Gartner Security & Risk Management Summit 2013
|
|
|
- Nathaniel Randall
- 10 years ago
- Views:
Transcription
1 Gartner Security & Risk Management Summit August Sydney, Australia gartner.com/ap/security THREE COMPLETE PROGRAMS Chief Information Security (CISO) Program Risk Management and Compliance Program IT Security Program EARLY-BIRD DISCOUNT Register by 21 June 2013 and save $400
2 Reset Your World: The Evolving Role of Risk After nearly a decade of steady progress toward maturity, IT security and risk management have reached a tipping point. TABLE OF CONTENTS 2 Event Introduction 3 Why Attend 4 Keynotes 5 Meet the Analysts 6 Summit Features 7 Event Architecture 8 Agenda at a Glance 10 Tracks A, B and C: Sessions 13 Interactive Sessions 14 Solution Showcase 15 How to Register The Nexus of Forces social, mobile, cloud and information has unleashed a new wave of change and threats. Emerging markets and a jumble of international regulatory and compliance obligations have also increased the complexity of the business environment. In addition, the uncertainty of climate change is making business continuity management (BCM) more important than ever. As these threats and changes transform markets and redefi ne competitive advantage, business leaders are recognizing the critical role IT security and risk management disciplines play in ongoing business growth and transformation. This year s Gartner Security & Risk Management Summit delivers the essential tools and strategies CIOs, CISOs, CROs, CTOs and their teams need to identify and communicate emerging risks, manage them appropriately and enable the business to grow and prosper as securely as possible. We look forward to welcoming you to the Summit. Powerful Tools to Navigate Manage and Decide 16 About Gartner Research Director and Summit Chair, Gartner Tatiana Wells Senior Program Director, Gartner Events 2 Gartner Security & Risk Management Summit 2013
3 This is my fi rst Gartner Summit and it has been a rich and rewarding experience. I feel that I have advanced my understanding of my areas of interest by a year in only 2 days. UnitingCare Management and Information Security Why Attend Reset your security and risk strategy to focus on enabling business objectives Stay relevant in your role as the Nexus of Forces redefi nes IT security and risk Implement business continuity management (BCM) best practices to make the business more resilient to threats Craft a strategy to deal with emerging BYOD and mobile threats Understand what drives individual and group behavior to elevate the stature of security and risk in the organization Assess how to measure and manage the impact of risk on business performance, whilst complying with a variety of global rules, regulations and laws about fi nancial transactions and privacy CIOs rank security within the top 10 technology priorities for 2013 WHO SHOULD ATTEND? Business and IT professionals involved in enterprise-wide security, risk management or business continuity: CIO / CTO / CISO IT Security Officer Infrastructure Architect/ Network/Solutions Architect/ Security Architect Information Risk Manager Security Risk Manager/Risk Manager Compliance Manager/Fraud Manager Information Security Manager Security ranked within the top 10 priorities for 2013, which also included mobile technologies, cloud computing and SaaS, and analytics, according to a new Gartner survey of more than 2,000 CIOs. Visit gartner.com/ap/security for agenda updates and to register 3
4 SUMMIT FEATURES AND BENEFITS Plenary Sessions In our renowned plenary sessions, you ll hear what today s leading fi gures are thinking. Gartner analysts and invited experts will give you strategic insights, thought-provoking points of view and forward-thinking advice that will help shape your planning. Track Sessions Presented by Gartner analysts, invited guest speakers and industry presenters, these sessions focus on the issues that matter most to you and provide real-world information that will help you make better decisions and drive successful results. Workshops Presented by Gartner or guest experts, these workshops provide an opportunity to drill down on specific how to topics in an extended, small group session. The courses are designed for an intimate and interactive learning experience. Gartner Analyst One-on-One Meetings Meeting face-to-face with a Gartner analyst is one of the key benefi ts of attending a Gartner Summit. Personalize your 30 minute private appointment to discuss your specific issue and walk away with invaluable, tailor made advice. Gartner Analyst User Roundtables (AUR) Moderated by a Gartner analyst, these roundtables are a great forum for exchanging ideas and hearing what your peers are experiencing around a particular issue. Reserved for end-users only. Ask the Analyst Roundtables NEW Alongside the traditional Gartner Analyst-User Roundtables where you can speak to your peers in a moderated environment, there will also be a series of QA roundtables in which delegates can question the analyst directly and learn from the questions posed by your peers. Magic Quadrant Sessions NEW Who are the competing players in the major technology markets? How are they positioned to help you over the long haul? Gartner Magic Quadrants (MQ) are a culmination of research in a specifi c market, giving you a wide-angle view of the relative positions of the market s competitors. By applying a graphical treatment and a uniform set of evaluation criteria, a Gartner Magic Quadrant quickly helps you digest how well technology providers are executing against their stated vision. Tutorials NEW Wether you are new to this area or need a refresher, these presentations focus on laying the foundations for attendees understanding of a topic, trend or technology with basic 101 building block defi nitions and analysis. Business Continuity Management (BCM) Key Focus NEW Business continuity management (BCM) is crucial to ensuring the enterprise s resiliency and viability following disruptive events. This has become a crucial discipline in an increasingly complex, interconnected global economy. This year, we are introducing this key initiative to help organizations anticipate the unexpected, and reinforce a discipline of risk management and mitigation, response and recovery in the corporate culture. 4 Gartner Security & Risk Management Summit 2013
5 EVENT ARCHITECTURE When you attend the Gartner Security & Risk Management Summit 2013, you ll have access to 12 international and local Gartner analysts presenting the latest research covering the full spectrum of security and risk topics. From infrastructure security to identity and access management, governance to fraud to emerging risks, technology implementation to boardroom presentation, this is your singular opportunity each year to update every aspect of risk management and security based on the latest Gartner insight. The event architcture has been designed to address your specific role, be it security leadership, risk and compliance or operations and technology. Three Programs Focus on Your Role A Chief Information Security Officer (CISO) Program Leadership in Motion The security organization needs new ways of operating. Chief information security offi cers (CISOs) must strive to act like and want to be seen as business leaders. The team s approach to security needs to extend beyond technology alone to include the human dimension, the behaviors and processes that lie at the root of so many security failures. It requires people who understand what drives individual and group behaviors, and security leaders who are brave enough to place more trust in their user colleagues. B Risk Management and Compliance Program Integrated performance and risk is the next evolutionary step for governance, risk and compliance (GRC) programs. At the same time, regulatory and legal risks continue to mount for most enterprises, and there are emerging risks from the Nexus of Forces. Measuring and managing the impact of risk on business performance, complying with a variety of global rules, regulations and laws about fi nancial transactions and privacy, and early detection and mitigation of emerging risks are critical components of successful business and IT operations. C IT Security Program Technology and Operations