Gartner Security & Risk Management Summit 2015
|
|
- Liliana Booker
- 8 years ago
- Views:
Transcription
1 EARLY-BIRD Discount Save $300 by 4 September Gartner Security & Risk Management November Raffles Hotel, Dubai, UAE gartner.com/me/security Manage Risk and Deliver Security in a Digital World Hot Topics Application, network and mobile security Security for and in the cloud Cyber security Digital business security and risk management Operational technology security and risk management Planning for The Internet of Things security
2 Manage Risk and Deliver Security in a Digital World Craft Your Strategy for Business Resiliency Get the tools you need to deliver secure digital business environments and ensure your organization can weather an attack or disruption and bounce back quickly at 2015, 2 3 November, Dubai, UAE. This year s covers the breadth of priorities in IT security, risk management, governance, the role of the CISO, the business of security, IAM and more. Join us this November to fi nd out how you can advance your security and risk management goals to support business objectives and improve resilience across the organization. Key Benefits of Attending Gain tools and strategies to stay ahead of your new responsibilities and increasing threats: Align security and risk strategies with your enterprise objectives and digital transformation Apply the latest techniques to tackle risks in cloud, OT and IoT Build a culture that drives security performance through employee engagement Greg Young Research VP and Chair, Gartner GarTNEr PrEDIcTs: By 2017, 30% of threat intelligence services will include vertical-market security intelligence information from the Internet of Things. 2 #GartnerSEC 2015
3 Program Tracks A. Security Technology The potential positive business impact of cloud, social, mobility and big data brings undeniable opportunities for success but also challenges traditional approaches to information security to evolve at business speed. As organizations accelerate their adoption of these new platforms, bad ators develop methods to exploit these emerging platforms. Your security program must rapidly mature in the breadth and effectiveness of techniques and technologies you use to maintain appropriate levels of security for applications, data and infrastructure regardless of location. B. CISO and Risk Management CISO s must fi nd and maintain a tricky balance between protection and productivity. The challenge is exacerbated by ongoing volatility in enterprises business, technology and threat environments. The CISO & Risk Management program explores the key capabilities, strategies and tactics that are essential for the contemporary security leader. Virtual tracks Identity and Access Management As business and institutions mature, they must manage volatile and rapid change, establish effective formal governance, and provide accountability through transparency. IAM can enable these evolutionary steps, but must itself evolve. The IAM track features a wealth of presentations on current best practices and the latest issues and trends. Mobile Security Mobile devices present a host of new security issues, with the BYOD phenomenon presenting the greatest challenge. IT organizations must adapt to this rapidly changing environment and implement new policies and new technologies to mitigate the risks of the mobile workplace. This track will help you navigate the mobile environment over a three-year horizon. Cloud Security As organizations explore the benefi ts of cloud computing, security professionals must be prepared to highlight the risks and the costs of mitigating these risks. This track will show you how. Internet of Things The Internet of Things (IoT) has arrived. But as innovation and complexity expand, risk grows and threats expand with them. Securing the IoT is critical. This track will show you how. Who Should Attend CIOs, CSOs, CISOs, CROs, CPOs and their teams CISOs, CTOs, IT security managers, IT security directors, IT security offi cers Business continuity and IT disaster recovery managers Enterprise architects and planners Tech professionals Network security manager, executives and directors Governance, risk and compliance consultants Finance, audit, legal risk and compliance managers Researchers, investors Table of Contents 4 Agenda at a glance 6 Meet the analysts 7 Solution Showcase 8 Registration and pricing Visit gartner.com/me/security for updates and to register! 3
