Gartner Security & Risk Management Summit 2015

Size: px
Start display at page:

Download "Gartner Security & Risk Management Summit 2015"

Transcription

1 EARLY-BIRD Discount Save 325 by 17 July Gartner Security & Risk Management Summit September London, UK gartnerevent.com/eu/security The World s Most Important Gathering for Security and Risk Executives Five Programs Chief Information Security Officer (CISO) Risk Management and Compliance Security Manager Program: Technology, Trends and Operations Business Continuity Management Internet of Things Security

2 Manage Risk and Deliver Security in a Digital World Craft your strategy for business resiliency Get the tools you need to deliver secure digital business environments and ensure your organization can weather an attack or disruption and bounce back quickly at Gartner Security & Risk Management Summit 2015, September, London, UK. This year s conference covers the breadth of priorities in IT security, risk management, governance, compliance, BCM, the role of the CISO, the business of security, privacy, IAM and more. Join us this September to find out how you can advance your security and risk goals to support business objectives and improve resilience across the organization. Key benefits of attending Gain tools and strategies to stay ahead of your new responsibilities and increasing threats Align security and risk strategies with your enterprise objectives and digital transformation Assure compliance with new regulatory, compliance, privacy and e-discovery requirements Apply the latest techniques to tackle risks in cloud, OT and IoT Build a culture that drives security performance through employee engagement Who will be there? Chief Information Security Officers Chief Risk Officers Chief Information Officers IT Vice Presidents/Directors IT Security Officers/Directors Risk, Compliance and Privacy Managers Information Security/Risk Managers Network, Infrastructure, Solutions and Security Architects Visit gartnerevent.com/eu/security for more information

3 Reevaluate your security and risk strategies and investments for the digital age Digital business technologies and the Internet of Things are creating new threats and risks even as regulatory compliance and legal risks continue to escalate, and sophisticated cyber threats challenge even the best security strategies. Every business is now a digital business, and every business must become profi cient at risk assessment and mitigation, the foundation of success in the digital age. This year s summit delivers the latest research and recommendations across security and risk management priorities, and provides you with solutions to the latest hot topics, including: Application, network and infrastructure security Cloud security Mobile security Cybersecurity Digital business security and risk management Operational technology (OT) security and risk management Organizational resilience through BCM Risk management and compliance Security Awareness and Training The intersection of IT, operational technology and the Internet of Things is spawning a new generation of threats. Join us for the latest strategies to help you anticipate risk, mitigate its impact and enable successful business outcomes. What s new for 2015 Revamped agenda featuring new content, and covering key challenges such as applications, network and mobile security; security for the cloud; digital business security, risk management and privacy and EU regulations First ever presentation of Magic Quadrant for operational risk management Industry-orientated content, especially around fi nancial services, banking and insurance Focused sessions on crisis and incident management Content tailored for small and medium businesses Expanded opportunity to network with your peers with networking lunches and drinks receptions available #gartnersecurity Gartner Security & Risk Management Summit 2015

4 Agenda at a Glance Monday 14 September :30 20:00 Registration and Information 08:00 08:45 Tutorial: Top Trends and Takeways for Cybersecurity Earl Perkins 09:00 10:00 Gartner Keynote: Manage Risk and Deliver Security in a Digital World Ant Allan, Peter Firstbrook and Dionisio Zumerle 10:00 10:30 Industry Panel 10:30 11:00 Refreshment Break in the Solution Showcase 11:00 12:00 Guest Keynote to be confirmed shortly 12:00 13:15 Lunch in the Solution Showcase Tracks A. Chief Information Security Officer (CISO) Program B. Risk Management and Compliance Program C. Security Manager Program: Technology, Tr 13:15 14:00 The New CISO's Crucial First 100 Days Tom Scholtz A Public Cloud Risk Model: Accepting Cloud Risk is OK, Ignoring Cloud Risk is Tragic Paul Proctor Defensive Strategies in an Age of Digital Insurgency Oliver Rochford 14:15 14:45 Solution Provider Sessions 15:00 15:45 Be Agile Not Fragile: Use Threat Intelligence Services to Defend Yourself Rob McMillan The Path to High Impact Security Awareness Christian Byrnes Mobile Security Threats and Trends 2015 Dionisio Zumerle 15:45 16:15 Refreshment Break in the Solution Showcase 16:15 16:45 Solution Provider Sessions 17:00 17:45 Case Study Use a Vendor Risk Management Framework to Mitigate Regulatory, Compliance, Security and Performance Issues Gayla Sullivan Panel: Mobile Security and Management: A Real World Discussion Rob Smith et al. 17:45 20:00 Networking Reception in the Solution Showcase Tuesday 15 September :45 17:00 Registration and Information 08:00 08:45 People-Centric Security: Experiences and Lessons Learnt Tom Scholtz 09:00 09:45 Case Study What's New and Hot in GRC? John Wheeler 09:45 10:15 Refreshment Break in the Solution Showcase 10:15 10:45 Solution Provider Sessions How to Get Single Sign On Ant Allan Future of Endpoint Management Rob Smith 11:00 11:30 Protecting Your House on the Prairie: Security Strategy for the Smaller Enterprise Tom Scholtz Incident Response Platforms A Long Time Coming Rob McMillan Your Cloud Service Adoption Strategy Must Include Data Protection Brian Lowans 11:30 12:45 Lunch in the Solution Showcase 12:15 12:35 Magic Quadrant for Enterprise Netw 12:45 13:30 Avoid Five Security Staffing Disasters Jeremy D Hoinne Digital Business and Your New Relationship with Risk Paul Proctor What Role Will VPNs Play in Your Business Future? John Girard 13:45 14:15 Chief Data Officers and Chief Information Security Officers: Friends or Foes? Debra Logan What Can We Expect from the Upcoming EU Data Protection Regulation? Carsten Casper Lessons Learned on Advanced Threat Defense Strategies and Tools Jeremy D Hoinne 14:15 14:45 Refreshment Break in the Solution Showcase 14:45 15:15 Case Study How To Build A Globally Legal and Successful BYOD Program John Girard 15:30 16:00 One Simple Way to Get Your CEO to Embrace Risk Management John Wheeler Women in Security and Risk Management: Do Women Approach Security and Risk Management Differently Than Men? Roberta Witty Assessing Cloud Service Providers: Getting Beyond the Checklists Erik Heidt 16:15 17:00 Gartner Closing Keynote: Cybersecurity Scenario 2020: The Impact of Digital Business on Security Neil MacDonald Gartner Security & Risk Management Summit 2015 #gartnersecurity

