Gartner Security & Risk Management Summit 2015
|
|
|
- Liliana Booker
- 9 years ago
- Views:
Transcription
1 EARLY-BIRD Discount Save $300 by 4 September Gartner Security & Risk Management November Raffles Hotel, Dubai, UAE gartner.com/me/security Manage Risk and Deliver Security in a Digital World Hot Topics Application, network and mobile security Security for and in the cloud Cyber security Digital business security and risk management Operational technology security and risk management Planning for The Internet of Things security
2 Manage Risk and Deliver Security in a Digital World Craft Your Strategy for Business Resiliency Get the tools you need to deliver secure digital business environments and ensure your organization can weather an attack or disruption and bounce back quickly at 2015, 2 3 November, Dubai, UAE. This year s covers the breadth of priorities in IT security, risk management, governance, the role of the CISO, the business of security, IAM and more. Join us this November to fi nd out how you can advance your security and risk management goals to support business objectives and improve resilience across the organization. Key Benefits of Attending Gain tools and strategies to stay ahead of your new responsibilities and increasing threats: Align security and risk strategies with your enterprise objectives and digital transformation Apply the latest techniques to tackle risks in cloud, OT and IoT Build a culture that drives security performance through employee engagement Greg Young Research VP and Chair, Gartner GarTNEr PrEDIcTs: By 2017, 30% of threat intelligence services will include vertical-market security intelligence information from the Internet of Things. 2 #GartnerSEC 2015
3 Program Tracks A. Security Technology The potential positive business impact of cloud, social, mobility and big data brings undeniable opportunities for success but also challenges traditional approaches to information security to evolve at business speed. As organizations accelerate their adoption of these new platforms, bad ators develop methods to exploit these emerging platforms. Your security program must rapidly mature in the breadth and effectiveness of techniques and technologies you use to maintain appropriate levels of security for applications, data and infrastructure regardless of location. B. CISO and Risk Management CISO s must fi nd and maintain a tricky balance between protection and productivity. The challenge is exacerbated by ongoing volatility in enterprises business, technology and threat environments. The CISO & Risk Management program explores the key capabilities, strategies and tactics that are essential for the contemporary security leader. Virtual tracks Identity and Access Management As business and institutions mature, they must manage volatile and rapid change, establish effective formal governance, and provide accountability through transparency. IAM can enable these evolutionary steps, but must itself evolve. The IAM track features a wealth of presentations on current best practices and the latest issues and trends. Mobile Security Mobile devices present a host of new security issues, with the BYOD phenomenon presenting the greatest challenge. IT organizations must adapt to this rapidly changing environment and implement new policies and new technologies to mitigate the risks of the mobile workplace. This track will help you navigate the mobile environment over a three-year horizon. Cloud Security As organizations explore the benefi ts of cloud computing, security professionals must be prepared to highlight the risks and the costs of mitigating these risks. This track will show you how. Internet of Things The Internet of Things (IoT) has arrived. But as innovation and complexity expand, risk grows and threats expand with them. Securing the IoT is critical. This track will show you how. Who Should Attend CIOs, CSOs, CISOs, CROs, CPOs and their teams CISOs, CTOs, IT security managers, IT security directors, IT security offi cers Business continuity and IT disaster recovery managers Enterprise architects and planners Tech professionals Network security manager, executives and directors Governance, risk and compliance consultants Finance, audit, legal risk and compliance managers Researchers, investors Table of Contents 4 Agenda at a glance 6 Meet the analysts 7 Solution Showcase 8 Registration and pricing Visit gartner.com/me/security for updates and to register! 3
