gartner security & risk management · neil macdonald security strategies and architecture for...

8
Gartner Security & Risk Management Summit 2018 10 – 11 September / London, UK gartner.com/eu/security Save €325 by 13 July 2018 Early-bird discount “I now have a clear insight into the ever changing and complex world of the threat landscape. This conference has given us great concepts to explore and will help us develop a solid security road map.” Security and Risk Leader, 2017 Attendee

Upload: hoangdiep

Post on 21-Aug-2018

228 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Gartner Security & Risk Management · Neil MacDonald Security Strategies and Architecture for Hybrid Data Center Infrastructures Neil McDonald Beyond Detection: 5 Core Security Patterns

Gartner Security & Risk Management Summit 201810 – 11 September / London, UKgartner.com/eu/security

Save €325 by 13 July 2018

Early-bird discount

“I now have a clear insight into the ever changing and complex world of the threat landscape. This conference has given us great concepts to explore and

will help us develop a solid security road map.”

Security and Risk Leader, 2017 Attendee

Page 2: Gartner Security & Risk Management · Neil MacDonald Security Strategies and Architecture for Hybrid Data Center Infrastructures Neil McDonald Beyond Detection: 5 Core Security Patterns

Gartner Security & Risk Management Summit 2018#GartnerSEC2

Securing Digital Business: Adapt. Transform. Scale.

Understand new threats and challenges. Transform your cybersecurity, risk management and compliance strategies. Prepare for emerging technologies.Digital business is bringing new threats and vulnerabilities along with new opportunities. New risks are being created as real and virtual worlds collide and digital ecosystems expand. At Gartner Security & Risk Management Summit 2018, 10 – 11 September, in London, UK, you’ll learn how to:

• Enableasafer use of cloud solutions

• Buildaresilient infrastructure with better attack detection and remediation

• Understandthechanging threat landscape and how it impacts cyber security

• Findanddeveloptherequiredsecurity talent, and optimize the security organization

• Takeaproactiveapproachtorisk management and recovery planning to support business resilience

Join us for the comprehensive security and risk management update you need to enable successful digital business transformation.

•TheOutlookforSecurityTalent

•TheCloudComplianceConundrum

•FiveQuestionsonAIThatCISOsShouldAnswer

•LessonsLearnedintheEquifaxBreachandOtherIncidents

•SoYouWanttoReportonDigitalBusinessRisktotheBoard

•DigitalTransformationRequiresIntegratedRiskManagement

•GDPRtheDayAfter:3Mythsand6KeyCapabilitiesDiscussed

•BeyondDetection:6CoreSecurityPatternstoPreventHighlyEvasiveThreats

•LeveragingaSecurityChampionProgramtoDriveaMoreSecurity-AwareCulture

Some of the new content and sessions

for 2018

Gartner Predicts By 2021, at least one company will publicly acknowledge a $1 billion revenue impact from a business outage resulting from a malware/ransomware attack.

Page 3: Gartner Security & Risk Management · Neil MacDonald Security Strategies and Architecture for Hybrid Data Center Infrastructures Neil McDonald Beyond Detection: 5 Core Security Patterns

Visit gartner.com/eu/security for updates and to register! 3

A Security Trends and Technical Insights Program: Build Trust and Resilience with More Agile Security Get practical methods and longer-term strategies to build a more trusted and resilient environment for digital business, and to support a more-agile-than-ever IT organization. As new business practices change the threat landscape, security programs must evolve without neglecting legacy infrastructure. Learn how to support the new and improve the old.

• Cloudsecurity

• Endpointprotectionplatforms

• Preventinghighlyevasivethreats

• Understandingthethreatlandscape

• ImpactofAIonsecurityandriskmanagement

B RiskandBusinessResilienceProgram:ManageLocalandGlobalRisktoUnderpintheDigitalBusinessTransition Digitalrisksareexpandingasmoredatasourcesandtechnologiesarewovenintothefabricofthebusiness.Learnabouttherisksandcomplexitiesthatyoushouldexpectintransitioningtodigitalbusiness.Anticipatetheunexpectedandworktoestablishadisciplinedapproachofproactiveriskmanagementandrecovery planning to support business resilience.

