Accelerate learning and build a shared vision by attending as a group

Organizations are becoming more agile and composable. Security and risk management leaders must improve resilience, better support business objectives and elevate the organizational standing. It is imperative for you as chief information security officer, security executive, risk management leader, security architect or data security manager to accelerate progress on your initiatives and optimize the value of risk management investment.

There is no better environment for stakeholders to align, learn and network

Divide and conquer

Split up to attend more sessions designed for every member of your team.

Evaluate vendors and solution providers

Compare solutions for all stakeholders across your business.

Meet as a team with experts

Discuss your challenges and validate your strategies. 

Buy more, save more

Group Rate Discount

Save on registration when you attend the conference with your colleagues. Receive complimentary ticket(s) when you register as a team.*

  • 1 for 3 paid registrations
  • 2 for 5 paid registrations
  • 3 for 7 paid registrations
  • 4 for 10 paid registrations

For more information, email GlobalConferences@gartner.com or contact your Gartner representative. 

Tips for attending a conference as a team

Align your vision as you forge strong relationships and a deeper, shared understanding with your colleagues and peers to help drive your strategies forward.

  • Have a team-planning call to set key objectives.
  • Decide a strategy for how to divide and conquer the agenda (which sessions you attend collectively could be as important).
  • Agree on how you will share key learning.
  • Create a document repository for notes, slides, etc., on Google Drive or other file-sharing platform.
  • Add colleagues to your expert one-on-ones.
  • Connect together each morning for breakfast, prepare for the day and share the highlights from the previous day.
  • Create a Microsoft Teams/Slack/Google Hangout channel to stay in touch during the conference.
  • Make a plan to catch up for lunch or network during breaks.
  • Make the most of the conference, ensuring that all team members take the time to speak to exhibitors and get some key take-aways to bring back to the group.
  • Set up a meeting to review key take-aways and create an action plan for how you will apply what you have learned. What are you going to start doing/stop doing/do differently as a result of what you have learned?
  • Connect on LinkedIn with any peers you met during the conference.
  • Schedule a follow-up meeting with any exhibitors that piqued your interest.

Suggested sessions by role

  • Security Strategy Planning Best Practices
  • What’s Top of Mind for CIOs and CEOs: Impact for SRM Leaders in 2022 and Beyond
  • The Top 10 Cybersecurity Value Metrics Every Organization Should Use
  • The Key Drivers for CISO Effectiveness
  • The Top Cybersecurity Predictions for 2022-2023
  • The Key Drivers for CISO Effectiveness
  • Roundtable: Are Today’s Security Awareness Capabilities Sufficient?
  • Roundtable: How to Effectively Manage the Cyber Risks of the Cloud? 

View Full Agenda

  • How to Better Prepare and Respond to the Evolving Threat Landscape
  • Protection From the Risk Within: Managing Insider Risk
  • Developing a Strategy for SASE Adoption to Securely Enable the Anywhere Workforce
  • Security Strategy Planning Best Practices
  • How SASE, XDR and Security Vendor Consolidation Are Shaping Your Security Strategy
  • Outlook for Cloud Security
  • Outlook for Endpoint Security

View Full Agenda

  • How to Brief the Board on Cloud Risks
  • Workshop: The Gamification of Threat Modeling
  • Why You Need a Data Security Steering Committee
  • Outlook for Cloud Security
  • Sorting Through the Pile: How to Prioritize Your  Vulnerability Management Efforts
  • Threat Hunting Starter Kit: The Tools and People Required  to Start Hunting on Your Own
  • Cyber-Physical Systems Security: Top 10 Must-Do’s
  • Ask the Expert: How to Mitigate Software Supply Chain Security Risks

View Full Agenda

  • How to Secure Your Data Using Data Security Platforms?
  • What Is “XDR” and Why Should I Care?
  • Outlook for Endpoint Security
  • Solving the Challenges of Modern Remote Access in the Hybrid World
  • Expert Guide to Network Security, Now and Into the Future
  • Developing a Strategy for SASE Adoption to Securely Enable the Anywhere Workforce
  • Outlook for Data Security 2023
  • Minimize Risk by Better Knowing and Managing Your Data
  • Ask the Expert: Microsoft 365 Security Best Practices
  • Ask the Expert: Is Data Loss Prevention Still Worth the Price of Protection?

View Full Agenda

  • Outlook for Security Operations
  • The Future of MDR, Where Next?
  • Technical Insights: Cybersecurity Mesh Architecture —  The Next Generation of Security Architecture
  • Technical Insights: Five Steps to Start the Zero-Trust Journey
  • Technical Insights: Plotting Your Course to Ransomware Defense
  • Technical Insights: Adversary-Generated Threat Intelligence

View Full Agenda

Ready to bring your team?

Start by reserving your space now.