4 Agenda at a Glance Monday 2 November :45 17:15 Registration and Information 08:30 09:00 Tutorial: Next Generation Firewalls vs UTM Rajpreet Kaur 09:15 10:15 Opening and Gartner Opening Keynote: Manage Risk and Deliver Security in a Digital World Dionisio Zu 10:15 11:00 Refreshment Break in the Solution Showcase Tracks A. Security Technology B. CISO and Risk Management 11:00 11:30 Protecting Mobile Apps Dionisio Zumerle Best Practices in Crisis Communications Roberta Witty 11:45 12:15 Solution Provider Sessions 12:15 13:30 Lunch in the Solution Showcase and Prayer Time 13:30 14:15 Regaining Control Visibility and Trust When You No Longer Control the Infrastructure Peter Firstbrook The Next Three Years in Threats Greg Young 14:30 15:00 Solution Provider Sessions 15:15 15:45 Future Proofing IAM Felix Gaehtgens Bits, Bytes and Balanced Scorecards A Practical View of Security Metrics Jeffrey Wheatman 15:45 16:30 Refreshment Break and Prayer Time 15:50 16:20 Solution Provider Sessions 16:30 17:15 Guest Keynote Tuesday 3 November :00 17:30 Registration and Information 08:00 09:00 Networking and Refreshment Break in the Solution Showcase 09:00 09:30 Securing the Next Generation Data Center With Software-Defined Security Neil MacDonald 09:45 10:15 Solution Provider Sessions How to Get to Single Sign On Felix Gaehtgens 10:15 11:00 Refreshment Break in the Solution Showcase 10:20 10:50 Solution Provider Sessions 11:00 11:45 Mobile Security Threats and Trends 2015 Dionisio Zumerle IT Supply Chain Integrity: Living in a World Without Trust Neil MacDonald 12:00 12:30 Solution Provider Sessions 12:30 13:45 Lunch in the Solution Showcase and Prayer Time 13:45 14:15 Case Study: Integrating ICS With the IT Network: Need and Security Controls Mohit Saraswat, Senior IT Infrastructure Project Manager, Dubai Refreshment PJSC 14:30 15:15 Defending Endpoints From Persistent Attack Peter Firstbrook Case Study Top Trends in Corporate Compliance and Oversight Jeffrey Wheatman 15:15 16:00 Refreshment Break and Prayer Time 16:00 16:30 Overcoming Five Key Obstacles to Success in Content- Aware DLP Deployments Brian Reed Why Crisis Management is the Heart of BCM Software Roberta Witty 16:45 17:30 Gartner Closing Keynote: Your Security in 2020 Greg Young 4 #GartnerSEC 2015
5 When attending this event, please refer to the agenda handout provided or the Gartner Events mobile app for the most up to date session and location information. Agenda as of 31 July 2015, and subject to change Tutorial: Foundations of Identity and Access Management Felix Gaehtgens merle, Peter Firstbrook and Brian Reed Workshops roundtables 11:45 13:00 Workshop: Defending Against Sophisticated Malware Mario de Boer 11:45 12:45 Roundtable: Endpoint Security Roundtable Peter Firstbrook 13:30 14:30 Roundtable: Mobile Security and BYOD in the Enterprise Dionisio Zumerle 14:15 15:45 Workshop: Selecting the Right Mix of Security Controls to Mitigate Mobility Risk Mario de Boer 15:00 16:00 Roundtable: Business Continuity and Disaster Recovery Roberta Witty 09:00 10:30 Workshop: Information Security Metrics Workshop Building From the Business Down Jeffrey Wheatman 10:45 11:45 Roundtable: DLP: Best Practices Brian Reed 13:45 15:15 Workshop: DLP: What Works, What Doesn t Brian Reed Visit gartner.com/me/security for updates and to register! 5