5 Agenda as of 8 June 2015 During the event, please refer to the printed Agenda or the Gartner Events mobile app for complete, up to the minute session information. Tutorial: Best Practices in Crisis Communications Roberta Witty 10:35 10:55 Magic Quadrant for Security Information and Event Management Oliver Rochford 12:15 12:35 Magic Quadrant for Operational Risk Management John Wheeler ends and Operations D. Business Continuity Management Program and E. Internet of Things Security Program Workshops and Contract Negotiation Clinics Roundtables Gartner's Adaptive Security Architecture: New Approaches for Advanced and Insider Threats Neil MacDonald The Availability Implications for Digital Business Roberta Witty 12:45 14:15 Workshop: Get Incident-Ready. Test Your Plan with a Scenario Rob McMillan 13:15 14:15 Roundtable: Reduce The Risks and Implement Data Access Controls Now! Brian Lowans Securing Sensitive SaaS Using Cloud Access Security Brokers Ramon Krikken Case Study 14:30 16:00 Workshop: Get Security Right in an SMB Environment Rob McMillan 14:45 15:45 Roundtable: Changing Your Security Culture: Why Change is Hard and What to Do About It Debra Logan Designing the Modern Application Security Perimeter With Mobile and Cloud in Mind Ramon Krikken Cybersecurity Panel: IT Security, OT Security, IoT Security: Impacts and Recommendations Earl Perkins et al. 16:15 17:45 Workshop: Secure Self-Assessing and Self- Cleansing Systems with DevOps? Joerg Fritsch 16:45 17:45 Roundtable: Managing the Identity of Things Ant Allan Defending Endpoints from the Persistent Attack Peter Firstbrook Defending Against Sophisticated Malware Mario de Boer Privacy and the Internet of Things: How to Avoid Crossing the Creepy Line Carsten Casper Balancing Trust and User Experience for User Authentication Ant Allan 08:00 09:30 Workshop: Introduction to Mobile Security Self-Assessments John Girard and Dionisio Zumerle 08:00 09:00 Roundtable: Do you Measure the Impact of Your Awareness Program? Christian Byrnes The Dark Side of Payment Card Security Jonathan Care ork Firewalls Jeremy D Hoinne Why Crisis Management is the Heart of BCM Software Roberta Witty 10:45 12:15 Contract Negotiating Clinic: Cloud Contracts, Develop Your Own Security and Risk Exhibits Gayla Sullivan 10:45 11:45 Roundtable: Building Successful Business Metrics for Technology Risk Paul Proctor Secure Use of AWS and Azure: Comparison and Best Practices Neil MacDonald Operational Technology Security is Not Just for Industries Anymore Earl Perkins 12:45 14:15 Workshop: Identity Proofing Revisited as Data Privacy Dies Jonathan Care 12:45 13:45 Roundtable: Why Social Media Risks Are Skyrocketing and What You Can Do to Protect Your Company John Wheeler Protecting Mobile Apps Dionisio Zumerle Case Study Friends at the Gate? Best Practices for Enabling Remote Privileged Access From Vendors and Third Parties Felix Gaehtgens The Legality and Ethics of IoT and Employee Monitoring Carsten Casper 14:30 16:00 Workshop: Reporting Risk and Security to your Board of Directors Paul Proctor 14:45 15:45 Roundtable: Secure Use of Public Cloud Neil MacDonald What Your Containers do Not Contain! About the Security Properties of Containers Managed by Docker Joerg Fritsch Visit gartnerevent.com/eu/security for more information

