Days
Hours
Minutes
Seconds
0
0
0
0
Building Cybersecurity Resilience in a
Complex World
Mary Mesaglio
Distinguished VP Analyst
Why you need to be here
This incredible conference helps security leaders and practitioners improve flexibility and responsiveness of security and risk management techniques and technology.
Gartner Security & Risk Management Summit offers content for every member of your security and risk management team — from technical- to senior-level strategy.
Hear what our attendees are saying
Sessions by role and topic
The Experience
More than just a conference
Immerse yourself in two days of cutting-edge security and risk content, unparalleled networking opportunities and access to leading solution providers showcasing the latest technologies.
Build new relationships, broaden your perspectives and uncover ways to solve problems alongside other security and risk leaders.
Meet your community
*An application is required and qualification criteria apply for the CISO Circle.
At the core of the conference is the Exhibit Showcase: Mingle with solution providers offering their latest technologies transforming the world of cybersecurity. Stop by the booths and learn how they can help take your business to the next level.
Exhibit Showcase
Premier Exhibitors
Join us for the latest insights and stay for the incredible hospitality at ICC Sydney.
ICC Sydney
The venue
14 Darling Drive, Sydney, New South Wales 2000, Australia
You’ll need to register for the conference before you can book your room. Gartner has reserved a limited block of hotel rooms at special hotel rates for registered attendees, so we recommend registering and booking your room as soon as possible.
Early-bird price: AU$3,275 +GST
Standard price: AU$3,825 +GST
Public-sector price: AU$3,150 +GST
Eligibility for the public-sector price will be verified; proof of
public-sector status will be required. Price cannot be applied retroactively. “Public sector” definition: National government,
state or local government, public administration.
Pricing
Receive complimentary ticket(s) when you register as a team.*
Group Rate Discount
*See Group Rate Discount terms and conditions.
Meet with a community of CISOs and chief risk officers in a program offering a curated, executive experience that delivers presentations, discussions and networking opportunities exclusively for cybersecurity and risk leaders at the top of their field.
The CISO Circle*
*Online preregistration is required. These sessions are available to end users only; space is limited.
Table of Contents
Why you need to be here
Hear what our attendees
are saying
The Experience
What’s new for 2024
Sessions by role and topic
Exhibit Showcase
Venue | Pricing
Return to Top
Return to Top
Return to Top
Return to Top
Gain mission-critical insights
Connect with
solution providers
Meet the
experts
Explore 70+ research-backed, expert-led sessions covering the most critical issues and topics affecting security and risk leaders today.
In a tech-driven world, access is everything. Evaluate 80+ vendors
at the forefront of technology and explore how they can elevate
your business.
Join 30+ Gartner researchers, speakers, advisors, practitioners
and leaders who’ve helped thousands of
C-level executives reach their business goals.
600+
attendees
40+
exhibitors
25+
Gartner
experts
4
tracks
50+
sessions
Unlimited value
Topics
Roles
AI in Cybersecurity
Cloud Security
Cyber and IT Risk Management
Infrastructure Security
Program Management and Strategy
Chief Information Security Officers
Risk Management Leaders
Security Architects and
Technical Professionals
Network, Application, Data
Security Managers
Infrastructure Security Leaders
Application Security
Recommended sessions:
Ask the Expert Technical Insights: How to Secure
Your APIs From Exploit and Abuse*
Outlook for Application Security, 2023
The 5 Dimensions of API Security
Managing Application Security Risks With Application Security Posture Management
Explore All Sessions
*Online preregistration is required. These sessions are available
to end users only; space is limited.
•
•
•
•
Cloud Security
Recommended sessions:
Explore All Sessions
Explaining Cloud Risks to an Executive Audience
Technical Insights: Build a New Discipline Around Cloud Security Architecture in Your Organization
Outlook for Cloud Security
Cloud Security 201: A Cloud Security Cookbook
•
•
•
•
Cyber and IT Risk Management
Recommended sessions:
Explore All Sessions
Outlook for Cyber-Risk Management, 2023
How to Respond to the Evolving Threat Environment, 2023
Technical Insights: The Art of Threat Modeling
Don’t Let Your AI Control You: Manage AI Trust,
Risk and Security
•
•
•
•
Infrastructure Security
Recommended sessions:
Explore All Sessions
Integrating SASE, XDR and Other Security Vendor Consolidation Trends in Security Strategy
Ask the Expert: Security Service Edge*
Ask the Expert: What’s the Best Remote Access Strategy for the Future of Work Trends*
Cloud Security 201: A Cloud Security Cookbook
•
•
•
•
*Online preregistration is required. These sessions are available
to end users only; space is limited.
