2022 day highlights

While we build the 2023 agenda, explore last year's tracks built upon our latest research that addressed the challenges most critical to security and risk management leaders. These key topics kickstarted conversations around priorities and initiatives so that attendees could tackle what was most important to them.

Day 1

Speakers:

  • Brian Lowans, Sr Director Analyst, Gartner
  • Tina Nunno, Distinguished VP Analyst, Gartner
  • Roberta Witty, VP Analyst, Gartner
  • Paul Proctor, Distinguished VP Analyst, Gartner

Sessions:

  • Opening Keynote: Leadership Repositioning for Security Leaders
  • Outlook for Privacy, 2022
  • Leadership Repositioning for Security LeadersSession name
  • Outlook for Organizational Resilience

Day 2

Speakers:

  • Suneel Gupta, Founder of RISE, Author of BACKABLE
  • Sam Olyaei, Director Analyst, Gartner
  • Wam Voster, Sr Director Analyst, Gartner
  • Dr. Mohamed Al-Kuwaiti, Head of Cyber Security, United Arab Emirates Government

Sessions:

  • Guest Keynote: Becoming a Backable Leader
  • Introducing the Gartner OT Security Framework
  • The Top Cybersecurity Predictions for 2022 and Beyond
  • Building Global Cyber Resiliency

A look back at 2022's agenda

View By:

A look back at 2022's agenda

Monday, 14 February, 2022 / 11:00 AM - 11:45 AM GST

Opening Keynote: Leadership Repositioning for Security Leaders

Tina Nunno, Distinguished VP Analyst, Gartner

As a security leader, are you playing defense or offense? Do you as a leader set the terms of engagement, or are they too often set by others? This session will explore how security leaders can ensure they lead from an offensive position, to deliver the best results for themselves and for their enterprises.

Monday, 14 February, 2022 / 12:00 PM - 12:30 PM GST

Tutorial: How to Create a Business-Aligned Cybersecurity Strategy

Jeffrey Wheatman, VP, Advisory, Gartner

Everyone knows how important strategic planning is for success and yet it is an immense challenge for pretty much everyone. Join us to learn about a simple approach to telling a simple story linking security program activities to business goals and drives better decisions.
1. What makes a good strategy?
2. What kind of narratives work?
3. What does a sample strategy look like?

Monday, 14 February, 2022 / 12:00 PM - 12:30 PM GST

Outlook for Organizational Resilience

Roberta Witty, VP Analyst, Gartner

This session highlights the importance of organizational resilience as a strategic imperative in the wake of the COVID-19 pandemic, the changing threat landscape and the pace of digital innovation.

Monday, 14 February, 2022 / 12:00 PM - 12:30 PM GST

Technical Insights: Preparing for the Inevitable: Building Your Ransomware Defense Structure

Jon Amato, Sr Director Analyst, Gartner

Ransomware attacks continue to increase globally and the criminals responsible for those attacks have become increasingly sophisticated in their methods. In this session, we will examine the life cycle of a ransomware attack and discuss the defense techniques your organization should use to protect themselves against this threat.

Monday, 14 February, 2022 / 12:00 PM - 12:30 PM GST

Crossroads: Should You Pay the Ransom?

Sam Olyaei, VP, Team Manager, Gartner

Paul Proctor, Distinguished VP Analyst, Gartner

Join us for a thought provoking conversation as Gartner experts consider, discuss and debate two sides of this provocative question.

Monday, 14 February, 2022 / 12:00 PM - 12:45 PM GST

Ask the Expert: Building Out a DLP Program

Ravisha Chugh, Principal Analyst, Gartner

Data Loss Prevention has a mixed reputation given its resource-intensive technology. However, hopes are still high for DLP, as the visibility it provides can be a force in reshaping policy, processes, and data usage behavior — pushing the enterprise towards a brighter future in compliance and risk reduction. The question is often: How? How do you do it? It’s by building a DLP program. Each part of the process is an ocean. Join this session to ask your questions.

