Gartner Security & Risk Management Summit 2015

Size: px
Start display at page:

Download "Gartner Security & Risk Management Summit 2015"

Transcription

1 EARLY-BIRD Discount Save $300 by 4 September Gartner Security & Risk Management November Raffles Hotel, Dubai, UAE gartner.com/me/security Manage Risk and Deliver Security in a Digital World Hot Topics Application, network and mobile security Security for and in the cloud Cyber security Digital business security and risk management Operational technology security and risk management Planning for The Internet of Things security

2 Manage Risk and Deliver Security in a Digital World Craft Your Strategy for Business Resiliency Get the tools you need to deliver secure digital business environments and ensure your organization can weather an attack or disruption and bounce back quickly at 2015, 2 3 November, Dubai, UAE. This year s covers the breadth of priorities in IT security, risk management, governance, the role of the CISO, the business of security, IAM and more. Join us this November to fi nd out how you can advance your security and risk management goals to support business objectives and improve resilience across the organization. Key Benefits of Attending Gain tools and strategies to stay ahead of your new responsibilities and increasing threats: Align security and risk strategies with your enterprise objectives and digital transformation Apply the latest techniques to tackle risks in cloud, OT and IoT Build a culture that drives security performance through employee engagement Greg Young Research VP and Chair, Gartner GarTNEr PrEDIcTs: By 2017, 30% of threat intelligence services will include vertical-market security intelligence information from the Internet of Things. 2 #GartnerSEC 2015

3 Program Tracks A. Security Technology The potential positive business impact of cloud, social, mobility and big data brings undeniable opportunities for success but also challenges traditional approaches to information security to evolve at business speed. As organizations accelerate their adoption of these new platforms, bad ators develop methods to exploit these emerging platforms. Your security program must rapidly mature in the breadth and effectiveness of techniques and technologies you use to maintain appropriate levels of security for applications, data and infrastructure regardless of location. B. CISO and Risk Management CISO s must fi nd and maintain a tricky balance between protection and productivity. The challenge is exacerbated by ongoing volatility in enterprises business, technology and threat environments. The CISO & Risk Management program explores the key capabilities, strategies and tactics that are essential for the contemporary security leader. Virtual tracks Identity and Access Management As business and institutions mature, they must manage volatile and rapid change, establish effective formal governance, and provide accountability through transparency. IAM can enable these evolutionary steps, but must itself evolve. The IAM track features a wealth of presentations on current best practices and the latest issues and trends. Mobile Security Mobile devices present a host of new security issues, with the BYOD phenomenon presenting the greatest challenge. IT organizations must adapt to this rapidly changing environment and implement new policies and new technologies to mitigate the risks of the mobile workplace. This track will help you navigate the mobile environment over a three-year horizon. Cloud Security As organizations explore the benefi ts of cloud computing, security professionals must be prepared to highlight the risks and the costs of mitigating these risks. This track will show you how. Internet of Things The Internet of Things (IoT) has arrived. But as innovation and complexity expand, risk grows and threats expand with them. Securing the IoT is critical. This track will show you how. Who Should Attend CIOs, CSOs, CISOs, CROs, CPOs and their teams CISOs, CTOs, IT security managers, IT security directors, IT security offi cers Business continuity and IT disaster recovery managers Enterprise architects and planners Tech professionals Network security manager, executives and directors Governance, risk and compliance consultants Finance, audit, legal risk and compliance managers Researchers, investors Table of Contents 4 Agenda at a glance 6 Meet the analysts 7 Solution Showcase 8 Registration and pricing Visit gartner.com/me/security for updates and to register! 3

4 Agenda at a Glance Monday 2 November :45 17:15 Registration and Information 08:30 09:00 Tutorial: Next Generation Firewalls vs UTM Rajpreet Kaur 09:15 10:15 Opening and Gartner Opening Keynote: Manage Risk and Deliver Security in a Digital World Dionisio Zu 10:15 11:00 Refreshment Break in the Solution Showcase Tracks A. Security Technology B. CISO and Risk Management 11:00 11:30 Protecting Mobile Apps Dionisio Zumerle Best Practices in Crisis Communications Roberta Witty 11:45 12:15 Solution Provider Sessions 12:15 13:30 Lunch in the Solution Showcase and Prayer Time 13:30 14:15 Regaining Control Visibility and Trust When You No Longer Control the Infrastructure Peter Firstbrook The Next Three Years in Threats Greg Young 14:30 15:00 Solution Provider Sessions 15:15 15:45 Future Proofing IAM Felix Gaehtgens Bits, Bytes and Balanced Scorecards A Practical View of Security Metrics Jeffrey Wheatman 15:45 16:30 Refreshment Break and Prayer Time 15:50 16:20 Solution Provider Sessions 16:30 17:15 Guest Keynote Tuesday 3 November :00 17:30 Registration and Information 08:00 09:00 Networking and Refreshment Break in the Solution Showcase 09:00 09:30 Securing the Next Generation Data Center With Software-Defined Security Neil MacDonald 09:45 10:15 Solution Provider Sessions How to Get to Single Sign On Felix Gaehtgens 10:15 11:00 Refreshment Break in the Solution Showcase 10:20 10:50 Solution Provider Sessions 11:00 11:45 Mobile Security Threats and Trends 2015 Dionisio Zumerle IT Supply Chain Integrity: Living in a World Without Trust Neil MacDonald 12:00 12:30 Solution Provider Sessions 12:30 13:45 Lunch in the Solution Showcase and Prayer Time 13:45 14:15 Case Study: Integrating ICS With the IT Network: Need and Security Controls Mohit Saraswat, Senior IT Infrastructure Project Manager, Dubai Refreshment PJSC 14:30 15:15 Defending Endpoints From Persistent Attack Peter Firstbrook Case Study Top Trends in Corporate Compliance and Oversight Jeffrey Wheatman 15:15 16:00 Refreshment Break and Prayer Time 16:00 16:30 Overcoming Five Key Obstacles to Success in Content- Aware DLP Deployments Brian Reed Why Crisis Management is the Heart of BCM Software Roberta Witty 16:45 17:30 Gartner Closing Keynote: Your Security in 2020 Greg Young 4 #GartnerSEC 2015

