CIOs and their teams need to be able to articulate the value of digital business in the form of concrete metrics. This session will provide a framework for identifying value areas (e.g., revenue, cost reduction, margin improvement) and then continue with a way of establishing metrics to help executives track the progress and manage the risk of the digital business journey.
Constant change in the threat landscape and compliance requirements present daily challenges that can feel overwhelming. Scaling security when facing a fast-paced IT innovation landscape involves choices, often at the expense of building trust and resilience. Three key questions drive strong decision making: What's important, what's dangerous, and what's real? This session presents scenarios to demonstrate that ruthless prioritization in the answers helps us cut through the noise and enables action that changes our outlook from overwhelmed to empowered.
Blockchain has become a much-hyped technology with a lot of potential. Yet, with cyber threats and data breaches, is this technology secure? As Blockchain starts to impact the world, CISOs must understand the security and privacy implications. This session aims to provide a CISO with a framework that will help them identify and manage risks related to Blockchain.
Come join us for a discussion of four recent high-profile breaches. How did they happen? What was the company response? What worked and what didn't? What should we have learned from the breach?
Cloud is not just a synonym for the internet but a whole new way to energize your career. Tired of racking and stacking and patching? Bored with consoles and control panels? Then attend this session. Cloud security upends traditional notions of protecting systems and data. Aspects of cloud security require dabbling in adjacent IT disciplines. Come learn how to develop cloud security skills for yourself and for your organization.
Digital identities for both humans and devices are growing at an exponential rate. What implications does this have on governments and their IAM programs, and how will this impact both government-employee and government-citizen dynamics? How will emerging technologies such as blockchain impact government digital identity? This roundtable kicks off with some common trends in IAM, and focuses on what matters most to governments. Preregistration is required. Seats are limited.
No one can escape the wave of artificial intelligence marketing. The promise of increased security and better automation is appealing to CISOs, but sets the wrong expectations. Being too optimistic about artificial intelligence's impact could hurt the security organization. This session will highlight how artificial intelligence might impact security and risk management, what to expect and how to adapt to the changes.
When it comes to the threat landscape, it can be challenging to predict what's on the horizon. Gartner presents the best predictions on how the threat will change in attacking your enterprise. This session will cover the following areas — the importance of patching, ransomware evolution and state-sponsored attacks.
After ample preparation time in anticipation of the GDPR, Gartner has observed a few misconceptions on privacy as well as a number of key functions for a mature privacy management program. We will address the lessons learned and the necessary capabilities to protect privacy, including the role of security, program ownership, and what the market is, and should be doing.
Threat hunting (TH) is very hot, but very few organizations actually do it. Attend this session to learn the basics of practical hunting and how to start your TH effort. Key issues covered in this session: • What is TH? • How do you incorporate TH into your SOC processes? • How do you develop a basic TH capability? • Where do you get ideas on what to hunt for? • How do you measure TH successes?
Business requirements drive organizations to connect their IT and OT. This alignment between IT and OT requires organizations to rethink their approach to securing the traditionally separate IT and OT worlds. This session will cover best practices on getting security governance right in an aligned IT/OT world, tips on how to deploy common teams and the role of the digital risk officer.
Many enterprises are struggling to attract and retain cybersecurity talent. Join us for this peer-driven discussion on how to manage with a small team. How have you successfully overcome these constraints? How to groom talent for the future? When is a managed service the answer? What makes the most sense to keep in-house? PLEASE NOTE: Preregistration is required. Limited to end-user organizations.
As organizations digitize, new security competencies and roles will be required to manage the balance between the need to run the business and the need to protect the business. This presentation will highlight five critical roles that security and risk leaders have to plan for to manage the risks arising from digital business initiatives undertaken by their organization.
Endpoint and mobility use cases continuously transform business processes and challenge established security best practices. Integrity comes down to personal discretion. We provide IT leaders with a path to introduce agility and tolerance into critical infrastructure. Concerns include technology trends, emerging exploits and the sheer enormity of data protection in an interconnected workplace.