6 Gartner Security & Risk Management Summit September London, UK gartnerevent.com/eu/security Registration and pricing 3 easy ways to register Web: gartnerevent.com/eu/security emea.registration@gartner.com Telephone: Pricing Pricing subject to change early-bird price: 2,150 + UK VAT (offer ends 17 July 2015) Standard price: 2,475 + UK VAT public Sector price: 1,950 + UK VAT Gartner Clients A Gartner ticket covers both days of the Summit. Contact your account manager or emea.events@gartner.com to register using a ticket. Group Rate discount Maximize learning by participating together in relevant sessions or splitting up to cover more topics, sharing your session take-aways later. Complementary registrations: 1 for every 3 paid registrations 2 for every 5 paid registrations 3 for every 7 paid registrations For more information, emea.teamsend@gartner.com or contact your Gartner account manager. WHY AttEnD A GARtnER EVEnt? Build a successful strategy Get validation from Gartner analysts Meet with suppliers to support your tactical planning Expand your peer network Innovate and problem-solve with like-minded peers Join the largest, most infl uential network of its kind Grow in your role Get content and solutions that are most relevant to you Lead more effectively and develop your team WHAt MAKEs GARtnER EVEnts unique? Our analysts Analyst-led presentations Analyst one-on-one private meetings Analyst-facilitated roundtables Our research 100% independent and objective Proven and reliable Relevant to your role Venue Park Plaza Westminster Bridge 200 Westminster Bridge Road London, UK SE1 7UT Phone Gartner Hotel Room Rate Prices start at 175 per night at Park Plaza when using promotional code GART Money-back guarantee If you are not completely satisfi ed with this Gartner conference, please notify us in writing within 15 days of the conference and we will refund 100% of your registration fee Gartner, Inc. and/or its affi liates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affi liates. For more information, info@gartner.com or visit gartner.com.

Gartner Security & Risk Management Summit 2015

Gartner Security & Risk Management Summit 2015 EARLY-BIRD Discount Save 325 by 17 July Gartner Security & Risk Management Summit 2015 14 15 September London, UK gartner.com/eu/security The World s Most Important Gathering for Security and Risk Executives

More information

Gartner Security & Risk Management Summit 2015

Gartner Security & Risk Management Summit 2015 EARLY-BIRD Discount Save $300 by 4 September Gartner Security & Risk Management 2015 2 3 November Raffles Hotel, Dubai, UAE gartner.com/me/security Manage Risk and Deliver Security in a Digital World Hot

More information

Gartner Security & Risk Management Summit 2014

Gartner Security & Risk Management Summit 2014 Gartner Security & Risk Management Summit 2014 25 26 August Hilton Sydney, Australia gartner.com/ap/security Smart Risk Balancing Security and Opportunity Hot Topics People-Centric Security Governance

More information

Gartner Security & Risk Management Summit 2015

Gartner Security & Risk Management Summit 2015 EARLY-BIRD Discount Save $400 by 26 June Gartner Security & Risk Management Summit 2015 24 25 August Hilton Sydney gartner.com/ap/security Manage Risk and Deliver Security in a Digital World Hot topics

More information

Gartner Identity & Access Management Summit 2015

Gartner Identity & Access Management Summit 2015 EARLY-BIRD Discount Save 300 by 16 January 2015 Gartner Identity & Access Management Summit 2015 16 17 March London, UK gartnerevent.com/eu/iam Successful IAM Simple, Business Driven and Secure Key benefits

More information

Gartner Security & Risk Management Summit 2015

Gartner Security & Risk Management Summit 2015 EARLY-BIRD DISCOUNT Save 6,500 by 3 July Gartner Security & Risk Management 2015 1 2 September Mumbai, India gartner.com/in/security Manage Risk and Deliver Security in a Digital World Hot topics Cybersecurity

More information

Exploit New Architectures: Create Your Digital Future

Exploit New Architectures: Create Your Digital Future EARLY-BIRD Discount Save 325 by 17 July the annual gathering for technical professionals 16 17 September 2015 London, UK gartner.com/eu/catalyst Exploit New Architectures: Create Your Digital Future Key

More information

Gartner Security & Risk Management Summit 2015

Gartner Security & Risk Management Summit 2015 Gartner Security & Risk Management Summit 2015 June 8 11 I National Harbor, MD gartner.com/us/securityrisk From learning how to re-evaluate and update your security and risk strategies and investments

More information

Gartner Business Intelligence & Analytics Summit 2015

Gartner Business Intelligence & Analytics Summit 2015 EARLY-BIRD Discount Save 325 by 14 August Gartner Business Intelligence & Analytics Summit 2015 14 15 October Munich, Germany gartner.com/eu/biger Crossing the Analytical Divide: New Technologies, New

More information

Gartner Digital Workplace Summit 2016

Gartner Digital Workplace Summit 2016 EARLY-BIRD DISCOUNT Save 325 by 22 July Gartner Digital Workplace Summit 2016 21 22 September London, U.K. gartnerevents.com/eudwlearn Key Benefits of Attending Build a strategic roadmap for digital workplace

More information

Gartner Security & Risk Management Summit 2013

Gartner Security & Risk Management Summit 2013 Gartner Security & Risk Management Summit 2013 19 20 August Sydney, Australia gartner.com/ap/security THREE COMPLETE PROGRAMS Chief Information Security (CISO) Program Risk Management and Compliance Program

More information

Architecting the Digital Business: How to Use and Secure Cloud, Mobile and Data

Architecting the Digital Business: How to Use and Secure Cloud, Mobile and Data NEW EvENt FOR 2014! 17 18 June 2014 london, uk gartner.com/eu/catalyst FOR technologists, BY technologists Architecting Digital : How to Use and Secure, and Data HOT TOPICS Securing public cloud Making