The impact of cloud, social, mobility and big data drives new opportunities for business success but also challenges traditional approaches to information security. As organizations accelerate their adoption of these new platforms for business operations, your security program must rapidly mature in the breadth and effectiveness of techniques and technologies you use to maintain appropriate levels of security for applications, data and infrastructure regardless of location. From technical issues around fi rewalls, privacy, anti-virus and anti-spam to enabling strategies such as identity and access management, secure collaboration and data loss prevention, this program will cover the breadth of security threats and solutions. Four Virtual Tracks Focus on Your Key Initiatives Virtual tracks make it easy to follow a key initiative, a trend, hot topic or address industry issues in relevant sessions pulled from across all three Summit programs. To further customize any track, visit Agenda Builder at ab.gartner.com/sec7a Business Continuity Management (BCM) Can your organization survive another natural disaster? The number of regional disasters is growing. How will your enterprise ensure continuing operations when a business interruption occurs? These sessions help organizations anticipate the unexpected, and reinforce a discipline of risk management and mitigation, response and recovery in the corporate culture. IAM and Secure Business Enablement As business and institutions mature, they must manage volatile and rapid change, establish effective formal governance and provide accountability through transparency. IAM can enable these evolutionary steps but must evolve itself. These presentations focus on current best practices and the latest issues and trends. Mobility and Security Wireless access plays a factor in all future network and user device approaches, bringing both new and reinvented wireless security challenges. This track covers some of the business critical system and data issues emerging from new wireless technologies. Cloud Security The imperative now is to know your risk profi le, understand the risks cloud computing can create, minimize those risks and move forward appropriately. This track explores the latest challenges associated with cloud security. Visit gartner.com/ap/security for agenda updates and to register 5
6 KEYNOTES Gartner Keynotes Gartner Opening Keynote: Reset Security and risk professionals are always evolving their approach to address new realities in business and the threat environment. Our trajectory and our anticipated future challenges are demanding another reset to your approach. A reset that creates and sustains signifi cant security and risk benefi ts to your organization and your career., Paul E. Proctor, F. Christian Byrnes Gartner Closing Keynote: The Gartner Five-Year Security and Risk Scenario Gartner s research community for security and risk is composed of over 50 dedicated and numerous contributing analysts. This scenario represents their fi ve-year projection of the state of security and risk. The intent is to provide a base for your long-term strategic planning. F. Christian Byrnes Guest Keynotes Malcolm Crompton, Managing Director, IIS Malcolm Crompton is Managing Director of Information Integrity Solutions Pty Ltd (IIS), a global consultancy socializing in data protection and privacy strategies. IIS assists organizations increase business value and customer trust and ensures government meets the high standards expected in the handling of personal information. As Australia s Privacy Commissioner from 1999 to 2004, Malcolm led the implementation of private sector privacy law. Malcolm s global reputation is built on his forward thinking on the handling and governance of personal information. Malcolm s global reputation and expertise in privacy was recognized when IAPP honored Malcolm with the 2012 Privacy Leadership Award. Advisory Board The Gartner Security & Risk Management Summit benefi ts from the advice and support of a number of end-user representatives who help ensure the content and direction of the Summit fi t the needs of security and risk management professionals. We would like to thank the following individuals for their support: Richard Johnson, Chief Information Security Offi cer, Westpac Yvette Lejins, Lead Architect, Information Security, NEHTA (National E-Health Transition Authority) Peter Cooper, Information Security Manager, Woolworths Group Jenny Lam, Executive Manager, Audit, The Hong Kong Jockey Club Hood Abu Bakar, General Manager, ICT, MISC Berhad Richard Wilson, Manager, Technology Services, Queensland Treasury SH Lim, Head, Information Security, The Hong Kong Jockey Club Graham Thomson, General Manager, Security Risk and Assurance, NBN Craig Davies, Chief Security Offi cer, Cochlear Limited 6 Gartner Security & Risk Management Summit 2013
7 MEET THE ANALYSTS Gartner analysts draw on the real-life challenges and solutions experienced by clients from 13,000 distinct organizations worldwide. F. Christian Byrnes Managing VP Song Chuang Research Director John Girard VP Distinguished Analyst Information Security Program Management; Risk Management Mobile Enterprise Strategy Mobile Enterprise Strategy; Integrating Apple into the Enterprise; Business Continuity Management; Negotiating Software Contracts IT and Operational Technology Alignment Jay Heiser Research VP Gregg Kreizman Research VP Research Director Information Security Program Management; Compliance; Risk Management; Cloud Computing Identity and Access Management; Single Sign- On; Access Management; Federated Identity; IAM as a Service; Electronic Signature; Cloud Identity Security in the APAC Region; Security Strategy; Security Threat Intelligence; Security Incident Response; Data Loss Prevention; Security Metrics; Cloud Security Mark Nicolett Managing VP Paul E. Proctor VP Distinguished Analyst VP Distinguished Analyst Information Security Technology and Services Risk Management; Information Security Program Management; Information Security Technology and Services; Compliance IT Governance Information Security Program Management; Risk Management; Security and IT Governance; Information Security Organization; Information Security Maturity; Information Security Strategy Gayla Sullivan Research Director John A. Wheeler Research Director Roberta J. Witty Research VP IT Asset Management; Negotiating Software Contracts; Sourcing and Vendor Relationships Leaders; Vendor Management Risk Management; Security and Risk Management Leaders; IT Governance; Business Value of IT; Compliance Business Continuity Management Analyst One-on-One Sessions Many attendees tell us that a one-on-one session is worth the price of admission all by itself. Roll up your sleeves with a Gartner analyst and explore the best ways to move your strategy forward. The Gartner Security & Risk Management Summit offers you the unique opportunity to meet privately with one of our analysts in a 30-minute consultation completely focused on helping you craft actionable solutions to current challenges. Meet with the analyst of your choice and reap the benefi ts of individualized, results oriented attention. You decide the topic or issue for discussion. Visit gartner.com/ap/security for agenda updates and to register 7
