Agenda / Track

View By:

Agenda / Track

Monday, 12 September, 2022 / 09:30 AM - 10:15 AM BST

Gartner Opening Keynote: The Top Cybersecurity Predictions for 2022-2023

Nader Henein, VP Analyst, Gartner

Katell Thielemann, VP Analyst, Gartner

Every year, Gartner produces impactful predictions across all practices. This presentation will compile the top predictions prepared by our cybersecurity experts for the year 2022-2023. Security and risk management leaders should monitor these trends to be successful in the digital era especially as most recognize that global change could potentially be one crisis away.

Monday, 12 September, 2022 / 11:00 AM - 11:30 AM BST

Treat Cybersecurity as a Business Investment

Paul Proctor, Distinguished VP Analyst, Gartner

Measuring and reporting cybersecurity value delivery and establishing a standard of care accrues many benefits and shifts the landscape in cybersecurity investment and board governance. In this keynote, Distinguished Gartner analyst, Paul Proctor, will share how this new standard will incentivize appropriate investments and execution leading to improved protection levels globally. As a special guest, Equifax Board Member John McKinely will join Paul to discuss cybersecurity board communication.

Monday, 12 September, 2022 / 12:30 PM - 01:00 PM BST

Share the Load: How to Turn Your Business Partners Into Advocates

Christopher Mixter, VP, Research, Gartner

With the rise of agility and distributed decision making within global business —security leaders find it hard to influence decisions being made, everywhere, all of the time. This session will demonstrate how top performing security teams teach their business partners how to make decisions in a risk-informed manner, and turn them into security advocates.

Monday, 12 September, 2022 / 02:30 PM - 03:00 PM BST

Security Strategy Planning Best Practices

Tom Scholtz, Distinguished VP Analyst, Gartner

Consistent, practical strategic planning is a prerequisite for security and risk management leaders establishing and supporting the credibility of their security programs. This presentation:
- Introduces a generic security strategy planning process
- Shares the unique best practices associated with security strategy planning
- Provides practical advice on communicating the strategy to stakeholders.

Monday, 12 September, 2022 / 02:30 PM - 04:00 PM BST

Workshop: Developing a Ransomware Playbook

Paul Furtado, VP Analyst, Gartner

Ransomware unlike other security events, puts your organization on a countdown timer. Delays in decision making and response can significantly increase the risk to the business. In addition to your incident-response plan, a specific ransomware playbook is needed. In this workshop we will provide you the tools and techniques needed to create a playbook specific to your organization.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 12 September, 2022 / 04:15 PM - 04:45 PM BST

Leadership Vision for Security and Risk Management 2022

Sam Olyaei, VP, Team Manager, Gartner

The challenges to security and risk management programs range from government/political intervention to digital business adoption to the impact of organizational culture of running a business. Security and risk management (SRM) leaders must develop a coherent program based on a clear vision and strategy. This presentation will address:
-What are the major trends affecting the security and risk management leader?
-What are the top challenges affecting the security and risk management leader?
-What actions and best practices should the security and risk management leader initiate?

Monday, 12 September, 2022 / 04:15 PM - 05:00 PM BST

Roundtable: How Are You Organizing For Resilience?

Roberta Witty, VP Analyst, Gartner

This roundtable provides an opportunity for organizations to share how they are defining and managing "resilience" in their organizations.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 12 September, 2022 / 05:00 PM - 05:30 PM BST

The Key Drivers for CISO Effectiveness

Christopher Mixter, VP, Research, Gartner

Security and risk management leaders are often treated as scapegoats in cases of breach. By the same token, digital business has propelled security and risk to become a boardroom issue, business units have increased their expectations (and demand) of their leadership, and regulatory demands are often challenging. This session will shed light on the leadership traits that aide in a successful and balanced approach between the demands of the business and the effectiveness of the leader.

Monday, 12 September, 2022 / 05:00 PM - 05:30 PM BST

Develop an Actionable Workforce Strategy for Cybersecurity

Arthur Sivanathan, Director, Advisory, Gartner

Ever felt you're playing catch up replacing and upskilling staff? Instead of reactive talent planning, effective CISOs create forward-looking workforce plans aligned to strategic priorities. Join us to learn how to create a workforce strategy covering recruitment, development, retention and redeployment to meet long-term goals.

Tuesday, 13 September, 2022 / 09:00 AM - 09:45 AM BST

Gartner Opening Keynote: How to Get People to Care About Security and Risk

Mary Mesaglio, Managing Vice President, Gartner

It might not always feel this way, but being a CISO is a little like being a Hollywood celebrity. In fact, CISOs have a compelling story to tell about why people, from executives to frontline employees, should care about risk and security. This session delves into how to tell a great cyber story, including why it’s hard and why it matters right now.

Tuesday, 13 September, 2022 / 10:30 AM - 11:00 AM BST

How to Better Prepare and Respond to the Evolving Threat Landscape

Jeremy D'Hoinne, VP Analyst, Gartner

The threat landscape is continually evolving, as attackers adapt their tactics and strategies to how businesses change. As organizations are transforming how they work, security and risk management leaders should gain baseline knowledge on:
1. The threats we all know, but still hurt us
2. How our changing world influences our threat exposure
3. The "best practices" that might not really be the best

Tuesday, 13 September, 2022 / 10:30 AM - 11:15 AM BST

Ask the Expert: All Things Considered on Cybersecurity in China

Jie Zhang, VP Analyst, Gartner

China not only presents a great business growth opportunity, it has also evolved into a key player in global supply chain. Security and risk leaders must embrace the uniqueness of the local market conditions especially relevant legal and regulatory changes. This session will be hosted by multiple China based security and risk analysts.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 13 September, 2022 / 12:00 PM - 12:30 PM BST

Outlook for Organizational Resilience, 2022

Roberta Witty, VP Analyst, Gartner

This session highlights the importance of organizational resilience as a strategic imperative in the wake of the COVID-19 pandemic, the changing threat landscape and the pace of digital innovation.