Monday, 14 February, 2022 / 12:45 PM - 01:05 PM GST

BeyondTrust: Building Cybersecurity Immunity to Ransomware with PAM

Ransomware shows no signs of abating. Digital transformation, expanding cloud deployments, and increased remote work are all creating new planes of privileges for ransomware to exploit.
Join to explore ransomware attacks and how you can protect your environment by making it inhospitable to them.
By attending this session you will learn 6 things to know about ransomware; Realistic security practices you can implement to protect against ransomware and The role of PAM (privileged access management) in mitigating the risks of ransomware and other cyber threats with a powerful, blended defense.

Monday, 14 February, 2022 / 12:45 PM - 01:05 PM GST

OneTrust: 5 Trending Cybersecurity Threats — Are Your Third Parties at Risk?

Cyberattacks have become more prevalent than ever, and a key part of understanding and mitigating risk across the organization is pinpointing inherent vulnerabilities in your third-party ecosystem. From ransomware to phishing and internal risk to third party risk, we’re using this session to break down everything you need to know about the top 5 trending cybersecurity threats.

Monday, 14 February, 2022 / 12:45 PM - 01:30 PM GST

Roundtable: AI Email Security — Augmenting the Security Team at Sanabel Al-Salam moderated by Darktrace

Mariana Pereira, Director of Email Security Products, Darktrace

Join Yousef Shaban, IT Director at Sanabel Al-Salam, and Mariana Pereira, Darktrace's Director of Email Security, for an interactive discussion on Monday 14th February, 12:45pm GST. They will cover the evolving email threat landscape, and how AI can reduce the burden for busy teams. We’ll discuss how Sanabel Al-Salam, a major player within the Saudi Arabian food and beverage industry, uses AI to do the heavy lifting – giving back precious time to its security team.

Monday, 14 February, 2022 / 01:30 PM - 02:00 PM GST

How to Achieve Practical SASE Implementations This Year

Lawrence Orans, Managing Vice President, Gartner

Vendors are adopting the term SASE to encompass their cloud security offerings, but not all SASE vendors are equal. Security and risk management leaders can take steps now to adopt the SASE framework and prepare for the future. This session will:
- Clearly define the SASE framework
- Address the strategy for SASE framework adoption
- Provide practical steps to implement SASE frameworks this year

Monday, 14 February, 2022 / 01:30 PM - 02:00 PM GST

Outlook for Cloud Security

Neil MacDonald, Distinguished VP Analyst, Gartner

Information security is frequently cited as a top obstacle to the adoption of cloud computing, yet improved security is cited as a top driver for adoption of cloud computing. This session will explore the current and future state of cloud security spanning infrastructure, platform and software as a service offerings, including hybrid cloud security and emerging distributed cloud and edge computing security issues.

Monday, 14 February, 2022 / 01:30 PM - 02:00 PM GST

Top Lessons Learned From the SolarWinds Attack

Peter Firstbrook, VP Analyst, Gartner

The SolarWinds supply chain attackers utilized the most advanced tool tactics and techniques to achieve their goals. Security and risk management leaders should understand how the attackers were able to evade detection to improve their defenses. This session will explore;
What was different about the SolarWinds attack
What can you do to improve your defensive posture
What is the future of supply chain attacks?

Monday, 14 February, 2022 / 01:30 PM - 02:00 PM GST

Why and How Breach and Attack Simulation Can Help Automate Enterprise's Security Posture Assessment

Jeremy D'Hoinne, VP Analyst, Gartner

Enterprises increasingly face difficult purchase decisions choices and need to prioritize. Breach and attack simulation (BAS) tools promise to safely and automatically test the enterprises' security controls and attack surface. This session will explain :
- how breach and attack simulation work
- what to expect from the technology
- How to evaluate and select providers

