Agenda / Track

View By:

Agenda / Track

Monday, 25 July, 2022 / 09:30 AM - 10:15 AM JST

Keynote : The Top Cybersecurity Predictions for 2022-2023

Jie Zhang, VP Analyst, Gartner

Tom Scholtz, Distinguished VP Analyst, Gartner

Every year, Gartner produces impactful predictions across all practices. This presentation will compile the top predictions prepared by our cybersecurity experts for the year 2022-2023. Security and risk management leaders should monitor these trends to be successful in the digital era especially as most recognize that global change could potentially be one crisis away.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 25 July, 2022 / 10:35 AM - 11:05 AM JST

Top Trends in Security and Risk Management

Paul Furtado, VP Analyst, Gartner

The top trends in this presentation represent business, market and technology dynamics that security and risk management leaders cannot afford to ignore. These trends have the potential to transform the security ecosystem and will accelerate their adoption over the next one to three years.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 25 July, 2022 / 01:30 PM - 02:00 PM JST

The Future of Cybersecurity Mesh

Tom Scholtz, Distinguished VP Analyst, Gartner

Come learn the future of cyber warfare and how to realize your Cybersecurity Mesh. This session will focus on how future technologies will play into build your security defense in depth architecture to get ahead of the most advanced attacks. We will look at how AI, Augmented Reality and Block chain can factor into your Cybersecurity Mesh Architecture of the future.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 26 July, 2022 / 09:30 AM - 10:15 AM JST

Keynote: Develop New Fighting Style for Security

Yuichi Isoda, VP Analyst, Gartner

In order to continue to tackle the challenges of security in the face of growing threats and rapid changes in the digital environment, it is necessary to change the old style and develop a new fighting style. This session will cover some of the key challenges for IT and security leaders and provide recommendations.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 26 July, 2022 / 11:25 AM - 11:55 AM JST

8 Signs That You Have Security Conscious Corporate Culture

Tom Scholtz, Distinguished VP Analyst, Gartner

Measuring the effectiveness of a security behaviour and culture change program (SBCP) can be tricky. Sometimes you need to get a sense of things ahead of your formal presentations to the Executive or the Board. Join this session to identify eight observable things that signal your SBCP is on the right path and helping to reduce human-born cyber risks in your organization.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 26 July, 2022 / 03:40 PM - 04:10 PM JST

Security Strategy Planning Best Practices

Tom Scholtz, Distinguished VP Analyst, Gartner

Consistent, practical strategic planning is a prerequisite for security and risk management leaders establishing and supporting the credibility of their security programs. This presentation:
- Introduces a generic security strategy planning process
- Shares the unique best practices associated with security strategy planning
- Provides practical advice on communicating the strategy to stakeholders.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, 27 July, 2022 / 11:25 AM - 11:55 AM JST

What’s Top of Mind for CIOs and CEOs — Impact for SRM Leaders in 2022 and Beyond

Tom Scholtz, Distinguished VP Analyst, Gartner

Gartner’s annual surveys collect data from thousands of CIOs on what matters most to them.
Join this session to learn:
• What’s most important to them
• How they are adapting to the fast-changing environment around them
• Implications for security and risk leaders

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, 27 July, 2022 / 05:15 PM - 05:45 PM JST

Reframe: How to Evolve and Excel Security

Kaoru Yano, Director Analyst, Gartner

Security leaders are always facing new difficulties and challenges. In the serious security risk environment, it becomes more important to reframe security for the security evolution and acceleration. This session will cover key initiatives that we have discussed in this summit.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 25 July, 2022 / 10:35 AM - 11:05 AM JST

What Security Needs to Know and Do About the New AI Attack Surface

John Watts, VP Analyst, Gartner

Detecting and stopping attacks on AI requires new techniques. Malicious attacks against AI lead to different types of organizational harm and loss — financial, reputational or related to intellectual property, sensitive customer data or proprietary data, for example. These attacks need new detection and blocking tools that can stop hackers in their tracks.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 25 July, 2022 / 03:50 PM - 04:20 PM JST

Technology Supply Chain Risk Management — Where Do I Start?

Jie Zhang, VP Analyst, Gartner

From SolarWinds to Kaseya to government bans on specific providers, supply chain security is an area of increased concerns. This session provides an overview of the technology supply chain risk management landscape, and suggested first steps for each category.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 25 July, 2022 / 03:50 PM - 04:20 PM JST

How to Better Prepare and Respond to the Evolving Threat Landscape

John Watts, VP Analyst, Gartner

The threat landscape is continually evolving, as attackers adapt their tactics and strategies to how businesses change. As organizations are transforming how they work, security and risk management leaders should gain baseline knowledge on:
1. The threats we all know, but still hurt us
2. How our changing world influences our threat exposure
3. The "best practices" that might not really be the best

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 25 July, 2022 / 05:30 PM - 06:00 PM JST

DevSecOps: The Future of the SOC Is Automation … Isn’t It?