5 When attending this event, please refer to the agenda handout provided or the Gartner Events mobile app for the most up to date session and location information. Agenda as of 31 July 2015, and subject to change Tutorial: Foundations of Identity and Access Management Felix Gaehtgens merle, Peter Firstbrook and Brian Reed Workshops roundtables 11:45 13:00 Workshop: Defending Against Sophisticated Malware Mario de Boer 11:45 12:45 Roundtable: Endpoint Security Roundtable Peter Firstbrook 13:30 14:30 Roundtable: Mobile Security and BYOD in the Enterprise Dionisio Zumerle 14:15 15:45 Workshop: Selecting the Right Mix of Security Controls to Mitigate Mobility Risk Mario de Boer 15:00 16:00 Roundtable: Business Continuity and Disaster Recovery Roberta Witty 09:00 10:30 Workshop: Information Security Metrics Workshop Building From the Business Down Jeffrey Wheatman 10:45 11:45 Roundtable: DLP: Best Practices Brian Reed 13:45 15:15 Workshop: DLP: What Works, What Doesn t Brian Reed Visit gartner.com/me/security for updates and to register! 5

6 Meet the Analysts Engage with our team of Gartner analysts through track presentations, a complimentary one-on-one meeting, analyst-facilitated workshops, roundtables and more. Below they are listed with the top issues they help clients address: Mario de Boer Research VP Protecting endpoints against malware Protecting the confi dentiality of data on endpoints through encryption or rights management Safeguarding the confi dentiality of s Enabling secure collaboration Peter Firstbrook Research VP How do we reduce the number of endpoint infections? How do we evaluate the different endpoint protection platforms? How do we control and monitor web traffi c across all devices and offi ces? What are the trends in security? Should we move hygiene to a cloud provider? Felix Gaehtgens Research Director Identity and access management planning, implementation, operations Identity governance and administration (IGA) Privileged access management (PAM) Enterprise directories, virtual directories Externalized authorization management rajpreet kaur Senior Research Analyst Firewall vendor selection NGFW and UTM selection IPS vendor selection Advanced threat detection (APT) technology and vendor selection Web application fi rewall selection Neil MacDonald VP Distinguished Analyst Securing next-generation virtualized data centres and workloads Securing cloud-based infrastructure-as-a-service deployments Successfully removing administrative rights from Windows users Endpoint protection strategies and contract reviews How to secure SharePoint in extranet scenarios Brian reed Research Director Selection of data loss prevention (DLP) technologies DLP deployment strategies Mobile data security concerns Data Discovery and Classifi cation initiatives Cloud security Jeffrey Wheatman Research Director Building a security program from scratch Leveraging GRC investments to support business goals and objectives Security and risk metrics and reporting Build, improve, mature and leverage processes for security and risk management roberta Witty Research VP Develop and manage business continuity management programs Business value of BCM to management How to execute BCM programs Create and manage BCM plans that actually work Technologies organizations should use to manage their BCM programs Greg Young Research VP Network security decisions Network security of virtualization Stopping network threats Securing data canters DMZ design Dionisio Zumerle Research Director Securing mobile devices Securing mobile applications Securing BYOD Protecting enterprise data on mobile and wireless networks Enterprise mobility management (EMM) security Our community of more than 1,000 analysts engaged in over 215,000 one-to-one client interactions in the past year. Benefit from the collective wisdom of the attending analysts to develop your strategy and implement flawlessly. 6 #GartnerSEC 2015

7 Solution Showcase Explore cutting-edge IT solutions from top providers; plus, participate in solution provider sessions, networking reception and more. Premier Sponsors Sponsorship Opportunities For further information about sponsoring this event: Mudassir Ehsan Telephone: Nasar Butt Telephone: Platinum Sponsors Silver Sponsors Visit gartner.com/me/security for updates and to register! 7

8 Gartner Security & Risk Management November Raffles Hotel, Dubai, UAE gartner.com/me/security 3 Ways to Register Web: gartner.com/me/security emea.registration@gartner.com Telephone: Save $300 early-bird Price: $2,225 (offer ends 4 September 2015) Standard Price: $2,525 Public Sector Price: $2,125 Gartner Clients A Gartner ticket covers both days of the summit. contact your account manager or emea.events@gartner.com to register using a ticket. Gartner Security s Around the Globe 8 11 June National Harbor, MD United Kingdom September July Tokyo, Japan United States 7 9 December United States 8 11 June Dubai 2 3 November Japan July August Sao Paulo, Brazil August Sydney, Australia Brazil August Australia August September London, U.K. Join the conversation! is on Twitter and LinkedIn. Gartner Identity & Access Management 7 9 December Las Vegas, NV #GartnerSEC (Xchange) 2015 Gartner, Inc. and/or its affi liates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affi liates. For more information, info@gartner.com or visit gartner.com.