Monday, 14 February, 2022 / 01:30 PM - 02:15 PM GST

Case Study Roundtable: Business Centric Approach to Modernizing Cybersecurity

Illyas Kooliyankal, Chief Information Security Officer, Abu Dhabi Islamic Bank

Information Security is always looked at just as a control function within many organizations. But, understanding and positioning it as the key for organization’s success require right approach, robust governance model, innovative thoughts, Agile Execution, Fool Proof technologies, optimized investments and well-defined risk appetite. This case study will offer insights and lessons learned in the journey of modernizing the security program at ADIB to one that empowers the business to innovate with right level of proactive, effective and positive security in place.
Key elements covered include:
• Designing a forward looking transformation program
• Developing the right governance and technology model
• Building the right organization structure and culture
• Enabling business innovation and success

Monday, 14 February, 2022 / 01:30 PM - 02:30 PM GST

Workshop: Building Risk, Value, and Cost Charts for Cybersecurity

Richard Addiscott, Sr Director Analyst, Gartner

Your executives only care about risk, value, and cost. Why would you speak to them about anything else? This workshop will walk through the steps of identifying business processes and outcomes, aligning supporting technology stacks, and creating outcome-driven metrics to put cybersecurity in a business context.

Monday, 14 February, 2022 / 02:15 PM - 02:45 PM GST

Building Incident Response Scenarios for Insider Threats

Jonathan Care, Sr Director Analyst, Gartner

This session will cover different types of insider threat scenarios, and how you should incorporate these scenarios in your incident response plan and processes. We will define insider threat personas, how to begin building scenarios for these personas, and discuss some best practices for success.

Monday, 14 February, 2022 / 02:15 PM - 02:45 PM GST

Five Critical Components of Phishing Prevention, Detection and Response

Mario de Boer, Managing Vice President, Gartner

Phishing is a key technique that is used in most widespread and targeted attacks. The scale and sophistication of phishing have reached levels that cannot be dealt with by a single product. Join this session to see examples of advanced phishing attacks, and the five most critical components of any email security architecture.

Monday, 14 February, 2022 / 02:15 PM - 02:45 PM GST

Outlook for Cyber and IT Risk

Khushbu Pratap, Sr Director Analyst, Gartner

72% Board of Directors would change organizational structure to achieve business model agility during the COVID-19 crisis and its aftermath. CIOs, CISO, IT risk leaders and digital innovation champions are witnessing unforeseen changes that have cascading impacts on managing exposures. This session walks through emerging solutions and adjustments in digital environments.

Monday, 14 February, 2022 / 02:15 PM - 02:45 PM GST

Resetting Executive Engagement, Business Context and How We Invest in Security

Paul Proctor, Distinguished VP Analyst, Gartner

What is the right amount of security? How much should we be spending? How can this all be put in a business context? How do I satisfy the regulators? And how do we create a safer world? Learn about the latest approaches in solving these previously unsolvable problems.

Monday, 14 February, 2022 / 02:15 PM - 03:00 PM GST

Ask the Expert: Privileged Access Management

Abhyuday Data, Sr Principal Analyst, Gartner

This session gives you an opportunity to ask questions about privileged access management (PAM), successful use cases and requirements needed to make your PAM efforts successful. Attendees should come prepared to ask questions.

Monday, 14 February, 2022 / 03:00 PM - 03:20 PM GST

Magic Quadrant and Critical Capabilities for Endpoint Protection Platform

Chris Silva, VP Analyst, Gartner

The pandemic has once again highlighted the importance of a robust endpoint security capability. With the market evolving, merging, and expanding, it is an imperative to use the most appropriate vendor or technology to meet its current and future objectives. This session will help the security and risk management leaders understanding the direction and approaches that the vendors take in the market.

Monday, 14 February, 2022 / 03:00 PM - 03:30 PM GST

What's in Your Software? Defending Against Software Supply Chain Attacks

Dale Gardner, Sr Director Analyst, Gartner

Software supply chain attacks aren't new -- but the increasing impact and involvement of more sophisticated attackers reveal a high-risk attack vector. Eliminating attacks is difficult, but security leaders can undertake a variety of actions to help manage the risk, and prevent their organizations from becoming unwitting pawns in an attack.