Tuesday, 13 September, 2022 / 12:00 PM - 12:45 PM BST

Roundtable: How to Recruit, Retain and Develop Diverse IT Security Talent

Debra Logan, Distinguished VP Analyst, Gartner

Organizations are rapidly realizing the benefits of a diverse workforce. Despite their best efforts to attract a range of talent, many CISOs and other IT security leaders are concerned that they are failing to meet even their basic staffing goals. Why? In this roundtable session, you will have an opportunity to discuss the best practices that will attract the right candidates.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 13 September, 2022 / 02:00 PM - 02:30 PM BST

Outlook for Identity and Access Management 2022

Felix Gaehtgens, VP Analyst, Gartner

Identity-first security has emerged as a theme in many major security initiatives and policies. Supporting these initiatives as well as delivering on business requirements for smooth, simple and secure access, and authentication decisions requires disparate IAM elements to work in concert. This session will provide an update on the major themes in IAM to ensure that your IAM decisions in 2022 will support the strategy of the future.

Tuesday, 13 September, 2022 / 02:00 PM - 02:30 PM BST

Security Metrics From End-to-End, Operational Excellence to Business-Outcome-Driven

Michael Kranawetter, Sr Director Analyst, Gartner

Security measurements are so multilayered, but discussions are often one-sided. You only need this, you only need that. In fact, different target groups need different metrics and in the end everything is connected, but how? This lecture solves that with examples.

Tuesday, 13 September, 2022 / 02:00 PM - 02:30 PM BST

The Outlook for Human Factors in Security

Tom Scholtz, Distinguished VP Analyst, Gartner

We like to lament that "the users are the weakest link in the cybersecurity chain!" which means that as security and risk management leaders, you must understand the critical impact of the user community on your programs. From basic anti-phishing simulation through more proven communications techniques to sophisticated approaches based on the social science, this presentation provides insight into the latest best practices in the human aspects of security.

Tuesday, 13 September, 2022 / 03:30 PM - 04:00 PM BST

Three Neuroscientific Ideas to Supercharge Your Diversity, Equity and Inclusion Programs

Debra Logan, Distinguished VP Analyst, Gartner

More and more enterprises are creating diversity, equity and inclusion programs in response to talent shortages, investor pressure, brand enhancement and societal trends. Security professionals must be involved to set DEI goals, pick effective interventions. This session will give leaders the grounding they need to understand how DEI really works and help achieve data-driven diversity, equity and inclusion.

Tuesday, 13 September, 2022 / 03:30 PM - 04:00 PM BST

Is Security Awareness Dead? A Panel Discussion.

Tom Scholtz, Distinguished VP Analyst, Gartner

Mary Mesaglio, Managing Vice President, Gartner

As per Gartner research, 44% of employees have regularly engaged in insecure behaviors in the past year. Security teams must successfully engage to create sustainable change in employee behavior. This panel session will explore how security awareness and training teams are adapting their strategies and skills to deal with this evolution and how more budget and leadership support can be gained.

Wednesday, 14 September, 2022 / 10:30 AM - 11:00 AM BST

Stop Reporting Operational Metrics to the C-Suite, Really ... Stop

Sam Olyaei, VP, Team Manager, Gartner

CISOs keep generating detailed charts, dump them into 50-page decks and throw them at their executives, hoping that anyone knows what they are talking about ... or cares. Instead focus on these areas: (1) What messages resonate best? (2) What structures are best for executives, (3) If you must show operational metrics, how can you make them more palatable?

Wednesday, 14 September, 2022 / 12:00 PM - 12:30 PM BST

Who Does What? Findings of the Gartner Survey on Security Organization Dynamics

Eduardo Mastranza, Sr Executive Partner, Gartner

Tom Scholtz, Distinguished VP Analyst, Gartner

Gartner surveyed 96 organizations to identify significant patterns or trends related to the distribution of security and risk management capabilities in organizations from the public and the private sector. Join this session for a summary of the key findings.

Wednesday, 14 September, 2022 / 12:00 PM - 12:45 PM BST

Ask the Expert: How to Create a Formal Security Program in Midsize Enterprises

Paul Furtado, VP Analyst, Gartner

Midsize organizations don't have the resources or budgets of large enterprises. However they are tasked with still protecting the organization against the same threats. Come ask our Gartner experts your questions regarding starting or maturing a security program within your organization.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, 14 September, 2022 / 02:45 PM - 03:15 PM BST

Protection From the Risk Within — Managing Insider Risk

Paul Furtado, VP Analyst, Gartner

One of the biggest risks to our security accesses our systems on a daily basis. This presentation will focus on providing guidance on building an effective insider risk program. We will discuss the tools, tactics and techniques to balance the needs of the business with user's privacy. Recommendations will also be made on how to present the program effectively to leadership and end users.

Wednesday, 14 September, 2022 / 02:45 PM - 03:15 PM BST

The Top 10 Cybersecurity Value Metrics Every Organization Should Use

Paul Proctor, Distinguished VP Analyst, Gartner

No one can tell you what your metrics should be … until now. Gartner has developed and vetted a prioritized list of metrics to describe the value of your cybersecurity program to satisfy the most challenging audiences including your board, CFO, COO, customers, partners and regulators. And we are working on benchmarks for each.
- What cybersecurity metrics should I measure?
- How can I use metrics to drive governance?