Enterprise firewalls, cloud access security brokers and secure web gateways all form important parts of the enterprise perimeter defense. But the common feature sets of these three approaches overlap substantially. In this session, we will address the points of overlap and help you determine when good enough is in fact enough, and when nothing less than best-of-breed functionality will do.
Discuss with peers and the lead Gartner analyst covering EDR implementation strategies and lessons learned to establish a successful EDRM deployment in your organization. - What are the issues challenging deployments - What are the key deployment strategies leveraged by successful deployments
Application control (or whitelisting) technologies have a well-deserved reputation for being difficult to implement and burdensome to manage. Managing reporting, application onboarding, and the exception handling process all contribute to lowering the value of this approach, but it doesn't have to be that way. In this session, we will explore ways to blunt the administrative impact of application whitelisting in your enterprise.
By 2020, 60% of large enterprises will use a CASB to govern cloud services, up from less than 10% today. There's a good reason for this expected jump in adoption. Cloud access security brokers have become an essential element of any cloud security strategy, helping organizations govern the use of cloud and protect sensitive data in the cloud. Attend this session to help you align CASB vendors to address specific use-case requirements.
Employee monitoring is one of those topics that most IT leaders don’t like to talk about. Blandishments like “we trust our people” and “we have a culture of openness” are common. Yet, as Mark Twain said, “The difference between a man and a dog is that if you feed a dog and take care of it, it will not bite you.” We examine how employee monitoring contributes not only to prevention and detection of internal malfeasance, but can also be used to safeguard employees and ensure safe working environments.
The EPP MQ is one of the most popular documents on Gartner.com, and clients want to understand what the relative placement really means. This year's lead author, Ian McShane, will take you through the analysis process, the assessment criteria and of course the products themselves. Attendees will get updated information and guidance on how best to use this document when evaluating vendors.
Fraud prevention leaders have mastered the art of detecting and preventing fraudulent account activity and payment events in many verticals and use cases, but as customers change the way they interact with each other and their expectations of their service providers, banks, retailers, healthcare teams and governments, the old ways have failed to evolve.
Security operations center plays an important role in improving the threat detection and response capabilities of an organisation. Increasingly, enterprises in the Middle East region are talking about establishing security operations centers. This session discusses the initial steps for an organisation to begin with their SOC journey.
This session will break down the difference between techniques and technologies used to build a detection capability. It will also offer guidance on how to align them with your internal processes, while highlighting the most important things to get right. Attend this session and learn: 1) How to look at your overall requirements and align methodologies to certain types of use cases. 2) How to identify the key elements of your environment. Do you have the data? Where should you focus? 3) Should you use an MSSP? What are the reasons that your business should take its newfound requirements and pass them to an MSSP? How do you understand what is most cost-effective?
Security and risk leaders are grappling with how to secure intellectual property and other digital assets in a rapidly shifting data center. Considering that most networks are still flat, a move to private or public cloud provides opportunity to logically wall off critical assets. This talk examines segmentation decision factors and enumerates best (and worst) segmentation practices.
IGA deployment initiatives are a potential minefield for many organizations that risk costly delays, difficult integration and lower overall value. Gartner has identified common anti-patterns for IGA adoption that range from the planning phase to the actual deployment and integration. Learn how to identify and avoid these common mistakes and plan for a successful IGA deployment by focusing on value, and using Gartner's IGA deployment model.
When building a security operation center, or trying to improve the visibility over threats, an abundance of new technologies overwhelm security leaders with too many options. In this session, attendees can check on the use cases for the most useful security analytics tools. Technologies covered in this session include: SIEM, network traffic analysis, user behavior analytics, endpoint detection and response, intrusion detection, full packet capture and SOAR.
In this roundtable, we will explore the various use cases for employee monitoring and how organisations can benefit from them. We will also discuss how to avoid the common concerns and pitfalls and ensure that employee monitoring services are fit for purpose, appropriate, and deliver value to the enterprise. We will also examine how employee monitoring can be a key facet of an enterprise following Gartner's CARTA model.