6 Meet the Analysts Engage with our team of Gartner analysts through track presentations, a complimentary one-on-one meeting, analyst-facilitated workshops, roundtables and more. Below they are listed with the top issues they help clients address: Mario de Boer Research VP Protecting endpoints against malware Protecting the confi dentiality of data on endpoints through encryption or rights management Safeguarding the confi dentiality of s Enabling secure collaboration Peter Firstbrook Research VP How do we reduce the number of endpoint infections? How do we evaluate the different endpoint protection platforms? How do we control and monitor web traffi c across all devices and offi ces? What are the trends in security? Should we move hygiene to a cloud provider? Felix Gaehtgens Research Director Identity and access management planning, implementation, operations Identity governance and administration (IGA) Privileged access management (PAM) Enterprise directories, virtual directories Externalized authorization management rajpreet kaur Senior Research Analyst Firewall vendor selection NGFW and UTM selection IPS vendor selection Advanced threat detection (APT) technology and vendor selection Web application fi rewall selection Neil MacDonald VP Distinguished Analyst Securing next-generation virtualized data centres and workloads Securing cloud-based infrastructure-as-a-service deployments Successfully removing administrative rights from Windows users Endpoint protection strategies and contract reviews How to secure SharePoint in extranet scenarios Brian reed Research Director Selection of data loss prevention (DLP) technologies DLP deployment strategies Mobile data security concerns Data Discovery and Classifi cation initiatives Cloud security Jeffrey Wheatman Research Director Building a security program from scratch Leveraging GRC investments to support business goals and objectives Security and risk metrics and reporting Build, improve, mature and leverage processes for security and risk management roberta Witty Research VP Develop and manage business continuity management programs Business value of BCM to management How to execute BCM programs Create and manage BCM plans that actually work Technologies organizations should use to manage their BCM programs Greg Young Research VP Network security decisions Network security of virtualization Stopping network threats Securing data canters DMZ design Dionisio Zumerle Research Director Securing mobile devices Securing mobile applications Securing BYOD Protecting enterprise data on mobile and wireless networks Enterprise mobility management (EMM) security Our community of more than 1,000 analysts engaged in over 215,000 one-to-one client interactions in the past year. Benefit from the collective wisdom of the attending analysts to develop your strategy and implement flawlessly. 6 #GartnerSEC 2015
7 Solution Showcase Explore cutting-edge IT solutions from top providers; plus, participate in solution provider sessions, networking reception and more. Premier Sponsors Sponsorship Opportunities For further information about sponsoring this event: Mudassir Ehsan Telephone: Nasar Butt Telephone: Platinum Sponsors Silver Sponsors Visit gartner.com/me/security for updates and to register! 7
8 Gartner Security & Risk Management November Raffles Hotel, Dubai, UAE gartner.com/me/security 3 Ways to Register Web: gartner.com/me/security [email protected] Telephone: Save $300 early-bird Price: $2,225 (offer ends 4 September 2015) Standard Price: $2,525 Public Sector Price: $2,125 Gartner Clients A Gartner ticket covers both days of the summit. contact your account manager or [email protected] to register using a ticket. Gartner Security s Around the Globe 8 11 June National Harbor, MD United Kingdom September July Tokyo, Japan United States 7 9 December United States 8 11 June Dubai 2 3 November Japan July August Sao Paulo, Brazil August Sydney, Australia Brazil August Australia August September London, U.K. Join the conversation! is on Twitter and LinkedIn. Gartner Identity & Access Management 7 9 December Las Vegas, NV #GartnerSEC (Xchange) 2015 Gartner, Inc. and/or its affi liates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affi liates. For more information, [email protected] or visit gartner.com.
