We’ve got your threat and vulnerability management needs covered

While we build the agenda, take a look at the type of research you can expect at Gartner Security & Risk Management Summit 2023.

Understanding widespread security threat trends helps create security issue awareness, but often it is not the best focus for security teams. Security and risk management leaders should confront the threat landscape based on a continuous assessment of threat and business evolutions.

By 2027, 50% of midmarket security buyers will leverage extended detection and response to drive consolidation of workspace security technologies, such as endpoint, cloud and identity.

Source: Gartner

How to Set Practical Time Frames to Remedy Security Vulnerabilities

It might be possible to patch every Windows system at a large global bank within three days, but the business disruption required would probably be unacceptable. Security and risk leaders should tie vulnerability management practices to their organization’s specific needs and not to a mythical standard.

3 Initial Steps to Address Unsecure Cyber-Physical Systems

Business-led Internet of Things or converged operational technology/information technology projects have largely underestimated or ignored security and safety risks. Security and risk management leaders must go beyond data security by embracing cyber-physical system security efforts, or they will soon be overwhelmed by new threats.

Opportunities and challenges

  • Prioritize discovery of all cyber-physical systems (CPS) in their environment. They should identify specific CPS security controls already in place, determine what existing IT security controls can address CPS vulnerabilities and document gaps in preparation for an action plan.

  • Anchor security strategy, governance and tactics to the business value that CPS directly support and to vertical industry needs. This industry-centric approach will be the most helpful way to deliver tangible and beneficial results, particularly in critical infrastructure sectors.

  • Focus on one tangible governance and one pragmatic technical challenge at a time initially, and then iterate. Security changes in operational and most critical environments mandate caution, and both technological and cultural changes need to be thoughtful.

Threat and vulnerability management, cybersecurity, privacy, risk management and more are covered in depth at this year’s conference. Seats are filling fast.

Stay informed with Gartner

Get conference email updates.
Contact Information

All fields are required.

  • Step 2 of 2