Gartner Security & Risk. Management Summit Trip Report. Overview. Manage Risk and Deliver Security in a Digital World.
|
|
- Howard Singleton
- 8 years ago
- Views:
Transcription
1 Gartner Security & Risk Management Summit 2015 June 8 11 National Harbor, MD gartner.com/us/securityrisk Manage Risk and Deliver Security in a Digital World Trip Report Gartner Security & Risk Management Summit 2015 was held on June 8 11 at the Gaylord National Resort & Convention Center in National Harbor, MD. This report summarizes and provides highlights from the event. Overview At the 21st annual Gartner Security & Risk Management Summit, attendees participated in on-site benefits, heard the latest IT security and risk management presentations from the Gartner research community on today s most pressing topics, attended workshops run by expert analysts and industry leaders, heard real-life experiences during peer case studies, engaged in analyst-user roundtables and one-on-one meetings with Gartner analysts, and checked out the latest solutions at the Solution Showcase. Attendees walked away with actionable solutions to key topics, including how to: Gain role-specific tools and strategies to stay ahead of expanding scopes of responsibility and increasing threats Align security and risk management strategies with enterprise objectives Gaylord National Resort & Convention Center Assure compliance by learning the new privacy and e-discovery regulations and requirements Apply the latest techniques to tackle risks in cloud, operational technology (OT), the Internet of Things (IoT) and IT Maximize enterprise ROI by using the latest business continuity management (BCM) and enterprise resilience practices Andrew Walls speaking at Gartner Security & Risk Management Summit 2015 Save the date Gartner Security & Risk Management Summit 2016 will take place June 13 16, in National Harbor, MD, at the Gaylord National Resort & Convention Center. Be sure to bookmark the website, gartner.com/us/securityrisk, and check back for 2016 conference updates. Table of contents 2 Findings from Gartner Security & Risk Management Summit Gartner keynotes 6 Guest keynotes 7 Conference highlights 8 Top 5 most-attended sessions 9 Snapshot of attendees 10 Sponsors 13 Post-event resources 14 Renewal 1
2 Gartner Security & Risk Management Summit 2015 June 8 11 National Harbor, MD gartner.com/us/securityrisk Findings from Gartner Security & Risk Management Summit 2015 Here are key recommendations from this year s most popular Gartner analyst sessions especially useful for your 2015 planning and strategy considerations. A11. Why Your Policy is Broken and How You Can Fix It Rob McMillan, Director Review your policy for common policy problems. Verify that you have an effective process in place for ensuring that your people are aware of the policy and its requirements. Stress-test your policy to look for potential failures. Assess the extent to which you can prove that your external providers are managing to your policy and adjust as required. Adjust your policy to address the policy problems that you identify. Implement a program to assess compliance and detect anomalies. B9. Mobile Security Threats and Trends 2015 John Girard, Vice President and Distinguished Analyst; Dionisio Zumerle, Director Review your mobile policy and identify the key participants in the enterprise mobility program. Translate your technical risk into enterprise risk, define a direction and ask for top management validation. Abandon device-centric lockdown security for app-centric models. Experiment with data-centric solutions, but be aware of immaturity. Focus your efforts on providing solutions that are tailored for mobile use and therefore obviate shadow IT practices. Act tactically: Assess your post-deployment posture, close gaps and refresh again in six to 12 months. C1. The Cloud Security Scenario Jay Heiser, Vice President Build cloud security and control competencies. Develop and enforce cloud governance policies: Data classification and risk acceptance and ownership of data and departmental applications. Manage your accounts (especially privileged ones). Ensure that you have contingency plans. Demand CSPs follow standards and provide third-party security assessments. Rob McMillan John Girard Dionisio Zumerle Jay Heiser 2
3 Findings from Gartner Security & Risk Management Summit 2015 D8. Future-Proofing IAM Ant Allan, Vice President Identify your organization s strategies for and stakeholders in digital business, IoT and the digital workplace. Determine where IAM creates unnecessary friction in the digital workplace. Get to know your IAM vendors plans to support external identity providers, ABAC and so on. Identify alternatives. Update your IAM strategic plan to reflect digital business, IoT and digital workplace goals. Develop a strategy for bimodal IAM. Plan for fundamental changes in IAM teams skills, staffing and structure. Simplify your IAM architecture and operations by embracing people-centric security principles. E9. Mobile Device Security: A Comparison of Platforms Patrick Hevesi, Director Understand the mobile threat landscape. Be cautious when investing in mobile device security apps. Set mobile OS version standards and deny older versions (ios 8, Samsung Knox, Windows 8.1). In a bring-your-own-device (BYOD) program: Choose devices with strong native controls over devices lacking adequate controls or with security settings that can be disabled by users. Alternatively, complement device controls with additional software such as managed information containers. In fully managed high-security organizations, choose hardened devices with highly granular policy management capabilities. Ant Allan Patrick Hevesi Paul E. Proctor F5. Building Advanced KRIs: Risk Metrics That Influence Business Decisions Paul E. Proctor, Vice President and Distinguished Analyst Review all of your dashboards and metrics. Define the audience they address. Determine the decisions for the audience who is influenced by the metrics. Determine the causal relationships each metric has to a business dependency. Revise your metrics to be leading indicators. Reposition. Move IT operational metrics away from business decision makers. 3
