Gartner Security & Risk. Management Summit Trip Report. Overview. Manage Risk and Deliver Security in a Digital World.

Size: px
Start display at page:

Download "Gartner Security & Risk. Management Summit 2015. Trip Report. Overview. Manage Risk and Deliver Security in a Digital World."

Transcription

1 Gartner Security & Risk Management Summit 2015 June 8 11 National Harbor, MD gartner.com/us/securityrisk Manage Risk and Deliver Security in a Digital World Trip Report Gartner Security & Risk Management Summit 2015 was held on June 8 11 at the Gaylord National Resort & Convention Center in National Harbor, MD. This report summarizes and provides highlights from the event. Overview At the 21st annual Gartner Security & Risk Management Summit, attendees participated in on-site benefits, heard the latest IT security and risk management presentations from the Gartner research community on today s most pressing topics, attended workshops run by expert analysts and industry leaders, heard real-life experiences during peer case studies, engaged in analyst-user roundtables and one-on-one meetings with Gartner analysts, and checked out the latest solutions at the Solution Showcase. Attendees walked away with actionable solutions to key topics, including how to: Gain role-specific tools and strategies to stay ahead of expanding scopes of responsibility and increasing threats Align security and risk management strategies with enterprise objectives Gaylord National Resort & Convention Center Assure compliance by learning the new privacy and e-discovery regulations and requirements Apply the latest techniques to tackle risks in cloud, operational technology (OT), the Internet of Things (IoT) and IT Maximize enterprise ROI by using the latest business continuity management (BCM) and enterprise resilience practices Andrew Walls speaking at Gartner Security & Risk Management Summit 2015 Save the date Gartner Security & Risk Management Summit 2016 will take place June 13 16, in National Harbor, MD, at the Gaylord National Resort & Convention Center. Be sure to bookmark the website, gartner.com/us/securityrisk, and check back for 2016 conference updates. Table of contents 2 Findings from Gartner Security & Risk Management Summit Gartner keynotes 6 Guest keynotes 7 Conference highlights 8 Top 5 most-attended sessions 9 Snapshot of attendees 10 Sponsors 13 Post-event resources 14 Renewal 1

2 Gartner Security & Risk Management Summit 2015 June 8 11 National Harbor, MD gartner.com/us/securityrisk Findings from Gartner Security & Risk Management Summit 2015 Here are key recommendations from this year s most popular Gartner analyst sessions especially useful for your 2015 planning and strategy considerations. A11. Why Your Policy is Broken and How You Can Fix It Rob McMillan, Director Review your policy for common policy problems. Verify that you have an effective process in place for ensuring that your people are aware of the policy and its requirements. Stress-test your policy to look for potential failures. Assess the extent to which you can prove that your external providers are managing to your policy and adjust as required. Adjust your policy to address the policy problems that you identify. Implement a program to assess compliance and detect anomalies. B9. Mobile Security Threats and Trends 2015 John Girard, Vice President and Distinguished Analyst; Dionisio Zumerle, Director Review your mobile policy and identify the key participants in the enterprise mobility program. Translate your technical risk into enterprise risk, define a direction and ask for top management validation. Abandon device-centric lockdown security for app-centric models. Experiment with data-centric solutions, but be aware of immaturity. Focus your efforts on providing solutions that are tailored for mobile use and therefore obviate shadow IT practices. Act tactically: Assess your post-deployment posture, close gaps and refresh again in six to 12 months. C1. The Cloud Security Scenario Jay Heiser, Vice President Build cloud security and control competencies. Develop and enforce cloud governance policies: Data classification and risk acceptance and ownership of data and departmental applications. Manage your accounts (especially privileged ones). Ensure that you have contingency plans. Demand CSPs follow standards and provide third-party security assessments. Rob McMillan John Girard Dionisio Zumerle Jay Heiser 2

3 Findings from Gartner Security & Risk Management Summit 2015 D8. Future-Proofing IAM Ant Allan, Vice President Identify your organization s strategies for and stakeholders in digital business, IoT and the digital workplace. Determine where IAM creates unnecessary friction in the digital workplace. Get to know your IAM vendors plans to support external identity providers, ABAC and so on. Identify alternatives. Update your IAM strategic plan to reflect digital business, IoT and digital workplace goals. Develop a strategy for bimodal IAM. Plan for fundamental changes in IAM teams skills, staffing and structure. Simplify your IAM architecture and operations by embracing people-centric security principles. E9. Mobile Device Security: A Comparison of Platforms Patrick Hevesi, Director Understand the mobile threat landscape. Be cautious when investing in mobile device security apps. Set mobile OS version standards and deny older versions (ios 8, Samsung Knox, Windows 8.1). In a bring-your-own-device (BYOD) program: Choose devices with strong native controls over devices lacking adequate controls or with security settings that can be disabled by users. Alternatively, complement device controls with additional software such as managed information containers. In fully managed high-security organizations, choose hardened devices with highly granular policy management capabilities. Ant Allan Patrick Hevesi Paul E. Proctor F5. Building Advanced KRIs: Risk Metrics That Influence Business Decisions Paul E. Proctor, Vice President and Distinguished Analyst Review all of your dashboards and metrics. Define the audience they address. Determine the decisions for the audience who is influenced by the metrics. Determine the causal relationships each metric has to a business dependency. Revise your metrics to be leading indicators. Reposition. Move IT operational metrics away from business decision makers. 3

