Gartner Security & Risk Management Summit 2015
|
|
- Aubrey Griffith
- 8 years ago
- Views:
Transcription
1 EARLY-BIRD Discount Save 325 by 17 July Gartner Security & Risk Management Summit September London, UK gartnerevent.com/eu/security The World s Most Important Gathering for Security and Risk Executives Five Programs Chief Information Security Officer (CISO) Risk Management and Compliance Security Manager Program: Technology, Trends and Operations Business Continuity Management Internet of Things Security
2 Manage Risk and Deliver Security in a Digital World Craft your strategy for business resiliency Get the tools you need to deliver secure digital business environments and ensure your organization can weather an attack or disruption and bounce back quickly at Gartner Security & Risk Management Summit 2015, September, London, UK. This year s conference covers the breadth of priorities in IT security, risk management, governance, compliance, BCM, the role of the CISO, the business of security, privacy, IAM and more. Join us this September to find out how you can advance your security and risk goals to support business objectives and improve resilience across the organization. Key benefits of attending Gain tools and strategies to stay ahead of your new responsibilities and increasing threats Align security and risk strategies with your enterprise objectives and digital transformation Assure compliance with new regulatory, compliance, privacy and e-discovery requirements Apply the latest techniques to tackle risks in cloud, OT and IoT Build a culture that drives security performance through employee engagement Who will be there? Chief Information Security Officers Chief Risk Officers Chief Information Officers IT Vice Presidents/Directors IT Security Officers/Directors Risk, Compliance and Privacy Managers Information Security/Risk Managers Network, Infrastructure, Solutions and Security Architects Visit gartnerevent.com/eu/security for more information
3 Reevaluate your security and risk strategies and investments for the digital age Digital business technologies and the Internet of Things are creating new threats and risks even as regulatory compliance and legal risks continue to escalate, and sophisticated cyber threats challenge even the best security strategies. Every business is now a digital business, and every business must become profi cient at risk assessment and mitigation, the foundation of success in the digital age. This year s summit delivers the latest research and recommendations across security and risk management priorities, and provides you with solutions to the latest hot topics, including: Application, network and infrastructure security Cloud security Mobile security Cybersecurity Digital business security and risk management Operational technology (OT) security and risk management Organizational resilience through BCM Risk management and compliance Security Awareness and Training The intersection of IT, operational technology and the Internet of Things is spawning a new generation of threats. Join us for the latest strategies to help you anticipate risk, mitigate its impact and enable successful business outcomes. What s new for 2015 Revamped agenda featuring new content, and covering key challenges such as applications, network and mobile security; security for the cloud; digital business security, risk management and privacy and EU regulations First ever presentation of Magic Quadrant for operational risk management Industry-orientated content, especially around fi nancial services, banking and insurance Focused sessions on crisis and incident management Content tailored for small and medium businesses Expanded opportunity to network with your peers with networking lunches and drinks receptions available #gartnersecurity Gartner Security & Risk Management Summit 2015
4 Agenda at a Glance Monday 14 September :30 20:00 Registration and Information 08:00 08:45 Tutorial: Top Trends and Takeways for Cybersecurity Earl Perkins 09:00 10:00 Gartner Keynote: Manage Risk and Deliver Security in a Digital World Ant Allan, Peter Firstbrook and Dionisio Zumerle 10:00 10:30 Industry Panel 10:30 11:00 Refreshment Break in the Solution Showcase 11:00 12:00 Guest Keynote to be confirmed shortly 12:00 13:15 Lunch in the Solution Showcase Tracks A. Chief Information Security Officer (CISO) Program B. Risk Management and Compliance Program C. Security Manager Program: Technology, Tr 13:15 14:00 The New CISO's Crucial First 100 Days Tom Scholtz A Public Cloud Risk Model: Accepting Cloud Risk is OK, Ignoring Cloud Risk is Tragic Paul Proctor Defensive Strategies in an Age of Digital Insurgency Oliver Rochford 14:15 14:45 Solution Provider Sessions 15:00 15:45 Be Agile Not Fragile: Use Threat Intelligence Services to Defend Yourself Rob McMillan The Path to High Impact Security Awareness Christian Byrnes Mobile