Wednesday, 14 September, 2022 / 03:30 PM - 04:00 PM BST

8 Signs That You Have Security Conscious Corporate Culture

Sam Olyaei, VP, Team Manager, Gartner

Measuring the effectiveness of a security behaviour and culture change program (SBCP) can be tricky. Sometimes you need to get a sense of things ahead of your formal presentations to the Executive or the Board. Join this session to identify eight observable things that signal your SBCP is on the right path and helping to reduce human-born cyber risks in your organization.

Monday, 12 September, 2022 / 11:00 AM - 11:30 AM BST

Outlook for Network Security 2022

Jeremy D'Hoinne, VP Analyst, Gartner

Zero-trust strategies for network security have gained notable popularity in recent years. However, organizations need to avoid "silver bullet" thinking and build strategies based on their desired business outcome. This session will highlight the forces that shape network security, threats that need to be addressed, and how to think about zero trust and SASE as part of an overall network security strategy.

Monday, 12 September, 2022 / 11:00 AM - 11:45 AM BST

Ask the Expert: Fraud Detection in Digital Channels

Akif Khan, VP Analyst, Gartner

Digital channels such as online banking and e-commerce are the focus of a range of fraudulent attacks vectors from malicious bot attacks to fraudulent identity presentation to account takeover using phished credentials. Building a layered and comprehensive fraud mitigation stack is crucial to protecting revenue, maintaining customer confidence and preventing brand damage.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 12 September, 2022 / 11:00 AM - 11:45 AM BST

Ask the Expert: Is XDR the Next Big Thing in Security? Or Another Passing Fad?

Dave Messett, Sr Director Analyst, Gartner

XDR, or Extended Detection and Response, is an extension of other technologies used for security monitoring and response, taking the analytics concepts used in tools like EDR and SIEM to a broader set of enterprise security tools. In this session we will discuss what XDR is, how your organization might benefit from using it, and whether XDR matters to you.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 12 September, 2022 / 12:30 PM - 01:00 PM BST

Outlook for Cloud Security

Charlie Winckless, Sr Director Analyst, Gartner

Cloud security remains a top priority. This presentation summarizes the problems, recommended processes and new product types to address three key issues: What are the unique risks associated with public cloud service providers, and how can they be controlled? What are the unique security challenges of IaaS and how can they be mitigated? What are the unique control challenges of SaaS and how can they be addressed?

Monday, 12 September, 2022 / 12:30 PM - 01:15 PM BST

Ask the Expert: How to Build a Successful PAM Program

Felix Gaehtgens, VP Analyst, Gartner

Success with a PAM program is a mixed bag for most companies, finding PAM a challenging implementation. Before you even purchase a tool, fundamental tasks must be taken on to ensure success later in the process. This session gives you an opportunity to ask questions about initiating and running an effective PAM program. Attendees should come prepared to ask questions.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 12 September, 2022 / 02:30 PM - 03:00 PM BST

Developing a Strategy for SASE Adoption to Securely Enable the Anywhere Workforce

Neil MacDonald, Distinguished VP Analyst, Gartner

Enterprises are shifting to hybrid work environments to enable anywhere, anytime access to resources that are located everywhere -- in SaaS, in public cloud IaaS with some workloads in the traditional data center. A SASE strategy enables users, devices and branches zero trust access to resources, regardless of location. This session will lay out a strategic timeframe and roadmap for SASE adoption.

Monday, 12 September, 2022 / 02:30 PM - 03:15 PM BST

Roundtable: Is My SIEM an XDR?

Pete Shoard, VP Analyst, Gartner

An exploratory session to discuss SOC requirements for detection and response capabilities, helping attendees identify the scenarios where a SIEM would be an appropriate choice and where more recent developments in the operations space fit with the introduction of concepts such as XDR.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 12 September, 2022 / 04:15 PM - 04:45 PM BST

Outlook for Endpoint Security 2022

Dave Messett, Sr Director Analyst, Gartner

Endpoint now covers a wide variety of devices, and organisations invest heavily in trying to secure them. So why is it that malware attacks such as ransomware are still so prevalent. We discuss how securing the endpoint needs to go beyond protecting the individual endpoint, to protect the diverse range of endpoints that make up an organisation.

Monday, 12 September, 2022 / 05:00 PM - 05:30 PM BST

Beyond Perimeters: Integrate Security Tools With a Cybersecurity Mesh Architecture

Felix Gaehtgens, VP Analyst, Gartner

Users and IT assets are now mostly outside traditional enterprise perimeters, yet individual security tools are mostly siloed and don't easily address the requirement of this new reality. A cybersecurity mesh architecture approach is an evolution of security architecture that works across the ecosystem of deployed security tools. It creates and leverages interoperable connections between tools to promote a consistent security posture.

Tuesday, 13 September, 2022 / 10:00 AM - 10:20 AM BST

Magic Quadrant: Security Service Edge

Charlie Winckless, Sr Director Analyst, Gartner

This session will review the Security Services Edge Magic Quadrant, highlighting the market and it's relevance and the key vendors in the space.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 13 September, 2022 / 10:30 AM - 11:00 AM BST

Do Privileged Access Management Right: How to Build an Effective and Mature PAM Program

Felix Gaehtgens, VP Analyst, Gartner

An introduction for privileged access management: Why is PAM such a crucial piece of any security program? How should you leverage PAM? How can you raise your security posture by using a just-in-time PAM and zero standing privileges approach?

