Gartner Security & Risk Management Summit

September 14 – 17, 2020 | Americas | Virtual

Balance Risk, Trust and Opportunity in an Uncertain World

In today’s risk reality, you have to anticipate new cybersecurity threats, understand the ongoing implications of COVID-19, deal with disruptive technologies and build resilience in a world where nothing is certain. 

The virtual Gartner Security & Risk Management Summit 2020 is the one conference you can hear independent experts on what matters most now and how to prepare for the new normal. You’ll learn how to create agile security and IT risk management plans to manage the risk inherent in digital business and be better prepared for the next global shock. 

Want a deeper dive into the conference? View the conference brochure or the agenda.

Business

Lead digital business success by using digital design practices and defy conventional thinking during times of uncertainty to emerge as a winner.

Strategy

Start with culture change when embarking on digital transformation, instead of waiting to address it later. Join us to recognize the value of customer, citizen and employee experience in the business value proposition for digital business success.

Inspiration

Create information and technology operating models that are agile, responsive and innovative. Learn how to exploit the combined forces of data, analytics and artificial intelligence to deliver business value in and beyond the enterprise.

In this time of extraordinary turmoil, it’s even more important to come together as a community. We look forward to welcoming you to our first virtual Security & Risk Management Summit! Together, we’ll explore the latest Gartner insights and recommendations, exchange new ideas and best practices, and help one another to be resilient in the new normal.

Jeffrey Wheatman

VP Analyst and Conference Chair

CISO Circle

The CISO Circle is an exclusive program designed for Chief Information Security Officers (CISOs) to focus on their business, technology and leadership development. This program is the ideal opportunity for CISOs to connect with peers across regions and industries to share best practices and gain new perspectives on future challenges and opportunities. 

Want to stay informed?

Get conference email updates.
Contact Information

All fields are required.

  • Step 2 of 2

    Join a global community of CISOs and security and risk executives

    Whether you’re a CISO looking to improve your leadership skills, a security professional who needs practical advice to accelerate progress on your next initiative, or a business continuity management leader trying to implement resilience practices across the organization, you’ll find your program, peers and strategic partners at this conference:

    Create a strategy to drive and manage change
    • Balance the need to innovate while “keeping the lights on.”
    • Become an effective partner with business executives; shift from “order taker” to “trusted advisor.”
    • Overcome the barriers of organizational culture, resources and talent to grow and scale your digital initiatives.
    • Drive cost optimization to fund digital transformation initiatives.
    Get practical methods and long-term strategies to build a more trusted, resilient environment for digital business
    • Anticipate the emergence of advanced attacks that evade traditional security.
    • Manage the emergence of new risks with digital business, cloud, mobility and the Internet of Things.
    • Increase in citizen IT and IT activity happening without the intervention of IT.
    • Develop a security program/project that addresses identified risks and business security requirements.
    • Assist staff in understanding and responding to security audit failures, and provide security communication, awareness and training.
    Gain critical insights to measure and manage the impact of risk on digital business
    • Measure and manage the impact of risk on business performance.
    • Establish and maintain your organization’s overall IT risk management program.
    • Manage and oversee the monitoring of risk mitigation and coordination of policy and controls.
    • Implement practices that meet defined policies and standards for information risk management.
    • Determine acceptable levels of risk for the company as a whole and for various internal departments and organizations.
    • Benchmark risk management practices of other companies, understand industry best practices and monitor the legal and regulatory environment.
    Learn to implement security technologies efficiently and effectively
    • Define and assess the organization’s security strategy, architecture and practices.
    • Participate in application and infrastructure projects to provide security-planning advice.
    • Draft security procedures and standards to be reviewed by executive management. 
    • Validate security configurations and access to security infrastructure tools, including firewalls, IPSs, web application firewalls and anti-malware/endpoint protection systems.
    Gain critical insights to sustain effective IAM programs to provide the right access to the right people
    • Improve capabilities and implement technologies to establish advanced threat detection and protection.
    • Strengthen privileged access management practices to prevent breaches.
    • Manage the acceleration of multifactor authentication deployments.
    • Meet changing customer needs with customer IAM.

    Analysts Answer: Your Security Hot Topics Covered

    Get a glimpse inside the upcoming virtual conference as Sam Olyaei, Director Analyst and Ray Wagner, Managing Vice President discuss CISOs dealing with the board, cost optimization and the impact of COVID-19 on SRM leaders. 

    Tracks at a Glance

    Actionable insights across five key focus areas and three spotlight tracks. 

    Preview sessions

    Track A

    Management & Leadership

    This track provides strategies and action plans to set expectations with your teams, business and third parties. Sessions discuss top security and risk management trends and projects for 2020-2021, the leadership vision for actionable change and how to develop agile cybersecurity programs to be better prepared for global shocks.

    Track B

    Digital Risk Management

    The digital risk management track offers ideas and tools for you to innovate your risk management practices, prepare your organization to be resilient through the new normal and prepare for the next inevitable crisis.

    Track C

    Security Technology & Architecture

    This track provides insights into the security markets, best practices in adopting and using technology solutions, the potential of new and emerging technologies, and how to architect complex solutions based on a variety of delivery models in a post-COVID world.

    Track D

    Identity & Access Management

    This track ensures you have the tools and insights you need to deliver effective identity and access management (IAM) in the new normal. Improve governance and strengthen privileged access management practices to prevent breaches. Craft a robust, hybrid, multicloud strategy. Leverage customer IAM to prevent fraud and protect privacy. Accelerate your IAM using DevOps and agile approaches.

    Track E

    CISO Circle

    The CISO Circle is an exclusive forum — crafted specifically for CISOs and their peers — providing targeted research, workshops and networking opportunities for peer-to-peer interactions. Join us to form valuable and lasting connections, advance leadership opportunities and learn how to prioritize business objectives with cutting-edge advice from a variety of experts including thought leaders from Gartner and industry experts.

    Spotlight Track

    Midsize Enterprise

    The Midsize Enterprise spotlight track sessions are focused on providing pragmatic advice on overcoming resource obstacles and applying the right level of protection and risk management.

    Spotlight Track

    Diversity/Women in IT

    Diversity and inclusion have become priorities for workplace performance and workplace culture. Security and risk management leaders must shape attitudes and behaviors to achieve true acceptance and inclusion across their teams.

    Spotlight Track

    Technical Insights (GTP)

    Pragmatic steps to advance your security and risk initiatives.

    Questions?

    Ready to register?

    Secure your space now.