Gartner Security & Risk Management Summit
12 – 14 September 2022 | London, U.K.
Accelerating the Evolution of Security: Reframe and Simplify
Register Now
© 2022 Gartner, Inc. and/or its affiliates. All rights reserved. EVTM_951_1839763
DRAFT
Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2020
Enterprises are accelerating their adoption of digitalization and agile methodologies, dramatically changing their risk profiles. Many organizations continue to add layers of defense, which in turn increases the complexity of defending against the continued onslaught of more and more advanced attacks. You must evolve your security strategy by reframing your current thinking and simplifying your processes, organization and defenses. Join Gartner experts and your peers at
Gartner Security & Risk Management Summit 2022, 12 – 14 September, in London, U.K.
Keynotes
Our powerful lineup of keynote speakers helps you expand your thinking and discover new approaches to make smarter business decisions.
Gartner keynotes
Guest keynotes
Every year, Gartner produces impactful predictions across all practices. This presentation compiles the top predictions prepared by our cybersecurity experts for the year 2022-2023. Security and risk management leaders should monitor these trends to be successful in the digital era, especially as most recognize that global change could potentially be one crisis away.
Opening Keynote: The Top Cybersecurity Predictions for 2022-2023
Katell Thielemann, VP Analyst
Katell Thielemann, VP Analyst Nader Henein, VP Analyst
How to Get People to Care About Security and Risk
Mary Mesaglio, Managing VP
World Without Order
Peter Hinssen, Keynote Speaker, Author, nexxworks
Nader Henein, VP Analyst
It might not always feel this way, but being a chief information security officer (CISO) is a little like being a Hollywood celebrity. In fact, CISOs have a compelling story to tell about why people, from executives to frontline employees, should care about risk and security. This session delves into how to tell a great cyber story, including why it’s hard and why it matters right now.
Awaiting Copy
Tracks
Gain actionable insights from three topic-based tracks and three spotlight tracks that span the entire agenda.
Six tracks covering your top priorities
A. Cybersecurity Leadership B. Infrastructure Security and Operations C. Application and Data Security
Anyone in security can benefit from a greater awareness of diversity, equity and inclusion (DEI) efforts, but it is increasingly a mandatory skill set for leaders. This track helps you frame your DEI efforts with a security lens and assists you in your efforts to reduce intentional and unintentional bias.
Diversity, Equity and Inclusion
Spotlight tracks
Identity is a critical foundation for the security of the systems that support our rapidly expanding virtual world. This track ensures you have the tools and insights to support effective identity and fraud initiatives, enabling organizational success.
Identity and Access Management
Faced with a fragmented, interdependent world, cybersecurity leaders have less control over decisions around cyber risk than ever before. This track gives you practical guidance on how to manage security teams, and stakeholders, through the evolving threat landscape.
A. Cybersecurity Leadership
Diversity, Equity and Inclusion Identity and Access Management
Spotlight tracks let you explore key topics and perspectives in detail. Understand the impact of new trends, and consider ways to support your career and business goals.
View Full Agenda
Cyber and IT Risk
Technical Insights for Security Practitioners The CISO Circle
Hybrid work and cloud everything as a service have reframed security around a zero trust identity and API security. Security teams are understaffed and overwhelmed with the complexity of infrastructure security silos. This track provides insights into the strategic direction of infrastructure security technology and is designed to help you ensure that security operations keep pace with the evolving threat landscape.
B. Infrastructure Security and Operations
Spanning the cycle from developers to customers, today’s leaders face a wide, diverse array of both risks and ways to manage, mitigate and respond to them. These sessions provide practical, real-world guidance on achieving a more secure software development life cycle and data management program.
C. Application and Data Security
Due to new challenges and lack of agility in program management, cybersecurity leaders struggle to mature their cyber and IT risk management practices beyond conducting assessments. This track highlights the latest trends and tools to help you improve automation and models.
