Risk Management

Explore the latest conference topics and stay ahead.

We’ve got your risk management needs covered

While we build the agenda, take a look at the type of research you can expect at Gartner Security & Risk Management Summit 2023.

Get the tools you need to develop, implement and manage the processes and technologies to enable the business to manage risk appropriately.

By 2025, 60% of organizations will use cybersecurity risk as a significant determinant in conducting third-party transactions and business engagements.

Source: Gartner

Get insights into risk management perspective

Watch our session on risk management from a previous virtual conference edition and learn about emerging market trends with respect to integrated risk management.

Ten Cyber and IT Risk Fundamentals You Must Get Right

Security and risk management leaders struggle to mature their cyber and IT risk management practices beyond conducting risk assessments. A set of fundamental risk management processes are essential to manage cyber and IT risk for their organizations.

Opportunities and challenges

Cyber and IT risks are pervasive. The scope can include potential risk events caused by any number of cyber or technology root causes — including threats or technology failures (i.e., cyber and IT risk exposures). These can impact not only the organization and its IT systems but also its customers and suppliers. It is important to understand the scope to:

  • Further tailor the risk management processes to different elements of the scope; for example, approaches to assess risk for traditional on-premises systems managed in-house will differ compared with the use of a cloud service, where it is more reliant on the cloud service provider
  • Tailor the depth and approach to the breadth of the scope; for example, a broad scope in a complex organization will require a significant amount of resourcing or compromises on the quality of the assessment — conversely, a narrow scope may exclude risks that can significantly impact the organization

Cybersecurity, privacy, risk management and more are covered in depth at this year’s conference. Seats are filling fast.

Stay informed with Gartner

Get conference email updates.
Contact Information

All fields are required.

  • Step 2 of 2