From leadership strategy to real-world tactical insights, the sessions at Gartner Security & Risk Management Summit 2018 addresses the most critical priorities of CISOs and security & risk management professionals in the Middle East.

Agenda / By Topic

Monday, 22 October, 2018 12:15 PM|Monday, 22 October, 2018 01:30 PM
CISO Circle Lunch: Lessons Learned in the Equifax Breach and Other Incidents
John A. Wheeler, Sr Director Analyst, Gartner

Come join us for a discussion of four recent high-profile breaches. How did they happen? What was the company response? What worked and what didn't? What should we have learned from the breach?

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Monday, 22 October, 2018 05:00 PM|Monday, 22 October, 2018 05:45 PM
State of the Threat Landscape in the GCC, 2018
Gorka Sadowski, Sr Director Analyst, Gartner
Rajpreet Kaur, Principal Analyst, Gartner

When it comes to the threat landscape, it can be challenging to predict what's on the horizon. Gartner presents the best predictions on how the threat will change in attacking your enterprise. This session will cover the following areas — the importance of patching, ransomware evolution and state-sponsored attacks.


Tuesday, 23 October, 2018 12:10 PM|Tuesday, 23 October, 2018 12:30 PM
Spire Solutions: Upgrade your ATTACK Model - Hunt for In-Memory Threats
Lyndon Brown, Product Manager, Endgame

Current security programs focus on a few vectors failing to protect against most techniques in the attacker's toolkit. A comprehensive framework, like the MITRE ATTACK matrix, focuses on the breadth and depth of techniques used by attackers to compromise and gain a foothold in the enterprise network.


Tuesday, 23 October, 2018 04:00 PM|Tuesday, 23 October, 2018 05:30 PM
Workshop: Starting a Security Monitoring, Detection and Response Initiative
Mark Nicolett, Managing Vice President, Gartner

We can't prevent all threats, but it doesn't mean people working on security monitoring and operations can't start detecting and responding. But how do you do it without breaking the bank? How should you start with detection and response? This workshop will go through a structured approach to find out: 1) What are the basic processes and tools to get right? 2) How do you succeed with a small team? 3) How do you use third parties gracefully and effectively?

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Monday, 22 October, 2018 03:00 PM|Monday, 22 October, 2018 03:30 PM
Making Application Control Manageable
Jon Amato, Sr Director Analyst, Gartner

Application control (or whitelisting) technologies have a well-deserved reputation for being difficult to implement and burdensome to manage. Managing reporting, application onboarding, and the exception handling process all contribute to lowering the value of this approach, but it doesn't have to be that way. In this session, we will explore ways to blunt the administrative impact of application whitelisting in your enterprise.


Monday, 22 October, 2018 05:00 PM|Monday, 22 October, 2018 05:45 PM
CISO Circle : Five Questions on AI That CISOs Should Answer
Sam Olyaei, Sr Principal Analyst, Gartner

No one can escape the wave of artificial intelligence marketing. The promise of increased security and better automation is appealing to CISOs, but sets the wrong expectations. Being too optimistic about artificial intelligence's impact could hurt the security organization. This session will highlight how artificial intelligence might impact security and risk management, what to expect and how to adapt to the changes.

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Monday, 22 October, 2018 11:00 AM|Monday, 22 October, 2018 11:30 AM
Blockchain, Is This Stuff Secure? How CISOs Can Evaluate the Security Risks of Blockchain
David Mahdi, Sr Director Analyst, Gartner

Blockchain has become a much-hyped technology with a lot of potential. Yet, with cyber threats and data breaches, is this technology secure? As Blockchain starts to impact the world, CISOs must understand the security and privacy implications. This session aims to provide a CISO with a framework that will help them identify and manage risks related to Blockchain.


Monday, 22 October, 2018 04:45 PM|Monday, 22 October, 2018 05:45 PM
Roundtable: How Blockchain and eIDs Will Affect Governments
David Mahdi, Sr Director Analyst, Gartner

Digital identities for both humans and devices are growing at an exponential rate. What implications does this have on governments and their IAM programs, and how will this impact both government-employee and government-citizen dynamics? How will emerging technologies such as blockchain impact government digital identity? This roundtable kicks off with some common trends in IAM, and focuses on what matters most to governments. Preregistration is required. Seats are limited.

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Monday, 22 October, 2018 11:00 AM|Monday, 22 October, 2018 12:30 PM
Workshop: Crisis Communications After a Security Incident
David Gregory, Sr Director Analyst, Gartner

From the likes of WannaCry, Petya and others, cyberattacks are more frequently and more significantly disrupting business operations. This workshop presents crisis communication and coordination best practices so that attendees will gain valuable experience in ensuring a strong crisis communications position.

