We’ve got your cybersecurity needs covered

While we build the agenda, take a look at the type of research you can expect at Gartner Security & Risk Management Summit 2023.

Get the tools you need to craft and implement a security strategy for the digital age, hone your leadership skills and shift how the whole organization approaches security. Join us for a comprehensive update on the latest threats and solutions in cybersecurity.

By 2026, 30% of large organizations will have publicly shared environmental, social and governance goals focused on cybersecurity, up from less than 2% in 2021.

Source: Gartner

8 Ways You Could Be Inviting a Cybersecurity Attack

It’s often systemic and cultural issues between IT and non-IT executives, not technical competency or funding, that leave organizations exposed to cybersecurity attacks. You can reduce the risk of cyberattacks by addressing these eight leading causes of failure within your organization.

Top Strategic Technology Trends for 2022: Cybersecurity Mesh

The cybersecurity mesh architecture (CSMA) approach tries to solve the long-standing challenges of distinct security products working side by side but not really working together. That situation creates a siloed approach with different technologies and skill sets required to operate many different products.

Opportunities and challenges

  • CSMA provides a foundational support layer that enables distinct security services to work together to create a dynamic security environment.
  • CSMA provides a more consistent security posture to support increased agility for the composable enterprise. As organizations invest in new technology to enable digitalization, CSMA provides a flexible and scalable security foundation that provides bolt-on security for assets in hybrid and multicloud environments.
  • CSMA creates a better defensive posture through a collaborative approach between integrated security tools and detective and predictive analytics. The outcome is enhanced responsiveness to breaches and attacks.
  • Cybersecurity technology delivered through this model takes less time to deploy and maintain, while minimizing the potential for security dead ends that cannot support future needs. This frees cybersecurity teams for more value-added activities.

Cybersecurity, privacy, risk management and more are covered in depth at this year’s conference. Seats are filling fast. 

Stay informed with Gartner

Get conference email updates.
Contact Information

All fields are required.

  • Step 2 of 2