8 AGENDA AT A GLANCE MONDAY 19 AUGUST 07:30 17:30 Registration, Information and Refreshments 08:30 09:15 Tutorial: Big Data Discovery Using Content- Aware Data Loss Prevention (DLP) Solutions Tutorial: How to Create Emergency Messages That Won't be Ignored Best and Worst Practices Roberta J. Witty 09:30 10:45 Summit Chair Welcome Gartner Keynote: Reset, Paul E. Proctor and F. Christian Byrnes 10:45 11:15 Industry Panel Discussion 11:15 11:45 Refreshment Break in the Solution Showcase A Chief Information Security Officer (CISO) Program Leadership in Motion 11:45 12:15 To the Point: Cyber Security for the Internet of Everything F. Christian Byrnes 12:30 13:15 Transform Your Security and Risk Program or Find Another Job Paul E. Proctor 13:15 14:30 Lunch in the Solution Showcase 14:30 15:15 Transform Your Security Program From Control-Centric to People-Centric B Risk Tutorial: Top Security Trends and Takeaways for 2013 and 2014 John A. Wheeler Management and IT Security Program Compliance Program C Technology and Operations To the Point: The Risk Management Maturity Pathway Top 10 Security Myths Jay Heiser Why ERM and GRC Depend on Each Other to Succeed John A. Wheeler To the Point: Predictions Your Network Security in 2018 Mark Nicolett CyberSecurity! (The Biggest Scam Since The Ponzi Scheme) John Girard Cost, Consequence and Value The Economics of IAM Gregg Kreizman 15:30 16:00 Solution Provider Session Solution Provider Session Solution Provider Session 16:00 16:30 Refreshment Break in the Solution Showcase 16:30 17:15 End-User Case Study CyberInsurance Evolution or Revolution? Paul E. Proctor and John A. Wheeler Security Monitoring for Early Breach Detection Mark Nicolett 17:15 18:00 Guest Keynote Malcolm Crompton, Managing Director, IIS 18:00 19:30 Networking Reception in the Solution Showcase TUESDAY 20 AUGUST 07:30 17:15 Registration, Information and Refreshments 08:45 09:15 To the Point: The Information Security Maturity Pathway Jay Heiser To the Point: Managing Global Recovery and Continuity Risk Roberta J. Witty To the Point: Securing the OT Environment F. Christian Byrnes 09:30 10:00 Solution Provider Session Solution Provider Session Solution Provider Session 10:00 10:30 Refreshment Break in the Solution Showcase 10:30 11:15 That Frightening Phrase: The Standard of Due Care End-User Case Study Your Cloud and Mobile Devices Broke My IAM Gregg Kreizman 11:30 12:00 Solution Provider Session Solution Provider Session Solution Provider Session 12:00 13:15 Lunch in the Solution Showcase 13:15 14:00 Organizing for Success Developing Process-Centric Security Teams 14:15 15:00 Using Outside Resources Security Consultants and Threat Intelligence Services 15:00 15:30 Refreshment Break in the Solution Showcase 15:30 16:15 Guest Keynote Linking Risk to Business Decision Making Creating KRIs That Matter Paul E. Proctor Practicing Safe SaaS Jay Heiser 16:15 17:00 Gartner Keynote: The Gartner Five-Year Security and Risk Scenario F. Christian Byrnes 17:00 17:15 Summit Chair Closing Remarks End-User Case Study Endpoint Security When the Consumer Is King Song Chuang 8 Gartner Security & Risk Management Summit 2013
9 Agenda correct as of 8 May 2013 Interactive Workshops and Analyst-User Roundtables 11:45 13:15 Workshop: Information Security Architecture 101 Roundtable: Business Continuity Management (BCM) Metrics What Works, What Doesn t Moderator: Roberta J. Witty 13:30 13:45 Magic Quadrant: Security Information and Event Management Mark Nicolett 14:30 16:00 Workshop: Cloud Contracts Develop Your Own Security and Risk Exhibits Gayla Sullivan 08:30 10:00 Workshop: Build an Effective Security and Risk Program 10:10 10:25 Magic Quadrant: Data Loss Prevention 10:30 12:00 Workshop: Security Monitoring of Cloud Workloads Mark Nicolett 12:30 12:45 Magic Quadrant: Endpoint Protection Platforms John Girard 13:30 15:00 Workshop: ITScore for Privacy John A. Wheeler At the Summit, please refer to the agenda in the event guide provided, for the most up to date session and location information Roundtable: Reporting to the Board: What Do You Tell Them? What Works, What Doesn t? Moderator: F. Christian Byrnes Roundtable: Strategies for Mitigating Advanced Persistent Threats and Targeted Attacks Moderator: John Girard Roundtable: Strategies for a More Effective Vendor Relationship Moderator: Gayla Sullivan 08:30 10:00 Workshop: Supplier Contingency Planning: What You Need to Know for Supplier Recovery Gayla Sullivan Roundtable: People Centric Security: the What, the Who, the Why and the How Moderator: Roundtable: Your Next Security Strategy How Will You Develop It and What Will It Contain? Moderator: F. Christian Byrnes Roundtable: Biggest Challenges in Implementing Effective IT Governance Moderator: F. Christian Byrnes Roundtable: Government Identity Providing Constituents With Secure Access to Government Services Moderator: Gregg Kreizman AGENDA GUIDANCE To help you navigate the summit agenda, we ve identifi ed track sessions that match your experience level and information needs. Specifi c categories include: MATURITY LEVEL Foundational: If you are at the early stages of your initiative, or are a newcomer to this space, these sessions will give you the necessary understanding and fi rst steps. Advanced: If you are an advanced practitioner, these sessions are designed to take your initiative, or understanding, to the next level. FOCUS Tactical: Sessions providing tactical information that can be used straight away, with a focus on how to, dos and don ts, and best practices. Strategic: Sessions focusing on the strategic insight supporting the development and implementation of your action plan. Visionary: Sessions focusing on emerging trends, concepts, or technologies that will help you with your future planning and decisions. PERSPECTIVE Business: Sessions geared toward business leaders, or IT professionals who need to understand the challenges and opportunities from a business, organizational, or cultural perspective. Technology: Sessions that address technical concepts, details, and analysis. Visit gartner.com/ap/security for agenda updates and to register 9
10 TRACK A: Chief Information Security Officer (CISO) Program Leadership in Motion To the Point: Cyber Security for the Internet of Everything The Internet is expanding to include connections not only to people but to machines: cars, buildings, power grids millions of sensors and control systems, all needing protection. How can enterprises that embrace the Internet of Everything (IoE) in their businesses prepare for threats to such systems? What is cyber security and its role in the IoE? What are the cyber security threats that the IoE faces? How can enterprises using the IoE secure it? F. Christian Byrnes Transform Your Security and Risk Program or Find Another Job Only about 30% of IT Risk and Security offi cers have truly risk-based programs. The other 70% continue to struggle with outdated security programs that are doomed to repeat the same failures. We have reached a tipping point where transformation is not just an option, but a requirement to keep your job. Who are the 30% and what are they doing right? Who are the 70% and why are they doomed to fail? How can I transform my program through formalization and advanced control techniques? Paul E. Proctor The security organization needs new ways of operating. Chief information security officers (CISOs) must strive to act like and want to be seen as business leaders. VP Distinguished Analyst Transform Your Security Program From Control-Centric to People- Centric The traditional control mindset of information security cannot keep pace with technological and behavioral change, resulting in policies and technologies that cause frustration and impede agility. A new approach is required, one that recognizes how the relationships between IT, the business and individuals have been transformed irrevocably. Why are the status quo approaches to information security untenable? Does a less controls-intensive strategy make sense? What are the elements of a potential people-centric approach? To the Point: The Information Security Maturity Pathway Improving information security maturity is fundamental to improving the riskeffectiveness and business alignment of the enterprise s security activities. Gartner s ITScore for Information Security is designed to help you achieve this. Take a brief tour to see what maturity levels 1 through 4 look like, and where your organization may fi t. What is ITScore for Information Security? What are the dimensions used to assess it? What does each maturity level look like? Jay Heiser That Frightening Phrase: The Standard of Due Care Most organizations are aware of their need to meet a standard of due care in their normal business operations. What this means is often not clear and usually only becomes clear when tested in court. In this presentation we look at what this means in the realm of IT Security, highlighting a few examples along the way. What does Standard of Due Care actually mean? What do I need to do to meet it? How will I know if I have met it? Organizing for Success Developing Process-Centric Security Teams There is no such thing as a perfect, universally appropriate model for security organizations. Security organizations must refl ect the political and cultural realities of the enterprise. Every enterprise must develop its own process-based model, taking into consideration basic principles and practical realities. What are the elements of a processbased security model? What are the contemporary models for organizing for security? What are the pitfalls and best practices in security organization? Using Outside Resources Security Consultants and Threat Intelligence Services Clients occasionally seek advice about the leading security consulting fi rms in a particular geography. Many factors determine whether a fi rm is right for the task at hand. Clients must assess the capabilities of a consultant or fi rm by looking beyond the brand and the marketing hype to seek answers to critical questions. What are the questions you should ask to assess a fi rm? How can you get the right people in that fi rm to work on your engagement? How do I make sure that they are doing the job that I need? Foundational Advanced Tactical Strategic Visionary Business Technology 10 Gartner Security & Risk Management Summit 2013