4 Gartner Security & Risk Management Summit 2015 June 8 11 National Harbor, MD gartner.com/us/securityrisk Findings from Gartner Security & Risk Management Summit 2015 (continued) G8. Software Licensing Is a Risk. Is Your Organization Managing It? Victoria Barber, Director Find out who your asset manager is. Understand the current state of software asset management in your organization. Insist that investment is made to reduce current licensing risk. Support the asset manager to develop and mature software asset management. Leverage software asset management data to identify and quantify business risk. Victoria Barber Enforce license compliance through process and controls. H13. The Current State of Cloud-Based Recovery and Continuity John P. Morency, Vice President Decide which recovery requirements must be supported now and later. Define your priorities for platform support and data replication support requirements. Evaluate vendors from a recovery assurance perspective: Define the availability, recovery and performance requirements and document them in SLA terms. John P. Morency Assess carefully the extent to which a service provider can reduce the time, cost and logistics of recovery exercising. Quantify the required implementation time, license costs and monthly services cost differences between the alternatives. Perform pricing due diligence with the finalists. Decide which provider type (if any) is most appropriate. J3. User Authentication Vendors Are Not the Only User Authentication Vendors Ant Allan, Vice President Inventory your user authentication use cases. Review how incumbent solutions meet trust, TCO and UX needs. Identify use cases in need of new methods or wholly new solutions. Identity use cases where adaptive access control can add value. Select vendors to meet the needs identified above. Plan for longer-term changes as new technologies become available. This conference is the premier conference for security and risk management professionals. The content and networking are highlights of an amazing team of analysts. Stephen Zalewski, Security Architect, Pacific Gas and Electric Company 4

5 Gartner keynotes Manage Risk and Deliver Security in a Digital World Ant Allan, Vice President; Peter Firstbrook, Vice President; Avivah Litan, Vice President and Distinguished Analyst In the opening keynote, Gartner analysts discussed how effective cybersecurity is the foundation of successful digital business. As organizations leverage new technology and business processes t o deliver services and products to global markets, security and risk managers must support achievement of enterprise objectives while mitigating security risks to an acceptable level. The analysts stressed that in order to achieve success, security and risk leaders must embrace new approaches to digital business while maintaining proven control architecture that mitigates enterprise risk. Ant Allan Cybersecurity Scenario 2020: The Impact of Digital Business on Security F. Christian Byrnes, Managing Vice President Two years ago, Gartner had provided a scenario covering the evolution of the threat environment through Today, our senior analysts have assembled a picture of how digital business will impact the security practice in that same time frame. F. Christian Byrnes explained how this is yet another key input to long-term strategic planning and showed how it will also impact business life. Peter Firstbrook The Great Race to Digital Moments Chris Howard, Vice President and Distinguished Analyst In the closing keynote, Chris Howard delved into how digital moments come in all forms: moments for customers or employees, moments of commerce and engagement, and moments where an organization needs to capitalize on something unexpected by integrating data and function on the spot. He explained how digital moments are opportunities to achieve enterprise objectives, but they also involve new risks. Our growing experience with mobility, analytics, cloud and social connectivity creates the platform to support these moments, increasingly amplified by the IoT. Howard then explored several of these digital moments and their implications for security and risk professionals. Avivah Litan F. Christian Byrnes Chris Howard 5

6 Gartner Security & Risk Management Summit 2015 June 8 11 National Harbor, MD gartner.com/us/securityrisk Guest keynotes U.S. Intelligence, Defense and Cybersecurity Strategies Leon Panetta, U.S. Secretary of Defense ( ), and Director, Central Intelligence Agency ( ) Leon Panetta discussed U.S. intelligence and cybersecurity strategies from his experience as the 23rd Secretary of Defense from 2011 through Panetta shared how he oversaw the final removal of American troops from Iraq as well as the beginning of troop withdrawals from Afghanistan. He then touched on defense strategies from when he led the effort to develop a new defense strategy to advance greater agility, protect national security and meet fiscal discipline, which in turn opened up new opportunities for everyone to serve in the military and protected benefits for wounded warriors and their families. Leon Panetta Inkjet Business Model Considered Harmful Cory Doctorow, Journalist, Science Fiction Author, Activist and Blogger Cory Doctorow discussed how the IoT is being born with the inkjet printer business model: ecosystems of devices that can only be connected with the manufacturer s approval. This allows manufacturers to command high margins for the consumables, chargers and add-ons you have to buy to keep using the stuff you already own. He then explained that the real danger comes as soon as you design a computer to thwart its owner s desires. This then sets in motion a set of security, policy and technology decisions that ends with spyware shipping out of the box on every device. Corey Doctorow 6

7 Conference highlights 6 keynotes featuring Gartner analysts and industry experts Manage Risk and Deliver Security in a Digital World Welcome Remarks and Program Roadmap Cybersecurity Scenario 2020: The Impact of Digital Business on Security Guest Keynote: U.S. Intelligence, Defense and Cybersecurity Strategies Guest Keynote: Inkjet Business Model Considered Harmful The Great Race to Digital Moments 107 Gartner track sessions Some selected topics The New CISO s Crucial First 100 Days How the Internet of Things Will Change Cybersecurity Forever Magic Quadrant for Operational Risk Management The Availability Implications for Digital Business Network Security Guide to BYOD 2015 Update Top Trends and Take-Aways for Cybersecurity 11 end-user case studies Some selected topics Information Security Is a Business Continuity Issue: Are You Ready? Top Threats, Vulnerabilities and Hiring Challenges What Is a CISO to Do? Developing a Medical Device Security Program What Makes Organizations Resilient and Why You Should Care How to Present Risk to Board-Level Management: Key Take-Aways From Visa Future of Sales in Information Security 27 roundtable discussions (Gartner-analyst-moderated) Some selected topics Using a Virtual Team to Manage IT Asset Risks What Can We Expect From the Upcoming EU Data Protection Regulation? Presenting to the Board and Executive Committees Comparing Best Practices for Cloud Risk Management Information Security Metrics What Is Information Governance Technology and How Is It Being Used? 7

