Gartner Security & Risk Management Summit

6 – 8 October 2021 | Tokyo, Japan

Balance Risk, Trust and Opportunity in an Uncertain World

Security, identity and access management, and risk management executives joined Gartner experts virtually, over four days to share valuable insights on establishing an effective, risk-based cybersecurity program. Attendees gained the information needed to prepare for the new normal. The conference offered the tools needed to create agile security and IT risk management plans to manage the risk inherent in digital business and be better prepared for the next global shock. 

At the conference, the top 5 priorities that security and risk management leaders met on included:

  1. Acceleration of existing trends 
  2. Remote/mobile workforce
  3. Migration to cloud delivered and service led products 
  4. Migration of data center to cloud 
  5. Expansion of digital channels 

We hope you enjoyed the 2020 virtual conference! The program for the 2021 Gartner Security & Risk Management Summit in Japan is underway and we look forward to sharing details shortly.


Lead digital business success by using digital design practices and defy conventional thinking during times of uncertainty to emerge as a winner.


Start with culture change when embarking on digital transformation, instead of waiting to address it later. Learn how to recognize the value of customer, citizen and employee experience in the business value proposition for digital business success.


Create information and technology operating models that are agile, responsive and innovative. Learn how to exploit the combined forces of data, analytics and artificial intelligence to deliver business value in and beyond the enterprise.

Join a global community of CISOs and security and risk executives

Whether you’re a CISO looking to improve your leadership skills, a security professional who needs practical advice to accelerate progress on your next initiative or a business continuity management leader trying to implement resilience practices across the organization, you’ll find your program, peers and strategic partners at this conference:

Create a strategy to drive and manage change
  • Balance the need to innovate while “keeping the lights on."
  • Become an effective partner with business executives; shift from “order taker” to “trusted advisor.”
  • Overcome the barriers of organizational culture, resources and talent to grow and scale your digital initiatives.
  • Drive cost optimization to fund digital transformation initiatives.
Get practical methods and long-term strategies to build a more trusted, resilient environment for digital business
  • Anticipate the emergence of advanced attacks that evade traditional security.
  • Manage the emergence of new risks with digital business, cloud, mobility and the Internet of Things.
  • Monitor the increase in citizen IT and IT activity happening without the intervention of IT.
  • Develop a security program/project that addresses identified risks and business security requirements.
  • Assist staff in understanding and responding to security audit failures, and provide security communication, awareness and training.
Gain critical insights to measure and manage the impact of risk on digital business
  • Measure and manage the impact of risk on business performance.
  • Establish and maintain your organization’s overall IT risk management program.
  • Manage and oversee the monitoring of risk mitigation and coordination of policy and controls.
  • Implement practices that meet defined policies and standards for information risk management.
  • Determine acceptable levels of risk for the company as a whole and for various internal departments and organizations.
  • Benchmark risk management practices of other companies, understand industry best practices, and monitor the legal and regulatory environment.
Learn to implement security technologies efficiently and effectively
  • Define and assess the organization’s security strategy, architecture and practices.
  • Participate in application and infrastructure projects to provide security-planning advice.
  • Draft security procedures and standards to be reviewed by executive management. 
  • Validate security configurations and access to security infrastructure tools, including firewalls, IPSs, web application firewalls and anti-malware/endpoint protection systems.
Gain critical insights to sustain effective IAM programs to provide the right access to the right people
  • Improve capabilities and implement technologies to establish advanced threat detection and protection.
  • Strengthen privileged access management practices to prevent breaches.
  • Manage the acceleration of multifactor authentication deployments.
  • Meet changing customer needs with customer IAM.

2020 Tracks at a Glance

Each track had a particular area of focus to help you deliver on what matters most to you and your organization.

Track A

Management & Leadership

Prioritizing decisions related to unknown risks and known exposures is a constant challenge in the face of changing business priorities and external pressures. Sessions in this program equip security and risk management leaders with strategies and action plans to set expectations with their teams, business, and third parties. These sessions will discuss top security and risk management trends in 2020, leadership vision for actionable change, and ‘practical use’ versus ‘hype’ use cases for risk quantification.

Track B

Digital Risk Management

Digital business requires risk professionals to look beyond existing risk registers. New trends, such as shifting risk assessment to frontline defense, privacy and complex third-party risks, demand new governance models. To tackle these new challenges, risk leaders can leverage new digital technologies such as artificial intelligence (AI) and robotic process automation (RPA). Attend the Digital Risk Management program to discover new ideas and tools to innovate your risk management practices and form action plans.

Track C

Technology & Architecture

Effective security controls consist of a combination of people, processes and technology. The number of security product and service solutions in the market is truly staggering and is complicated by the evolving range of delivery models. This program will provide insights into the security markets, best practices in adopting and using technology solutions, the potential of new and emerging technologies, and how to architect complex solutions based on a variety of delivery models.


CISO Circle

The CISO Circle brings together Japan’s security and risk leaders for incisive discussions on what matters in security now and what changes lie ahead.