4 Agenda at a Glance Monday 2 November :45 17:15 Registration and Information 08:30 09:00 Tutorial: Next Generation Firewalls vs UTM Rajpreet Kaur 09:15 10:15 Opening and Gartner Opening Keynote: Manage Risk and Deliver Security in a Digital World Dionisio Zu 10:15 11:00 Refreshment Break in the Solution Showcase Tracks A. Security Technology B. CISO and Risk Management 11:00 11:30 Protecting Mobile Apps Dionisio Zumerle Best Practices in Crisis Communications Roberta Witty 11:45 12:15 Solution Provider Sessions 12:15 13:30 Lunch in the Solution Showcase and Prayer Time 13:30 14:15 Regaining Control Visibility and Trust When You No Longer Control the Infrastructure Peter Firstbrook The Next Three Years in Threats Greg Young 14:30 15:00 Solution Provider Sessions 15:15 15:45 Future Proofing IAM Felix Gaehtgens Bits, Bytes and Balanced Scorecards A Practical View of Security Metrics Jeffrey Wheatman 15:45 16:30 Refreshment Break and Prayer Time 15:50 16:20 Solution Provider Sessions 16:30 17:15 Guest Keynote Tuesday 3 November :00 17:30 Registration and Information 08:00 09:00 Networking and Refreshment Break in the Solution Showcase 09:00 09:30 Securing the Next Generation Data Center With Software-Defined Security Neil MacDonald 09:45 10:15 Solution Provider Sessions How to Get to Single Sign On Felix Gaehtgens 10:15 11:00 Refreshment Break in the Solution Showcase 10:20 10:50 Solution Provider Sessions 11:00 11:45 Mobile Security Threats and Trends 2015 Dionisio Zumerle IT Supply Chain Integrity: Living in a World Without Trust Neil MacDonald 12:00 12:30 Solution Provider Sessions 12:30 13:45 Lunch in the Solution Showcase and Prayer Time 13:45 14:15 Case Study: Integrating ICS With the IT Network: Need and Security Controls Mohit Saraswat, Senior IT Infrastructure Project Manager, Dubai Refreshment PJSC 14:30 15:15 Defending Endpoints From Persistent Attack Peter Firstbrook Case Study Top Trends in Corporate Compliance and Oversight Jeffrey Wheatman 15:15 16:00 Refreshment Break and Prayer Time 16:00 16:30 Overcoming Five Key Obstacles to Success in Content- Aware DLP Deployments Brian Reed Why Crisis Management is the Heart of BCM Software Roberta Witty 16:45 17:30 Gartner Closing Keynote: Your Security in 2020 Greg Young 4 #GartnerSEC 2015
5 When attending this event, please refer to the agenda handout provided or the Gartner Events mobile app for the most up to date session and location information. Agenda as of 31 July 2015, and subject to change Tutorial: Foundations of Identity and Access Management Felix Gaehtgens merle, Peter Firstbrook and Brian Reed Workshops roundtables 11:45 13:00 Workshop: Defending Against Sophisticated Malware Mario de Boer 11:45 12:45 Roundtable: Endpoint Security Roundtable Peter Firstbrook 13:30 14:30 Roundtable: Mobile Security and BYOD in the Enterprise Dionisio Zumerle 14:15 15:45 Workshop: Selecting the Right Mix of Security Controls to Mitigate Mobility Risk Mario de Boer 15:00 16:00 Roundtable: Business Continuity and Disaster Recovery Roberta Witty 09:00 10:30 Workshop: Information Security Metrics Workshop Building From the Business Down Jeffrey Wheatman 10:45 11:45 Roundtable: DLP: Best Practices Brian Reed 13:45 15:15 Workshop: DLP: What Works, What Doesn t Brian Reed Visit gartner.com/me/security for updates and to register! 5
6 Meet the Analysts Engage with our team of Gartner analysts through track presentations, a complimentary one-on-one meeting, analyst-facilitated workshops, roundtables and more. Below they are listed with the top issues they help clients address: Mario de Boer Research VP Protecting endpoints against malware Protecting the confi dentiality of data on endpoints through encryption or rights management Safeguarding the confi dentiality of s Enabling secure collaboration Peter Firstbrook Research VP How do we reduce the number of endpoint infections? How do we evaluate the different endpoint protection platforms? How do we control and monitor web traffi c across all devices and offi ces? What are the trends in security? Should we move hygiene to a cloud provider? Felix Gaehtgens Research Director Identity and access management planning, implementation, operations Identity governance and administration (IGA) Privileged access management (PAM) Enterprise directories, virtual directories Externalized authorization management rajpreet kaur Senior Research Analyst Firewall vendor selection NGFW and UTM selection IPS vendor selection Advanced threat detection (APT) technology and vendor selection Web application fi rewall selection Neil MacDonald VP Distinguished Analyst Securing next-generation virtualized data centres and workloads Securing cloud-based infrastructure-as-a-service deployments Successfully removing administrative rights from Windows users Endpoint protection strategies and contract reviews How to secure SharePoint in extranet scenarios Brian reed Research Director Selection of data loss prevention (DLP) technologies DLP deployment strategies Mobile data security concerns Data Discovery and Classifi cation initiatives Cloud security Jeffrey Wheatman Research Director Building a security program from scratch Leveraging GRC investments to support business goals and objectives Security and risk metrics and reporting Build, improve, mature and leverage processes for security and risk management roberta Witty Research VP Develop and manage business continuity management programs Business value of BCM to management How to execute BCM programs Create and manage BCM plans that actually work Technologies organizations should use to manage their BCM programs Greg Young Research VP Network security decisions Network security of virtualization Stopping network threats Securing data canters DMZ design Dionisio Zumerle Research Director Securing mobile devices Securing mobile applications Securing BYOD Protecting enterprise data on mobile and wireless networks Enterprise mobility management (EMM) security Our community of more than 1,000 analysts engaged in over 215,000 one-to-one client interactions in the past year. Benefit from the collective wisdom of the attending analysts to develop your strategy and implement flawlessly. 6 #GartnerSEC 2015
7 Solution Showcase Explore cutting-edge IT solutions from top providers; plus, participate in solution provider sessions, networking reception and more. Premier Sponsors Sponsorship Opportunities For further information about sponsoring this event: Mudassir Ehsan Telephone: Nasar Butt Telephone: Platinum Sponsors Silver Sponsors Visit gartner.com/me/security for updates and to register! 7
8 Gartner Security & Risk Management November Raffles Hotel, Dubai, UAE gartner.com/me/security 3 Ways to Register Web: gartner.com/me/security emea.registration@gartner.com Telephone: Save $300 early-bird Price: $2,225 (offer ends 4 September 2015) Standard Price: $2,525 Public Sector Price: $2,125 Gartner Clients A Gartner ticket covers both days of the summit. contact your account manager or emea.events@gartner.com to register using a ticket. Gartner Security s Around the Globe 8 11 June National Harbor, MD United Kingdom September July Tokyo, Japan United States 7 9 December United States 8 11 June Dubai 2 3 November Japan July August Sao Paulo, Brazil August Sydney, Australia Brazil August Australia August September London, U.K. Join the conversation! is on Twitter and LinkedIn. Gartner Identity & Access Management 7 9 December Las Vegas, NV #GartnerSEC (Xchange) 2015 Gartner, Inc. and/or its affi liates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affi liates. For more information, info@gartner.com or visit gartner.com.
Gartner Security & Risk Management Summit 2015
EARLY-BIRD Discount Save 325 by 17 July Gartner Security & Risk Management Summit 2015 14 15 September London, UK gartnerevent.com/eu/security The World s Most Important Gathering for Security and Risk
More informationGartner Security & Risk Management Summit 2015
EARLY-BIRD DISCOUNT Save 6,500 by 3 July Gartner Security & Risk Management 2015 1 2 September Mumbai, India gartner.com/in/security Manage Risk and Deliver Security in a Digital World Hot topics Cybersecurity
More informationGartner Security & Risk Management Summit 2014
Gartner Security & Risk Management Summit 2014 25 26 August Hilton Sydney, Australia gartner.com/ap/security Smart Risk Balancing Security and Opportunity Hot Topics People-Centric Security Governance
More informationGartner Security & Risk Management Summit 2015
EARLY-BIRD Discount Save $400 by 26 June Gartner Security & Risk Management Summit 2015 24 25 August Hilton Sydney gartner.com/ap/security Manage Risk and Deliver Security in a Digital World Hot topics
More informationGartner IT Infrastructure, Operations & Data Center Summit 2015
EARLY-BIRD Discount Save $400 by 20 March Celebrating 10 Years Gartner IT Infrastructure, Operations & Data Center Summit 2015 18 19 May Hilton Sydney gartner.com/ap/datacenter Transform Service Delivery
More informationGartner Business Intelligence, Analytics & Information Management Summit 2016
EARLY-BIRD DISCOUNT Save 6,500 by 8 April 2016 Gartner Business Intelligence, Analytics & Information Management Summit 2016 2016 SURVEY Bi/analytics GARTNER CIO AGENDA still #1 technology priority See
More informationGartner Security & Risk Management Summit 2015
EARLY-BIRD Discount Save 325 by 17 July Gartner Security & Risk Management Summit 2015 14 15 September London, UK gartner.com/eu/security The World s Most Important Gathering for Security and Risk Executives
More informationGartner Business Process Management Summit 2015