8 Gartner Security & Risk Management Summit 2015 June 8 11 National Harbor, MD gartner.com/us/securityrisk Conference highlights (continued) 6 workshops Essential Communication and Conflict Resolution Skills for Security Leaders The Gartner ITScore Maturity Model for IAM Make the Business Case and Obtain BCM Program Executive Sponsorship IT Security: Planning a Self-Audit Start Your DLP Project By Making It Relevant The Language of Change: Overcoming Change Resistance and Transforming Culture 3 debate sessions Quantitative vs. Qualitative Risk Assessment We Will Fail If We Try to Protect All Data and Processes That We Own Debating Pervasive Data-at-Rest Encryption: Great Security or Grand Illusion? Join the conversation Connect with Gartner Security & Risk Management Summit on Twitter and LinkedIn. #GartnerSEC Gartner Security and Risk Management Summit Online access for one year Missed a session? Have no fear. Your ticket includes keynotes and track sessions not just those you saw live! Gartner Events On Demand provides streaming access of recorded presentations to all paid attendees for one year. Watch your favorites again and see those you missed from any Webconnected device. Visit gartnereventsondemand.com. Top 5 most-attended sessions G16. Using Storytelling to Get Your Risk Management Message Heard Jeffrey Wheatman, Director F16. GRC: What Works, What Doesn t Paul E. Proctor, Vice President and Distinguished Analyst E7. Securing Sensitive SaaS Using Cloud Access Security Brokers Ramon Krikken, Vice President D15. How to Build a Globally Legal and Successful BYOD Program John Girard, Vice President and Distinguished Analyst E9. Mobile Device Security: A Comparison of Platforms Patrick Hevesi, Director Fantastic event for any and all security professionals! Matthew Mudry, Director, IT Architecture and Security, Castleton Commodi 8

9 Snapshot of attendees Who participated in the 2015 conference? Top job titles C-level 22% 22% Director 4% Analyst 10% Vice President 20% Management Top job roles 1. Security and risk management 2. Infrastructure and operations 3. CxO 4. Enterprise architecture 5. Product management/marketing Top industry sectors 18% Banking, finance and insurance 17% Government 11% Manufacturing 7% Healthcare 3% Education 9

10 Gartner Security & Risk Management Summit 2015 June 8 11 National Harbor, MD gartner.com/us/securityrisk Thank you to our sponsors Premier Platinum 10

11 Thank you to our sponsors Platinum Silver Absolute Software Corporation Boldon James Cyphort Inspired elearning Accellion Box Darktrace Interset Software, Inc. Accelops BrandProtect Inc. Digital Defense, Inc. Invincea, Inc. Agari BrightPoint Security Digital Guardian ISACA Agiliance Brinqa Domain Tools Kaspersky Lab AhnLab Camber Corporation EdgeWave Lancope Alert Enterprise Caspida Elastica, INC. LastPass Algosec Centripetal Networks Endgame Learning Tree International Alott Communications CenturyLink ESET North America LockPath Arbor Networks, INC. Certes Networks Exabeam LogRhythm Arxan Technologies Cigital FireLayers Lookout Aujas Information Risk Services Click Security Firemon Lunarline Avatier CloudLock Fortscale ManTech Avecto BAE Systems Barracuda Networks Bay Dynamics, Inc Beyond Trust Software, INC Bit9 + Carbon Black Bitglass Bloomberg Vault Blue Coat Systems CloudPassage Cognizant Technology Solutions Continuity Logic Contrast Security Courion Corporation Cyber adapt, Inc. Cybereason Cylance Cymmetria General Dynamics Fidelis Cybersecurity Solutions Global Learning Systems Google Inc. Gurucul Hexis Cyber Solutions, Inc. Hitachi ID Systems, Inc. ICF International Identity Finder Menlo Security Modulo NetIQ Netskope Neustar Niara NSFOCUS Information Technology Co., Ltd. ObserveIT 11

12 Gartner Security & Risk Management Summit 2015 June 8 11 National Harbor, MD gartner.com/us/securityrisk Thank you to our sponsors Silver Okta Protegrity Security Innovation ThreatTrack Onapsis Quotium Securonix Thycotic OpenDNS Rapid7 SentinelOne Triumfant Palerra Recorded Future Simieo Solutions TRUSTe Panda Security RedSeal Spikes Security Tufin PhishLine.com Resilient Systems SSH Communications Security Varonis Systems, Inc. PhishLabs Return Path Stroz Friedberg Verisign Phishme RSAM Synopsys, Inc. Vidder Platfora Safenet Tanium Virtustream Portnox Secunia Tenable Network Security, Inc. Vormetric PREVALENT, INC. Security Compass The Media Trust Waratek Prevoty Security First Corp ThreatSim whitecryption Corp. ProtectWise Security Mentor ThreatStream Wombat Security Technologies Association Partners Media Partners EXECUTIVE NETWORK WITI PRIMAR Y LOGO-CMYK 12

13 Post-event resources Customizable post-event worksheet Take a moment to complete your own post-event trip report, a valuable resource for future reference and a great way to share with colleagues what you learned. Click here to access the trip report worksheet. Learn more with relevant research Want to learn more about the topics that interest you most? Turn to the end of each session presentation for a list of related Gartner research notes. Select Gartner research is available on demand at gartner.com. This conference is a great venue for meeting cyberpractitioners from various sectors and comparing experiences. Upcoming events Gartner Security & Risk Management Summit 2015 July Tokyo, Japan Gartner Security & Risk Management Summit 2015 August Sydney, Australia Gartner Security & Risk Management Summit Summit 2015 September London, U.K. Gartner Security & Risk Management Summit 2015 November 2 3 Dubai, UAE Gartner Identity & Access Management Summit 2015 December 7 9 Las Vegas, NV Sherrill Nicely, CISO, CIA The World s Most Important Gathering of CIOs and Senior IT Executives Learn more } 13

14 EARN CPE CREDITS Earn CPE credits toward (ISC)2, ISACA and DRII certification Gartner Security & Risk Management Summit 2016 June National Harbor, MD gartner.com/us/securityrisk Join us again in 2016! Register for this must-attend security and risk management event at gartner.com/us/securityrisk or call Hot topics Application, network and infrastructure security Planning for IoT security Digital business security and risk management Organizational resilience through BCM Risk management and compliance 2015 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner and ITxpo are registered trademarks of Gartner, Inc. or its affiliates. For more information, info@gartner.com or visit gartner.com.