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Monday, 22 October, 2018 05:00 PM|Monday, 22 October, 2018 05:45 PM
State of Organizational Resilience 2018-2019
David Gregory, Sr Director Analyst, Gartner

This presentation will discuss the current and future state of organizational resilience across multiple management disciplines including business continuity management, information security and more. Using the five layers of culture, people, process and infrastructure, we will address the role of the chief risk/strategy officer and present a framework for developing a business/organizational resilience program in the organization.


Tuesday, 23 October, 2018 02:15 PM|Tuesday, 23 October, 2018 03:45 PM
The Importance of Carrying out a Business Impact Analysis (BIA)
David Gregory, Sr Director Analyst, Gartner

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Monday, 22 October, 2018 11:00 AM|Monday, 22 October, 2018 11:30 AM
Enterprise Firewalls, CASBs and Secure Web Gateways: Untangling the Feature Snarl
Jon Amato, Sr Director Analyst, Gartner

Enterprise firewalls, cloud access security brokers and secure web gateways all form important parts of the enterprise perimeter defense. But the common feature sets of these three approaches overlap substantially. In this session, we will address the points of overlap and help you determine when good enough is in fact enough, and when nothing less than best-of-breed functionality will do.


Monday, 22 October, 2018 12:45 PM|Monday, 22 October, 2018 01:15 PM
IBM: Visualizing & protecting your data: a step by step approach
Sameer Saini, Associate Partner, Security Services, IBM, IBM

Sophisticated cyber attacks are leading to rising investment on security tools. Yet data privacy is a concern and security departments struggle with data protection solutions. Enterprises must work with the teams to visualize data security risk regularly and enable effective solutions.


Monday, 22 October, 2018 03:00 PM|Monday, 22 October, 2018 03:30 PM
How to Develop Cloud Security Skills
Steve Riley, Sr Director Analyst, Gartner

Cloud is not just a synonym for the internet but a whole new way to energize your career. Tired of racking and stacking and patching? Bored with consoles and control panels? Then attend this session. Cloud security upends traditional notions of protecting systems and data. Aspects of cloud security require dabbling in adjacent IT disciplines. Come learn how to develop cloud security skills for yourself and for your organization.


Monday, 22 October, 2018 03:45 PM|Monday, 22 October, 2018 04:15 PM
Attivo: Deception Technology, Luxury Item or Life Line?

Is deception technology only for mature security operations or is it an effective cyber security solution to help companies mature their capabilities? Learn how deploying decoys throughout your environment can build the bridge strengthening all the levels in your security stack.


Monday, 22 October, 2018 04:25 PM|Monday, 22 October, 2018 04:45 PM
Magic Quadrant for Cloud Access Security Brokers
Steve Riley, Sr Director Analyst, Gartner

By 2020, 60% of large enterprises will use a CASB to govern cloud services, up from less than 10% today. There's a good reason for this expected jump in adoption. Cloud access security brokers have become an essential element of any cloud security strategy, helping organizations govern the use of cloud and protect sensitive data in the cloud. Attend this session to help you align CASB vendors to address specific use-case requirements.


Tuesday, 23 October, 2018 10:15 AM|Tuesday, 23 October, 2018 11:15 AM
Roundtable: How Can Midsize Enterprises Leverage Microsoft's Security and IAM Capabilities?
Steve Riley, Sr Director Analyst, Gartner

In line with the trend of Office 365 adoption, a large number of midsize enterprises are considering Microsoft's native security and IAM offerings such as Exchange Online Protection, Advanced Threat Protection, Azure Active Directory, Azure Information Protection and Microsoft Intune. Which of these are you using successfully? What challenges have you encountered? Where have you found the need to supplement or supplant these capabilities with a non-Microsoft product? Join us for a peer-driven discussion to address these and any other questions you may have. Preregistration is required. Seats are limited. Preregistration is required. Seats are limited.

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Tuesday, 23 October, 2018 11:30 AM|Tuesday, 23 October, 2018 12:00 PM
McAfee: Cloud Security – It’s Not Black & White
Nigel Hawthorn, EMEA Marketing Director, McAfee

Cloud security is complex. Some cloud services may be high risk, but even low risk services can be used in a high risk manner. Our security approach needs to understand content, context & user behavior to ensure appropriate policies. Hear about: cloud adoption, security stories & recommendations.