Gartner Security & Risk Management Summit 2015

Gartner Security & Risk Management Summit 2015 EARLY-BIRD Discount Save 325 by 17 July Gartner Security & Risk Management Summit 2015 14 15 September London, UK gartnerevent.com/eu/security The World s Most Important Gathering for Security and Risk

More information

Gartner Security & Risk Management Summit 2015

Gartner Security & Risk Management Summit 2015 EARLY-BIRD DISCOUNT Save 6,500 by 3 July Gartner Security & Risk Management 2015 1 2 September Mumbai, India gartner.com/in/security Manage Risk and Deliver Security in a Digital World Hot topics Cybersecurity

More information

Gartner Security & Risk Management Summit 2014

Gartner Security & Risk Management Summit 2014 Gartner Security & Risk Management Summit 2014 25 26 August Hilton Sydney, Australia gartner.com/ap/security Smart Risk Balancing Security and Opportunity Hot Topics People-Centric Security Governance

More information

Gartner Security & Risk Management Summit 2015

Gartner Security & Risk Management Summit 2015 EARLY-BIRD Discount Save $400 by 26 June Gartner Security & Risk Management Summit 2015 24 25 August Hilton Sydney gartner.com/ap/security Manage Risk and Deliver Security in a Digital World Hot topics

More information

Gartner IT Infrastructure, Operations & Data Center Summit 2015

Gartner IT Infrastructure, Operations & Data Center Summit 2015 EARLY-BIRD Discount Save $400 by 20 March Celebrating 10 Years Gartner IT Infrastructure, Operations & Data Center Summit 2015 18 19 May Hilton Sydney gartner.com/ap/datacenter Transform Service Delivery

More information

Gartner Business Intelligence, Analytics & Information Management Summit 2016

Gartner Business Intelligence, Analytics & Information Management Summit 2016 EARLY-BIRD DISCOUNT Save 6,500 by 8 April 2016 Gartner Business Intelligence, Analytics & Information Management Summit 2016 2016 SURVEY Bi/analytics GARTNER CIO AGENDA still #1 technology priority See

More information

Gartner Security & Risk Management Summit 2015

Gartner Security & Risk Management Summit 2015 EARLY-BIRD Discount Save 325 by 17 July Gartner Security & Risk Management Summit 2015 14 15 September London, UK gartner.com/eu/security The World s Most Important Gathering for Security and Risk Executives

More information

Gartner Business Process Management Summit 2015

Gartner Business Process Management Summit 2015 EARLY-BIRD Discount Save $400 by 27 March Gartner Business Process Management Summit 2015 1 2 June Sydney, Australia gartner.com/ap/bpm BPM Shift From Improving Process to Delivering Big Change Key Benefits

More information

Gartner Application Architecture, Development & Integration Summit 2014

Gartner Application Architecture, Development & Integration Summit 2014 Gartner Application Architecture, Development & Integration Summit 2014 21 22 July Hilton Sydney, Australia gartner.com/ap/aadi Transform Your Applications Strategy for a Digital World hot TOPICS Flexible

More information

Gartner Digital Workplace Summit 2016

Gartner Digital Workplace Summit 2016 EARLY-BIRD DISCOUNT Save 325 by 22 July Gartner Digital Workplace Summit 2016 21 22 September London, U.K. gartnerevents.com/eudwlearn Key Benefits of Attending Build a strategic roadmap for digital workplace

More information

Gartner Application Architecture, Development & Integration Summit 2015

Gartner Application Architecture, Development & Integration Summit 2015 EARLY-BIRD Discount Save $400 by 22 May Gartner Application Architecture, Development & Integration Summit 2015 20 21 July Hilton Sydney gartner.com/ap/aadi Innovate and Renovate to Dominate in the New

More information

Gartner Security & Risk Management Summit 2013

Gartner Security & Risk Management Summit 2013 Gartner Security & Risk Management Summit 2013 19 20 August Sydney, Australia gartner.com/ap/security THREE COMPLETE PROGRAMS Chief Information Security (CISO) Program Risk Management and Compliance Program

More information

Gartner Business Intelligence, Analytics & Information Management Summit 2015

Gartner Business Intelligence, Analytics & Information Management Summit 2015 EARLY-BIRD DISCOUNT Save 6,500 by 10 April Gartner Business Intelligence, Analytics & Information Management Summit 2015 9 10 June Mumbai, India gartner.com/in/bi Crossing the Analytical Divide: New Technologies,