11 TRACK B: Risk Management and Compliance Program To the Point: The Risk Management Maturity Pathway Improving risk management maturity is fundamental to improving the costeffectiveness and business alignment of the enterprise s risk activities. Gartner s ITScore for Risk Management is designed to help you achieve this. Take a brief tour to see what maturity levels 1 through 4 look like, and where your organization may fi t. What is ITScore for Risk Management? What are the dimensions used to assess it? What does each maturity level look like? Top 10 Security Myths It is often said that ignorance is bliss but only until the hack occurs. This presentation will introduce some of the most common misconceptions about security, and conclude with best practices on how to improve your organization s risk management culture. What are the most harmfully wrong ideas about security? Why do these harmful ideas persist? What risk communications practices are most useful for encouraging business-based security decision making? Jay Heiser Why ERM and GRC Depend on Each Other to Succeed This session will defi ne and explore the symbiotic relationship between Enterprise Risk Management (ERM) and Governance, Risk and Compliance (GRC). Today, organizations are challenged with fi nding better ways to understand and analyze risk. Some may look to ERM and others may focus on GRC. To be truly effective, however, organizations need both. Which comes fi rst, ERM or GRC? What are the most important and unique elements of ERM and GRC? How do you avoid the most common pitfalls when crafting your ERM/GRC approach? John A. Wheeler CyberInsurance Evolution or Revolution? Cyberinsurance should be a great idea, but Gartner sees challenges for the industry and for the insured. There is an evolution of cyberinsurance that will make it a worthy vehicle for risk transfer by 2016, but today it is more of a gamble. This debate will cover the pros and cons of cyberinsurance so you can make an informed decision. What are the pros of cyberinsurance today? What are the cons of cyberinsurance today? What is the projected evolution of cyberinsurance? Paul E. Proctor and John A. Wheeler To the Point: Managing Global Recovery and Continuity Risk The challenge of orchestrating effi cient, effective and sustainable business continuity across a global organization requires addressing diffi cult people, process and technology issues. This session will discuss how to develop the structures and procedures to reduce operating risk across different geographies, time zones and operating cultures. What are the key risks to managing a sustainable global BCM program? How can a global BCM program be institutionalized? What are the best practices for effective program development and maintenance? Roberta J. Witty Linking Risk to Business Decision Making Creating KRIs That Matter The term key risk indicator (KRI) has come to mean our most important metrics but the criteria for most important usually falls short of most useful. The defi nition varies greatly across different organizations so there are no standards. Good KRIs should be tied to business impact and infl uence business decision making. What are the quality criteria for a good KRI? How can I create leading indicators of risk with defensible causal relationships to business impact? What are some good examples of KRIs? Paul E. Proctor Practicing Safe SaaS Most enterprises continue to struggle with the appropriate use of SaaS, but for most organizations, no is not the right answer. Standards and practices for risk assessment and use continue to evolve, but gaps still remain. This presentation provides guidance on the creation of SaaS usage profi les. What SaaS risks should we be most concerned about? How do me match business needs with SaaS services? What contractual and technical mechanisms can be used to reduce SaaS risks? Jay Heiser Measuring and managing the impact of risk on business performance, complying with a variety of global rules, regulations and laws, early detection and mitigation of emerging risks are critical components of successful business and IT operations. Paul E. Proctor VP Distinguished Analyst Business Continuity Management IAM and Secure Business Enablement Mobility and Security Cloud Security Visit gartner.com/ap/security for agenda updates and to register 11
12 TRACK C: IT Security Program Technology and Operations To the Point: Predictions Your Network Security in 2018 Gartner Vice President Mark Nicolett takes you ahead in time to what your network security will and won t be like in the not distant future of 2018 and points in between. With many network security safeguards having 5 year lifepsans, the decisions you are making now are already impacting on I m sorry, we still won t be going to work via jetpack. What are the upcoming techniques and technologies to secure networks? Mark Nicolett CyberSecurity! (The Biggest Scam Since The Ponzi Scheme) Gartner Distinguished Analyst John Girard presents an alternative view to the hype surrounding CyberSecurity. What is the real proposition of all things Cyber? Is this the new approach to tackling an agressive threat the origins, or merely a repackagaing of current security approaches with no net new benefi t? Is cyber not only wasteful but dangerous to enterprise security? What new security approaches are being hyped, and what is the real value of these strategies? John Girard Cost, Consequence and Value The Economics of IAM How do we measure the value of IAM? For many, justifying IAM has been elusive. It remains a horizontal concern in the vertical world of business services, something shared by all business functions but owned by none. How can an IAM project be reconciled with the budgets of business? How much does IAM cost today, and why? How does an enterprise cost-justify an IAM project is it possible? How will the economics of IAM change in the era of cloud and mobility? Gregg Kreizman Security Monitoring for Early Breach Detection The internet is being rebooted with HTML5 and the rise of new operating systems and mobile device, not to mention the rise of Cloud everything. How will the secure web gateway (SWG) adapt to keep up with both the evolving security threats and rapidly changing applications? What is the SWG role in adapting to an employee owned device world? What are the major trends infl uencing the SWG market? How will these changes affect current and future SWG critical capabilities? Which vendors are responding to these new requirements? Mark Nicolett To the Point: Securing the OT Environment As the complexity of OT systems increases, and the connectivity to them becomes more ubiquitous, the risk from vulnerabilities increases. What used to be security through obscurity can no longer be the case as OT systems move to Microsoft, Linux and Unix platforms. This session explores the vulnerabilities and how to contain them. How does OT development change the security picture? What can be done to contain the risk of OT intrusion? What examples have been seen that are positive and negative? F. Christian Byrnes Your Cloud and Mobile Devices Broke My IAM Cloud computing and mobile endpoint adoption break established IAM architectures and