Gartner Security & Risk Management Summit 2015
EARLY-BIRD Discount Save 325 by 17 July Gartner Security & Risk Management Summit 2015 14 15 September London, UK gartnerevent.com/eu/security The World s Most Important Gathering for Security and Risk
Gartner Security & Risk Management Summit 2015
EARLY-BIRD DISCOUNT Save 6,500 by 3 July Gartner Security & Risk Management 2015 1 2 September Mumbai, India gartner.com/in/security Manage Risk and Deliver Security in a Digital World Hot topics Cybersecurity
Gartner Security & Risk Management Summit 2014
Gartner Security & Risk Management Summit 2014 25 26 August Hilton Sydney, Australia gartner.com/ap/security Smart Risk Balancing Security and Opportunity Hot Topics People-Centric Security Governance
Gartner Security & Risk Management Summit 2015
EARLY-BIRD Discount Save $400 by 26 June Gartner Security & Risk Management Summit 2015 24 25 August Hilton Sydney gartner.com/ap/security Manage Risk and Deliver Security in a Digital World Hot topics
Gartner IT Infrastructure, Operations & Data Center Summit 2015
EARLY-BIRD Discount Save $400 by 20 March Celebrating 10 Years Gartner IT Infrastructure, Operations & Data Center Summit 2015 18 19 May Hilton Sydney gartner.com/ap/datacenter Transform Service Delivery
Gartner Business Intelligence, Analytics & Information Management Summit 2016
EARLY-BIRD DISCOUNT Save 6,500 by 8 April 2016 Gartner Business Intelligence, Analytics & Information Management Summit 2016 2016 SURVEY Bi/analytics GARTNER CIO AGENDA still #1 technology priority See
Gartner Security & Risk Management Summit 2015
EARLY-BIRD Discount Save 325 by 17 July Gartner Security & Risk Management Summit 2015 14 15 September London, UK gartner.com/eu/security The World s Most Important Gathering for Security and Risk Executives
Gartner Business Process Management Summit 2015
EARLY-BIRD Discount Save $400 by 27 March Gartner Business Process Management Summit 2015 1 2 June Sydney, Australia gartner.com/ap/bpm BPM Shift From Improving Process to Delivering Big Change Key Benefits
Gartner Application Architecture, Development & Integration Summit 2014
Gartner Application Architecture, Development & Integration Summit 2014 21 22 July Hilton Sydney, Australia gartner.com/ap/aadi Transform Your Applications Strategy for a Digital World hot TOPICS Flexible
Gartner Digital Workplace Summit 2016
EARLY-BIRD DISCOUNT Save 325 by 22 July Gartner Digital Workplace Summit 2016 21 22 September London, U.K. gartnerevents.com/eudwlearn Key Benefits of Attending Build a strategic roadmap for digital workplace
Gartner Application Architecture, Development & Integration Summit 2015
EARLY-BIRD Discount Save $400 by 22 May Gartner Application Architecture, Development & Integration Summit 2015 20 21 July Hilton Sydney gartner.com/ap/aadi Innovate and Renovate to Dominate in the New
Gartner Security & Risk Management Summit 2013
Gartner Security & Risk Management Summit 2013 19 20 August Sydney, Australia gartner.com/ap/security THREE COMPLETE PROGRAMS Chief Information Security (CISO) Program Risk Management and Compliance Program
Gartner Business Intelligence, Analytics & Information Management Summit 2015
EARLY-BIRD DISCOUNT Save 6,500 by 10 April Gartner Business Intelligence, Analytics & Information Management Summit 2015 9 10 June Mumbai, India gartner.com/in/bi Crossing the Analytical Divide: New Technologies,
Gartner IT Infrastructure, Operations & Data Center Summit 2015
EARLY-BIRD DISCOUNT Save 6,500 by 13 March Gartner IT Infrastructure, Operations & Data Center Summit 2015 11 12 May Mumbai, India gartner.com/in/datacenter Leading I&O: Delivering New Levels of Innovation
Gartner IT Financial, Procurement & Asset Management Summit 2015
EARLY-BIRD Discount Save 325 by 24 July Gartner IT Financial, Procurement & Asset Management Summit 2015 21 22 September London, UK gartner.com/eu/itam Leading Change to Drive Innovation, Collaboration
Architecting the Digital Business: How to Use and Secure Cloud, Mobile and Data
NEW EvENt FOR 2014! 17 18 June 2014 london, uk gartner.com/eu/catalyst FOR technologists, BY technologists Architecting Digital : How to Use and Secure, and Data HOT TOPICS Securing public cloud Making