Tuesday, 13 September, 2022 / 10:30 AM - 11:15 AM BST

Ask the Expert: How to Build a Zero Trust Architecture

Thomas Lintemuth, VP Analyst, Gartner

What do we mean about ZTA , what are the first steps that we need to complete, and can we buy it out of the box?

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 13 September, 2022 / 12:00 PM - 12:30 PM BST

Preventing Account Takeover Attacks

Akif Khan, VP Analyst, Gartner

Account takeover (ATO) attacks keep security leaders up at night. Attackers are not breaking and entering, they are not exploiting vulnerabilities - they are simply using stolen credentials on login pages for corporate systems, online banking and more. In this session the focus will be on how to build a layered defence of complementary capabilities to mitigate the risks of ATO attacks.

Tuesday, 13 September, 2022 / 12:00 PM - 12:30 PM BST

Outlook for Security Operations 2022

Pete Shoard, VP Analyst, Gartner

Security operations are undergoing a transformative change when our security is planned and delivered. Do you really need to centralize data for security? Is there a single solution to solve all my security needs? How do we determine what is threat intelligence for us? Learn what technologies, processes and services will have the biggest impact on how security operations are delivered in 2022.

Tuesday, 13 September, 2022 / 02:00 PM - 02:30 PM BST

Charting the Future of Cloud-Native Security Operations

Charlie Winckless, Sr Director Analyst, Gartner

How is cloud adoption impacting security operations? Who are the new stakeholders in cloud-native security operations? Cloud-native security operations will evolve toward a federated shared responsibility model with shifting centers of gravity and ownership. Technology and service providers (T&SP) must embrace the change and adapt capabilities needed to enable new stakeholders.

Tuesday, 13 September, 2022 / 02:00 PM - 02:45 PM BST

Ask the Expert: What's the Best Remote Access Strategy for the Future of Work Trends

Jeremy D'Hoinne, VP Analyst, Gartner

The future of work is hybrid, but most remote access architecture today are caught between a rock and a hard place: scale up the historical approach, or experiment with more recent solutions even if nobody knows what their application architecture will look like in a few years. In this session, Gartner analyst will answer questions on remote access best practices for an hybrid workforce.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 13 September, 2022 / 03:30 PM - 04:15 PM BST

Ask the Expert: Strategies and Tactics for Cloud Security

Neil MacDonald, Distinguished VP Analyst, Gartner

This interactive session will explore strategies and tactics for cloud security spanning software as a service and infrastructure/platform as a services approaches. Attendees can share their own experiences as well as ask advice from an analyst specializing in cloud security.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, 14 September, 2022 / 10:30 AM - 11:15 AM BST

Ask the Expert: Zero Trust

Charlie Winckless, Sr Director Analyst, Gartner

Zero trust has become one of the biggest buzzwords of 2020 (especially after being featured in the executive order from May 2021), frequently used in all areas to simply mean "better security." This session will let you ask your questions and understand what zero trust actually means, what you need to start on a zero trust journey and learn about practical approaches.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, 14 September, 2022 / 02:45 PM - 03:15 PM BST

A Pragmatic Approach to Implementing a Zero Trust Security Architecture

Neil MacDonald, Distinguished VP Analyst, Gartner

Changes in the threat landscape and ineffectiveness of current security architectures have created significant interest in zero trust security architectures. This presentation will pragmatically explore zero trust and zero trust networking and extend these concepts to operating systems, applications, users and data. Topics will include the NIST architectures for zero trust as well as technologies and vendors providing solutions.

Wednesday, 14 September, 2022 / 02:45 PM - 03:15 PM BST

Can You Prove Someone's Identity Online?

Akif Khan, VP Analyst, Gartner

Obtaining confidence in a customer’s or employee's identity is the foundation of identity-first security. IAM leaders must understand the current state-of-the-art, balancing assurance needs with friction in the UX, while orchestrating multiple tools and becoming aware of strategic trends on the horizon.

Wednesday, 14 September, 2022 / 02:45 PM - 03:15 PM BST

What Does the Future Hold for SecOps?

Dave Messett, Sr Director Analyst, Gartner

Security operation centers, fusion centers, outsourced monitoring, outsourced management, AI-guided investigations, AI augmentation — there’s a lot of hype about what the future holds for security operations and how to stop security analysts drowning in their work. So, what will it be like in the future?

Wednesday, 14 September, 2022 / 03:30 PM - 04:00 PM BST

How SASE, XDR and Security Vendor Consolidation are Shaping Your Security Strategy

Dionisio Zumerle, VP Analyst, Gartner

We discuss findings from a 2022 Gartner survey on organizations that conducted SASE and XDR projects. We discuss what worked and what did not, and how vendor consolidation impacts their decisions and security strategy for these and other security projects.

Monday, 12 September, 2022 / 11:00 AM - 11:30 AM BST

Outlook for Application Security 2022

William Dupre, Sr Director Analyst, Gartner

Application security is a rapidly evolving and dynamic ecosystem of skills, disciplines, and technologies that work together to support emerging DevSecOps initiatives. This session provides Gartner's industry-wide viewpoint of the state-of-the-art of modern applications security and key factors for success in 2022 and beyond.

Monday, 12 September, 2022 / 11:00 AM - 12:30 PM BST

Workshop: The Gamification of Threat Modeling

Patrick Hevesi, VP Analyst, Gartner

Threat modeling helps identify weaknesses and vulnerabilities in a system design, aiding in the creation of relevant controls to address risks within a system. Attendees will play a threat modeling game to learn how to identify weaknesses within an application design.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 12 September, 2022 / 12:30 PM - 01:00 PM BST

DevSecOps: The Future of the SOC Is Automation … Isn’t It?

