Gartner Security & Risk Management Summit

25 – 27 July 2022 | Tokyo, Japan

Enabling Innovation: Secure the Future.
Manage Risk. Build Resiliency.

Security, identity and access management, and risk management executives joined Gartner experts virtually, over three days to share valuable insights on establishing an effective, risk-based cybersecurity program. Attendees gained the information needed to prepare for the new normal. The conference offered the tools needed to create agile security and IT risk management plans to manage the risk inherent in digital business and be better prepared for the next global shock. 

At the conference, the top 5 priorities that security and risk management leaders met on included:

  1. Acceleration of existing trends 
  2. Remote/mobile workforce
  3. Migration to cloud delivered and service led products 
  4. Migration of data center to cloud 
  5. Expansion of digital channels 

We hope you enjoyed the 2021 virtual conference! If you missed it, view the agenda to see what was covered at the conference.

The program for the 2022 Gartner Security & Risk Management Summit is underway and we look forward to sharing details soon!


Lead digital business success by using secure and risk-based digital design practices, and establish your organization as a trusted participant in digital platforms, people, partners, services and things.


Start with culture change when embarking on digital transformation, instead of waiting to address it later. Join us to gain valuable insights on establishing an effective, risk-based cybersecurity program.


Create information and technology operating models that are agile, resilient, responsive and innovative. Enable your organization to understand the risks and seize the benefits of our increasingly changeable, digital world.

Join a global community of CISOs and security and risk leaders

Whether you’re a chief information security officer (CISO) looking to improve your leadership skills, a security professional who needs practical advice to accelerate progress on your next initiative or a business continuity management leader trying to implement resilience practices across the organization, you’ll find your program, peers and strategic partners at this conference:

Create a strategy to drive and manage change
  • Balance the need to innovate while “keeping the lights on.”
  • Become an effective partner with business executives; shift from “order taker” to “trusted advisor.”
  • Overcome the barriers of organizational culture, resources and talent to grow and scale your digital initiatives.
  • Drive cost optimization to fund digital transformation initiatives.
Get practical methods and long-term strategies to build a more trusted, resilient environment for digital business
  • Anticipate the emergence of advanced attacks that evade traditional security.
  • Manage the emergence of new risks with digital business, cloud, mobility and the Internet of Things.
  • Increase in citizen IT and IT activity happening without the intervention of IT.
  • Develop a security program/project that addresses identified risks and business security requirements.
  • Assist staff in understanding and responding to security audit failures, and provide security communication, awareness and training.
Gain critical insights to measure and manage the impact of risk on digital business
  • Measure and manage the impact of risk on business performance.
  • Establish and maintain your organization’s overall IT risk management program.
  • Manage and oversee the monitoring of risk mitigation and coordination of policy and controls.
  • Implement practices that meet defined policies and standards for information risk management.
  • Determine acceptable levels of risk for the company as a whole and for various internal departments and organizations.
  • Benchmark risk management practices of other companies, understand industry best practices, and monitor the legal and regulatory environment.
Learn to implement security technologies efficiently and effectively
  • Define and assess the organization’s security strategy, architecture and practices.
  • Participate in application and infrastructure projects to provide security-planning advice.
  • Draft security procedures and standards to be reviewed by executive management. 
  • Validate security configurations and access to security infrastructure tools, including firewalls, IPSs, web application firewalls and anti-malware/endpoint protection systems.

2021 Tracks at a Glance

Explore last year's tracks built upon our latest research that addressed the challenges most critical to security & risk management leaders.

Track A


Prioritizing decisions related to unknown risks and known exposures is a constant challenge in the face of changing business priorities and external pressures. This track discussed top security and risk management trends in 2021, leadership vision for actionable change, and practical use cases for risk decision making.

Track B

Digital Risk Management

Digital business requires forward-thinking leaders to look beyond existing risk registers and frameworks. New risk assessment models are designed to address the two critical aspects of digital business: speed and scalability. This track offered ideas and tools for you to innovate your risk management practices and optimize the value of risk management investment.

Track C

IT Strategy & Management

Both security and IT strategy should move toward the same direction. It is also a security leader’s responsibility to always catchup and update IT strategy and its trend. In this track, we discussed topics in IT strategy and infrastructure that security leaders need to know.

Track D

Technology & Architecture

This track provided insights into the security markets, best practices in adopting and using technology solutions, the potential of new and emerging technologies, and how to architect complex solutions based on a variety of delivery models.


CISO Circle

The CISO Circle is an exclusive forum — crafted specifically for CISOs and their peers — providing targeted research, workshops and networking opportunities for peer-to-peer interactions.

Did you attend the conference?

Access the Conference Portal to
view your on-demand sessions.