Tuesday, 23 October, 2018 11:30 AM|Tuesday, 23 October, 2018 12:15 PM
Mimecast: Cyber resilience Think Tank Round Table
Werno Gevers, Business Development Manager, Mimecast

As Digital Transformation, Cloud and Security remain the CIO's highest priorities in 2018, it becomes ever more important to develop a Cyber Resilience strategy. In this interactive Think Tank, Mimecast will walk through developing a Cyber Resilience Strategy for e:mail and share a strategy guide.

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Monday, 22 October, 2018 11:00 AM|Monday, 22 October, 2018 12:30 PM
Workshop: Crisis Communications After a Security Incident
David Gregory, Sr Director Analyst, Gartner

From the likes of WannaCry, Petya and others, cyberattacks are more frequently and more significantly disrupting business operations. This workshop presents crisis communication and coordination best practices so that attendees will gain valuable experience in ensuring a strong crisis communications position.

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Monday, 22 October, 2018 05:00 PM|Monday, 22 October, 2018 05:45 PM
State of Organizational Resilience 2018-2019
David Gregory, Sr Director Analyst, Gartner

This presentation will discuss the current and future state of organizational resilience across multiple management disciplines including business continuity management, information security and more. Using the five layers of culture, people, process and infrastructure, we will address the role of the chief risk/strategy officer and present a framework for developing a business/organizational resilience program in the organization.


Monday, 22 October, 2018 12:15 PM|Monday, 22 October, 2018 01:30 PM
CISO Circle Lunch: Lessons Learned in the Equifax Breach and Other Incidents
John A. Wheeler, Sr Director Analyst, Gartner

Come join us for a discussion of four recent high-profile breaches. How did they happen? What was the company response? What worked and what didn't? What should we have learned from the breach?

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Monday, 22 October, 2018 05:00 PM|Monday, 22 October, 2018 05:45 PM
Ask the Analyst: Why You Must Consider Data Privacy When Building Your IoT Initiative
Nader Henein, Sr Director Analyst, Gartner

IoT devices generate a huge amount of data, which may include sensitive personal data. As regulations and awareness of privacy increase, security leaders require a consistent approach with data security and privacy. What are the concerns with IoT security? What are the legal implications of regional privacy laws such as GDPR? What approaches should be considered when embarking on IoT initiatives?

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Tuesday, 23 October, 2018 10:30 AM|Tuesday, 23 October, 2018 11:15 AM
GDPR the Day After: 3 Myths and 6 Key Capabilities Discussed
Nader Henein, Sr Director Analyst, Gartner

After ample preparation time in anticipation of the GDPR, Gartner has observed a few misconceptions on privacy as well as a number of key functions for a mature privacy management program. We will address the lessons learned and the necessary capabilities to protect privacy, including the role of security, program ownership, and what the market is, and should be doing.


Tuesday, 23 October, 2018 12:10 PM|Tuesday, 23 October, 2018 12:30 PM
Spire Solutions: Upgrade your ATTACK Model - Hunt for In-Memory Threats
Lyndon Brown, Product Manager, Endgame

Current security programs focus on a few vectors failing to protect against most techniques in the attacker's toolkit. A comprehensive framework, like the MITRE ATTACK matrix, focuses on the breadth and depth of techniques used by attackers to compromise and gain a foothold in the enterprise network.


Tuesday, 23 October, 2018 01:15 PM|Tuesday, 23 October, 2018 02:00 PM
State of Data Security 2018
David Mahdi, Sr Director Analyst, Gartner

Security and risk management leaders need to develop security strategies that treat data as a pervasive asset (and liability). New data privacy laws and the continued growth of data breaches are increasing business risks. Data security governance is an emerging risk-based framework that will help plan and orchestrate policies across data security products that are siloed and do not integrate.


Tuesday, 23 October, 2018 10:30 AM|Tuesday, 23 October, 2018 11:15 AM
Managing the Insider Threat — Why Employee Monitoring Is No Longer Taboo
Jonathan Care, Sr Director Analyst, Gartner

Employee monitoring is one of those topics that most IT leaders don’t like to talk about. Blandishments like “we trust our people” and “we have a culture of openness” are common. Yet, as Mark Twain said, “The difference between a man and a dog is that if you feed a dog and take care of it, it will not bite you.” We examine how employee monitoring contributes not only to prevention and detection of internal malfeasance, but can also be used to safeguard employees and ensure safe working environments.