challenge security leaders to deliver secure access services to their enterprises. This session addresses the current and evolving solutions to these problems. What are the challenges that mobile, social, and cloud create for managing IAM? What are the current and future solutions? How are standards evolving to reduce vendor lock-in and promote interoperability? Gregg Kreizman Endpoint Security When the Consumer Is King We are experiencing an unprecedented wave of endpoint innovation. This new wave is driven by consumer requirements not business requirements. Apple and Samsung are the companies to watch not HP and Microsoft. How will endpoint security be transformed by employeeowned tablets and mobile devices on mobile networks? Does Windows 8 change the game? Is application control a viable alternative to black list signature databases and how will App Stores transform security? This presentation will explore these issues and will specifi cally address the following: What new endpoint security techniques are showing promise? Which vendors are leading the charge? Song Chuang The impact of cloud, social, mobility and big data - collectively known as the nexus of forces, drives new opportunities for business success but also challenges traditional approaches to information security., Research Director Foundational Advanced Tactical Strategic Visionary Business Technology 12 Gartner Security & Risk Management Summit 2013
13 INTERACTIVE SESSIONS Limited Availability Book Early Roundtables and Workshops are restricted to a limited number of participants and are available to end-users only. Attendees will be accepted on a fi rst-come, fi rstserved basis. Reservations can be made through the online Agenda Builder tool. Analyst-User Roundtables These topic-driven end-user forums are moderated by Gartner analysts. Learn what your peers are doing around particular issues and across industries (preregistration required). Business Continuity Management (BCM) Metrics What Works, What Doesn t Moderator: Roberta J. Witty Reporting to the Board: What Do You Tell Them? What Works, What Doesn t? Moderator: F. Christian Byrnes Strategies for Mitigating Advanced Persistent Threats and Targeted Attacks Moderator: John Girard Strategies for a More Effective Vendor Relationship Moderator: Gayla Sullivan People Centric Security: the What, the Who, the Why and the How Moderator: Your Next Security Strategy How Will You Develop It and What Will It Contain? Moderator: F. Christian Byrnes Biggest Challenges in Implementing Effective IT Governance Moderator: F. Christian Byrnes Government Identity Providing Constituents With Secure Access To Government Services Moderator: Gregg Kreizman MEET ONE-ON-ONE WITH A GARTNER ANALYST Private 30-minute consultations with a Gartner analyst provide targeted, personalized advice to help you plan proactively and invest wisely (pre-registration required). End-User Case Study Sessions Hear real hands-on this is how we made it happen insight, from organizations whose senior executives are working on the best and most successful security and risk management initiatives. The latest case study information will be added to the agenda as it is confi rmed at gartner.com/ap/security Earn CPE credits Earn CPE credits toward ISC2, ISACA and DRII certification programs by attending the summit. For more information please visit gartner.com/ap/security Workshops Information Security Architecture 101 Cloud Contracts Develop Your Own Security and Risk Exhibits Gayla Sullivan Build an Effective Security and Risk Program Supplier Contingency Planning: What You Need to Know for Supplier Recovery Gayla Sullivan Security Monitoring of Cloud Workloads Mark Nicolett ITScore for Privacy John A. Wheeler Business Continuity Management IAM and Secure Business Enablement Mobility and Security Cloud Security Visit gartner.com/ap/security for agenda updates and to register 13
14 SOLUTION SHOWCASE Develop a shortlist of technology providers who can meet your particular needs. We offer you exclusive access to some of the world s leading technology and service solution providers in a variety of settings. PREMIER SPONSORS SPONSORSHIP OPPORTUNITIES For further information about sponsoring this event, please contact: Dan Giacco, Account Manager [email protected] Tel: +61 (0) PLATINUM SPONSOR SILVER SPONSORS Solution Showcase Networking Reception Get to know your fellow attendees, identify who has the same challenges, and make new friends and relevant connections during the networking reception on Monday 19 August. Solution Provider Sessions These valuable 30-minute sessions feature some of the market s most fascinating solutions, with real life stories about those who have deployed them successfully, including their strategies, challenges and results. MEDIA PARTNERS 14 Gartner Security & Risk Management Summit 2013
15 REGISTRATION 3 easy ways to register Web: gartner.com/ap/security [email protected] Phone: Pricing Early-Bird Price: $2,325 exc. GST (offer ends 21 June 2013) Standard Price: $2,725 exc. GST Public Sector Price: $2,225 exc. GST EARLY-BIRD OFFER Save $400 and get access to an additional 20 global Security sessions online when you register by 21 June Gartner Event Tickets We accept one Gartner Summit ticket or one Gartner Catalyst ticket for payment. If you are a client with questions about tickets, please contact your sales representative or call THE TEAM ATTENDANCE EFFECT: LEVERAGE MORE VALUE ACROSS YOUR ORGANIZATION Knowledge is the capacity for effective action. Just imagine the impact on your organization when knowledge multiplies. Common vision, faster responses, smarter decisions. That s the Gartner Team Attendance effect. You ll realize it in full when your staff members attend a Gartner event. As a group, they can maximize learning by participating in all the Summit sessions. Plus, they ll leverage the expertise of a Gartner analyst at a private group meeting. Up for discussion: your team s strategic initiatives and key projects. Team Benefits Team meeting with a Gartner analyst (end-users only) On-site team contact: Work with a single point of contact for on-site team deliverables Complimentary registrations Complimentary Registrations 1 complimentary registration reward with 3 paid registrations 2 complimentary registration rewards with 5 paid registrations 3 complimentary registration rewards with 7 paid registrations To register a team please [email protected] or contact your Gartner account manager. Please note that teams must be registered at the same time and we can only guarantee availability of team benefi ts if the team is registered at least three weeks in advance of the event. Powerful tools to navigate, manage and decide To get the most out of your Summit experience, we ve created a range of tools to help you plan your agenda and manage your goals and objectives of attending. WEBSITE Get the information you need to help you decide to attend, as well as tools to get approval. Visit gartner.com/ap/security EVENT APPROVAL TOOLS Our Event Approval Tools make it easy to demonstrate the value of your Summit experience. It includes a customizable letter, cost-benefi t analysis, cost optimization highlights, top reasons to attend and more. Find it at gartner.com/ap/security ONLINE AGENDA BUILDER A powerful planning tool designed to help you organize, view and select an agenda based on the following options: Analyst profi le Date and time Session descriptions Schedule Analyst One-on-Ones Schedule a roundtable Visit the Gartner Security & Risk Management Summit 2013 website and click on Agenda. GARTNER EVENTS NAVIGATOR Manage your agenda using your mobile device. This app compatible with iphone, BlackBerry and Android devices has all the Agenda Builder features to create your personal agenda. Plus, you can send and receive messages to attendees, access all social media channels, participate in session polling and view event announcements. Visit gartner.com/ap/security for agenda updates and to register 15
