Accelerate learning and build a shared vision by attending as a group

Organizations are becoming more agile and composable. Security and risk management leaders must improve resilience, better support business objectives and elevate the organizational standing. It is imperative for chief information security officers (CISOs), security executives, risk management leaders, security architects and data security managers to accelerate progress on your initiatives and optimize the value of risk management investment.

There is no better environment for stakeholders to align, learn and network

Divide and conquer

Split up to attend more sessions designed for every member of your team.

Evaluate vendors and solution providers

Compare solutions for all stakeholders across your business.

Meet as a team with experts

Discuss your challenges and validate your strategies. 

Buy more, save more

Group Rate Discount

Save on registration when you attend the conference with your colleagues.

  • 1 for every 3 paid registrations
  • 2 for every 5 paid registrations
  • 3 for every 7 paid registrations
  • 4 for every 10 paid registrations

For more information, email GlobalConferences@gartner.com or contact your Gartner representative. 

Tips for attending a conference as a team

Align your vision as you forge strong relationships and a deeper, shared understanding with your colleagues and peers to help drive your strategies forward.

  • Have a team-planning call to set key objectives.
  • Decide a strategy for how to divide and conquer the agenda (which sessions you attend collectively could be as important).
  • Agree on how you will share key learning.
  • Create a document repository for notes, slides, etc., on Google Drive or other file-sharing platform.
  • Add colleagues to your expert one-on-ones.
  • Create a Microsoft Teams/Slack/Google Hangout channel to stay in touch during the conference.
  • Share sessions with your teammates — make notes of times they would find especially helpful.
  • Make a plan to share a coffee or lunch break together as a team.
  • Set up a.m. or p.m. meetings to discuss what you hope to learn, what you did learn, and stay connected.
  • Set up a meeting to review key take-aways and create an action plan for how you will apply what you have learned. What are you going to start doing/stop doing/do differently as a result of what you have learned?
  • Connect on LinkedIn with any peers you met during the conference.
  • Schedule follow-up meetings with any exhibitors that piqued your interest (through the Gartner Conference Navigator).

Suggested sessions by role

  • Leadership Exchange: Mock Board Presentation — The Three Stages of Reporting Cybersecurity to Your Board
  • Research Discussion: The CISO’s Guide to Cyber-Risk Quantification
  • Workshop: Building Risk, Value and Cost Charts for Cybersecurity
  • A Security View of the 2023 CIO, CEO and Board of Directors Agenda
  • Leadership Vision for Security and Risk Management 2022
  • Outlook for Organizational Resilience
  • The Top 10 Cybersecurity Value Metrics Every Organization Should Use
  • The Top Cybersecurity Predictions for 2022-2023
  • Top Trends in Security and Risk Management
  • What Goes Where: A Guide to Security Organization Design
  • Develop an Actionable Workforce Strategy for Cybersecurity
  • A Pragmatic Approach to Implementing a Zero Trust Security Architecture
  • Developing a Strategy for SASE Adoption to Securely Enable the Anywhere Workforce
  • Security Strategy Planning Best Practices
  • How SASE, XDR and Security Vendor Consolidation Are Shaping Your Security Strategy
  • Outlook for Cloud Security
  • Outlook for Endpoint Security 2022
  • Solving the Challenges of Modern Remote Access in the Hybrid World
  • Three Best Practices for Balancing Security and Innovation in Public Cloud
  • What Is “XDR” and Why Should You Care? 
  • Ten Cyber and IT Risk Fundamentals You Must Get Right
  • A Guide to Navigating the Vendor Risk Management Market
  • A New Look at Insider Risk
  • CPS Security: Top 10 Must-Do’s
  • Do You Want to Play a Game? Leveraging Game Theory in Cyber-Risk Management
  • Outlook for Cyber-Risk Management 
  • Outlook for Privacy, 2022-2023
  • Prepare to Use Privacy-Enhancing Computation and Other Top Privacy Trends
  • Process Mining: A Game Changer for Business Process  Risk Modeling
  • Technology Supply Chain Risk Management: Where Do You Start?
  • Outlook for Network Security 2022
  • Fix What Matters: Provide DevOps Teams With Risk-Prioritized Vulnerability Guidance
  • How to Protect Confidential Data in Cloud Processing
  • Managing Open-Source Software Risks in DevSecOps Environments
  • Outlook for Application Security 2022
  • Outlook for Data Security
  • Why You Need a Cross-Functional Committee in a Data Security Program
  • Outlook for Security Operations 2022
  • Ransomware Is Inevitable: If You Can’t Prevent It, Prepare for It
  • The Future of MDR, Where Next?
  • Technical Insights: Don’t Get Burned by the Next Sunburst — How the Network Can Detect Supply Chain Attacks
  • Technical Insights: Cybersecurity Mesh Architecture — The Next Gen of Security Architecture
  • Technical Insights: Five Steps to Start the Zero Trust Journey 
  • Technical Insights: Adversary Generate Threat Intelligence
  • Technical Insights: Cloud Security 201
  • Technical Insights: Dark Data, Data Security’s Biggest Miss
  • Technical Insights: Plotting Your Course to Ransomware Defense 
  • Technical Insights: Guide to Architecting Cloud Security — Start Here for Effective Cloud Security
  • Technical Insights: Working From Home Securely — You  Need More Than ZTNA 
  • Workshop: Learning the Craft of the Ransomware Dungeon Master