EARLY-BIRD Discount Save $400 by 27 March Gartner Business Process Management Summit 2015 1 2 June Sydney, Australia gartner.com/ap/bpm BPM Shift From Improving Process to Delivering Big Change Key Benefits
More informationGartner Application Architecture, Development & Integration Summit 2014
Gartner Application Architecture, Development & Integration Summit 2014 21 22 July Hilton Sydney, Australia gartner.com/ap/aadi Transform Your Applications Strategy for a Digital World hot TOPICS Flexible
More informationGartner Digital Workplace Summit 2016
EARLY-BIRD DISCOUNT Save 325 by 22 July Gartner Digital Workplace Summit 2016 21 22 September London, U.K. gartnerevents.com/eudwlearn Key Benefits of Attending Build a strategic roadmap for digital workplace
More informationGartner Application Architecture, Development & Integration Summit 2015
EARLY-BIRD Discount Save $400 by 22 May Gartner Application Architecture, Development & Integration Summit 2015 20 21 July Hilton Sydney gartner.com/ap/aadi Innovate and Renovate to Dominate in the New
More informationGartner Security & Risk Management Summit 2013
Gartner Security & Risk Management Summit 2013 19 20 August Sydney, Australia gartner.com/ap/security THREE COMPLETE PROGRAMS Chief Information Security (CISO) Program Risk Management and Compliance Program
More informationGartner Business Intelligence, Analytics & Information Management Summit 2015
EARLY-BIRD DISCOUNT Save 6,500 by 10 April Gartner Business Intelligence, Analytics & Information Management Summit 2015 9 10 June Mumbai, India gartner.com/in/bi Crossing the Analytical Divide: New Technologies,
More informationGartner IT Infrastructure, Operations & Data Center Summit 2015
EARLY-BIRD DISCOUNT Save 6,500 by 13 March Gartner IT Infrastructure, Operations & Data Center Summit 2015 11 12 May Mumbai, India gartner.com/in/datacenter Leading I&O: Delivering New Levels of Innovation
More informationGartner IT Financial, Procurement & Asset Management Summit 2015
EARLY-BIRD Discount Save 325 by 24 July Gartner IT Financial, Procurement & Asset Management Summit 2015 21 22 September London, UK gartner.com/eu/itam Leading Change to Drive Innovation, Collaboration
More informationArchitecting the Digital Business: How to Use and Secure Cloud, Mobile and Data
NEW EvENt FOR 2014! 17 18 June 2014 london, uk gartner.com/eu/catalyst FOR technologists, BY technologists Architecting Digital : How to Use and Secure, and Data HOT TOPICS Securing public cloud Making
More informationGartner IT Infrastructure, Operations & Data Center Summit 2016
EARLY-BIRD DISCOUNT Save $375 by 18 March Gartner IT Infrastructure, Operations & Data Center Summit 2016 16 17 May Sydney, Australia gartner.com/ap/datacenter Key benefits Align the advantages, risks
More informationGartner Business Intelligence & Analytics Summit 2015
EARLY-BIRD Discount Save 325 by 14 August Gartner Business Intelligence & Analytics Summit 2015 14 15 October Munich, Germany gartner.com/eu/biger Crossing the Analytical Divide: New Technologies, New
More informationWhile you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:
While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab: A copy of today s presentation and our Upcoming webinars Information on how to dial in if
More informationGlobal Access to More Than 10,000 Enterprise IT Decision Makers
Sponsor Prospectus The world s most important gathering of CIOs and senior IT executives Global Access to More Than 10,000 Enterprise IT Decision Makers Celebrating 20 Years of Commitment and Performance
More informationGartner IT Financial, Procurement & Asset Management Summit 2015
Gartner IT Financial, Procurement & Asset Management Summit 2015 21 22 September London, UK gartner.com/eu/itam Leading Change to Drive Innovation, Collaboration and Cost Optimization Key benefits of attending
More informationGartner Business Intelligence & Analytics Summit 2016
EARLY-BIRD DISCOUNT Save 325 by 12 August 2016 Gartner Business Intelligence & Analytics Summit 2016 10 11 October Munich, Germany gartnerevents.com/debibrochure Analytics Leadership: Empowerment Without
More informationGartner It Financial, Procurement & asset Management Summit 2014
Gartner It Financial, Procurement & asset Management Summit 2014 17 18 September London, UK gartnerevent.com/eu/itam Driving Business Outcomes: Control Costs, Mitigate Risks and Sustain Innovation KEY
More informationExploit New Architectures: Create Your Digital Future
EARLY-BIRD Discount Save 325 by 17 July the annual gathering for technical professionals 16 17 September 2015 London, UK gartner.com/eu/catalyst Exploit New Architectures: Create Your Digital Future Key
More informationGartner Application Architecture, Development & Integration Summit 2016
