ZTNA solution for your requirements
Tuesday, 14 February, 2023 / 02:45 PM - 03:15 PM IST
Prianshu Khandwala, LEAD- INFORMATION SECURITY, UPL Ltd
With data regulations becoming more complex and localised, and companies managing data centres and cloud services on a global scale, how do organisations ensure their strategies for data protection safeguard them from today’s data security threats?
Drawing on their experience, Prianshu Khandwala, Information Security Lead at UPL and Raghunandan Koushik, Regional Director at Fortra, discuss the data protection challenges faced by global organisations, sharing ways to identify threats to data security and highlighting best practices for building a robust data protection framework.
Tuesday, 14 February, 2023 / 02:45 PM - 03:15 PM IST
Today’s enterprises aren’t just looking for a unifying architecture that can bring their fragmented infrastructure and deployments under control. They need a system that makes deploying new technologies and services secure and straightforward. This requires more than workarounds connecting disparate security technologies. Join this session to learn how a broad, integrated, and automated cybersecurity mesh platform can provide centralized management and visibility, supports and interoperates across a vast ecosystem of solutions, and automatically adapts to dynamic changes in the network.
Tuesday, 14 February, 2023 / 04:30 PM - 05:00 PM IST
Thomas Lintemuth, VP Analyst, Gartner
Zero Trust is more than a marketing term once you see through all the marketing. Organizations are building application access with Zero Trust principles. We will discuss five key items you need to know for zero trust to work for your organization.
Tuesday, 14 February, 2023 / 04:30 PM - 05:00 PM IST
Abhyuday Data, Director Analyst, Gartner
Emerging risks and top security trends are driving innovation in security and risk management. Among many new areas in security that are emerging, which ones should you focus on? This session will explore high-impact emerging technologies in security and risk management.