More information

Gartner IT Infrastructure, Operations & Data Center Summit 2015

Gartner IT Infrastructure, Operations & Data Center Summit 2015 EARLY-BIRD DISCOUNT Save 6,500 by 13 March Gartner IT Infrastructure, Operations & Data Center Summit 2015 11 12 May Mumbai, India gartner.com/in/datacenter Leading I&O: Delivering New Levels of Innovation

More information

Gartner IT Financial, Procurement & Asset Management Summit 2015

Gartner IT Financial, Procurement & Asset Management Summit 2015 EARLY-BIRD Discount Save 325 by 24 July Gartner IT Financial, Procurement & Asset Management Summit 2015 21 22 September London, UK gartner.com/eu/itam Leading Change to Drive Innovation, Collaboration

More information

Architecting the Digital Business: How to Use and Secure Cloud, Mobile and Data

Architecting the Digital Business: How to Use and Secure Cloud, Mobile and Data NEW EvENt FOR 2014! 17 18 June 2014 london, uk gartner.com/eu/catalyst FOR technologists, BY technologists Architecting Digital : How to Use and Secure, and Data HOT TOPICS Securing public cloud Making

More information

Gartner IT Infrastructure, Operations & Data Center Summit 2016

Gartner IT Infrastructure, Operations & Data Center Summit 2016 EARLY-BIRD DISCOUNT Save $375 by 18 March Gartner IT Infrastructure, Operations & Data Center Summit 2016 16 17 May Sydney, Australia gartner.com/ap/datacenter Key benefits Align the advantages, risks

More information

Gartner Business Intelligence & Analytics Summit 2015

Gartner Business Intelligence & Analytics Summit 2015 EARLY-BIRD Discount Save 325 by 14 August Gartner Business Intelligence & Analytics Summit 2015 14 15 October Munich, Germany gartner.com/eu/biger Crossing the Analytical Divide: New Technologies, New

More information

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab: While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab: A copy of today s presentation and our Upcoming webinars Information on how to dial in if

More information

Global Access to More Than 10,000 Enterprise IT Decision Makers

Global Access to More Than 10,000 Enterprise IT Decision Makers Sponsor Prospectus The world s most important gathering of CIOs and senior IT executives Global Access to More Than 10,000 Enterprise IT Decision Makers Celebrating 20 Years of Commitment and Performance

More information

Gartner IT Financial, Procurement & Asset Management Summit 2015

Gartner IT Financial, Procurement & Asset Management Summit 2015 Gartner IT Financial, Procurement & Asset Management Summit 2015 21 22 September London, UK gartner.com/eu/itam Leading Change to Drive Innovation, Collaboration and Cost Optimization Key benefits of attending

More information

Gartner Business Intelligence & Analytics Summit 2016

Gartner Business Intelligence & Analytics Summit 2016 EARLY-BIRD DISCOUNT Save 325 by 12 August 2016 Gartner Business Intelligence & Analytics Summit 2016 10 11 October Munich, Germany gartnerevents.com/debibrochure Analytics Leadership: Empowerment Without

More information

Gartner It Financial, Procurement & asset Management Summit 2014

Gartner It Financial, Procurement & asset Management Summit 2014 Gartner It Financial, Procurement & asset Management Summit 2014 17 18 September London, UK gartnerevent.com/eu/itam Driving Business Outcomes: Control Costs, Mitigate Risks and Sustain Innovation KEY

More information

Exploit New Architectures: Create Your Digital Future

Exploit New Architectures: Create Your Digital Future EARLY-BIRD Discount Save 325 by 17 July the annual gathering for technical professionals 16 17 September 2015 London, UK gartner.com/eu/catalyst Exploit New Architectures: Create Your Digital Future Key

More information

Gartner Application Architecture, Development & Integration Summit 2016

Gartner Application Architecture, Development & Integration Summit 2016 EARLY-BIRD DISCOUNT Save $375 by 27 May Gartner Application Architecture, Development & Integration Summit 2016 25 26 July Sydney, Australia gartner.com/ap/aadi Hot topics Mobile Development Internet of

More information

Gartner Webinar. Gartner Top Predictions for 2012: Control Slips Away. Presenter: Daryl Plummer, Managing Vice President & Gartner Fellow

Gartner Webinar. Gartner Top Predictions for 2012: Control Slips Away. Presenter: Daryl Plummer, Managing Vice President & Gartner Fellow Gartner Webinar Gartner Top Predictions for 2012: Control Slips Away Presenter: Daryl Plummer, Managing Vice President & Gartner Fellow Upcoming Webinars: www.gartner.com/webinars Looking for On-Demand

More information

Gartner Identity & Access Management Summit 2015

Gartner Identity & Access Management Summit 2015 EARLY-BIRD Discount Save 300 by 16 January 2015 Gartner Identity & Access Management Summit 2015 16 17 March London, UK gartnerevent.com/eu/iam Successful IAM Simple, Business Driven and Secure Key benefits

More information

Address C-level Cybersecurity issues to enable and secure Digital transformation

Address C-level Cybersecurity issues to enable and secure Digital transformation Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,