• BeyondtheGDPR

•Managingcloudcompliance

• Integratedriskmanagement

• Riskassessmentfordigitalbusiness

• Developinganorganizationalresilience program

C ChiefInformationSecurityOfficer(CISO)Program:GovernSecurityandRiskthroughStrongLeadershipandSolidStrategy TheaccelerationtowarddigitalbusinesshaspresentedCISOswithnewchallenges.CISOsmustunderstandbusinessgoals,quicklyidentifyandassessassociatedrisks,andcommunicaterelevantriskstothebusinessinbusinessterms.JoinusfortheCISOprogramandbecomearecognizedbusinessleader,and superstar communicator, facilitator, and problem solver.

• Buildingsecurityawareness

• PreparingforIoTandBlockchain

• Understandingyourappetiteforrisk

• Addressingskilledstaffingshortages

• Developingaleadershipvisionforsecurityandriskmanagement

Created exclusively for CISOs, the Gartner CISO Circle brings together the world’s security and risk leaders to share in thought-leadingdiscussions.TheCISOCircleprovidesanenhancedexperience through exclusive cutting-edge research and networking opportunities. Participants will have the chance to form valuable peer connections, hone their leadership skills, and understand how to best advance business objectives with successful security innovation.

* Application to participate is required. Apply at gartner.com/eu/security

• Reportingrisktotheboard

• Lessonslearnedfromhighprofilebreaches

• Communicatingthevalueofsecurityandriskmanagementinitiatives

HottopicsAgenda Tracks

CISO Circle*

“MyfirstGartnersummitandI’dstronglyrecommend it to anyone. Networking and discussing topics in workshops as wellascoffeebreakswereallusefulinsharing experiences.” Head of Security, Dyson

Forthemostuptoda

te

informationaboutour

agenda,

speakers and sessions please

visitourwebsite

gartner.com/eu/security

Page 4: Gartner Security & Risk Management · Neil MacDonald Security Strategies and Architecture for Hybrid Data Center Infrastructures Neil McDonald Beyond Detection: 5 Core Security Patterns

Gartner Security & Risk Management Summit 2018#GartnerSEC4

Programs at a Glance

Please visit gartner.com/eu/security for full agenda details.

Security Trends and Capabilities Risk and Resilience CISO Track

The State of Cloud Security Jay Heiser

State of Risk Management John Wheeler

Leadership Vision for Security and Risk Management Tom Scholtz

Rethinking Isolation and Hardening as a Foundational Security Strategy Neil MacDonald

Getting Value from Penetration Tests and Red Teams Augusto Barros

Monitor User Activity With Data or Prepare for a Breach Brian Lowans

Why You Must Consider Data Privacy When Building Your IoT Initiative David Anthony Mahdi

Leveraging a Security Champion Program to Drive a More Security-Aware Culture Jeffrey Wheatman

State of the Threat Landscape Pete Shoard

The Evolution of SIEM Technology Toby Bussa

Living with GDPR in a Mobile World Rob Smith

The Cloud Compliance Conundrum Jay Heiser

Top Trends in Security Peter Firstbrook

Seven Principles of a CARTA Approach and Implications for Your Security Organization Neil McDonald

How to Be a Cloud Security Guru Steve Riley

Alexa, Investigate This Incident Agusto Barros

Five Questions on AI That CISOs Should Answer Jeremy D’Hoinne

GDPR the Day After: 3 Myths and 6 Key Capabilities Discussed Nader Henein

Pragmatic Steps for a Successful Security Strategy Rob McMillan

The Outlook for Security Talent Sam Olyae

Office 365 Security: All the Acronyms and Third-Party Solutions Explained Patrick Hevesi