Gartner IT Infrastructure, Operations & Data Center Summit 2016
EARLY-BIRD DISCOUNT Save $375 by 18 March Gartner IT Infrastructure, Operations & Data Center Summit 2016 16 17 May Sydney, Australia gartner.com/ap/datacenter Key benefits Align the advantages, risks
Gartner Business Intelligence & Analytics Summit 2015
EARLY-BIRD Discount Save 325 by 14 August Gartner Business Intelligence & Analytics Summit 2015 14 15 October Munich, Germany gartner.com/eu/biger Crossing the Analytical Divide: New Technologies, New
While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:
While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab: A copy of today s presentation and our Upcoming webinars Information on how to dial in if
Global Access to More Than 10,000 Enterprise IT Decision Makers
Sponsor Prospectus The world s most important gathering of CIOs and senior IT executives Global Access to More Than 10,000 Enterprise IT Decision Makers Celebrating 20 Years of Commitment and Performance
Gartner IT Financial, Procurement & Asset Management Summit 2015
Gartner IT Financial, Procurement & Asset Management Summit 2015 21 22 September London, UK gartner.com/eu/itam Leading Change to Drive Innovation, Collaboration and Cost Optimization Key benefits of attending
Gartner Business Intelligence & Analytics Summit 2016
EARLY-BIRD DISCOUNT Save 325 by 12 August 2016 Gartner Business Intelligence & Analytics Summit 2016 10 11 October Munich, Germany gartnerevents.com/debibrochure Analytics Leadership: Empowerment Without
Gartner It Financial, Procurement & asset Management Summit 2014
Gartner It Financial, Procurement & asset Management Summit 2014 17 18 September London, UK gartnerevent.com/eu/itam Driving Business Outcomes: Control Costs, Mitigate Risks and Sustain Innovation KEY
Exploit New Architectures: Create Your Digital Future
EARLY-BIRD Discount Save 325 by 17 July the annual gathering for technical professionals 16 17 September 2015 London, UK gartner.com/eu/catalyst Exploit New Architectures: Create Your Digital Future Key
Gartner Application Architecture, Development & Integration Summit 2016
EARLY-BIRD DISCOUNT Save $375 by 27 May Gartner Application Architecture, Development & Integration Summit 2016 25 26 July Sydney, Australia gartner.com/ap/aadi Hot topics Mobile Development Internet of
Gartner Identity & Access Management Summit 2015
EARLY-BIRD Discount Save 300 by 16 January 2015 Gartner Identity & Access Management Summit 2015 16 17 March London, UK gartnerevent.com/eu/iam Successful IAM Simple, Business Driven and Secure Key benefits
Address C-level Cybersecurity issues to enable and secure Digital transformation
Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,
Architecting the Digital Business: How to Use and Secure Cloud, Mobile and Data
New event 2014! 17 18 June 2014 London, UK gartner.com/eu/catalyst FOR TECHNOLOGISTS, BY TECHNOLOGISTS Architecting Digital : How to Use and Secure, and Data Hot pics Securing public cloud Making big data
Gartner Business Intelligence & Analytics Summit 2015
Gartner Business Intelligence & Analytics Summit 2015 14 15 October Munich, Germany gartner.com/eu/biger Crossing the Analytical Divide: New Technologies, New Skills Hot Topics Leading a Digital Business
Gartner IT Financial, Procurement & Asset Management Summit 2014. Trip Report. Overview
Gartner IT Financial, Procurement & Asset Management Summit 2014 Driving Business Outcomes: Control Costs, Mitigate Risks and Sustain Innovation Trip Report The Gartner IT Financial, Procurement & Asset
Gartner PPM & IT Governance Summit 2015
EARLY-BIRD Discount Save 325 by 10 April 2015 Gartner PPM & IT Governance Summit 2015 8 9 June London, UK gartner.com/eu/ppm Thriving on Digital Chaos: Innovation, Agility and Collaboration Key benefits
Gartner Business Intelligence, Analytics & Information Management Summit 2016
EARLY-BIRD DISCOUNT Save $375 by 11 December Gartner Business Intelligence, Analytics & Information Management Summit 2016 2016 SURVEY Bi/analytics GARTNER CIO AGENDA still #1 technology priority See AGENDA
