inside fron t monday 19 august - gartner...scam since the ponzi scheme) john girard, gartner...
TRANSCRIPT
INSID
E BACK: 148M
MIN
SIDE FRO
NT: 148M
MIN
SIDE BA
CK COVER: 146M
M
AGENDA AT A GLANCE End-Users Only/Pre-Registration Required
Focus: TacticalStrategic Maturity Level: Foundational Advanced
Financial ServicesFSIndustry: Public SectorPS HealthcareH
Perspective: Business Technical
MONDAY 19 AUGUST
TUESDAY 20 AUGUST
07:30 – 09:30 Refreshments on Arrival Location: Solution Showcase, Level 3
07:30 – 18:00 Registration Location: Level 3
08:30 – 09:15 Pre-Summit Tutorial Sessions:
T1: Tutorial: Big Data Discovery Using Content-Aware Data Loss Prevention (DLP) Solutions
Rob McMillan, GartnerLocation: Room 1, Level 4
T2: Tutorial: How to Create Emergency Messages That Won’t Be Ignored — Best and Worst PracticesRoberta Witty, GartnerLocation: Room 5, Level 4
T3: Tutorial: Top Security Trends and Takeaways for 2013 and 2014
John Wheeler, GartnerLocation: Grand Ballroom B, Level 3
FS PS H
09:30 – 10:30 P1a: Gartner Keynote: Reset Christian Byrnes, Paul Proctor, John Wheeler and Rob McMillan, rentraG Location: Grand Ballroom A, Level 3 FS PS H
10:30 – 10:45 P1b: Summit Chair Welcome Rob McMillan, rentraG Location: Grand Ballroom A, Level 3
10:45 – 11:15 P2: Industry Panel Discussion: IT Security and the Nexus of Forces – Impact and Exploits Rob Roe, AirWatch; Glenn Welby, Cisco and Andrzej Kawalec, HP Moderated by: Mark Nicolett, rentraG Location: Grand Ballroom A, Level 3
11:15 – 11:45 Refreshment Break in the Solution Showcase Location: Solution Showcase, Level 3
11:45 – 12:15 Gartner Track, Ask the Analyst and Workshop Sessions: 11:45 – 13:15
1 Chief Information Security Offi cer (CISO) Program — Leadership in Motion
2 Risk Management and Compliance Program 3 IT Security Program —
Technology and OperationsAnalyst-User Roundtable Workshop
A1: To the Point: Cyber Security for the Internet of Everything Christian Byrnes, GartnerLocation: Grand Ballroom A, Level 3
FS
B1: To the Point: The Risk Management Maturity PathwayRob McMillan, GartnerLocation: Grand Ballroom B, Level 3
C1: To the Point: Predictions — Your Network Security in 2018Mark Nicolett, GartnerLocation: Room 1, Level 4
FS
ATA1: Ask the Analyst: Extending Security and Identity from MDM to Mobile Apps Song Chuang, GartnerLocation: Room 3, Level 4
W1: Workshop: Information Security Architecture 101
Tom Scholtz, GartnerLocation: Room 5, Level 4
12:30 – 13:15 Gartner Track and Analyst-User Roundtable Sessions: 12:30 – 13:15
A2: Transform Your Security and Risk Program or Find Another Job
Paul Proctor, GartnerLocation: Grand Ballroom A, Level 3
B2: Top 10 Security Myths
Jay Heiser, GartnerLocation: Grand Ballroom B, Level 3
FS
C2: CyberSecurity! (The Biggest Scam Since The Ponzi Scheme)
John Girard, GartnerLocation: Room 1, Level 4
FS
AUR1: Roundtable: Business Continuity Management (BCM Metrics — What Works, What Doesn’t Roberta Witty, GartnerLocation: Room 3, Level 4
PS H
13:15 – 14:30 Lunch in the Solution Showcase Location: Solution Showcase, Level 3 13:15 – 14:30 Exclusive Elite Lunch (By invitation Only) Location: Room 4, Level 4
13:30 – 13:45 MQ1: Magic Quadrant: Security Information and Event Management Mark Nicolett, Gartner Location: Theater Solution Showcase, Level 3
14:30 – 15:15 Gartner Track, Analyst-User Roundtable and Workshop Sessions: 14:30 – 15:15 14:30 – 16:00
A3: Transform Your Security Program — From Control-Centric to People-Centric Tom Scholtz, GartnerLocation: Grand Ballroom A, Level 3
FS
B3: Why ERM and GRC Depend on Each Other to Succeed
John Wheeler, GartnerLocation: Grand Ballroom B, Level 3
C3: Cost, Consequence and Value — The Economics of IAM