Endpoint detection and response solutions are now mainstream, however, most organizations are struggling to formulate approaches to deploying these solutions in their environments. This session will discuss the key deployment strategies employed by organizations with successful deployments and also discuss some of the deployment issues uncovered along the way. • What are the critical existing EDR capabilities? • What are the issues challenging deployments? • What are the key deployment strategies leveraged by successful deployments?
Over the past 18 months, EPP and EDR solutions have been converging. However, not all capabilities are available from the offerings. • What can you expect to see from this convergence in the short term and longer term? • What are the missing pieces that you need to be aware of? • How should you plan your future initiatives in light of this convergence
We can't prevent all threats, but it doesn't mean people working on security monitoring and operations can't start detecting and responding. But how do you do it without breaking the bank? How should you start with detection and response? This workshop will go through a structured approach to find out: 1) What are the basic processes and tools to get right? 2) How do you succeed with a small team? 3) How do you use third parties gracefully and effectively?
From the likes of WannaCry, Petya and others, cyberattacks are more frequently and more significantly disrupting business operations. This workshop presents crisis communication and coordination best practices so that attendees will gain valuable experience in ensuring a strong crisis communications position.
Risk management continues to be an area of growing maturity and investment for most organizations, as the risk landscape becomes increasingly complex and interconnected. As a result, new technology solutions are emerging to increase the collaborative nature of risk management to support data-driven decision making, both within and external to an organization. This session explores how integrated risk management (IRM) will help improve risk management practices.
IoT devices generate a huge amount of data, which may include sensitive personal data. As regulations and awareness of privacy increase, security leaders require a consistent approach with data security and privacy. What are the concerns with IoT security? What are the legal implications of regional privacy laws such as GDPR? What approaches should be considered when embarking on IoT initiatives?
This presentation will discuss the current and future state of organizational resilience across multiple management disciplines including business continuity management, information security and more. Using the five layers of culture, people, process and infrastructure, we will address the role of the chief risk/strategy officer and present a framework for developing a business/organizational resilience program in the organization.
This session discusses the Magic Quadrant of key Network Security technologies: Firewall, Web Application Firewall and Intrusion Prevention System. Enterprises who are in process of refreshing these network security devices or are procuring for a new network set up should attend the session to know about the key vendors in this space.
In line with the trend of Office 365 adoption, a large number of midsize enterprises are considering Microsoft's native security and IAM offerings such as Exchange Online Protection, Advanced Threat Protection, Azure Active Directory, Azure Information Protection and Microsoft Intune. Which of these are you using successfully? What challenges have you encountered? Where have you found the need to supplement or supplant these capabilities with a non-Microsoft product? Join us for a peer-driven discussion to address these and any other questions you may have. Preregistration is required. Seats are limited. Preregistration is required. Seats are limited.
Is your organization in need of a privileged access management (PAM) solution? If so, this session will serve as a good primer on the technology. Key issues covered include: • Introduction to privileged access management. • The PAM maturity model. • An overview of PAM tools and when and how to use them.
The world has seen an increase in security incidents. The use of commercial operating systems in industrial control systems means that OT is now susceptible to the same attacks as in the IT world. What should security and risk management leaders do to develop a coherent strategy to protect not just the organization’s information but also the OT? This presentation will address topics like processes, architecture, and controls.
Security and risk management leaders need to develop security strategies that treat data as a pervasive asset (and liability). New data privacy laws and the continued growth of data breaches are increasing business risks. Data security governance is an emerging risk-based framework that will help plan and orchestrate policies across data security products that are siloed and do not integrate.
This workshop will look at the importance of carrying out a “cross-functional” BIA so that organizational recovery time objectives can be agreed. It will explore methodologies used in the development of a BIA and introduce a typical toolkit for the completion and analysis of critical activities. This will also include the analysis of dependencies to critical activities and associated risks.