Security, Risk & Compliance

Explore the conference topics and stay ahead

Hot Topics covered at Gartner IT Symposium will include

  • Cybersecurity
  • Digital Resilience
  • Continuously Adaptive Risk and Trust Assessment
  • Security Governance

While information-centric security practice is still the dominant responsibility of most security organizations today, it doesn’t take into account the increasing impact of technology use in other areas of business, both by the organization and by the supply chains that service them. As IT security requirements grow to encompass the “edge” of most organizations, broader cybersecurity needs grow to include cyberphysical needs, as well.

Digital business offers enterprises unprecedented opportunities, along with new risks. Two key characteristics of digital business are challenging conventional IT control:

  • As the business claims increasing autonomy in deploying new digital technologies, it degrades the authority of the central IT organization.
  • The dramatic increase in the number of elements (for example, systems, devices, things, data and dynamic relationships) exposes scalability issues with many traditional security control solutions.

This reality challenges the status quo in information risk and security management. Many conventions and technologies on which risk and security practices have been based do not scale in the new reality. 

Analyst Q&A with Tom Scholtz, Distinguished VP Analyst

1. How has this topic evolved since last year? Have you noticed any major changes in the market, strategy or technology?                                                                       

A: Security and risk practices continue to evolve in line with digitalization. Technologies such as AI and machine learning, robotic process automation and IoT offer both new risks and new opportunities to security and risk leaders. From a cyber risk perspective, acceptance of cloud computing has reached a tipping point as enterprise formalize their cloud security strategies.                                                        

2. What’s one of the biggest mistakes organizations make when it comes to this topic?         

A: Some organizations still believe cyber security can be effectively addressed through technology only. Furthermore, many organizations equate regulatory or standards compliance with effective cyber security.                                                                          

3. How are IT leaders leveraging this topic to transform their organizations?                                          

A: Effective security and risk leaders understand that an effective security program enables their business to successfully exploit digitalization                                                                              

4. Finish this sentence: “If organizations don’t get their digital business transformation right, they will….”                                                                                 

A: ...will not be able to compete in their markets, or deliver satisfactory services to their citizens.             

5. How attending Gartner IT Symposium/Xpo 2020 will help IT leaders with their priorities and key initiatives?                                                                                

A: By sharing best practices in establishing and executing on a cyber security strategy that will help them balance the benefits of digitization with the new and emerging risks. 

Gartner Security & Risk Predicts

  • By 2022, 50% of all SOCs will transform into modern SOCs with integrated incident response, threat intelligence and threat hunting capabilities, up from less than 10% in 2015.
  • By 2022, 40% of BCM programs will be subsumed into the digital business risk management structure rather than exist as separate practices.
  • Through 2022, 30% of large enterprises will build a security skills management program including experimental recruiting and talent development practices.
  • By 2022, 75% of organizations that outsource email and collaboration tools won’t meet their critical recovery objectives during a supplier outage.

Ready to register?

Seats are filling quickly.
Secure your space now.