4 Gartner Security & Risk Management Summit 2015 June 8 11 National Harbor, MD gartner.com/us/securityrisk Findings from Gartner Security & Risk Management Summit 2015 (continued) G8. Software Licensing Is a Risk. Is Your Organization Managing It? Victoria Barber, Director Find out who your asset manager is. Understand the current state of software asset management in your organization. Insist that investment is made to reduce current licensing risk. Support the asset manager to develop and mature software asset management. Leverage software asset management data to identify and quantify business risk. Victoria Barber Enforce license compliance through process and controls. H13. The Current State of Cloud-Based Recovery and Continuity John P. Morency, Vice President Decide which recovery requirements must be supported now and later. Define your priorities for platform support and data replication support requirements. Evaluate vendors from a recovery assurance perspective: Define the availability, recovery and performance requirements and document them in SLA terms. John P. Morency Assess carefully the extent to which a service provider can reduce the time, cost and logistics of recovery exercising. Quantify the required implementation time, license costs and monthly services cost differences between the alternatives. Perform pricing due diligence with the finalists. Decide which provider type (if any) is most appropriate. J3. User Authentication Vendors Are Not the Only User Authentication Vendors Ant Allan, Vice President Inventory your user authentication use cases. Review how incumbent solutions meet trust, TCO and UX needs. Identify use cases in need of new methods or wholly new solutions. Identity use cases where adaptive access control can add value. Select vendors to meet the needs identified above. Plan for longer-term changes as new technologies become available. This conference is the premier conference for security and risk management professionals. The content and networking are highlights of an amazing team of analysts. Stephen Zalewski, Security Architect, Pacific Gas and Electric Company 4
5 Gartner keynotes Manage Risk and Deliver Security in a Digital World Ant Allan, Vice President; Peter Firstbrook, Vice President; Avivah Litan, Vice President and Distinguished Analyst In the opening keynote, Gartner analysts discussed how effective cybersecurity is the foundation of successful digital business. As organizations leverage new technology and business processes t o deliver services and products to global markets, security and risk managers must support achievement of enterprise objectives while mitigating security risks to an acceptable level. The analysts stressed that in order to achieve success, security and risk leaders must embrace new approaches to digital business while maintaining proven control architecture that mitigates enterprise risk. Ant Allan Cybersecurity Scenario 2020: The Impact of Digital Business on Security F. Christian Byrnes, Managing Vice President Two years ago, Gartner had provided a scenario covering the evolution of the threat environment through Today, our senior analysts have assembled a picture of how digital business will impact the security practice in that same time frame. F. Christian Byrnes explained how this is yet another key input to long-term strategic planning and showed how it will also impact business life. Peter Firstbrook The Great Race to Digital Moments Chris Howard, Vice President and Distinguished Analyst In the closing keynote, Chris Howard delved into how digital moments come in all forms: moments for customers or employees, moments of commerce and engagement, and moments where an organization needs to capitalize on something unexpected by integrating data and function on the spot. He explained how digital moments are opportunities to achieve enterprise objectives, but they also involve new risks. Our growing experience with mobility, analytics, cloud and social connectivity creates the platform to support these moments, increasingly amplified by the IoT. Howard then explored several of these digital moments and their implications for security and risk professionals. Avivah Litan F. Christian Byrnes Chris Howard 5
6 Gartner Security & Risk Management Summit 2015 June 8 11 National Harbor, MD gartner.com/us/securityrisk Guest keynotes U.S. Intelligence, Defense and Cybersecurity Strategies Leon Panetta, U.S. Secretary of Defense ( ), and Director, Central Intelligence Agency ( ) Leon Panetta discussed U.S. intelligence and cybersecurity strategies from his experience as the 23rd Secretary of Defense from 2011 through Panetta shared how he oversaw the final removal of American troops from Iraq as well as the beginning of troop withdrawals from Afghanistan. He then touched on defense strategies from when he led the effort to develop a new defense strategy to advance greater agility, protect national security and meet fiscal discipline, which in turn opened up new opportunities for everyone to serve in the military and protected benefits for wounded warriors and their families. Leon Panetta Inkjet Business Model Considered Harmful Cory Doctorow, Journalist, Science Fiction Author, Activist and Blogger Cory Doctorow discussed how the IoT is being born with the inkjet printer business model: ecosystems of devices that can only be connected with the manufacturer s approval. This allows manufacturers to command high margins for the consumables, chargers and add-ons you have to buy to keep using the stuff you already own. He then explained that the real danger comes as soon as you design a computer to thwart its owner s desires. This then sets in motion a set of security, policy and technology decisions that ends with spyware shipping out of the box on every device. Corey Doctorow 6