*Online preregistration is required. These sessions are available
to end users only; space is limited.
Program Management and Strategy
Recommended sessions:
Explore All Sessions
The Top Predictions for Cybersecurity, 2023-2024
Ask the Expert: Communicating Effectively With Your Board About Cybersecurity*
Leadership Vision for Security and Risk Management, 2023
Accelerate Your Cybersecurity Program’s Effectiveness: 12 Tactics to Deliver Cybersecurity Business Value
•
•
•
•
*Online preregistration is required. These sessions are available to end users only; space is limited.
Chief Information Security Officers
Recommended sessions:
Explore All Sessions
Leadership Vision for Security and Risk Management 2024-2025
Overcoming the Cybersecurity Talent Crunch: 4
Must-Do Tactics
Augmented Cybersecurity Leadership — What Next?
Roundtable: Is It Time for the CISO Role to Be Elevated to Report to the Board?*
Case Study: Building a Secure and Resilient Business From the Board Down
Bust 4 Myths to Unlock Cybersecurity’s True Value
•
•
•
•
•
•
*Online preregistration is required. These sessions are available
to end users only; space is limited.
Risk Management Leaders
Recommended sessions:
Explore All Sessions
Outlook for Organizational Resilience, 2024
Introduction to Cybersecurity Operational Risk Quantification
Negotiate Protection Levels With Your Executives Top Generative AI Security Risks and Mitigations
3 Things CISOs Must Do to Enable the AI Journey Today
•
•
•
•
*Online preregistration is required. These sessions are available to end users only; space is limited.
Security Architects and Technical Professionals
Recommended sessions:
Explore All Sessions
Cybersecurity Mesh Architecture v.3.0: The Next Generation of Security Architecture
Outlook for Security Operations 2024
Top Trends for Cybersecurity 2024
Creating Cybersecurity Value Stories
Threat Model to Increase Cyber Resilience
Cyberattack, Pandemic and War: Address Third-Party Risks to Ensure Business Resiliency
Exit the Matrix: Cybersecurity Should Own Device Management End-to-End
•
•
•
•
•
•
•
*Online preregistration is required. These sessions are available
to end users only; space is limited.
Network, Application, Data
Security Managers
Recommended sessions:
Explore All Sessions
How to Apply Zero Trust to Strengthen Endpoint Security
Exit the Matrix: Cybersecurity Should Own Device Management End-to-End
Top Generative AI Security Risks and Mitigations
The 5 Tenets of Application Security
Use Continuous Cybersecurity Validation to Improve Cyber Resilience
•
•
•
•
•
*Online preregistration is required. These sessions are available
to end users only; space is limited.
Infrastructure Security Leaders
Recommended sessions:
Explore All Sessions
Outlook for Security Operations 2024
Cybersecurity Mesh Architecture v.3.0: The Next Generation of Security Architecture
Outlook for Identity and Access Management, 2024
Technical Insights: Microsoft 365 — Top 30 Security and Identity Features to Implement
How to Apply Zero Trust to Strengthen Endpoint Security
Threat Model to Increase Cyber Resilience
•
•
•
•
•
•
Workshops*
Roundtables*
Ask the Expert sessions*
Peer Conversations
Small-scale and interactive, in these sessions, attendees collaborate with peers by taking the most important topics and learning how to apply them to their business.
Attendees join peers from leading organizations and various industries to discuss relevant topics in these small-group sessions, moderated
by a Gartner expert.
These topic-driven sessions provide a more intimate discussion forum, featuring one Gartner expert and end-user peers posing questions.
Join peer-to-peer discussions organically throughout meals, coffee breaks and receptions. With 700+ attendees consisting of CISOs and security and risk management leaders, discover how others are tackling the challenges you face every day.
Learn More and Apply
Attending for the
first time?
Here are the top 5 things you must do:
Discuss challenges and winning strategies with peers across industries during interactive sessions.
Grab a drink at one of the exhibitor receptions; it’s on them.
Book time with a Gartner expert and chat about projects, priorities and plans — you’ll have their undivided attention!
Strike up a conversation with someone you don’t know at breakfast, lunch or in between sessions.
Get a lay of the land and plan your daily
schedule by downloading the Gartner
Conference Navigator app.
If you do just one of these things — download the Gartner Conference Navigator app! The session slides are housed there,
so you can focus on the content instead of taking photos during
the most important presentations. Plus, you can opt in to networking and connecting with other leaders on-site.
1.
2.
3.
4.
5.