Pete Shoard, VP Analyst, Gartner

A tour of the core perceptions around automation in the security operations domain, from self-developed capabilities using languages like Python and Java, embedded capabilities is SIEM platforms and case management systems and the likely future of SOAR solutions. During this session, we will explore the common misconceptions, what is realistically achievable and how best to choose the right route to automation.

Monday, 12 September, 2022 / 12:30 PM - 01:15 PM BST

Roundtable: How Do You Protect Enterprise Data With Instant Messaging?

Dionisio Zumerle, VP Analyst, Gartner

With employees using all sorts of instant messaging tools, from WhatsApp to texting, enterprises are finding challenging to protect enterprise data. Some mobile applications are leaky or privacy-invasive and most of them do not allow the enterprise to monitor that there is no leakage of sensitive data. In this roundtable we will compare approaches and learn from each other about what works and what does not when it comes to instant messaging and mobile apps.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 12 September, 2022 / 02:30 PM - 03:00 PM BST

Crypto-Agility: Why You Should Give a Damn!

Mark Horvath, Sr Director Analyst, Gartner

The retirement of the RSA and ECC algorithms in the next few years will be a seismic shift in data security we have not seen in a generation. This session covers not just the retirement of these and other algorithms impacted by quantum computing, but will show you how to take advantage of quantum safe algorithms to open new business opportunities for your organization.

Monday, 12 September, 2022 / 02:30 PM - 03:15 PM BST

Ask the Expert: Office 365 Security Best Practices

Dennis Xu, Sr Director Analyst, Gartner

Do you have a specific question related to securing your Office 365 environment you want to ask an analyst? Have you read a Gartner research on Office 365 Security and have questions to ask? Come ask your question to a Gartner analyst and walk away with the answer on the spot.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 12 September, 2022 / 04:15 PM - 04:45 PM BST

Fix What Matters: Provide DevOps Teams With Risk Prioritized Vulnerability Guidance

William Dupre, Sr Director Analyst, Gartner

Traditional application security efforts often are reactive, incomplete, and unsuccessful in achieving their goals — barriers preventing success in scaling AppSec programs and in keeping pace with the faster pace of development. In this session, we’ll provide specific insights and guidance on how to shift programs to a more proactive, risk-based foundation better adapted to modern application development efforts — and greater AppSec success.

Monday, 12 September, 2022 / 04:15 PM - 05:00 PM BST

Roundtable: How Do I Create Provide Sufficient Data Protection?

Brian Lowans, Sr Director Analyst, Gartner

The world is changing fast due to increasing privacy and security risks. But data is increasingly resident across multiple cloud services and across disparate regional and international data centres. Let's discuss and explore your data protection choices.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 12 September, 2022 / 05:00 PM - 05:30 PM BST

Enabling Cloud-Native DevSecOps

Dionisio Zumerle, VP Analyst, Gartner

With cloud-native applications, the lines between infrastructure and applications are increasingly blurry, while with DevOps, development and operations are also increasingly overlapping. Using data from a recent Gartner survey, this session will present recommendations to arrange people, process and technologies to protect application assets without slowing down the CI/CD pipeline.

Tuesday, 13 September, 2022 / 10:30 AM - 11:00 AM BST

Outlook for Data Security

Mark Horvath, Sr Director Analyst, Gartner

Data security is a top priority. This session covers current trends and emerging topics specific to data security. How organizations handle and consume data continues to rapidly evolve. Databases and cloud applications introduce rapidly evolving threats with with countermeasures following slowly. Planning to use data as the focus of security governance and security architecture roadmaps is critical for any security and risk management program.

Tuesday, 13 September, 2022 / 02:00 PM - 03:30 PM BST

Workshop: Building a Secure Software Development Lifecycle

Mark Horvath, Sr Director Analyst, Gartner

While the security of applications continues to be a primary concern for CSIOs and Heads of Development, the majority of organizations still have a relatively basic (or nearly non-existent) application security testing program. This session walks through the steps you should be taking to turn your SLDC into an effective mechanism for securing applications, without breaking the bank.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, 14 September, 2022 / 10:30 AM - 11:00 AM BST

How to Secure Your Data Using Data Security Platforms?

Brian Lowans, Sr Director Analyst, Gartner

Vendors are merging data security capabilities into larger platforms to provide enhanced security beyond what each individual component could do alone. This forms a new capability known as “Data Security Platforms (DSP).” Not all vendors have already achieved broad coverage. This session shows the as-is state of DSP and its variants. IT leaders get into a position to judge what platform variant fits their context.

Wednesday, 14 September, 2022 / 12:00 PM - 12:30 PM BST

Managing Open Source Software Risks in DevSecOps Environments

Mark Horvath, Sr Director Analyst, Gartner

There are millions of open-source software projects in the world. Which ones are in your software? And what security, operational, and legal risks do they pose? Getting control and managing a myriad of risks requires information, process changed, and automated tools to spot and help remediate problems. In this session, we'll examine the various changes you should consider, along with the tools that can help in getting control.

Monday, 12 September, 2022 / 11:00 AM - 11:30 AM BST

Ransomware Is Changing — Are You Ready?

Paul Furtado, VP Analyst, Gartner

Ransomware attacks have been morphing. Techniques used by the bad actors are changing. During this presentation, we will provide insight into the new tactics being used by the bad actors not only to access your environment, but what they are doing with your data once exfiltrated. Finally, we will also provide current data on the financial impact of a ransomware attack.