16 ABOUT GARTNER Gartner is the world s leading information technology research and advisory company. We deliver the technology related insight and intelligence necessary to make the right decisions, every day from vendor selection and cost-of ownership to forecasts on market demand and future predictions. Our rigorous and unbiased analysis is based on proven methodologies that push through market hype to get to the facts. Gartner Summits deliver a wealth of new ideas, practical and relevant advice unavailable anywhere else, and the confi dence to make better decisions about your strategy and projects going forward. Gartner Security & Risk Management Summit August Sydney, Australia gartner.com/ap/security 2013 Gartner, Inc. and/or its affi liates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affi liates. For more information, [email protected] or visit gartner.com. THE GARTNER ADVANTAGE YOUR EVENT REMINDERS Save Money Avoid costly mistakes and make the right investment decisions to derive maximum value from your applications initiatives. Save Time Learn, analyze, evaluate and decide your next steps, having gained insight and information into the future of applications over the next fi ve years. Gain Resources Access an unrivalled pool of Gartner analysts to gain timely advice about your strategies and initiatives. Gain Confidence Get insight into what leading organizations and your peers are doing to establish best practices. Register by 21 June 2013 for early-bird savings! Build your own agenda online now Book a 30 minute one-on-one meeting with your preferred Gartner analyst Join our online communities: #GartnerSEC facebook.com linkedin.com 3 EASY WAYS TO REGISTER Security Events Around the Globe 2013 Gartner Security & Risk Management Summit June National Harbor, MD Gartner Catalyst Technical Forum on Mobility 19 June Frankfurt, Germany Gartner Security & Risk Management Summit 1 2 July Tokyo, Japan Gartner Catalyst Conference 29 July 1 August San Diego, CA Gartner Security & Risk Management Summit September London, UK Gartner Catalyst Technical Forum on Mobility 25 September London, UK Gartner Identity & Access Management Summit November Los Angeles, CA Web: gartner.com/ap/security [email protected] Phone:
Gartner Security & Risk Management Summit 2014
Gartner Security & Risk Management Summit 2014 25 26 August Hilton Sydney, Australia gartner.com/ap/security Smart Risk Balancing Security and Opportunity Hot Topics People-Centric Security Governance
Gartner Security & Risk Management Summit 2015
EARLY-BIRD Discount Save $300 by 4 September Gartner Security & Risk Management 2015 2 3 November Raffles Hotel, Dubai, UAE gartner.com/me/security Manage Risk and Deliver Security in a Digital World Hot
Gartner Security & Risk Management Summit 2015
EARLY-BIRD Discount Save 325 by 17 July Gartner Security & Risk Management Summit 2015 14 15 September London, UK gartnerevent.com/eu/security The World s Most Important Gathering for Security and Risk
Gartner Security & Risk Management Summit 2015
EARLY-BIRD Discount Save $400 by 26 June Gartner Security & Risk Management Summit 2015 24 25 August Hilton Sydney gartner.com/ap/security Manage Risk and Deliver Security in a Digital World Hot topics
Gartner Application Architecture, Development & Integration Summit 2014
Gartner Application Architecture, Development & Integration Summit 2014 21 22 July Hilton Sydney, Australia gartner.com/ap/aadi Transform Your Applications Strategy for a Digital World hot TOPICS Flexible
Gartner Security & Risk Management Summit 2015
EARLY-BIRD DISCOUNT Save 6,500 by 3 July Gartner Security & Risk Management 2015 1 2 September Mumbai, India gartner.com/in/security Manage Risk and Deliver Security in a Digital World Hot topics Cybersecurity
Gartner IT Infrastructure, Operations & Data Center Summit 2015
EARLY-BIRD Discount Save $400 by 20 March Celebrating 10 Years Gartner IT Infrastructure, Operations & Data Center Summit 2015 18 19 May Hilton Sydney gartner.com/ap/datacenter Transform Service Delivery
Gartner Business Process Management Summit 2015
EARLY-BIRD Discount Save $400 by 27 March Gartner Business Process Management Summit 2015 1 2 June Sydney, Australia gartner.com/ap/bpm BPM Shift From Improving Process to Delivering Big Change Key Benefits
Gartner IT Infrastructure Operations & Data Center Summit 2013
Gartner IT Infrastructure Operations & Data Center Summit 2013 13 14 May Mumbai, India gartner.com/in/datacenter HOT TOPICS Managing data center cost and sustainability Mobile and big data impact Cloud
Gartner Business Intelligence, Analytics & Information Management Summit 2016
EARLY-BIRD DISCOUNT Save 6,500 by 8 April 2016 Gartner Business Intelligence, Analytics & Information Management Summit 2016 2016 SURVEY Bi/analytics GARTNER CIO AGENDA still #1 technology priority See
The leading event in Canada for senior technologists from the financial services industry
FREE attendance for qualified end users June 10 2014, Hyatt Regency Toronto The leading event in Canada for senior technologists from the financial services industry Speakers include: MORNING KEYNOTE:
Gartner IT Infrastructure, Operations & Data Center Summit 2015
EARLY-BIRD DISCOUNT Save 6,500 by 13 March Gartner IT Infrastructure, Operations & Data Center Summit 2015 11 12 May Mumbai, India gartner.com/in/datacenter Leading I&O: Delivering New Levels of Innovation
Address C-level Cybersecurity issues to enable and secure Digital transformation
Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,
Business Forecasting and Analytics Forum
#JPKGroup Business Forecasting and Analytics Forum Financial Forecasting and Planning Finance Transformation S&OP and Demand Forecasting Sales and Market Forecasting and Analytics Collaborative Forecasting
Gartner Business Intelligence, Analytics & Information Management Summit 2015
EARLY-BIRD DISCOUNT Save 6,500 by 10 April Gartner Business Intelligence, Analytics & Information Management Summit 2015 9 10 June Mumbai, India gartner.com/in/bi Crossing the Analytical Divide: New Technologies,
Gartner IT Infrastructure, Operations & Data Center Summit 2016
EARLY-BIRD DISCOUNT Save $375 by 18 March Gartner IT Infrastructure, Operations & Data Center Summit 2016 16 17 May Sydney, Australia gartner.com/ap/datacenter Key benefits Align the advantages, risks
Gartner IT Financial, Procurement & Asset Management Summit 2015
EARLY-BIRD Discount Save 325 by 24 July Gartner IT Financial, Procurement & Asset Management Summit 2015 21 22 September London, UK gartner.com/eu/itam Leading Change to Drive Innovation, Collaboration
Gartner IT Financial, Procurement & Asset Management Summit 2014. Trip Report. Overview
Gartner IT Financial, Procurement & Asset Management Summit 2014 Driving Business Outcomes: Control Costs, Mitigate Risks and Sustain Innovation Trip Report The Gartner IT Financial, Procurement & Asset
Gartner Application Architecture, Development & Integration Summit 2015
EARLY-BIRD Discount Save $400 by 22 May Gartner Application Architecture, Development & Integration Summit 2015 20 21 July Hilton Sydney gartner.com/ap/aadi Innovate and Renovate to Dominate in the New
How do you give cybersecurity the highest priority in your organization? Cyber Protection & Resilience Solutions from CGI
How do you give cybersecurity the highest priority in your organization? Cyber Protection & Resilience Solutions from CGI CGI Cyber Protection & Resilience Solutions Optimized risk management and protection
Gartner Digital Workplace Summit 2016
EARLY-BIRD DISCOUNT Save 325 by 22 July Gartner Digital Workplace Summit 2016 21 22 September London, U.K. gartnerevents.com/eudwlearn Key Benefits of Attending Build a strategic roadmap for digital workplace
Architecting the Digital Business: How to Use and Secure Cloud, Mobile and Data
NEW EvENt FOR 2014! 17 18 June 2014 london, uk gartner.com/eu/catalyst FOR technologists, BY technologists Architecting Digital : How to Use and Secure, and Data HOT TOPICS Securing public cloud Making
Gartner Business Intelligence & Analytics Summit 2015
EARLY-BIRD Discount Save 325 by 14 August Gartner Business Intelligence & Analytics Summit 2015 14 15 October Munich, Germany gartner.com/eu/biger Crossing the Analytical Divide: New Technologies, New
DAY 1 MONDAY, SEPT 28 2015
MaRS Discovery District TORONTO, ON Sep 28 29, 2015 8:45 AM 9:15 AM 9:15 AM 10:00 AM 10:00 AM 11:00 AM DAY 1 MONDAY, SEPT 28 2015 OPENING KEYNOTE SPEAKER A Connected World with Intelligence 1-YEAR-LATER
Partnership prospectus