More information

Address C-level Cybersecurity issues to enable and secure Digital transformation

Address C-level Cybersecurity issues to enable and secure Digital transformation Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,

More information

Gartner Application Architecture, Development & Integration Summit 2014

Gartner Application Architecture, Development & Integration Summit 2014 Gartner Application Architecture, Development & Integration Summit 2014 21 22 July Hilton Sydney, Australia gartner.com/ap/aadi Transform Your Applications Strategy for a Digital World hot TOPICS Flexible

More information

Gartner IT Infrastructure, Operations & Data Center Summit 2015

Gartner IT Infrastructure, Operations & Data Center Summit 2015 EARLY-BIRD Discount Save $400 by 20 March Celebrating 10 Years Gartner IT Infrastructure, Operations & Data Center Summit 2015 18 19 May Hilton Sydney gartner.com/ap/datacenter Transform Service Delivery

More information

Gartner IT Financial, Procurement & Asset Management Summit 2015

Gartner IT Financial, Procurement & Asset Management Summit 2015 Gartner IT Financial, Procurement & Asset Management Summit 2015 21 22 September London, UK gartner.com/eu/itam Leading Change to Drive Innovation, Collaboration and Cost Optimization Key benefits of attending

More information

Gartner Business Intelligence, Analytics & Information Management Summit 2016

Gartner Business Intelligence, Analytics & Information Management Summit 2016 EARLY-BIRD DISCOUNT Save 6,500 by 8 April 2016 Gartner Business Intelligence, Analytics & Information Management Summit 2016 2016 SURVEY Bi/analytics GARTNER CIO AGENDA still #1 technology priority See

More information

Gartner Business Intelligence & Analytics Summit 2016

Gartner Business Intelligence & Analytics Summit 2016 EARLY-BIRD DISCOUNT Save 325 by 12 August 2016 Gartner Business Intelligence & Analytics Summit 2016 10 11 October Munich, Germany gartnerevents.com/debibrochure Analytics Leadership: Empowerment Without

More information

Gartner IT Financial, Procurement & Asset Management Summit 2015

Gartner IT Financial, Procurement & Asset Management Summit 2015 EARLY-BIRD Discount Save 325 by 24 July Gartner IT Financial, Procurement & Asset Management Summit 2015 21 22 September London, UK gartner.com/eu/itam Leading Change to Drive Innovation, Collaboration

More information

Gartner Business Process Management Summit 2015

Gartner Business Process Management Summit 2015 EARLY-BIRD Discount Save $400 by 27 March Gartner Business Process Management Summit 2015 1 2 June Sydney, Australia gartner.com/ap/bpm BPM Shift From Improving Process to Delivering Big Change Key Benefits

More information

Gartner PPM & IT Governance Summit 2015

Gartner PPM & IT Governance Summit 2015 EARLY-BIRD Discount Save 325 by 10 April 2015 Gartner PPM & IT Governance Summit 2015 8 9 June London, UK gartner.com/eu/ppm Thriving on Digital Chaos: Innovation, Agility and Collaboration Key benefits

More information

Gartner Security & Risk. Management. Summit 2012. Visit gartner.com/us/securityrisk or call 1 866 405 2511 to register

Gartner Security & Risk. Management. Summit 2012. Visit gartner.com/us/securityrisk or call 1 866 405 2511 to register Visit gartner.com/us/securityrisk or call 1 866 405 2511 to register FIVE COMPLETE PROGRAMS CISO Program IT Security Business Continuity Management Risk Management and Compliance New! The Business of IT

More information

Gartner It Financial, Procurement & asset Management Summit 2014

Gartner It Financial, Procurement & asset Management Summit 2014 Gartner It Financial, Procurement & asset Management Summit 2014 17 18 September London, UK gartnerevent.com/eu/itam Driving Business Outcomes: Control Costs, Mitigate Risks and Sustain Innovation KEY

More information

Gartner Business Intelligence & Analytics Summit 2015

Gartner Business Intelligence & Analytics Summit 2015 Gartner Business Intelligence & Analytics Summit 2015 14 15 October Munich, Germany gartner.com/eu/biger Crossing the Analytical Divide: New Technologies, New Skills Hot Topics Leading a Digital Business

More information

Gartner IT Infrastructure, Operations & Data Center Summit 2015

Gartner IT Infrastructure, Operations & Data Center Summit 2015 EARLY-BIRD DISCOUNT Save 6,500 by 13 March Gartner IT Infrastructure, Operations & Data Center Summit 2015 11 12 May Mumbai, India gartner.com/in/datacenter Leading I&O: Delivering New Levels of Innovation

More information

Architecting the Digital Business: How to Use and Secure Cloud, Mobile and Data

Architecting the Digital Business: How to Use and Secure Cloud, Mobile and Data New event 2014! 17 18 June 2014 London, UK gartner.com/eu/catalyst FOR TECHNOLOGISTS, BY TECHNOLOGISTS Architecting Digital : How to Use and Secure, and Data Hot pics Securing public cloud Making big data

More information

Gartner Application Architecture, Development & Integration Summit 2015

Gartner Application Architecture, Development & Integration Summit 2015 EARLY-BIRD Discount Save $400 by 22 May Gartner Application Architecture, Development & Integration Summit 2015 20 21 July Hilton Sydney gartner.com/ap/aadi Innovate and Renovate to Dominate in the New