Tuesday, 23 October, 2018 01:00 PM|Tuesday, 23 October, 2018 02:00 PM
Roundtable: Inside Employee Monitoring — Use Cases and Benefits
Jonathan Care, Sr Director Analyst, Gartner
Felix Gaehtgens, Sr Director Analyst, Gartner
Nader Henein, Sr Director Analyst, Gartner

In this roundtable, we will explore the various use cases for employee monitoring and how organisations can benefit from them. We will also discuss how to avoid the common concerns and pitfalls and ensure that employee monitoring services are fit for purpose, appropriate, and deliver value to the enterprise. We will also examine how employee monitoring can be a key facet of an enterprise following Gartner's CARTA model.

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Tuesday, 23 October, 2018 04:00 PM|Tuesday, 23 October, 2018 04:45 PM
State of Fraud Prevention and Payment Security
Jonathan Care, Sr Director Analyst, Gartner

Fraud prevention leaders have mastered the art of detecting and preventing fraudulent account activity and payment events in many verticals and use cases, but as customers change the way they interact with each other and their expectations of their service providers, banks, retailers, healthcare teams and governments, the old ways have failed to evolve.


Monday, 22 October, 2018 08:30 AM|Monday, 22 October, 2018 09:00 AM
Tutorial: Digital Business KPIs and Risk: Identifying and Then Measuring Value
John A. Wheeler, Sr Director Analyst, Gartner

CIOs and their teams need to be able to articulate the value of digital business in the form of concrete metrics. This session will provide a framework for identifying value areas (e.g., revenue, cost reduction, margin improvement) and then continue with a way of establishing metrics to help executives track the progress and manage the risk of the digital business journey.


Monday, 22 October, 2018 05:00 PM|Monday, 22 October, 2018 05:45 PM
State of Risk Management 2018
John A. Wheeler, Sr Director Analyst, Gartner

Risk management continues to be an area of growing maturity and investment for most organizations, as the risk landscape becomes increasingly complex and interconnected. As a result, new technology solutions are emerging to increase the collaborative nature of risk management to support data-driven decision making, both within and external to an organization. This session explores how integrated risk management (IRM) will help improve risk management practices.


Tuesday, 23 October, 2018 10:30 AM|Tuesday, 23 October, 2018 11:15 AM
GDPR the Day After: 3 Myths and 6 Key Capabilities Discussed
Nader Henein, Sr Director Analyst, Gartner

After ample preparation time in anticipation of the GDPR, Gartner has observed a few misconceptions on privacy as well as a number of key functions for a mature privacy management program. We will address the lessons learned and the necessary capabilities to protect privacy, including the role of security, program ownership, and what the market is, and should be doing.


Monday, 22 October, 2018 01:00 PM|Monday, 22 October, 2018 01:20 PM
Centrify: Rethink Security with Zero Trust
Kamel Heus, Regional Sales Manager, Centrify

Enterprise security is failing, 2 out of 3 of organisations experienced an average of 5 or more security breaches in the past 2 years. Learn how to adopt a Zero Trust Security model, shifting from 'trust but verify' to assume users inside a network are no more trustworthy than those outside.


Tuesday, 23 October, 2018 10:15 AM|Tuesday, 23 October, 2018 11:15 AM
Roundtable: How Can Midsize Enterprises Leverage Microsoft's Security and IAM Capabilities?
Steve Riley, Sr Director Analyst, Gartner

In line with the trend of Office 365 adoption, a large number of midsize enterprises are considering Microsoft's native security and IAM offerings such as Exchange Online Protection, Advanced Threat Protection, Azure Active Directory, Azure Information Protection and Microsoft Intune. Which of these are you using successfully? What challenges have you encountered? Where have you found the need to supplement or supplant these capabilities with a non-Microsoft product? Join us for a peer-driven discussion to address these and any other questions you may have. Preregistration is required. Seats are limited. Preregistration is required. Seats are limited.

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Tuesday, 23 October, 2018 10:30 AM|Tuesday, 23 October, 2018 11:15 AM
Manage Privileged Access to Reduce Security Risks and Increase Agility
Felix Gaehtgens, Sr Director Analyst, Gartner

Is your organization in need of a privileged access management (PAM) solution? If so, this session will serve as a good primer on the technology.
Key issues covered include:

● Introduction to privileged access management.

● The PAM maturity model.

● An overview of PAM tools and when and how to use them.


Monday, 22 October, 2018 05:00 PM|Monday, 22 October, 2018 05:45 PM
Ask the Analyst: Why You Must Consider Data Privacy When Building Your IoT Initiative
Nader Henein, Sr Director Analyst, Gartner

IoT devices generate a huge amount of data, which may include sensitive personal data. As regulations and awareness of privacy increase, security leaders require a consistent approach with data security and privacy. What are the concerns with IoT security? What are the legal implications of regional privacy laws such as GDPR? What approaches should be considered when embarking on IoT initiatives?

