Gartner Security & Risk Management Summit 2015



Similar documents
Gartner Security & Risk Management Summit 2015

Gartner Security & Risk Management Summit 2015

Gartner Security & Risk Management Summit 2014

Gartner Security & Risk Management Summit 2015

Gartner IT Infrastructure, Operations & Data Center Summit 2015

Gartner Business Intelligence, Analytics & Information Management Summit 2016

Gartner Security & Risk Management Summit 2015

Gartner Business Process Management Summit 2015

Gartner Application Architecture, Development & Integration Summit 2014

Gartner Digital Workplace Summit 2016

Gartner Application Architecture, Development & Integration Summit 2015

Gartner Security & Risk Management Summit 2013

Gartner Business Intelligence, Analytics & Information Management Summit 2015

Gartner IT Infrastructure, Operations & Data Center Summit 2015

Gartner IT Financial, Procurement & Asset Management Summit 2015

Architecting the Digital Business: How to Use and Secure Cloud, Mobile and Data

Gartner IT Infrastructure, Operations & Data Center Summit 2016

Gartner Business Intelligence & Analytics Summit 2015

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:

Global Access to More Than 10,000 Enterprise IT Decision Makers

Gartner IT Financial, Procurement & Asset Management Summit 2015

Gartner Business Intelligence & Analytics Summit 2016

Gartner It Financial, Procurement & asset Management Summit 2014

Exploit New Architectures: Create Your Digital Future

Gartner Application Architecture, Development & Integration Summit 2016

Gartner Identity & Access Management Summit 2015

Address C-level Cybersecurity issues to enable and secure Digital transformation

Architecting the Digital Business: How to Use and Secure Cloud, Mobile and Data

Gartner Business Intelligence & Analytics Summit 2015

Gartner IT Financial, Procurement & Asset Management Summit Trip Report. Overview

Gartner PPM & IT Governance Summit 2015

Gartner Business Intelligence, Analytics & Information Management Summit 2016

Gartner Enterprise Information & Master Data Management Summit 2016

Gartner Portals, content & collaboration summit 2014

FROM PRODUCT TO PLATFORM

COMPUTACENTER AND SYMANTEC TOGETHER: PROTECTING AND EMPOWERING DATA

Delivering Control with Context Across the Extended Network

Cybersecurity Strategic Consulting

Fight Malware, Malfeasance, and Malingering with F5

Breaking the Cyber Attack Lifecycle

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Gartner Security & Risk Management Summit 2012

Gartner Identity & Access Management Summit 2013

ControlFabric Interop Demo Guide

How To Handle A Threat From A Corporate Computer System

The Future of Network Security Sophos 2012 Network Security Survey

Gartner IT Financial, Procurement & Asset Management Summit 2016

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

Gartner Master Data Management Summit 2013

CORE Security and GLBA

Gartner PPM & IT Governance Summit 2014

Microsoft s cybersecurity commitment

Gartner Customer 360 Summit

Next Generation Enterprise Network Security Platform

Making the Cloud Work for Business

Data Center security trends

Developing National Frameworks & Engaging the Private Sector

The business case for managed next generation firewalls. Six reasons why IT decision makers should sit up and take notice

ForeScout CounterACT. Continuous Monitoring and Mitigation

Facility Security Design

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Gartner IT Infrastructure & Operations Management Summit 2015

Gartner PPM & IT Governance Summit 2016

Achieve Deeper Network Security and Application Control

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for

Secure Enterprise Mobility Management. Cloud-Based Enterprise Mobility Management. White Paper: soti.net

Gartner IT Infrastructure Operations & Data Center Summit 2013

Achieve Deeper Network Security

Gartner Enterprise Information & Master Data Management Summit 2016

Metrics that Matter Security Risk Analytics

The Hillstone and Trend Micro Joint Solution

Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization

Critical Controls for Cyber Security.

Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst

Gartner Master Data Management Summit 2010

Cloud IaaS: Security Considerations

The Evolution of the Enterprise And Enterprise Security

Network Security Scenario

The Cloud App Visibility Blindspot

F5 and VMware. Realize the Virtual Possibilities.

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc

Cyber Security Market by Solution - Global Forecast to 2020

The Benefits of an Integrated Approach to Security in the Cloud

Achieving Cyber Resilience. By Garin Pace, Anthony Shapella and Greg Vernaci

Accelerating Enterprise Growth by Leveraging Strategic Solutions. Eva Chen CEO and Co-Founder

SECURING YOUR ENTERPRISE MOBILITY

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

MarketsandMarkets. Publisher Sample

Transcription:

EARLY-BIRD Discount Save $300 by 4 September Gartner Security & Risk Management 2015 2 3 November Raffles Hotel, Dubai, UAE gartner.com/me/security Manage Risk and Deliver Security in a Digital World Hot Topics Application, network and mobile security Security for and in the cloud Cyber security Digital business security and risk management Operational technology security and risk management Planning for The Internet of Things security

Manage Risk and Deliver Security in a Digital World Craft Your Strategy for Business Resiliency Get the tools you need to deliver secure digital business environments and ensure your organization can weather an attack or disruption and bounce back quickly at 2015, 2 3 November, Dubai, UAE. This year s covers the breadth of priorities in IT security, risk management, governance, the role of the CISO, the business of security, IAM and more. Join us this November to fi nd out how you can advance your security and risk management goals to support business objectives and improve resilience across the organization. Key Benefits of Attending Gain tools and strategies to stay ahead of your new responsibilities and increasing threats: Align security and risk strategies with your enterprise objectives and digital transformation Apply the latest techniques to tackle risks in cloud, OT and IoT Build a culture that drives security performance through employee engagement Greg Young Research VP and Chair, Gartner GarTNEr PrEDIcTs: By 2017, 30% of threat intelligence services will include vertical-market security intelligence information from the Internet of Things. 2 #GartnerSEC 2015

Program Tracks A. Security Technology The potential positive business impact of cloud, social, mobility and big data brings undeniable opportunities for success but also challenges traditional approaches to information security to evolve at business speed. As organizations accelerate their adoption of these new platforms, bad ators develop methods to exploit these emerging platforms. Your security program must rapidly mature in the breadth and effectiveness of techniques and technologies you use to maintain appropriate levels of security for applications, data and infrastructure regardless of location. B. CISO and Risk Management CISO s must fi nd and maintain a tricky balance between protection and productivity. The challenge is exacerbated by ongoing volatility in enterprises business, technology and threat environments. The CISO & Risk Management program explores the key capabilities, strategies and tactics that are essential for the contemporary security leader. Virtual tracks Identity and Access Management As business and institutions mature, they must manage volatile and rapid change, establish effective formal governance, and provide accountability through transparency. IAM can enable these evolutionary steps, but must itself evolve. The IAM track features a wealth of presentations on current best practices and the latest issues and trends. Mobile Security Mobile devices present a host of new security issues, with the BYOD phenomenon presenting the greatest challenge. IT organizations must adapt to this rapidly changing environment and implement new policies and new technologies to mitigate the risks of the mobile workplace. This track will help you navigate the mobile environment over a three-year horizon. Cloud Security As organizations explore the benefi ts of cloud computing, security professionals must be prepared to highlight the risks and the costs of mitigating these risks. This track will show you how. Internet of Things The Internet of Things (IoT) has arrived. But as innovation and complexity expand, risk grows and threats expand with them. Securing the IoT is critical. This track will show you how. Who Should Attend CIOs, CSOs, CISOs, CROs, CPOs and their teams CISOs, CTOs, IT security managers, IT security directors, IT security offi cers Business continuity and IT disaster recovery managers Enterprise architects and planners Tech professionals Network security manager, executives and directors Governance, risk and compliance consultants Finance, audit, legal risk and compliance managers Researchers, investors Table of Contents 4 Agenda at a glance 6 Meet the analysts 7 Solution Showcase 8 Registration and pricing Visit gartner.com/me/security for updates and to register! 3