More information

Architecting the Digital Business: How to Use and Secure Cloud, Mobile and Data

Architecting the Digital Business: How to Use and Secure Cloud, Mobile and Data New event 2014! 17 18 June 2014 London, UK gartner.com/eu/catalyst FOR TECHNOLOGISTS, BY TECHNOLOGISTS Architecting Digital : How to Use and Secure, and Data Hot pics Securing public cloud Making big data

More information

Detecting Cyber Attacks in a Mobile and BYOD Organization

Detecting Cyber Attacks in a Mobile and BYOD Organization SOLUTION BRIEF Detecting Cyber Attacks in a Mobile and BYOD Organization Explore the challenges, understand the needs, evaluate mobile device management as an approach to detecting attacks and offer a

More information

Gartner Business Intelligence & Analytics Summit 2015

Gartner Business Intelligence & Analytics Summit 2015 Gartner Business Intelligence & Analytics Summit 2015 14 15 October Munich, Germany gartner.com/eu/biger Crossing the Analytical Divide: New Technologies, New Skills Hot Topics Leading a Digital Business

More information

Gartner IT Financial, Procurement & Asset Management Summit 2014. Trip Report. Overview

Gartner IT Financial, Procurement & Asset Management Summit 2014. Trip Report. Overview Gartner IT Financial, Procurement & Asset Management Summit 2014 Driving Business Outcomes: Control Costs, Mitigate Risks and Sustain Innovation Trip Report The Gartner IT Financial, Procurement & Asset

More information

Gartner PPM & IT Governance Summit 2015

Gartner PPM & IT Governance Summit 2015 EARLY-BIRD Discount Save 325 by 10 April 2015 Gartner PPM & IT Governance Summit 2015 8 9 June London, UK gartner.com/eu/ppm Thriving on Digital Chaos: Innovation, Agility and Collaboration Key benefits

More information

Gartner Business Intelligence, Analytics & Information Management Summit 2016

Gartner Business Intelligence, Analytics & Information Management Summit 2016 EARLY-BIRD DISCOUNT Save $375 by 11 December Gartner Business Intelligence, Analytics & Information Management Summit 2016 2016 SURVEY Bi/analytics GARTNER CIO AGENDA still #1 technology priority See AGENDA

More information

Gartner Enterprise Information & Master Data Management Summit 2016

Gartner Enterprise Information & Master Data Management Summit 2016 EARLY-BIRD DISCOUNT Save 325 by 8 January 2016 Gartner Enterprise Information & Master Data Management Summit 2016 2 3 March London, UK gartnerevent.com/eu/eim Hot Topics Digital Information Leadership

More information

Gartner Portals, content & collaboration summit 2014

Gartner Portals, content & collaboration summit 2014 Gartner Portals, content & collaboration summit 2014 15 16 September London, UK gartner.com/eu/pcc Engage, Collaborate, Innovate: Thriving in the Digital Enterprise HOT TOPICS Employee collaboration for

More information

FROM PRODUCT TO PLATFORM

FROM PRODUCT TO PLATFORM FROM PRODUCT TO PLATFORM DATA EQUIPMENT 2016 Mikkel Bossen Agenda Today s Challenges Data Growth, SSL encryption, Application Growth & SaaS What s hiding in under the surface? Legacy Security is that really

More information

COMPUTACENTER AND SYMANTEC TOGETHER: PROTECTING AND EMPOWERING DATA

COMPUTACENTER AND SYMANTEC TOGETHER: PROTECTING AND EMPOWERING DATA COMPUTACENTER AND SYMANTEC TOGETHER: PROTECTING AND EMPOWERING DATA COMPUTACENTER AND SYMANTEC TOGETHER SECURITY STORAGE BUSINESS CONTINUITY INFRASTRUCTURE MANAGEMENT Simplify and strengthen information

More information

Delivering Control with Context Across the Extended Network

Delivering Control with Context Across the Extended Network Delivering Control with Context Across the Extended Network Agenda Current Challenges Cisco ISE Overview Introducing Cisco pxgrid Customer Success Stories Only Cisco ISE Delivers 2013-2014 Cisco and/or

More information

Cybersecurity Strategic Consulting

Cybersecurity Strategic Consulting Home Overview Challenges Global Resource Growth Impacting Industries Why Capgemini Capgemini & Sogeti Cybersecurity Strategic Consulting Enabling business ambitions, resilience and cost efficiency with

More information

Fight Malware, Malfeasance, and Malingering with F5

Fight Malware, Malfeasance, and Malingering with F5 Fight Malware, Malfeasance, and Malingering with F5 F5 give organizations control and visibility to secure their users Internet usage. The solution helps protect against malware and data loss, ensure compliance,

More information

Breaking the Cyber Attack Lifecycle

Breaking the Cyber Attack Lifecycle Breaking the Cyber Attack Lifecycle Palo Alto Networks: Reinventing Enterprise Operations and Defense March 2015 Palo Alto Networks 4301 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com

More information

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available

More information

Gartner Security & Risk Management Summit 2012

Gartner Security & Risk Management Summit 2012 Gartner Security & Risk Management Summit 2012 16 17 July 2012 Sydney, Australia gartner.com/ap/security Trip Report Strategic Roadmaps to Secure the Enterprise and Manage Risk Overview INTRODUCTION The

