Gartner Security & Risk Management Summit
June 7 – 10, 2022 | National Harbor, MD
Accelerating the Evolution of Security: Reframe and Simplify
Register Now
© 2022 Gartner, Inc. and/or its affiliates. All rights reserved. EVTM_951_1759395
DRAFT
Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2020
Enterprises are accelerating their adoption of digitalization and agile methodologies, dramatically changing their risk profiles. Many organizations continue to add layers of defense, which in turn increases the complexity of defending against the continued onslaught of more and more advanced attacks. You must evolve your security strategy by reframing your current thinking and simplifying your processes, organization and defenses. Join Gartner experts and your peers at
Gartner Security & Risk Management Summit 2022, June 7 – 10, in National Harbor, MD.
Keynotes
Our powerful lineup of keynote speakers helps you expand your thinking and discover new approaches to make smarter business decisions.
Gartner keynotes
Guest keynotes
Peer Case Studies
a cyberattack will so damage critical infrastructure that a member of the G20 will reciprocate with a declared physical attack.
Source: Gartner
By 2024,
Gavin Grounds, Executive Director, Governance, Risk & Compliance, Verizon
Case Study
This keynote delivers a repeatable methodology, grounded in sci-fi prototyping, that will allow you to identify the threats, vulnerabilities and risks that organizations will face, and to develop the tools to fight them. We map the evolution of the new cybersecurity leader over a 10-year period, illustrating practical implementations of the methodology as it impacts with inventible barriers, fails, evolves and reemerges.
Opening Keynote: Cybersecurity 2032 — Accelerating the Evolution of Cybersecurity
Katell Thielemann, VP Analyst
Katell Thielemann, VP Analyst Andrew Walls, Distinguished VP Analyst
Closing Keynote: Treat Cybersecurity as a Business Investment
Paul Proctor, Distinguished VP Analyst
A Conversation With Retired Gen. Keith Alexander
Former Director of the NSA and Chairman, Co-CEO, IronNet
The Poker Game of Life: Using Poker to Enhance Thinking and Decision Making
Maria Konnikova, Author, Psychologist, Poker Champion and Journalist
Cybersecurity, Geopolitics and Information Warfare in the Modern Age
Alex Stamos, Former Chief of Security at Facebook and Professor at Stanford
Andrew Walls, Distinguished VP Analyst
Gartner introduces our cybersecurity value delivery benchmark. Cost and value are the levers that drive every business outcome, except cybersecurity — until now. Measuring and reporting cybersecurity value delivery and establishing a standard of care accrue many benefits and shift the landscape in cybersecurity investment and board governance. In this keynote, Distinguished VP Analyst Paul Proctor shares how this new standard will incentivize appropriate investments and execution, leading to improved protection levels globally.
With unprecedented tenure as head of the NSA, and over 40 years of top-level experience as a leader, Keith Alexander is among the most influential American figures of the 21st century. Paired with his experience as the first Commander to lead the U.S. Cyber Command and as IronNet Cybersecurity’s CEO and President, he’s recognized for his extraordinary contributions to the intelligence and national security affairs of the United States. Gen. Alexander offers unique insight into this turbulent time in global affairs — examining the nation’s current state of affairs and what’s on the horizon. He offers solutions for staying ahead of the threats that any organization faces to secure a prosperous future.
Keith Alexander, Former Director of the NSA and Chairman, Co-CEO, IronNet
In this talk, Maria Konnikova combines her experience as a champion poker player with her research into the psychology of human decision making to explore how we can all learn to make better decisions in every aspect of our lives — from the negotiating table to personal relationships. How can we think probabilistically, manage our emotions, evaluate risk, distinguish the noise of chance from the elements of control, learn when to go all in and when to fold. Journey with Ms. Konnikova into the human mind, and emerge with a roadmap for how you can — immediately and practically — become a clearer thinker and more optimal decision maker in all areas of your life.
As a cybersecurity executive who has faced down the challenges of securing huge systems and investigating the actions of America’s adversaries, Alex Stamos speaks from experience — drawing from his time leading security at Facebook and Yahoo to share today’s geopolitical drivers for information warfare.
