EARLY-BIRD Discount Save 325 by 17 July Gartner Security & Risk Management Summit 2015 14 15 September London, UK gartnerevent.com/eu/security The World s Most Important Gathering for Security and Risk Executives Five Programs Chief Information Security Officer (CISO) Risk Management and Compliance Security Manager Program: Technology, Trends and Operations Business Continuity Management Internet of Things Security
Manage Risk and Deliver Security in a Digital World Craft your strategy for business resiliency Get the tools you need to deliver secure digital business environments and ensure your organization can weather an attack or disruption and bounce back quickly at Gartner Security & Risk Management Summit 2015, 14 15 September, London, UK. This year s conference covers the breadth of priorities in IT security, risk management, governance, compliance, BCM, the role of the CISO, the business of security, privacy, IAM and more. Join us this September to find out how you can advance your security and risk goals to support business objectives and improve resilience across the organization. Key benefits of attending Gain tools and strategies to stay ahead of your new responsibilities and increasing threats Align security and risk strategies with your enterprise objectives and digital transformation Assure compliance with new regulatory, compliance, privacy and e-discovery requirements Apply the latest techniques to tackle risks in cloud, OT and IoT Build a culture that drives security performance through employee engagement Who will be there? Chief Information Security Officers Chief Risk Officers Chief Information Officers IT Vice Presidents/Directors IT Security Officers/Directors Risk, Compliance and Privacy Managers Information Security/Risk Managers Network, Infrastructure, Solutions and Security Architects Visit gartnerevent.com/eu/security for more information
Reevaluate your security and risk strategies and investments for the digital age Digital business technologies and the Internet of Things are creating new threats and risks even as regulatory compliance and legal risks continue to escalate, and sophisticated cyber threats challenge even the best security strategies. Every business is now a digital business, and every business must become profi cient at risk assessment and mitigation, the foundation of success in the digital age. This year s summit delivers the latest research and recommendations across security and risk management priorities, and provides you with solutions to the latest hot topics, including: Application, network and infrastructure security Cloud security Mobile security Cybersecurity Digital business security and risk management Operational technology (OT) security and risk management Organizational resilience through BCM Risk management and compliance Security Awareness and Training The intersection of IT, operational technology and the Internet of Things is spawning a new generation of threats. Join us for the latest strategies to help you anticipate risk, mitigate its impact and enable successful business outcomes. What s new for 2015 Revamped agenda featuring new content, and covering key challenges such as applications, network and mobile security; security for the cloud; digital business security, risk management and privacy and EU regulations First ever presentation of Magic Quadrant for operational risk management Industry-orientated content, especially around fi nancial services, banking and insurance Focused sessions on crisis and incident management Content tailored for small and medium businesses Expanded opportunity to network with your peers with networking lunches and drinks receptions available #gartnersecurity Gartner Security & Risk Management Summit 2015
Agenda at a Glance Monday 14 September 2015 07:30 20:00 Registration and Information 08:00 08:45 Tutorial: Top Trends and Takeways for Cybersecurity Earl Perkins 09:00 10:00 Gartner Keynote: Manage Risk and Deliver Security in a Digital World Ant Allan, Peter Firstbrook and Dionisio Zumerle 10:00 10:30 Industry Panel 10:30 11:00 Refreshment Break in the Solution Showcase 11:00 12:00 Guest Keynote to be confirmed shortly 12:00 13:15 Lunch in the Solution Showcase Tracks A. Chief Information Security Officer (CISO) Program B. Risk Management and Compliance Program C. Security Manager Program: Technology, Tr 13:15 14:00 The New CISO's Crucial First 100 Days Tom Scholtz A Public Cloud Risk Model: Accepting Cloud Risk is OK, Ignoring Cloud Risk is Tragic Paul Proctor Defensive Strategies in an Age of Digital Insurgency Oliver Rochford 14:15 14:45 Solution Provider Sessions 15:00 15:45 Be Agile Not Fragile: Use Threat Intelligence Services to Defend Yourself Rob McMillan The Path to High Impact Security Awareness Christian Byrnes Mobile Security Threats and Trends 2015 Dionisio Zumerle 15:45 16:15 Refreshment Break in the Solution Showcase 16:15 16:45 Solution Provider Sessions 17:00 17:45 Case Study Use a Vendor Risk Management Framework to Mitigate Regulatory, Compliance, Security and Performance Issues Gayla Sullivan Panel: Mobile Security and Management: A Real World Discussion Rob Smith et al. 17:45 20:00 Networking Reception in the Solution Showcase Tuesday 15 September 2015 07:45 17:00 Registration and Information 08:00 08:45 People-Centric Security: Experiences and Lessons Learnt Tom Scholtz 09:00 09:45 Case Study What's New and Hot in GRC? John Wheeler 09:45 10:15 Refreshment Break in the Solution Showcase 10:15 10:45 Solution Provider Sessions How to Get Single Sign On Ant Allan Future of Endpoint Management Rob Smith 11:00 11:30 Protecting Your House on the Prairie: Security Strategy for the Smaller Enterprise Tom Scholtz Incident Response Platforms A Long Time Coming Rob McMillan Your Cloud Service Adoption Strategy Must Include Data Protection Brian Lowans 11:30 12:45 Lunch in the Solution Showcase 12:15 12:35 Magic Quadrant for Enterprise Netw 12:45 13:30 Avoid Five Security Staffing Disasters Jeremy D Hoinne Digital Business and Your New Relationship with Risk Paul Proctor What Role Will VPNs Play in Your Business Future? John Girard 13:45 14:15 Chief Data Officers and Chief Information Security Officers: Friends or Foes? Debra Logan What Can We Expect from the Upcoming EU Data Protection Regulation? Carsten Casper Lessons Learned on Advanced Threat Defense Strategies and Tools Jeremy D Hoinne 14:15 14:45 Refreshment Break in the Solution Showcase 14:45 15:15 Case Study How To Build A Globally Legal and Successful BYOD Program John Girard 15:30 16:00 One Simple Way to Get Your CEO to Embrace Risk Management John Wheeler Women in Security and Risk Management: Do Women Approach Security and Risk Management Differently Than Men? Roberta Witty Assessing Cloud Service Providers: Getting Beyond the Checklists Erik Heidt 16:15 17:00 Gartner Closing Keynote: Cybersecurity Scenario 2020: The Impact of Digital Business on Security Neil MacDonald Gartner Security & Risk Management Summit 2015 #gartnersecurity
Agenda as of 8 June 2015 During the event, please refer to the printed Agenda or the Gartner Events mobile app for complete, up to the minute session information. Tutorial: Best Practices in Crisis Communications Roberta Witty 10:35 10:55 Magic Quadrant for Security Information and Event Management Oliver Rochford 12:15 12:35 Magic Quadrant for Operational Risk Management John Wheeler ends and Operations D. Business Continuity Management Program and E. Internet of Things Security Program Workshops and Contract Negotiation Clinics Roundtables Gartner's Adaptive Security Architecture: New Approaches for Advanced and Insider Threats Neil MacDonald The Availability Implications for Digital Business Roberta Witty 12:45 14:15 Workshop: Get Incident-Ready. Test Your Plan with a Scenario Rob McMillan 13:15 14:15 Roundtable: Reduce The Risks and Implement Data Access Controls Now! Brian Lowans Securing Sensitive SaaS Using Cloud Access Security Brokers Ramon Krikken Case Study 14:30 16:00 Workshop: Get Security Right in an SMB Environment Rob McMillan 14:45 15:45 Roundtable: Changing Your Security Culture: Why Change is Hard and What to Do About It Debra Logan Designing the Modern Application Security Perimeter With Mobile and Cloud in Mind Ramon Krikken Cybersecurity Panel: IT Security, OT Security, IoT Security: Impacts and Recommendations Earl Perkins et al. 16:15 17:45 Workshop: Secure Self-Assessing and Self- Cleansing Systems with DevOps? Joerg Fritsch 16:45 17:45 Roundtable: Managing the Identity of Things Ant Allan Defending Endpoints from the Persistent Attack Peter Firstbrook Defending Against Sophisticated Malware Mario de Boer Privacy and the Internet of Things: How to Avoid Crossing the Creepy Line Carsten Casper Balancing Trust and User Experience for User Authentication Ant Allan 08:00 09:30 Workshop: Introduction to Mobile Security Self-Assessments John Girard and Dionisio Zumerle 08:00 09:00 Roundtable: Do you Measure the Impact of Your Awareness Program? Christian Byrnes The Dark Side of Payment Card Security Jonathan Care ork Firewalls Jeremy D Hoinne Why Crisis Management is the Heart of BCM Software Roberta Witty 10:45 12:15 Contract Negotiating Clinic: Cloud Contracts, Develop Your Own Security and Risk Exhibits Gayla Sullivan 10:45 11:45 Roundtable: Building Successful Business Metrics for Technology Risk Paul Proctor Secure Use of AWS and Azure: Comparison and Best Practices Neil MacDonald Operational Technology Security is Not Just for Industries Anymore Earl Perkins 12:45 14:15 Workshop: Identity Proofing Revisited as Data Privacy Dies Jonathan Care 12:45 13:45 Roundtable: Why Social Media Risks Are Skyrocketing and What You Can Do to Protect Your Company John Wheeler Protecting Mobile Apps Dionisio Zumerle Case Study Friends at the Gate? Best Practices for Enabling Remote Privileged Access From Vendors and Third Parties Felix Gaehtgens The Legality and Ethics of IoT and Employee Monitoring Carsten Casper 14:30 16:00 Workshop: Reporting Risk and Security to your Board of Directors Paul Proctor 14:45 15:45 Roundtable: Secure Use of Public Cloud Neil MacDonald What Your Containers do Not Contain! About the Security Properties of Containers Managed by Docker Joerg Fritsch Visit gartnerevent.com/eu/security for more information
Gartner Security & Risk Management Summit 2015 14 15 September London, UK gartnerevent.com/eu/security Registration and pricing 3 easy ways to register Web: gartnerevent.com/eu/security Email: emea.registration@gartner.com Telephone: +44 20 8879 2430 Pricing Pricing subject to change early-bird price: 2,150 + UK VAT (offer ends 17 July 2015) Standard price: 2,475 + UK VAT public Sector price: 1,950 + UK VAT Gartner Clients A Gartner ticket covers both days of the Summit. Contact your account manager or email emea.events@gartner.com to register using a ticket. Group Rate discount Maximize learning by participating together in relevant sessions or splitting up to cover more topics, sharing your session take-aways later. Complementary registrations: 1 for every 3 paid registrations 2 for every 5 paid registrations 3 for every 7 paid registrations For more information, email emea.teamsend@gartner.com or contact your Gartner account manager. WHY AttEnD A GARtnER EVEnt? Build a successful strategy Get validation from Gartner analysts Meet with suppliers to support your tactical planning Expand your peer network Innovate and problem-solve with like-minded peers Join the largest, most infl uential network of its kind Grow in your role Get content and solutions that are most relevant to you Lead more effectively and develop your team WHAt MAKEs GARtnER EVEnts unique? Our analysts Analyst-led presentations Analyst one-on-one private meetings Analyst-facilitated roundtables Our research 100% independent and objective Proven and reliable Relevant to your role Venue Park Plaza Westminster Bridge 200 Westminster Bridge Road London, UK SE1 7UT Phone +44 844 415 6780 www.parkplaza.com Gartner Hotel Room Rate Prices start at 175 per night at Park Plaza when using promotional code GART130915 Money-back guarantee If you are not completely satisfi ed with this Gartner conference, please notify us in writing within 15 days of the conference and we will refund 100% of your registration fee. 2015 Gartner, Inc. and/or its affi liates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affi liates. For more information, email info@gartner.com or visit gartner.com.