Gartner Security & Risk
Management Summit
18 – 19 March 2024 | Sydney, Australia
Register Now
Explore More
View Agenda
Watch Testimonials
Add to Calendar
Return to Top
“
This conference covers a wide range of topics and insight that are very variable. It is a perfect event to explore different vendor capabilities and speak to industry experts on the most pressing topics relevant
to our role.”
Head of IT Security and Governance
Team Global Express
Derek Chen
IAM Leaders
FPO
View Agenda
Explore Exhibitors
View Speakers
“
Great event for networking and gaining insights into the current and future state of security. Great opportunity
to meet and discuss with Gartner analysts.”
Regional Director, Security
Splunk
Nathan Smith
“
What a superb conference, with relevant, industry-leading data, information and statistics. It was a wonderful networking opportunity, and I’ve learned so much from the best in the industry.”
Cybersecurity Compliance Consultant
TPG Telecom
Alma Sutherland
“
Great host with fantastic, relevant and honest opinions on the topics. The topics range from multilevels of business maturity and are integrated with many past and recent events. The vendors
are well-organized and keep the cyber topic exciting.”
Manager
Brunei Investment Agency
Fahmy Damit
“
This conference covers a wide range of topics and insight that are very variable. It is a perfect event to explore different vendor capabilities and speak to industry experts on the most pressing topics relevant to our role.”
Head of IT Security and Governance
Team Global Express
Derek Chen
“
Great event for networking and gaining insights into the current and future state of security. Great opportunity to meet and discuss with Gartner analysts.”
Regional Director, Security
Splunk
Nathan Smith
“
What a superb conference, with relevant, industry-leading data, information and statistics. It was a wonderful networking opportunity, and I’ve learned so much from the best in the industry.”
Cybersecurity Compliance Consultant
TPG Telecom
Alma Sutherland
“
Great host with fantastic, relevant and honest opinions on the topics. The topics range from multilevels of business maturity and are integrated with many past and recent events. The vendors are well-organized and keep the cyber topic exciting.”
Manager
Brunei Investment Agency
Fahmy Damit
Case studies
Scott Brown
Chief Information
Security Officer,
Rio Tinto
What’s new
for 2024
Explore Agenda
Return to Top
Spotlight tracks
Explore Agenda
Return to Top
In today’s interconnected and rapidly evolving digital landscape, cybersecurity resilience underscores the critical importance of adapting and fortifying your business defenses against
an array of cyberthreats. As our reliance on technology deepens, organizations and cybersecurity leaders must navigate a complex and ever-changing environment where cyberattacks can range
from sophisticated state-sponsored intrusions to opportunistic malware.
Gartner Security & Risk Management Summit
Explore More
1 for 3 paid registrations
2 for 5 paid registrations
3 for 7 paid registrations
4 for 10 paid registrations
Scott Brown is based in Brisbane and is accountable for all aspects of cybersecurity. He leads a global team constantly working to protect and defend Rio Tinto, its people and its assets. Brown worked in financial services and at the federal government before joining the Cyber team at Rio Tinto in 2016. After holding several roles within the Cyber team at Rio, he was appointed Rio Tinto’s CISO in 2022 and now oversees the Cyber function across the company’s global operations. He is passionate about working with teams to solve complex problems and stretching the boundaries in cyber, a new frontier presenting real time complexities for businesses. In addition to his IT work, Brown is a sponsor and keen advocate for Everyday Respect at Rio Tinto.
brings together experts, thought leaders and innovators
to explore the evolving landscape of digital risks and strategies for resilience. Gain insights into the multifaceted challenges of today’s complex cyber environment, addressing issues ranging from cutting-edge threat intelligence to effective incident response while emphasizing the critical role
of human factors in building resilient security systems.
Connect with 700+ chief information security officers (CISOs),
security leaders and
risk executives to exchange ideas with
peers while exploring interactive sessions.
Build your
network
Learn More
Suzy Clarke
Executive General
Manager, Security,
Xero
Suzy Clarke is responsible for improving the technical security of the global small-business platform, as well as its customers and partners. She has worked in the technology sector for 24 years, both in England and New Zealand, and prior to Xero, she held senior technology roles across a range of industries.
Exclusive content on mental health and
stress management for security and risk leaders
AI in Cybersecurity
Cybersecurity Vision and Management
Risk and Compliance Management
Application Security
Cloud Security
*Online preregistration is required. These sessions are available to end users only; space is limited.
AI in Cybersecurity
Recommended sessions:
Explore All Sessions
Top Generative AI Security Risks and Mitigations
6 Things CISOs Must Do to Enable the AI Journey Today
Ask the Expert: How to Adopt Generative AI Securely?*
Hands-On Workshop: ChatGPT Prompt Injection Challenge
•
•
•
•
*Online preregistration is required. These sessions are available
to end users only; space is limited.