How to Hunt for Security Threats Anton Chuvakin

The Walking Dead: Lay Passwords to Rest Ant Allan

State of Organizational Resilience Roberta Witty and David Gregory

Security Architecture for Digital Business — Best Practices Tom Scholtz

Top 10 Security Projects for Security and Risk Management Organizations Neil MacDonald

Security Strategies and Architecture for Hybrid Data Center Infrastructures Neil McDonald

Beyond Detection: 5 Core Security Patterns to Prevent Highly Evasive Threats Mario de Boer

Forget Next-Gen: Let’s Talk About Endpoint Protection Ian McShane

How Integrated Risk Management Fits Into a Business Risk Solution Stack John Wheeler

What Your Board Wants to Know Rob McMillan

Seven Reasons More CEOs Will Be Fired Over Cybersecurity Breaches and How to Ensure Yours Is Not Next Paul Proctor

CASB = (UEBA + DLP + AAC + TI + TP + SIEM) for SaaS and IaaS Patrick Hevesi

How Midsize Enterprises Can Improve Their Detection and Response Capabilities Toby Bussa

Define Your Mobile Application Security Strategy Dionisio Zumerle

Selecting a Risk Assessment Process for Digital Business Needs Earl Perkins

Know Your Risk Appetite or Fail at Risk Management!Jeffrey Wheatman

What CISOs Need to Know About Blockchain David Anthony Mahdi

Magic Quadrant for Cloud Access Security Brokers Steve Riley

How to Use the New Threat Simulation Tools Anton Chuvakin

The Emergence of Digital Risk Management Elizabeth Kim

The CIO Agenda: A Security Outlook Rob McMillan

Don't Make These 5 Security Policy Writing Mistakes Sam Olyaei

Agenda as of 21 May 2018 and subject to change.

Whenattendingthisevent,pleaserefertotheGartnerEventsmobile app for the most up-to-date session and location information

Plan your experience

Who Should Attend • ChiefInformationSecurityOfficers(CISOs)

• ChiefRiskOfficers,ChiefPrivacyOfficers

• SecurityLeadersandArchitects

• BusinessContinuityandDisaster RecoveryLeaders

Page 5: Gartner Security & Risk Management · Neil MacDonald Security Strategies and Architecture for Hybrid Data Center Infrastructures Neil McDonald Beyond Detection: 5 Core Security Patterns

5

Expert Advice

AsktheAnalystsessions* Attendeeshavetheopportunityto“asktheanalyst”questionsonhottopicsin these small group, interactive Q&A sessions.

Analystone-on-onemeetings* Onecomplimentary30minutemeetingwith Gartner analyst of your choice help youdrillintoyourspecificchallengesandquestions.

Workshops* Small-scaleandinteractive;drilldownonspecifictopicswithahow-tofocus.

* Space is limited and open to end-users only. Preregistration is required.

Peer Perspectives

Meet ups Interactive and self-facilitated small group discussions for end-user attendees to build relationships and gainnewperspectives.JoinaMeetuptoseekpeeradvice,aswellasshareyour own.

CISOCircle** CreatedexclusivelyforCISOs,theGartnerCISOCirclebringstogethertheworld’ssecurityandriskleaderstoshare in thought-leading discussions. TheCISOCircleprovidesanenhancedexperiencethroughexclusivecutting-edgeresearchandnetworkingopportunities.Participantswillhavethe chance to form valuable peer connections,honetheirleadershipskills,and understand how to best advance business objectives with successful security innovation.

End-usercasestudies Learn about recent implementations firsthand,withanopportunityforQ&AswiththeITandbusinessexecutivesleading the initiative.