More information

Cybersecurity Strategic Consulting

Cybersecurity Strategic Consulting Home Overview Challenges Global Resource Growth Impacting Industries Why Capgemini Capgemini & Sogeti Cybersecurity Strategic Consulting Enabling business ambitions, resilience and cost efficiency with

More information

Gartner IT Infrastructure, Operations & Data Center Summit 2016

Gartner IT Infrastructure, Operations & Data Center Summit 2016 EARLY-BIRD DISCOUNT Save $375 by 18 March Gartner IT Infrastructure, Operations & Data Center Summit 2016 16 17 May Sydney, Australia gartner.com/ap/datacenter Key benefits Align the advantages, risks

More information

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab: While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab: A copy of today s presentation and our Upcoming webinars Information on how to dial in if

More information

Gartner Application Architecture, Development & Integration Summit 2016

Gartner Application Architecture, Development & Integration Summit 2016 EARLY-BIRD DISCOUNT Save $375 by 27 May Gartner Application Architecture, Development & Integration Summit 2016 25 26 July Sydney, Australia gartner.com/ap/aadi Hot topics Mobile Development Internet of

More information

Gartner Business Intelligence, Analytics & Information Management Summit 2015

Gartner Business Intelligence, Analytics & Information Management Summit 2015 EARLY-BIRD DISCOUNT Save 6,500 by 10 April Gartner Business Intelligence, Analytics & Information Management Summit 2015 9 10 June Mumbai, India gartner.com/in/bi Crossing the Analytical Divide: New Technologies,

More information

Gartner Magic Quadrant Sources and Disclaimer

Gartner Magic Quadrant Sources and Disclaimer Gartner Magic Quadrant Sources and Disclaimer 1. Gartner Magic Quadrant for Network Access Control; by Lawrence Orans, John Pescatore, Mark Nicolett; March 27, 2009 2. Gartner Magic Quadrant for Endpoint

More information

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed

More information

Gartner Identity & Access Management Summit 2013

Gartner Identity & Access Management Summit 2013 Gartner Identity & Access Management Summit 2013 Pragmatic Futures for IAM: Meeting Business Needs at the Nexus of Forces Trip Report The annual Gartner Identity & Access Management Summit was held on

More information

Gartner IT Infrastructure & Operations Management Summit 2015

Gartner IT Infrastructure & Operations Management Summit 2015 EARLY-BIRD Discount Save 325 by 3 April Gartner IT Infrastructure & Operations Management Summit 2015 1 2 June Berlin, Germany gartner.com/eu/iom Building a Lean and Agile I&O The Engine for your Digital

More information

Gartner Digital Workplace Summit 2015

Gartner Digital Workplace Summit 2015 Gartner Digital Workplace Summit 2015 21 22 September London, UK gartner.com/eu/workplace Workplace Reimagined: Agile, Engaged, Empowered Key Benefits of Attending Increasing Employee Engagement and Agility

More information

Gartner Enterprise Information & Master Data Management Summit 2016

Gartner Enterprise Information & Master Data Management Summit 2016 EARLY-BIRD DISCOUNT Save 325 by 8 January 2016 Gartner Enterprise Information & Master Data Management Summit 2016 2 3 March London, UK gartnerevent.com/eu/eim Hot Topics Digital Information Leadership

More information

Developing National Frameworks & Engaging the Private Sector

Developing National Frameworks & Engaging the Private Sector www.pwc.com Developing National Frameworks & Engaging the Private Sector Focus on Information/Cyber Security Risk Management American Red Cross Disaster Preparedness Summit Chicago, IL September 19, 2012

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc Agenda Overview 9:00am General Session Auditorium 13:30pm General Session Auditorium 16:30pm General Session Auditorium 09:00 Welcome am Roberto Casetta, Snr. Vice President International 9:15am HEAT Software

More information

Gartner Identity & Access Management summit 2014

Gartner Identity & Access Management summit 2014 Gartner Identity & Access Management summit 2014 17 18 March London, UK gartner.com/eu/iam A 2020 vision for SAVE 300! Register by 17 January 2014 GueST KeYNOTe SPeAKeRS Preparing for the Unpredictable

More information

Gartner IT Financial, Procurement & Asset Management Summit 2016

Gartner IT Financial, Procurement & Asset Management Summit 2016 EARLY-BIRD DISCOUNT Save 325 by 15 July 2016 Gartner IT Financial, Procurement & Asset Management Summit 2016 12 13 September London, UK gartnerevents.com/euitam The Art of Influence: Optimizing Costs

More information

Information Security Forum Sponsorship Programs

Information Security Forum Sponsorship Programs Information Security Forum Sponsorship Programs About IANS IANS is an information security advisory and consulting firm, serving Fortune 1000 information security professionals with in-depth insights and

More information

CYBER RISK INTERNATIONAL COMPANY PROFILE

CYBER RISK INTERNATIONAL COMPANY PROFILE CYBER RISK INTERNATIONAL COMPANY PROFILE About Us Robert Madelin, the EU Commission s director general overseeing digital matters, has warned about a clear and present danger of cyber attacks in Europe.