Gartner Enterprise Information & Master Data Management Summit 2016
EARLY-BIRD DISCOUNT Save 325 by 8 January 2016 Gartner Enterprise Information & Master Data Management Summit 2016 2 3 March London, UK gartnerevent.com/eu/eim Hot Topics Digital Information Leadership
Gartner Portals, content & collaboration summit 2014
Gartner Portals, content & collaboration summit 2014 15 16 September London, UK gartner.com/eu/pcc Engage, Collaborate, Innovate: Thriving in the Digital Enterprise HOT TOPICS Employee collaboration for
FROM PRODUCT TO PLATFORM
FROM PRODUCT TO PLATFORM DATA EQUIPMENT 2016 Mikkel Bossen Agenda Today s Challenges Data Growth, SSL encryption, Application Growth & SaaS What s hiding in under the surface? Legacy Security is that really
COMPUTACENTER AND SYMANTEC TOGETHER: PROTECTING AND EMPOWERING DATA
COMPUTACENTER AND SYMANTEC TOGETHER: PROTECTING AND EMPOWERING DATA COMPUTACENTER AND SYMANTEC TOGETHER SECURITY STORAGE BUSINESS CONTINUITY INFRASTRUCTURE MANAGEMENT Simplify and strengthen information
Delivering Control with Context Across the Extended Network
Delivering Control with Context Across the Extended Network Agenda Current Challenges Cisco ISE Overview Introducing Cisco pxgrid Customer Success Stories Only Cisco ISE Delivers 2013-2014 Cisco and/or
Cybersecurity Strategic Consulting
Home Overview Challenges Global Resource Growth Impacting Industries Why Capgemini Capgemini & Sogeti Cybersecurity Strategic Consulting Enabling business ambitions, resilience and cost efficiency with
Fight Malware, Malfeasance, and Malingering with F5
Fight Malware, Malfeasance, and Malingering with F5 F5 give organizations control and visibility to secure their users Internet usage. The solution helps protect against malware and data loss, ensure compliance,
Breaking the Cyber Attack Lifecycle
Breaking the Cyber Attack Lifecycle Palo Alto Networks: Reinventing Enterprise Operations and Defense March 2015 Palo Alto Networks 4301 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
Gartner Security & Risk Management Summit 2012
Gartner Security & Risk Management Summit 2012 16 17 July 2012 Sydney, Australia gartner.com/ap/security Trip Report Strategic Roadmaps to Secure the Enterprise and Manage Risk Overview INTRODUCTION The
Gartner Identity & Access Management Summit 2013
Gartner Identity & Access Management Summit 2013 Pragmatic Futures for IAM: Meeting Business Needs at the Nexus of Forces Trip Report The annual Gartner Identity & Access Management Summit was held on
ControlFabric Interop Demo Guide
ControlFabric Interop Demo Guide Featuring The ForeScout ControlFabric Interop Demo at It-Sa 2014 showcases integrations with our partners and other leading vendors that can help you achieve continuous
How To Handle A Threat From A Corporate Computer System
Politics of Security Webcast Summary Cyber Threat News and APT Defenses Introduction Stories about cyber espionage and Advanced Persistent Threats (APTs) are part of the mainstream news cycle. Concerns
The Future of Network Security Sophos 2012 Network Security Survey
The Future of Network Security Sophos 2012 Network Security Survey Sophos and Vanson Bourne surveyed 571 IT decision makers globally to gain a deeper understanding of how IT teams are responding to technology
Gartner IT Financial, Procurement & Asset Management Summit 2016
EARLY-BIRD DISCOUNT Save 325 by 15 July 2016 Gartner IT Financial, Procurement & Asset Management Summit 2016 12 13 September London, UK gartnerevents.com/euitam The Art of Influence: Optimizing Costs
Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle
Close the security gap with a unified approach Detect, block and remediate risks faster with end-to-end visibility of the security cycle Events are not correlated. Tools are not integrated. Teams are not
Gartner Master Data Management Summit 2013
Gartner Master Data Management Summit 2013 7 8 February 2013 Palau de Congressos de Catalunya, Barcelona, Spain gartner.com/eu/mdm Hot Topics Building the Business Case for Mdm Linking Mdm with Business
CORE Security and GLBA