Monday, 12 September, 2022 / 11:00 AM - 12:30 PM BST

Workshop: Leveraging the Business Impact Analysis to Meet Your Security, Risk and Privacy Needs

Roberta Witty, VP Analyst, Gartner

Conducting a business impact analysis (BIA) is a critical step in determining the importance of IT systems to an organization and planning based on their importance. Join us to learn how to leverage BIAs to meet the needs of security, risk and privacy functions outside of their normal usage in business continuity and disaster recovery planning.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 12 September, 2022 / 12:30 PM - 01:00 PM BST

10 Cyber and IT Risk Fundamentals You Must Get Right

Jie Zhang, VP Analyst, Gartner

Security and risk management leaders struggle to mature their cyber and IT risk management practices beyond conducting risk assessments. This session delivers a set of fundamental risk management processes that are essential to manage cyber and IT risk for their organizations.

Monday, 12 September, 2022 / 02:30 PM - 03:00 PM BST

A Guide to Navigating the Vendor Risk Management Market

Joanne Spencer, Sr Director Analyst, Gartner

The market for vendor risk management products and services is complex, diverse and evolving, making it difficult to know how to choose the right solution. This session will highlight the key components of tools and solutions available to security and risk leaders when managing third parties.

Monday, 12 September, 2022 / 04:15 PM - 04:45 PM BST

Cyber-Physical Systems Security — Top 10 Must-Dos

Katell Thielemann, VP Analyst, Gartner

2021 showed that attacks are moving closer to operational or mission-critical environments where cyber-physical systems (CPS) live. Whether they are born of OT/IT convergence or from IoT, IIoT, or Smart "X" efforts, CPS are everywhere and mandate different approaches to security than IT systems.
What are the top 10 must-dos to protect them?

Monday, 12 September, 2022 / 04:15 PM - 05:00 PM BST

Roundtable: How to Effectively Manage the Cyber Risks of the Cloud?

Patrick Hevesi, VP Analyst, Gartner

Cloud adoption is widespread, and many organizations are now cloud-first in their technology adoption. Join your peers for a discussion on cloud security challenges and the solutions that have been most effective. Participants are encouraged to share their experiences.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 12 September, 2022 / 05:00 PM - 05:30 PM BST

Top Cyber Risk Projects for 2022-23 To Thrive in A Constantly Evolving Risk Environment

Michael Kranawetter, Sr Director Analyst, Gartner

2022 introduces new ways of working in cyber risk management -- a foundation built on adaptive governance, value generation, and cyber risk management. This session will (1) debrief the three pillars in cyber risk management (2) summarize top risk projects for cybersecurity leaders with 'project cards' (3) offer guidance on shortlisting projects.

Tuesday, 13 September, 2022 / 10:00 AM - 10:20 AM BST

The Business Continuity Management Software Ecosystem

Roberta Witty, VP Analyst, Gartner

Using the right tools relates to building an effective BCM program — for planning and preparedness and at time of crisis when executing response and recovery procedures. This presentation helps security and risk management leaders select the right mix of solutions and vendors for their BCM needs.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 13 September, 2022 / 10:30 AM - 11:00 AM BST

Managing Your ESG and Carbon Risks From Your IT Vendors

Joanne Spencer, Sr Director Analyst, Gartner

For most enterprises their biggest ESG risks and opportunities for improvement sit in their supply chain. Effective and focused engagement and collaboration with key vendors to manage ESG performance and scope three carbon emissions is going to be critical. This sessions will tell you who to engage with, how and what to reasonably expect.

Tuesday, 13 September, 2022 / 10:30 AM - 12:00 PM BST

Data Residency Workshop: Managing Data in the Cloud for Europe, China, Russia and India

Nader Henein, VP Analyst, Gartner

Data residency risks breaking a decade long cloud strategy into individual country specific servers, this hands on session will allow you to raise your concerns, get answers and pull together a strategy to centralize when possible and localize when necessary.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 13 September, 2022 / 12:00 PM - 12:45 PM BST

Ask the Expert: How to Mitigate Software Supply Chain Security Risks

William Dupre, Sr Director Analyst, Gartner

Attackers are targeting software development systems, open-source artifacts and DevOps pipelines to compromise software supply chains. In this Ask the Expert session, we will answer questions on emerging trends such as software bill of materials, hermetic pipelines and binary authorization to mitigate risks both for internally developed applications and externally procured software.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 13 September, 2022 / 02:00 PM - 02:45 PM BST

Ask the Expert: Hands-On Privacy — Managing Personal Data Risk for Analytics and Data Science Workloads

Nader Henein, VP Analyst, Gartner

Privacy enhancing computation has emerged as a leading trend across multiple domains. This session will focus on addressing your questions when handling personal data in data lakes and data warehouses across geographies. The goal is to extract the maximum value while maintaining a defensible posture and keeping privacy risk at bay.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 13 September, 2022 / 03:30 PM - 04:00 PM BST

Is Your Security Strategy Ready for the Ongoing Cyberwar? What's the Answer? Cybersecurity Mesh!

Patrick Hevesi, VP Analyst, Gartner

Come learn about the Cybersecurity Mesh and how you can start moving to a more predictive security strategy and architecture! See how you can start evolving your existing products into a cohesive predictive architecture to help your organization get ahead of the ongoing attack landscape!