EARLY-BIRD DISCOUNT Save $375 by 27 May Gartner Application Architecture, Development & Integration Summit 2016 25 26 July Sydney, Australia gartner.com/ap/aadi Hot topics Mobile Development Internet of
More informationGartner Webinar. Gartner Top Predictions for 2012: Control Slips Away. Presenter: Daryl Plummer, Managing Vice President & Gartner Fellow
Gartner Webinar Gartner Top Predictions for 2012: Control Slips Away Presenter: Daryl Plummer, Managing Vice President & Gartner Fellow Upcoming Webinars: www.gartner.com/webinars Looking for On-Demand
More informationGartner Identity & Access Management Summit 2015
EARLY-BIRD Discount Save 300 by 16 January 2015 Gartner Identity & Access Management Summit 2015 16 17 March London, UK gartnerevent.com/eu/iam Successful IAM Simple, Business Driven and Secure Key benefits
More informationAddress C-level Cybersecurity issues to enable and secure Digital transformation
Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,
More informationArchitecting the Digital Business: How to Use and Secure Cloud, Mobile and Data
New event 2014! 17 18 June 2014 London, UK gartner.com/eu/catalyst FOR TECHNOLOGISTS, BY TECHNOLOGISTS Architecting Digital : How to Use and Secure, and Data Hot pics Securing public cloud Making big data
More informationDetecting Cyber Attacks in a Mobile and BYOD Organization
SOLUTION BRIEF Detecting Cyber Attacks in a Mobile and BYOD Organization Explore the challenges, understand the needs, evaluate mobile device management as an approach to detecting attacks and offer a
More informationGartner Business Intelligence & Analytics Summit 2015
Gartner Business Intelligence & Analytics Summit 2015 14 15 October Munich, Germany gartner.com/eu/biger Crossing the Analytical Divide: New Technologies, New Skills Hot Topics Leading a Digital Business
More informationGartner IT Financial, Procurement & Asset Management Summit 2014. Trip Report. Overview
Gartner IT Financial, Procurement & Asset Management Summit 2014 Driving Business Outcomes: Control Costs, Mitigate Risks and Sustain Innovation Trip Report The Gartner IT Financial, Procurement & Asset
More informationGartner PPM & IT Governance Summit 2015
EARLY-BIRD Discount Save 325 by 10 April 2015 Gartner PPM & IT Governance Summit 2015 8 9 June London, UK gartner.com/eu/ppm Thriving on Digital Chaos: Innovation, Agility and Collaboration Key benefits
More informationGartner Business Intelligence, Analytics & Information Management Summit 2016
EARLY-BIRD DISCOUNT Save $375 by 11 December Gartner Business Intelligence, Analytics & Information Management Summit 2016 2016 SURVEY Bi/analytics GARTNER CIO AGENDA still #1 technology priority See AGENDA
More informationGartner Enterprise Information & Master Data Management Summit 2016
EARLY-BIRD DISCOUNT Save 325 by 8 January 2016 Gartner Enterprise Information & Master Data Management Summit 2016 2 3 March London, UK gartnerevent.com/eu/eim Hot Topics Digital Information Leadership
More informationGartner Portals, content & collaboration summit 2014
Gartner Portals, content & collaboration summit 2014 15 16 September London, UK gartner.com/eu/pcc Engage, Collaborate, Innovate: Thriving in the Digital Enterprise HOT TOPICS Employee collaboration for
More informationFROM PRODUCT TO PLATFORM
FROM PRODUCT TO PLATFORM DATA EQUIPMENT 2016 Mikkel Bossen Agenda Today s Challenges Data Growth, SSL encryption, Application Growth & SaaS What s hiding in under the surface? Legacy Security is that really
More informationCOMPUTACENTER AND SYMANTEC TOGETHER: PROTECTING AND EMPOWERING DATA
COMPUTACENTER AND SYMANTEC TOGETHER: PROTECTING AND EMPOWERING DATA COMPUTACENTER AND SYMANTEC TOGETHER SECURITY STORAGE BUSINESS CONTINUITY INFRASTRUCTURE MANAGEMENT Simplify and strengthen information
More informationDelivering Control with Context Across the Extended Network
Delivering Control with Context Across the Extended Network Agenda Current Challenges Cisco ISE Overview Introducing Cisco pxgrid Customer Success Stories Only Cisco ISE Delivers 2013-2014 Cisco and/or
More informationCybersecurity Strategic Consulting
Home Overview Challenges Global Resource Growth Impacting Industries Why Capgemini Capgemini & Sogeti Cybersecurity Strategic Consulting Enabling business ambitions, resilience and cost efficiency with
More informationFight Malware, Malfeasance, and Malingering with F5
Fight Malware, Malfeasance, and Malingering with F5 F5 give organizations control and visibility to secure their users Internet usage. The solution helps protect against malware and data loss, ensure compliance,
More informationBreaking the Cyber Attack Lifecycle
