Gartner Security & Risk Management Summit

September 14 – 17, 2020 | Americas | Virtual

Balance Risk, Trust and Opportunity in an Uncertain World

Security, identity and access management, and risk management executives joined Gartner experts virtually, over four days to share valuable insights on establishing an effective, risk-based cybersecurity program. Attendees gained the information needed to prepare for the new normal. The conference offered the tools needed to create agile security and IT risk management plans to manage the risk inherent in digital business and be better prepared for the next global shock. 

At the conference, the top 5 priorities that security and risk management leaders met on included:

  1. Acceleration of existing trends 
  2. Remote/mobile workforce
  3. Migration to cloud delivered and service led products 
  4. Migration of data center to cloud 
  5. Expansion of digital channels 

We hope you enjoyed the virtual 2020 Gartner Secuirty & Risk Management Summit!  If you missed it, be sure to explore what was covered at the conference.  We will shortly begin planning for 2021 Security & Risk Mangement Summit. We look forward to sharing the dates and program in the coming months.

Business

Lead digital business success by using digital design practices and defy conventional thinking during times of uncertainty to emerge as a winner.

Strategy

Start with culture change when embarking on digital transformation, instead of waiting to address it later. Join us to recognize the value of customer, citizen and employee experience in the business value proposition for digital business success.

Inspiration

Create information and technology operating models that are agile, responsive and innovative. Learn how to exploit the combined forces of data, analytics and artificial intelligence to deliver business value in and beyond the enterprise.

In this time of extraordinary turmoil, it’s even more important to come together as a community. At the virtual conference we explored the latest Gartner insights and recommendations, exchanged new ideas and best practices, and helped one another to be resilient in the new normal.

Jeffrey Wheatman

VP Analyst and Conference Chair

Join us in 2021

Get conference email updates.
Contact Information

All fields are required.

  • Step 2 of 2

    Join a global community of CISOs and security and risk executives

    Whether you’re a CISO looking to improve your leadership skills, a security professional who needs practical advice to accelerate progress on your next initiative, or a business continuity management leader trying to implement resilience practices across the organization, you’ll find your program, peers and strategic partners at this conference:

    A strategy to drive and manage change
    • Balance the need to innovate while “keeping the lights on.”
    • Become an effective partner with business executives; shift from “order taker” to “trusted advisor.”
    • Overcome the barriers of organizational culture, resources and talent to grow and scale your digital initiatives.
    • Drive cost optimization to fund digital transformation initiatives.
    Practical methods and long-term strategies to build a more trusted, resilient environment for digital business
    • Anticipate the emergence of advanced attacks that evade traditional security.
    • Manage the emergence of new risks with digital business, cloud, mobility and the Internet of Things.
    • Increase in citizen IT and IT activity happening without the intervention of IT.
    • Develop a security program/project that addresses identified risks and business security requirements.
    • Assist staff in understanding and responding to security audit failures, and provide security communication, awareness and training.
    Critical insights to measure and manage the impact of risk on digital business
    • Measure and manage the impact of risk on business performance.
    • Establish and maintain your organization’s overall IT risk management program.
    • Manage and oversee the monitoring of risk mitigation and coordination of policy and controls.
    • Implement practices that meet defined policies and standards for information risk management.
    • Determine acceptable levels of risk for the company as a whole and for various internal departments and organizations.
    • Benchmark risk management practices of other companies, understand industry best practices and monitor the legal and regulatory environment.
    Implement security technologies efficiently and effectively
    • Define and assess the organization’s security strategy, architecture and practices.
    • Participate in application and infrastructure projects to provide security-planning advice.
    • Draft security procedures and standards to be reviewed by executive management. 
    • Validate security configurations and access to security infrastructure tools, including firewalls, IPSs, web application firewalls and anti-malware/endpoint protection systems.
    Critical insights to sustain effective IAM programs to provide the right access to the right people
    • Improve capabilities and implement technologies to establish advanced threat detection and protection.
    • Strengthen privileged access management practices to prevent breaches.
    • Manage the acceleration of multifactor authentication deployments.
    • Meet changing customer needs with customer IAM.

    2020 Tracks at a Glance

    Explore last year's tracks built upon our latest research that addressed the challenges most critical to security & risk management leaders. 

    Track A

    Management & Leadership

    This track provides strategies and action plans to set expectations with your teams, business and third parties. Sessions discuss top security and risk management trends and projects for 2020-2021, the leadership vision for actionable change and how to develop agile cybersecurity programs to be better prepared for global shocks.

    Track B

    Digital Risk Management

    The digital risk management track offers ideas and tools for you to innovate your risk management practices, prepare your organization to be resilient through the new normal and prepare for the next inevitable crisis.

    Track C

    Security Technology & Architecture

    This track provides insights into the security markets, best practices in adopting and using technology solutions, the potential of new and emerging technologies, and how to architect complex solutions based on a variety of delivery models in a post-COVID world.

    Track D

    Identity & Access Management

    This track ensures you have the tools and insights you need to deliver effective identity and access management (IAM) in the new normal. Improve governance and strengthen privileged access management practices to prevent breaches. Craft a robust, hybrid, multicloud strategy. Leverage customer IAM to prevent fraud and protect privacy. Accelerate your IAM using DevOps and agile approaches.

    Track E

    CISO Circle

    The CISO Circle is an exclusive forum — crafted specifically for CISOs and their peers — providing targeted research, workshops and networking opportunities for peer-to-peer interactions. Join us to form valuable and lasting connections, advance leadership opportunities and learn how to prioritize business objectives with cutting-edge advice from a variety of experts including thought leaders from Gartner and industry experts.

    Spotlight Track

    Midsize Enterprise

    The Midsize Enterprise spotlight track sessions are focused on providing pragmatic advice on overcoming resource obstacles and applying the right level of protection and risk management.

    Spotlight Track

    Diversity/Women in IT

    Diversity and inclusion have become priorities for workplace performance and workplace culture. Security and risk management leaders must shape attitudes and behaviors to achieve true acceptance and inclusion across their teams.

    Spotlight Track

    Technical Insights (GTP)

    Pragmatic steps to advance your security and risk initiatives.

    Did you attend the conference?

    Access the Attendee Portal to
    view your on-demand sessions.

    Questions?