More information

Workshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business

Workshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business Workshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business Earl Perkins Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced

More information

VMware and the Need for Cyber Supply Chain Security Assurance

VMware and the Need for Cyber Supply Chain Security Assurance White Paper VMware and the Need for Cyber Supply Chain Security Assurance By Jon Oltsik, Senior Principal Analyst September 2015 This ESG White Paper was commissioned by VMware and is distributed under

More information

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL BY 2 In enterprise IT, there is a single point where everything that matters in information, technology and business converges: Cybersecurity Nexus

More information

Gartner Security & Risk. Management Summit 2015. Trip Report. Overview. Manage Risk and Deliver Security in a Digital World.

Gartner Security & Risk. Management Summit 2015. Trip Report. Overview. Manage Risk and Deliver Security in a Digital World. Gartner Security & Risk Management Summit 2015 June 8 11 National Harbor, MD gartner.com/us/securityrisk Manage Risk and Deliver Security in a Digital World Trip Report Gartner Security & Risk Management

More information

The Next Generation of Security Leaders

The Next Generation of Security Leaders The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish

More information

Cybersecurity Awareness for Executives

Cybersecurity Awareness for Executives SESSION ID: SOP-R04 Cybersecurity Awareness for Executives Rob Sloan Head of Cyber Content and Data Dow Jones @_rob_sloan Session Overview Aim: Provide a high level overview of an effective cybersecurity

More information

Physical Security: Introductory Applications and Technology

Physical Security: Introductory Applications and Technology Physical Security: Introductory Applications and Technology February 22 23, 2016 Fort Worth, TX Earn up to 14 CPEs EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N Delivering

More information

SECURING PAYMENTS IN THE CYBER WORLD

SECURING PAYMENTS IN THE CYBER WORLD The Central Bank of Kuwait Presents An Information Security Forum on SECURING PAYMENTS IN THE CYBER WORLD 16th NOVEMBER 2014 JUMEIRAH MESSILAH BEACH HOTEL, KUWAIT WELCOME In the last few years, the usages

More information

FFIEC Cybersecurity Assessment Tool

FFIEC Cybersecurity Assessment Tool Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,

More information

Gartner Master Data Management Summit 2012

Gartner Master Data Management Summit 2012 Gartner Master Data Management Summit 2012 8 9 February Park Plaza Westminster Bridge London, UK gartner.com/eu/mdm hot Topics building a solid business case for MDM organization, roles and stakeholder

More information

CYBER SECURITY INFORMATION SHARING & COLLABORATION

CYBER SECURITY INFORMATION SHARING & COLLABORATION Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers

More information

Gartner Identity & Access Management Summit 2012. EARLY-BIRD DISCOUNT Register by 13 January 2012 and save 300. HOT TOPICS Future Trends in IAM

Gartner Identity & Access Management Summit 2012. EARLY-BIRD DISCOUNT Register by 13 January 2012 and save 300. HOT TOPICS Future Trends in IAM EARLY-BIRD DISCOUNT Register by 13 January 2012 and save 300 HOT TOPICS Future Trends in IAM Defining an IAM Strategy Identity and Access Governance IAM for Cloud Computing IAM Architecture IAM Tools and

More information

Gartner Security & Risk Management Summit 2012

Gartner Security & Risk Management Summit 2012 Gartner Security & Risk Management Summit 2012 16 17 July 2012 Sydney, Australia gartner.com/ap/security Trip Report Strategic Roadmaps to Secure the Enterprise and Manage Risk Overview INTRODUCTION The

More information

Gartner Symposium/ITxpo Africa 2013 Analyst Areas of Coverage

Gartner Symposium/ITxpo Africa 2013 Analyst Areas of Coverage Analyst Biography Symposium Presentations Example Issues She Can Assist With Alexa Bona Software Licensing Alexa is responsible for coverage of future trends in software licensing and pricing practices,

More information

Gartner Customer 360 Summit

Gartner Customer 360 Summit Early-Bird Savings Save $300 when you register by May 7 Gartner Customer 360 Summit June 28 30 Los Angeles, CA gartner.com/us/crm CRM Strategies and Technologies to Understand, Grow and Engage Customers

More information

AFCEA Global Identity Summit 2014 Engagement Theater

AFCEA Global Identity Summit 2014 Engagement Theater AFCEA Global Identity Summit 2014 Engagement Theater Tuesday, September 16 th 2:00 p.m. - 3:50 p.m. Confirmation of the Biometric Identity of an epassport Holder and Atomic Authorization for Devices (AKA

More information

Network Security Redefined. Vectra s cybersecurity thinking machine detects and anticipates attacks in real time

Network Security Redefined. Vectra s cybersecurity thinking machine detects and anticipates attacks in real time Network Security Redefined Vectra s cybersecurity thinking machine detects and anticipates attacks in real time Table of Contents Executive Overview 3 Relying on Prevention is Not Enough 4 Four Reasons

More information

Gartner IT Infrastructure Operations & Data Center Summit 2013

Gartner IT Infrastructure Operations & Data Center Summit 2013 Gartner IT Infrastructure Operations & Data Center Summit 2013 13 14 May Mumbai, India gartner.com/in/datacenter HOT TOPICS Managing data center cost and sustainability Mobile and big data impact Cloud