Tuesday, 13 September, 2022 / 03:30 PM - 04:15 PM BST

Roundtable: Best Practices in Assessing Third-Party Security and Risk

Joanne Spencer, Sr Director Analyst, Gartner

Security and risk leaders struggle to effectively assess third-party (including IT vendor) security and risk, leading to unknown risks or security breaches. This roundtable provides you with the opportunity to participate in a facilitated discussion with your peers regarding the most effective assessment practices used today.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, 14 September, 2022 / 10:30 AM - 11:00 AM BST

Crossfire: Current Threat Landscape and the Shape of the World

Pete Shoard, VP Analyst, Gartner

Jeremy D'Hoinne, VP Analyst, Gartner

Neil MacDonald, Distinguished VP Analyst, Gartner

A 3-way crossfire debate on the state of the cybersecurity world. Come see leading Gartner analysts discuss how the current world events are affecting the cyber threat landscape.

Wednesday, 14 September, 2022 / 10:30 AM - 11:15 AM BST

Ask the Expert: Creating the Insider Risk Management Program

Paul Furtado, VP Analyst, Gartner

In this session, Gartner will explore real case studies from the attendees and provide insight into best practices in this area.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, 14 September, 2022 / 12:00 PM - 12:30 PM BST

Outlook for Privacy, 2022-2023

Nader Henein, VP Analyst, Gartner

Privacy is profoundly impacting digital transformation priorities and lies at the core as organizations build new engagement models with consumers and relationships with employees. 2022 sits between major developments in Asia-Pacific and Europe in 2021 and the U.S. in 2023. Join this session to learn of these significant evolutions, both from the regulatory as well as technology perspectives.

Wednesday, 14 September, 2022 / 12:00 PM - 12:45 PM BST

Ask the Expert: Why Security and Risk Matter When Managing Vendors

Joanne Spencer, Sr Director Analyst, Gartner

This discussion will focus on effective vendor management and the role security needs to play in managing vendor relationships.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, 14 September, 2022 / 02:45 PM - 03:30 PM BST

Roundtable: Cyberattacks Take Down Your IT – Now What?

Roberta Witty, VP Analyst, Gartner

This roundtable will be one where participants share how they are planning to continue business operations while the IT department is busy cleansing and recovering/rebuilding the IT infrastructure after a cyberattack. This session is not about cybersecurity incident response.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, 14 September, 2022 / 03:30 PM - 04:00 PM BST

Technology Supply Chain Risk Management — Where Do I Start?

Katell Thielemann, VP Analyst, Gartner

From SolarWinds to Kaseya to government bans on specific providers, supply chain security is an area of increased concerns. This session provides an overview of the technology supply chain risk management landscape, and suggested first steps for each category.

Monday, 12 September, 2022 / 02:30 PM - 03:00 PM BST

Technical Insights: 5 Steps to Start the Zero Trust Journey

Thomas Lintemuth, VP Analyst, Gartner

Zero Trust is more than a marketing term once you see through all the marketing. Organizations are building application access with Zero Trust principles. We will discuss five key items you need to know for zero trust to work for your organization.

Monday, 12 September, 2022 / 04:15 PM - 04:45 PM BST

Technical Insights: API Access Control 201: Architect a Modern API Access Control Strategy

Erik Wahlstrom, Sr Director Analyst, Gartner

In this technical session we will establish an agile and composable identity fabric that supports API access control that consists of multiple types of identity tools and components that together enable encryption, authentication and authorization for your distributed APIs.

Tuesday, 13 September, 2022 / 12:00 PM - 12:30 PM BST

Technical Insights: Dark Data, Data Security's Biggest Miss

Patrick Hevesi, VP Analyst, Gartner

Astrophysics teaches that space is taken up by dark matter, little is known about it, but it's everywhere. The same holds true for data. This session covers what dark data is, the value or risk lurking within and what security and risk management technical professionals can do to shed light on it.

Tuesday, 13 September, 2022 / 03:30 PM - 04:00 PM BST

Technical Insights: Don't Get Burned by the Next Sunburst - How the Network can Detect Supply Chain Attacks

Thomas Lintemuth, VP Analyst, Gartner

Sunburst showed the supply chain can be leveraged to exfiltrate data out of many enterprise environments. Learn how NDR, Segmentation, Deception and other Network controls team up to identity and stop supply chain attacks.

Tuesday, 13 September, 2022 / 03:30 PM - 04:00 PM BST

Technical Insights: Do I Buy a SSE Product From a CASB Vendor or SWG Vendor?

Dennis Xu, Sr Director Analyst, Gartner

Security service edge (SSE) is an emerging market that consolidates CASB, SWG, and ZTNA. Vendors from all three traditional markets are all either building or buying into the SSE market. Do you buy SSE from CASB vendors or SWG vendors? We will discuss the key strengths and weaknesses of CASB vs. SWG vendors as they march into SSE, and which type best suits your needs.

Wednesday, 14 September, 2022 / 10:30 AM - 11:00 AM BST

Technical Insights: Machine Identities, Secrets, Keys and Certificates – The Team, the Process and the Tools

Erik Wahlstrom, Sr Director Analyst, Gartner

In this session we will look at a best-of-breed verses all-in-one tooling discussions of the expanding portfolio of tools that manage our machine identities, secrets, keys and certificates.

Wednesday, 14 September, 2022 / 12:00 PM - 12:30 PM BST

Technical Insights: Working From Home Securely — You Need More Than ZTNA

Thomas Lintemuth, VP Analyst, Gartner

Organizations of all types are having to allow work from home, some for the first time. Find out how enterprise controls, cloud controls and the home office controls come together to secure the remote user experience.

