The Gartner Cybersecurity Virtual Showcase Series is an exclusive virtual program featuring multiple sessions of highly contextualized content designed specifically for leaders and teams responsible for security and risk. Join us to hear from Gartner experts and your fellow leaders on the most pressing security topics and how you can address your mission critical priorities.
Register to sign up for the series and get full access to all sessions.
Data breaches, ransomware attacks and other cybersecurity challenges are on everyone’s radar, yet many businesses still struggle with effectively preparing for them. These organisations tend to lack a clear and aligned strategy that is focused on cybersecurity. Join this complimentary exclusive virtual session to learn how to create an effective cybersecurity strategy to better protect your organisation. You will also hear real-life examples from fellow security and risk executives on how they addressed these challenges and improved their cybersecurity strategy to be more efficient and effective at managing and mitigating risk.
Best practices associated with cybersecurity strategy planning
Ensure the cybersecurity strategy is appropriate to your business context
Manage cyber risk during digital transformation
Tom Scholtz
Distinguished VP Analyst
Lorna Trayan
Executive Partner
Organisational resilience is a strategic imperative, especially in the wake of the pandemic, the increasing ransomware attacks, the Russian Invasion of Ukraine and the pace of digital innovation. A resilient organisation rebounds and prospers after a business disruption because it is resistant to the impacts of disruption (through good risk management), as well as adaptive, elastic and sustainable in the face of disruption. This exclusive virtual session will help business, IT and security leaders ensure they are supporting an organisational resilience program with a focus on operational resilience.
Rebound, resume and sustain decision making quickly
Coordinate, manage and mitigate organisational risks on a continuous basis
Embeds resilience into the culture of your organisation
Roberta Witty
VP Analyst
The increase in remote work, along with the migration of applications and data to cloud services has led IT leaders to rethink security. Digital assets, and individuals, are increasingly located outside of the enterprise, which is forcing organisations to reconsider their approach to security controls. Meanwhile, cybersecurity leaders are responsible for communicating and demonstrating the value of their programs. As companies look to better prepare themselves for the significant challenges of the digital world and prove investments, how can IT and security leaders balance managing security challenges and prove value back to the business?
In this complimentary exclusive virtual session, Gartner Vice President Analyst Patrick Hevesi, will share how adopting a cybersecurity mesh architecture (CSMA) can help you overcome common security challenges and controls and prove value back to the business. We will discuss the evolution of best-of-breed to the new CSMA along with pros and cons of each approach. Plus, you’ll hear about the vendor landscape from larger security vendors with full stacks to open source/distributed cybersecurity mesh solutions.
Understand the relevance of adopting a cybersecurity mesh architecture and how to build one for your organisation
An overview of the pros and cons of the new CSMA
Steps for keeping your organisation safe from the ever-changing security threat and risk landscape
Hear from a fellow leader on how they successfully avoid security risk
Patrick Hevesi
VP Analyst
As their security operations undergo a transformation in when and how security is planned and delivered, organisations face important questions: Do we really need to centralise data for security? Is there a single solution to solve all of my security needs? How do we determine what is threat intelligence for us? This exclusive virtual session seeks to provide answers by exploring the technologies, processes and services that will have the biggest impact on how security operations are delivered in 2022 and beyond.
Consider if you need to centralise data for security
Assess if there is a single solution to address all of your security needs
Determine what constitutes threat intelligence for your organisation
Al Price
Sr Director Analyst
Already registered? Please re-enter your email address above and click "Continue" to join the webinar.