Gartner Security & Risk Management Summit 2015

Gartner Security & Risk Management Summit 2015 EARLY-BIRD Discount Save 325 by 17 July Gartner Security & Risk Management Summit 2015 14 15 September London, UK gartnerevent.com/eu/security The World s Most Important Gathering for Security and Risk

More information

Gartner Security & Risk Management Summit 2015

Gartner Security & Risk Management Summit 2015 EARLY-BIRD Discount Save $300 by 4 September Gartner Security & Risk Management 2015 2 3 November Raffles Hotel, Dubai, UAE gartner.com/me/security Manage Risk and Deliver Security in a Digital World Hot

More information

Gartner Security & Risk Management Summit 2014

Gartner Security & Risk Management Summit 2014 Gartner Security & Risk Management Summit 2014 25 26 August Hilton Sydney, Australia gartner.com/ap/security Smart Risk Balancing Security and Opportunity Hot Topics People-Centric Security Governance

More information

Gartner IT Financial, Procurement & Asset Management Summit 2014. Trip Report. Overview

Gartner IT Financial, Procurement & Asset Management Summit 2014. Trip Report. Overview Gartner IT Financial, Procurement & Asset Management Summit 2014 Driving Business Outcomes: Control Costs, Mitigate Risks and Sustain Innovation Trip Report The Gartner IT Financial, Procurement & Asset

More information

Gartner Security & Risk Management Summit 2015

Gartner Security & Risk Management Summit 2015 EARLY-BIRD Discount Save $400 by 26 June Gartner Security & Risk Management Summit 2015 24 25 August Hilton Sydney gartner.com/ap/security Manage Risk and Deliver Security in a Digital World Hot topics

More information

Gartner Security & Risk Management Summit 2015

Gartner Security & Risk Management Summit 2015 EARLY-BIRD DISCOUNT Save 6,500 by 3 July Gartner Security & Risk Management 2015 1 2 September Mumbai, India gartner.com/in/security Manage Risk and Deliver Security in a Digital World Hot topics Cybersecurity

More information

Gartner Security & Risk Management Summit 2015

Gartner Security & Risk Management Summit 2015 EARLY-BIRD Discount Save 325 by 17 July Gartner Security & Risk Management Summit 2015 14 15 September London, UK gartner.com/eu/security The World s Most Important Gathering for Security and Risk Executives

More information

Gartner Security & Risk Management Summit 2015

Gartner Security & Risk Management Summit 2015 Gartner Security & Risk Management Summit 2015 June 8 11 I National Harbor, MD gartner.com/us/securityrisk From learning how to re-evaluate and update your security and risk strategies and investments

More information

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab: While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab: A copy of today s presentation and our Upcoming webinars Information on how to dial in if

More information

Gartner IT Infrastructure, Operations & Data Center Summit 2015

Gartner IT Infrastructure, Operations & Data Center Summit 2015 EARLY-BIRD Discount Save $400 by 20 March Celebrating 10 Years Gartner IT Infrastructure, Operations & Data Center Summit 2015 18 19 May Hilton Sydney gartner.com/ap/datacenter Transform Service Delivery

More information

Address C-level Cybersecurity issues to enable and secure Digital transformation

Address C-level Cybersecurity issues to enable and secure Digital transformation Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,

More information

Gartner Identity & Access Management Summit 2013

Gartner Identity & Access Management Summit 2013 Gartner Identity & Access Management Summit 2013 Pragmatic Futures for IAM: Meeting Business Needs at the Nexus of Forces Trip Report The annual Gartner Identity & Access Management Summit was held on

More information

Global Access to More Than 10,000 Enterprise IT Decision Makers

Global Access to More Than 10,000 Enterprise IT Decision Makers Sponsor Prospectus The world s most important gathering of CIOs and senior IT executives Global Access to More Than 10,000 Enterprise IT Decision Makers Celebrating 20 Years of Commitment and Performance

More information

Gartner Digital Workplace Summit 2016

Gartner Digital Workplace Summit 2016 EARLY-BIRD DISCOUNT Save 325 by 22 July Gartner Digital Workplace Summit 2016 21 22 September London, U.K. gartnerevents.com/eudwlearn Key Benefits of Attending Build a strategic roadmap for digital workplace

More information

Gartner Data Center, Infrastructure & Operations Management Summit 2014. Trip Report. Overview

Gartner Data Center, Infrastructure & Operations Management Summit 2014. Trip Report. Overview Gartner Data Center, Infrastructure & Operations Management Summit 2014 Leading I&O: Delivering New Levels of Innovation and Productivity Trip Report The Gartner Data Center, Infrastructure & Operations

More information

Finding The PPM Sweet Spot

Finding The PPM Sweet Spot Finding The PPM Sweet Spot How the Cloud and a Top Down Approach Can Help Drive Project Portfolio Value Featured Presenter: Daniel Stang Research Director Welcome! Thank you for joining us. A few things

More information

Gartner Business Process Management Summit 2015

Gartner Business Process Management Summit 2015 EARLY-BIRD Discount Save $400 by 27 March Gartner Business Process Management Summit 2015 1 2 June Sydney, Australia gartner.com/ap/bpm BPM Shift From Improving Process to Delivering Big Change Key Benefits

More information

The Cyber Threat Landscape

The Cyber Threat Landscape The Cyber Threat Landscape Oliver Rochford Research Director Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without

More information

Gartner Business Intelligence & Analytics Summit 2014. Trip Report. Overview. The Future of Your Business: Transparent, Decisive, Personalized