7 Conference highlights 6 keynotes featuring Gartner analysts and industry experts Manage Risk and Deliver Security in a Digital World Welcome Remarks and Program Roadmap Cybersecurity Scenario 2020: The Impact of Digital Business on Security Guest Keynote: U.S. Intelligence, Defense and Cybersecurity Strategies Guest Keynote: Inkjet Business Model Considered Harmful The Great Race to Digital Moments 107 Gartner track sessions Some selected topics The New CISO s Crucial First 100 Days How the Internet of Things Will Change Cybersecurity Forever Magic Quadrant for Operational Risk Management The Availability Implications for Digital Business Network Security Guide to BYOD 2015 Update Top Trends and Take-Aways for Cybersecurity 11 end-user case studies Some selected topics Information Security Is a Business Continuity Issue: Are You Ready? Top Threats, Vulnerabilities and Hiring Challenges What Is a CISO to Do? Developing a Medical Device Security Program What Makes Organizations Resilient and Why You Should Care How to Present Risk to Board-Level Management: Key Take-Aways From Visa Future of Sales in Information Security 27 roundtable discussions (Gartner-analyst-moderated) Some selected topics Using a Virtual Team to Manage IT Asset Risks What Can We Expect From the Upcoming EU Data Protection Regulation? Presenting to the Board and Executive Committees Comparing Best Practices for Cloud Risk Management Information Security Metrics What Is Information Governance Technology and How Is It Being Used? 7
8 Gartner Security & Risk Management Summit 2015 June 8 11 National Harbor, MD gartner.com/us/securityrisk Conference highlights (continued) 6 workshops Essential Communication and Conflict Resolution Skills for Security Leaders The Gartner ITScore Maturity Model for IAM Make the Business Case and Obtain BCM Program Executive Sponsorship IT Security: Planning a Self-Audit Start Your DLP Project By Making It Relevant The Language of Change: Overcoming Change Resistance and Transforming Culture 3 debate sessions Quantitative vs. Qualitative Risk Assessment We Will Fail If We Try to Protect All Data and Processes That We Own Debating Pervasive Data-at-Rest Encryption: Great Security or Grand Illusion? Join the conversation Connect with Gartner Security & Risk Management Summit on Twitter and LinkedIn. #GartnerSEC Gartner Security and Risk Management Summit Online access for one year Missed a session? Have no fear. Your ticket includes keynotes and track sessions not just those you saw live! Gartner Events On Demand provides streaming access of recorded presentations to all paid attendees for one year. Watch your favorites again and see those you missed from any Webconnected device. Visit gartnereventsondemand.com. Top 5 most-attended sessions G16. Using Storytelling to Get Your Risk Management Message Heard Jeffrey Wheatman, Director F16. GRC: What Works, What Doesn t Paul E. Proctor, Vice President and Distinguished Analyst E7. Securing Sensitive SaaS Using Cloud Access Security Brokers Ramon Krikken, Vice President D15. How to Build a Globally Legal and Successful BYOD Program John Girard, Vice President and Distinguished Analyst E9. Mobile Device Security: A Comparison of Platforms Patrick Hevesi, Director Fantastic event for any and all security professionals! Matthew Mudry, Director, IT Architecture and Security, Castleton Commodi 8
9 Snapshot of attendees Who participated in the 2015 conference? Top job titles C-level 22% 22% Director 4% Analyst 10% Vice President 20% Management Top job roles 1. Security and risk management 2. Infrastructure and operations 3. CxO 4. Enterprise architecture 5. Product management/marketing Top industry sectors 18% Banking, finance and insurance 17% Government 11% Manufacturing 7% Healthcare 3% Education 9
10 Gartner Security & Risk Management Summit 2015 June 8 11 National Harbor, MD gartner.com/us/securityrisk Thank you to our sponsors Premier Platinum 10
11 Thank you to our sponsors Platinum Silver Absolute Software Corporation Boldon James Cyphort Inspired elearning Accellion Box Darktrace Interset Software, Inc. Accelops BrandProtect Inc. Digital Defense, Inc. Invincea, Inc. Agari BrightPoint Security Digital Guardian ISACA Agiliance Brinqa Domain Tools Kaspersky Lab AhnLab Camber Corporation EdgeWave Lancope Alert Enterprise Caspida Elastica, INC. LastPass Algosec Centripetal Networks Endgame Learning Tree International Alott Communications CenturyLink ESET North America LockPath Arbor Networks, INC. Certes Networks Exabeam LogRhythm Arxan Technologies Cigital FireLayers Lookout Aujas Information Risk Services Click Security Firemon Lunarline Avatier CloudLock Fortscale ManTech Avecto BAE Systems Barracuda Networks Bay Dynamics, Inc Beyond Trust Software, INC Bit9 + Carbon Black Bitglass Bloomberg Vault Blue Coat Systems CloudPassage Cognizant Technology Solutions Continuity Logic Contrast Security Courion Corporation Cyber adapt, Inc. Cybereason Cylance Cymmetria General Dynamics Fidelis Cybersecurity Solutions Global Learning Systems Google Inc. Gurucul Hexis Cyber Solutions, Inc. Hitachi ID Systems, Inc. ICF International Identity Finder Menlo Security Modulo NetIQ Netskope Neustar Niara NSFOCUS Information Technology Co., Ltd. ObserveIT 11