Security Threats and Trends 2015 Dionisio Zumerle 15:45 16:15 Refreshment Break in the Solution Showcase 16:15 16:45 Solution Provider Sessions 17:00 17:45 Case Study Use a Vendor Risk Management Framework to Mitigate Regulatory, Compliance, Security and Performance Issues Gayla Sullivan Panel: Mobile Security and Management: A Real World Discussion Rob Smith et al. 17:45 20:00 Networking Reception in the Solution Showcase Tuesday 15 September :45 17:00 Registration and Information 08:00 08:45 People-Centric Security: Experiences and Lessons Learnt Tom Scholtz 09:00 09:45 Case Study What's New and Hot in GRC? John Wheeler 09:45 10:15 Refreshment Break in the Solution Showcase 10:15 10:45 Solution Provider Sessions How to Get Single Sign On Ant Allan Future of Endpoint Management Rob Smith 11:00 11:30 Protecting Your House on the Prairie: Security Strategy for the Smaller Enterprise Tom Scholtz Incident Response Platforms A Long Time Coming Rob McMillan Your Cloud Service Adoption Strategy Must Include Data Protection Brian Lowans 11:30 12:45 Lunch in the Solution Showcase 12:15 12:35 Magic Quadrant for Enterprise Netw 12:45 13:30 Avoid Five Security Staffing Disasters Jeremy D Hoinne Digital Business and Your New Relationship with Risk Paul Proctor What Role Will VPNs Play in Your Business Future? John Girard 13:45 14:15 Chief Data Officers and Chief Information Security Officers: Friends or Foes? Debra Logan What Can We Expect from the Upcoming EU Data Protection Regulation? Carsten Casper Lessons Learned on Advanced Threat Defense Strategies and Tools Jeremy D Hoinne 14:15 14:45 Refreshment Break in the Solution Showcase 14:45 15:15 Case Study How To Build A Globally Legal and Successful BYOD Program John Girard 15:30 16:00 One Simple Way to Get Your CEO to Embrace Risk Management John Wheeler Women in Security and Risk Management: Do Women Approach Security and Risk Management Differently Than Men? Roberta Witty Assessing Cloud Service Providers: Getting Beyond the Checklists Erik Heidt 16:15 17:00 Gartner Closing Keynote: Cybersecurity Scenario 2020: The Impact of Digital Business on Security Neil MacDonald Gartner Security & Risk Management Summit 2015 #gartnersecurity
5 Agenda as of 8 June 2015 During the event, please refer to the printed Agenda or the Gartner Events mobile app for complete, up to the minute session information. Tutorial: Best Practices in Crisis Communications Roberta Witty 10:35 10:55 Magic Quadrant for Security Information and Event Management Oliver Rochford 12:15 12:35 Magic Quadrant for Operational Risk Management John Wheeler ends and Operations D. Business Continuity Management Program and E. Internet of Things Security Program Workshops and Contract Negotiation Clinics Roundtables Gartner's Adaptive Security Architecture: New Approaches for Advanced and Insider Threats Neil MacDonald The Availability Implications for Digital Business Roberta Witty 12:45 14:15 Workshop: Get Incident-Ready. Test Your Plan with a Scenario Rob McMillan 13:15 14:15 Roundtable: Reduce The Risks and Implement Data Access Controls Now! Brian Lowans Securing Sensitive SaaS Using Cloud Access Security Brokers Ramon Krikken Case Study 14:30 16:00 Workshop: Get Security Right in an SMB Environment Rob McMillan 14:45 15:45 Roundtable: Changing Your Security Culture: Why Change is Hard and What to Do About It Debra Logan Designing the Modern Application Security Perimeter With Mobile and Cloud in Mind Ramon Krikken Cybersecurity Panel: IT Security, OT Security, IoT Security: Impacts and Recommendations Earl Perkins et al. 16:15 17:45 Workshop: Secure Self-Assessing and Self- Cleansing Systems with DevOps? Joerg Fritsch 16:45 17:45 Roundtable: Managing the Identity of Things Ant Allan Defending Endpoints from the Persistent Attack Peter Firstbrook Defending Against Sophisticated Malware Mario de Boer Privacy and the Internet of Things: How to Avoid Crossing the Creepy Line Carsten Casper Balancing Trust and User Experience for User Authentication Ant Allan 08:00 09:30 Workshop: Introduction to Mobile Security Self-Assessments John Girard and Dionisio Zumerle 08:00 09:00 Roundtable: Do you Measure the Impact of Your Awareness Program? Christian Byrnes The Dark Side of Payment Card Security Jonathan Care ork Firewalls Jeremy D Hoinne Why Crisis Management is the Heart of BCM Software Roberta Witty 10:45 12:15 Contract Negotiating Clinic: Cloud Contracts, Develop Your Own Security and Risk Exhibits Gayla Sullivan 10:45 11:45 Roundtable: Building Successful Business Metrics for Technology Risk Paul Proctor Secure Use of AWS and Azure: Comparison and Best Practices Neil MacDonald Operational Technology Security is Not Just for Industries Anymore Earl Perkins 12:45 14:15 Workshop: Identity Proofing Revisited as Data Privacy Dies Jonathan Care 12:45 13:45 Roundtable: Why Social Media Risks Are Skyrocketing and What You Can Do to Protect Your Company John Wheeler Protecting Mobile Apps Dionisio Zumerle Case Study Friends at the Gate? Best Practices for Enabling Remote Privileged Access From Vendors and Third Parties Felix Gaehtgens The Legality and Ethics of IoT and Employee Monitoring Carsten Casper 14:30 16:00 Workshop: Reporting Risk and Security to your Board of Directors Paul Proctor 14:45 15:45 Roundtable: Secure Use of Public Cloud Neil MacDonald What Your Containers do Not Contain! About the Security Properties of Containers Managed by Docker Joerg Fritsch Visit gartnerevent.com/eu/security for more information