More information

Gartner Identity & Access Management Summit 2013

Gartner Identity & Access Management Summit 2013 Gartner Identity & Access Management Summit 2013 Pragmatic Futures for IAM: Meeting Business Needs at the Nexus of Forces Trip Report The annual Gartner Identity & Access Management Summit was held on

More information

ControlFabric Interop Demo Guide

ControlFabric Interop Demo Guide ControlFabric Interop Demo Guide Featuring The ForeScout ControlFabric Interop Demo at It-Sa 2014 showcases integrations with our partners and other leading vendors that can help you achieve continuous

More information

How To Handle A Threat From A Corporate Computer System

How To Handle A Threat From A Corporate Computer System Politics of Security Webcast Summary Cyber Threat News and APT Defenses Introduction Stories about cyber espionage and Advanced Persistent Threats (APTs) are part of the mainstream news cycle. Concerns

More information

The Future of Network Security Sophos 2012 Network Security Survey

The Future of Network Security Sophos 2012 Network Security Survey The Future of Network Security Sophos 2012 Network Security Survey Sophos and Vanson Bourne surveyed 571 IT decision makers globally to gain a deeper understanding of how IT teams are responding to technology

More information

Agenda. All Summit Sessions will be held in CA Thayer Ballroom (unless noted).

Agenda. All Summit Sessions will be held in CA Thayer Ballroom (unless noted). Program Guide SANS Securing the Internet of Things Summit 2013 Agenda All Summit Sessions will be held in CA Thayer Ballroom (unless noted). All approved presentations will be available online following

More information

Gartner Business Intelligence, Analytics & Information Management Summit 2015

Gartner Business Intelligence, Analytics & Information Management Summit 2015 EARLY-BIRD Discount Save $400 by 12 December Gartner Business Intelligence, Analytics & Information Management Summit 2015 23 24 February Sydney, Australia gartner.com/ap/bi Crossing the Analytical Divide:

More information

Gartner IT Financial, Procurement & Asset Management Summit 2016

Gartner IT Financial, Procurement & Asset Management Summit 2016 EARLY-BIRD DISCOUNT Save 325 by 15 July 2016 Gartner IT Financial, Procurement & Asset Management Summit 2016 12 13 September London, UK gartnerevents.com/euitam The Art of Influence: Optimizing Costs

More information

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle Close the security gap with a unified approach Detect, block and remediate risks faster with end-to-end visibility of the security cycle Events are not correlated. Tools are not integrated. Teams are not

More information

Gartner Master Data Management Summit 2013

Gartner Master Data Management Summit 2013 Gartner Master Data Management Summit 2013 7 8 February 2013 Palau de Congressos de Catalunya, Barcelona, Spain gartner.com/eu/mdm Hot Topics Building the Business Case for Mdm Linking Mdm with Business

More information

CORE Security and GLBA

CORE Security and GLBA CORE Security and GLBA Addressing the Graham-Leach-Bliley Act with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 info@coresecurity.com www.coresecurity.com

More information

State Governments at Risk: The Data Breach Reality

State Governments at Risk: The Data Breach Reality State Governments at Risk: The Data Breach Reality NCSL Legislative Summit August 5, 2015 Doug Robinson, Executive Director National Association of State Chief Information Officers (NASCIO) About NASCIO

More information

Chief Security Strategist Symantec Public Sector

Chief Security Strategist Symantec Public Sector Chief Security Strategist Symantec Public Sector Advanced Persistent Threat Further things to understand about the APT Compromised Game Networks Lulzec Anonymous/YamaTough WikiLeaks 101 Global Intelligence

More information

Gartner PPM & IT Governance Summit 2014

Gartner PPM & IT Governance Summit 2014 Gartner PPM & IT Governance Summit 2014 9 10 June London, UK gartner.com/eu/ppm Resource Priorities Generate Change Realize Returns HOT TOPICS Effectively Prioritizing Projects and Programs Creating an

More information

Microsoft s cybersecurity commitment

Microsoft s cybersecurity commitment Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade

More information

Gartner Customer 360 Summit

Gartner Customer 360 Summit Early-Bird Savings Save $300 when you register by May 7 Gartner Customer 360 Summit June 28 30 Los Angeles, CA gartner.com/us/crm CRM Strategies and Technologies to Understand, Grow and Engage Customers

More information

Next Generation Enterprise Network Security Platform

Next Generation Enterprise Network Security Platform Next Generation Enterprise Network Security Platform November 2014 Lyndon Clough - Territory Sales Manager Derran Guinan Systems Engineer Agenda The Palo Alto Networks story Today s Threat Landscape The

More information

Making the Cloud Work for Business

Making the Cloud Work for Business Making the Cloud Work for Business 1 Making the Cloud Work for Business Contents Adjusting to On-Demand Needs 2 Poised for Dramatic Growth 2 Ability to Scale 3 Overcoming Remaining Barriers 4 Alignment

More information

Data Center security trends

Data Center security trends Data Center security trends Tomislav Tucibat Major accounts Manager, Adriatic Copyright Fortinet Inc. All rights reserved. IT Security evolution How did threat market change over the recent years? Problem:

More information

Developing National Frameworks & Engaging the Private Sector

Developing National Frameworks & Engaging the Private Sector www.pwc.com Developing National Frameworks & Engaging the Private Sector Focus on Information/Cyber Security Risk Management American Red Cross Disaster Preparedness Summit Chicago, IL September 19, 2012

More information

The business case for managed next generation firewalls. Six reasons why IT decision makers should sit up and take notice

The business case for managed next generation firewalls. Six reasons why IT decision makers should sit up and take notice The business case for managed next generation firewalls Six reasons why IT decision makers should sit up and take notice THREATWATCH Cyber threats cost the UK economy 27 billion pounds a year 92 percent

More information

ForeScout CounterACT. Continuous Monitoring and Mitigation

ForeScout CounterACT. Continuous Monitoring and Mitigation Brochure ForeScout CounterACT Real-time Visibility Network Access Control Endpoint Compliance Mobile Security Rapid Threat Response Continuous Monitoring and Mitigation Benefits Security Gain real-time

More information

Facility Security Design

Facility Security Design Facility Security Design February 24 26, 2016 Fort Worth, TX Earn up to 21 CPEs EXPERIE NCE, DED IC ON AT I D, AN LEA DE RS HIP IN SE R CU ITY E C DU AT IO N Use your security dollars wisely! A cost-effective,

More information

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015 Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology

More information

Gartner IT Infrastructure & Operations Management Summit 2015

Gartner IT Infrastructure & Operations Management Summit 2015 EARLY-BIRD Discount Save 325 by 3 April Gartner IT Infrastructure & Operations Management Summit 2015 1 2 June Berlin, Germany gartner.com/eu/iom Building a Lean and Agile I&O The Engine for your Digital

More information

Gartner PPM & IT Governance Summit 2016

Gartner PPM & IT Governance Summit 2016 EARLY-BIRD DISCOUNT Save 325 by 15 April Gartner PPM & IT Governance Summit 2016 13 14 June London, U.K. gartnerevent.com/eu/ppm Key Benefits Develop Effective Portfolio Management Increase PMO and EPMO

More information

Achieve Deeper Network Security and Application Control

Achieve Deeper Network Security and Application Control Achieve Deeper Network Security and Application Control Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Yet

More information

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web

More information

PROMOTION // TECHNOLOGY. The Economics Of Cyber Security

PROMOTION // TECHNOLOGY. The Economics Of Cyber Security PROMOTION // TECHNOLOGY The Economics Of Cyber Security Written by Peter Mills Malicious cyber activity, from hacking and identity fraud to intellectual property theft, is a growing problem within the

More information

Secure Enterprise Mobility Management. Cloud-Based Enterprise Mobility Management. White Paper: soti.net

Secure Enterprise Mobility Management. Cloud-Based Enterprise Mobility Management. White Paper: soti.net Secure Enterprise Mobility Management White Paper: Cloud-Based Enterprise Mobility Management soti.net Background Facing a business environment of constant change and increasing complexity, enterprises

More information

The Cloud App Visibility Blind Spot

The Cloud App Visibility Blind Spot WHITE PAPER The Cloud App Visibility Blind Spot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Line-of-business leaders everywhere are bypassing IT departments

More information

Gartner IT Infrastructure Operations & Data Center Summit 2013

Gartner IT Infrastructure Operations & Data Center Summit 2013 Gartner IT Infrastructure Operations & Data Center Summit 2013 13 14 May Mumbai, India gartner.com/in/datacenter HOT TOPICS Managing data center cost and sustainability Mobile and big data impact Cloud

More information

Achieve Deeper Network Security

Achieve Deeper Network Security Achieve Deeper Network Security Dell Next-Generation Firewalls Abstract Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Yet in order

More information

Gartner Enterprise Information & Master Data Management Summit 2016

Gartner Enterprise Information & Master Data Management Summit 2016 Gartner Enterprise Information & Master Data Management Summit 2016 2 3 March London, UK gartnerevent.com/eu/eim Hot Topics Digital Information Leadership Data Quality Agile Information Governance Information

More information

Metrics that Matter Security Risk Analytics

Metrics that Matter Security Risk Analytics Metrics that Matter Security Risk Analytics Rich Skinner, CISSP Director Security Risk Analytics & Big Data Brinqa rskinner@brinqa.com April 1 st, 2014. Agenda Challenges in Enterprise Security, Risk

More information

The Hillstone and Trend Micro Joint Solution

The Hillstone and Trend Micro Joint Solution The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry

More information

Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization

Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization Neil MacDonald VP and Gartner Fellow Gartner Information Security, Privacy and Risk Research Twitter @nmacdona

More information

Critical Controls for Cyber Security. www.infogistic.com

Critical Controls for Cyber Security. www.infogistic.com Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability

More information

Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst

Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst ESG Solution Showcase Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst Abstract: Information security practices are in the midst

More information

8 Ways to Better Monitor Network Security Threats in the Age of BYOD January 2014

8 Ways to Better Monitor Network Security Threats in the Age of BYOD January 2014 8 Ways to Better Monitor Network Security Threats in the Age of BYOD January 2014 8 Ways to Better Monitor Network Security Threats in the Age of BYOD 2 Unless you operate out of a cave, chances are your