Breaking the Cyber Attack Lifecycle Palo Alto Networks: Reinventing Enterprise Operations and Defense March 2015 Palo Alto Networks 4301 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com
More informationCyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
More informationGartner Security & Risk Management Summit 2012
Gartner Security & Risk Management Summit 2012 16 17 July 2012 Sydney, Australia gartner.com/ap/security Trip Report Strategic Roadmaps to Secure the Enterprise and Manage Risk Overview INTRODUCTION The
More informationGartner Identity & Access Management Summit 2013
Gartner Identity & Access Management Summit 2013 Pragmatic Futures for IAM: Meeting Business Needs at the Nexus of Forces Trip Report The annual Gartner Identity & Access Management Summit was held on
More informationControlFabric Interop Demo Guide
ControlFabric Interop Demo Guide Featuring The ForeScout ControlFabric Interop Demo at It-Sa 2014 showcases integrations with our partners and other leading vendors that can help you achieve continuous
More informationHow To Handle A Threat From A Corporate Computer System
Politics of Security Webcast Summary Cyber Threat News and APT Defenses Introduction Stories about cyber espionage and Advanced Persistent Threats (APTs) are part of the mainstream news cycle. Concerns
More informationThe Future of Network Security Sophos 2012 Network Security Survey
The Future of Network Security Sophos 2012 Network Security Survey Sophos and Vanson Bourne surveyed 571 IT decision makers globally to gain a deeper understanding of how IT teams are responding to technology
More informationAgenda. All Summit Sessions will be held in CA Thayer Ballroom (unless noted).
Program Guide SANS Securing the Internet of Things Summit 2013 Agenda All Summit Sessions will be held in CA Thayer Ballroom (unless noted). All approved presentations will be available online following
More informationGartner Business Intelligence, Analytics & Information Management Summit 2015
EARLY-BIRD Discount Save $400 by 12 December Gartner Business Intelligence, Analytics & Information Management Summit 2015 23 24 February Sydney, Australia gartner.com/ap/bi Crossing the Analytical Divide:
More informationGartner IT Financial, Procurement & Asset Management Summit 2016
EARLY-BIRD DISCOUNT Save 325 by 15 July 2016 Gartner IT Financial, Procurement & Asset Management Summit 2016 12 13 September London, UK gartnerevents.com/euitam The Art of Influence: Optimizing Costs
More informationClose the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle
Close the security gap with a unified approach Detect, block and remediate risks faster with end-to-end visibility of the security cycle Events are not correlated. Tools are not integrated. Teams are not
More informationGartner Master Data Management Summit 2013
Gartner Master Data Management Summit 2013 7 8 February 2013 Palau de Congressos de Catalunya, Barcelona, Spain gartner.com/eu/mdm Hot Topics Building the Business Case for Mdm Linking Mdm with Business
More informationCORE Security and GLBA
CORE Security and GLBA Addressing the Graham-Leach-Bliley Act with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 info@coresecurity.com www.coresecurity.com
More informationState Governments at Risk: The Data Breach Reality
State Governments at Risk: The Data Breach Reality NCSL Legislative Summit August 5, 2015 Doug Robinson, Executive Director National Association of State Chief Information Officers (NASCIO) About NASCIO
More informationChief Security Strategist Symantec Public Sector
Chief Security Strategist Symantec Public Sector Advanced Persistent Threat Further things to understand about the APT Compromised Game Networks Lulzec Anonymous/YamaTough WikiLeaks 101 Global Intelligence
More informationGartner PPM & IT Governance Summit 2014
Gartner PPM & IT Governance Summit 2014 9 10 June London, UK gartner.com/eu/ppm Resource Priorities Generate Change Realize Returns HOT TOPICS Effectively Prioritizing Projects and Programs Creating an
More informationMicrosoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
More informationGartner Customer 360 Summit
Early-Bird Savings Save $300 when you register by May 7 Gartner Customer 360 Summit June 28 30 Los Angeles, CA gartner.com/us/crm CRM Strategies and Technologies to Understand, Grow and Engage Customers
More informationNext Generation Enterprise Network Security Platform
Next Generation Enterprise Network Security Platform November 2014 Lyndon Clough - Territory Sales Manager Derran Guinan Systems Engineer Agenda The Palo Alto Networks story Today s Threat Landscape The
More informationMaking the Cloud Work for Business
Making the Cloud Work for Business 1 Making the Cloud Work for Business Contents Adjusting to On-Demand Needs 2 Poised for Dramatic Growth 2 Ability to Scale 3 Overcoming Remaining Barriers 4 Alignment