D. Cyber and IT Risk
As the role evolves, CISOs must adapt to ensure that the organization can balance risk decisions with business goals. The CISO Circle provides targeted content, workshops and networking opportunities. Join us and form valuable connections with peers and Gartner experts. (*Application is required.)
F. The CISO Circle*
Gartner for Technical Professionals research explores insights into the security best practices, methodologies and tools needed to ensure operational success. Sessions provide advice on architecting, implementing and operating security controls for the hybrid enterprise.
E. Technical Insights for Security Practitioners
D. E.
F.
Gartner Predicts
Source: Gartner
40% of boards of directors will have a dedicated cybersecurity committee overseen by a qualified board member, up from less than 10% today.
By 2025,
60% of CISOs will establish critical partnerships with key market-facing executives in sales, finance and marketing, up from less than 20% today.
By 2024,
Interactive
This conference is designed so you can engage with and learn from peers and Gartner experts in myriad ways:
Workshops
One-on-one sessions
Roundtables
Ask the Expert sessions
Gartner Magic Quadrant™ sessions
The Gamification of Threat Modeling Developing a Ransomware Playbook Data Residency Workshop: Managing Data in the Cloud for Europe, China, Russia and India Building a Secure Software Development Life Cycle CISO Circle Workshop: Optimize Your Cybersecurity Tool Portfolio CISO Circle Workshop: Building Risk, Value and Cost Charts for Cybersecurity CISO Circle Research Discussion: The CISO’s Guide to Cyber-Risk Quantification
• • • • • • •
In topic-driven end-user forums, moderated by Gartner experts, learn what peers are doing around particular issues and across industries. (Preregistration is required.)
• • • • • • • •
How Do You Protect Enterprise Data With Instant Messaging? Is My SIEM an XDR? How Do I Create/Provide Sufficient Data Protection? How Are You Organizing for Resilience? How to Recruit, Retain and Develop Diverse IT Security Talent Best Practices in Assessing Third-Party Security and Risk Cyberattacks Take Down Your IT — Now What? CISO Circle Roundtable: How to Nudge People to Care More About Security and Risk
These topic-driven sessions provide a more intimate discussion forum and feature one Gartner expert and end-user peers posing questions. (Preregistration is required.)
• • • • • • • • • • • • • •
A 30-minute consultation with a Gartner expert provides targeted, personalized advice to help you plan proactively and invest wisely. (Preregistration is required.)
View All Experts
How are leading technology providers positioned to help you over the long haul? Through unique visuals and a uniform set of evaluation criteria, in several sessions we present the Gartner Magic Quadrant methodology to help you understand how well technology providers are executing against their stated vision.
Magic Quadrant: Security Service Edge The Business Continuity Management Software Ecosystem
• •
Fraud Detection in Digital Channels Is XDR the Next Big Thing in Security? Or Another Passing Fad? How to Build a Successful PAM Program Office 365 Security Best Practices All Things Considered on Cybersecurity in China How to Build a Zero Trust Architecture How to Mitigate Software Supply Chain Security Risks Hands-On Privacy: Managing Personal Data Risk for Analytics and Data Science Workloads What’s the Best Remote Access Strategy for the Future of Work Trends How to Create a Formal Security Program in Midsize Enterprises Strategies and Tactics for Cloud Security Why Security and Risk Matter When Managing Vendors Creating the Insider Risk Management Program Zero Trust
In these small-scale, interactive sessions, you drill down on specific topics with a how-to focus. (Preregistration is required.)
Don’t miss this chance
Get objective insight and expert guidance to tackle your biggest priorities in the next normal at Gartner Security & Risk Management Summit 2022.
View Exhibitors
Exhibit Showcase
As fast as new threats emerge, new technologies are ready to strengthen defenses and build resilience. Explore the breadth of available solutions at this year’s Exhibit Showcase, where you’ll hear case studies, discover new technologies and learn how to bring it all together.
Find solutions to strengthen your defenses and improve agility.
Premier Plus
Premier