** Application to participate and prequalification required.

KeynotesGartnerOpeningKeynote:ScalingTrustandResilience—CuttheNoiseandEnableAction Constantchangeinthethreatlandscapeandcompliancerequirementspresentdailychallengesthatcanfeeloverwhelming.Scalingsecuritywhenfacingafast-pacedITinnovationlandscapeinvolveschoices,oftenattheexpenseofbuildingtrustandresilience.Threekeyquestionsdrivestrongdecisionmaking:What’s important, what’s dangerous and what’s real? This session presents scenarios to demonstrate that ruthless prioritization in the answers helps us cut through the noise and enablesactionthatchangesouroutlookfromoverwhelmedto empowered.

Patrick Hevesi Research Director

Ian McShane Research Director

Steve Riley Research Director

OpeningGuestKeynote:LessonsfromHackersontheFutureofCyberSecurity Cybersecurityisnolongeronlyaboutprotectingsecrets.It’saboutourwayoflife:fromautonomouscars,towebcamsandmedical devices, to the manipulation of political campaigns and globalmarkets.Inthiskeynote,cybersecurityexpertKerenElezariwillshedlightonemergingsecuritythreatsandinspireyoutotakeactionwithpracticalideasonhowtomakeadifferenceinyourorganization – and what you can learn from, and how you can workwith,friendlyhackers.Kerenwilldiscussthefutureworkforceand business challenges in this space and how to foster more diversity in cyber security.

Keren Elezari Acclaimed security researcher, author and strategic analyst

ClosingGuestKeynote:DecisionMakingUnderPressure

Pierluigi Collina The World’s Greatest Football Referee

Visit gartner.com/eu/security for updates and to register!

Page 6: Gartner Security & Risk Management · Neil MacDonald Security Strategies and Architecture for Hybrid Data Center Infrastructures Neil McDonald Beyond Detection: 5 Core Security Patterns

Gartner Security & Risk Management Summit 2018#GartnerSEC6

Solution ShowcaseDevelop a “shortlist” of technology providers who can meet your particular needs. Weofferyouexclusiveaccesstosomeoftheworld’sleadingtechnologyandservicesolutionproviders.

Darktrace is the world’s leading AI company for cyber security. Created by mathematicians, the Enterprise Immune System uses machine learning and AI algorithms to detect and respond to cyber-threats across diverse digital environments, including cloud and virtualized networks, IoT and industrial control systems. The technology is self-learning and requires no set-up, identifying threats in real time, including zero-days, insiders and stealthy, silent attackers. Darktrace is headquartered in San Francisco and Cambridge, UK, and has 30 offices worldwide.www.darktrace.com

Forcepoint is the global human-centric cybersecurity company transforming the digital enterprise by continuously adapting security response to the dynamic risk posed by individual users and machines. The Forcepoint Human Point system delivers Risk-Adaptive Protection to continuously ensure trusted use of data and systems. Based in Austin, Texas, Forcepoint protects the human point for thousands of enterprise and government customers in more than 150 countries. www.forcepoint.com

Google Cloud’s platform is designed, built, and operated with security at its core. Companies come to Google Cloud to transform their businesses and achieve goals they never thought possible. Our comprehensive portfolio – from infrastructure to apps to devices – helps enterprises innovate faster, scale smarter, stay secure, and do more with data than ever before.https://cloud.google.com/

As the world’s largest and most trusted cloud delivery platform, Akamai makes it easier for its customers to provide the best and most secure digital experiences on any device, anytime, anywhere. Akamai’s massively distributed platform is unparalleled in scale, giving customers superior performance and threat protection.www.akamai.com

For three decades, F-Secure has driven innovations in cyber security, defending tens of thousands of companies and millions of people. With unsurpassed experience in endpoint protection as well as detection and response, F-Secure shields enterprises and consumers against everything from advanced cyber attacks and data breaches to widespread ransomware infections.www.f-secure.com/en/web/business_global/home

ServiceNow Security Operations is an Enterprise Security Response engine offering incident & vulnerability response, configuration compliance, and threat intelligence. It uses intelligent workflows, automation and orchestration, connected deeply with IT. ServiceNow GRC transforms inefficient processes into a unified GRC program. Through continuous monitoring, prioritization and automation you can identify and respond to business risks in real time. www.servicenow.com

