Gartner Security & Risk Management Summit

12 – 14 September 2022 | London, U.K.

Accelerating the Evolution of Security: Reframe and Simplify

Enterprises are accelerating their adoption of digitalization and agile methodologies, dramatically changing their risk profiles. Many organizations continue to add layers of defense, which in turn increases the complexity of defending against the continued onslaught of more and more advanced attacks. You must evolve your security strategy by reframing your current thinking and simplifying your processes, organization and defenses.

Join Gartner experts and your peers at Gartner Security & Risk Management Summit 2022 to share valuable insights into key strategic imperatives, such as establishing an agile security program; fostering a human-centric, security-conscious culture; devolving risk ownership; and establishing a new simplified cybersecurity mesh architecture. It will enable you to safeguard your organization, defend against your attackers and deliver business value.

Leadership and strategy

Advance your leadership skills and learn how to develop a security strategy for agility and resilience in uncertain times.

Technology

Unlock the potential of new and emerging technologies, and meet the providers changing the security and risk landscape.

 

Critical insights

Explore the latest trends in cloud security, privacy, threat management, infrastructure protection, application security, cybersecurity mesh and more.

Cybersecurity is constantly evolving, but with it comes more complexity, which possibly gives malicious actors the advantage. At Gartner Security & Risk Management Summit, you hear from top Gartner experts on the best way to evolve your security strategy by reframing and simplifying your defenses to be ready for current and future attacks.

Brian Lowans

Conference Chair and Senior Director Analyst

The Chief Information Security Officer (CISO) Circle

The CISO Circle is an exclusive program within the overall agenda designed for Chief Information Security Officers (CISOs) to explore new strategies, share innovative ideas and grow their community of peers.

Want to stay informed?

Get conference email updates.
Contact Information

All fields are required.

  • Step 2 of 2

    Join a global community of CISOs and IT executives

    Whether you’re a chief information security officer (CISO) looking to improve your leadership skills, a security professional who needs practical advice to accelerate progress on your next initiative or a risk management leader trying to optimize the value of risk management investment, you’ll find your program, peers and strategic partners at this conference.

    Define your strategy for agility and resilience in uncertain times
    • Effectively balance the increasing volume, variety and speed of security and risk decisions. 
    • Successfully communicate security risks, challenges and opportunities to senior executives.
    • Assess and transform security programs to become digital business enablers.
    • Prepare for continuous change in the technology and threat landscape.
    • Overcome the barriers of organizational culture, resources and talent to grow and scale your digital initiatives.
    Develop security programs to respond to emerging threats and advanced attacks
    • Balance real-world risks with business drivers such as speed, agility, flexibility and performance.
    • Develop and maintain effective security governance across the organization.
    • Establish key metrics and indicators to measure effectiveness of security programs.
    • Anticipate the emergence of advanced attacks that evade traditional security.
    Target the risks that matter most in the race to the digital future
    • Build an effective risk management program when investing in digital business.
    • Evolve your risk management practices to stay on top of emerging and enterprise risks.
    • Successfully align risk appetite with business objectives.
    • Use metrics effectively to understand changes in risk exposure.
    • Effectively manage third-party risk.
    Select and architect effective security and risk solutions
    • Understand how the characteristics of digital business impact security architecture practices.
    • Enable a tighter alignment between security and business.
    • Develop security architecture frameworks to address compliance demands and evolving IT.
    • Gain insight into the increasingly complex market for security and risk management technologies and services.
    Protect critical assets
    • Develop new best practices to secure new enterprise network edges.
    • Keep pace with the changing technology application landscape and evolving data protection regulations.
    • Balance the imperative to rapidly modernize applications with the requirement to protect them.
    • Respond to the challenges of securing sensitive data while expanding the use of cloud services.

    Tracks at a Glance

    Access over 80 sessions of the latest Gartner research specifically designed to help security and risk management leaders meet the demands of the future. Each track has a particular area of focus to help you deliver on what matters most to you and your organization.

    For a full overview of the Security & Risk Management Summit, view the Conference Brochure.

    Track A

    Cybersecurity Leadership

    Faced with a fragmented, interdependent world, cybersecurity leaders have less control over decisions around cyber risk than ever before. This track gives you practical guidance on how to manage security teams, and stakeholders, through the evolving threat landscape.

    View Sessions
    Track B

    Infrastructure Security and Operations

    Hybrid work and cloud everything as a service have reframed security around a zero-trust identity and API security. Security teams are understaffed and overwhelmed with the complexity of infrastructure security silos. This track provides insights to the strategic direction of infrastructure security technology and is designed to help you ensure that security operations keeps pace with the evolving threat landscape.

    View Sessions
    Track C

    Application and Data Security

    Spanning the cycle from developers to customers, today’s leaders face a wide, diverse array of both risks and ways to manage, mitigate and respond to them. Sessions in this track provide practical, real-world guidance on achieving a more secure software development life cycle and data management program.

    View Sessions
    Track D

    Cyber and IT Risk

    Owing to new challenges and lack of agility in program management, cybersecurity leaders struggle to mature their cyber and IT risk management practices beyond conducting assessments. This track highlights the latest trends and tools to help you improve automation and models.

    View Sessions
    Track E

    Technical Insights for Security Practitioners

    Gartner for Technical Professionals research explores insights into the security best practices, methodologies and tools needed to ensure operational success. Sessions provide advice on architecting, implementing and operating security controls for the hybrid enterprise.

    View Sessions
    CISO Circle*

    The CISO Circle*

    As the role evolves, CISOs must adapt to ensure that the organization can balance risk decisions with business goals. The CISO Circle provides targeted content, workshops and networking opportunities. Join us and form valuable connections with peers and Gartner experts. (*Application is required.)

    View Sessions
    Spotlight Track

    Diversity, Equity and Inclusion

    Anyone in security can benefit from a greater awareness of diversity, equity and inclusion (DEI) efforts, but it is increasingly a mandatory skill set for leaders. This track helps you frame your DEI efforts with a security lens and assists you in your efforts to reduce intentional and unintentional bias.

    Spotlight Track

    Identity & Access Management

    Identity is a critical foundation for the security of the systems that support our rapidly expanding virtual world. This track ensures you have the tools and insights to support effective identity and fraud initiatives, enabling organizational success.

    Health and safety measures

    We are excited to welcome you back to our in-person conferences this year. Our current health & safety guidelines for our conferences through December 2022 are outlined below, as well as additional details to help you plan for the in-person experience.

    As a part of our commitment to creating the safest possible environment for our community, we require all attendees, exhibitors, staff and partners to be fully vaccinated to participate in this year’s in-person conference. All participants will be asked to agree and to adhere to Gartner’s on-site safety guidelines and measures for their conference.

    We will continue to monitor the global and regional response to the pandemic and may adjust our plans accordingly. To ensure you have the most up-to-date information, the latest health & safety guidelines for each conference will be communicated directly to all registered participants via email no later than two weeks prior to the conference start date.

    This conference is sold out.

    Interested in another conference?