12 Gartner Security & Risk Management Summit 2015 June 8 11 National Harbor, MD gartner.com/us/securityrisk Thank you to our sponsors Silver Okta Protegrity Security Innovation ThreatTrack Onapsis Quotium Securonix Thycotic OpenDNS Rapid7 SentinelOne Triumfant Palerra Recorded Future Simieo Solutions TRUSTe Panda Security RedSeal Spikes Security Tufin PhishLine.com Resilient Systems SSH Communications Security Varonis Systems, Inc. PhishLabs Return Path Stroz Friedberg Verisign Phishme RSAM Synopsys, Inc. Vidder Platfora Safenet Tanium Virtustream Portnox Secunia Tenable Network Security, Inc. Vormetric PREVALENT, INC. Security Compass The Media Trust Waratek Prevoty Security First Corp ThreatSim whitecryption Corp. ProtectWise Security Mentor ThreatStream Wombat Security Technologies Association Partners Media Partners EXECUTIVE NETWORK WITI PRIMAR Y LOGO-CMYK 12
13 Post-event resources Customizable post-event worksheet Take a moment to complete your own post-event trip report, a valuable resource for future reference and a great way to share with colleagues what you learned. Click here to access the trip report worksheet. Learn more with relevant research Want to learn more about the topics that interest you most? Turn to the end of each session presentation for a list of related Gartner research notes. Select Gartner research is available on demand at gartner.com. This conference is a great venue for meeting cyberpractitioners from various sectors and comparing experiences. Upcoming events Gartner Security & Risk Management Summit 2015 July Tokyo, Japan Gartner Security & Risk Management Summit 2015 August Sydney, Australia Gartner Security & Risk Management Summit Summit 2015 September London, U.K. Gartner Security & Risk Management Summit 2015 November 2 3 Dubai, UAE Gartner Identity & Access Management Summit 2015 December 7 9 Las Vegas, NV Sherrill Nicely, CISO, CIA The World s Most Important Gathering of CIOs and Senior IT Executives Learn more } 13
14 EARN CPE CREDITS Earn CPE credits toward (ISC)2, ISACA and DRII certification Gartner Security & Risk Management Summit 2016 June National Harbor, MD gartner.com/us/securityrisk Join us again in 2016! Register for this must-attend security and risk management event at gartner.com/us/securityrisk or call Hot topics Application, network and infrastructure security Planning for IoT security Digital business security and risk management Organizational resilience through BCM Risk management and compliance 2015 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner and ITxpo are registered trademarks of Gartner, Inc. or its affiliates. For more information, info@gartner.com or visit gartner.com.
Gartner Security & Risk Management Summit 2015
EARLY-BIRD Discount Save 325 by 17 July Gartner Security & Risk Management Summit 2015 14 15 September London, UK gartnerevent.com/eu/security The World s Most Important Gathering for Security and Risk
More informationGartner Security & Risk Management Summit 2015
EARLY-BIRD Discount Save $300 by 4 September Gartner Security & Risk Management 2015 2 3 November Raffles Hotel, Dubai, UAE gartner.com/me/security Manage Risk and Deliver Security in a Digital World Hot
More informationGartner Security & Risk Management Summit 2014
Gartner Security & Risk Management Summit 2014 25 26 August Hilton Sydney, Australia gartner.com/ap/security Smart Risk Balancing Security and Opportunity Hot Topics People-Centric Security Governance
More informationGartner IT Financial, Procurement & Asset Management Summit 2014. Trip Report. Overview
Gartner IT Financial, Procurement & Asset Management Summit 2014 Driving Business Outcomes: Control Costs, Mitigate Risks and Sustain Innovation Trip Report The Gartner IT Financial, Procurement & Asset
More informationGartner Security & Risk Management Summit 2015
EARLY-BIRD Discount Save $400 by 26 June Gartner Security & Risk Management Summit 2015 24 25 August Hilton Sydney gartner.com/ap/security Manage Risk and Deliver Security in a Digital World Hot topics
More informationGartner Security & Risk Management Summit 2015
EARLY-BIRD DISCOUNT Save 6,500 by 3 July Gartner Security & Risk Management 2015 1 2 September Mumbai, India gartner.com/in/security Manage Risk and Deliver Security in a Digital World Hot topics Cybersecurity
More informationGartner Security & Risk Management Summit 2015
EARLY-BIRD Discount Save 325 by 17 July Gartner Security & Risk Management Summit 2015 14 15 September London, UK gartner.com/eu/security The World s Most Important Gathering for Security and Risk Executives
More informationGartner Security & Risk Management Summit 2015
Gartner Security & Risk Management Summit 2015 June 8 11 I National Harbor, MD gartner.com/us/securityrisk From learning how to re-evaluate and update your security and risk strategies and investments
More informationWhile you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:
While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab: A copy of today s presentation and our Upcoming webinars Information on how to dial in if
More informationGartner IT Infrastructure, Operations & Data Center Summit 2015
EARLY-BIRD Discount Save $400 by 20 March Celebrating 10 Years Gartner IT Infrastructure, Operations & Data Center Summit 2015 18 19 May Hilton Sydney gartner.com/ap/datacenter Transform Service Delivery
More informationAddress C-level Cybersecurity issues to enable and secure Digital transformation
Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,
More informationGartner Identity & Access Management Summit 2013
Gartner Identity & Access Management Summit 2013 Pragmatic Futures for IAM: Meeting Business Needs at the Nexus of Forces Trip Report The annual Gartner Identity & Access Management Summit was held on
More informationGlobal Access to More Than 10,000 Enterprise IT Decision Makers
Sponsor Prospectus The world s most important gathering of CIOs and senior IT executives Global Access to More Than 10,000 Enterprise IT Decision Makers Celebrating 20 Years of Commitment and Performance
More informationGartner Digital Workplace Summit 2016
EARLY-BIRD DISCOUNT Save 325 by 22 July Gartner Digital Workplace Summit 2016 21 22 September London, U.K. gartnerevents.com/eudwlearn Key Benefits of Attending Build a strategic roadmap for digital workplace
More informationGartner Data Center, Infrastructure & Operations Management Summit 2014. Trip Report. Overview
Gartner Data Center, Infrastructure & Operations Management Summit 2014 Leading I&O: Delivering New Levels of Innovation and Productivity Trip Report The Gartner Data Center, Infrastructure & Operations
More informationFinding The PPM Sweet Spot
Finding The PPM Sweet Spot How the Cloud and a Top Down Approach Can Help Drive Project Portfolio Value Featured Presenter: Daniel Stang Research Director Welcome! Thank you for joining us. A few things
More informationGartner Business Process Management Summit 2015
EARLY-BIRD Discount Save $400 by 27 March Gartner Business Process Management Summit 2015 1 2 June Sydney, Australia gartner.com/ap/bpm BPM Shift From Improving Process to Delivering Big Change Key Benefits
More informationThe Cyber Threat Landscape
The Cyber Threat Landscape Oliver Rochford Research Director Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without
More informationGartner Business Intelligence & Analytics Summit 2014. Trip Report. Overview. The Future of Your Business: Transparent, Decisive, Personalized
Gartner Business Intelligence & Analytics Summit 2014 21 22 October Munich, Germany gartner.com/eu/biger The Future of Your Business: Transparent, Decisive, Personalized Trip Report The Gartner Business
More informationGartner Security & Risk Management Summit 2013
Gartner Security & Risk Management Summit 2013 19 20 August Sydney, Australia gartner.com/ap/security THREE COMPLETE PROGRAMS Chief Information Security (CISO) Program Risk Management and Compliance Program
More informationRising to the Challenge
CYBERSECURITY: Rising to the Challenge Dialogues with Subject Matter Experts Advanced persistent threats. Zero-day attacks. Insider threats. Cybersecurity experts say that if IT leaders are not concerned
More informationo Cost containment through effective and SAP IT Procurement & negotiation strategies to help them achieve best-inclass, purchasing Asset Management
Alexa Bona s research currently focuses on IT management. As part of the IT Procurement and Asset o Workshop: Six Steps to Preparing and Negotiating Software Contracts o Negotiating effective sustainable
More informationwww.pwc.com Next presentation starting soon Next Gen Customer Experience Enabled by PwC & Oracle s Cloud CRM & CX Applications
www.pwc.com Next presentation starting soon Next Gen Customer Experience Enabled by & Oracle s Cloud CRM & CX Applications Agenda Introductions & Customer Experience / CX Defined Why CX is Critical Today?
More informationGartner Application Architecture, Development & Integration Summit 2014
Gartner Application Architecture, Development & Integration Summit 2014 21 22 July Hilton Sydney, Australia gartner.com/ap/aadi Transform Your Applications Strategy for a Digital World hot TOPICS Flexible
More informationGartner Identity & Access Management Summit 2013
Gartner Identity & Access Management Summit 2013 November 18 20 Los Angeles, CA gartner.com/us/iam HOT TOPICS IAM SUPPORTING MOBILE, SOCIAL, CLOUD AND INFORMATION INITIATIVES IAM BEST PRACTICES FOR DEPLOYMENT
More informationGartner Business Intelligence, Analytics & Information Management Summit 2016
EARLY-BIRD DISCOUNT Save 6,500 by 8 April 2016 Gartner Business Intelligence, Analytics & Information Management Summit 2016 2016 SURVEY Bi/analytics GARTNER CIO AGENDA still #1 technology priority See
More informationGartner Security & Risk. Management. Summit 2012. Visit gartner.com/us/securityrisk or call 1 866 405 2511 to register
Visit gartner.com/us/securityrisk or call 1 866 405 2511 to register FIVE COMPLETE PROGRAMS CISO Program IT Security Business Continuity Management Risk Management and Compliance New! The Business of IT
More informationRSA Archer Risk Intelligence
RSA Archer Risk Intelligence Harnessing Risk to Exploit Opportunity June 4, 2014 Steve Schlarman GRC Strategist 1 Risk and Compliance Where is it today? 2 Governance, Risk, & Compliance Today 3 4 A New
More informationIT Security. Muscat 15+ ABOUT US IN A GLANCE
www.insight.co.om insightoman insightoman insightoman insight-information-technology www.insight.co.om insightoman insightoman insightoman insight-information-technology ABOUT US LOCATION Visit us at
More informationVendor Risk Management Financial Organizations
Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current
More informationGartner Security & Risk Management Summit 2012
Gartner Security & Risk Management Summit 2012 16 17 July 2012 Sydney, Australia gartner.com/ap/security Trip Report Strategic Roadmaps to Secure the Enterprise and Manage Risk Overview INTRODUCTION The
More information7 things to ask when upgrading your ERP solution
Industrial Manufacturing 7 things to ask when upgrading your ERP solution The capabilities gap between older versions of ERP designs and current designs can create a problem that many organizations are