Gregg Kreizman, GartnerLocation: Room 1, Level 4
FS
AUR2: Roundtable: Reporting to the Board: What Do You Tell Them? What Works, What Doesn’t? Christian Byrnes, GartnerLocation: Room 3, Level 4
PS H
W2: Workshop: Cloud Contracts — Develop Your Own Security and Risk Exhibits
Gayla Sullivan, GartnerLocation: Room 5, Level 4
FS PS H
15:30 – 16:00 Solution Provider Sessions and Ask the Analyst Session: 15:30 – 16:00
SPS1: Airwatch: How to Manage the Evolution of BYOD Through Secure Mobility Rob Roe, AirWatch Location: Grand Ballroom A, Level 3
SPS2: Cisco Systems Australia Pty Ltd: TOMORROW Starts Here Gary Hale, Cisco Location: Grand Ballroom B, Level 3
SPS3: Pirean Solution Provider SessionFor speaker details visit Agenda Builder.Location: Room 1, Level 4
AUR3: Ask the Analyst: Strategies for Mitigating Advanced Persistent Threats and Targeted Attacks John Girard, GartnerLocation: Room 3, Level 4
16:00 – 16:30 Refreshment Break in the Solution Showcase Location: Level 3
16:30 – 17:15 Case Study Presentation, Gartner Track and Analyst-User Roundtable Sessions: 16:30 – 17:15
A4: Case Study: How a Security Program Encourages User Engagement and Grows Business Craig Davies, CochlearLocation: Grand Ballroom B, Level 3
B4: CyberInsurance — Evolution or Revolution?Christian Byrnes, John Wheeler and Paul Proctor, GartnerLocation: Grand Ballroom A, Level 3
FS
C4: Security Monitoring for Early Breach Detection
Mark Nicolett, GartnerLocation: Room 1, Level 4
FS
AUR4: Roundtable: Strategies for a More Effective Vendor Relationship Gayla Sullivan, GartnerLocation: Room 3, Level 4
PS H
17:15 – 18:00 P3: Guest Keynote: Closing the Gap — Security Privacy Malcolm Crompton, Information Integration Solutions Pty Ltd Location: Grand Ballroom A, Level 3
18:00 – 19:30 Networking Reception in the Solution Showcase Location: Level 3
07:30 – 08:30 Exclusive Breakfast for Public Sector: Cloud Risk Management Jay Heiser, Gartner Location: Room 6, Level 2 H
Exclusive Breakfast for Financial Services: Strategic Road Map for Financial Services Enterprise Risk Management John Wheeler, Gartner Location: Room 3, Level 4
08:00 – 08:45 Refreshments on Arrival Location: Solution Showcase, Level 3
08:00 – 17:00 Registration Location: Level 3
08:45 – 09:15 Gartner Track and Workshop Sessions: 08:30 – 10:00
1 Chief Information Security Offi cer (CISO) Program — Leadership in Motion
2 Risk Management and Compliance Program 3 IT Security Program —
Technology and OperationsWorkshops
A5: To the Point: The Information Security Maturity Pathway Jay Heiser, GartnerLocation: Grand Ballroom A, Level 3
PS H
B5: To the Point: Managing Global Recovery and Continuity RiskRoberta Witty, GartnerLocation: Grand Ballroom B, Level 3
C5: To the Point: Securing the OT EnvironmentChristian Byrnes, GartnerLocation: Room 1, Level 4
FS
W3: Workshop: Build an Effective Security and Risk Program
Tom Scholtz, GartnerLocation: Room 5, Level 4
W4: Workshop: Supplier Contingency Planning: What You Need to Know for Supplier Recovery
Gayla Sullivan, GartnerLocation: Room 4, Level 4
09:30 – 10:00 Solution Provider Sessions
SPS4: HP: Criminal Education: Lessons from the Criminals and Their Methods
Andrzej Kawalec, Hewlett-Packard Location: Grand Ballroom A, Level 3
SPS5: Symantec: How to Manage and Monitor New Threats Whilst Meeting Compliance Requirements
Peter Sparkes, Symantec Location: Grand Ballroom B, Level 3
SPS6: RSA, The Security Division of EMC: IT GRC: Breaking The Boundaries Between Technology and Business Matt Chantrell, RSA, The Security Division of EMC Location: Room 1, Level 4
10:00 – 10:30 Refreshment Break in the Solution Showcase