Monday, 14 February, 2022 / 03:00 PM - 03:30 PM GST

Technical Insights: Introduction to Cybersecurity Mesh Architecture

Felix Gaehtgens, VP Analyst, Gartner

With many IT assets now outside traditional enterprise perimeters, IT leaders must rethink security. Enter the cybersecurity mesh architecture, a composable and scalable approach to extend security controls to distributed assets by decoupling policy enforcement from the assets being protected.

Monday, 14 February, 2022 / 03:00 PM - 03:30 PM GST

Outlook for Data Security

Joerg Fritsch, Sr Director Analyst, Gartner

This session covers current trends and emerging topics in the area of data security. From databases to cloud applications, threats are rapidly evolving and countermeasures slowly follow. Planning a data-centric roadmap for security governance and security architecture is a critical component of any security and risk management program.

Monday, 14 February, 2022 / 03:00 PM - 03:30 PM GST

ZTNA vs. VPN — The Battle for Remote Access Is On

Thomas Lintemuth, VP Analyst, Gartner

Remote access is a previously "nice to have" service that has become business critical. VPN is the old school technology for remote access, while ZTNA is all the vendors talk about. We will review the strengths and weaknesses of each. You may be surprised which one comes out on top.

Monday, 14 February, 2022 / 03:00 PM - 03:45 PM GST

Case Study Roundtable: Establishing a Remote Access Solution Securely for 5000 Employees in Under 48 Hours

Alex Constantinidis, Chief Information Security Officer for QNB Group,

QNB was faced with the challenges of enabling a workforce of 5000+ employees to be able to access their computer systems remotely at a time of mandatory home quarantine policies and road closures. A remote access blueprint architecture based on BYOD technologies was implemented to allow employees to be operational from home without impeding on their productivity and without increasing cyber security risk. Join this session to understand the security considerations, best practices and lessons learned through this experience.

Monday, 14 February, 2022 / 03:45 PM - 04:05 PM GST

Insights from the Magic Quadrant and Critical Capabilities for Privileged Access Management

Felix Gaehtgens, VP Analyst, Gartner

Through a selection of relevant Gartner insights and complementary methodologies, we will provide insight into latest updates in the privileged access management market.

Monday, 14 February, 2022 / 03:45 PM - 04:15 PM GST

Integrated Risk Management — Emerging Market Trends

Jeffrey Wheatman, VP, Advisory, Gartner

Integrated risk management (IRM) technology is uniquely suited to address the myriad of risks arising from the current crisis and future COVID-19 recovery. IRM technology product leaders will need to develop IRM capabilities that are capable of addressing the IRM market insights outlined in this presentation.

Monday, 14 February, 2022 / 03:45 PM - 04:15 PM GST

Technical Insights: Cloud Security 201: The Art and Science of Cloud Security

Patrick Hevesi, VP Analyst, Gartner

Come learn about the beauty of the cloud while applying the right "science" to securing your multiple cloud services. We will discuss the journey to the cloud and how security tools like CASB, CSPM, CWPP, SMP, SSPM, SASE and CSMA all work together to build a unified cloud security strategy work of art.

Monday, 14 February, 2022 / 03:45 PM - 04:15 PM GST

The State of Network Security in the Work-From-Anywhere Era

John Watts, VP Analyst, Gartner

Last year work-from-home became the new normal. Coupled with the rapid adoption of SaaS applications such as Microsoft’s O365, Salesforce and others, organizations are no longer able to secure end users and devices with inflexible network security architectures. In this session, we will highlight the forces that shape network security today. We will also discuss SASE, the future of network security in the cloud.

Monday, 14 February, 2022 / 03:45 PM - 04:15 PM GST

When Disaster Strikes, Don't Be Caught Unprepared But Have Your Incident Response Ready

Wam Voster, Sr Director Analyst, Gartner

Increasingly, security incidents happen without warning and remain undetected for an extended period. When responding to such an active threat, it is vital that the time between the initial detection and the full mitigation is as short as possible. Security & Risk management Leaders must be prepared for the inevitable by having a proper security incident response process.