More informationChanging Shape of the Cloud ISACA North Texas Chapter. Michael Lee Managing Principle-Cloud 214-857-6335 Michael.Lee@gdt.com
Changing Shape of the Cloud ISACA North Texas Chapter Michael Lee Managing Principle-Cloud 214-857-6335 Michael.Lee@gdt.com Agenda 1. Secure Your Career Through Cloud Enablement Change today to be Indispensable
More informationGartner Business Intelligence & Analytics Summit 2015
EARLY-BIRD Discount Save 325 by 14 August Gartner Business Intelligence & Analytics Summit 2015 14 15 October Munich, Germany gartner.com/eu/biger Crossing the Analytical Divide: New Technologies, New
More informationState of Information Security
State of Information Security Second Annual Assessment Study 2013 Table of Contents: Synopsis and Methodology _ page 2 A Snapshot of Participants _ page 2 Survey Findings _ page 5 Final Thoughts _ page
More informationHow To Get A Cloud Service For A Small Business
Transforming SMB Security Stephen Banbury VP, Global SMB Channel & Alliances Compelling Trends for Change Symantec as a Leader in Security Winning Together 2 NOT SO LONG AGO SMB Attitudes Towards Business
More informationSharePoint and the Women in Business
June 23 25 x Gaylord Palms Resort & Convention Center x Orlando, FL Gartner Portals, Content & Collaboration Summit 2009 Post Event Brief The 2009 Gartner Portals, Content & Collaboration Summit was held
More informationCybersecurity in the States 2012: Priorities, Issues and Trends
Cybersecurity in the States 2012: Priorities, Issues and Trends Commission on Maryland Cyber Security and Innovation June 8, 2012 Pam Walker, Director of Government Affairs National Association of State
More informationManaging IT Risks During Cost-Cutting Periods
Research Publication Date: 22 October 2008 ID Number: G00162359 Managing IT Risks During Cost-Cutting Periods Mark Nicolett, Paul E. Proctor, French Caldwell To provide visibility into increased risks
More informationLeveraging Network and Vulnerability metrics Using RedSeal
SOLUTION BRIEF Transforming IT Security Management Via Outcome-Oriented Metrics Leveraging Network and Vulnerability metrics Using RedSeal november 2011 WHITE PAPER RedSeal Networks, Inc. 3965 Freedom
More informationSECURITY RISK MANAGEMENT
SECURITY RISK MANAGEMENT ISACA Atlanta Chapter, Geek Week August 20, 2013 Scott Ritchie, Manager, HA&W Information Assurance Services Scott Ritchie CISSP, CISA, PCI QSA, ISO 27001 Auditor Manager, HA&W
More informationHow To Handle A Threat From A Corporate Computer System
Politics of Security Webcast Summary Cyber Threat News and APT Defenses Introduction Stories about cyber espionage and Advanced Persistent Threats (APTs) are part of the mainstream news cycle. Concerns
More informationHow to Choose the Best Web Content Management System for Customer Experience Management:
white paper How to Choose the Best Web Content Management System for Customer Experience Management: A Guide for Both Marketers and Developers Table of Contents Choosing a Web CMS is about more than Content
More informationCybersecurity Strategic Consulting
Home Overview Challenges Global Resource Growth Impacting Industries Why Capgemini Capgemini & Sogeti Cybersecurity Strategic Consulting Enabling business ambitions, resilience and cost efficiency with
More informationGartner Application Architecture, Development & Integration Summit 2016
EARLY-BIRD DISCOUNT Save $375 by 27 May Gartner Application Architecture, Development & Integration Summit 2016 25 26 July Sydney, Australia gartner.com/ap/aadi Hot topics Mobile Development Internet of
More informationManaged Security Services
NEAT EVALUATION FOR UNISYS: Managed Security Services Market Segment: Overall This document presents Unisys with the NelsonHall NEAT vendor evaluation for Managed Security Services (MSS) for the Overall
More informationProcess-Based Business Transformation. Todd Lohr, Practice Director
Process-Based Business Transformation Todd Lohr, Practice Director Process-Based Business Transformation Business Process Management Process-Based Business Transformation Service Oriented Architecture
More informationKey Issues for Identity and Access Management, 2008
Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research
More informationThe Who, What, When, Where and Why of IAM Bob Bentley
The Who, What, When, Where and Why of IAM Bob Bentley Product Management Director October 2014 It s a Jungle Out There IAM is more than just provisioning user accounts and managing access to web pages
More informationIT audit updates. Current hot topics and key considerations. IT risk assessment leading practices
IT audit updates Current hot topics and key considerations Contents IT risk assessment leading practices IT risks to consider in your audit plan IT SOX considerations and risks COSO 2013 and IT considerations
More information7 Steps to Guide Your Field Service Technology Purchase
BUY ER S G UID E 7 Steps to Guide Your Field Service Technology Purchase Field service leaders across industries are looking for ways to modernize and streamline their service organizations. With increasingly
More informationSecurity Risk Management Strategy in a Mobile and Consumerised World
Security Risk Management Strategy in a Mobile and Consumerised World RYAN RUBIN (Msc, CISSP, CISM, QSA, CHFI) PROTIVITI Session ID: GRC-308 Session Classification: Intermediate AGENDA Current State Key
More informationWhite Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation
White Paper Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation Table of Contents Introduction... 3 Common DDoS Mitigation Measures...