6 Gartner Security & Risk Management Summit September London, UK gartnerevent.com/eu/security Registration and pricing 3 easy ways to register Web: gartnerevent.com/eu/security emea.registration@gartner.com Telephone: Pricing Pricing subject to change early-bird price: 2,150 + UK VAT (offer ends 17 July 2015) Standard price: 2,475 + UK VAT public Sector price: 1,950 + UK VAT Gartner Clients A Gartner ticket covers both days of the Summit. Contact your account manager or emea.events@gartner.com to register using a ticket. Group Rate discount Maximize learning by participating together in relevant sessions or splitting up to cover more topics, sharing your session take-aways later. Complementary registrations: 1 for every 3 paid registrations 2 for every 5 paid registrations 3 for every 7 paid registrations For more information, emea.teamsend@gartner.com or contact your Gartner account manager. WHY AttEnD A GARtnER EVEnt? Build a successful strategy Get validation from Gartner analysts Meet with suppliers to support your tactical planning Expand your peer network Innovate and problem-solve with like-minded peers Join the largest, most infl uential network of its kind Grow in your role Get content and solutions that are most relevant to you Lead more effectively and develop your team WHAt MAKEs GARtnER EVEnts unique? Our analysts Analyst-led presentations Analyst one-on-one private meetings Analyst-facilitated roundtables Our research 100% independent and objective Proven and reliable Relevant to your role Venue Park Plaza Westminster Bridge 200 Westminster Bridge Road London, UK SE1 7UT Phone Gartner Hotel Room Rate Prices start at 175 per night at Park Plaza when using promotional code GART Money-back guarantee If you are not completely satisfi ed with this Gartner conference, please notify us in writing within 15 days of the conference and we will refund 100% of your registration fee Gartner, Inc. and/or its affi liates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affi liates. For more information, info@gartner.com or visit gartner.com.
Gartner Security & Risk Management Summit 2015
EARLY-BIRD Discount Save 325 by 17 July Gartner Security & Risk Management Summit 2015 14 15 September London, UK gartner.com/eu/security The World s Most Important Gathering for Security and Risk Executives
More informationGartner Security & Risk Management Summit 2015
EARLY-BIRD Discount Save $300 by 4 September Gartner Security & Risk Management 2015 2 3 November Raffles Hotel, Dubai, UAE gartner.com/me/security Manage Risk and Deliver Security in a Digital World Hot
More informationGartner Security & Risk Management Summit 2014
Gartner Security & Risk Management Summit 2014 25 26 August Hilton Sydney, Australia gartner.com/ap/security Smart Risk Balancing Security and Opportunity Hot Topics People-Centric Security Governance
More informationGartner Security & Risk Management Summit 2015
EARLY-BIRD Discount Save $400 by 26 June Gartner Security & Risk Management Summit 2015 24 25 August Hilton Sydney gartner.com/ap/security Manage Risk and Deliver Security in a Digital World Hot topics
More informationGartner Identity & Access Management Summit 2015
EARLY-BIRD Discount Save 300 by 16 January 2015 Gartner Identity & Access Management Summit 2015 16 17 March London, UK gartnerevent.com/eu/iam Successful IAM Simple, Business Driven and Secure Key benefits
More informationGartner Security & Risk Management Summit 2015
EARLY-BIRD DISCOUNT Save 6,500 by 3 July Gartner Security & Risk Management 2015 1 2 September Mumbai, India gartner.com/in/security Manage Risk and Deliver Security in a Digital World Hot topics Cybersecurity
More informationExploit New Architectures: Create Your Digital Future
EARLY-BIRD Discount Save 325 by 17 July the annual gathering for technical professionals 16 17 September 2015 London, UK gartner.com/eu/catalyst Exploit New Architectures: Create Your Digital Future Key
More informationGartner Security & Risk Management Summit 2015
Gartner Security & Risk Management Summit 2015 June 8 11 I National Harbor, MD gartner.com/us/securityrisk From learning how to re-evaluate and update your security and risk strategies and investments
More informationGartner Business Intelligence & Analytics Summit 2015