Gartner Business Intelligence & Analytics Summit 2014. Trip Report. Overview. The Future of Your Business: Transparent, Decisive, Personalized Gartner Business Intelligence & Analytics Summit 2014 21 22 October Munich, Germany gartner.com/eu/biger The Future of Your Business: Transparent, Decisive, Personalized Trip Report The Gartner Business

More information

Gartner Security & Risk Management Summit 2013

Gartner Security & Risk Management Summit 2013 Gartner Security & Risk Management Summit 2013 19 20 August Sydney, Australia gartner.com/ap/security THREE COMPLETE PROGRAMS Chief Information Security (CISO) Program Risk Management and Compliance Program

More information

Rising to the Challenge

Rising to the Challenge CYBERSECURITY: Rising to the Challenge Dialogues with Subject Matter Experts Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned

More information

o Cost containment through effective and SAP IT Procurement & negotiation strategies to help them achieve best-inclass, purchasing Asset Management

o Cost containment through effective and SAP IT Procurement & negotiation strategies to help them achieve best-inclass, purchasing Asset Management Alexa Bona s research currently focuses on IT management. As part of the IT Procurement and Asset o Workshop: Six Steps to Preparing and Negotiating Software Contracts o Negotiating effective sustainable

More information

www.pwc.com Next presentation starting soon Next Gen Customer Experience Enabled by PwC & Oracle s Cloud CRM & CX Applications

www.pwc.com Next presentation starting soon Next Gen Customer Experience Enabled by PwC & Oracle s Cloud CRM & CX Applications www.pwc.com Next presentation starting soon Next Gen Customer Experience Enabled by & Oracle s Cloud CRM & CX Applications Agenda Introductions & Customer Experience / CX Defined Why CX is Critical Today?

More information

Gartner Application Architecture, Development & Integration Summit 2014

Gartner Application Architecture, Development & Integration Summit 2014 Gartner Application Architecture, Development & Integration Summit 2014 21 22 July Hilton Sydney, Australia gartner.com/ap/aadi Transform Your Applications Strategy for a Digital World hot TOPICS Flexible

More information

Gartner Identity & Access Management Summit 2013

Gartner Identity & Access Management Summit 2013 Gartner Identity & Access Management Summit 2013 November 18 20 Los Angeles, CA gartner.com/us/iam HOT TOPICS IAM SUPPORTING MOBILE, SOCIAL, CLOUD AND INFORMATION INITIATIVES IAM BEST PRACTICES FOR DEPLOYMENT

More information

Gartner Business Intelligence, Analytics & Information Management Summit 2016

Gartner Business Intelligence, Analytics & Information Management Summit 2016 EARLY-BIRD DISCOUNT Save 6,500 by 8 April 2016 Gartner Business Intelligence, Analytics & Information Management Summit 2016 2016 SURVEY Bi/analytics GARTNER CIO AGENDA still #1 technology priority See

More information

Gartner Security & Risk. Management. Summit 2012. Visit gartner.com/us/securityrisk or call 1 866 405 2511 to register

Gartner Security & Risk. Management. Summit 2012. Visit gartner.com/us/securityrisk or call 1 866 405 2511 to register Visit gartner.com/us/securityrisk or call 1 866 405 2511 to register FIVE COMPLETE PROGRAMS CISO Program IT Security Business Continuity Management Risk Management and Compliance New! The Business of IT

More information

RSA Archer Risk Intelligence

RSA Archer Risk Intelligence RSA Archer Risk Intelligence Harnessing Risk to Exploit Opportunity June 4, 2014 Steve Schlarman GRC Strategist 1 Risk and Compliance Where is it today? 2 Governance, Risk, & Compliance Today 3 4 A New

More information

IT Security. Muscat 15+ ABOUT US IN A GLANCE

IT Security. Muscat 15+ ABOUT US IN A GLANCE www.insight.co.om insightoman insightoman insightoman insight-information-technology www.insight.co.om insightoman insightoman insightoman insight-information-technology ABOUT US LOCATION Visit us at

More information

Vendor Risk Management Financial Organizations

Vendor Risk Management Financial Organizations Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current

More information

Gartner Security & Risk Management Summit 2012

Gartner Security & Risk Management Summit 2012 Gartner Security & Risk Management Summit 2012 16 17 July 2012 Sydney, Australia gartner.com/ap/security Trip Report Strategic Roadmaps to Secure the Enterprise and Manage Risk Overview INTRODUCTION The

More information

7 things to ask when upgrading your ERP solution

7 things to ask when upgrading your ERP solution Industrial Manufacturing 7 things to ask when upgrading your ERP solution The capabilities gap between older versions of ERP designs and current designs can create a problem that many organizations are

More information

Changing Shape of the Cloud ISACA North Texas Chapter. Michael Lee Managing Principle-Cloud 214-857-6335 Michael.Lee@gdt.com

Changing Shape of the Cloud ISACA North Texas Chapter. Michael Lee Managing Principle-Cloud 214-857-6335 Michael.Lee@gdt.com Changing Shape of the Cloud ISACA North Texas Chapter Michael Lee Managing Principle-Cloud 214-857-6335 Michael.Lee@gdt.com Agenda 1. Secure Your Career Through Cloud Enablement Change today to be Indispensable

More information

Gartner Business Intelligence & Analytics Summit 2015

Gartner Business Intelligence & Analytics Summit 2015 EARLY-BIRD Discount Save 325 by 14 August Gartner Business Intelligence & Analytics Summit 2015 14 15 October Munich, Germany gartner.com/eu/biger Crossing the Analytical Divide: New Technologies, New

More information

State of Information Security

State of Information Security State of Information Security Second Annual Assessment Study 2013 Table of Contents: Synopsis and Methodology _ page 2 A Snapshot of Participants _ page 2 Survey Findings _ page 5 Final Thoughts _ page

More information

How To Get A Cloud Service For A Small Business

How To Get A Cloud Service For A Small Business Transforming SMB Security Stephen Banbury VP, Global SMB Channel & Alliances Compelling Trends for Change Symantec as a Leader in Security Winning Together 2 NOT SO LONG AGO SMB Attitudes Towards Business

