Gartner Security & Risk Management Summit
June 5 – 7, 2023 | National Harbor, MD gartner.com/us/securityrisk
Cybersecurity: Business-Aligned. Risk-Focused.
June 5 – 7, 2023 | National Harbor, MD
Register Now
© 2023 Gartner, Inc. and/or its affiliates. All rights reserved. EVTM_964_2184919
DRAFT
* * * *
As digital business transformation pervades the enterprise and “digital” becomes essential to get every job done, security and risk leaders must become the change agent driving secure digital transformation. No longer focused solely on defense, the security organization becomes a proactive business partner, anticipating and managing security risks in pursuit of enterprise excellence.
Gartner Security & Risk Management Summit 2023, June 5 – 7, in National Harbor, MD,
helps security and risk management leaders and practitioners to continuously improve the flexibility and responsiveness of security risk management techniques and technology to achieve mission-critical objectives.
Over 60% of organizations will embrace zero trust as a starting place for security by 2025. More than half will fail to realize the benefits.
Source: Gartner
Keynotes
Our powerful lineup of keynote speakers helps you expand your thinking and discover new approaches to make smarter business decisions.
Guest keynote
Gartner Predicts
Gartner Opening Keynote: Cutting Through the Lies That Obscure Cybersecurity’s Full Value
Leigh McMullen Distinguished VP Analyst
Gartner keynotes
Henrique Teixeira Senior Director Analyst
By 2025, 20% of anti-phishing solutions will be delivered via API integration with the email platform, up from less than 5% today.
Digital Twin of the Customer Is Here and in the Metaverse. How Will You Secure It?
Mary Mesaglio Managing Vice President
Gene Alvarez Distinguished VP Analyst
Disability and Innovation
Haben Girma Disability Rights Lawyer and Author of “Haben: The Deafblind Woman Who Conquered Harvard Law”
Through 2025, 70% of companies will deploy cyber-physical systems protection platforms as the first step in their asset-centric security journey.
Cybersecurity can generate massive value for our enterprises, but only if we have the courage to challenge the lies that we as cybersecurity professionals tell ourselves. Our self-deceptions lock us into obsolete principles and practices that prevent us from truly aligning with our executive partners and enabling our organizations. This keynote unpacks the biggest lies we must defeat, highlighting the decisions and practical steps cybersecurity leaders must take to deliver the success they deserve.
How to Get People to Care About Security and Risk
More information coming soon
Digital twins are not just for the Internet of Things and jet engines anymore. We see a future where a digital twin of your customers and citizens can be created to help you understand and predict behavior both in the real world and in the metaverse. In this presentation, we explain how security teams should secure and protect the privacy of digital twins.
Disabled people are historically the largest underrepresented group, numbering more than one billion worldwide. Reaching a group of this scale creates value for everyone: Organizations that prioritize accessibility benefit by gaining access to a much larger audience, improving the experience for both disabled and nondisabled people, and facilitating further innovation. In this engaging presentation, Haben Girma shares how she became an advocate and what we can do to make our communities more inclusive.
In this inspirational and informative presentation based on his book, “Every Tool’s a Hammer: Life Is What You Make It,” Savage shares with audiences a refreshing and insightful look into his golden rules of creativity. Drawing on his forty-plus years of experience as a maker and lessons learned along the way, Savage provides audiences with a toolbox of techniques to achieve personal and professional success. From finding what inspires you to following through on making an idea a reality, Savage encourages you to push the boundaries of what’s possible and turn your curiosities into creations.
Every Tool’s a Hammer
Adam Savage Hollywood Special Effects Designer; Editor-in-Chief, Tested.com; New York Times Bestselling Author; Former Co-Host and Executive Producer of “MythBusters”
Tracks
Gain actionable insight from seven topic-based agenda tracks and two spotlight tracks that span the entire agenda.
Seven tracks covering your top priorities
The CISO Circle
A. Cybersecurity Leadership B. Cyber and IT Risk Management C. Infrastructure Security D. Application and Data Security
Cybersecurity leaders must navigate economic uncertainty, distributed technology decisions, labor shortages and an exponentially expanding attack surface. Learn how cybersecurity leaders can excel in their roles in the face of these mission-critical challenges.
A. Cybersecurity Leadership
This track is focused on providing pragmatic guidance and applying the adequate level of protection and risk management.
Midsize Enterprise
Spotlight tracks
View Full Agenda
The CISO Circle* curates Gartner’s best insight and guidance in highly interactive sessions, purpose-built to improve your performance against the four core components of CISO effectiveness: executive influence, future risk management, workforce architecture and stress management. Join us to form valuable connections and accelerate your professional development.
*Application is required; end users only.
Explore Sessions
E. Cybersecurity Operations F. Technical Insights for Security Practitioners G. Cybersecurity Market Dynamics for
Product Leaders
This track helps you frame your DEI efforts in building your cybersecurity workforce strategy and assists in reducing the biases that may lead to overlooking an untapped, diverse pool of talent.
Diversity, Equity and Inclusion
This track covers risks relevant to privacy, supply chains and cybersecurity. Learn how to communicate value and correlate risk data to automate control monitoring and to enable decision making for the right outcomes.
B. Cyber and IT Risk Management
Explore such concepts as practical zero trust projects, vendor and product consolidation, cybersecurity mesh and security infrastructure configuration management.
C. Infrastructure Security
New technologies mean new threats and an increasing attack surface, not all of which are visible by the responsible teams. This track explores the latest developments, future roadmaps and new approaches to traditional application and data security problems.