EARLY-BIRD Discount Save 325 by 14 August Gartner Business Intelligence & Analytics Summit 2015 14 15 October Munich, Germany gartner.com/eu/biger Crossing the Analytical Divide: New Technologies, New
More informationGartner Digital Workplace Summit 2016
EARLY-BIRD DISCOUNT Save 325 by 22 July Gartner Digital Workplace Summit 2016 21 22 September London, U.K. gartnerevents.com/eudwlearn Key Benefits of Attending Build a strategic roadmap for digital workplace
More informationGartner Security & Risk Management Summit 2013
Gartner Security & Risk Management Summit 2013 19 20 August Sydney, Australia gartner.com/ap/security THREE COMPLETE PROGRAMS Chief Information Security (CISO) Program Risk Management and Compliance Program
More informationArchitecting the Digital Business: How to Use and Secure Cloud, Mobile and Data
NEW EvENt FOR 2014! 17 18 June 2014 london, uk gartner.com/eu/catalyst FOR technologists, BY technologists Architecting Digital : How to Use and Secure, and Data HOT TOPICS Securing public cloud Making
More informationAddress C-level Cybersecurity issues to enable and secure Digital transformation
Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,
More informationGartner Application Architecture, Development & Integration Summit 2014
Gartner Application Architecture, Development & Integration Summit 2014 21 22 July Hilton Sydney, Australia gartner.com/ap/aadi Transform Your Applications Strategy for a Digital World hot TOPICS Flexible
More informationGartner IT Infrastructure, Operations & Data Center Summit 2015
EARLY-BIRD Discount Save $400 by 20 March Celebrating 10 Years Gartner IT Infrastructure, Operations & Data Center Summit 2015 18 19 May Hilton Sydney gartner.com/ap/datacenter Transform Service Delivery
More informationGartner IT Financial, Procurement & Asset Management Summit 2015
Gartner IT Financial, Procurement & Asset Management Summit 2015 21 22 September London, UK gartner.com/eu/itam Leading Change to Drive Innovation, Collaboration and Cost Optimization Key benefits of attending
More informationGartner Business Intelligence, Analytics & Information Management Summit 2016
EARLY-BIRD DISCOUNT Save 6,500 by 8 April 2016 Gartner Business Intelligence, Analytics & Information Management Summit 2016 2016 SURVEY Bi/analytics GARTNER CIO AGENDA still #1 technology priority See
More informationGartner Business Intelligence & Analytics Summit 2016
EARLY-BIRD DISCOUNT Save 325 by 12 August 2016 Gartner Business Intelligence & Analytics Summit 2016 10 11 October Munich, Germany gartnerevents.com/debibrochure Analytics Leadership: Empowerment Without
More informationGartner IT Financial, Procurement & Asset Management Summit 2015
EARLY-BIRD Discount Save 325 by 24 July Gartner IT Financial, Procurement & Asset Management Summit 2015 21 22 September London, UK gartner.com/eu/itam Leading Change to Drive Innovation, Collaboration
More informationGartner Business Process Management Summit 2015
EARLY-BIRD Discount Save $400 by 27 March Gartner Business Process Management Summit 2015 1 2 June Sydney, Australia gartner.com/ap/bpm BPM Shift From Improving Process to Delivering Big Change Key Benefits
More informationGartner PPM & IT Governance Summit 2015
EARLY-BIRD Discount Save 325 by 10 April 2015 Gartner PPM & IT Governance Summit 2015 8 9 June London, UK gartner.com/eu/ppm Thriving on Digital Chaos: Innovation, Agility and Collaboration Key benefits
More informationGartner Security & Risk. Management. Summit 2012. Visit gartner.com/us/securityrisk or call 1 866 405 2511 to register
Visit gartner.com/us/securityrisk or call 1 866 405 2511 to register FIVE COMPLETE PROGRAMS CISO Program IT Security Business Continuity Management Risk Management and Compliance New! The Business of IT
More informationGartner It Financial, Procurement & asset Management Summit 2014
Gartner It Financial, Procurement & asset Management Summit 2014 17 18 September London, UK gartnerevent.com/eu/itam Driving Business Outcomes: Control Costs, Mitigate Risks and Sustain Innovation KEY
More informationGartner Business Intelligence & Analytics Summit 2015
Gartner Business Intelligence & Analytics Summit 2015 14 15 October Munich, Germany gartner.com/eu/biger Crossing the Analytical Divide: New Technologies, New Skills Hot Topics Leading a Digital Business
More informationGartner IT Infrastructure, Operations & Data Center Summit 2015
EARLY-BIRD DISCOUNT Save 6,500 by 13 March Gartner IT Infrastructure, Operations & Data Center Summit 2015 11 12 May Mumbai, India gartner.com/in/datacenter Leading I&O: Delivering New Levels of Innovation
More informationArchitecting the Digital Business: How to Use and Secure Cloud, Mobile and Data
New event 2014! 17 18 June 2014 London, UK gartner.com/eu/catalyst FOR TECHNOLOGISTS, BY TECHNOLOGISTS Architecting Digital : How to Use and Secure, and Data Hot pics Securing public cloud Making big data