More informationAgenda Overview for Social Marketing, 2015
G00270737 Agenda Overview for Social Marketing, 2015 Published: 19 December 2014 Analyst(s): Julie Hopkins Social marketing programs are maturing; executives increasingly expect ROI to follow social marketing
More informationArchitecting the Digital Business: How to Use and Secure Cloud, Mobile and Data
NEW EvENt FOR 2014! 17 18 June 2014 london, uk gartner.com/eu/catalyst FOR technologists, BY technologists Architecting Digital : How to Use and Secure, and Data HOT TOPICS Securing public cloud Making
More informationCybersecurity Awareness for Executives
SESSION ID: SOP-R04 Cybersecurity Awareness for Executives Rob Sloan Head of Cyber Content and Data Dow Jones @_rob_sloan Session Overview Aim: Provide a high level overview of an effective cybersecurity
More informationPROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud
PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud Blue skies ahead? Yes if you are protected when you move to the cloud. Lately, it seems as if every enterprise
More informationKey Trends, Issues and Best Practices in Compliance 2014
Key Trends, Issues and Best Practices in Compliance 2014 What Makes This Survey Different Research conducted by independent third party Clients and non-clients 301 executive decision makers 35 qualitative
More informationAsia Pacific the Future of Cloud Computing
Asia Pacific the Future of Cloud Computing Presented by the CSA and CEPREI 1-3 December 2015 Guangzhou, China The 1-3 December 2015 Guangzhou, China Contents Backgroud Why Join the CSA APAC Congress Why
More informationLogging In: Auditing Cybersecurity in an Unsecure World
About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that
More informationMicrosoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
More informationIndianapolis November 17 th South Bend November 18 th. Sponsored by
Indianapolis November 17 th South Bend November 18 th Sponsored by Today's Agenda Today s Agenda 8:30 AM Registration & Welcome Breakfast 9:00 AM Keynote & Microsoft Roadmap 9:30 AM Business Enablement
More informationWhitepaper. Mobile Security. The 5 Questions Modern Organizations Are Asking
Mobile Security The 5 Questions Modern Organizations Are Asking Whether you ve already embraced enterprise mobility or are just starting to consider it, today s organizations are concerned about the lack
More informationGovernance, Risk, and Compliance (GRC) White Paper
Governance, Risk, and Compliance (GRC) White Paper Table of Contents: Purpose page 2 Introduction _ page 3 What is GRC _ page 3 GRC Concepts _ page 4 Integrated Approach and Methodology page 4 Diagram:
More informationCisco Cloud Enablement Services for Adopting Clouds
Cisco Cloud for Adopting Clouds Cisco Cloud for Adopting Clouds help you understand which applications you need to migrate; build business justifications for migrating your applications to a public cloud
More information14 October 2015 ISACA Curaçao Conference By: Paul Helmich
Governance, Risk & Compliance A practical approach 14 October 2015 ISACA Curaçao Conference By: Paul Helmich Topics today What is GRC? How much of all the GRC literature, tools, etc. do I need to study
More informationInformation Security Forum Sponsorship Programs
Information Security Forum Sponsorship Programs About IANS IANS is an information security advisory and consulting firm, serving Fortune 1000 information security professionals with in-depth insights and
More informationS 2 ERC Project: A Review of Return on Investment for Cybersecurity. Author: Joe Stuntz, MBA EP 14, McDonough School of Business.
S 2 ERC Project: A Review of Return on Investment for Cybersecurity Author: Joe Stuntz, MBA EP 14, McDonough School of Business Date: 06 May 2014 Abstract Many organizations are looking at investing in
More informationCyber security in healthcare
Cyber security in healthcare Julian Meyrick, Vice President IBM Security Services Europe julian_meyrick@uk.ibm.com Healthcare is one of the top 5 industries that continue to offer attackers the most significant
More informationIT Operations Management. Intelligent. Integrated. Innovative.
IT Operations Management Intelligent. Integrated. Innovative. Who We Are We are Symphony SUMMIT. We offer intelligent, integrated, and innovative solutions for managing IT operations. Our mantra is to
More informationBackup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity
Research Publication Date: 11 August 2011 ID Number: G00215300 Backup and Disaster Recovery Modernization Is No Longer a Luxury, but a Business Necessity John P Morency, Donna Scott, Dave Russell For the
More informationPartnership prospectus
Partnership prospectus Why NextGen Government, why now? Ground breaking progress has been made in the approach to digital government over the last few years, which the new Digital Transformation Office
More informationDEPARTMENT AGENCY STATEMENT OF OBJECTIVES FOR CLOUD MIGRATION SERVICES: INVENTORY, APPLICATION MAPPING, AND MIGRATION PLANNING MONTH YYYY TEMPLATE
DEPARTMENT AGENCY STATEMENT OF OBJECTIVES FOR CLOUD MIGRATION SERVICES: INVENTORY, APPLICATION MAPPING, AND MIGRATION PLANNING MONTH YYYY TEMPLATE 1 Introduction and Instructions This sample Statement
More informationGartner Identity & Access Management Summit 2015
EARLY-BIRD Discount Save 300 by 16 January 2015 Gartner Identity & Access Management Summit 2015 16 17 March London, UK gartnerevent.com/eu/iam Successful IAM Simple, Business Driven and Secure Key benefits
More informationSponsorship Opportunities 5-2016. Thomas Odams. Events Manager, EMEA, RANT Events t: 0203 119 3387 m: 07827 870 359 todams@rantevents.