Tuesday, 15 February, 2022 / 11:00 AM - 11:45 AM GST

Guest Keynote: Becoming a Backable Leader

Suneel Gupta, Founder of RISE, Author of BACKABLE,

In a world of continuous change, it’s become way too easy to get left behind. During times of uncertainty, why is it that some leaders inspire and move people to action, while others tend to fizzle out? Join guest keynote speaker, Suneel Gupta, to learn the surprising truth about leadership and why some innovators get ahead while others get ignored. Suneel will share memorable stories, science-based insights, and immediately usable techniques to turn your ideas into an inspiring vision that captivates attention and moves the people around you to action.

Tuesday, 15 February, 2022 / 12:00 PM - 12:30 PM GST

Introducing the Gartner OT Security Framework

Wam Voster, Sr Director Analyst, Gartner

Organizations need to ensure their Operational Technology (OT) has a framework of People, Process and Technology to increase or at least maintain their OT security posture. Fully aligning to standards like the IEC62443 is for many smaller organizations not feasible. Security & Risk Management Leaders can use these OT Security controls to address the risks in their OT environment.

Tuesday, 15 February, 2022 / 12:00 PM - 12:30 PM GST

Outlook for Security Monitoring and Operations

Jon Amato, Sr Director Analyst, Gartner

Security operations are rapidly evolving to keep up with threat landscape. Tools leveraged by security professionals include automation, advanced analytics and machine learning. This session will address key issues: (1) What threats and trends are affecting security operations? (2) What defines best-in-class security operations? (3) What is the outlook for security monitoring and operations for the years ahead?

Tuesday, 15 February, 2022 / 12:00 PM - 12:30 PM GST

Technical Insights: How to Use MITRE ATT&CK to Improve Threat Detection Capabilities

Eric Ahlm, Sr Director Analyst, Gartner

Implementing strong security monitoring requires an effective combination of technologies and knowledge of which threats exist, and the techniques being used by attackers to exploit them. Aligning your threat-oriented security monitoring use cases with the MITRE ATT&CK framework is an effective approach to extend your security monitoring coverage.

Tuesday, 15 February, 2022 / 12:00 PM - 12:30 PM GST

The Top Cybersecurity Predictions for 2022 and Beyond

Sam Olyaei, VP, Team Manager, Gartner

Every year, Gartner produces impactful predictions across all practices. This presentation will compile the top predictions prepared by our cybersecurity experts. Security and risk management leaders should monitor these trends to be successful in the digital era especially as most recognize that global change could potentially be one crisis away.

Tuesday, 15 February, 2022 / 12:00 PM - 12:45 PM GST

Ask the Expert: What Is the Secure Access Service Edge and When Should I Adopt It?

Craig Lawson, VP Analyst, Gartner

The Secure Access Service Edge (SASE) is one of the fastest growing areas of interest across Gartner security and networking customers. Converging network and network security services to a primarily cloud-based fabric enables agility and speed in delivering a "branch office of one" experience for users. This session will encourage an interactive discussion of attendees with the analyst on the topic of SASE.

Tuesday, 15 February, 2022 / 12:00 PM - 12:45 PM GST

Case Study Roundtable: Building Global Cyber Resiliency

Dr. Mohamed Al-Kuwaiti, Head of Cyber Security, United Arab Emirates Government

In this session, Dr. Mohamed Al-Kuwaiti - Head of cyber Security, United Arab Emirates Government will share his thoughts on the cybersecurity threat landscape, best practices to be followed in deterring and denying attackers, and the role of the Cybersecurity Council in building synergy and cyber resiliency.

Tuesday, 15 February, 2022 / 12:45 PM - 01:05 PM GST

Darktrace: Minimizing Cyber Disruption Using Self-Learning AI

Most of the current cyber industry relies on the idea that an attack has been seen before. But that’s a flawed approach. Self-Learning AI, that builds an evolving understanding of the business, changes the paradigm of cyber security. New applications of this technology offer autonomous, continuous protection, augmenting human teams and technology ecosystems.