Agenda at a Glance Monday 2 November 2015 07:45 17:15 Registration and Information 08:30 09:00 Tutorial: Next Generation Firewalls vs UTM Rajpreet Kaur 09:15 10:15 Opening and Gartner Opening Keynote: Manage Risk and Deliver Security in a Digital World Dionisio Zu 10:15 11:00 Refreshment Break in the Solution Showcase Tracks A. Security Technology B. CISO and Risk Management 11:00 11:30 Protecting Mobile Apps Dionisio Zumerle Best Practices in Crisis Communications Roberta Witty 11:45 12:15 Solution Provider Sessions 12:15 13:30 Lunch in the Solution Showcase and Prayer Time 13:30 14:15 Regaining Control Visibility and Trust When You No Longer Control the Infrastructure Peter Firstbrook The Next Three Years in Threats Greg Young 14:30 15:00 Solution Provider Sessions 15:15 15:45 Future Proofing IAM Felix Gaehtgens Bits, Bytes and Balanced Scorecards A Practical View of Security Metrics Jeffrey Wheatman 15:45 16:30 Refreshment Break and Prayer Time 15:50 16:20 Solution Provider Sessions 16:30 17:15 Guest Keynote Tuesday 3 November 2015 08:00 17:30 Registration and Information 08:00 09:00 Networking and Refreshment Break in the Solution Showcase 09:00 09:30 Securing the Next Generation Data Center With Software-Defined Security Neil MacDonald 09:45 10:15 Solution Provider Sessions How to Get to Single Sign On Felix Gaehtgens 10:15 11:00 Refreshment Break in the Solution Showcase 10:20 10:50 Solution Provider Sessions 11:00 11:45 Mobile Security Threats and Trends 2015 Dionisio Zumerle IT Supply Chain Integrity: Living in a World Without Trust Neil MacDonald 12:00 12:30 Solution Provider Sessions 12:30 13:45 Lunch in the Solution Showcase and Prayer Time 13:45 14:15 Case Study: Integrating ICS With the IT Network: Need and Security Controls Mohit Saraswat, Senior IT Infrastructure Project Manager, Dubai Refreshment PJSC 14:30 15:15 Defending Endpoints From Persistent Attack Peter Firstbrook Case Study Top Trends in Corporate Compliance and Oversight Jeffrey Wheatman 15:15 16:00 Refreshment Break and Prayer Time 16:00 16:30 Overcoming Five Key Obstacles to Success in Content- Aware DLP Deployments Brian Reed Why Crisis Management is the Heart of BCM Software Roberta Witty 16:45 17:30 Gartner Closing Keynote: Your Security in 2020 Greg Young 4 #GartnerSEC 2015

When attending this event, please refer to the agenda handout provided or the Gartner Events mobile app for the most up to date session and location information. Agenda as of 31 July 2015, and subject to change Tutorial: Foundations of Identity and Access Management Felix Gaehtgens merle, Peter Firstbrook and Brian Reed Workshops roundtables 11:45 13:00 Workshop: Defending Against Sophisticated Malware Mario de Boer 11:45 12:45 Roundtable: Endpoint Security Roundtable Peter Firstbrook 13:30 14:30 Roundtable: Mobile Security and BYOD in the Enterprise Dionisio Zumerle 14:15 15:45 Workshop: Selecting the Right Mix of Security Controls to Mitigate Mobility Risk Mario de Boer 15:00 16:00 Roundtable: Business Continuity and Disaster Recovery Roberta Witty 09:00 10:30 Workshop: Information Security Metrics Workshop Building From the Business Down Jeffrey Wheatman 10:45 11:45 Roundtable: DLP: Best Practices Brian Reed 13:45 15:15 Workshop: DLP: What Works, What Doesn t Brian Reed Visit gartner.com/me/security for updates and to register! 5

