Gartner Security & Risk Management Summit

27 – 28 February 2023 | Dubai, UAE

Accelerating the Evolution of Security: Reframe and Simplify

The continuing success of digitization initiatives and ever-expanding digital footprint among the countries of the Middle East brings with it an added and growing exposure to the risk of cyber-attacks. These attacks and increasingly sophisticated criminal rings from around the world can derail the progress of digitization and threaten the benefits delivered through it.

Join Gartner experts and your peers at Gartner Security & Risk Management Summit and gain valuable insights into key strategic imperatives, such as establishing an agile security program; fostering a human-centric, security-conscious culture; devolving risk ownership; and establishing a new simplified cybersecurity mesh architecture. It will enable you to safeguard your organization, defend against your attackers and deliver business value.

Join us to learn how to:

  • Align security and risk management strategies with enterprise objectives
  • Gain the role-specific tools, strategies, and insights  to stay ahead of expanding scopes of responsibility and increasing threats
  • Assure compliance with new regulatory, compliance, privacy, and e-discovery requirements 
  • Learn how to apply the latest techniques to tackle risks in the cloud, OT, IoT, and IT 
  • Re-evaluate your IAM infrastructure to identify opportunities for detecting compromise and immediately investigating and responding
  • Maximize enterprise ROI by using the latest business continuity and enterprise resilience practices 
  • Look beyond traditional security monitoring, detection, and response approaches to managing a broader set of risks.

Learn more about networking opportunities and view the conference brochure.

Leadership and strategy

Advance your leadership skills and learn how to develop a security strategy for agility and resilience in uncertain times.


Unlock the potential of new and emerging technologies, and meet the providers changing the security and risk landscape.

Critical insights

Explore the latest trends in cloud security, privacy, threat management, infrastructure protection, application security, cybersecurity mesh and more.

The Middle East's strategic location as a tricontinental hub makes it an attractive destination for business and for travelers but also for cyberattacks. At the Gartner Security & Risk Management Summit, we look forward to getting together with you to explore the latest insights and recommendations, exchange new ideas and best practices, and help one another and the entire region become more resilient.

Wam Voster

VP Analyst and Conference Chair

CISO Circle

The CISO Circle is an exclusive program within the overall agenda designed for chief information security officers (CISOs) and chief risk officers (CROs), to explore new strategies, share innovative ideas and grow their community of peers.

Want to stay informed?

Get conference email updates.
Contact Information

All fields are required.

  • Step 2 of 2

    Join a global community of CISOs and security and risk executives

    Whether you’re a chief information security officer (CISO) looking to improve your leadership skills, a security professional who needs practical advice to accelerate progress on your next initiative, or a business continuity management leader trying to implement resilience practices across the organization, you’ll find your program, peers and strategic partners at this conference. Explore networking opportunities.

    This conference is designed for:

    Define your strategy for agility and resilience in uncertain times
    • Effectively balance the increasing volume, variety, and speed of security and risk decisions 
    • Successfully communicate security risks, challenges, and opportunities to senior executives
    • Assess and transform security programs to become digital business enablers
    • Prepare for continuous change in the technology and threat landscape
    • Overcome the barriers of organizational culture, resources and talent to grow and scale your digital initiatives
    Develop security programs to respond to emerging threats and advanced attacks
    • Balance real-world risks with business drivers such as speed, agility, flexibility, and performance
    • Develop and maintain effective security governance across the organization
    • Establish key metrics and indicators to measure effectiveness of security programs
    • Anticipate the emergence of advanced attacks that evade traditional security
    Gain critical insights to measure and manage the impact of risk on digital business
    • Measure and manage the impact of risk on business performance.
    • Establish and maintain your organization’s overall IT risk management program.
    • Manage and oversee the monitoring of risk mitigation and coordination of policy and controls.
    • Implement practices that meet defined policies and standards for information risk management.
    • Determine acceptable levels of risk for the company as a whole and for various internal departments and organizations.
    • Benchmark risk management practices of other companies, understand industry best practices and monitor the legal and regulatory environment.
    Select and architect effective security and risk solutions
    • Understand how the characteristics of digital business impact security architecture practices
    • Enable a tighter alignment between security and business
    • Develop security architecture frameworks to address compliance demands and evolving IT
    • Gain insight into the increasingly complex market for security and risk management technologies and services
    Gain critical insights to sustain effective IAM programs to provide the right access to the right people
    • Improve capabilities and implement technologies to establish advanced threat detection and protection.
    • Strengthen privileged access management practices to prevent breaches.
    • Manage the acceleration of multifactor authentication deployments.
    • Meet changing customer needs with consumer IAM.

    Tracks at a Glance

    Access over 50 sessions of the latest Gartner research specifically designed to help security and risk management leaders meet the demands of the future. Each track has a particular area of focus to help you deliver on what matters most to you and your organization. View the conference brochure.

    Track A

    Cybersecurity Leadership

    Faced with a fragmented, interdependent world, cybersecurity leaders have less control over decisions around cyber risk than ever before. This track gives you practical guidance on how to manage security teams, and stakeholders, through the evolving threat landscape.

    Track B

    Infrastructure Security and Operations

    Hybrid work and cloud everything as a service have reframed security around a zero-trust identity and API security. Security teams are understaffed and overwhelmed with the complexity of infrastructure security silos. This track provides insights to the strategic direction of infrastructure security technology and is designed to help you ensure that security operations keeps pace with the evolving threat landscape.

    Track C

    Application and Data Security

    Spanning the cycle from developers to customers, today’s leaders face a wide, diverse array of both risks and ways to manage, mitigate and respond to them. Sessions in this track provide practical, real-world guidance on achieving a more secure software development life cycle and data management program.

    Track D

    Cyber and IT Risk

    Owing to new challenges and lack of agility in program management, cybersecurity leaders struggle to mature their cyber and IT risk management practices beyond conducting assessments. This track highlights the latest trends and tools to help you improve automation and models.

    Spotlight Track

    Technical Insights for Security Practitioners

    Gartner for Technical Professionals research explores insights into the security best practices, methodologies and tools needed to ensure operational success. Sessions provide advice on architecting, implementing and operating security controls for the hybrid enterprise.

    Ready to register?

    Secure your space now.