Partnership prospectus Why NextGen Government, why now? Ground breaking progress has been made in the approach to digital government over the last few years, which the new Digital Transformation Office
Gartner PPM & IT Governance Summit 2015
EARLY-BIRD Discount Save 325 by 10 April 2015 Gartner PPM & IT Governance Summit 2015 8 9 June London, UK gartner.com/eu/ppm Thriving on Digital Chaos: Innovation, Agility and Collaboration Key benefits
Gartner IT Financial, Procurement & Asset Management Summit 2015
Gartner IT Financial, Procurement & Asset Management Summit 2015 21 22 September London, UK gartner.com/eu/itam Leading Change to Drive Innovation, Collaboration and Cost Optimization Key benefits of attending
Make Global Recruiting a Winning Strategy
Make Global Recruiting a Winning Strategy A ManpowerGroup TM Solutions White Paper Make Global Recruiting a Winning Strategy Today s global workforce is on the move like never before. Macro-economic forces,
Gartner Customer 360 Summit
Early-Bird Savings Save $300 when you register by May 7 Gartner Customer 360 Summit June 28 30 Los Angeles, CA gartner.com/us/crm CRM Strategies and Technologies to Understand, Grow and Engage Customers
SYMPOSIUM PROGRAM DAY ONE
Tuesday 26 th August 2014 9.00am - 5.30pm RACV City Club, Melbourne SYMPOSIUM PROGRAM DAY ONE 8:30am Registration Opens Location: Foyer Level 2 9:00am 9:10am Symposium Welcome Speaker: Tom Garcia, Chief
Gartner Business Intelligence & Analytics Summit 2016
EARLY-BIRD DISCOUNT Save 325 by 12 August 2016 Gartner Business Intelligence & Analytics Summit 2016 10 11 October Munich, Germany gartnerevents.com/debibrochure Analytics Leadership: Empowerment Without
/ WHITEPAPER / THE BIMODAL IT
/ WHITEPAPER / THE BIMODAL IT By Melbourne IT Enterprise Services IMPLEMENTING THE DYNAMIC COMPONENT FOR A DIGITAL WORLD Among the IT operational models developed over the years, the recent release of
Gartner Master Data Management Summit 2013
Gartner Master Data Management Summit 2013 7 8 February 2013 Palau de Congressos de Catalunya, Barcelona, Spain gartner.com/eu/mdm Hot Topics Building the Business Case for Mdm Linking Mdm with Business
Gartner Security & Risk Management Summit 2015
EARLY-BIRD Discount Save 325 by 17 July Gartner Security & Risk Management Summit 2015 14 15 September London, UK gartner.com/eu/security The World s Most Important Gathering for Security and Risk Executives
THE ULTIMATE ACCESS TO EUROPE S BIG DATA ANALYTICS LEADERS, EXPERTS, AND BUYERS ACROSS TOP INDUSTRY VERTICALS. 29-30 November 2016 RAI Amsterdam
29-30 November 2016 RAI Amsterdam THE ULTIMATE ACCESS TO EUROPE S BIG DATA ANALYTICS LEADERS, EXPERTS, AND BUYERS ACROSS TOP INDUSTRY VERTICALS #AWCongress www.analytics-world-congress.com brought to you
Gartner It Financial, Procurement & asset Management Summit 2014
Gartner It Financial, Procurement & asset Management Summit 2014 17 18 September London, UK gartnerevent.com/eu/itam Driving Business Outcomes: Control Costs, Mitigate Risks and Sustain Innovation KEY
Global Access to More Than 10,000 Enterprise IT Decision Makers
Sponsor Prospectus The world s most important gathering of CIOs and senior IT executives Global Access to More Than 10,000 Enterprise IT Decision Makers Celebrating 20 Years of Commitment and Performance
CYBER SECURITY, A GROWING CIO PRIORITY
www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------
Gartner Application Architecture, Development & Integration Summit 2016
EARLY-BIRD DISCOUNT Save $375 by 27 May Gartner Application Architecture, Development & Integration Summit 2016 25 26 July Sydney, Australia gartner.com/ap/aadi Hot topics Mobile Development Internet of
CFO Insights: Gaining fi nancial visibility into your project portfolio
CFO Insights: Gaining fi nancial visibility into your project portfolio From simple research analyzing competitor data to complex ERP implementations, most work in modern corporations is done in projects.
Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things
Cyber security Digital Customer Experience Digital Employee Experience Digital Insight Internet of Things Payments IP Solutions Cyber Security Cloud 2015 CGI IT UK Ltd Contents... Securing organisations
Own, launch, grow and support your cloud backup and recovery offering
Asigra Hybrid Partner Program Own, launch, grow and support your cloud backup and recovery offering Recovery is Everything Get powered by Asigra. Deliver your own backup service, be a data recovery specialist,
INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL
INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL BY 2 In enterprise IT, there is a single point where everything that matters in information, technology and business converges: Cybersecurity Nexus
Fujitsu Cloud IaaS Trusted Public S5. shaping tomorrow with you
Fujitsu Cloud IaaS Trusted Public S5 shaping tomorrow with you Realizing the cloud opportunity: Fujitsu Cloud iaas trusted Public s5 All the benefits of the public cloud, with enterprise-grade performance
email management solutions
Safeguard business continuity and productivity with Mimecast email management solutions Computacenter and Mimecast in partnership Expert software solutions Computacenter and Mimecast help organisations
Agile Change: The Key to Successful Cloud/SaaS Deployment
WIPRO CONSULTING SERVICES Agile Change: The Key to Successful Cloud/SaaS Deployment www.wipro.com/consulting Agile Change: The Key to Successful Cloud/SaaS Deployment By Robert Staeheli and Gregor Marshall
The Directors Cut. The power of data: What directors need to know about Big Data, analytics and the evolution of information. www.pwc.
www.pwc.com/ca/acconnect The Directors Cut The power of data: What directors need to know about Big Data, analytics and the evolution of information December 201 This newsletter is brought to you by PwC
How to leverage SAP HANA for fast ROI and business advantage 5 STEPS. to success. with SAP HANA. Unleashing the value of HANA
How to leverage SAP HANA for fast ROI and business advantage 5 STEPS to success with SAP HANA Unleashing the value of HANA 5 steps to success with SAP HANA How to leverage SAP HANA for fast ROI and business
OPTIMUS SBR. Optimizing Results with Business Intelligence Governance CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE.
OPTIMUS SBR CHOICE TOOLS. PRECISION AIM. BOLD ATTITUDE. Optimizing Results with Business Intelligence Governance This paper investigates the importance of establishing a robust Business Intelligence (BI)
Understanding the impact of the connected revolution. Vodafone Power to you
Understanding the impact of the connected revolution Vodafone Power to you 02 Introduction With competitive pressures intensifying and the pace of innovation accelerating, recognising key trends, understanding
J U L Y 2 0 1 2. Title of Document. Here is the subtitle of the document
J U L Y 2 0 1 2 Title of Document Here is the subtitle of the document Introduction to OpenText Protect Premier Anywhere Deploying and maintaining advanced Enterprise Information Management (EIM) solutions
Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis
Cyber Defence Capability Assessment Tool (CDCAT ) Improving cyber security preparedness through risk and vulnerability analysis An analogue approach to a digital world What foundations is CDCAT built on?
Integrated Ecosystems
Integrated Ecosystems Toronto s Complete Business Performance System Business Case In association with: The Information and Communications Technology Council (ICTC) is a centre of expertise in ICT business
Security and Privacy Trends 2014
2014 Agenda Today s cyber threats 3 You could be under cyber attack now! Improve 6 Awareness of cyber threats propels improvements Expand 11 Leading practices to combat cyber threats Innovate 20 To survive,
Gartner Business Process Management Summit 2013
Gartner Business Process Management Summit 2013 13 14 March 2013 Park Plaza Westminster Bridge, London, UK gartner.com/eu/bpm HOT TOPICS Making BPM part of the strategic plan How BPM can enable transformational
DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com
DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention symantec.com One of the interesting things we ve found is that a lot of the activity you d expect to be malicious
Harness the Power of Partnership Everything is possible when you have the right partner.