Wednesday, 14 September, 2022 / 03:30 PM - 04:00 PM BST

How to Evolve Your Identity Fabric to Achieve Identity First Security

Erik Wahlstrom, Sr Director Analyst, Gartner

In a world where identity is the only perimeter, identity-first security has become an imperative. IAM must be deployed more cohesively as a composable, distributed, resilient identity fabric. Organizations should also apply IAM best practices to more of their applications and services and to the IAM infrastructure itself.

Wednesday, 14 September, 2022 / 03:30 PM - 04:00 PM BST

Crossfire Debate: Cloud Firewall — Native vs. Incumbent —The Battle Begins

Patrick Hevesi, VP Analyst, Gartner

Dennis Xu, Sr Director Analyst, Gartner

Thomas Lintemuth, VP Analyst, Gartner

Migrating resources to IaaS tenants opens up questions on how to provide network security. This session presents security and risk management technical professionals with guidance on when the appropriate option would be an incumbent firewall vendor versus a cloud-native firewall.

Monday, 12 September, 2022 / 08:15 AM - 09:00 AM BST

CISO Circle: Welcome and Orientation

Sam Olyaei, VP, Team Manager, Gartner

This session, exclusive to CISO circle attendees, will give you an overview of the sessions that comprise the program, enabling you to select the sessions that are best suited to you. The CISO circle is designed to be interactive, giving you an opportunity to network and share best practices and experiences with your peers. This session will kickstart that process, enabling you to connect with your fellow CISO circle members and prepare for these conversations.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 12 September, 2022 / 01:15 PM - 02:15 PM BST

CISO Circle Lunch: Townhall -The Top Cybersecurity Predictions for 2022-2023

Nader Henein, VP Analyst, Gartner

Katell Thielemann, VP Analyst, Gartner

Join us for an exclusive town hall session with the Gartner experts who presented today’s opening keynote. This is your opportunity to ask questions about Gartner’s cybersecurity predictions and share your perspective with your fellow CISOs.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Monday, 12 September, 2022 / 02:30 PM - 04:00 PM BST

CISO Circle Workshop: Building Risk, Value, and Cost Charts for Cybersecurity

Paul Proctor, Distinguished VP Analyst, Gartner

Your executives only care about risk, value, and cost. Why would you speak to them about anything else? This workshop will walk through the steps of identifying business processes and outcomes, aligning supporting technology stacks, and creating outcome-driven metrics to put cybersecurity in a business context.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 13 September, 2022 / 10:30 AM - 12:00 PM BST

CISO Circle: Leadership Exchange: Mock Board Presentation - The Three Stages of Reporting Cybersecurity to Your Board

Paul Proctor, Distinguished VP Analyst, Gartner

Sam Olyaei, VP, Team Manager, Gartner

Arthur Sivanathan, Director, Advisory, Gartner

Almost 100% of leaders have now reported to their board/executives at least once in the last two years. In some industries, quarterly reports are standard. In others, board members have dedicated cybersecurity committees overseen by board members. Attendees should expect the following:

1) Insights to the Three Stages of Board Reporting At Every Organization
2) A Mock Security Board Presentation by Gartner’s Board Experts.
3) An interactive discussion that highlights new techniques, nuances and dynamics to consider

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 13 September, 2022 / 12:45 PM - 01:30 PM BST

CISO Circle Roundtable: How to Nudge People to Care More About Security and Risk

Mary Mesaglio, Managing Vice President, Gartner

Security and risk management often come down to how people behave every day. But human behavior is infamously hard to change. Enter behavioral science, which is the scientific study of human behavior. This session is an interactive discussion on how to use behavioral science techniques like nudge theory and cognitive ease to help people to behave in ways that are more secure and risk-aware.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Tuesday, 13 September, 2022 / 02:00 PM - 04:00 PM BST

CISO Circle: Research Discussion: The CISO’s Guide to Cyber Risk Quantification

Christopher Mixter, VP, Research, Gartner

CISOs report frustration that the time and effort their teams invest in quantifying cyber risk rarely drives risk owners to take action. In this interactive Research Discussion, exclusively for CISO Circle participants, you’ll network with peers on their cyber risk quantification efforts and discover how to use CRQ to effectively influence business decision making. This session will feature a deep-dive into Verizon’s CRQ practice, which delivers trustworthy, timely, and empowering guidance to risk owners without major investment in new data and skills…and without the need to conduct scenario likelihood calculations.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, 14 September, 2022 / 10:30 AM - 12:00 PM BST

CISO Circle Workshop: Optimize Your Cybersecurity Tool Portfolio

Arthur Sivanathan, Director, Advisory, Gartner

Christopher Mixter, VP, Research, Gartner

Cybersecurity organizations operate an average of 16 different cybersecurity tools, and the industry spends upward of $65B annually in this space…yet most cybersecurity leaders see “duplicative capability and gaping holes,” not true coverage of enterprise exposures. In this workshop, attendees will learn how to move from tuning and integrating tools to truly extracting value from them, and build a best-in-class cybersecurity tool portfolio dashboard to guide future investments.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Wednesday, 14 September, 2022 / 12:00 PM - 12:30 PM BST

CISO Circle: Leadership Exchange: Introducing the Gartner Cybersecurity Controls Assessment

Arthur Sivanathan, Director, Advisory, Gartner

Sixty-six percent of CISOs ranked the ability to benchmark their security controls as critical to addressing their challenges. But accomplishing this can be costly and time-consuming. This session will detail how the Gartner Cybersecurity Controls Assessment allows you to benchmark the current state of security controls against your peers, get a baseline for tracking improvements and learn to prioritize controls for greater investment.

Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.

Want to stay informed?

Get conference email updates.
Contact Information

All fields are required.

  • Step 2 of 2