The Future of Cyber Risk Quantification and How Its Trending
Yogesh Mugdal, Director, Emerging Technology Risk, Citi
AI and Security
Rebecca K. Lively, Deputy Director, 90th Cyberspace Operations Squadron, U.S. Air Force
Panel
The Future of War Is Cyberwar, We’re All on the Battlefield
Christopher Raney, Technical Director for the Naval Information Warfare Center Pacific, Navy
Tracks
Gain actionable insights from three topic-based tracks and three spotlight tracks that span the entire agenda.
Eight tracks covering your top priorities
Gartner Predicts
A. Cybersecurity Leadership B. Infrastructure Security C. Application and Data Security
Midsize organizations face the same threats and manage the same vulnerabilities as large ones, but with limited people, budget and time. This track provides pragmatic advice on overcoming the resource obstacles and applying the right level of protection and risk management.
Midsize Enterprise
Spotlight tracks
Anyone in security can benefit from a greater awareness of diversity, equity and inclusion (DEI) efforts, but it is increasingly a mandatory skill set for leaders. This track helps you frame your DEI efforts with a security lens and assists you in your efforts to reduce intentional and unintentional bias.
Diversity, Equity and Inclusion
Identity is a critical foundation for the security of the systems that support our rapidly expanding virtual world. This track ensures you have the tools and insights to support effective identity and fraud initiatives, enabling organizational success.
Identity and Access Management
Faced with a fragmented, interdependent world, cybersecurity leaders have less control over decisions around cyber risk than ever before. This track gives you practical guidance on how to manage security teams, and stakeholders, through the evolving threat landscape.
A. Cybersecurity Leadership
Midsize Enterprise Diversity, Equity and Inclusion Identity and Access Management
Spotlight tracks let you explore key topics and perspectives in detail. Understand the impact of new trends, and consider ways to support your career and business goals.
View Full Agenda
D. Cyberthreat: Mitigation, Preparedness and Exposure Management
Cyber and IT Risk
Competitive Security Market Dynamics for Product Leaders
The CISO Circle Technical Insights for Security Practitioners
Hybrid work and cloud/everything as a service have reframed security around a zero-trust identity and API security. Leading organizations are simplifying the complexity for understaffed and overwhelmed teams. This track provides strategy and tactics to help you plan.
B. Infrastructure Security
Spanning the cycle from developers to customers, today’s leaders face a wide, diverse array of both risks and ways to manage, mitigate and respond to them. These sessions provide practical, real-world guidance on achieving a more secure software development life cycle and data management program.
C. Application and Data Security
SecOps is evolving from securing the business’s systems to securing its business operations as well. This track helps you understand the expanding attack surface, use automation to standardize and prepare to effectively respond to a security incident.
Due to new challenges and lack of agility in program management, cybersecurity leaders struggle to mature their cyber and IT risk management practices beyond conducting assessments. This track highlights the latest trends and tools to help you improve automation and models.
E. Cyber and IT Risk
Security product leaders must transform their offerings to be relevant in a new world and culture, rethink strategies and anticipate new buyer needs. This track focuses on helping leaders simplify and reframe current product offerings to succeed in changed markets.
F. Competitive Security Market Dynamics for Product Leaders
As the role evolves, CISOs must adapt to ensure that the organization can balance risk decisions with business goals. The CISO Circle provides targeted content, workshops and networking opportunities. Join us and form valuable connections with peers and Gartner experts. (*Application is required.)
G. The CISO Circle*
Gartner for Technical Professionals research explores insights into the security best practices, methodologies and tools needed to ensure operational success. Sessions provide advice on architecting, implementing and operating security controls for the hybrid enterprise.
H. Technical Insights for Security Practitioners
40% of boards of directors will have a dedicated cybersecurity committee overseen by a qualified board member, up from less than 10% today.
By 2025,
60% of CISOs will establish critical partnerships with key market-facing executives in sales, finance and marketing, up from less than 20% today.
G. H.
E. F.
Interactive
This conference is designed so you can engage with and learn from peers and Gartner experts in myriad ways:
Workshops
One-on-one sessions
Roundtables
Ask the Expert sessions
Gartner Magic Quadrant™ sessions
In these small-scale, interactive sessions, you drill down on specific topics with a how-to focus. (Preregistration is required.)
