Threat and Vulnerability Management

Explore the latest conference topics and stay ahead.

We’ve got your threat and vulnerability management needs covered

While we build the agenda, take a look at the type of research you can expect at Gartner Security & Risk Management Summit 2023.

Understanding widespread security threat trends helps create security issue awareness, but often it is not the best focus for security teams. Security and risk management leaders should confront the threat landscape based on a continuous assessment of threat and business evolutions.

By 2027, 50% of midmarket security buyers will leverage extended detection and response to drive consolidation of workspace security technologies, such as endpoint, cloud and identity.

Source: Gartner

Get insights into threat and vulnerability management perspective

Watch our session on threat and vulnerability management from previous virtual conference edition and learn to build incident response scenarios for insider threats.

3 Initial Steps to Address Unsecure Cyber-Physical Systems

Business-led Internet of Things or converged operational technology/information technology projects have largely underestimated or ignored security and safety risks. Security and risk management leaders must go beyond data security by embracing cyber-physical system security efforts, or they will soon be overwhelmed by new threats.

Opportunities and challenges

  • Prioritize discovery of all cyber-physical systems (CPS) in their environment. They should identify specific CPS security controls already in place, determine what existing IT security controls can address CPS vulnerabilities and document gaps in preparation for an action plan.

  • Anchor security strategy, governance and tactics to the business value that CPS directly support and to vertical industry needs. This industry-centric approach will be the most helpful way to deliver tangible and beneficial results, particularly in critical infrastructure sectors.

  • Focus on one tangible governance and one pragmatic technical challenge at a time initially, and then iterate. Security changes in operational and most critical environments mandate caution, and both technological and cultural changes need to be thoughtful.

Threat and vulnerability management, cybersecurity, privacy, risk management and more are covered in depth at this year’s conference. Seats are filling fast.

Stay informed with Gartner

Get conference email updates.
Contact Information

All fields are required.

  • Step 2 of 2