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Tuesday, 23 October, 2018 01:15 PM|Tuesday, 23 October, 2018 02:00 PM
If You Thought Securing Your IT Was Difficult, Try Securing Your OT
Wam Voster, Sr Director Analyst, Gartner

The world has seen an increase in security incidents. The use of commercial operating systems in industrial control systems means that OT is now susceptible to the same attacks as in the IT world. What should security and risk management leaders do to develop a coherent strategy to protect not just the organization’s information but also the OT? This presentation will address topics like processes, architecture, and controls.


Tuesday, 23 October, 2018 04:00 PM|Tuesday, 23 October, 2018 04:45 PM
How to Approach Security in an Aligned IT/OT World
Wam Voster, Sr Director Analyst, Gartner

Business requirements drive organizations to connect their IT and OT. This alignment between IT and OT requires organizations to rethink their approach to securing the traditionally separate IT and OT worlds. This session will cover best practices on getting security governance right in an aligned IT/OT world, tips on how to deploy common teams and the role of the digital risk officer.


Monday, 22 October, 2018 10:25 AM|Monday, 22 October, 2018 10:45 AM
Darktrace: Leveraging AI for Dynamic & Surgical Autonomous Response
Elizabeth de Freitas, Regional Manager, Darktrace

Proposing a new approach to cyber defence, which uses dynamic AI systems that can counter the activity of malicious threats. This new advanced AI technology can autonomously contain and monitor relevant threats, stopping the threat without interrupting normal business and employee activities.


Monday, 22 October, 2018 11:45 AM|Monday, 22 October, 2018 12:15 PM
Spire Solutions: Understanding Global Landscape to Power Up SecOps Practice
Kamran Ahsan, Senior Director Security Services , Etisalat
David Howorth, Vp Emea, Rapid7

David will present the latest findings of the 2018 Rapid7 National Exposure Index research. Find out where the United Arab Emirates ranks in the world in terms of risk exposure in comparison to other countries; and key actionable steps security teams should take and build their own SecOps practice.


Monday, 22 October, 2018 03:00 PM|Monday, 22 October, 2018 03:45 PM
Ask the Analyst: Tips for Selecting the Right Security Analytics Tools for Your SOC
Gorka Sadowski, Sr Director Analyst, Gartner

When building a security operation center, or trying to improve the visibility over threats, an abundance of new technologies overwhelm security leaders with too many options. In this session, attendees can check on the use cases for the most useful security analytics tools. Technologies covered in this session include: SIEM, network traffic analysis, user behavior analytics, endpoint detection and response, intrusion detection, full packet capture and SOAR.

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Tuesday, 23 October, 2018 02:15 PM|Tuesday, 23 October, 2018 02:45 PM
Splunk: How a leading Saudi Bank matured security to better partner with the business
Rasha M Abu Alsaud, SVP - Chief Information Security Officer, NCB

A leading Saudi Bank has a complex IT environment and needed a SIEM that could scale, mature their security program and flex to meet the demands of digitization. Discover what they looked for and how machine data helped the security team innovate and become a trusted partner to the business.


Tuesday, 23 October, 2018 04:00 PM|Tuesday, 23 October, 2018 05:30 PM
Workshop: Starting a Security Monitoring, Detection and Response Initiative
Mark Nicolett, Managing Vice President, Gartner

We can't prevent all threats, but it doesn't mean people working on security monitoring and operations can't start detecting and responding. But how do you do it without breaking the bank? How should you start with detection and response? This workshop will go through a structured approach to find out: 1) What are the basic processes and tools to get right? 2) How do you succeed with a small team? 3) How do you use third parties gracefully and effectively?

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Tuesday, 23 October, 2018 05:00 PM|Tuesday, 23 October, 2018 05:30 PM
Steps to Begin With SOC Journey for an Enterprise in the Middle East
Rajpreet Kaur, Principal Analyst, Gartner

Security operations center plays an important role in improving the threat detection and response capabilities of an organisation. Increasingly, enterprises in the Middle East region are talking about establishing security operations centers. This session discusses the initial steps for an organisation to begin with their SOC journey.


Monday, 22 October, 2018 12:45 PM|Monday, 22 October, 2018 01:15 PM
IBM: Visualizing & protecting your data: a step by step approach
Sameer Saini, Associate Partner, Security Services, IBM, IBM

Sophisticated cyber attacks are leading to rising investment on security tools. Yet data privacy is a concern and security departments struggle with data protection solutions. Enterprises must work with the teams to visualize data security risk regularly and enable effective solutions.