Meet the Analysts Engage with our team of Gartner analysts through track presentations, a complimentary one-on-one meeting, analyst-facilitated workshops, roundtables and more. Below they are listed with the top issues they help clients address: Mario de Boer Research VP Protecting endpoints against malware Protecting the confi dentiality of data on endpoints through encryption or rights management Safeguarding the confi dentiality of emails Enabling secure collaboration Peter Firstbrook Research VP How do we reduce the number of endpoint infections? How do we evaluate the different endpoint protection platforms? How do we control and monitor web traffi c across all devices and offi ces? What are the trends in email security? Should we move email hygiene to a cloud provider? Felix Gaehtgens Research Director Identity and access management planning, implementation, operations Identity governance and administration (IGA) Privileged access management (PAM) Enterprise directories, virtual directories Externalized authorization management rajpreet kaur Senior Research Analyst Firewall vendor selection NGFW and UTM selection IPS vendor selection Advanced threat detection (APT) technology and vendor selection Web application fi rewall selection Neil MacDonald VP Distinguished Analyst Securing next-generation virtualized data centres and workloads Securing cloud-based infrastructure-as-a-service deployments Successfully removing administrative rights from Windows users Endpoint protection strategies and contract reviews How to secure SharePoint in extranet scenarios Brian reed Research Director Selection of data loss prevention (DLP) technologies DLP deployment strategies Mobile data security concerns Data Discovery and Classifi cation initiatives Cloud security Jeffrey Wheatman Research Director Building a security program from scratch Leveraging GRC investments to support business goals and objectives Security and risk metrics and reporting Build, improve, mature and leverage processes for security and risk management roberta Witty Research VP Develop and manage business continuity management programs Business value of BCM to management How to execute BCM programs Create and manage BCM plans that actually work Technologies organizations should use to manage their BCM programs Greg Young Research VP Network security decisions Network security of virtualization Stopping network threats Securing data canters DMZ design Dionisio Zumerle Research Director Securing mobile devices Securing mobile applications Securing BYOD Protecting enterprise data on mobile and wireless networks Enterprise mobility management (EMM) security Our community of more than 1,000 analysts engaged in over 215,000 one-to-one client interactions in the past year. Benefit from the collective wisdom of the attending analysts to develop your strategy and implement flawlessly. 6 #GartnerSEC 2015

Solution Showcase Explore cutting-edge IT solutions from top providers; plus, participate in solution provider sessions, networking reception and more. Premier Sponsors Sponsorship Opportunities For further information about sponsoring this event: Mudassir Ehsan Telephone: +971 43 913204 Email: mudassir.ehsan@gartner.com Nasar Butt Telephone: +971 52 8350421 Email: nasar.butt@gartner.com Platinum Sponsors Silver Sponsors Visit gartner.com/me/security for updates and to register! 7

Gartner Security & Risk Management 2015 2 3 November Raffles Hotel, Dubai, UAE gartner.com/me/security 3 Ways to Register Web: gartner.com/me/security Email: emea.registration@gartner.com Telephone: +44 20 8879 2430 Save $300 early-bird Price: $2,225 (offer ends 4 September 2015) Standard Price: $2,525 Public Sector Price: $2,125 Gartner Clients A Gartner ticket covers both days of the summit. contact your account manager or email emea.events@gartner.com to register using a ticket. Gartner Security s Around the Globe 8 11 June National Harbor, MD United Kingdom 14 15 September 13 15 July Tokyo, Japan United States 7 9 December United States 8 11 June Dubai 2 3 November Japan 13 15 July 10 11 August Sao Paulo, Brazil 24 25 August Sydney, Australia Brazil 10 11 August Australia 24 25 August 14 15 September London, U.K. Join the conversation! is on Twitter and LinkedIn. Gartner Identity & Access Management 7 9 December Las Vegas, NV #GartnerSEC (Xchange) 2015 Gartner, Inc. and/or its affi liates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affi liates. For more information, email info@gartner.com or visit gartner.com.