Andrew Davies, Director Analyst, Gartner

A tour of the core perceptions around automation in the security operations domain, from self-developed capabilities using languages like Python and Java, embedded capabilities is SIEM platforms and case management systems and the likely future of SOAR solutions. During this session, we will explore the common misconceptions, what is realistically achievable and how best to choose the right route to automation.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 25 July, 2022 / 05:30 PM - 06:00 PM JST

Protection From the Risk Within — Managing Insider Risk

Paul Furtado, VP Analyst, Gartner

One of the biggest risks to our security accesses our systems on a daily basis. This presentation will focus on providing guidance on building an effective insider risk program. We will discuss the tools, tactics and techniques to balance the needs of the business with user's privacy. Recommendations will also be made on how to present the program effectively to leadership and end users.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 26 July, 2022 / 11:25 AM - 11:55 AM JST

What Is "XDR" and Why Should I Care

Chris Silva, VP Analyst, Gartner

Extended detection and response, or "XDR," is on every security vendor’s marketing these days. But what is XDR and why do you need it? Is it an architecture or a product, and will it replace stuff you already have? This presentation explains what you need to know about XDR and what you should do about it.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 26 July, 2022 / 11:25 AM - 11:55 AM JST

Sorting Through The Pile: How to Prioritize Your Vulnerability Management Efforts

Andrew Davies, Director Analyst, Gartner

Those responsible for vulnerability management are undoubtedly familiar with "The Pile" — the often-massive reports produced by a vulnerability assessment tool that tells us what we have to fix. Those reports are undoubtedly useful, but often intimidating due to their sheer size. In this session, we'll learn the best practices for sorting through the pile, identifying what's important stuff and getting what matters fixed first.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, 27 July, 2022 / 11:25 AM - 11:55 AM JST

Key Privacy/Security Trends in Data Utilization 2022

Yuichi Isoda, VP Analyst, Gartner

With the full enforcement of Japan's revised Personal Information Protection Law and the rise of new related technologies, it is imperative for companies to evolve their data privacy and security initiatives to a new stage. In this session, we will discuss the key privacy and security trends to keep in mind when utilizing data.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, 27 July, 2022 / 03:35 PM - 04:05 PM JST

Cyber-Physical Systems Security — Top 10 Must-Dos

Jie Zhang, VP Analyst, Gartner

2021 showed that attacks are moving closer to operational or mission-critical environments where cyber-physical systems (CPS) live. Whether they are born of OT/IT convergence or from IoT, IIoT, or Smart "X" efforts, CPS are everywhere and mandate different approaches to security than IT systems.
What are the top 10 must-dos to protect them?

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 25 July, 2022 / 03:00 PM - 03:20 PM JST

Theater: How to Improve Data Literacy and Become a Data-Driven Organization

Hideaki Horiuchi, Managing Vice President, Gartner

Managing data safely and properly is important, at the same time, many companies are trying to use that data to achieve better business results. In this session, we will explain the points you need to understand in order to improve data literacy and establish a data-driven culture in your organization.

Tuesday, 26 July, 2022 / 05:20 PM - 05:50 PM JST

Five Points to Unravel the Complexity of Purchasing Process of a Microsoft 365 License

Ryuichi Tsuchiya, Sr Director Analyst, Gartner

Microsoft security products are often purchased embedded in bundle products like Microsoft 365. Therefore, when purchasing, it is necessary to consider other bundled products' user and the procurement strategy of the bundle product. Consequently it makes purchasing process complicated. This session will focus on Microsoft 365, as a flagship product, and guide five key points that Security leaders should keep in mind when making a purchase.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, 27 July, 2022 / 02:45 PM - 03:05 PM JST

Theater: How to Improve Data Literacy and Become a Data-Driven Organization (Repeat)

Hideaki Horiuchi, Managing Vice President, Gartner

Managing data safely and properly is important, at the same time, many companies are trying to use that data to achieve better business results. In this session, we will explain the points you need to understand in order to improve data literacy and establish a data-driven culture in your organization.

