Gartner Security & Risk Management Summit
13 – 14 February 2023 | Mumbai, India
Accelerating the Evolution of Security: Reframe and Simplify
Register Now
© 2022 Gartner, Inc. and/or its affiliates. All rights reserved. EVTM_964_2003754
DRAFT
Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2020
Enterprises are accelerating their adoption of digitalization and agile methodologies, dramatically changing their risk profiles. Many organizations continue to add layers of defense, which in turn increases the complexity of defending against the continued onslaught of more and more advanced attacks. You must evolve your security strategy by reframing your current thinking and simplifying your processes, organization and defenses. Join Gartner experts and your peers at
Gartner Security & Risk Management Summit 2023, 13 – 14 February, in Mumbai, India.
Keynotes
Our powerful lineup of keynote speakers helps you expand your thinking and discover new approaches to make smarter business decisions.
Gartner keynote
This keynote delivers a repeatable methodology, grounded in sci-fi prototyping, that will allow you to identify the threats, vulnerabilities and risks that organizations will face, and to develop the tools to fight them. We map the evolution of the new cybersecurity leader over a 10-year period, illustrating practical implementations of the methodology as it impacts with inventible barriers, fails, evolves and reemerges.
Opening Keynote: Cybersecurity 2032 — Accelerating the Evolution of Cybersecurity
Gartner keynotes
Katell Thielemann, VP Analyst
Opening Keynote: The Top Cybersecurity Predictions for 2022-2023
Andrew Walls, Distinguished VP Analyst
Gartner introduces our cybersecurity value delivery benchmark. Cost and value are the levers that drive every business outcome, except cybersecurity — until now. Measuring and reporting cybersecurity value delivery and establishing a standard of care accrue many benefits and shift the landscape in cybersecurity investment and board governance. In this keynote, Distinguished VP Analyst Paul Proctor shares how this new standard will incentivize appropriate investments and execution, leading to improved protection levels globally.
Closing Keynote: Treat Cybersecurity as a Business Investment
Paul Proctor, Distinguished VP Analyst
With unprecedented tenure as head of the NSA, and over 40 years of top-level experience as a leader, Keith Alexander is among the most influential American figures of the 21st century. Paired with his experience as the first Commander to lead the U.S. Cyber Command and as IronNet Cybersecurity’s CEO and President, he’s recognized for his extraordinary contributions to the intelligence and national security affairs of the United States. Gen. Alexander offers unique insight into this turbulent time in global affairs — examining the nation’s current state of affairs and what’s on the horizon. He offers solutions for staying ahead of the threats that any organization faces to secure a prosperous future.
A Conversation With Retired Gen. Keith Alexander
Keith Alexander, Former Director of the NSA and Chairman, Co-CEO, IronNet
Guest keynotes
In this talk, Maria Konnikova combines her experience as a champion poker player with her research into the psychology of human decision making to explore how we can all learn to make better decisions in every aspect of our lives — from the negotiating table to personal relationships. How can we think probabilistically, manage our emotions, evaluate risk, distinguish the noise of chance from the elements of control, learn when to go all in and when to fold. Journey with Ms. Konnikova into the human mind, and emerge with a roadmap for how you can — immediately and practically — become a clearer thinker and more optimal decision maker in all areas of your life.
The Poker Game of Life: Using Poker to Enhance Thinking and Decision Making
Maria Konnikova, Author, Psychologist, Poker Champion and Journalist
As a cybersecurity executive who has faced down the challenges of securing huge systems and investigating the actions of America’s adversaries, Alex Stamos speaks from experience — drawing from his time leading security at Facebook and Yahoo to share today’s geopolitical drivers for information warfare.
Cybersecurity, Geopolitics and Information Warfare in the Modern Age
Alex Stamos, Former Chief of Security at Facebook and Professor at Stanford
Teams
Accelerate learning and build a shared vision by attending as a group.
Group Rate Discount
Save on registration when you attend the conference with your colleagues: 1 for every 3 paid registrations 2 for every 5 paid registrations 3 for every 7 paid registrations 4 for every 10 paid registrations
Find Out More
Christopher Mixter, VP, Research Deepti Gopal, Director Analyst
Tracks
Gain actionable insights from four topic-based tracks and one spotlight track that spans the entire agenda.
Four tracks covering your top priorities
Gartner Predicts
Source: Gartner
A. Cybersecurity Leadership
Gartner for Technical Professionals research explores insights into the security best practices, methodologies and tools needed to ensure operational success. Sessions provide advice on architecting, implementing and operating security controls for the hybrid enterprise.