10:10 – 10:25 MQ2: Magic Quadrant: Data Loss Prevention Rob McMillan, Gartner Location: Theater, Solution Showcase, Level 3
10:30 – 11:15 Gartner Track, Case Study Presentation, Analyst-User Roundtable and Workshop Sessions: 10:30 – 11:15 10:30 – 12:00
A6: That Frightening Phrase: “The Standard of Due Care”
Rob McMillan, GartnerLocation: Grand Ballroom A, Level 3
FS
B6: Case Study Presentation: The Mobile Banking Balancing Act — Balancing Risk and Security with User ExperienceBen Issa, ING BankLocation: Grand Ballroom B, Level 3
FS PS H
C6: Your Cloud and Mobile Devices Broke My IAM
Gregg Kreizman, GartnerLocation: Room 1, Level 4
FS PS H
AUR5: Roundtable: People Centric Security: the What, the Who, the Why and the How
Tom Scholtz, GartnerLocation: Room 3, Level 4
W5: Workshop: Security Monitoring of Cloud Workloads
Mark Nicolett, GartnerLocation: Room 5, Level 4
11:30 – 12:00 Solution Provider Sessions and Ask the Analyst Session: 11:30 – 12:00
SPS7: Good Technology: Tackling Mobility Challenges in the Real Business World Johan Sulaiman, L.E.K Consulting Ken Gosselin, Good TechnologyLocation: Grand Ballroom A, Level 3
SPS8: Sourcefi re: The Case for Retrospective Security
Oliver Friedrichs, Sourcefi re Location: Grand Ballroom B, Level 3
SPS9: TrustSphere: Using Social Network Analytics to Detect and Decode Internal Fraud
Manish Goel, TrustSphere Location: Room 1, Level 4
AUR6: Ask the Analyst: Your Next Security Strategy — How Will You Develop It and What Will It Contain? Christian Byrnes, GartnerLocation: Room 3, Level 4
FS PS H
12:00 – 13:15 Lunch in the Solution Showcase Location: Level 3
12:30 – 12:45 MQ3: Magic Quadrant: Endpoint Protection Platforms John Girard, Gartner Location: Theater, Solution Showcase, Level 3
13:15 – 14:00 Gartner Track, Case Study Presentations, Analyst-User Roundtable and Workshop Sessions: 13:15 – 14:00 13:30 – 15:00
A7: Organizing for Success — Developing Process-Centric Security Teams Tom Scholtz, GartnerLocation: Room 1, Level 4
B7: Linking Risk to Business Decision Making — Creating KRIs That MatterPaul Proctor, GartnerLocation: Grand Ballroom B, Level 3
FS PS H
C7: Case Study: An Entreprise Mobility StrategyEric Cowperthwaite, Providence Health & ServicesLocation: Grand Ballroom A, Level 3
FS
AUR7: Roundtable: Biggest Challenges in Implementing Effective IT Governance Christian Byrnes, GartnerLocation: Room 3, Level 4
W6: Workshop: ITScore for Privacy
John Wheeler, GartnerLocation: Room 5, Level 4
14:15 – 15:00 Gartner Track and Analyst-User Roundtable Sessions: 14:15 – 15:00
A8: Using Outside Resources — Security Consultants and Threat Intelligence Services
Rob McMillan, GartnerLocation: Grand Ballroom A, Level 3
B8: Practicing Safe SaaS
Jay Heiser, GartnerLocation: Grand Ballroom B, Level 3
FS
C8: Endpoint Security — When the Consumer Is King
Song Chuang, GartnerLocation: Room 1, Level 4
PS H
AUR8: Roundtable: Government Identity — Providing Constituents With Secure Access To Government Services Gregg Kreizman, GartnerLocation: Room 3, Level 4
PS H
15:00 – 15:30 Refreshment Break in the Solution Showcase Location: Level 3
15:10 – 15:25 MQ4: Magic Quadrant: Secure Web Gateways John Girard, Gartner Location: Theater, Solution Showcase, Level 3
15:30 – 16:15 P4: Guest Keynote: Enterprise Security —Achieving Value & Relevance Eric Cowperthwaite, Providence Health & Services Moderated by: Paul Proctor, rentraG Location: Grand Ballroom A, Level 3 FS PS H
16:15 – 17:00 P5: Gartner Keynote: The Gartner Five-Year Security and Risk Scenario Christian Byrnes and Rob McMillan, Gartner Location: Grand Ballroom A, Level 3 H
17:00 – 17:15 P6: Summit Chair Closing Remarks Rob McMillan, rentraG Location: Grand Ballroom A, Level 3