Cybersecurity Vision and Management
Recommended sessions:
Explore All Sessions
Top Trends for Cybersecurity 2024
The Top Predictions of Cybersecurity for 2024
Leadership Vision for Security and Risk Management 2024-2025
6 Things CISOs Must Do to Enable the AI Journey Today
•
•
•
•
*Online preregistration is required. These sessions are available to end users only; space is limited.
Risk and Compliance
Management
Recommended sessions:
Explore All Sessions
Outlook for Cyber-Risk Management 2024
Outlook for Privacy, 2024-2025
Cyberattack, Pandemic and War: Address Third-Party Risks to Ensure Business Resiliency
Ask the Expert: Which Privacy and Data Protection Aspects Not to Overlook When Engaging Service Providers*
•
•
•
•
*Online preregistration is required. These sessions are available
to end users only; space is limited.
Application Security
Recommended sessions:
Explore All Sessions
How to Apply Zero Trust to Strengthen Endpoint Security
Threat Model to Increase Cyber Resilience
Exit the Matrix: Cybersecurity Should Own Device Management End-to-End
The 5 Tenets of Application Security
•
•
•
•
*Online preregistration is required. These sessions are available to end users only; space is limited.
Cloud Security
Recommended sessions:
Explore All Sessions
Ask the Expert: Which Privacy and Data Protection Aspects Not to Overlook When Engaging Service Providers*
Exit the Matrix: Cybersecurity Should Own Device Management End-to-End
Cybersecurity Mesh Architecture v.3.0: The Next Generation of Security Architecture
Cyberattack, Pandemic and War: Address Third-Party Risks to Ensure Business Resiliency
•
•
•
•
Security Talent and Skills Management
*Online preregistration is required. These sessions are available
to end users only; space is limited.
Security Talent and Skills Management
Recommended sessions:
Explore All Sessions
3 Key Phases to Manage Stress During a Ransomware Attack
Leadership Vision for Security and Risk Management 2024-2025
Overcoming the Cybersecurity Talent Crunch: 4 Must-Do Tactics
Creating Cybersecurity Value Stories
•
•
•
•
Identity and Access
Management
*Online preregistration is required. These sessions are available
to end users only; space is limited.
Identity and Access
Management
Recommended sessions:
Explore All Sessions
Outlook for Identity and Access Management, 2024
Improve Enterprise Resilience With Identity Hygiene, Security Posture Management and ITDR
How to Be Successful With Privileged Access Management
Outlook for Human Factors in Security 2024
•
•
•
•
*Online preregistration is required. These sessions are available
to end users only; space is limited.
IAM Leaders
Recommended sessions:
Explore All Sessions
Outlook for Identity and Access Management, 2024
Improve Enterprise Resilience With Identity Hygiene, Security Posture Management and ITDR
How to Be Successful With Privileged Access Management
Outlook for Human Factors in Security 2024
•
•
•
•
Exclusive content on
cost and value for the security function
Artificial Intelligence
Identity and Access Management
–
–
Maryam Bechtel
Chief Information
Security Officer,
AGL Energy
Maryam Bechtel has over 17 years of experience in information security and is responsible for the cyber protection of one of Australia’s most critical infrastructures, essential to the nation’s energy supply and ensuring over 4 million customers’ energy and telco needs are met. Bechtel’s career has consisted of 10 years of consulting with Deutsche Telekom and Deloitte, working with C-levels and executives in large international companies to define an overarching and achievable cybersecurity strategy. Her consulting engagements led her to gain industrywide experience across various cybersecurity domains in multiple countries, such as Germany, U.K., U.S. and Australia. She was named the “AISA Cyber Security Professional of the Year” by Australian Information Security Association in 2022 for her outstanding leadership, integrity, mentoring and coaching in the industry.
•
•
•
Toby Walsh
Scientia Professor of Artificial Intelligence, University of NSW
and CSIRO’s Data61
Guest keynote
Explore Speakers
Toby Walsh is an ARC Laureate Fellow and Scientia Professor of AI at UNSW and CSIRO Data61, and adjunct professor at QUT. He is a strong advocate for limits to ensure AI is used to improve our lives, having spoken at the UN and to heads of state, parliamentary bodies, company boards and many other bodies on this topic. He is a Fellow of the Australia Academy of Science and the winner of the prestigious Celestino Eureka Prize for Promoting Understanding of Science. He was named on the international Who’s Who in AI list of influencers. He appears regularly on TV and radio, has been profiled by The New York Times and has authored four books on AI for a general audience, the most recent ones entitled “Machines Behaving Badly” and “Faking It: Artificial Intelligence in a Human World.”