This presentation explores how AI can form a virtuous self-learning, self-healing loop which continuously improves an organization’s security posture.

Tuesday, 15 February, 2022 / 12:45 PM - 01:05 PM GST

Kaspersky: Managed Detection and Response in 2022/Trending Insights, Threat Landscape

As cyberattacks become more sophisticated many organizations feel the need for advanced security services that can deal with this growing complexity in real time, 24/7. This session will present the insights and trends discovered during real-life investigations by the Kaspersky Managed Detection and Response team, incl. severity and nature of reported incidents, MITRE ATT&CK tactics and techniques, observations based on incident statistics and key recommendations. Kaspersky is the highest-rated vendor on the Gartner Peer Insights (MDR) market (as of 10th November, 2021 based on 29 reviews).

Tuesday, 15 February, 2022 / 01:30 PM - 02:00 PM GST

Best Practices in Communicating the Business Value of Cybersecurity

Tom Scholtz, Distinguished VP Analyst, Gartner

There are multiple approaches for communicating the business value of cybersecurity and none of them offer a single "best" way. All are relevant to different contexts. This presentation will discuss the characteristics of common approaches such as RO(S)I, price-performance analysis, outcome-driven approach, etc., and provide guidance on how to select the appropriate approach based on context.

Tuesday, 15 February, 2022 / 01:30 PM - 02:00 PM GST

Outlook for Endpoint and Mobile Security

Patrick Hevesi, VP Analyst, Gartner

Endpoints continue to multiply and connect from anywhere. Security teams have had to scramble and protect both managed and now more unmanaged devices than ever. This session will discuss the trends of attack, new hardware and software security solutions, and how to build a strong defense on the device, in the enterprise and the cloud to protect the endpoints.

Tuesday, 15 February, 2022 / 01:30 PM - 02:00 PM GST

Outlook for Identity and Access Management

Tricia Phillips, Managing Vice President, Gartner

Identity and access management has reached a tipping point with the distribution of workforce and application access. The decentralization of objects and assets demands a flexible and centralized response with a reliance on flexible orchestration, and policy enforcement which supports a low-friction, zero trust approach.

Tuesday, 15 February, 2022 / 01:30 PM - 02:00 PM GST

Outlook for Privacy, 2022

Bart Willemsen, VP Analyst, Gartner

The future of privacy, is now. Amid an unprecedented set of innovations, driven by a global move to maturing privacy and data protection legislation, consumers' demand for active protection of privacy continues. Looking for minimum compliance leads to risk and opportunity oversight. This session deals with upcoming challenges in privacy, the global state of the landscape, and the tools for a mature, value-creating privacy program.

Tuesday, 15 February, 2022 / 01:30 PM - 02:15 PM GST

Ask the Expert: Secure SDLC (DevSecOps)

Ravisha Chugh, Principal Analyst, Gartner

Manjunath Bhat, VP Analyst, Gartner

We hear a lot about DevSecOps and other secure software development lifecycle techniques, but what does this mean for your organization? In this Ask the Expert session, we will answer questions on the Gartner DevSecOps framework for mapping security activities, tools and cultural elements on to your software development program. Get answers to questions on how these techniques work for Waterfall, Agile, DevOps, "Wagile" and many other development styles.

Tuesday, 15 February, 2022 / 01:30 PM - 02:15 PM GST

Case Study Roundtable: Lessons from the Field – Secure Remote Operations and Maintenance for Critical OT Infrastructure.

