Gartner Security & Risk Management Summit 2015



Similar documents
Gartner Security & Risk Management Summit 2015

Gartner Security & Risk Management Summit 2015

Gartner Security & Risk Management Summit 2014

Gartner Security & Risk Management Summit 2015

Gartner Identity & Access Management Summit 2015

Gartner Security & Risk Management Summit 2015

Exploit New Architectures: Create Your Digital Future

Gartner Security & Risk Management Summit 2015

Gartner Business Intelligence & Analytics Summit 2015

Gartner Digital Workplace Summit 2016

Gartner Security & Risk Management Summit 2013

Architecting the Digital Business: How to Use and Secure Cloud, Mobile and Data

Address C-level Cybersecurity issues to enable and secure Digital transformation

Gartner Application Architecture, Development & Integration Summit 2014

Gartner IT Infrastructure, Operations & Data Center Summit 2015

Gartner IT Financial, Procurement & Asset Management Summit 2015

Gartner Business Intelligence, Analytics & Information Management Summit 2016

Gartner Business Intelligence & Analytics Summit 2016

Gartner IT Financial, Procurement & Asset Management Summit 2015

Gartner Business Process Management Summit 2015

Gartner PPM & IT Governance Summit 2015

Gartner Security & Risk. Management. Summit Visit gartner.com/us/securityrisk or call to register

Gartner It Financial, Procurement & asset Management Summit 2014

Gartner Business Intelligence & Analytics Summit 2015

Gartner IT Infrastructure, Operations & Data Center Summit 2015

Architecting the Digital Business: How to Use and Secure Cloud, Mobile and Data

Gartner Application Architecture, Development & Integration Summit 2015

Cybersecurity Strategic Consulting

Gartner IT Infrastructure, Operations & Data Center Summit 2016

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:

Gartner Application Architecture, Development & Integration Summit 2016

Gartner Business Intelligence, Analytics & Information Management Summit 2015

Gartner Magic Quadrant Sources and Disclaimer

FFIEC Cybersecurity Assessment Tool Overview for Chief Executive Officers and Boards of Directors

Gartner Identity & Access Management Summit 2013

Gartner IT Infrastructure & Operations Management Summit 2015

Gartner Digital Workplace Summit 2015

Gartner Enterprise Information & Master Data Management Summit 2016

Developing National Frameworks & Engaging the Private Sector

Microsoft s cybersecurity commitment

Welcome Back Roberto Casetta, Snr. Vice President International. The Story Behind The Crystal Pete Daw, Cities Urban Developer Siemens Plc

Gartner Identity & Access Management summit 2014

Gartner IT Financial, Procurement & Asset Management Summit 2016

Information Security Forum Sponsorship Programs

CYBER RISK INTERNATIONAL COMPANY PROFILE

Workshop: How an IAM RFP Can Help You Choose the Best Solution for Your Business

VMware and the Need for Cyber Supply Chain Security Assurance

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL

Gartner Security & Risk. Management Summit Trip Report. Overview. Manage Risk and Deliver Security in a Digital World.

The Next Generation of Security Leaders

Cybersecurity Awareness for Executives

Physical Security: Introductory Applications and Technology

SECURING PAYMENTS IN THE CYBER WORLD

FFIEC Cybersecurity Assessment Tool

Gartner Master Data Management Summit 2012

CYBER SECURITY INFORMATION SHARING & COLLABORATION

Gartner Identity & Access Management Summit EARLY-BIRD DISCOUNT Register by 13 January 2012 and save 300. HOT TOPICS Future Trends in IAM

Gartner Security & Risk Management Summit 2012

Gartner Symposium/ITxpo Africa 2013 Analyst Areas of Coverage

Gartner Customer 360 Summit

AFCEA Global Identity Summit 2014 Engagement Theater

Network Security Redefined. Vectra s cybersecurity thinking machine detects and anticipates attacks in real time

Gartner IT Infrastructure Operations & Data Center Summit 2013

Accelerating Enterprise Growth by Leveraging Strategic Solutions. Eva Chen CEO and Co-Founder

Analyst Biography Symposium Presentations Example Issues He Can Assist With

SYMPOSIUM PROGRAM DAY ONE

Detecting Cyber Attacks in a Mobile and BYOD Organization

Cyber Security Risks for Banking Institutions.

