In 2025, security and risk leaders must navigate rapid digital changes, harness AI and counter evolving threats. Success depends on collaborating with CISOs and teams to refine strategies and fortify defenses. Thousands of security professionals trust
to deliver answers
at a conference shaped by data-driven research and insights
from countless conversations between Gartner experts and
the security community.
Test-drive solutions and tackle immediate and long-term issues with the help of leading technology providers. Visit the Exhibit Showcase to explore new products or services, gain insight from subject matter experts and engage in peer-to-peer exchanges.
Exhibit Showcase
Join us this March to get the latest actionable insight to tackle your top priorities at Gartner Security & Risk Management Summit 2025.
Engage. Innovate.
Lead.
Premier
Register Now
View All Exhibitors
This conference covers wide ranges of topics and insight which is very variable. It is a perfect event to explore different vendor capabilities and speak to industry experts on the most pressing topics relevant to our role.”
Special program at the conference
Gartner Security & Risk Management Summit has a special program available to verified CISOs and CROs to help frame insights and information even further.
Great host with fantastic, relevant and honest opinions on the topics. The topics range from a multi level of business maturity, and has integrated with many past and recent events. The [exhibitors] are well-organized and keep the cyber topic exciting.”
Derek Chen, Head of IT Security and Governance, Team Global Express
Fahmy Damit, Manager, Brunei Investment Agency
Source: Gartner
AI investments will roughly double
to $300 billion.
By 2027,
90% of finance functions will deploy at least one AI-enabled technology solution.
David Gio, Head of Risk, Techland
Good conference. Great focus on building resilience and some practical advice on where to start. Always great to catch up with peers and swap ideas. The [solution provider] engagement is good, and there were some new faces.”
2
days
800+
CISOs and
security executives
25+
Gartner experts
60+
solution providers
Conference by the numbers
Special
Programs
Attendee Testimonials
Agenda
Topics
Keynotes
Exhibit
Showcase
By 2026,
will be prioritizing leading transformation efforts.
79% of CFOs
will be prioritizing improving finance metrics, insights and storytelling.
76% of CFOs
Gartner Predicts
Explore insights from Gartner IT research
Insight
Designed specifically for chief information security officers (CISOs) and chief risk officers (CROs), the CISO Circle Program offers a curated executive experience, delivering presentations, discussions and networking opportunities throughout the conference. Apply for this program when you register for the conference, as seats for CISO Circle Program sessions are limited.
The CISO
Circle Program
Learn More and Apply
*Online preregistration is required. These sessions are available to end users only; space is limited.
View Agenda
Build new relationships, broaden your perspectives and uncover ways to solve problems alongside other CISOs and cybersecurity executives.
More than just a conference
Workshops*
Roundtables*
Signature Series
Ask the Expert sessions*
The Experience
Immerse yourself in two days of cutting-edge cybersecurity content, unparalleled networking opportunities and access to leading solution providers showcasing the latest technologies.
Executive
Stories
Gartner one-on-one meetings*
These interactive sessions explore proven solutions to real-life challenges with peers — all under
the guidance of Gartner experts. (Preregistration is required.)
Exchange insight and best practices with your peers on a specific issue
in this small-group discussion, facilitated by Gartner. (Preregistration is required.)
Pose tough questions to a single Gartner expert in an intimate,
topic-driven discussion with your peers. (Preregistration is required.)
Some of the most anticipated
insights and findings from Gartner
to get you ready for the year
ahead, including top tech trends, strategic predictions, and the
CIO executive agenda.
Hear directly from leaders across different organizations on their
real-world challenges, successes and lessons learned along the way.
One 30-minute consultations with Gartner experts provide targeted, personalized advice to help you plan proactively and invest wisely. (Preregistration is required.)
*Application and approval are required for participation.
AI in Cybersecurity
Application Security
Business Resilience and Continuity
Cloud Security
Cyber-Physical Systems Security
Cybersecurity Management Governance
and Policy
Cybersecurity Operating Model
Cybersecurity Vision and Strategy
Data Security
and Governance
Executive Communication and Metrics
Identity and Access Management
Managing
Cyber Risk
Organizational Resilience
Risk and Compliance Management
Security Monitoring, Detection and Response
Vision, Strategy and Operating Model
Zero Trust
AI to enhance threat detection and response capabilities. Implement machine learning algorithms to identify anomalies and automate security processes, staying ahead of cyber threats. Ensure AI solutions are integrated into your cybersecurity strategy to maximize efficiency and effectiveness.
Prioritize securing applications from development through deployment. Implement robust testing and monitoring to identify vulnerabilities early. Foster a security-first culture among developers to ensure applications are resilient against evolving threats.
Develop comprehensive plans to maintain operations during disruptions. Identify critical functions and implement strategies to ensure business continuity. Regularly test and update plans to adapt to new challenges and minimize downtime.
Secure your cloud environments by implementing strong access controls and encryption. Regularly assess cloud configurations and monitor for unauthorized activities. Collaborate with cloud providers to ensure compliance with security standards.
Protect interconnected physical and digital systems from cyber threats. Implement security measures across all components and continuously monitor for vulnerabilities. Ensure systems are resilient to attacks that could impact physical operations.
Establish clear governance structures and policies to guide cybersecurity efforts. Define roles and responsibilities, ensuring alignment with organizational goals. Regularly review and update policies to address emerging threats.