Tahir Saleem, Sr Specialist - OT Security, Dubai Electric and Water Authority

The pandemic has introduced a paradigm shift that has recalibrated the risk appetite for owners and operators of critical infrastructure as it relates to remote working. As businesses globally overcome the challenges associated with lockdowns and maintaining their bottom line, remote working has provided the much-needed relief. Nonetheless, is it possible for owners or operators of critical national infrastructure to operate and maintain their services remotely? This session discusses the typical security risks faced by power utilities when undertaking essential activities remotely and recommendations for mitigation of the same. Key takeaways:
• Cyber risks associated with introducing remote access to power systems infrastructure.
• Methodology for effective risk mitigation in OT and control systems environments for enabling secure remote access.
• Lessons learned: remote vs in-person – and its influence on safety.

Tuesday, 15 February, 2022 / 02:15 PM - 02:45 PM GST

Secure Your Backup Data Against Ransomware Threats

Michael Hoeck, Sr Director Analyst, Gartner

Ransomware taking aim at backup solutions to prevent recovery could have significant consequences. IT leaders must ensure that best practices are followed to ensure backup copies are protected and ready for recovery in timeframes that meet recovery objectives.

Tuesday, 15 February, 2022 / 02:15 PM - 02:45 PM GST

Stop Treating Security Like Magic and Security People Like Wizards

Michael Kelley, Sr Director Analyst, Gartner

Refocus corporate security initiatives and efforts — from a futile effort to prevent breaches to accepting the inevitability of breaches. We will define how to learn from normal accident theory to build a culture of resilience, capable of reducing or eliminating business impacts from security breaches. This culture is built on characteristics and disciplines which we will define in actionable terms.

Tuesday, 15 February, 2022 / 02:15 PM - 02:45 PM GST

Technical Insights: Plotting Your Path to a SASE Architecture

Richard Bartley, Sr Director Analyst, Gartner

Moving to SASE aims to simplify orchestration of network and security capabilities to help connect users in multiple contextual situations with internal organization applications and cloud services. How do you start with your SASE approach? This session presents some common kickoff points and steps to evolve towards SASE.

Tuesday, 15 February, 2022 / 02:15 PM - 02:45 PM GST

Treat Cybersecurity as a Business Decision

Paul Proctor, Distinguished VP Analyst, Gartner

Many current approaches to cybersecurity are falling short of their promise to deliver including risk appetite statements, quantification and throwing money at the problem. Treating cybersecurity as a business decision puts it in a business context and engages business decision makers to choose how much protection they want, and how much they want to spend.

Tuesday, 15 February, 2022 / 02:15 PM - 03:00 PM GST

Ask the Expert: ZTNA vs VPN - Does It Really Matter?

Shilpi Handa, Sr Principal Analyst, Gartner

Remote access whether for full-time or hybrid work is top of mind for many network and security engineers. Does it matter if one sticks with VPN? Should an organization move to ZTNA? What may be some considerations organizations should consider?

Tuesday, 15 February, 2022 / 02:15 PM - 03:00 PM GST

Ask the Expert: The Roadmap to CISO Effectiveness

Richard Addiscott, Sr Director Analyst, Gartner

In the last few years, CISOs have been thrust into the ranks of the c-suite as cybersecurity rises in priority for organizations. CISOs struggle to understand what success now looks like and what they need to do to attain it. As a consequence, 60% admit they rarely disconnect from work; 22% are available to their company 24/7. To what end? It's time for CISOs to take a step back and start making hard choices about how to pursue their value proposition.

Tuesday, 15 February, 2022 / 03:00 PM - 03:20 PM GST

2022 Market Guide for Security Awareness Computer-Based Training

Richard Addiscott, Sr Director Analyst, Gartner

The security awareness computer-based training market continues to evolve as incumbents strengthen and expand their offerings and as new players continue to join this already contested market. Join this session to know how the market is shifting, how emerging trends are shaping solution offerings, and how to make security awareness capabilities to reduce the insider-threat for your organization.

Tuesday, 15 February, 2022 / 03:00 PM - 03:30 PM GST

Enabling Cloud-Native DevSecOps

Dionisio Zumerle, VP Analyst, Gartner

With cloud native applications, the lines between infrastructure and applications are increasingly blurry, while with DevOps development and operations are also increasingly overlapping. Using data from a recent Gartner survey, this session will present recommendations to arrange people, process and technologies to protect application assets without slowing down the CI/CD pipeline.