Technical Insights for Security Practitioners
Spotlight track
As the role evolves, CISOs must adapt to ensure that the organization can balance risk decisions with business goals. The CISO Circle provides targeted content, workshops and networking opportunities. Join us and form valuable connections with peers and Gartner experts. (*Application is required.)
The CISO Circle*
Identity is a critical foundation for the security of the systems that support our rapidly expanding virtual world. This track ensures you have the tools and insights to support effective identity and fraud initiatives, enabling organizational success.
Identity and Access Management
Spotlight tracks
Faced with a fragmented, interdependent world, cybersecurity leaders have less control over decisions around cyber risk than ever before. This track gives you practical guidance on how to manage security teams, and stakeholders, through the evolving threat landscape.
Spotlight tracks let you explore key topics and perspectives in detail. Understand the impact of new trends, and consider ways to support your career and business goals.
View Full Agenda
Cyber and IT Risk
Application and Data Security
Get insights to the strategic direction of infrastructure security technology. This track is designed to help you ensure that security operations keep pace with the evolving threat landscape.
B. Infrastructure Security and Operations
Spanning the cycle from developers to customers, today’s leaders face a wide, diverse array of both risks and ways to manage, mitigate and respond to them. These sessions provide practical, real-world guidance on achieving a more secure software development life cycle and data management program.
C. Application and Data Security
40% of boards of directors will have a dedicated cybersecurity committee overseen by a qualified board member, up from less than 10% today.
By 2025,
60% of CISOs will establish critical partnerships with key market-facing executives in sales, finance and marketing, up from less than 20% today.
By 2024,
C. D.
Due to new challenges and lack of agility in program management, cybersecurity leaders struggle to mature their cyber and IT risk management practices beyond conducting assessments. This track highlights the latest trends and tools to help you improve automation and models.
D. Cyber and IT Risk
Interactive
This conference is designed so you can engage with and learn from peers and Gartner experts in myriad ways:
Workshops
Ask the Expert sessions
In these small-scale, interactive sessions, you drill down on specific topics with a how-to focus. (Preregistration is required.)
Learning The Craft of the Ransomware Dungeon Master Expanding the Business Impact Analysis (BIA) to Meet Your Security, Risk and Privacy Needs Gamifying Cybersecurity — A Day in the Life of a Cybercriminal
• • •
In topic-driven end-user forums, moderated by Gartner experts, learn what peers are doing around particular issues and across industries. (Preregistration is required.)
• •
Roundtables
Cloud Security Lessons Learned: The Good, the Bad and the Ugly Security and Risk Best Practices for Midsize Enterprises
These topic-driven sessions provide a more intimate discussion forum and feature one Gartner expert and end-user peers posing questions. (Preregistration is required.)
• • • •
A 30-minute consultation with a Gartner expert provides targeted, personalized advice to help you plan proactively and invest wisely. (Preregistration is required.)
One-on-one sessions
View All Experts
How are leading technology providers positioned to help you over the long haul? Through unique visuals and a uniform set of evaluation criteria, in several sessions we present the Gartner Magic Quadrant methodology to help you understand how well technology providers are executing against their stated vision.
Gartner Magic Quadrant™ sessions
Magic Quadrant for Enterprise Network Firewalls Magic Quadrant for Security Service Edge (SSE) Magic Quadrant and Critical Capabilities for Endpoint Protection Platform Magic Quadrant and Critical Capabilities for Unified Endpoint Management
How to Mitigate Software Supply Chain Security Risks How to Build a Successful DLP Program Best Practices Building Business Aligned Security Architectures Risk-Based Vulnerability Management
Vendors are pitted against one another in a series of on-stage demos that focus on their most critical capabilities. Time is limited, and vendors do their best to show strengths and differentiators in the Gartner expert-curated use cases. Do their capabilities meet the bar? Are the offerings user-friendly?
Show Floor Showdown: Head-to-Head Live Demos From Leading Vendors
See products and services in action through narrated demos. Gain insight into capabilities focused on the top use cases. Understand commonalities and differences in vendor offerings. Interact with vendors and Gartner analysts during Q&A.
Show Floor Showdown sessions cover the following two markets:
Security Service Edge — Combines secure web gateway, cloud access security broker and zero-trust network access capabilities
API Security — Provides discovery, monitoring and protection for web APIs
Don’t miss this chance
Get objective insight and expert guidance to tackle your biggest priorities in the next normal at Gartner Security & Risk Management Summit 2023.
View Exhibitors
Exhibit Showcase
As fast as new threats emerge, new technologies are ready to strengthen defenses and build resilience. Explore the breadth of available solutions at this year’s Exhibit Showcase, where you’ll hear case studies, discover new technologies and learn how to bring it all together.
Find solutions to strengthen your defenses and improve agility.
Premier