Technology Success Accelerate Harness the Power of Partnership Everything is possible when you have the right partner. Avnet Technology Solutions, Americas Intelligent Collaboration Disruptive technologies
Gartner Business Intelligence & Analytics Summit 2015
Gartner Business Intelligence & Analytics Summit 2015 14 15 October Munich, Germany gartner.com/eu/biger Crossing the Analytical Divide: New Technologies, New Skills Hot Topics Leading a Digital Business
How To Protect Your Network From Attack From A Network Security Threat
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
A NEW APPROACH TO CYBER SECURITY
A NEW APPROACH TO CYBER SECURITY We believe cyber security should be about what you can do not what you can t. DRIVEN BY BUSINESS ASPIRATIONS We work with you to move your business forward. Positively
Cloud Computing. Key Initiative Overview
David W. Cearley Research Vice President and Gartner Fellow This overview provides a high-level description of the Cloud Computing Key Initiative. IT leaders can use this guide to understand what they
Tuesday, August 19th Prevent, Detect, Respond: A Framework for Effective Cyber Defense Dr. Eric Cole, Fellow, SANS Institute
Tuesday, August 19 th 9:00-9:45 am Keynote Address Prevent, Detect, Respond: A Framework for Effective Cyber Defense Security is now a mainstay of boardroom discussions. However, many organizations remain
CONSULTING IMAGE PLACEHOLDER
CONSULTING IMAGE PLACEHOLDER KUDELSKI SECURITY CONSULTING SERVICES CYBERCRIME MACHINE LEARNING ECOSYSTEM & INTRUSION DETECTION: CYBERCRIME OR REALITY? ECOSYSTEM COSTS BENEFITS BIG BOSS Criminal Organization
Identity and Access Management. Key Initiative Overview
Ray Wagner Research Managing Vice President This overview provides a high-level description of the Identity and Access Management Key Initiative. IT leaders can use this guide to understand what they need
Virtualization. Key Initiative Overview
Philip Dawson Research Vice President Virtualization brings flexibility, agility and increased capabilities to enterprise users. IT leaders can use this overview to assess their virtualization needs and
Your asset is your business. The more challenging the economy, the more valuable the asset becomes. Decisions are magnified. Risk is amplified.
Asset management Your asset is your business. The more challenging the economy, the more valuable the asset becomes. Decisions are magnified. Risk is amplified. Data is about more than numbers. It tells
Leveraging Network and Vulnerability metrics Using RedSeal
SOLUTION BRIEF Transforming IT Security Management Via Outcome-Oriented Metrics Leveraging Network and Vulnerability metrics Using RedSeal november 2011 WHITE PAPER RedSeal Networks, Inc. 3965 Freedom
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
Gartner Identity & Access Management Summit 2013
Gartner Identity & Access Management Summit 2013 November 18 20 Los Angeles, CA gartner.com/us/iam HOT TOPICS IAM SUPPORTING MOBILE, SOCIAL, CLOUD AND INFORMATION INITIATIVES IAM BEST PRACTICES FOR DEPLOYMENT
SAP White Paper Enterprise Mobility. Best Practices for a Mobility Center of Excellence Keeping Pace with Mobile Technology
SAP White Paper Enterprise Mobility Best Practices for a Mobility Center of Excellence Keeping Pace with Mobile Technology Table of Contents 5 Executive Summary 6 Exploring a Mobility Center of Excellence
At the Heart of Connected Manufacturing
www.niit-tech.com At the Heart of Connected Manufacturing Transforming Manufacturing Operations to Drive Agility and Profitability The success of the new manufacturing network hinges on the agility of
SECURING PAYMENTS IN THE CYBER WORLD
The Central Bank of Kuwait Presents An Information Security Forum on SECURING PAYMENTS IN THE CYBER WORLD 16th NOVEMBER 2014 JUMEIRAH MESSILAH BEACH HOTEL, KUWAIT WELCOME In the last few years, the usages
Private Banking: London 2015 3 rd June 2015 Waldorf Astoria London, UK Conference & Awards
Private Banking: London 2015 3 rd June 2015 Waldorf Astoria London, UK Conference & Awards Private Banking: London 2015 asks important questions about the future of private banking in the face of a dramatically
Cybersecurity Strategic Consulting
Home Overview Challenges Global Resource Growth Impacting Industries Why Capgemini Capgemini & Sogeti Cybersecurity Strategic Consulting Enabling business ambitions, resilience and cost efficiency with
IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices
IT audit updates Current hot topics and key considerations Contents IT risk assessment leading practices IT risks to consider in your audit plan IT SOX considerations and risks COSO 2013 and IT considerations
Risk Considerations for Internal Audit
Risk Considerations for Internal Audit Cecile Galvez, Deloitte & Touche LLP Enterprise Risk Services Director Traci Mizoguchi, Deloitte & Touche LLP Enterprise Risk Services Senior Manager February 2013
Accenture Technology Consulting. Clearing the Path for Business Growth
Accenture Technology Consulting Clearing the Path for Business Growth Mega technology waves are impacting and shaping organizations in a profound way When a company s executive management team considers
WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD
WRITTEN TESTIMONY OF NICKLOUS COMBS CHIEF TECHNOLOGY OFFICER, EMC FEDERAL ON CLOUD COMPUTING: BENEFITS AND RISKS MOVING FEDERAL IT INTO THE CLOUD BEFORE THE COMMITTEE ON OVERSIGHT AND GOVERNMENT REFORM
Architecting the Digital Business: How to Use and Secure Cloud, Mobile and Data
New event 2014! 17 18 June 2014 London, UK gartner.com/eu/catalyst FOR TECHNOLOGISTS, BY TECHNOLOGISTS Architecting Digital : How to Use and Secure, and Data Hot pics Securing public cloud Making big data
Addressing Cyber Risk Building robust cyber governance
Addressing Cyber Risk Building robust cyber governance Mike Maddison Partner Head of Cyber Risk Services The future of security The business environment is changing The IT environment is changing The cyber
The six digital imperatives. Moving your organisation towards Digital Excellence (and how we can help)
The six digital imperatives Moving your organisation towards Digital Excellence (and how we can help) Digital Excellence: a good place to aim for. Digital used to be just another channel to market. Now
RSA Archer Risk Intelligence
RSA Archer Risk Intelligence Harnessing Risk to Exploit Opportunity June 4, 2014 Steve Schlarman GRC Strategist 1 Risk and Compliance Where is it today? 2 Governance, Risk, & Compliance Today 3 4 A New
Workshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business
Workshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business Earl Perkins Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced
OPENTEXT GLOBAL FAX SUMMIT 2011
OPENTEXT GLOBAL FAX SUMMIT 2011 Tuesday, July 12 th and Wednesday July 13 th, 2011 Customer Workshops and Partner Day, Thursday, July 14 th, 2011 Westin La Paloma Resort & Spa, Tucson, Arizona SUMMIT AGENDA
A Guide to Gartner Solutions
A Guide to Gartner Solutions Why research and advisory services? The world is changing, and the stakes are high and you still have to make decisions every day. It s difficult to stay on top of every technology
Feature. Developing an Information Security and Risk Management Strategy
Feature Developing an Information Security and Risk Management Strategy John P. Pironti, CISA, CISM, CGEIT, CISSP, ISSAP, ISSMP, is the president of IP Architects LLC. He has designed and implemented enterprisewide