VMware software powers the world’s complex digital infrastructure. The company’s compute, cloud, mobility, networking and security offerings provide a dynamic, efficient digital foundation to over 500,000 customers globally, aided by an ecosystem of 75,000 partners. Headquartered in Palo Alto, California, this year VMware celebrates twenty years of breakthrough innovation. www.vmware.com

HCL’s Cybersecurity & GRC is a dedicated line of business under HCL Technologies. We leverage 20+ years of experience to design and implement industry-tailored solutions to manage cybersecurity & risk for our customers. Our solutions address the overall ecosystem covering end-customers, as well as business partners.www.hcltech.com

Splunk Inc. (NASDAQ: SPLK) turns machine data into answers. Organizations use market-leading Splunk solutions with machine learning to solve their toughest IT, Internet of Things and security challenges. Join millions of passionate users and discover your “aha” moment with Splunk today: www.splunk.com. www.splunk.com

Netskope is the leader in cloud security. We help the world’s largest organizations take advantage of cloud and web without sacrificing security. Our patented Cloud XD technology targets and controls activities across any cloud service or website and customers get 360-degree data and threat protection that works everywhere. We call this smart cloud security.www.netskope.com

The Trustonic Application Protection solution helps enterprises to secure their apps, code, keys and data with best- available on-device protection. Automatically using hardware-backed protection on over 1.5bn devices, or software-based protection on the others. Trustonic embeds hardware-backed security into Android handsets from 9 of the top 10 device manufacturers. www.trustonic.com

OneTrust is a global leader in privacy management software used by more than 1,500 organizations to comply with data privacy regulations, including the EU GDPR. Our integrated platform includes readiness assessments, PIA/DPIA and data mapping automation, EU cookie compliance, subject rights and consent management, incident reporting, and vendor risk management.www.onetrust.com

Trustwave helps businesses fight cybercrime, protect data and reduce security risk. With cloud and managed security services, integrated technologies and a team of security experts, ethical hackers and researchers, Trustwave enables businesses to transform the way they manage their information security and compliance programs. More than three million businesses are enrolled in the Trustwave TrustKeeper® cloud platform, through which Trustwave delivers automated, efficient and cost-effective threat, vulnerability and compliance management. Trustwave is headquartered in Chicago, with customers in 96 countries.www.trustwave.com

Carbon Black is a leading provider of next-generation endpoint security, helping stop the most sophisticated cyber threats through big data and analytics in the cloud. The company serves more than 3,700 customers globally, including 30 of the Fortune 100. Learn more at www.carbonblack.com or Twitter (@CarbonBlack_Inc).www.carbonblack.com

Cybereason gives your company the upper hand by taking an entirely new approach to cybersecurity. The world’s most powerful cybersecurity analytics platform analyzes more data, more deeply, than anyone else to give unprecedented threat visibility. The platform delivers EDR, next-gen antivirus, anti-ransomware, fileless malware protection all powered by an automated AI hunting engine.www.cybereason.com

ESET provides multi-layered IT security solutions to enterprises worldwide. We have been pioneering digital protection since 1987, and protect more than 100 million users globally.www.eset.com/int

Premier

Platinum

Gartner Predicts: By 2020, national authorities in the U.K. and U.S. will have established databases and policies for mandatory capture of information related to breaches.

