We’ve got your risk management needs covered

While we build the agenda, take a look at the type of research you can expect at Gartner Security & Risk Management Summit 2023.

Get the tools you need to develop, implement and manage the processes and technologies that enable the business to manage risk appropriately.

By 2025, 60% of organizations will use cybersecurity risk as a significant determinant in conducting third-party transactions and business engagements.

Source: Gartner

The Top 8 Security and Risk Trends We’re Watching

Gartner has identified top 8 security and risk trends that highlight ongoing but not yet widely recognized strategic shifts in the security ecosystem. Each is expected to have broad industry impact and significant potential for disruption.

Ten Cyber and IT Risk Fundamentals You Must Get Right

Security and risk management leaders struggle to mature their cyber and IT risk management practices beyond conducting risk assessments. A set of fundamental risk management processes are essential to manage cyber and IT risk for their organizations.

Opportunities and challenges

Cyber and IT risks are pervasive. The scope can include potential risk events caused by any number of cyber or technology root causes — including threats or technology failures (i.e., cyber and IT risk exposures). These can impact not only the organization and its IT systems but also its customers and suppliers. It is important to understand the scope to:

  • Further tailor the risk management processes to different elements of the scope. For example, approaches to assess risk for traditional on-premises systems managed in-house will differ compared with the use of a cloud service, where it is more reliant on the cloud service provider.
  • Tailor the depth and approach to the breadth of the scope. For example, a broad scope in a complex organization will require a significant amount of resourcing or compromises on the quality of the assessment. Conversely, a narrow scope may exclude risks that can significantly impact the organization.

Cybersecurity, privacy, risk management and more are covered in depth at this year’s conference. Seats are filling fast.

Stay informed with Gartner

Get conference email updates.
Contact Information

All fields are required.

  • Step 2 of 2