More information

SharePoint and the Women in Business

SharePoint and the Women in Business June 23 25 x Gaylord Palms Resort & Convention Center x Orlando, FL Gartner Portals, Content & Collaboration Summit 2009 Post Event Brief The 2009 Gartner Portals, Content & Collaboration Summit was held

More information

Cybersecurity in the States 2012: Priorities, Issues and Trends

Cybersecurity in the States 2012: Priorities, Issues and Trends Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State

More information

Managing IT Risks During Cost-Cutting Periods

Managing IT Risks During Cost-Cutting Periods Research Publication Date: 22 October 2008 ID Number: G00162359 Managing IT Risks During Cost-Cutting Periods Mark Nicolett, Paul E. Proctor, French Caldwell To provide visibility into increased risks

More information

Leveraging Network and Vulnerability metrics Using RedSeal

Leveraging Network and Vulnerability metrics Using RedSeal SOLUTION BRIEF Transforming IT Security Management Via Outcome-Oriented Metrics Leveraging Network and Vulnerability metrics Using RedSeal november 2011 WHITE PAPER RedSeal Networks, Inc. 3965 Freedom

More information

SECURITY RISK MANAGEMENT

SECURITY RISK MANAGEMENT SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W

More information

How To Handle A Threat From A Corporate Computer System

How To Handle A Threat From A Corporate Computer System Politics of Security Webcast Summary Cyber Threat News and APT Defenses Introduction Stories about cyber espionage and Advanced Persistent Threats (APTs) are part of the mainstream news cycle. Concerns

More information

How to Choose the Best Web Content Management System for Customer Experience Management:

How to Choose the Best Web Content Management System for Customer Experience Management: white paper How to Choose the Best Web Content Management System for Customer Experience Management: A Guide for Both Marketers and Developers Table of Contents Choosing a Web CMS is about more than Content

More information

Cybersecurity Strategic Consulting

Cybersecurity Strategic Consulting Home Overview Challenges Global Resource Growth Impacting Industries Why Capgemini Capgemini & Sogeti Cybersecurity Strategic Consulting Enabling business ambitions, resilience and cost efficiency with

More information

Gartner Application Architecture, Development & Integration Summit 2016

Gartner Application Architecture, Development & Integration Summit 2016 EARLY-BIRD DISCOUNT Save $375 by 27 May Gartner Application Architecture, Development & Integration Summit 2016 25 26 July Sydney, Australia gartner.com/ap/aadi Hot topics Mobile Development Internet of

More information

Managed Security Services

Managed Security Services NEAT EVALUATION FOR UNISYS: Managed Security Services Market Segment: Overall This document presents Unisys with the NelsonHall NEAT vendor evaluation for Managed Security Services (MSS) for the Overall

More information

Process-Based Business Transformation. Todd Lohr, Practice Director

Process-Based Business Transformation. Todd Lohr, Practice Director Process-Based Business Transformation Todd Lohr, Practice Director Process-Based Business Transformation Business Process Management Process-Based Business Transformation Service Oriented Architecture

More information

Key Issues for Identity and Access Management, 2008

Key Issues for Identity and Access Management, 2008 Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research

More information

The Who, What, When, Where and Why of IAM Bob Bentley

The Who, What, When, Where and Why of IAM Bob Bentley The Who, What, When, Where and Why of IAM Bob Bentley Product Management Director October 2014 It s a Jungle Out There IAM is more than just provisioning user accounts and managing access to web pages

More information

IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices

IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices IT audit updates Current hot topics and key considerations Contents IT risk assessment leading practices IT risks to consider in your audit plan IT SOX considerations and risks COSO 2013 and IT considerations

More information

7 Steps to Guide Your Field Service Technology Purchase

7 Steps to Guide Your Field Service Technology Purchase BUY ER S G UID E 7 Steps to Guide Your Field Service Technology Purchase Field service leaders across industries are looking for ways to modernize and streamline their service organizations. With increasingly

More information

Security Risk Management Strategy in a Mobile and Consumerised World

Security Risk Management Strategy in a Mobile and Consumerised World Security Risk Management Strategy in a Mobile and Consumerised World RYAN RUBIN (Msc, CISSP, CISM, QSA, CHFI) PROTIVITI Session ID: GRC-308 Session Classification: Intermediate AGENDA Current State Key

More information

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation White Paper Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation Table of Contents Introduction... 3 Common DDoS Mitigation Measures...

More information

Agenda Overview for Social Marketing, 2015

Agenda Overview for Social Marketing, 2015 G00270737 Agenda Overview for Social Marketing, 2015 Published: 19 December 2014 Analyst(s): Julie Hopkins Social marketing programs are maturing; executives increasingly expect ROI to follow social marketing

More information

Architecting the Digital Business: How to Use and Secure Cloud, Mobile and Data

Architecting the Digital Business: How to Use and Secure Cloud, Mobile and Data NEW EvENt FOR 2014! 17 18 June 2014 london, uk gartner.com/eu/catalyst FOR technologists, BY technologists Architecting Digital : How to Use and Secure, and Data HOT TOPICS Securing public cloud Making

More information

Cybersecurity Awareness for Executives

Cybersecurity Awareness for Executives SESSION ID: SOP-R04 Cybersecurity Awareness for Executives Rob Sloan Head of Cyber Content and Data Dow Jones @_rob_sloan Session Overview Aim: Provide a high level overview of an effective cybersecurity

More information

PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud

PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud Blue skies ahead? Yes if you are protected when you move to the cloud. Lately, it seems as if every enterprise

More information

Key Trends, Issues and Best Practices in Compliance 2014

Key Trends, Issues and Best Practices in Compliance 2014 Key Trends, Issues and Best Practices in Compliance 2014 What Makes This Survey Different Research conducted by independent third party Clients and non-clients 301 executive decision makers 35 qualitative