More information

Accelerating Enterprise Growth by Leveraging Strategic Solutions. Eva Chen CEO and Co-Founder

Accelerating Enterprise Growth by Leveraging Strategic Solutions. Eva Chen CEO and Co-Founder Accelerating Enterprise Growth by Leveraging Strategic Solutions Eva Chen CEO and Co-Founder OUR CONSISTENT VISION: A world safe for exchanging digital information OUR CORE COMPETENCE: Innovating to staying

More information

Analyst Biography Symposium Presentations Example Issues He Can Assist With

Analyst Biography Symposium Presentations Example Issues He Can Assist With Neil Chandler BI & Analytics Neil focuses on business intelligence, analytics and performance management. This includes writing about and advising organisations about market trends, vendors, service providers

More information

SYMPOSIUM PROGRAM DAY ONE

SYMPOSIUM PROGRAM DAY ONE Tuesday 26 th August 2014 9.00am - 5.30pm RACV City Club, Melbourne SYMPOSIUM PROGRAM DAY ONE 8:30am Registration Opens Location: Foyer Level 2 9:00am 9:10am Symposium Welcome Speaker: Tom Garcia, Chief

More information

Detecting Cyber Attacks in a Mobile and BYOD Organization

Detecting Cyber Attacks in a Mobile and BYOD Organization SOLUTION BRIEF Detecting Cyber Attacks in a Mobile and BYOD Organization Explore the challenges, understand the needs, evaluate mobile device management as an approach to detecting attacks and offer a

More information

Cyber Security Risks for Banking Institutions.

Cyber Security Risks for Banking Institutions. Cyber Security Risks for Banking Institutions. September 8, 2014 1 Administrative CPE regulations require that online participants take part in online questions Must respond to a minimum of four questions

More information

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council Rethinking Information Security for Advanced Threats CEB Information Risk Leadership Council Advanced threats differ from conventional security threats along many dimensions, making them much more difficult

More information

Gartner PPM & IT Governance Summit 2016

Gartner PPM & IT Governance Summit 2016 EARLY-BIRD DISCOUNT Save 325 by 15 April Gartner PPM & IT Governance Summit 2016 13 14 June London, U.K. gartnerevent.com/eu/ppm Key Benefits Develop Effective Portfolio Management Increase PMO and EPMO

More information

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises Appendix Key Areas of Concern i. Inadequate coverage of cybersecurity risk assessment exercises The scope coverage of cybersecurity risk assessment exercises, such as cybersecurity control gap analysis

More information

Changing the Enterprise Security Landscape

Changing the Enterprise Security Landscape Changing the Enterprise Security Landscape Petr Hněvkovský Presales Consultant, ArcSight EMEA HP Enterprise Security Products 2012 Hewlett-Packard Development Company, L.P. The information contained herein

More information

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation

More information

The Cyber Threat Landscape

The Cyber Threat Landscape The Cyber Threat Landscape Oliver Rochford Research Director Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without

More information

STREAM Cyber Security

STREAM Cyber Security STREAM Cyber Security Management Software Governance, Risk Management & Compliance (GRC) Security Operations, Analytics & Reporting (SOAR) Fast, flexible, scalable, easy to use and affordable software

More information

Chief Security Strategist Symantec Public Sector

Chief Security Strategist Symantec Public Sector Chief Security Strategist Symantec Public Sector Advanced Persistent Threat Further things to understand about the APT Compromised Game Networks Lulzec Anonymous/YamaTough WikiLeaks 101 Global Intelligence

More information

Westcon Presentation on Security Innovation, Opportunity, and Compromise

Westcon Presentation on Security Innovation, Opportunity, and Compromise Westcon Presentation on Security Innovation, Opportunity, and Compromise Christian A. Christiansen Program Vice President IDC Security Products & Services What s Happening with Threats? 1.5B 80% 33% $1.3M

More information

The Pitfalls of DIY Approaches to Disaster Recovery

The Pitfalls of DIY Approaches to Disaster Recovery Business Continuity & Resiliency Services The Pitfalls of DIY Approaches to Disaster Recovery Interactivity Tips 1. Ask A Question 2. Download a PDF copy of today s presentation 3. Social Networking Tools

More information

State Governments at Risk: The Data Breach Reality

State Governments at Risk: The Data Breach Reality State Governments at Risk: The Data Breach Reality NCSL Legislative Summit August 5, 2015 Doug Robinson, Executive Director National Association of State Chief Information Officers (NASCIO) About NASCIO

More information

New InfoSec Leader The First 90 Days. John Bruce CEO

New InfoSec Leader The First 90 Days. John Bruce CEO New InfoSec Leader The First 90 Days John Bruce CEO Agenda Introduction Co3 Systems Role of the CISO Three critical changes Suggestions Page 2 of 39 The next challenge in security PRODUCTS PREVENTION DETECTION

More information

Key Issues for Identity and Access Management, 2008

Key Issues for Identity and Access Management, 2008 Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research

More information

Network Security Redefined Vectra s cybersecurity thinking machine detects and anticipates attacks in real time

Network Security Redefined Vectra s cybersecurity thinking machine detects and anticipates attacks in real time White Paper Network Security Redefined Vectra s cybersecurity thinking machine detects and anticipates attacks in real time Executive Overview All organizations have infected hosts inside their networks.