Monday, 22 October, 2018 04:25 PM|Monday, 22 October, 2018 04:45 PM
Magic Quadrant for Cloud Access Security Brokers
Steve Riley, Sr Director Analyst, Gartner

By 2020, 60% of large enterprises will use a CASB to govern cloud services, up from less than 10% today. There's a good reason for this expected jump in adoption. Cloud access security brokers have become an essential element of any cloud security strategy, helping organizations govern the use of cloud and protect sensitive data in the cloud. Attend this session to help you align CASB vendors to address specific use-case requirements.


Monday, 22 October, 2018 03:00 PM|Monday, 22 October, 2018 03:30 PM
How to Develop Cloud Security Skills
Steve Riley, Sr Director Analyst, Gartner

Cloud is not just a synonym for the internet but a whole new way to energize your career. Tired of racking and stacking and patching? Bored with consoles and control panels? Then attend this session. Cloud security upends traditional notions of protecting systems and data. Aspects of cloud security require dabbling in adjacent IT disciplines. Come learn how to develop cloud security skills for yourself and for your organization.


Tuesday, 23 October, 2018 03:00 PM|Tuesday, 23 October, 2018 03:20 PM
The 2018 Magic Quadrant for Endpoint Protection Platforms
Ian McShane, Research Director, Gartner
Eric Ouellet, VP, Analyst, Gartner
Prateek Bhajanka, Principal Analyst, Gartner

The EPP MQ is one of the most popular documents on Gartner.com, and clients want to understand what the relative placement really means. This year's lead author, Ian McShane, will take you through the analysis process, the assessment criteria and of course the products themselves. Attendees will get updated information and guidance on how best to use this document when evaluating vendors.


Tuesday, 23 October, 2018 05:00 PM|Tuesday, 23 October, 2018 05:30 PM
State of Endpoint and Mobile Security, 2018
Jon Amato, Sr Director Analyst, Gartner

Endpoint and mobility use cases continuously transform business processes and challenge established security best practices. Integrity comes down to personal discretion. We provide IT leaders with a path to introduce agility and tolerance into critical infrastructure. Concerns include technology trends, emerging exploits and the sheer enormity of data protection in an interconnected workplace.


Monday, 22 October, 2018 11:00 AM|Monday, 22 October, 2018 11:30 AM
Network Segmentation in the Modern Data Center
Rajpreet Kaur, Principal Analyst, Gartner

Security and risk leaders are grappling with how to secure intellectual property and other digital assets in a rapidly shifting data center. Considering that most networks are still flat, a move to private or public cloud provides opportunity to logically wall off critical assets. This talk examines segmentation decision factors and enumerates best (and worst) segmentation practices.


Monday, 22 October, 2018 12:15 PM|Monday, 22 October, 2018 01:30 PM
CISO Circle Lunch: Lessons Learned in the Equifax Breach and Other Incidents
John A. Wheeler, Sr Director Analyst, Gartner

Come join us for a discussion of four recent high-profile breaches. How did they happen? What was the company response? What worked and what didn't? What should we have learned from the breach?

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Tuesday, 23 October, 2018 10:30 AM|Tuesday, 23 October, 2018 11:15 AM
GDPR the Day After: 3 Myths and 6 Key Capabilities Discussed
Nader Henein, Sr Director Analyst, Gartner

After ample preparation time in anticipation of the GDPR, Gartner has observed a few misconceptions on privacy as well as a number of key functions for a mature privacy management program. We will address the lessons learned and the necessary capabilities to protect privacy, including the role of security, program ownership, and what the market is, and should be doing.


Tuesday, 23 October, 2018 01:15 PM|Tuesday, 23 October, 2018 02:00 PM
State of Data Security 2018
David Mahdi, Sr Director Analyst, Gartner

Security and risk management leaders need to develop security strategies that treat data as a pervasive asset (and liability). New data privacy laws and the continued growth of data breaches are increasing business risks. Data security governance is an emerging risk-based framework that will help plan and orchestrate policies across data security products that are siloed and do not integrate.


Monday, 22 October, 2018 03:00 PM|Monday, 22 October, 2018 03:45 PM
Ask the Analyst: Tips for Selecting the Right Security Analytics Tools for Your SOC
Gorka Sadowski, Sr Director Analyst, Gartner

When building a security operation center, or trying to improve the visibility over threats, an abundance of new technologies overwhelm security leaders with too many options. In this session, attendees can check on the use cases for the most useful security analytics tools. Technologies covered in this session include: SIEM, network traffic analysis, user behavior analytics, endpoint detection and response, intrusion detection, full packet capture and SOAR.