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Gartner PPM & IT Governance Summit 2016

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises

Changing the Enterprise Security Landscape

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

The Cyber Threat Landscape

STREAM Cyber Security

Chief Security Strategist Symantec Public Sector

Westcon Presentation on Security Innovation, Opportunity, and Compromise

The Pitfalls of DIY Approaches to Disaster Recovery

State Governments at Risk: The Data Breach Reality

New InfoSec Leader The First 90 Days. John Bruce CEO

Key Issues for Identity and Access Management, 2008

Network Security Redefined Vectra s cybersecurity thinking machine detects and anticipates attacks in real time

The Benefits of an Integrated Approach to Security in the Cloud

o Cost containment through effective and SAP IT Procurement & negotiation strategies to help them achieve best-inclass, purchasing Asset Management

Gartner Master Data Management Summit 2013

Gartner Sourcing & Strategic Vendor Relationships Summit 2016

Gartner PPM & IT Governance Summit 2014

Integrating Security and Privacy Considerations into Client Services, Products and Day-To-Day Operations. WMACCA September 16, 2014

BT Assure Threat Intelligence

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

Security Management Program Development:

IT Transformation Summit agenda Unleashing IT s competitive business potential

Intelligence Driven Security

Gartner Business Intelligence, Analytics & Information Management Summit 2015

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Reinventing Network Security Vectra s cyber-security thinking machine delivers a new experience in network security

OPENTEXT GLOBAL FAX SUMMIT 2011

MSc Cyber Security. identity. hacker. virus. network. information

Gartner IT Leadership Trends: Building Your Digital Enterprise

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

Transcription:

EARLY-BIRD Discount Save 325 by 17 July Gartner Security & Risk Management Summit 2015 14 15 September London, UK gartnerevent.com/eu/security The World s Most Important Gathering for Security and Risk Executives Five Programs Chief Information Security Officer (CISO) Risk Management and Compliance Security Manager Program: Technology, Trends and Operations Business Continuity Management Internet of Things Security

Manage Risk and Deliver Security in a Digital World Craft your strategy for business resiliency Get the tools you need to deliver secure digital business environments and ensure your organization can weather an attack or disruption and bounce back quickly at Gartner Security & Risk Management Summit 2015, 14 15 September, London, UK. This year s conference covers the breadth of priorities in IT security, risk management, governance, compliance, BCM, the role of the CISO, the business of security, privacy, IAM and more. Join us this September to find out how you can advance your security and risk goals to support business objectives and improve resilience across the organization. Key benefits of attending Gain tools and strategies to stay ahead of your new responsibilities and increasing threats Align security and risk strategies with your enterprise objectives and digital transformation Assure compliance with new regulatory, compliance, privacy and e-discovery requirements Apply the latest techniques to tackle risks in cloud, OT and IoT Build a culture that drives security performance through employee engagement Who will be there? Chief Information Security Officers Chief Risk Officers Chief Information Officers IT Vice Presidents/Directors IT Security Officers/Directors Risk, Compliance and Privacy Managers Information Security/Risk Managers Network, Infrastructure, Solutions and Security Architects Visit gartnerevent.com/eu/security for more information

Reevaluate your security and risk strategies and investments for the digital age Digital business technologies and the Internet of Things are creating new threats and risks even as regulatory compliance and legal risks continue to escalate, and sophisticated cyber threats challenge even the best security strategies. Every business is now a digital business, and every business must become profi cient at risk assessment and mitigation, the foundation of success in the digital age. This year s summit delivers the latest research and recommendations across security and risk management priorities, and provides you with solutions to the latest hot topics, including: Application, network and infrastructure security Cloud security Mobile security Cybersecurity Digital business security and risk management Operational technology (OT) security and risk management Organizational resilience through BCM Risk management and compliance Security Awareness and Training The intersection of IT, operational technology and the Internet of Things is spawning a new generation of threats. Join us for the latest strategies to help you anticipate risk, mitigate its impact and enable successful business outcomes. What s new for 2015 Revamped agenda featuring new content, and covering key challenges such as applications, network and mobile security; security for the cloud; digital business security, risk management and privacy and EU regulations First ever presentation of Magic Quadrant for operational risk management Industry-orientated content, especially around fi nancial services, banking and insurance Focused sessions on crisis and incident management Content tailored for small and medium businesses Expanded opportunity to network with your peers with networking lunches and drinks receptions available #gartnersecurity Gartner Security & Risk Management Summit 2015