More information

Asia Pacific the Future of Cloud Computing

Asia Pacific the Future of Cloud Computing Asia Pacific the Future of Cloud Computing Presented by the CSA and CEPREI 1-3 December 2015 Guangzhou, China The 1-3 December 2015 Guangzhou, China Contents Backgroud Why Join the CSA APAC Congress Why

More information

Logging In: Auditing Cybersecurity in an Unsecure World

Logging In: Auditing Cybersecurity in an Unsecure World About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

Indianapolis November 17 th South Bend November 18 th. Sponsored by

Indianapolis November 17 th South Bend November 18 th. Sponsored by Indianapolis November 17 th South Bend November 18 th Sponsored by Today's Agenda Today s Agenda 8:30 AM Registration & Welcome Breakfast 9:00 AM Keynote & Microsoft Roadmap 9:30 AM Business Enablement

More information

Whitepaper. Mobile Security. The 5 Questions Modern Organizations Are Asking

Whitepaper. Mobile Security. The 5 Questions Modern Organizations Are Asking Mobile Security The 5 Questions Modern Organizations Are Asking Whether you ve already embraced enterprise mobility or are just starting to consider it, today s organizations are concerned about the lack

More information

Governance, Risk, and Compliance (GRC) White Paper

Governance, Risk, and Compliance (GRC) White Paper Governance, Risk, and Compliance (GRC) White Paper Table of Contents: Purpose page 2 Introduction _ page 3 What is GRC _ page 3 GRC Concepts _ page 4 Integrated Approach and Methodology page 4 Diagram:

More information

Cisco Cloud Enablement Services for Adopting Clouds

Cisco Cloud Enablement Services for Adopting Clouds Cisco Cloud for Adopting Clouds Cisco Cloud for Adopting Clouds help you understand which applications you need to migrate; build business justifications for migrating your applications to a public cloud

More information

14 October 2015 ISACA Curaçao Conference By: Paul Helmich

14 October 2015 ISACA Curaçao Conference By: Paul Helmich Governance, Risk & Compliance A practical approach 14 October 2015 ISACA Curaçao Conference By: Paul Helmich Topics today What is GRC? How much of all the GRC literature, tools, etc. do I need to study

More information

Information Security Forum Sponsorship Programs

Information Security Forum Sponsorship Programs Information Security Forum Sponsorship Programs About IANS IANS is an information security advisory and consulting firm, serving Fortune 1000 information security professionals with in-depth insights and

More information

S 2 ERC Project: A Review of Return on Investment for Cybersecurity. Author: Joe Stuntz, MBA EP 14, McDonough School of Business.

S 2 ERC Project: A Review of Return on Investment for Cybersecurity. Author: Joe Stuntz, MBA EP 14, McDonough School of Business. S 2 ERC Project: A Review of Return on Investment for Cybersecurity Author: Joe Stuntz, MBA EP 14, McDonough School of Business Date: 06 May 2014 Abstract Many organizations are looking at investing in

More information

Cyber security in healthcare

Cyber security in healthcare Cyber security in healthcare Julian Meyrick, Vice President IBM Security Services Europe julian_meyrick@uk.ibm.com Healthcare is one of the top 5 industries that continue to offer attackers the most significant

More information

IT Operations Management. Intelligent. Integrated. Innovative.

IT Operations Management. Intelligent. Integrated. Innovative. IT Operations Management Intelligent. Integrated. Innovative. Who We Are We are Symphony SUMMIT. We offer intelligent, integrated, and innovative solutions for managing IT operations. Our mantra is to

More information

Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity

Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity Research Publication Date: 11 August 2011 ID Number: G00215300 Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity John P Morency, Donna Scott, Dave Russell For the

More information

Partnership prospectus

Partnership prospectus Partnership prospectus Why NextGen Government, why now? Ground breaking progress has been made in the approach to digital government over the last few years, which the new Digital Transformation Office

More information

DEPARTMENT AGENCY STATEMENT OF OBJECTIVES FOR CLOUD MIGRATION SERVICES: INVENTORY, APPLICATION MAPPING, AND MIGRATION PLANNING MONTH YYYY TEMPLATE

DEPARTMENT AGENCY STATEMENT OF OBJECTIVES FOR CLOUD MIGRATION SERVICES: INVENTORY, APPLICATION MAPPING, AND MIGRATION PLANNING MONTH YYYY TEMPLATE DEPARTMENT AGENCY STATEMENT OF OBJECTIVES FOR CLOUD MIGRATION SERVICES: INVENTORY, APPLICATION MAPPING, AND MIGRATION PLANNING MONTH YYYY TEMPLATE 1 Introduction and Instructions This sample Statement

More information

Gartner Identity & Access Management Summit 2015

Gartner Identity & Access Management Summit 2015 EARLY-BIRD Discount Save 300 by 16 January 2015 Gartner Identity & Access Management Summit 2015 16 17 March London, UK gartnerevent.com/eu/iam Successful IAM Simple, Business Driven and Secure Key benefits

More information

Sponsorship Opportunities 5-2016. Thomas Odams. Events Manager, EMEA, RANT Events t: 0203 119 3387 m: 07827 870 359 todams@rantevents.