CORE Security and GLBA Addressing the Graham-Leach-Bliley Act with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 [email protected] www.coresecurity.com
Gartner PPM & IT Governance Summit 2014
Gartner PPM & IT Governance Summit 2014 9 10 June London, UK gartner.com/eu/ppm Resource Priorities Generate Change Realize Returns HOT TOPICS Effectively Prioritizing Projects and Programs Creating an
Microsoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
Gartner Customer 360 Summit
Early-Bird Savings Save $300 when you register by May 7 Gartner Customer 360 Summit June 28 30 Los Angeles, CA gartner.com/us/crm CRM Strategies and Technologies to Understand, Grow and Engage Customers
Next Generation Enterprise Network Security Platform
Next Generation Enterprise Network Security Platform November 2014 Lyndon Clough - Territory Sales Manager Derran Guinan Systems Engineer Agenda The Palo Alto Networks story Today s Threat Landscape The
Making the Cloud Work for Business
Making the Cloud Work for Business 1 Making the Cloud Work for Business Contents Adjusting to On-Demand Needs 2 Poised for Dramatic Growth 2 Ability to Scale 3 Overcoming Remaining Barriers 4 Alignment
Data Center security trends
Data Center security trends Tomislav Tucibat Major accounts Manager, Adriatic Copyright Fortinet Inc. All rights reserved. IT Security evolution How did threat market change over the recent years? Problem:
Developing National Frameworks & Engaging the Private Sector
www.pwc.com Developing National Frameworks & Engaging the Private Sector Focus on Information/Cyber Security Risk Management American Red Cross Disaster Preparedness Summit Chicago, IL September 19, 2012
The business case for managed next generation firewalls. Six reasons why IT decision makers should sit up and take notice
The business case for managed next generation firewalls Six reasons why IT decision makers should sit up and take notice THREATWATCH Cyber threats cost the UK economy 27 billion pounds a year 92 percent
ForeScout CounterACT. Continuous Monitoring and Mitigation
Brochure ForeScout CounterACT Real-time Visibility Network Access Control Endpoint Compliance Mobile Security Rapid Threat Response Continuous Monitoring and Mitigation Benefits Security Gain real-time
Facility Security Design
Facility Security Design February 24 26, 2016 Fort Worth, TX Earn up to 21 CPEs EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N Use your security dollars wisely! A cost-effective,
Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015
Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology
Gartner IT Infrastructure & Operations Management Summit 2015
EARLY-BIRD Discount Save 325 by 3 April Gartner IT Infrastructure & Operations Management Summit 2015 1 2 June Berlin, Germany gartner.com/eu/iom Building a Lean and Agile I&O The Engine for your Digital
Gartner PPM & IT Governance Summit 2016
EARLY-BIRD DISCOUNT Save 325 by 15 April Gartner PPM & IT Governance Summit 2016 13 14 June London, U.K. gartnerevent.com/eu/ppm Key Benefits Develop Effective Portfolio Management Increase PMO and EPMO
Achieve Deeper Network Security and Application Control
Achieve Deeper Network Security and Application Control Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Yet
White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for
White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web
Secure Enterprise Mobility Management. Cloud-Based Enterprise Mobility Management. White Paper: soti.net
Secure Enterprise Mobility Management White Paper: Cloud-Based Enterprise Mobility Management soti.net Background Facing a business environment of constant change and increasing complexity, enterprises
Gartner IT Infrastructure Operations & Data Center Summit 2013
Gartner IT Infrastructure Operations & Data Center Summit 2013 13 14 May Mumbai, India gartner.com/in/datacenter HOT TOPICS Managing data center cost and sustainability Mobile and big data impact Cloud
Achieve Deeper Network Security
Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order
Gartner Enterprise Information & Master Data Management Summit 2016