More informationData Center security trends
Data Center security trends Tomislav Tucibat Major accounts Manager, Adriatic Copyright Fortinet Inc. All rights reserved. IT Security evolution How did threat market change over the recent years? Problem:
More informationDeveloping National Frameworks & Engaging the Private Sector
www.pwc.com Developing National Frameworks & Engaging the Private Sector Focus on Information/Cyber Security Risk Management American Red Cross Disaster Preparedness Summit Chicago, IL September 19, 2012
More informationThe business case for managed next generation firewalls. Six reasons why IT decision makers should sit up and take notice
The business case for managed next generation firewalls Six reasons why IT decision makers should sit up and take notice THREATWATCH Cyber threats cost the UK economy 27 billion pounds a year 92 percent
More informationForeScout CounterACT. Continuous Monitoring and Mitigation
Brochure ForeScout CounterACT Real-time Visibility Network Access Control Endpoint Compliance Mobile Security Rapid Threat Response Continuous Monitoring and Mitigation Benefits Security Gain real-time
More informationFacility Security Design
Facility Security Design February 24 26, 2016 Fort Worth, TX Earn up to 21 CPEs EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N Use your security dollars wisely! A cost-effective,
More informationCyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015
Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology
More informationGartner IT Infrastructure & Operations Management Summit 2015
EARLY-BIRD Discount Save 325 by 3 April Gartner IT Infrastructure & Operations Management Summit 2015 1 2 June Berlin, Germany gartner.com/eu/iom Building a Lean and Agile I&O The Engine for your Digital
More informationGartner PPM & IT Governance Summit 2016
EARLY-BIRD DISCOUNT Save 325 by 15 April Gartner PPM & IT Governance Summit 2016 13 14 June London, U.K. gartnerevent.com/eu/ppm Key Benefits Develop Effective Portfolio Management Increase PMO and EPMO
More informationAchieve Deeper Network Security and Application Control
Achieve Deeper Network Security and Application Control Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Yet
More informationWhite Paper. What the ideal cloud-based web security service should provide. the tools and services to look for
White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web
More informationPROMOTION // TECHNOLOGY. The Economics Of Cyber Security
PROMOTION // TECHNOLOGY The Economics Of Cyber Security Written by Peter Mills Malicious cyber activity, from hacking and identity fraud to intellectual property theft, is a growing problem within the
More informationSecure Enterprise Mobility Management. Cloud-Based Enterprise Mobility Management. White Paper: soti.net
Secure Enterprise Mobility Management White Paper: Cloud-Based Enterprise Mobility Management soti.net Background Facing a business environment of constant change and increasing complexity, enterprises
More informationThe Cloud App Visibility Blind Spot
WHITE PAPER The Cloud App Visibility Blind Spot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Line-of-business leaders everywhere are bypassing IT departments
More informationGartner IT Infrastructure Operations & Data Center Summit 2013
Gartner IT Infrastructure Operations & Data Center Summit 2013 13 14 May Mumbai, India gartner.com/in/datacenter HOT TOPICS Managing data center cost and sustainability Mobile and big data impact Cloud
More informationAchieve Deeper Network Security
Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order
More informationGartner Enterprise Information & Master Data Management Summit 2016
Gartner Enterprise Information & Master Data Management Summit 2016 2 3 March London, UK gartnerevent.com/eu/eim Hot Topics Digital Information Leadership Data Quality Agile Information Governance Information
More informationMetrics that Matter Security Risk Analytics
Metrics that Matter Security Risk Analytics Rich Skinner, CISSP Director Security Risk Analytics & Big Data Brinqa rskinner@brinqa.com April 1 st, 2014. Agenda Challenges in Enterprise Security, Risk
More informationThe Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
More informationRethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization
Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization Neil MacDonald VP and Gartner Fellow Gartner Information Security, Privacy and Risk Research Twitter @nmacdona
More informationCritical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
More informationData- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst
ESG Solution Showcase Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst Abstract: Information security practices are in the midst
More information8 Ways to Better Monitor Network Security Threats in the Age of BYOD January 2014
8 Ways to Better Monitor Network Security Threats in the Age of BYOD January 2014 8 Ways to Better Monitor Network Security Threats in the Age of BYOD 2 Unless you operate out of a cave, chances are your
More informationGartner Master Data Management Summit 2010
Early-Bird Savings Save $300 when you register by March 1 Gartner Master Data Management Summit 2010 April 14 16 Las Vegas, NV gartner.com/us/mdm Taking MDM to the Next Level Guest KeyNote CONFERENCE CO-CHAIRS
More informationUtilize New Social Media to Improve Effi ciency, Reduce Costs and Engage Employees, Citizens and Stakeholders
Prepare and Implement Best Practices in Web 2.0 and Beyond Utilize New Social Media to Improve Effi ciency, Reduce Costs and Engage Employees, Citizens and Stakeholders February 9-10, 2009 Washington,
More informationCloud IaaS: Security Considerations
G00210095 Cloud IaaS: Security Considerations Published: 7 March 2011 Analyst(s): Lydia Leong, Neil MacDonald Ensuring adherence to your organization's security and compliance requirements is one of the
More informationThe Evolution of the Enterprise And Enterprise Security
The Evolution of the Enterprise And Enterprise Security Introduction Today's enterprise is evolving rapidly, with new technologies such as consumer-grade mobile devices, internet-based applications and
More informationNetwork Security Scenario
Network Security Scenario Jeffrey Wheatman Notes accompany this presentation. Please select Notes Page view. These materials can be reproduced only with written approval from Gartner. Such approvals must
More informationThe Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
More informationF5 and VMware. Realize the Virtual Possibilities.
. Realize the Virtual Possibilities. Simplify. Accelerate. Manage. Secure. Discover how deliver a Software-Defined Data Center by providing simplified end-to-end networking through an application-centric
More informationNext Generation Security Strategies. Marc Sarrias Regional Sales Manager msarrias@paloaltonetworks.com
Next Generation Security Strategies Marc Sarrias Regional Sales Manager msarrias@paloaltonetworks.com IT Ever-Evolving Challenges & Constraints Support IT Initiatives Minimize Business Risks from Cybersecurity
More informationWelcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc
Agenda Overview 9:00am General Session Auditorium 13:30pm General Session Auditorium 16:30pm General Session Auditorium 09:00 Welcome am Roberto Casetta, Snr. Vice President International 9:15am HEAT Software
More informationCyber Security Market by Solution - Global Forecast to 2020
Brochure More information from http://www.researchandmarkets.com/reports/3287011/ Cyber Security Market by Solution - Global Forecast to 2020 Description: 'Cyber Security Market by Solution (IAM, Encryption,
More informationThe Benefits of an Integrated Approach to Security in the Cloud
The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The
More informationDiscovering the Path to World Class IT
Leadership Forum Discovering the Path to World Class IT When CIOs work together, great things happen 28 February 1 March 2011 Raffles Dubai United Arab Emirates Leadership Forum Discovering the path towards
More informationAchieving Cyber Resilience. By Garin Pace, Anthony Shapella and Greg Vernaci
Achieving Cyber Resilience By Garin Pace, Anthony Shapella and Greg Vernaci Cyber security has become the single most important risk to company Boards of Directors around the world. This is not a surprise
More informationAccelerating Enterprise Growth by Leveraging Strategic Solutions. Eva Chen CEO and Co-Founder
Accelerating Enterprise Growth by Leveraging Strategic Solutions Eva Chen CEO and Co-Founder OUR CONSISTENT VISION: A world safe for exchanging digital information OUR CORE COMPETENCE: Innovating to staying
More informationSECURING YOUR ENTERPRISE MOBILITY
SECURING YOUR ENTERPRISE MOBILITY STRATEGY, OPERATION & TECHNOLOGY INTERACTIVE TRAINING WORKSHOP Burj Al Arab, Dubai th th th 16, 17 & 18 March 2015 ABOUT LUCIDEUS Lucideus is a cyber space security leader
More informationHow we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)
How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz) Domain.Local DC Client DomainAdmin Attack Operator Advise Protect Detect Respond
More informationMarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample
MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm
More information