Agenda at a Glance Monday 14 September 2015 07:30 20:00 Registration and Information 08:00 08:45 Tutorial: Top Trends and Takeways for Cybersecurity Earl Perkins 09:00 10:00 Gartner Keynote: Manage Risk and Deliver Security in a Digital World Ant Allan, Peter Firstbrook and Dionisio Zumerle 10:00 10:30 Industry Panel 10:30 11:00 Refreshment Break in the Solution Showcase 11:00 12:00 Guest Keynote to be confirmed shortly 12:00 13:15 Lunch in the Solution Showcase Tracks A. Chief Information Security Officer (CISO) Program B. Risk Management and Compliance Program C. Security Manager Program: Technology, Tr 13:15 14:00 The New CISO's Crucial First 100 Days Tom Scholtz A Public Cloud Risk Model: Accepting Cloud Risk is OK, Ignoring Cloud Risk is Tragic Paul Proctor Defensive Strategies in an Age of Digital Insurgency Oliver Rochford 14:15 14:45 Solution Provider Sessions 15:00 15:45 Be Agile Not Fragile: Use Threat Intelligence Services to Defend Yourself Rob McMillan The Path to High Impact Security Awareness Christian Byrnes Mobile Security Threats and Trends 2015 Dionisio Zumerle 15:45 16:15 Refreshment Break in the Solution Showcase 16:15 16:45 Solution Provider Sessions 17:00 17:45 Case Study Use a Vendor Risk Management Framework to Mitigate Regulatory, Compliance, Security and Performance Issues Gayla Sullivan Panel: Mobile Security and Management: A Real World Discussion Rob Smith et al. 17:45 20:00 Networking Reception in the Solution Showcase Tuesday 15 September 2015 07:45 17:00 Registration and Information 08:00 08:45 People-Centric Security: Experiences and Lessons Learnt Tom Scholtz 09:00 09:45 Case Study What's New and Hot in GRC? John Wheeler 09:45 10:15 Refreshment Break in the Solution Showcase 10:15 10:45 Solution Provider Sessions How to Get Single Sign On Ant Allan Future of Endpoint Management Rob Smith 11:00 11:30 Protecting Your House on the Prairie: Security Strategy for the Smaller Enterprise Tom Scholtz Incident Response Platforms A Long Time Coming Rob McMillan Your Cloud Service Adoption Strategy Must Include Data Protection Brian Lowans 11:30 12:45 Lunch in the Solution Showcase 12:15 12:35 Magic Quadrant for Enterprise Netw 12:45 13:30 Avoid Five Security Staffing Disasters Jeremy D Hoinne Digital Business and Your New Relationship with Risk Paul Proctor What Role Will VPNs Play in Your Business Future? John Girard 13:45 14:15 Chief Data Officers and Chief Information Security Officers: Friends or Foes? Debra Logan What Can We Expect from the Upcoming EU Data Protection Regulation? Carsten Casper Lessons Learned on Advanced Threat Defense Strategies and Tools Jeremy D Hoinne 14:15 14:45 Refreshment Break in the Solution Showcase 14:45 15:15 Case Study How To Build A Globally Legal and Successful BYOD Program John Girard 15:30 16:00 One Simple Way to Get Your CEO to Embrace Risk Management John Wheeler Women in Security and Risk Management: Do Women Approach Security and Risk Management Differently Than Men? Roberta Witty Assessing Cloud Service Providers: Getting Beyond the Checklists Erik Heidt 16:15 17:00 Gartner Closing Keynote: Cybersecurity Scenario 2020: The Impact of Digital Business on Security Neil MacDonald Gartner Security & Risk Management Summit 2015 #gartnersecurity

Agenda as of 8 June 2015 During the event, please refer to the printed Agenda or the Gartner Events mobile app for complete, up to the minute session information. Tutorial: Best Practices in Crisis Communications Roberta Witty 10:35 10:55 Magic Quadrant for Security Information and Event Management Oliver Rochford 12:15 12:35 Magic Quadrant for Operational Risk Management John Wheeler ends and Operations D. Business Continuity Management Program and E. Internet of Things Security Program Workshops and Contract Negotiation Clinics Roundtables Gartner's Adaptive Security Architecture: New Approaches for Advanced and Insider Threats Neil MacDonald The Availability Implications for Digital Business Roberta Witty 12:45 14:15 Workshop: Get Incident-Ready. Test Your Plan with a Scenario Rob McMillan 13:15 14:15 Roundtable: Reduce The Risks and Implement Data Access Controls Now! Brian Lowans Securing Sensitive SaaS Using Cloud Access Security Brokers Ramon Krikken Case Study 14:30 16:00 Workshop: Get Security Right in an SMB Environment Rob McMillan 14:45 15:45 Roundtable: Changing Your Security Culture: Why Change is Hard and What to Do About It Debra Logan Designing the Modern Application Security Perimeter With Mobile and Cloud in Mind Ramon Krikken Cybersecurity Panel: IT Security, OT Security, IoT Security: Impacts and Recommendations Earl Perkins et al. 16:15 17:45 Workshop: Secure Self-Assessing and Self- Cleansing Systems with DevOps? Joerg Fritsch 16:45 17:45 Roundtable: Managing the Identity of Things Ant Allan Defending Endpoints from the Persistent Attack Peter Firstbrook Defending Against Sophisticated Malware Mario de Boer Privacy and the Internet of Things: How to Avoid Crossing the Creepy Line Carsten Casper Balancing Trust and User Experience for User Authentication Ant Allan 08:00 09:30 Workshop: Introduction to Mobile Security Self-Assessments John Girard and Dionisio Zumerle 08:00 09:00 Roundtable: Do you Measure the Impact of Your Awareness Program? Christian Byrnes The Dark Side of Payment Card Security Jonathan Care ork Firewalls Jeremy D Hoinne Why Crisis Management is the Heart of BCM Software Roberta Witty 10:45 12:15 Contract Negotiating Clinic: Cloud Contracts, Develop Your Own Security and Risk Exhibits Gayla Sullivan 10:45 11:45 Roundtable: Building Successful Business Metrics for Technology Risk Paul Proctor Secure Use of AWS and Azure: Comparison and Best Practices Neil MacDonald Operational Technology Security is Not Just for Industries Anymore Earl Perkins 12:45 14:15 Workshop: Identity Proofing Revisited as Data Privacy Dies Jonathan Care 12:45 13:45 Roundtable: Why Social Media Risks Are Skyrocketing and What You Can Do to Protect Your Company John Wheeler Protecting Mobile Apps Dionisio Zumerle Case Study Friends at the Gate? Best Practices for Enabling Remote Privileged Access From Vendors and Third Parties Felix Gaehtgens The Legality and Ethics of IoT and Employee Monitoring Carsten Casper 14:30 16:00 Workshop: Reporting Risk and Security to your Board of Directors Paul Proctor 14:45 15:45 Roundtable: Secure Use of Public Cloud Neil MacDonald What Your Containers do Not Contain! About the Security Properties of Containers Managed by Docker Joerg Fritsch Visit gartnerevent.com/eu/security for more information

Gartner Security & Risk Management Summit 2015 14 15 September London, UK gartnerevent.com/eu/security Registration and pricing 3 easy ways to register Web: gartnerevent.com/eu/security Email: emea.registration@gartner.com Telephone: +44 20 8879 2430 Pricing Pricing subject to change early-bird price: 2,150 + UK VAT (offer ends 17 July 2015) Standard price: 2,475 + UK VAT public Sector price: 1,950 + UK VAT Gartner Clients A Gartner ticket covers both days of the Summit. Contact your account manager or email emea.events@gartner.com to register using a ticket. Group Rate discount Maximize learning by participating together in relevant sessions or splitting up to cover more topics, sharing your session take-aways later. Complementary registrations: 1 for every 3 paid registrations 2 for every 5 paid registrations 3 for every 7 paid registrations For more information, email emea.teamsend@gartner.com or contact your Gartner account manager. WHY AttEnD A GARtnER EVEnt? Build a successful strategy Get validation from Gartner analysts Meet with suppliers to support your tactical planning Expand your peer network Innovate and problem-solve with like-minded peers Join the largest, most infl uential network of its kind Grow in your role Get content and solutions that are most relevant to you Lead more effectively and develop your team WHAt MAKEs GARtnER EVEnts unique? Our analysts Analyst-led presentations Analyst one-on-one private meetings Analyst-facilitated roundtables Our research 100% independent and objective Proven and reliable Relevant to your role Venue Park Plaza Westminster Bridge 200 Westminster Bridge Road London, UK SE1 7UT Phone +44 844 415 6780 www.parkplaza.com Gartner Hotel Room Rate Prices start at 175 per night at Park Plaza when using promotional code GART130915 Money-back guarantee If you are not completely satisfi ed with this Gartner conference, please notify us in writing within 15 days of the conference and we will refund 100% of your registration fee. 2015 Gartner, Inc. and/or its affi liates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affi liates. For more information, email info@gartner.com or visit gartner.com.