Gartner Security & Risk Management Summit
27 – 28 February 2023 | Dubai, UAE
Accelerating the Evolution of Security: Reframe and Simplify
Register Now
© 2022 Gartner, Inc. and/or its affiliates. All rights reserved. EVTM_964_2003754
DRAFT
Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2020
Enterprises are accelerating their adoption of digitalization and agile methodologies, dramatically changing their risk profiles. Many organizations continue to add layers of defense, which in turn increases the complexity of defending against the continued onslaught of more and more advanced attacks. You must evolve your security strategy by reframing your current thinking and simplifying your processes, organization and defenses. Join Gartner experts and your peers at
Gartner Security & Risk Management Summit 2023, 27 – 28 February in Dubai, UAE.
Keynotes
Our powerful lineup of keynote speakers helps you expand your thinking and discover new approaches to make smarter business decisions.
Gartner keynote
This keynote delivers a repeatable methodology, grounded in sci-fi prototyping, that will allow you to identify the threats, vulnerabilities and risks that organizations will face, and to develop the tools to fight them. We map the evolution of the new cybersecurity leader over a 10-year period, illustrating practical implementations of the methodology as it impacts with inventible barriers, fails, evolves and reemerges.
Opening Keynote: Cybersecurity 2032 — Accelerating the Evolution of Cybersecurity
Gartner keynotes
Katell Thielemann, VP Analyst
The Top Cybersecurity Predictions for 2022-2023
Richard Addiscott, Senior Director Analyst, and Jie Zhang, VP Analyst
Andrew Walls, Distinguished VP Analyst
Gartner introduces our cybersecurity value delivery benchmark. Cost and value are the levers that drive every business outcome, except cybersecurity — until now. Measuring and reporting cybersecurity value delivery and establishing a standard of care accrue many benefits and shift the landscape in cybersecurity investment and board governance. In this keynote, Distinguished VP Analyst Paul Proctor shares how this new standard will incentivize appropriate investments and execution, leading to improved protection levels globally.
Closing Keynote: Treat Cybersecurity as a Business Investment
Paul Proctor, Distinguished VP Analyst
With unprecedented tenure as head of the NSA, and over 40 years of top-level experience as a leader, Keith Alexander is among the most influential American figures of the 21st century. Paired with his experience as the first Commander to lead the U.S. Cyber Command and as IronNet Cybersecurity’s CEO and President, he’s recognized for his extraordinary contributions to the intelligence and national security affairs of the United States. Gen. Alexander offers unique insight into this turbulent time in global affairs — examining the nation’s current state of affairs and what’s on the horizon. He offers solutions for staying ahead of the threats that any organization faces to secure a prosperous future.
A Conversation With Retired Gen. Keith Alexander
Keith Alexander, Former Director of the NSA and Chairman, Co-CEO, IronNet
Guest keynotes
In this talk, Maria Konnikova combines her experience as a champion poker player with her research into the psychology of human decision making to explore how we can all learn to make better decisions in every aspect of our lives — from the negotiating table to personal relationships. How can we think probabilistically, manage our emotions, evaluate risk, distinguish the noise of chance from the elements of control, learn when to go all in and when to fold. Journey with Ms. Konnikova into the human mind, and emerge with a roadmap for how you can — immediately and practically — become a clearer thinker and more optimal decision maker in all areas of your life.
The Poker Game of Life: Using Poker to Enhance Thinking and Decision Making
Maria Konnikova, Author, Psychologist, Poker Champion and Journalist
As a cybersecurity executive who has faced down the challenges of securing huge systems and investigating the actions of America’s adversaries, Alex Stamos speaks from experience — drawing from his time leading security at Facebook and Yahoo to share today’s geopolitical drivers for information warfare.
Cybersecurity, Geopolitics and Information Warfare in the Modern Age
Alex Stamos, Former Chief of Security at Facebook and Professor at Stanford
Teams
Accelerate learning and build a shared vision by attending as a group.
Group Rate Discount
Save on registration when you attend the conference with your colleagues: 1 for every 3 paid registrations 2 for every 5 paid registrations 3 for every 7 paid registrations 4 for every 10 paid registrations
Find Out More
Tracks
Gain actionable insights from four topic-based tracks and one spotlight track that span the entire agenda.