Wednesday, 27 July, 2022 / 03:35 PM - 04:05 PM JST

Beyond 2030: Accelerate Preparations for the New World

Tadaaki Mataga, Distinguished VP Analyst, Gartner

The times are changing drastically toward New World. After 2030, there will be enterprises that can make full use of technology as superpower and enterprises that cannot. The former may be a leader in a new era, and the latter may face a decline and a crisis of survival. In this session, we will discuss how enterprises should respond to the turbulent changes of the times.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 25 July, 2022 / 10:35 AM - 11:05 AM JST

Enterprise Networking in the Age of Secure First

Takeshi Ikeda, VP Analyst, Gartner

Though the internet and public clouds are widespread, the anytime anywhere distributed enterprise is becoming an actual option for both customers and employees anywhere. In this environment, the nature of the network is changing dramatically. In this session, we will discuss some of the key trends in networks that must be secure, brought about by trends such as Zero Trust and SASE.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 25 July, 2022 / 01:30 PM - 02:00 PM JST

Outlook for Cloud Security

Charlie Winckless, Sr Director Analyst, Gartner

Cloud security remains a top priority. This presentation summarizes the problems, recommended processes and new product types to address three key issues: What are the unique risks associated with public cloud service providers, and how can they be controlled? What are the unique security challenges of IaaS and how can they be mitigated? What are the unique control challenges of SaaS and how can they be addressed?

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 25 July, 2022 / 01:30 PM - 02:00 PM JST

Outlook for Endpoint Security 2022

Chris Silva, VP Analyst, Gartner

Endpoint now covers a wide variety of devices, and organisations invest heavily in trying to secure them. So why is it that malware attacks such as ransomware are still so prevalent. We discuss how securing the endpoint needs to go beyond protecting the individual endpoint, to protect the diverse range of endpoints that make up an organisation.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 25 July, 2022 / 03:50 PM - 04:20 PM JST

Outlook for Identity and Access Management 2022

Henrique Teixeira, Sr Director Analyst, Gartner

Identity-first security has emerged as a theme in many major security initiatives and policies. Supporting these initiatives as well as delivering on business requirements for smooth, simple and secure access, and authentication decisions requires disparate IAM elements to work in concert. This session will provide an update on the major themes in IAM to ensure that your IAM decisions in 2022 will support the strategy of the future.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 25 July, 2022 / 05:30 PM - 06:00 PM JST

Windows 11 Trends for Security Leaders

Eri Hariu, Sr Principal Analyst, Gartner

Microsoft's release of Windows 11 has been an unexpected event for many organizations — what does Windows 11 mean for the enterprise? In this session, we provide important trends and recommendations that security professionals need to know about Windows 11, including when to deploy and how security will change with Windows 11.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 25 July, 2022 / 05:30 PM - 06:15 PM JST

Ask the Expert: Q&A on Enterprise Networking in the Age of Secure First

Takeshi Ikeda, VP Analyst, Gartner

Enterprise Networking is changing dramatically with the Secure First approach. The change is shifting from infrastructure construction and operation based on traditional physical configurations to those based on logical configurations. This session will answer questions from the participants on what IT departments should prioritize to respond to these trends.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 26 July, 2022 / 02:45 PM - 03:05 PM JST

Magic Quadrant: Security Service Edge

Charlie Winckless, Sr Director Analyst, Gartner

This session will review the Security Services Edge Magic Quadrant, highlighting the market and it's relevance and the key vendors in the space.

Tuesday, 26 July, 2022 / 03:40 PM - 04:10 PM JST

Insider Threat: User and Data Access Control

Kaoru Yano, Director Analyst, Gartner

Insider threat is one of the serious security risks that come with enterprise digital acceleration. It is more complicated to manage user and data access control. This session will cover new approach for the insider threat.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 26 July, 2022 / 03:40 PM - 04:10 PM JST

Solving the Challenges of Modern Remote Access in the Hybrid World

John Watts, VP Analyst, Gartner

This session will cover best practices to enable users' access to corporate resources, for both times of crisis and under normal circumstances. We will examine why always-on VPN is often the wrong choice while determining what is the right one such as ZTNA, CASB, with the evolution to SASE.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 26 July, 2022 / 05:20 PM - 05:50 PM JST

Enabling Cloud-Native DevSecOps

Charlie Winckless, Sr Director Analyst, Gartner

With cloud-native applications, the lines between infrastructure and applications are increasingly blurry, while with DevOps, development and operations are also increasingly overlapping. Using data from a recent Gartner survey, this session will present recommendations to arrange people, process and technologies to protect application assets without slowing down the CI/CD pipeline.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 26 July, 2022 / 05:20 PM - 05:50 PM JST

The Emerging "Private Sector" of Threat Actors

Chris Silva, VP Analyst, Gartner

The high profile and intractability of ransomware attacks has been a big payday for the organizations behind these attacks. Reporting revenues in the $100s of Millions, todays threat landscape is witnessing a burgeoning "private sector" of threat actors with defense-grade techniques.