Sponsorship Opportunities 5-2016 Thomas Odams Events Manager, EMEA, RANT Events t: 0203 119 3387 m: 07827 870 359 todams@rantevents.com About The RANT Forum (Risk and Network Threat Forum) The RANT Forum
More informationSymantec Cyber Security Services: DeepSight Intelligence
Symantec Cyber Security Services: DeepSight Intelligence Actionable intelligence to get ahead of emerging threats Overview: Security Intelligence Companies face a rapidly evolving threat environment with
More informationWhitepaper. Mobile Security. The 5 Questions Modern Organisations Are Asking
Mobile Security The 5 Questions Modern Organisations Are Asking Whether you ve already embraced enterprise mobility or are just starting to consider it, today s organisations are concerned about the lack
More informationHow To Understand Cloud Economics
WHITE PAPER Cloud Economics: A Financial Analysis of Information Management IT Delivery Models Sponsored by: Viewpointe LLC Michael Versace October 2013 Randy Perry IDC OPINION Executive Summary Cost optimization
More informationManaging Web Security in an Increasingly Challenging Threat Landscape
Managing Web Security in an Increasingly Challenging Threat Landscape Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Small wonder.
More informationCIBECS / IDG Connect DATA LOSS SURVEY. The latest statistics and trends around user data protection for business. www.cibecs.
CIBECS / IDG Connect 2014 DATA LOSS SURVEY The latest statistics and trends around user data protection for business. REPORT www.cibecs.com 2 Table of ontents EXECUTIVE 01 02 03 04 05 06 SUMMARY WHO PARTICIPATED
More informationServices. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure
Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation
More informationINSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL
INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL BY 2 In enterprise IT, there is a single point where everything that matters in information, technology and business converges: Cybersecurity Nexus
More informationGartner Business Intelligence & Analytics Summit 2016
EARLY-BIRD DISCOUNT Save 325 by 12 August 2016 Gartner Business Intelligence & Analytics Summit 2016 10 11 October Munich, Germany gartnerevents.com/debibrochure Analytics Leadership: Empowerment Without
More informationCYBER RISK INTERNATIONAL COMPANY PROFILE
CYBER RISK INTERNATIONAL COMPANY PROFILE About Us Robert Madelin, the EU Commission s director general overseeing digital matters, has warned about a clear and present danger of cyber attacks in Europe.
More informationThe Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
More informationThe Changing IT Risk Landscape Understanding and managing existing and emerging risks
The Changing IT Risk Landscape Understanding and managing existing and emerging risks IIA @ Noon Kareem Sadek Senior Manager, Deloitte Canada Chris Close Senior Manager, Deloitte Canada December 2, 2015
More informationStatement of Direction
Mobile First: Taking Mobile CRM to the Next Level 1 January 2013 Mobile First: Taking Mobile CRM to the Next Level Whitepaper Mobile First: Taking Mobile CRM to the Next Level 2 Table of Contents Notes...
More informationEnterprise level security, the Huddle way.
Enterprise level security, the Huddle way. Security whitepaper TABLE OF CONTENTS 5 Huddle s promise Hosting environment Network infrastructure Multiple levels of security Physical security System & network
More informationWestcon Presentation on Security Innovation, Opportunity, and Compromise
Westcon Presentation on Security Innovation, Opportunity, and Compromise Christian A. Christiansen Program Vice President IDC Security Products & Services What s Happening with Threats? 1.5B 80% 33% $1.3M
More informationMAD about Mobile Business Intelligence
Session ID: UGF9226 Venue / Room: Moscone South - 308 Date and Time: 9/28/14, 13:30-14:15 MAD about Mobile Business Intelligence Leveraging the new Mobile App Designer to Empower your Organization October
More informationGartner Application Architecture, Development & Integration Summit 2015
EARLY-BIRD Discount Save $400 by 22 May Gartner Application Architecture, Development & Integration Summit 2015 20 21 July Hilton Sydney gartner.com/ap/aadi Innovate and Renovate to Dominate in the New
More informationObtaining Enterprise Cybersituational
SESSION ID: SPO-R06A Obtaining Enterprise Cybersituational Awareness Eric J. Eifert Sr. Vice President Managed Security Services DarkMatter Agenda My Background Key components of the Cyber Situational
More informationNERC CIP VERSION 5 COMPLIANCE
BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining
More informationGartner IT Infrastructure, Operations & Data Center Summit 2016
EARLY-BIRD DISCOUNT Save $375 by 18 March Gartner IT Infrastructure, Operations & Data Center Summit 2016 16 17 May Sydney, Australia gartner.com/ap/datacenter Key benefits Align the advantages, risks
More informationWorkshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business
Workshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business Earl Perkins Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced
More informationBusiness Forecasting and Analytics Forum
#JPKGroup Business Forecasting and Analytics Forum Financial Forecasting and Planning Finance Transformation S&OP and Demand Forecasting Sales and Market Forecasting and Analytics Collaborative Forecasting
More informationIDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape
IDENTITY & ACCESS BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape Introduction How does your enterprise view the BYOD (Bring Your Own Device) trend opportunity
More informationGartner Business Intelligence, Analytics & Information Management Summit 2015
EARLY-BIRD DISCOUNT Save 6,500 by 10 April Gartner Business Intelligence, Analytics & Information Management Summit 2015 9 10 June Mumbai, India gartner.com/in/bi Crossing the Analytical Divide: New Technologies,
More informationCisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.
Data Sheet Cisco Optimization s Optimize Your Solution using Cisco Expertise and Leading Practices Optimizing Your Business Architecture Today, enabling business innovation and agility is about being able
More informationFramework for Improving Critical Infrastructure Cybersecurity
Framework for Improving Critical Infrastructure Cybersecurity Executive Order 13636 Improving Critical Infrastructure Cybersecurity 2014 ISACA Pittsburgh Information Security Awareness Day Victoria Yan
More information