Speaker Bio

Jeremy D'Hoinne

Jeremy D'Hoinne

VP Analyst
As a Research VP for security operations and infrastructure protection, Jeremy D'Hoinne assists chief information security officers and their teams to develop strategies to protect against advanced threats.

Mr. D'Hoinne's research includes exposure management and how to run a continuous threat exposure management (CTEM) programme, but also how covers the related technologies, such as cybersecurity validation technologies,including breach and attack simulation (BAS).

He also studies the intersection of artificial intelligence and cybersecurity with a focus on the disruptions caused by large language models and generative AI.

Mr D'Hoinne continue to advise organization on infrastructure protection, especially network detection and response, remote access, and network and micro-segmentation.
Read More Read Less
Tuesday, 26 September, 2023 / 11:00 AM - 11:30 AM BST
Outlook for Threat Exposure Management: CISOs Need to Go Beyond Vulnerability Management

Threat exposure management is a required evolution for CISO and security leaders' approach to managing their readiness against unpredictable threats. This session will provide insights into this important and quickly evolving area, including the impact of new business practices and threats on your security exposure and the state and evolution of threat exposure management.

Tuesday, 26 September, 2023 / 02:15 PM - 02:45 PM BST
Cybersecurity Validation: Attack Simulation, Pentesting, and the Future of Red Teaming

CISOs and their teams have way too many dashboards, suffer from years of diagnostic fatigue and see their attack surface expanding continuously.

This session analyses how organizations can modernize red teaming and blue teaming with new options available to them. Cybersecurity validation techniques result in more actionable outcomes from your exposure management efforts.

Wednesday, 27 September, 2023 / 10:30 AM - 11:00 AM BST
Crossfire: Zero Trust Debate

Gartner receives thousands of inquiries on zero trust every year. Some believe the debate is settled and zero trust is the only way to do security. However, the subject is far from settled. Is Zero Trust real or just a marketing term? Is it achievable? Is cloud native required? How mature does my identity program need to be to achieve a zero trust posture?

Wednesday, 27 September, 2023 / 12:15 PM - 01:00 PM BST
Ask the Expert: What's the Best Remote Access Strategy for the Future of Work Trends

The future of work is hybrid, but most remote access architecture today is caught between a rock and a hard place — scale up the historical approach, or experiment with more recent solutions even if nobody knows what their application architecture will look like in a few years. In this session, a Gartner Expert will answer questions on remote access best practices for a hybrid workforce.

Thursday, 28 September, 2023 / 02:15 PM - 02:45 PM BST
How to Respond to the Evolving Threat Environment, 2023

The threat landscape is a moving target. Attack campaigns might hit multiple organizations, but each enterprise should analyze its own threat landscape. Security and risk management leaders should gain baseline knowledge on optimizing prediction and prevention; knowing when detection is required; and preparing to respond when things go wrong.

Join us to hear from Gartner experts and thought leaders.