Design an operating model that integrates cybersecurity into all business processes. Ensure alignment with organizational objectives and adapt to changing threat landscapes. Foster collaboration across departments to enhance security posture.
Develop a clear vision and strategy for cybersecurity that aligns with business goals. Identify key priorities and allocate resources effectively. Regularly assess and adjust strategies to address evolving threats and opportunities.
Implement robust data security measures to protect sensitive information. Establish governance frameworks to ensure data integrity and compliance. Regularly audit data practices and educate employees on data protection responsibilities.
Communicate cybersecurity priorities
and metrics effectively to executives. Use clear, concise language and relevant data to highlight risks and successes. Foster executive support for cybersecurity initiatives through informed dialogue.
Strengthen IAM systems
to ensure only authorized users access sensitive resources. Implement
multi-factor authentication and role-based access controls. Regularly review and update access policies to mitigate identity-related risks.
Identify and assess
cyber risks across the organization. Implement risk mitigation strategies and continuously monitor threat landscapes. Foster a risk-aware culture to ensure proactive responses to emerging threats.
Build resilience by integrating security into
all aspects of the organization. Develop adaptive strategies to respond to disruptions and maintain critical functions. Regularly test and refine resilience plans to ensure effectiveness.
Implement comprehensive risk and compliance frameworks to protect the organization. Regularly assess risks and ensure adherence to regulatory requirements. Foster a culture of compliance to minimize legal and reputational risks.
Enhance security monitoring to detect threats in real time. Implement automated response mechanisms to mitigate risks swiftly. Continuously refine detection and response strategies to adapt to evolving threats.
Align cybersecurity vision and strategy with business objectives. Design an operating model that integrates security into all processes. Regularly assess and adjust strategies to address emerging threats and opportunities.
Implement a zero-trust model to enhance security posture. Verify all users and devices before granting access to resources. Continuously monitor and assess activities to identify and mitigate potential threats.
View Agenda
Agenda topics
Designed for CIOs and IT executives focused on these key initiatives
Dive deep into key topics for CISOs and cybersecurity leaders around AI, cybersecurity strategy and innovation, business engagement, risk management, cloud and data security and more.
© 2025 Gartner, Inc. and/or its affiliates. All rights reserved. EVTM_1001_3321228
Eligibility for the public-sector price will be verified; proof of public-sector status will be required. Price cannot be applied retroactively. “Public sector” definition: National government, state or local government, public administration.
Pricing
Attend together to gain new perspectives, get inspired and strengthen partnerships. Align on your organization’s mission-critical priorities, and focus on what drives results.
Visit the conference website for special team pricing.
Bring your leadership team
AI in Cybersecurity
Application Security
Business Resilience
and Continuity
Cloud Security
Cyber-Physical Systems Security
Cybersecurity Management Governance and Policy
Cybersecurity
Operating Model
Cybersecurity Vision
and Strategy
Data Security and Governance
Executive Communication and Metrics
Identity and Access Management
Managing Cyber Risk
Organizational Resilience
Risk and Compliance Management
Security Monitoring, Detection and Response
Vision, Strategy and Operating Model
Zero Trust
Pricing
Theater stage sessions
These brief presentations offer a snapshot of the current solution landscape. Exhibitors reveal products and Gartner experts give Magic Quadrant™ and Hype Cycle™ presentations.
Standard price:
Public-sector price:
Gartner Conference Chair and Director Analyst
Deepti Gopal
Gartner Security & Risk Management Summit
AU$3,995 + GST
AU$3,725 +GST
3 – 4 March 2025 | Sydney, Australia
Gartner Security &
Risk Management Summit
Guest keynotes
Gartner Opening Keynote
Christine Lee
VP, Research
Richard Addiscott
VP Analyst
Attend the Gartner opening keynote to explore what CISOs and cybersecurity leaders need to get right.
Harness the Hype: Turning Disruption Into Cybersecurity Opportunity
The Neuroscience of the Two Big Challenges We Face in Leadership
AI and the Future of Work: Future-Proofing Teams for the Opportunities of Tomorrow
Dr. Paul Redmond
Director of Student Experience and Enhancement, University
of Liverpool
Dr. Lila Landowski
Award-Winning Neuroscientist
The Experience
View Speakers
Expires 10 January 2025
Our organizations have grand ambitions and know they can’t ignore cybersecurity. But in our fast-paced environment, we are endangered by the extremes of unbridled technology optimism and excessive preoccupation with risk. Hype, whether driven by AI, emerging technologies or the latest headline-grabbing cyber attack, threatens to derail strategic objectives and the partnership between cybersecurity and the rest of the business. This keynote helps cybersecurity leaders exploit the power of hype to drive an innovative and adaptive cybersecurity program.
View Sessions
View Sessions
View Sessions
View Sessions
View Sessions
View Sessions
View Sessions
View Sessions
View Sessions
View Sessions
View Sessions
View Sessions
View Sessions
View Sessions
View Sessions
View Sessions
View Sessions
50% of security leaders will be
impacted by mental burnout.
By 2027,
40% of IAM leaders will primarily handle detecting and responding to breaches.
By 2026,
70% of firms will combine DLP, insider risk and IAM to spot threats.
By 2027,
assistants will introduce vulnerabilities into software by 2026.
50% of AI code