Motivated by financial gain, a greater volume and scope of targets means greater "success." Responding requires key investments in endpoint security, backup and recovery, and a mix of services to back up your team before, during and after an attack, something Gartner found only 13% of firms surveyed were able to avoid in 2021.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 26 July, 2022 / 05:20 PM - 06:05 PM JST

Roundtable: How Much (and What) Security Controls Should Be Adopted?

Yuichi Isoda, VP Analyst, Gartner

There are many different types of security controls, including organizational controls and a wide variety of security technologies. The more controls are taken, the more risk mitigated, but the more organizations spend.
In this session, through questions from the participants, we will discuss how much and what security controls should be adopted.
Target audience: User companies and information subsidiaries of user companies.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, 27 July, 2022 / 11:25 AM - 11:55 AM JST

Top Practices for Strengthening Your CIAM Strategy

Henrique Teixeira, Sr Director Analyst, Gartner

What are companies doing for customer identity and access management (CIAM)? What are the primary considerations for a company planning to move from a “build it” to a “buy it” CIAM capability? How can you differentiate yourself from your competitors through a superior CIAM portal that your customers love? What are the main considerations, and how is privacy regulation impacting these decisions? We will discuss best practices around CIAM, what are the main considerations, how to plan for the best user experience to achieve your goals.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, 27 July, 2022 / 11:25 AM - 11:55 AM JST

Developing a Strategy for SASE Adoption to Securely Enable the Anywhere Workforce

John Watts, VP Analyst, Gartner

Enterprises are shifting to hybrid work environments to enable anywhere, anytime access to resources that are located everywhere -- in SaaS, in public cloud IaaS with some workloads in the traditional data center. A SASE strategy enables users, devices and branches zero trust access to resources, regardless of location. This session will lay out a strategic timeframe and roadmap for SASE adoption.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, 27 July, 2022 / 03:35 PM - 04:05 PM JST

Ransomware Is Changing — Are You Ready?

Paul Furtado, VP Analyst, Gartner

Ransomware attacks have been morphing. Techniques used by the bad actors are changing. During this presentation, we will provide insight into the new tactics being used by the bad actors not only to access your environment, but what they are doing with your data once exfiltrated. Finally, we will also provide current data on the financial impact of a ransomware attack.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 25 July, 2022 / 03:20 PM - 04:20 PM JST

CISO Capability and Responsibility for Building a Next-Generation Cybersecurity to Drive Digitalization

Toshio Fujisawa, Sr Managing Partner, Gartner

As the era of "new normal" is becoming more realistic, it is no longer possible for companies to keep a traditional security measure and to evolve to next-generation security measures when creating their future business strategies utilizing new technologies. With actual CISOs participating in this roundtable, it will be articulated that the capabilities and responsibilities of CISOs are required to support business driving digitalization and encourage appropriate executive decisions.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 26 July, 2022 / 02:50 PM - 04:20 PM JST

Workshop: Be Prepared for Ransomware by Optimizing Your Investment Posture Now

Kazunori Kumakura, Executive Partner, Gartner

If you’re ever in a position to consider whether to pay a ransom, you’ve already lost. There are investments you should be making today to ensure you never have to make that decision. Stop fearing ransomware and start fearing your lack of investment to be ready for ransomware. In this workshop, participants will use the Gartner Risk Optimization Model for evaluating investment decisions related to ransomware and develop approaches specific to their organization. The model can be used across a variety of use cases.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 26 July, 2022 / 03:10 PM - 04:10 PM JST

CISO Capability and Responsibility for Building a Next-Generation Cybersecurity to Drive Digitalization (Repeat)

Toshio Fujisawa, Sr Managing Partner, Gartner

As the era of "new normal" is becoming more realistic, it is no longer possible for companies to keep a traditional security measure and to evolve to next-generation security measures when creating their future business strategies utilizing new technologies. With actual CISOs participating in this roundtable, it will be articulated that the capabilities and responsibilities of CISOs are required to support business driving digitalization and encourage appropriate executive decisions.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, 27 July, 2022 / 03:05 PM - 04:05 PM JST

Roundtable: What CISO Need to Know About Cybersecurity Evolution

Kaoru Yano, Director Analyst, Gartner

Masaki Kamizono, Visiting Associate Professor, Graduate School of Information Science, University of Hyogo,

CISO has important role to make a cybersecurity decision quickly and strategically. In this session, we will invite a speaker Masaki Kamizono, University of Hyogo, from our Guest Keynote session to discuss what CISO need to know about cybersecurity evolution.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.