NTT Security is the specialized security company and the center of excellence in security for NTT Group. With embedded security we enable NTT Group companies (Dimension Data, NTT Communications and NTT DATA) to deliver resilient business solutions for clients’ digital transformation needs. NTT Security has 10 SOCs, seven R&D centers, over 1,500 security experts and handles hundreds of thousands of security incidents annually across six continents. NTT Security ensures that resources are used effectively by delivering the right mix of Managed Security Services, Security Consulting Services and Security Technology for NTT Group companies – making best use of local resources and leveraging our global capabilities. NTT Security is part of the NTT Group (Nippon Telegraph and Telephone Corporation), one of the largest ICT companies in the world. www.nttsecurity.com

Page 7: Gartner Security & Risk Management · Neil MacDonald Security Strategies and Architecture for Hybrid Data Center Infrastructures Neil McDonald Beyond Detection: 5 Core Security Patterns

Visit gartner.com/eu/security for updates and to register! 7

Sponsorship opportunitiesForfurtherinformationaboutsponsoringthisevent: Telephone:+44 1784 267456 / Email:[email protected]

Exhibitor list as of 21 May 2018 and subject to change

SecurityScorecard is an ecosystem risk management solution that enables security professionals to instantly rate and understand the security risk of any company. The platform identifies vulnerabilities, active exploits, and advanced threats in your vendor and partner ecosystem as well as your own IT infrastructure.https://securityscorecard.com/

Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, helps businesses, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Symantec operates one of the world’s largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visit www.symantec.com or connect with us on Facebook, Twitter, and LinkedIn. www.symantec.com

Trend Micro Incorporated, a global leader in cybersecurity solutions, helps to make the world safe for exchanging digital information. Our innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud environments, networks, and endpoints. With over 5,000 employees in over 50 countries and the world’s most advanced global threat intelligence, Trend Micro enables organizations to secure their journey to the cloud.www.trendmicro.com

Vectra® is transforming cybersecurity with AI. Its Cognito™ platform automates cyberattack detection and response from data centre and cloud workloads to user and IoT devices. Cognito performs real-time attack hunting by analysing rich metadata from network traffic, relevant logs and cloud events to detect attacker behaviours. Cognito correlates threats, prioritises hosts based on risk and provides rich context to empower response with existing endpoint, NAC and firewall security, reducing security operations workload by 32X.www.vectra.ai

Discovery, mapping and remediation of data privacy risk in unstructured data, at scale, for GDPR and other regulatory compliance and in response to data breach. www.activenavigation.com

KnowBe4 is the world’s largest integrated platform for security awareness training and simulated phishing. Creating a human firewall as an effective last line of defense. www.KnowBe4.com

CrowdStrike cloud-delivered next-generation endpoint protection, managed hunting and cyber intelligence services offer protection and visibility into threats you had no idea were there.www.crowdstrike.com

SAI Global helps organizations proactively manage risk to create trust and achieve business excellence, growth, and sustainability. Our integrated risk management solutions operate across the entire risk lifecycle allowing businesses to focus elsewhere.www.saiglobal.com

Wombat Security provides information security awareness and training software to help organizations teach their employees secure behavior. www.wombatsecurity.com

Avecto is a leader in Privilege Elevation and Delegation Management and has enabled over 8 million users across many of the world’s biggest brands to successfully work without admin rights and achieve the balance between overlocked and underlocked environments. www.avecto.com

Unified simplicity in a complex world. Unified SIEM solution for cybersecurity, compliance and IT operations in one simple deployment.www.logpoint.com

Flexera enables prioritization and optimization of processes for managing software vulnerabilities to mitigate exposures, before the likelihood of exploitation increases. Flexera protects businesses by closing the risk window. www.flexera.com

Saviynt is a leading provider of Identity Governance & Administration (IGA) and Cloud Security solutions. Saviynt enables enterprises to secure applications, data and infrastructure in a single platform for Cloud and Enterprise applications. www.saviynt.com

Yubico sets new global standards for simple and secure access to computers, servers, and internet accounts. www.yubico.com

Bitglass the Next-Gen CASB company is based in Silicon Valley. The company’s solutions deliver zero-day, agentless, data and threat protection for any app, any device, anywhere. Bitglass is backed by Tier 1 investors and was founded in 2013 by industry veterans with a track record of innovation.www.bitglass.com

McAfee is the device-to-cloud cybersecurity company. Inspired by the power of working together, McAfee creates business and consumer solutions that make our world a safer place.www.mcafee.com