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Monday, 22 October, 2018 05:00 PM|Monday, 22 October, 2018 05:45 PM
CISO Circle : Five Questions on AI That CISOs Should Answer
Sam Olyaei, Sr Principal Analyst, Gartner

No one can escape the wave of artificial intelligence marketing. The promise of increased security and better automation is appealing to CISOs, but sets the wrong expectations. Being too optimistic about artificial intelligence's impact could hurt the security organization. This session will highlight how artificial intelligence might impact security and risk management, what to expect and how to adapt to the changes.

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Tuesday, 23 October, 2018 02:15 PM|Tuesday, 23 October, 2018 02:45 PM
Splunk: How a leading Saudi Bank matured security to better partner with the business
Rasha M Abu Alsaud, SVP - Chief Information Security Officer, NCB

A leading Saudi Bank has a complex IT environment and needed a SIEM that could scale, mature their security program and flex to meet the demands of digitization. Discover what they looked for and how machine data helped the security team innovate and become a trusted partner to the business.


Monday, 22 October, 2018 08:30 AM|Monday, 22 October, 2018 09:00 AM
Tutorial: Digital Business KPIs and Risk: Identifying and Then Measuring Value
John A. Wheeler, Sr Director Analyst, Gartner

CIOs and their teams need to be able to articulate the value of digital business in the form of concrete metrics. This session will provide a framework for identifying value areas (e.g., revenue, cost reduction, margin improvement) and then continue with a way of establishing metrics to help executives track the progress and manage the risk of the digital business journey.


Monday, 22 October, 2018 12:15 PM|Monday, 22 October, 2018 01:30 PM
CISO Circle Lunch: Lessons Learned in the Equifax Breach and Other Incidents
John A. Wheeler, Sr Director Analyst, Gartner

Come join us for a discussion of four recent high-profile breaches. How did they happen? What was the company response? What worked and what didn't? What should we have learned from the breach?

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Monday, 22 October, 2018 04:45 PM|Monday, 22 October, 2018 05:45 PM
Roundtable: How Blockchain and eIDs Will Affect Governments
David Mahdi, Sr Director Analyst, Gartner

Digital identities for both humans and devices are growing at an exponential rate. What implications does this have on governments and their IAM programs, and how will this impact both government-employee and government-citizen dynamics? How will emerging technologies such as blockchain impact government digital identity? This roundtable kicks off with some common trends in IAM, and focuses on what matters most to governments. Preregistration is required. Seats are limited.

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Monday, 22 October, 2018 05:00 PM|Monday, 22 October, 2018 05:45 PM
State of the Threat Landscape in the GCC, 2018
Gorka Sadowski, Sr Director Analyst, Gartner
Rajpreet Kaur, Principal Analyst, Gartner

When it comes to the threat landscape, it can be challenging to predict what's on the horizon. Gartner presents the best predictions on how the threat will change in attacking your enterprise. This session will cover the following areas — the importance of patching, ransomware evolution and state-sponsored attacks.


Monday, 22 October, 2018 05:00 PM|Monday, 22 October, 2018 05:45 PM
CISO Circle : Five Questions on AI That CISOs Should Answer
Sam Olyaei, Sr Principal Analyst, Gartner

No one can escape the wave of artificial intelligence marketing. The promise of increased security and better automation is appealing to CISOs, but sets the wrong expectations. Being too optimistic about artificial intelligence's impact could hurt the security organization. This session will highlight how artificial intelligence might impact security and risk management, what to expect and how to adapt to the changes.

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Tuesday, 23 October, 2018 11:30 AM|Tuesday, 23 October, 2018 12:15 PM
Mimecast: Cyber resilience Think Tank Round Table
Werno Gevers, Business Development Manager, Mimecast

As Digital Transformation, Cloud and Security remain the CIO's highest priorities in 2018, it becomes ever more important to develop a Cyber Resilience strategy. In this interactive Think Tank, Mimecast will walk through developing a Cyber Resilience Strategy for e:mail and share a strategy guide.

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Tuesday, 23 October, 2018 01:15 PM|Tuesday, 23 October, 2018 02:00 PM
How to Hunt for Security Threats
Jon Amato, Sr Director Analyst, Gartner
Sam Olyaei, Sr Principal Analyst, Gartner

Threat hunting (TH) is very hot, but very few organizations actually do it. Attend this session to learn the basics of practical hunting and how to start your TH effort. Key issues covered in this session:
● What is TH?
● How do you incorporate TH into your SOC processes?
● How do you develop a basic TH capability?
● Where do you get ideas on what to hunt for?
● How do you measure TH successes?