Four tracks covering your top priorities
Gartner Predicts
Source: Gartner
A. Cybersecurity Leadership
Gartner for Technical Professionals research explores insights into the security best practices, methodologies and tools needed to ensure operational success. Sessions provide advice on architecting, implementing and operating security controls for the hybrid enterprise.
Technical Insights for Security Practitioners
Spotlight track
As the role evolves, CISOs must adapt to ensure that the organization can balance risk decisions with business goals. The CISO Circle provides targeted content, workshops and networking opportunities. Join us and form valuable connections with peers and Gartner experts. (*Application is required.)
The CISO Circle*
Identity is a critical foundation for the security of the systems that support our rapidly expanding virtual world. This track ensures you have the tools and insights to support effective identity and fraud initiatives, enabling organizational success.
Identity and Access Management
Spotlight tracks
Faced with a fragmented, interdependent world, cybersecurity leaders have less control over decisions around cyber risk than ever before. This track gives you practical guidance on how to manage security teams, and stakeholders, through the evolving threat landscape.
Spotlight tracks let you explore key topics and perspectives in detail. Understand the impact of new trends, and consider ways to support your career and business goals.
View Full Agenda
Cyber and IT Risk
Application and Data Security
Get insights to the strategic direction of infrastructure security technology. This track is designed to help you ensure that security operations keep pace with the evolving threat landscape.
B. Infrastructure Security and Operations
Spanning the cycle from developers to customers, today’s leaders face a wide, diverse array of both risks and ways to manage, mitigate and respond to them. These sessions provide practical, real-world guidance on achieving a more secure software development life cycle and data management program.
C. Application and Data Security
40% of boards of directors will have a dedicated cybersecurity committee overseen by a qualified board member, up from less than 10% today.
By 2025,
60% of CISOs will establish critical partnerships with key market-facing executives in sales, finance and marketing, up from less than 20% today.
By 2024,
C. D.
Due to new challenges and lack of agility in program management, cybersecurity leaders struggle to mature their cyber and IT risk management practices beyond conducting assessments. This track highlights the latest trends and tools to help you improve automation and models.
D. Cyber and IT Risk
Interactive
This conference is designed so you can engage with and learn from peers and Gartner experts in myriad ways:
Workshops
One-on-one sessions
Ask the Expert sessions
Gartner Magic Quadrant™ sessions
In these small-scale, interactive sessions, you drill down on specific topics with a how-to focus. (Preregistration is required.)
The Gamification of Threat Modeling Gamifying Cybersecurity: A Day in the Life of a Cybercriminal
• •
These topic-driven sessions provide a more intimate discussion forum and feature one Gartner expert and end-user peers posing questions. (Preregistration is required.)
• • • • • •
A 30-minute consultation with a Gartner expert provides targeted, personalized advice to help you plan proactively and invest wisely. (Preregistration is required.)
View All Experts
How are leading technology providers positioned to help you over the long haul? Through unique visuals and a uniform set of evaluation criteria, in several sessions we present the Gartner Magic Quadrant methodology to help you understand how well technology providers are executing against their stated vision.
Magic Quadrant for Security Service Edge (SSE) Market Guide for Data Loss Prevention Magic Quadrant and Critical Capabilities for Endpoint Protection Platform
• • •
How to Effectively Manage the Cyber Risks of the Cloud? Is Data Loss Prevention Still Worth the Price of Protection? Microsoft 365 Security Best Practices How to Build a Zero Trust Architecture How to Mitigate Software Supply Chain Security Risks Are Today’s Security Awareness Capabilities Sufficient?
Don’t miss this chance
Get objective insight and expert guidance to tackle your biggest priorities in the next normal at Gartner Security & Risk Management Summit 2023.
View Exhibitors
Exhibit Showcase
As fast as new threats emerge, new technologies are ready to strengthen defenses and build resilience. Explore the breadth of available solutions at this year’s Exhibit Showcase, where you’ll hear case studies, discover new technologies and learn how to bring it all together.
Find solutions to strengthen your defenses and improve agility.
Premier