More informationGartner Application Architecture, Development & Integration Summit 2015
EARLY-BIRD Discount Save $400 by 22 May Gartner Application Architecture, Development & Integration Summit 2015 20 21 July Hilton Sydney gartner.com/ap/aadi Innovate and Renovate to Dominate in the New
More informationCybersecurity Strategic Consulting
Home Overview Challenges Global Resource Growth Impacting Industries Why Capgemini Capgemini & Sogeti Cybersecurity Strategic Consulting Enabling business ambitions, resilience and cost efficiency with
More informationGartner IT Infrastructure, Operations & Data Center Summit 2016
EARLY-BIRD DISCOUNT Save $375 by 18 March Gartner IT Infrastructure, Operations & Data Center Summit 2016 16 17 May Sydney, Australia gartner.com/ap/datacenter Key benefits Align the advantages, risks
More informationWhile you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:
While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab: A copy of today s presentation and our Upcoming webinars Information on how to dial in if
More informationGartner Application Architecture, Development & Integration Summit 2016
EARLY-BIRD DISCOUNT Save $375 by 27 May Gartner Application Architecture, Development & Integration Summit 2016 25 26 July Sydney, Australia gartner.com/ap/aadi Hot topics Mobile Development Internet of
More informationGartner Business Intelligence, Analytics & Information Management Summit 2015
EARLY-BIRD DISCOUNT Save 6,500 by 10 April Gartner Business Intelligence, Analytics & Information Management Summit 2015 9 10 June Mumbai, India gartner.com/in/bi Crossing the Analytical Divide: New Technologies,
More informationGartner Magic Quadrant Sources and Disclaimer
Gartner Magic Quadrant Sources and Disclaimer 1. Gartner Magic Quadrant for Network Access Control; by Lawrence Orans, John Pescatore, Mark Nicolett; March 27, 2009 2. Gartner Magic Quadrant for Endpoint
More informationFFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors
Overview for Chief Executive Officers and Boards of Directors In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed
More informationGartner Identity & Access Management Summit 2013
Gartner Identity & Access Management Summit 2013 Pragmatic Futures for IAM: Meeting Business Needs at the Nexus of Forces Trip Report The annual Gartner Identity & Access Management Summit was held on
More informationGartner IT Infrastructure & Operations Management Summit 2015
EARLY-BIRD Discount Save 325 by 3 April Gartner IT Infrastructure & Operations Management Summit 2015 1 2 June Berlin, Germany gartner.com/eu/iom Building a Lean and Agile I&O The Engine for your Digital
More informationGartner Digital Workplace Summit 2015
Gartner Digital Workplace Summit 2015 21 22 September London, UK gartner.com/eu/workplace Workplace Reimagined: Agile, Engaged, Empowered Key Benefits of Attending Increasing Employee Engagement and Agility
More informationGartner Enterprise Information & Master Data Management Summit 2016
EARLY-BIRD DISCOUNT Save 325 by 8 January 2016 Gartner Enterprise Information & Master Data Management Summit 2016 2 3 March London, UK gartnerevent.com/eu/eim Hot Topics Digital Information Leadership
More informationDeveloping National Frameworks & Engaging the Private Sector
www.pwc.com Developing National Frameworks & Engaging the Private Sector Focus on Information/Cyber Security Risk Management American Red Cross Disaster Preparedness Summit Chicago, IL September 19, 2012
More informationMicrosoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
More informationWelcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc
Agenda Overview 9:00am General Session Auditorium 13:30pm General Session Auditorium 16:30pm General Session Auditorium 09:00 Welcome am Roberto Casetta, Snr. Vice President International 9:15am HEAT Software
More informationGartner Identity & Access Management summit 2014
Gartner Identity & Access Management summit 2014 17 18 March London, UK gartner.com/eu/iam A 2020 vision for SAVE 300! Register by 17 January 2014 GueST KeYNOTe SPeAKeRS Preparing for the Unpredictable
More informationGartner IT Financial, Procurement & Asset Management Summit 2016
EARLY-BIRD DISCOUNT Save 325 by 15 July 2016 Gartner IT Financial, Procurement & Asset Management Summit 2016 12 13 September London, UK gartnerevents.com/euitam The Art of Influence: Optimizing Costs
More informationInformation Security Forum Sponsorship Programs
Information Security Forum Sponsorship Programs About IANS IANS is an information security advisory and consulting firm, serving Fortune 1000 information security professionals with in-depth insights and
More informationCYBER RISK INTERNATIONAL COMPANY PROFILE
CYBER RISK INTERNATIONAL COMPANY PROFILE About Us Robert Madelin, the EU Commission s director general overseeing digital matters, has warned about a clear and present danger of cyber attacks in Europe.
More informationWorkshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business
Workshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business Earl Perkins Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced
More informationVMware and the Need for Cyber Supply Chain Security Assurance
White Paper VMware and the Need for Cyber Supply Chain Security Assurance By Jon Oltsik, Senior Principal Analyst September 2015 This ESG White Paper was commissioned by VMware and is distributed under
More informationINSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL
INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL BY 2 In enterprise IT, there is a single point where everything that matters in information, technology and business converges: Cybersecurity Nexus
More informationGartner Security & Risk. Management Summit 2015. Trip Report. Overview. Manage Risk and Deliver Security in a Digital World.
Gartner Security & Risk Management Summit 2015 June 8 11 National Harbor, MD gartner.com/us/securityrisk Manage Risk and Deliver Security in a Digital World Trip Report Gartner Security & Risk Management
More informationThe Next Generation of Security Leaders
The Next Generation of Security Leaders In an increasingly complex cyber world, there is a growing need for information security leaders who possess the breadth and depth of expertise necessary to establish
More informationCybersecurity Awareness for Executives
SESSION ID: SOP-R04 Cybersecurity Awareness for Executives Rob Sloan Head of Cyber Content and Data Dow Jones @_rob_sloan Session Overview Aim: Provide a high level overview of an effective cybersecurity
More informationPhysical Security: Introductory Applications and Technology
Physical Security: Introductory Applications and Technology February 22 23, 2016 Fort Worth, TX Earn up to 14 CPEs EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N Delivering
More informationSECURING PAYMENTS IN THE CYBER WORLD
The Central Bank of Kuwait Presents An Information Security Forum on SECURING PAYMENTS IN THE CYBER WORLD 16th NOVEMBER 2014 JUMEIRAH MESSILAH BEACH HOTEL, KUWAIT WELCOME In the last few years, the usages
More informationFFIEC Cybersecurity Assessment Tool
Overview In light of the increasing volume and sophistication of cyber threats, the Federal Financial Institutions Examination Council 1 (FFIEC) developed the Cybersecurity Tool (), on behalf of its members,
More informationGartner Master Data Management Summit 2012
Gartner Master Data Management Summit 2012 8 9 February Park Plaza Westminster Bridge London, UK gartner.com/eu/mdm hot Topics building a solid business case for MDM organization, roles and stakeholder
More informationCYBER SECURITY INFORMATION SHARING & COLLABORATION
Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers
More informationGartner Identity & Access Management Summit 2012. EARLY-BIRD DISCOUNT Register by 13 January 2012 and save 300. HOT TOPICS Future Trends in IAM
EARLY-BIRD DISCOUNT Register by 13 January 2012 and save 300 HOT TOPICS Future Trends in IAM Defining an IAM Strategy Identity and Access Governance IAM for Cloud Computing IAM Architecture IAM Tools and
More informationGartner Security & Risk Management Summit 2012
Gartner Security & Risk Management Summit 2012 16 17 July 2012 Sydney, Australia gartner.com/ap/security Trip Report Strategic Roadmaps to Secure the Enterprise and Manage Risk Overview INTRODUCTION The
More informationGartner Symposium/ITxpo Africa 2013 Analyst Areas of Coverage
Analyst Biography Symposium Presentations Example Issues She Can Assist With Alexa Bona Software Licensing Alexa is responsible for coverage of future trends in software licensing and pricing practices,
More informationGartner Customer 360 Summit
Early-Bird Savings Save $300 when you register by May 7 Gartner Customer 360 Summit June 28 30 Los Angeles, CA gartner.com/us/crm CRM Strategies and Technologies to Understand, Grow and Engage Customers
More informationAFCEA Global Identity Summit 2014 Engagement Theater
AFCEA Global Identity Summit 2014 Engagement Theater Tuesday, September 16 th 2:00 p.m. - 3:50 p.m. Confirmation of the Biometric Identity of an epassport Holder and Atomic Authorization for Devices (AKA
More informationNetwork Security Redefined. Vectra s cybersecurity thinking machine detects and anticipates attacks in real time
Network Security Redefined Vectra s cybersecurity thinking machine detects and anticipates attacks in real time Table of Contents Executive Overview 3 Relying on Prevention is Not Enough 4 Four Reasons
More informationGartner IT Infrastructure Operations & Data Center Summit 2013
Gartner IT Infrastructure Operations & Data Center Summit 2013 13 14 May Mumbai, India gartner.com/in/datacenter HOT TOPICS Managing data center cost and sustainability Mobile and big data impact Cloud
More informationAccelerating Enterprise Growth by Leveraging Strategic Solutions. Eva Chen CEO and Co-Founder
Accelerating Enterprise Growth by Leveraging Strategic Solutions Eva Chen CEO and Co-Founder OUR CONSISTENT VISION: A world safe for exchanging digital information OUR CORE COMPETENCE: Innovating to staying
More informationAnalyst Biography Symposium Presentations Example Issues He Can Assist With
Neil Chandler BI & Analytics Neil focuses on business intelligence, analytics and performance management. This includes writing about and advising organisations about market trends, vendors, service providers
More informationSYMPOSIUM PROGRAM DAY ONE
Tuesday 26 th August 2014 9.00am - 5.30pm RACV City Club, Melbourne SYMPOSIUM PROGRAM DAY ONE 8:30am Registration Opens Location: Foyer Level 2 9:00am 9:10am Symposium Welcome Speaker: Tom Garcia, Chief
More informationDetecting Cyber Attacks in a Mobile and BYOD Organization
SOLUTION BRIEF Detecting Cyber Attacks in a Mobile and BYOD Organization Explore the challenges, understand the needs, evaluate mobile device management as an approach to detecting attacks and offer a
More informationCyber Security Risks for Banking Institutions.
