Build & Optimize Cybersecurity Program
Demonstrate Value & Collaborate with Business Partners
Meet Daily Cybersecurity Needs
Gartner Priorities Navigator™
for Chief Information Security Officers
Define Vision, Strategy & Operating Model
Sample aligned sessions
Determine a vision, strategy and operating model that can succeed in today’s distributed, fast-changing environment.
CISO Edge: Focus on Risk Reduction, Not on Quantifying Cybersecurity’s Value
Technical Insights: How to Create a Patching Strategy That Works for You
Understanding the Generative AI Attack Landscape
The Gartner Cybersecurity Business Value Benchmark, Second Generation
•
•
•
•
Design & Optimize Security Tools & Services
Sample aligned sessions
Select, deploy and run the security products and services that help your organization mitigate the right cybersecurity risks and enable zero trust.
AI-Enhanced SOC: Bridging the Gap to Advanced Automation in 2025
Forget the Hype: 5 Key Things You Should Be Doing to Secure Your Endpoints
The Impact of AI on VM and the Evolution of VM Prioritization
Reducing the Risks of Cybersecurity Consolidation and Converged Security Platforms
•
•
•
•
Secure Applications & Data
Sample aligned sessions
Enable secure innovation by protecting data and applications.
The 2026 Application Security Testing Market
Secure AI by Securing APIs
Business-Aligned Data Security: Why It Matters and How to Achieve It
Outlook for Application Security 2026
Source, Develop & Retain Talent
Sample aligned sessions
Develop a strategy to source, develop and retain talent on your team.
Collaboration and Culture in DevSecOps
Outlook for Human Factors in Cybersecurity 2026
••
Assess & Manage Cyber Risk (Including Third-Party Risk)
Sample aligned sessions
Enable the organization to manage risks relating to privacy, safety and reliability.
Protection From the Risk Within: Managing Insider Risk
Outlook for Cyber Resilience 2026
Addressing the Challenges of Unpredictable AI-Augmented Attacks
Mobile Hacking 201: Is Your Mobile Device Really Secure?
•
•
•
•
Enable & Protect AI
Sample aligned session
Enable organizational AI strategy through proactive governance, risk management and cybersecurity innovation.
Optimize Identity & Access Management
Sample aligned sessions
Manage and optimize an overall IAM program to support identity-first security and zero trust.
Implement Zero-Trust Strategy
Sample aligned sessions
Architect and deploy an effective zero-trust implementation.
The Role of Zero Trust to Improve Email Security
Maximize SASE Evaluations by Minimizing Complexity
Zero Trust: Quick Wins for Immediate Impact
•
••
Secure Enterprise Cloud Journeys
Sample aligned sessions
Design and implement security into cloud deployments from the inception of cloud migration plans.
Decoding the Cloud Security Alphabet Soup
Shifting Left and Right: Securing Your Clouds From Code to Runtime With CNAPP
•
•
Modernize Exposure Mgmt. & Security Operations
Sample aligned sessions
Identify and reduce cyber exposure and enable effective incident response.
Phish-Proof Your Organization: Essential Tactics for Ultimate Protection
The Ultimate Cyber Drill: Unveiling the Benefits of Threat-Led Penetration Testing
Cyberthreat Intelligence Is No Longer a Nice-to-Have, But a Need-to-Have
Building an Incident Response Strategy That Actually Works
•
•
••
Stay Current on Cybersecurity Trends
Sample aligned sessions
Keep informed about new threats, trends and Gartner’s research agenda.
Securing the Quantum Frontier: Embracing Postquantum Cryptography Today
Top Security Trends for 2026
Debate: Post Quantum Cryptography — Is Now the Time to Deploy?
Cybersecurity Isn’t Ready for Agents
•
•
•
•
Influence & Drive Secure Behaviors & Culture
Sample aligned sessions
Drive secure behavior by attending to the user experience of security controls and building cyber judgment.
Technical Insights: Secure by Design — Engineering Secure Applications
Outlook for Human Factors in Cybersecurity 2026
Debate: Is Security and Awareness Training Useful?
A Security View of the CIO and CEO Agenda for 2026
•
•
•
•
Increase Organizational Resilience
Sample aligned sessions
Improve org resilience in a world of increasing risk using foundational approaches such as business continuity management.
Protect Your APIs to Avoid Security Breaches
3 Steps to Simplify, Automate and Ensure Continuous Cybersecurity Compliance
Strategies for New CISOs to Prevent Data Leaks
•
•
•
Demonstrate Value & Collaborate with Business Partners
Improve Personal Effectiveness
Identify the skills and behaviors required to improve personal effectiveness.
•
•
Obtain Defensible Budget
Sample aligned session
Develop and gain approval for a defensible cybersecurity budget.
Get the Cybersecurity Budget You Need With Protection-Level Agreements
•
Communicate Risk & Value to Executives & Board
Sample aligned sessions
Select appropriate methods for communicating cybersecurity risk and value to executive leaders.
How to Own the Room: 5 Principles for Effective Executive Cybersecurity Communication
Get the Most Out of Your Cyber-Risk Quantification Investments
Theory to Action: 5 Keys to Make Cyber-Risk Appetite Work
How to Strengthen Cybersecurity Value
•
•
•
•
Select a topic on the Gartner Priorities Navigator to explore.
View Full Agenda
*Sessions subject to change. View the agenda for the most up-to-date listings.
Sample aligned sessions
The CISO’s Guide to Their First Year In Role
How to Strengthen Cybersecurity Value
© 2025 Gartner, Inc. and/or its affiliates. All rights reserved. EVTM_1001_3733150
Define Vision, Strategy& Operating Model
Communicate Risk & Value to Executives & Board
Obtain DefensibleBudget
Improve Personal Effectiveness
Design & Optimize Security Tools & Services
Secure Applications & Data
Source, Develop & Retain Talent
Assess & Manage Cyber Risk (Including Third-Party Risk)
Enable & Protect AI
Optimize Identity & Access Management
Implement Zero-Trust Strategy
Secure Enterprise Cloud Journeys
Increase Organizational Resilience
Influence & Drive Secure Behaviors & Culture
Stay Current on Cybersecurity Trends
Modernize Exposure Mgmt. & Security Operations
Outlook for Identity and Access Management 2026
4 Ways CISOs Must Use IAM
•
•
Build & Optimize Cybersecurity Program
Will the Rise of AI Smartphone Bring the Downfall of Endpoint Security?
Securing (Generative) AI Application Demands More Than Business as Usual
Outlook for AI and Cybersecurity 2026
•
•
•
Build & Optimize Cybersecurity Program
Build & Optimize Cybersecurity Program
Build & Optimize Cybersecurity Program
Build & Optimize Cybersecurity Program
Build & Optimize Cybersecurity Program
Build & Optimize Cybersecurity Program
Build & Optimize Cybersecurity Program
Build & Optimize Cybersecurity Program
Meet Daily Cybersecurity Needs
Meet Daily Cybersecurity Needs
Meet Daily Cybersecurity Needs
Demonstrate Value & Collaborate with Business Partners
Demonstrate Value & Collaborate with Business Partners
Demonstrate Value & Collaborate with Business Partners
•
•
•
•