We’ve got your cloud security needs covered

Explore the conference agenda built on the latest Gartner cloud security research

We’ve built a comprehensive agenda that will help you and your organization move forward with cloud security architecture, cloud risk management, cloud application and container security in our increasingly changeable digital world.

Get up to speed with current cloud security concepts. Understand new and upcoming concepts to build your cloud security strategy and architecture.

A sample of recommended sessions includes:

  • The State of Network Security in the Work From Anywhere Era
  • How Traditional Security Vendors Could Convince CSPs to Ride Their Dead Horses
  • Five Critical Steps in the Vendor’s SASE Roadmap
  • Solving the Challenges of Modern Remote Access
  • Cloud-Native Security Operations: What Customer Security Operation Centers Are Looking For
  • Cloud Security 201: The Art and Science of Cloud Security
  • Outlook for Cloud Security 2021
  • Taming the Legal Beast: What Every CISO Should Know About Vendor Risks and Agile Cloud Contracting
  • How to Achieve Practical SASE Implementations This Year
  • Privacy Enhancing Computation for Analytics, BI and Post-Schrems II Cloud Adoption
  • Enabling Cloud-Native DevSecOps
  • Best Practices for Securing Cloud-Native Applications Built on Containers and Kubernetes
  • Plotting Your Path to a SASE Architecture

Guide to Cloud Security Concepts

Cloud security continues to be one of the most requested core topic coverage areas at Gartner. This is due to the constant drive for organizations to move their infrastructure to the cloud, and security concerns are at the top of the list. An additional challenge with cloud security is there is a constant growth of technologies, strategies and new vendors. This guide will help you understand the core concepts around cloud security, from people and process to the technology at each of the layers needed to keep pace with your cloud security strategy. 


  • Start with defining your cloud security strategy, and favor cloud-native tools augmented by third-party tools based on identified requirements.
  • Define cloud security ownership and build a cloud security architecture role and define best practices.
  • Leverage cloud access security brokers (CASBs) for cloud app risk features to automate and speed up cloud risk assessment.
  • Use CASB to protect sensitive data in approved cloud apps and to provide visibility and granular access control to unapproved cloud apps.
  • For IaaS and aPaaS, use cloud security posture management tools to provide overall visibility, and employ cloud workload protection platform vendor tools to provide workload insights across multiple clouds.

Cybersecurity, privacy, risk management and more are covered in depth at this year’s virtual conference. View Pricing

Stay informed with Gartner

Get conference email updates.
Contact Information

All fields are required.

  • Step 2 of 2