D. Application and Data Security
This track helps security and risk management leaders increase business resilience through effective threat and exposure visibility, response planning and risk prioritization for your organization.
E. Cybersecurity Operations
The Technical Insights track leverages Gartner for Technical Professionals research to deliver actionable, technical insights into the security best practices, methodologies and tools that your organization needs to ensure operational success. Learn how to successfully design, implement and operate security controls for the hybrid enterprise.
F. Technical Insights for Security Practitioners
This track guides product leaders to simplify and reframe their current offerings to succeed in this evolution.
G. Cybersecurity Market Dynamics for Product Leaders
Interactive
This conference is designed so you can engage with and learn from peers and Gartner experts in myriad ways:
Workshops
One-on-one sessions
Roundtables
Ask the Expert sessions
In these small-scale, interactive sessions, you drill down on specific topics with a how-to focus. (Preregistration is required.)
Build an Application Security Champions Program Cyberdeterrence — Can We Stop Attacks Before They Start? Building a Secure Software Development Life Cycle Learning the Craft of the Ransomware Dungeon Master Developing a Ransomware Playbook for Incident Response Anxiety, Stress and Fatigue, Begone! Mindfulness for the Burned-Out Cybersecurity Professional
In topic-driven end-user forums, moderated by Gartner experts, learn what peers are doing around particular issues and across industries. (Preregistration is required.)
Digital Feminism: A Discussion on How to Lead and Support Women in IT Real-World Zero Trust Building a Positive Security Culture: Stories From the Field Technical Insights: Cloud Security Lessons Learned — The Good, the Bad and the Ugly How to Plan for a Successful Ransomware Tabletop Exercise
These topic-driven sessions provide a more intimate discussion forum and feature one Gartner expert and end-user peers posing questions. (Preregistration is required.)
• • • • • • • •
Get targeted, personalized advice to help you plan proactively and invest wisely in two 30-minute private sessions with the Gartner expert of your choice. (Preregistration is required.)
View All Experts
Best Practices Building Business-Aligned Security Architectures Do I Need NDR If I Have EDR and How Does NDR Add Real Value? Top Security Trends in China, 2023 Technical Insights: How to Choose the Best EPP/EDR for Your Organization How to Drive Agile/Product Team Accountability for Cybersecurity ZTNA Versus VPN: Does It Really Matter? Security Service Edge What Is Privacy Engineering and How Can It Help Organizations Adopt “Privacy by Design?”
• • • • • •
Best Practices for Security in DevOps Best Practices in Assessing Third-Party Security and Risk Security Organizational Structure Planning and Design How to Secure Cloud-Native Applications How to Manage the BCM Program Audit
• • • • •
Doing More With Less: Cybersecurity in Midsize Enterprises Zero Trust How to Measure the SOC Effectively What’s the Best Remote Access Strategy for the Future of Work Trends Make CNAPP Central to Your Cloud Security How to Secure Your APIs From Exploits and Abuse Data Security Best Practices for Moving From On-Premises Device Management to Modern Management Technical Insights: Office 365 Security Best Practices
• • • • • • • • •
Contract Negotiation Clinic
Gartner Magic Quadrant™ sessions
Gain Gartner insights, tactics and concrete guidance to help cost optimize your assets and save money when you’re preparing for vendor contract negotiations.
How are leading technology providers positioned to help you over the long haul? Through unique visuals and a uniform set of evaluation criteria, we present the Gartner Magic Quadrant™ methodology to help you understand how well technology providers are executing against their stated vision.
Magic Quadrant for Endpoint Protection Platforms Magic Quadrant and Critical Capabilities for SIEM Magic Quadrant for Security Service Edge
• • •
These sessions are for end users only. Vendors of IT security and risk products and services are not eligible to attend.
View Agendas by Role
Teams
Cybersecurity is now the No. 1 spend item on the technology investment list. In 2022, 88% of boards say that cybersecurity is a business issue, not a technical one. It’s more important than ever for all security and risk leaders to have a shared understanding of how to govern security and risk as a business issue. That’s why the conference offers content for every member of your security and risk management team — from technical- to senior-level strategy. Attend together and take a deep dive into every aspect of creating a resilient security and risk management strategy that is robust and defensible and that enables business growth and agility.
Accelerate learning and build a shared vision by attending as a group.
Save on registration when you attend the conference with your colleagues:
1 for every 3 paid registrations 2 for every 5 paid registrations 3 for every 7 paid registrations 4 for every 10 paid registrations
Group Rate Discount
Find Out More
Don’t miss this chance
Get objective insight and expert guidance to tackle your biggest priorities in the next normal at Gartner Security & Risk Management Summit 2023.
View Exhibitors
Exhibit Showcase
In a tech-driven world, access is everything — and Gartner Security & Risk Management Summit gives it to you. Connect and engage with solution providers at the forefront of technology.
Premier
When you’re looking to address a specific issue, these strategic roadmap presentations and user case studies provide real-world guidance.
Ways to engage
Solution Provider sessions
Make educated investment decisions based on objective insights from Gartner, case studies and live interactions with solution providers.
Interactive sessions
Get a snapshot of the solution landscape, driven by Gartner research. Create your solution provider shortlist based on your assessment criteria.
Meet with exhibitors and receive individual guidance tailored to your goals and challenges. You are offered tangible next steps to immediately implement solutions and achieve business priorities.
Exhibitor meetings