Tuesday, 23 October, 2018 02:15 PM|Tuesday, 23 October, 2018 02:45 PM
Mimecast: Enhance your Cyber Security Resilience Strategy
Werno Gevers, Business Development Manager, Mimecast

Organizations are telling us that they are continuing to see Cyber Threats by e:mail growing quarter on quarter. Mimecast will provide an overview of the challenges and help organizations think about how they should build a Cyber Resilience Strategy to reduce this risk.


Tuesday, 23 October, 2018 02:15 PM|Tuesday, 23 October, 2018 03:45 PM
The Importance of Carrying out a Business Impact Analysis (BIA)
David Gregory, Sr Director Analyst, Gartner

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Tuesday, 23 October, 2018 04:00 PM|Tuesday, 23 October, 2018 05:00 PM
Roundtable: Security Talent and Career Development
David Mahdi, Sr Director Analyst, Gartner

Many enterprises are struggling to attract and retain cybersecurity talent. Join us for this peer-driven discussion on how to manage with a small team. How have you successfully overcome these constraints? How to groom talent for the future? When is a managed service the answer? What makes the most sense to keep in-house?
PLEASE NOTE: Preregistration is required. Limited to end-user organizations.

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Monday, 22 October, 2018 03:00 PM|Monday, 22 October, 2018 03:30 PM
How to Develop Cloud Security Skills
Steve Riley, Sr Director Analyst, Gartner

Cloud is not just a synonym for the internet but a whole new way to energize your career. Tired of racking and stacking and patching? Bored with consoles and control panels? Then attend this session. Cloud security upends traditional notions of protecting systems and data. Aspects of cloud security require dabbling in adjacent IT disciplines. Come learn how to develop cloud security skills for yourself and for your organization.


Tuesday, 23 October, 2018 04:00 PM|Tuesday, 23 October, 2018 05:00 PM
Roundtable: Security Talent and Career Development
David Mahdi, Sr Director Analyst, Gartner

Many enterprises are struggling to attract and retain cybersecurity talent. Join us for this peer-driven discussion on how to manage with a small team. How have you successfully overcome these constraints? How to groom talent for the future? When is a managed service the answer? What makes the most sense to keep in-house?
PLEASE NOTE: Preregistration is required. Limited to end-user organizations.

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Tuesday, 23 October, 2018 05:00 PM|Tuesday, 23 October, 2018 05:30 PM
The 5 Security Roles You Must Plan for in the Digital Era
Sam Olyaei, Sr Principal Analyst, Gartner

As organizations digitize, new security competencies and roles will be required to manage the balance between the need to run the business and the need to protect the business. This presentation will highlight five critical roles that security and risk leaders have to plan for to manage the risks arising from digital business initiatives undertaken by their organization.


Monday, 22 October, 2018 05:00 PM|Monday, 22 October, 2018 05:45 PM
State of the Threat Landscape in the GCC, 2018
Gorka Sadowski, Sr Director Analyst, Gartner
Rajpreet Kaur, Principal Analyst, Gartner

When it comes to the threat landscape, it can be challenging to predict what's on the horizon. Gartner presents the best predictions on how the threat will change in attacking your enterprise. This session will cover the following areas — the importance of patching, ransomware evolution and state-sponsored attacks.


Monday, 22 October, 2018 11:45 AM|Monday, 22 October, 2018 12:15 PM
Spire Solutions: Understanding Global Landscape to Power Up SecOps Practice
Kamran Ahsan, Senior Director Security Services , Etisalat
David Howorth, Vp Emea, Rapid7

David will present the latest findings of the 2018 Rapid7 National Exposure Index research. Find out where the United Arab Emirates ranks in the world in terms of risk exposure in comparison to other countries; and key actionable steps security teams should take and build their own SecOps practice.


Tuesday, 23 October, 2018 04:00 PM|Tuesday, 23 October, 2018 05:30 PM
Workshop: Starting a Security Monitoring, Detection and Response Initiative
Mark Nicolett, Managing Vice President, Gartner

We can't prevent all threats, but it doesn't mean people working on security monitoring and operations can't start detecting and responding. But how do you do it without breaking the bank? How should you start with detection and response? This workshop will go through a structured approach to find out: 1) What are the basic processes and tools to get right? 2) How do you succeed with a small team? 3) How do you use third parties gracefully and effectively?

Please Note: based on availability and eligibility you may sign-up for this session via Events Navigator after you register for this event.

Start planning your agenda now.