Sponsorship Opportunities 5-2016. Thomas Odams. Events Manager, EMEA, RANT Events t: 0203 119 3387 m: 07827 870 359 todams@rantevents. Sponsorship Opportunities 5-2016 Thomas Odams Events Manager, EMEA, RANT Events t: 0203 119 3387 m: 07827 870 359 todams@rantevents.com About The RANT Forum (Risk and Network Threat Forum) The RANT Forum

More information

Symantec Cyber Security Services: DeepSight Intelligence

Symantec Cyber Security Services: DeepSight Intelligence Symantec Cyber Security Services: DeepSight Intelligence Actionable intelligence to get ahead of emerging threats Overview: Security Intelligence Companies face a rapidly evolving threat environment with

More information

Whitepaper. Mobile Security. The 5 Questions Modern Organisations Are Asking

Whitepaper. Mobile Security. The 5 Questions Modern Organisations Are Asking Mobile Security The 5 Questions Modern Organisations Are Asking Whether you ve already embraced enterprise mobility or are just starting to consider it, today s organisations are concerned about the lack

More information

How To Understand Cloud Economics

How To Understand Cloud Economics WHITE PAPER Cloud Economics: A Financial Analysis of Information Management IT Delivery Models Sponsored by: Viewpointe LLC Michael Versace October 2013 Randy Perry IDC OPINION Executive Summary Cost optimization

More information

Managing Web Security in an Increasingly Challenging Threat Landscape

Managing Web Security in an Increasingly Challenging Threat Landscape Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.

More information

CIBECS / IDG Connect DATA LOSS SURVEY. The latest statistics and trends around user data protection for business. www.cibecs.

CIBECS / IDG Connect DATA LOSS SURVEY. The latest statistics and trends around user data protection for business. www.cibecs. CIBECS / IDG Connect 2014 DATA LOSS SURVEY The latest statistics and trends around user data protection for business. REPORT www.cibecs.com 2 Table of ontents EXECUTIVE 01 02 03 04 05 06 SUMMARY WHO PARTICIPATED

More information

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation

More information

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL BY 2 In enterprise IT, there is a single point where everything that matters in information, technology and business converges: Cybersecurity Nexus

More information

Gartner Business Intelligence & Analytics Summit 2016

Gartner Business Intelligence & Analytics Summit 2016 EARLY-BIRD DISCOUNT Save 325 by 12 August 2016 Gartner Business Intelligence & Analytics Summit 2016 10 11 October Munich, Germany gartnerevents.com/debibrochure Analytics Leadership: Empowerment Without

More information

CYBER RISK INTERNATIONAL COMPANY PROFILE

CYBER RISK INTERNATIONAL COMPANY PROFILE CYBER RISK INTERNATIONAL COMPANY PROFILE About Us Robert Madelin, the EU Commission s director general overseeing digital matters, has warned about a clear and present danger of cyber attacks in Europe.

More information

The Cloud App Visibility Blindspot

The Cloud App Visibility Blindspot The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before

More information

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

The Changing IT Risk Landscape Understanding and managing existing and emerging risks The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015

More information

Statement of Direction

Statement of Direction Mobile First: Taking Mobile CRM to the Next Level 1 January 2013 Mobile First: Taking Mobile CRM to the Next Level Whitepaper Mobile First: Taking Mobile CRM to the Next Level 2 Table of Contents Notes...

More information

Enterprise level security, the Huddle way.

Enterprise level security, the Huddle way. Enterprise level security, the Huddle way. Security whitepaper TABLE OF CONTENTS 5 Huddle s promise Hosting environment Network infrastructure Multiple levels of security Physical security System & network

More information

Westcon Presentation on Security Innovation, Opportunity, and Compromise

Westcon Presentation on Security Innovation, Opportunity, and Compromise Westcon Presentation on Security Innovation, Opportunity, and Compromise Christian A. Christiansen Program Vice President IDC Security Products & Services What s Happening with Threats? 1.5B 80% 33% $1.3M

More information

MAD about Mobile Business Intelligence

MAD about Mobile Business Intelligence Session ID: UGF9226 Venue / Room: Moscone South - 308 Date and Time: 9/28/14, 13:30-14:15 MAD about Mobile Business Intelligence Leveraging the new Mobile App Designer to Empower your Organization October

More information

Gartner Application Architecture, Development & Integration Summit 2015

Gartner Application Architecture, Development & Integration Summit 2015 EARLY-BIRD Discount Save $400 by 22 May Gartner Application Architecture, Development & Integration Summit 2015 20 21 July Hilton Sydney gartner.com/ap/aadi Innovate and Renovate to Dominate in the New

More information

Obtaining Enterprise Cybersituational

Obtaining Enterprise Cybersituational SESSION ID: SPO-R06A Obtaining Enterprise Cybersituational Awareness Eric J. Eifert Sr. Vice President Managed Security Services DarkMatter Agenda My Background Key components of the Cyber Situational

More information

NERC CIP VERSION 5 COMPLIANCE

NERC CIP VERSION 5 COMPLIANCE BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining

More information

Gartner IT Infrastructure, Operations & Data Center Summit 2016

Gartner IT Infrastructure, Operations & Data Center Summit 2016 EARLY-BIRD DISCOUNT Save $375 by 18 March Gartner IT Infrastructure, Operations & Data Center Summit 2016 16 17 May Sydney, Australia gartner.com/ap/datacenter Key benefits Align the advantages, risks

More information

Workshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business

Workshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business Workshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business Earl Perkins Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced

More information

Business Forecasting and Analytics Forum

Business Forecasting and Analytics Forum #JPKGroup Business Forecasting and Analytics Forum Financial Forecasting and Planning Finance Transformation S&OP and Demand Forecasting Sales and Market Forecasting and Analytics Collaborative Forecasting

More information

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape IDENTITY & ACCESS BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape Introduction How does your enterprise view the BYOD (Bring Your Own Device) trend opportunity

More information

Gartner Business Intelligence, Analytics & Information Management Summit 2015

Gartner Business Intelligence, Analytics & Information Management Summit 2015 EARLY-BIRD DISCOUNT Save 6,500 by 10 April Gartner Business Intelligence, Analytics & Information Management Summit 2015 9 10 June Mumbai, India gartner.com/in/bi Crossing the Analytical Divide: New Technologies,

More information

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University. Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able

More information

Framework for Improving Critical Infrastructure Cybersecurity

Framework for Improving Critical Infrastructure Cybersecurity Framework for Improving Critical Infrastructure Cybersecurity Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2014 ISACA Pittsburgh Information Security Awareness Day Victoria Yan

More information