Gigamon is the company driving the convergence of networking and security. We provide a new way of approaching security – of making threats visible, deploying resources faster and maximizing the performance of your network and your security tools. www.gigamon.com

SureCloud provides Governance, Risk & Compliance (GRC) applications and Cybersecurity services that give our customers certainty – of risk management/compliance, of cybersecurity, of having answers today and tomorrow. www.surecloud.com

comforte is a leading provider of data tokenization & encryption and enables organizations around the world to keep their sensitive data secure and protected. www.comforte.com

The leading Insider Threat Management solution with 1,700+ global customers across all major verticals, ObserveIT is the only solution that empowers security teams to detect insider threats, streamline investigations, and prevent data exfiltration. observeIT.com

Integrity delivers worldwide innovative Persistent PenTesting and Governance, Risk and Compliance Solutions to enable clients to limit cyber risk exposure through cost-effective prevention.www.integrity.pt

Varonis is a pioneer in data security and analytics, specializing in software for data security, governance, compliance, classification, and threat analytics. www.varonis.com

Premier

Platinum Silver

Page 8: Gartner Security & Risk Management · Neil MacDonald Security Strategies and Architecture for Hybrid Data Center Infrastructures Neil McDonald Beyond Detection: 5 Core Security Patterns

Summit venue

InterContinentalLondon—TheO2 London,UK.

Phone:+442037405411

©2018Gartner,Inc.and/oritsaffiliates.Allrightsreserved.GartnerisaregisteredtrademarkofGartner,Inc.oritsaffiliates.Formoreinformation,[email protected].

Terms and conditions To view our Gartner events terms and conditions, visit gartner.com/eu/security

Gartner Security & Risk Management Summit 201810–11September / London,U.K. / gartner.com/eu/security

Pricing & RegistrationEarly-bird discount Early-birdprice:€2,375+U.K.VAT

Save€325whenyouregisterby13July

Standardprice:€2,700+U.K.VAT

Publicsectorprice:€2,125+U.K.VAT

3 ways to register Web: gartner.com/eu/security

Email: [email protected]

Phone: +442038685238

Gartner clients AGartnerticketcoversbothdaysoftheSummit.ContactyourAccountManageror email [email protected].

Bring your team!Maximizelearningbyparticipatingtogetherinrelevantsessionsorsplittinguptocovermoreground,sharingyoursessiontake-awayslater.

SummitTeamDiscountOffers:

•4forthepriceof3

•7forthepriceof5

•10forthepriceof7

Formoreinformation,emailGartnerGlobalEvents@gartner.comorcontactyourGartnerAccountManager.

Gartner Predicts By 2022, cybersecurity ratings will

become as important as credit ratings when assessing the risk of

business relationships

Joinanexclusivenetwork–Register now and join!

TheCISOCircleprovideschiefinformation security officers (CISOs) and

other senior-level executives attending the Summit an enhanced experience through exclusive sessions. Participants have the chance to form valuable peer connections, hone their leadership skills and understand how to best advance businessobjectiveswithsuccessfulITinnovation.

CISO Circle highlights

• CISO-onlysessions

• Exclusivenetworkinglunch

• Prioritybookingfor1on1sandlimitedattendancesessions

Discussion topics include: • Lessonslearnedfromhighprofilebreaches

• ReportingonDigitalBusinessRisktotheBoard

• Howtobettercommunicatethevalueofyoursecurityandriskmanagementinitiatives

•WritingITRiskandCybersecurityServiceDescriptionsWithBusiness-CentricValueStatements

Join the CISO CircleTojointheCISOCircle,simplysubmityourapplicationwhenyouregistertoattendtheGartnerSecurity&RiskManagementSummit.Membershipislimited,sobesuretosecureyourplace as soon as possible.

(Exclusive to end-user organizations only. Vendors of IT security products and services cannot attend).

CISO Circle*