Adapt Security Testing Tools and Processes to Developers, and Change Organizational Culture Building a Secure Software Development Life Cycle Learning the Craft of the Ransomware Dungeon Master How to Use Science Fiction Storytelling to Communicate Our Vision of the Future Prepare for Incident Response When “Analytics” Turns “Data Breach” CISO Circle Workshop: Optimize Your Cybersecurity Tool Portfolio CISO Circle Workshop: Don’t Let Stress Burn You Out — Mindfulness 101 for Cybersecurity Leaders CISO Circle Workshop: Building Risk, Value and Cost Charts for Cybersecurity
• • • • • • • •
In topic-driven end-user forums, moderated by Gartner experts, learn what peers are doing around particular issues and across industries. (Preregistration is required.)
• • • • • • • • • • •
Making Your Multigenerational Cybersecurity Team Work (Without Bickering) Security Vendors That Midsize Enterprises Love Implementing Application Security in Agile and DevOps Processes How Do You Protect Enterprise Data With Instant Messaging? Is My SIEM an XDR? How to Measure Vulnerability Management Privacy and the Supply Chain: What to Mind With Your Service Providers The Multigenerational Workforce in Security What to Do With the New Chinese Data Security Law CISO Circle Exclusive Roundtable: Are Today’s Security Awareness Capabilities Sufficient? CISO Circle Exclusive Roundtable: How to Effectively Manage the Cyber Risks of the Cloud?
These topic-driven sessions provide a more intimate discussion forum and feature one Gartner expert and end-user peers posing questions. (Preregistration is required.)
• • • • • • • • • • • • • •
A 30-minute consultation with a Gartner expert provides targeted, personalized advice to help you plan proactively and invest wisely. (Preregistration is required.)
View All Experts
How are leading technology providers positioned to help you over the long haul? Through unique visuals and a uniform set of evaluation criteria, in several sessions we present the Gartner Magic Quadrant methodology to help you understand how well technology providers are executing against their stated vision.
Magic Quadrant for Enterprise Network Firewalls Magic Quadrant for Security Service Edge (SSE) Magic Quadrant and Critical Capabilities for Endpoint Protection Platform Magic Quadrant and Critical Capabilities for Unified Endpoint Management
• • • •
Best Practices for MFA, Passwordless Authentication and Continuous Adaptive Trust Microservices Architecture Building a Modern SOC Is Data Loss Prevention Still Worth the Price of Protection? How to Mitigate Software Supply Chain Security Risks Is XDR the Next Big Thing in Security? Or Another Passing Fad? Hands-On Privacy: Managing Personal Data Risk for Analytics and Data Science Workloads DevSecOps: What Does Success Look Like? Microsoft 365 Security Best Practices Implementing CNAPP for IaaS and PaaS Deployments How to Build a Zero Trust Architecture Best Practices for Moving From Microsoft ConfigMgr to Microsoft Endpoint Manager Risk-Based Vulnerability Management What Steps Should I Take to Build a DLP Program?
Show Floor Showdown: Head-to-Head Live Demos From Leading Vendors
Vendors are pitted against one another in a series of on-stage demos that focus on their most critical capabilities. Time is limited, and vendors do their best to show strengths and differentiators in the Gartner expert-curated use cases. Do their capabilities meet the bar? Are the offerings user-friendly?
See products and services in action through narrated demos. Gain insight into capabilities focused on the top use cases. Understand commonalities and differences in vendor offerings. Interact with vendors and Gartner analysts during Q&A.
Show Floor Showdown sessions cover the following two markets:
Security Service Edge — Combines secure web gateway, cloud access security broker and zero-trust network access capabilities
• •
API Security — Provides discovery, monitoring and protection for web APIs
Don’t miss this chance
Get objective insight and expert guidance to tackle your biggest priorities in the next normal at Gartner Security & Risk Management Summit 2022.
View Exhibitors
Exhibit Showcase
As fast as new threats emerge, new technologies are ready to strengthen defenses and build resilience. Explore the breadth of available solutions at this year’s Exhibit Showcase, where you’ll hear case studies, discover new technologies and learn how to bring it all together.
Find solutions to strengthen your defenses and improve agility.
Premier