More information

Gartner Master Data Management Summit 2010

Gartner Master Data Management Summit 2010 Early-Bird Savings Save $300 when you register by March 1 Gartner Master Data Management Summit 2010 April 14 16 Las Vegas, NV gartner.com/us/mdm Taking MDM to the Next Level Guest KeyNote CONFERENCE CO-CHAIRS

More information

Utilize New Social Media to Improve Effi ciency, Reduce Costs and Engage Employees, Citizens and Stakeholders

Utilize New Social Media to Improve Effi ciency, Reduce Costs and Engage Employees, Citizens and Stakeholders Prepare and Implement Best Practices in Web 2.0 and Beyond Utilize New Social Media to Improve Effi ciency, Reduce Costs and Engage Employees, Citizens and Stakeholders February 9-10, 2009 Washington,

More information

Cloud IaaS: Security Considerations

Cloud IaaS: Security Considerations G00210095 Cloud IaaS: Security Considerations Published: 7 March 2011 Analyst(s): Lydia Leong, Neil MacDonald Ensuring adherence to your organization's security and compliance requirements is one of the

More information

The Evolution of the Enterprise And Enterprise Security

The Evolution of the Enterprise And Enterprise Security The Evolution of the Enterprise And Enterprise Security Introduction Today's enterprise is evolving rapidly, with new technologies such as consumer-grade mobile devices, internet-based applications and

More information

Network Security Scenario

Network Security Scenario Network Security Scenario Jeffrey Wheatman Notes accompany this presentation. Please select Notes Page view. These materials can be reproduced only with written approval from Gartner. Such approvals must

More information

The Cloud App Visibility Blindspot

The Cloud App Visibility Blindspot The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before

More information

F5 and VMware. Realize the Virtual Possibilities.

F5 and VMware. Realize the Virtual Possibilities. . Realize the Virtual Possibilities. Simplify. Accelerate. Manage. Secure. Discover how deliver a Software-Defined Data Center by providing simplified end-to-end networking through an application-centric

More information

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager msarrias@paloaltonetworks.com

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager msarrias@paloaltonetworks.com Next Generation Security Strategies Marc Sarrias Regional Sales Manager msarrias@paloaltonetworks.com IT Ever-Evolving Challenges & Constraints Support IT Initiatives Minimize Business Risks from Cybersecurity

More information

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc Agenda Overview 9:00am General Session Auditorium 13:30pm General Session Auditorium 16:30pm General Session Auditorium 09:00 Welcome am Roberto Casetta, Snr. Vice President International 9:15am HEAT Software

More information

Cyber Security Market by Solution - Global Forecast to 2020

Cyber Security Market by Solution - Global Forecast to 2020 Brochure More information from http://www.researchandmarkets.com/reports/3287011/ Cyber Security Market by Solution - Global Forecast to 2020 Description: 'Cyber Security Market by Solution (IAM, Encryption,

More information

The Benefits of an Integrated Approach to Security in the Cloud

The Benefits of an Integrated Approach to Security in the Cloud The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The

More information

Discovering the Path to World Class IT

Discovering the Path to World Class IT Leadership Forum Discovering the Path to World Class IT When CIOs work together, great things happen 28 February 1 March 2011 Raffles Dubai United Arab Emirates Leadership Forum Discovering the path towards

More information

Achieving Cyber Resilience. By Garin Pace, Anthony Shapella and Greg Vernaci

Achieving Cyber Resilience. By Garin Pace, Anthony Shapella and Greg Vernaci Achieving Cyber Resilience By Garin Pace, Anthony Shapella and Greg Vernaci Cyber security has become the single most important risk to company Boards of Directors around the world. This is not a surprise

More information

Accelerating Enterprise Growth by Leveraging Strategic Solutions. Eva Chen CEO and Co-Founder

Accelerating Enterprise Growth by Leveraging Strategic Solutions. Eva Chen CEO and Co-Founder Accelerating Enterprise Growth by Leveraging Strategic Solutions Eva Chen CEO and Co-Founder OUR CONSISTENT VISION: A world safe for exchanging digital information OUR CORE COMPETENCE: Innovating to staying

More information

SECURING YOUR ENTERPRISE MOBILITY

SECURING YOUR ENTERPRISE MOBILITY SECURING YOUR ENTERPRISE MOBILITY STRATEGY, OPERATION & TECHNOLOGY INTERACTIVE TRAINING WORKSHOP Burj Al Arab, Dubai th th th 16, 17 & 18 March 2015 ABOUT LUCIDEUS Lucideus is a cyber space security leader

More information

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz) How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz) Domain.Local DC Client DomainAdmin Attack Operator Advise Protect Detect Respond

More information

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample

MarketsandMarkets. http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample MarketsandMarkets http://www.marketresearch.com/marketsandmarkets-v3719/ Publisher Sample Phone: 800.298.5699 (US) or +1.240.747.3093 or +1.240.747.3093 (Int'l) Hours: Monday - Thursday: 5:30am - 6:30pm

More information