Cyber Security Risks for Banking Institutions. September 8, 2014 1 Administrative CPE regulations require that online participants take part in online questions Must respond to a minimum of four questions
More informationRethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council
Rethinking Information Security for Advanced Threats CEB Information Risk Leadership Council Advanced threats differ from conventional security threats along many dimensions, making them much more difficult
More informationGartner PPM & IT Governance Summit 2016
EARLY-BIRD DISCOUNT Save 325 by 15 April Gartner PPM & IT Governance Summit 2016 13 14 June London, U.K. gartnerevent.com/eu/ppm Key Benefits Develop Effective Portfolio Management Increase PMO and EPMO
More informationAppendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises
Appendix Key Areas of Concern i. Inadequate coverage of cybersecurity risk assessment exercises The scope coverage of cybersecurity risk assessment exercises, such as cybersecurity control gap analysis
More informationChanging the Enterprise Security Landscape
Changing the Enterprise Security Landscape Petr Hněvkovský Presales Consultant, ArcSight EMEA HP Enterprise Security Products 2012 Hewlett-Packard Development Company, L.P. The information contained herein
More informationServices. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure
Home Secure digital transformation SMACT Advise, Protect & Monitor Why Capgemini & Sogeti? In safe hands Capgemini & Sogeti Cybersecurity Services Guiding enterprises and government through digital transformation
More informationThe Cyber Threat Landscape
The Cyber Threat Landscape Oliver Rochford Research Director Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without
More informationSTREAM Cyber Security
STREAM Cyber Security Management Software Governance, Risk Management & Compliance (GRC) Security Operations, Analytics & Reporting (SOAR) Fast, flexible, scalable, easy to use and affordable software
More informationChief Security Strategist Symantec Public Sector
Chief Security Strategist Symantec Public Sector Advanced Persistent Threat Further things to understand about the APT Compromised Game Networks Lulzec Anonymous/YamaTough WikiLeaks 101 Global Intelligence
More informationWestcon Presentation on Security Innovation, Opportunity, and Compromise
Westcon Presentation on Security Innovation, Opportunity, and Compromise Christian A. Christiansen Program Vice President IDC Security Products & Services What s Happening with Threats? 1.5B 80% 33% $1.3M
More informationThe Pitfalls of DIY Approaches to Disaster Recovery
Business Continuity & Resiliency Services The Pitfalls of DIY Approaches to Disaster Recovery Interactivity Tips 1. Ask A Question 2. Download a PDF copy of today s presentation 3. Social Networking Tools
More informationState Governments at Risk: The Data Breach Reality
State Governments at Risk: The Data Breach Reality NCSL Legislative Summit August 5, 2015 Doug Robinson, Executive Director National Association of State Chief Information Officers (NASCIO) About NASCIO
More informationNew InfoSec Leader The First 90 Days. John Bruce CEO
New InfoSec Leader The First 90 Days John Bruce CEO Agenda Introduction Co3 Systems Role of the CISO Three critical changes Suggestions Page 2 of 39 The next challenge in security PRODUCTS PREVENTION DETECTION
More informationKey Issues for Identity and Access Management, 2008
Research Publication Date: 7 April 2008 ID Number: G00157012 for Identity and Access Management, 2008 Ant Allan, Earl Perkins, Perry Carpenter, Ray Wagner Gartner identity and access management research
More informationNetwork Security Redefined Vectra s cybersecurity thinking machine detects and anticipates attacks in real time
White Paper Network Security Redefined Vectra s cybersecurity thinking machine detects and anticipates attacks in real time Executive Overview All organizations have infected hosts inside their networks.
More informationThe Benefits of an Integrated Approach to Security in the Cloud
The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The
More informationo Cost containment through effective and SAP IT Procurement & negotiation strategies to help them achieve best-inclass, purchasing Asset Management
Alexa Bona s research currently focuses on IT management. As part of the IT Procurement and Asset o Workshop: Six Steps to Preparing and Negotiating Software Contracts o Negotiating effective sustainable
More informationGartner Master Data Management Summit 2013
Gartner Master Data Management Summit 2013 7 8 February 2013 Palau de Congressos de Catalunya, Barcelona, Spain gartner.com/eu/mdm Hot Topics Building the Business Case for Mdm Linking Mdm with Business
More informationGartner Sourcing & Strategic Vendor Relationships Summit 2016
EARLY-BIRD DISCOUNT Save $325 by July 22 Gartner Sourcing & Strategic Vendor Relationships Summit 2016 September 21 23 Grapevine, TX (Dallas area) gartner.com/us/sourcing Transforming Sourcing: Accelerating
More informationGartner PPM & IT Governance Summit 2014
Gartner PPM & IT Governance Summit 2014 9 10 June London, UK gartner.com/eu/ppm Resource Priorities Generate Change Realize Returns HOT TOPICS Effectively Prioritizing Projects and Programs Creating an
More informationIntegrating Security and Privacy Considerations into Client Services, Products and Day-To-Day Operations. WMACCA September 16, 2014
Integrating Security and Privacy Considerations into Client Services, Products and Day-To-Day Operations WMACCA September 16, 2014 Panel Moderator: Mary Ellen Callahan of Jenner & Block; (Former Chief
More informationBT Assure Threat Intelligence
BT Assure Threat Intelligence Providing you with the intelligence to help keep your organisation safe BT Assure. Security that matters At all times, organisations are vulnerable to all kinds of cyber attacks
More informationCybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015
Cybersecurity: Considerations for Internal Audit IIA Atlanta Chapter Meeting January 9, 2015 Agenda Key Risks Incorporating Internal Audit Resources for Internal Auditors Questions 2 Key Risks 3 4 Key
More informationSecurity Management Program Development:
Security Management Program Development: A Critical Infrastructure Protection Model July 15 16, 2015 Earn up to 15 CPEs EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N Are
More informationIT Transformation Summit 2013 - agenda Unleashing IT s competitive business potential
IT Transformation Summit 2013 - agenda Unleashing IT s competitive business potential Tuesday November 26 th 2013 - British Museum, London 8.30 Registration and exhibition opens 9.30-9.40 Host s opening
More informationIntelligence Driven Security
Intelligence Driven Security RSA Advanced Cyber Defense Workshop Shane Harsch Senior Solutions Principal, RSA 1 Agenda Approach & Activities Operations Intelligence Infrastructure Reporting & Top Findings
More informationGartner Business Intelligence, Analytics & Information Management Summit 2015
EARLY-BIRD Discount Save $400 by 12 December Gartner Business Intelligence, Analytics & Information Management Summit 2015 23 24 February Sydney, Australia gartner.com/ap/bi Crossing the Analytical Divide:
More informationAccenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges
Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287
More informationReinventing Network Security Vectra s cyber-security thinking machine delivers a new experience in network security
White Paper Reinventing Network Security Executive Overview Organizations are under constant attack from high-volume opportunistic threats and the less-frequent, but highly targeted attacks. Damage ranges
More informationOPENTEXT GLOBAL FAX SUMMIT 2011
OPENTEXT GLOBAL FAX SUMMIT 2011 Tuesday, July 12 th and Wednesday July 13 th, 2011 Customer Workshops and Partner Day, Thursday, July 14 th, 2011 Westin La Paloma Resort & Spa, Tucson, Arizona SUMMIT AGENDA
More informationMSc Cyber Security. identity. hacker. virus. network. information
identity MSc Cyber Security hacker virus QA is the foremost provider of education in the UK. We work with individuals at all stages of their careers, from our award-winning apprenticeship programmes, through
More informationGartner IT Leadership Trends: Building Your Digital Enterprise
Gartner IT Leadership Trends: Building Your Digital Enterprise Register by visiting kpc-group.cz/ gartner-it-leadership- -trends-2014 Prague Marriott Hotel 12 May 2014 What s new in 2014? Panel discussion
More informationidentity as the new perimeter: securely embracing cloud, mobile and social media agility made possible
identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible IT transformation and evolving identities A number of technology trends, including cloud, mobility,
More information