Gartner Enterprise Information & Master Data Management Summit 2016 2 3 March London, UK gartnerevent.com/eu/eim Hot Topics Digital Information Leadership Data Quality Agile Information Governance Information
Metrics that Matter Security Risk Analytics
Metrics that Matter Security Risk Analytics Rich Skinner, CISSP Director Security Risk Analytics & Big Data Brinqa [email protected] April 1 st, 2014. Agenda Challenges in Enterprise Security, Risk
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization
Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization Neil MacDonald VP and Gartner Fellow Gartner Information Security, Privacy and Risk Research Twitter @nmacdona
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst
ESG Solution Showcase Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst Abstract: Information security practices are in the midst
Gartner Master Data Management Summit 2010
Early-Bird Savings Save $300 when you register by March 1 Gartner Master Data Management Summit 2010 April 14 16 Las Vegas, NV gartner.com/us/mdm Taking MDM to the Next Level Guest KeyNote CONFERENCE CO-CHAIRS
Cloud IaaS: Security Considerations
G00210095 Cloud IaaS: Security Considerations Published: 7 March 2011 Analyst(s): Lydia Leong, Neil MacDonald Ensuring adherence to your organization's security and compliance requirements is one of the
The Evolution of the Enterprise And Enterprise Security
The Evolution of the Enterprise And Enterprise Security Introduction Today's enterprise is evolving rapidly, with new technologies such as consumer-grade mobile devices, internet-based applications and
Network Security Scenario
Network Security Scenario Jeffrey Wheatman Notes accompany this presentation. Please select Notes Page view. These materials can be reproduced only with written approval from Gartner. Such approvals must
The Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
F5 and VMware. Realize the Virtual Possibilities.
. Realize the Virtual Possibilities. Simplify. Accelerate. Manage. Secure. Discover how deliver a Software-Defined Data Center by providing simplified end-to-end networking through an application-centric
Next Generation Security Strategies. Marc Sarrias Regional Sales Manager [email protected]
Next Generation Security Strategies Marc Sarrias Regional Sales Manager [email protected] IT Ever-Evolving Challenges & Constraints Support IT Initiatives Minimize Business Risks from Cybersecurity
Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc
Agenda Overview 9:00am General Session Auditorium 13:30pm General Session Auditorium 16:30pm General Session Auditorium 09:00 Welcome am Roberto Casetta, Snr. Vice President International 9:15am HEAT Software
Cyber Security Market by Solution - Global Forecast to 2020
Brochure More information from http://www.researchandmarkets.com/reports/3287011/ Cyber Security Market by Solution - Global Forecast to 2020 Description: 'Cyber Security Market by Solution (IAM, Encryption,
The Benefits of an Integrated Approach to Security in the Cloud
The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The
Achieving Cyber Resilience. By Garin Pace, Anthony Shapella and Greg Vernaci
Achieving Cyber Resilience By Garin Pace, Anthony Shapella and Greg Vernaci Cyber security has become the single most important risk to company Boards of Directors around the world. This is not a surprise
Accelerating Enterprise Growth by Leveraging Strategic Solutions. Eva Chen CEO and Co-Founder
Accelerating Enterprise Growth by Leveraging Strategic Solutions Eva Chen CEO and Co-Founder OUR CONSISTENT VISION: A world safe for exchanging digital information OUR CORE COMPETENCE: Innovating to staying
SECURING YOUR ENTERPRISE MOBILITY
SECURING YOUR ENTERPRISE MOBILITY STRATEGY, OPERATION & TECHNOLOGY INTERACTIVE TRAINING WORKSHOP Burj Al Arab, Dubai th th th 16, 17 & 18 March 2015 ABOUT LUCIDEUS Lucideus is a cyber space security leader
How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)
How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz) Domain.Local DC Client DomainAdmin Attack Operator Advise Protect Detect Respond
MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample
MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm
