EARLY-BIRD Discount Save 325 by 17 July Gartner Security & Risk Management Summit 2015 14 15 September London, UK gartner.com/eu/security The World s Most Important Gathering for Security and Risk Executives Five Programs Chief Information Security Officer (CISO) Risk Management and Compliance Security Manager Program: Technology, Trends and Operations Business Continuity Management Internet of Things Security
Manage Risk and Deliver Security in a Digital World Craft your strategy for business resiliency Get the tools you need to deliver secure digital business environments and ensure your organization can weather an attack or disruption and bounce back quickly at Gartner Security & Risk Management Summit 2015, 14 15 September, London, UK. This year s conference covers the breadth of priorities in IT security, risk management, governance, compliance, BCM, the role of the CISO, the business of security, privacy, IAM and more. Join us this September to find out how you can advance your security and risk goals to support business objectives and improve resilience across the organization. Key benefits of attending Gain tools and strategies to stay ahead of your new responsibilities and increasing threats Align security and risk strategies with your enterprise objectives and digital transformation Assure compliance with new regulatory, compliance, privacy and e-discovery requirements Apply the latest techniques to tackle risks in cloud, OT and IoT Build a culture that drives security performance through employee engagement Who will be there? Chief Information Security Officers Chief Risk Officers Chief Information Officers IT Vice Presidents/Directors IT Security Officers/Directors Risk, Compliance and Privacy Managers Information Security/Risk Managers Network, Infrastructure, Solutions and Security Architects Visit gartner.com/eu/security for more information
Reevaluate your security and risk strategies and investments for the digital age Digital business technologies and the Internet of Things are creating new threats and risks even as regulatory compliance and legal risks continue to escalate, and sophisticated cyber threats challenge even the best security strategies. Every business is now a digital business, and every business must become profi cient at risk assessment and mitigation, the foundation of success in the digital age. This year s summit delivers the latest research and recommendations across security and risk management priorities, and provides you with solutions to the latest hot topics, including: Application, network and infrastructure security Cloud security Mobile security Cybersecurity Digital business security and risk management Operational technology (OT) security and risk management Organizational resilience through BCM Risk management and compliance Security Awareness and Training The intersection of IT, operational technology and the Internet of Things is spawning a new generation of threats. Join us for the latest strategies to help you anticipate risk, mitigate its impact and enable successful business outcomes. What s new for 2015 Revamped agenda featuring new content, and covering key challenges such as applications, network and mobile security; security for the cloud; digital business security, risk management and privacy and EU regulations First ever presentation of Magic Quadrant for operational risk management Industry-orientated content, especially around fi nancial services, banking and insurance Focused sessions on crisis and incident management Content tailored for small and medium businesses Expanded opportunity to network with your peers with networking lunches and drinks receptions available #gartnersecurity Gartner Security & Risk Management Summit 2015
Agenda at a Glance Monday 14 September 2015 07:30 20:00 Registration and Information 08:00 08:45 Tutorial: Top Trends and Takeways for Cybersecurity Earl Perkins 09:00 10:00 Summit Chair Welcome and Gartner Keynote: Manage Risk and Deliver Security in a Digital World Ant Allan, Peter Firstbrook and Dionisio Zumerle 10:00 10:30 Industry Panel 10:30 11:00 Refreshment Break in the Solution Showcase 11:00 12:00 Guest Keynote to be confirmed shortly 12:00 13:15 Lunch in the Solution Showcase Tracks A. Chief Information Security Officer (CISO) Program B. Risk Management and Compliance Program C. Security Manager Program: Technology, Tr 13:15 14:00 The New CISO's Crucial First 100 Days Tom Scholtz A Public Cloud Risk Model: Accepting Cloud Risk is OK, Ignoring Cloud Risk is Tragic Paul Proctor Defensive Strategies in an Age of Digital Insurgency Oliver Rochford 14:15 14:45 Solution Provider Sessions 14:45 15:15 Refreshment Break in the Solution Showcase 15:15 16:00 Be Agile Not Fragile: Use Threat Intelligence Services to Defend Yourself Rob McMillan The Path to High Impact Security Awareness Christian Byrnes Mobile Security Threats and Trends 2015 Dionisio Zumerle 16:15 16:45 Solution Provider Sessions 17:00 17:30 Protecting Your House on the Prairie: Security Strategy for the Smaller Enterprise Tom Scholtz Incident Response Platforms A Long Time Coming Rob McMillan Your Cloud Service Adoption Strategy Must Include Data Protection Brian Lowans 17:30 20:00 Networking Reception in the Solution Showcase Tuesday 15 September 2015 07:45 17:15 Registration and Information 08:00 08:45 People-Centric Security: Experiences and Lessons Learnt Tom Scholtz How to Get Single Sign On Ant Allan 09:00 09:45 Case Study What's New and Hot in GRC? John Wheeler Future of Endpoint Management Rob Smith 09:45 10:15 Refreshment Break in the Solution Showcase 10:15 10:45 Solution Provider Sessions 11:00 11:45 Case Study Use a Vendor Risk Management Framework to Mitigate Regulatory, Compliance, Security and Performance Issues Gayla Sullivan Panel: Mobile Security and Management: A Real World Discussion Rob Smith et al. 11:45 13:00 Lunch in the Solution Showcase 12:30 12:50 Magic Quadrant for Enterprise Netw 13:00 13:45 Avoid Five Security Staffing Disasters Jeremy D Hoinne Digital Business and Your New Relationship with Risk Paul Proctor What Role Will VPNs Play in Your Business Future? John Girard 14:00 14:30 Chief Data Officers and Chief Information Security Officers: Friends or Foes? Debra Logan What Can We Expect from the Upcoming EU Data Protection Regulation? Carsten Casper Lessons Learned on Advanced Threat Defense Strategies and Tools Jeremy D Hoinne 14:30 15:00 Refreshment Break in the Solution Showcase 15:00 15:30 Case Study How To Build A Globally Legal and Successful BYOD Program John Girard 15:45 16:15 One Simple Way to Get Your CEO to Embrace Risk Management John Wheeler Assessing Cloud Service Providers: Getting Beyond the Checklists Erik Heidt 16:30 17:15 Gartner Closing Keynote and Summit Chair Closing Remarks: Cybersecurity Scenario 2020: The Impact of Digital Business on Security Neil Gartner Security & Risk Management Summit 2015 #gartnersecurity
Agenda as of 19 June 2015 During the event, please refer to the printed Agenda or the Gartner Events mobile app for complete, up to the minute session information. Tutorial: Best Practices in Crisis Communications Roberta Witty 10:35 10:55 Magic Quadrant for Security Information and Event Management Oliver Rochford 12:15 12:35 Magic Quadrant for Operational Risk Management John Wheeler ends and Operations D. Business Continuity Management Program and E. Internet of Things Security Program Workshops and Contract Negotiation Clinics Roundtables Gartner's Adaptive Security Architecture: New Approaches for Advanced and Insider Threats Neil MacDonald The Availability Implications for Digital Business Roberta Witty 12:45 14:15 Workshop: Get Incident-Ready. Test Your Plan with a Scenario Rob McMillan 13:15 14:15 Roundtable: Reduce The Risks and Implement Data Access Controls Now! Brian Lowans Securing Sensitive SaaS Using Cloud Access Security Brokers Ramon Krikken Case Study 14:30 16:00 Workshop: Get Security Right in an SMB Environment Rob McMillan 15:15 16:15 Roundtable: Changing Your Security Culture: Why Change is Hard and What to Do About It Debra Logan The Dark Side of Payment Card Security Jonathan Care Why Crisis Management is the Heart of BCM Software Roberta Witty 16:15 17:45 Workshop: Secure Self-Assessing and Self- Cleansing Systems with DevOps? Joerg Fritsch 16:30 17:30 Roundtable: Managing the Identity of Things Ant Allan Defending Endpoints from the Persistent Attack Peter Firstbrook Defending Against Sophisticated Malware Mario de Boer Privacy and the Internet of Things: How to Avoid Crossing the Creepy Line Carsten Casper Balancing Trust and User Experience for User Authentication Ant Allan 08:00 09:30 Contract Negotiating Clinic: Cloud Contracts, Develop Your Own Security and Risk Exhibits Gayla Sullivan 08:00 09:00 Roundtable: Do you Measure the Impact of Your Awareness Program? Christian Byrnes Designing the Modern Application Security Perimeter With Mobile and Cloud in Mind Ramon Krikken ork Firewalls Jeremy D Hoinne Cybersecurity Panel: IT Security, OT Security, IoT Security: Impacts and Recommendations Earl Perkins et al. 10:45 12:15 Workshop: Introduction to Mobile Security Self-Assessments John Girard and Dionisio Zumerle 10:45 11:45 Roundtable: Building Successful Business Metrics for Technology Risk Paul Proctor Secure Use of AWS and Azure: Comparison and Best Practices Neil MacDonald Operational Technology Security is Not Just for Industries Anymore Earl Perkins 13:00 14:30 Workshop: Identity Proofing Revisited as Data Privacy Dies Jonathan Care 13:00 14:00 Roundtable: Why Social Media Risks Are Skyrocketing and What You Can Do to Protect Your Company John Wheeler Protecting Mobile Apps Dionisio Zumerle Case Study Friends at the Gate? Best Practices for Enabling Remote Privileged Access From Vendors and Third Parties Felix Gaehtgens The Legality and Ethics of IoT and Employee Monitoring TBD 14:45 16:15 Workshop: Reporting Risk and Security to your Board of Directors Paul Proctor 15:00 16:00 Roundtable: Secure Use of Public Cloud Neil MacDonald What Your Containers do Not Contain! About the Security Properties of Containers Managed by Docker Joerg Fritsch MacDonald Women in Security and Risk Management: Do Women Approach Security and Risk Management Differently Than Men? Roberta Witty Visit gartner.com/eu/security for more information
Solution Showcase Develop a shortlist of technology and service providers who can meet your particular needs. We offer you exclusive access to some of the world s leading technology and service solution providers in a variety of settings. Premier Sponsor As a global leader in IT security, Trend Micro develops innovative security solutions that make the world safe for businesses and consumers to exchange digital information. With over 25 years of security expertise, we re recognized as the market leader in server security, cloud security, and small business content security. Our security is powered by Trend Micro Smart Protection Network global threat intelligence and is supported by over 1,200 security experts around the world. www.trendmicro.co.uk Sponsorship Opportunities For further information about sponsoring this event: Telephone: +44 1784 267456 Email: european.exhibits@gartner.com Platinum Sponsors AirWatch by VMware is the leader in enterprise mobility management (EMM). We enable end users with a seamless digital workspace, and empower IT with a future-proof mobility platform that provides fl exibility to manage multiple use cases, unifi ed management of endpoints, end-to-end security, and seamless integration across enterprise systems. www.air-watch.com Darktrace is a fast-growing cyber threat defense company and world leader in Enterprise Immune System technology. Darktrace s award-winning solution is powered by machine learning and mathematics developed at the University of Cambridge, and helping organizations defend against advanced cyber-attacks and insider threat by detecting previouslyunidentifi ed anomalies in real time. www.darktrace.com Fortinet is a worldwide provider of network security appliances and a market leader in Network Security. Our products and subscription services provide broad, integrated and high-performance protection against dynamic security threats while simplifying the IT security infrastructure. Our customers include enterprises, service providers and government entities worldwide, including the majority of the 2012 Fortune Global 100. www.fortinet.com Qualys (www.qualys.com) is a pioneer and leading provider of cloud security and compliance solutions with over 7,700 customers in more than 100 countries. The Qualys Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance, delivering critical security intelligence on demand. www.qualys.com Splunk Inc. provides the leading platform for Operational Intelligence. Splunk software searches, monitors, analyzes and visualizes machine-generated big data from websites, applications, servers, networks, sensors and mobile devices. More than 8,400 organizations use Splunk software to deepen business and customer understanding, mitigate cybersecurity risk, improve service performance and reduce costs. www.splunk.com Gartner Security & Risk Management Summit 2015 #gartnersecurity
Silver Sponsors Avecto is an innovative technology business specializing in endpoint security. The company s revolutionary Defendpoint software ensures defense in depth while empowering users to work freely. www.avecto.com BlackBerry provides an end-to-end suite of secure mobile solutions, delivering innovative mobile technologies to users and organizations that value productivity and achievement. Learn more: www.blackberry.com. www.blackberry.com For 30 years, Boldon James has been a leader in data classifi cation solutions, helping organisations manage sensitive information securely & in compliance with legislation and standards. www.boldonjames.com Certes protects data in motion. Our CryptoFlow Solutions safeguard sensitive applications over any network with user-aware policies that protect data when fi rewalls can t stop hackers. certesnetworks.com CSG Invotas is an award-winning leader in security orchestration and automation for global security operations, delivering an automated threat response solution to unify, orchestrate and automate key elements of incident response. www.csginvotas.com DenyAll is a European software vendor, an expert in next generation application security, building on 15 years of experience securing web applications and services. www.denyall.com esentire is the leader in Active Threat Protection solutions and services, the most comprehensive way to defend enterprises from advanced and never-before-seen cyber threats. www.esentire.com Imperva is a leading provider of security solutions that protect business-critical data and applications. The company s products enable organizations to discover vulnerabilities, protect information, and comply with regulations. www.imperva.com LogRhythm, a leader in security intelligence and analytics, empowers companies to rapidly detect, respond to and neutralize damaging cyber threats. www.logrhythm.com MetricStream is the market leader for integrated Governance, Risk, and Compliance (GRC) Management Solutions that enable organizations to deliver better business performance. www.metricstream.com Netskope is the leader in safe cloud enablement. With Netskope, IT can protect data and ensure compliance across cloud apps so businesses can move fast, with confi dence. www.netskope.com ObserveIT, a pioneer in User Activity Monitoring, provides video recordings of user activity, analytics and alerting to address user- based attacks. Over 1,200 companies use ObserveIT. Visithttp://www.observeit.com for more information. www.observeit.com Provide secure identity management and single sign-on to any application, whether in the cloud, on-premises or on a mobile device for your employees, partners and customers with Okta. www.okta.com Pirean are recognised leaders in Identity and Access management solutions, delivering industry best practice and expertise through a unique Software, Consulting and Support Services blend. http://pirean.com RedSocks is a Dutch IT security company specialising in detecting and defeating malware in the corporate market. RedSocks supplies the RedSocks Malware Threat Defender (MTD) as a network appliance. www.redsocks.nl As the inventor of the SSH protocol, we have a twenty-year history of leading the market in developing advanced security solutions that enable, monitor, and manage encrypted networks. www.ssh.com Tenable Network Security provides continuous network monitoring to identify vulnerabilities, reduce risk and ensure compliance. Our family of products includes SecurityCenter Continuous View, which provides the most comprehensive and integrated view of network health, and Nessus, the global standard in detecting and assessing network data. www.tenable.com Vectra Networks X-series detection platform continuously monitors traffi c to automatically detect cyber attacks, prioritizing them by greatest risk and enabling organizations to focus resources. www.vectranetworks.com Voltage Security provides end-to-end, data-centric encryption, tokenization and key management solutions that allows companies to seamlessly secure all types of sensitive information wherever it resides. www.voltage.com Secure Mobile Gateway pioneer. Mobile threat prevention and data usage optimization with real-time analytics. On device and in the cloud. Gartner Cool Vendor. www.wandera.com WatchGuard Technologies, Inc. is a global leader of integrated, multi-function business security solutions that intelligently combine industry standard hardware, best-of-breed security features, and policy-based management tools. www.watchguard.com Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior. www.wombatsecurity.com Sponsors correct as of 12 June 2015 Visit gartner.com/eu/security for more information
Gartner Security & Risk Management Summit 2015 14 15 September London, UK gartner.com/eu/security Registration and pricing 3 easy ways to register Web: gartner.com/eu/security Email: emea.registration@gartner.com Telephone: +44 20 8879 2430 Pricing Pricing subject to change early-bird price: 2,150 + UK VAT (offer ends 17 July 2015) Standard price: 2,475 + UK VAT public Sector price: 1,950 + UK VAT Gartner Clients A Gartner ticket covers both days of the Summit. Contact your account manager or email emea.events@gartner.com to register using a ticket. Group Rate discount Maximize learning by participating together in relevant sessions or splitting up to cover more topics, sharing your session take-aways later. Complementary registrations: 1 for every 3 paid registrations 2 for every 5 paid registrations 3 for every 7 paid registrations For more information, email emea.teamsend@gartner.com or contact your Gartner account manager. WHY AttEnD A GARtnER EVEnt? Build a successful strategy Get validation from Gartner analysts Meet with suppliers to support your tactical planning Expand your peer network Innovate and problem-solve with like-minded peers Join the largest, most infl uential network of its kind Grow in your role Get content and solutions that are most relevant to you Lead more effectively and develop your team WHAt MAKEs GARtnER EVEnts unique? Our analysts Analyst-led presentations Analyst one-on-one private meetings Analyst-facilitated roundtables Our research 100% independent and objective Proven and reliable Relevant to your role Venue Park Plaza Westminster Bridge 200 Westminster Bridge Road London, UK SE1 7UT Phone +44 844 415 6780 www.parkplaza.com Gartner Hotel Room Rate Prices start at 175 per night at Park Plaza when using promotional code GART130915 Money-back guarantee If you are not completely satisfi ed with this Gartner conference, please notify us in writing within 15 days of the conference and we will refund 100% of your registration fee. 2015 Gartner, Inc. and/or its affi liates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affi liates. For more information, email info@gartner.com or visit gartner.com.