More information

The Benefits of an Integrated Approach to Security in the Cloud

The Benefits of an Integrated Approach to Security in the Cloud The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The

More information

o Cost containment through effective and SAP IT Procurement & negotiation strategies to help them achieve best-inclass, purchasing Asset Management

o Cost containment through effective and SAP IT Procurement & negotiation strategies to help them achieve best-inclass, purchasing Asset Management Alexa Bona s research currently focuses on IT management. As part of the IT Procurement and Asset o Workshop: Six Steps to Preparing and Negotiating Software Contracts o Negotiating effective sustainable

More information

Gartner Master Data Management Summit 2013

Gartner Master Data Management Summit 2013 Gartner Master Data Management Summit 2013 7 8 February 2013 Palau de Congressos de Catalunya, Barcelona, Spain gartner.com/eu/mdm Hot Topics Building the Business Case for Mdm Linking Mdm with Business

More information

Gartner Sourcing & Strategic Vendor Relationships Summit 2016

Gartner Sourcing & Strategic Vendor Relationships Summit 2016 EARLY-BIRD DISCOUNT Save $325 by July 22 Gartner Sourcing & Strategic Vendor Relationships Summit 2016 September 21 23 Grapevine, TX (Dallas area) gartner.com/us/sourcing Transforming Sourcing: Accelerating

More information

Gartner PPM & IT Governance Summit 2014

Gartner PPM & IT Governance Summit 2014 Gartner PPM & IT Governance Summit 2014 9 10 June London, UK gartner.com/eu/ppm Resource Priorities Generate Change Realize Returns HOT TOPICS Effectively Prioritizing Projects and Programs Creating an

More information

Integrating Security and Privacy Considerations into Client Services, Products and Day-To-Day Operations. WMACCA September 16, 2014

Integrating Security and Privacy Considerations into Client Services, Products and Day-To-Day Operations. WMACCA September 16, 2014 Integrating Security and Privacy Considerations into Client Services, Products and Day-To-Day Operations WMACCA September 16, 2014 Panel Moderator: Mary Ellen Callahan of Jenner & Block; (Former Chief

More information

BT Assure Threat Intelligence

BT Assure Threat Intelligence BT Assure Threat Intelligence Providing you with the intelligence to help keep your organisation safe BT Assure. Security that matters At all times, organisations are vulnerable to all kinds of cyber attacks

More information

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015 Cybersecurity: Considerations for Internal Audit IIA Atlanta Chapter Meeting January 9, 2015 Agenda Key Risks Incorporating Internal Audit Resources for Internal Auditors Questions 2 Key Risks 3 4 Key

More information

Security Management Program Development:

Security Management Program Development: Security Management Program Development: A Critical Infrastructure Protection Model July 15 16, 2015 Earn up to 15 CPEs EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N Are

More information

IT Transformation Summit 2013 - agenda Unleashing IT s competitive business potential

IT Transformation Summit 2013 - agenda Unleashing IT s competitive business potential IT Transformation Summit 2013 - agenda Unleashing IT s competitive business potential Tuesday November 26 th 2013 - British Museum, London 8.30 Registration and exhibition opens 9.30-9.40 Host s opening

More information

Intelligence Driven Security

Intelligence Driven Security Intelligence Driven Security RSA Advanced Cyber Defense Workshop Shane Harsch Senior Solutions Principal, RSA 1 Agenda Approach & Activities Operations Intelligence Infrastructure Reporting & Top Findings

More information

Gartner Business Intelligence, Analytics & Information Management Summit 2015

Gartner Business Intelligence, Analytics & Information Management Summit 2015 EARLY-BIRD Discount Save $400 by 12 December Gartner Business Intelligence, Analytics & Information Management Summit 2015 23 24 February Sydney, Australia gartner.com/ap/bi Crossing the Analytical Divide:

More information

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287

More information

Reinventing Network Security Vectra s cyber-security thinking machine delivers a new experience in network security

Reinventing Network Security Vectra s cyber-security thinking machine delivers a new experience in network security White Paper Reinventing Network Security Executive Overview Organizations are under constant attack from high-volume opportunistic threats and the less-frequent, but highly targeted attacks. Damage ranges

More information

OPENTEXT GLOBAL FAX SUMMIT 2011

OPENTEXT GLOBAL FAX SUMMIT 2011 OPENTEXT GLOBAL FAX SUMMIT 2011 Tuesday, July 12 th and Wednesday July 13 th, 2011 Customer Workshops and Partner Day, Thursday, July 14 th, 2011 Westin La Paloma Resort & Spa, Tucson, Arizona SUMMIT AGENDA

More information

MSc Cyber Security. identity. hacker. virus. network. information

MSc Cyber Security. identity. hacker. virus. network. information identity MSc Cyber Security hacker virus QA is the foremost provider of education in the UK. We work with individuals at all stages of their careers, from our award-winning apprenticeship programmes, through

More information

Gartner IT Leadership Trends: Building Your Digital Enterprise

Gartner IT Leadership Trends: Building Your Digital Enterprise Gartner IT Leadership Trends: Building Your Digital Enterprise Register by visiting kpc-group.cz/ gartner-it-leadership- -trends-2014 Prague Marriott Hotel 12 May 2014 What s new in 2014? Panel discussion

More information

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,

More information