Tuesday, 15 February, 2022 / 03:00 PM - 03:30 PM GST

Five Steps to the Best Security Metrics Ever

Jeffrey Wheatman, VP, Advisory, Gartner

SRM leaders struggle with creating effective metrics. They are too technical, or not technical enough. They resonate with practitioners or business leaders but not both. They are comprised of data with no context. Metrics are important and we don’t do them very well.
(1) What makes a good metric?
(2) How can make your metrics useful?
(3) How can you build metrics that support business goals?

Tuesday, 15 February, 2022 / 03:00 PM - 03:30 PM GST

Technical Insights: Practical Attacks on Machine Learning

Mario de Boer, Managing Vice President, Gartner

In this session, we introduce an example machine learning application. We execute real attacks on the example application to illustrate different attack techniques on general ML/AI applications. For each of the attacks, we provide advice for mitigations.

Tuesday, 15 February, 2022 / 03:00 PM - 03:30 PM GST

Vulnerability Management — What Is Working and What Is Not

Mitchell Schneider, Sr Principal Analyst, Gartner

Vulnerability management is still not a standard practice for many organizations, even though it should be a foundational practice of good security hygiene. This can be a bigger issue for resource-challenged organizations. This session will help participants understand what has worked and not worked for their peers, across people, processes and technologies, when implementing a vulnerability management program.

Tuesday, 15 February, 2022 / 03:00 PM - 03:45 PM GST

Case Study Roundtable: Data Privacy – Enterprise Journey to Maturity and Lessons Learnt

Somnath Sarkar, CISO, Mashreq Bank

Amid an unprecedented rise in privacy regulations and consumers' demand for active protection, there is the need to adopt new age and cutting-edge privacy. This session gives an opportunity to discuss and understand with live case study on how to navigate the complex privacy ask and build an enterprise level program and the road to maturity.

Tuesday, 15 February, 2022 / 03:45 PM - 04:15 PM GST

Data Protection in Microsoft 365 Security Deep Dive

Andrew Bales, Principal Analyst, Gartner

Protecting sensitive data in Office365 is crucial for most of the organizations. However, clients are often not sure what data protection capabilities they are getting with their license or by just upgrading to an add-on what advance capabilities they may get. This session will help clients to know more about Office365 data protection capabilities including DLP, data classification, rights management and lot more.

Tuesday, 15 February, 2022 / 03:45 PM - 04:15 PM GST

Leadership Vision for Security and Risk Management 2022

Jay Heiser, VP Analyst, Gartner

The challenges to security and risk management programs range from governmental/political intervention to digital business adoption to the impact of organizational culture of running a business. Security and Risk Management (SRM) leaders must develop a coherent program based on a clear vision and strategy. This presentation will address:
-What are the major trends affecting the security and risk management leader?
-What are the top challenges affecting the security and risk management leader?
-What actions and best practices should the security and risk management leader initiate?

Tuesday, 15 February, 2022 / 03:45 PM - 04:15 PM GST

Technical Insights: Microsoft 365: Office, EMS and Windows 10 - Top Security Features to Implement

Patrick Hevesi, VP Analyst, Gartner

This session will discuss the evolution of Office 365 into Microsoft 365 and the security, identity and compliance features that all organizations must implement. We will discuss 3rd party options as well as the built in native Microsoft features along with strengths and weaknesses of each.

Tuesday, 15 February, 2022 / 03:45 PM - 04:15 PM GST

Managing Machine Identities, Secrets, Keys and Certificates

Erik Wahlstrom, Sr Director Analyst, Gartner

An enterprisewide strategy for managing machine identities and credentials such as keys, secrets and certificates requires the usage of multiple tools. In this session we will provide guidance on how to pick the right type of tool and establish a process that meets modern DevOps as well as security requirements.

Want to stay informed?

Get conference email updates.
Contact Information

All fields are required.

  • Step 2 of 2