Sei sulla pagina 1di 8

EARLY-BIRD

DIscount

save €325 by 17 July

EARLY-BIRD DIscount save €325 by 17 July Gartner Security & Risk Management Summit 2015 14 –

Gartner Security & Risk Management Summit 2015

14 – 15 September | London, UK | gartner.com/eu/security

The World’s Most Important Gathering for Security and Risk Executives

Five Programs

• Chief Information Security Officer (CISO)

• Risk Management and Compliance

• Security Manager Program: Technology, Trends and Operations

• Business Continuity Management

• Internet of Things Security

Manager Program: Technology, Trends and Operations • Business Continuity Management • Internet of Things Security
Manager Program: Technology, Trends and Operations • Business Continuity Management • Internet of Things Security

Manage Risk and Deliver Security in a Digital World

Craft your strategy for business resiliency

Get the tools you need to deliver secure digital business environments and ensure your organization can weather an attack or disruption and bounce back quickly at Gartner Security & Risk Management Summit 2015, 14 – 15 September, London, UK. This year’s conference covers the breadth of priorities in IT security, risk management, governance, compliance, BCM, the role of the CISO, the business of security, privacy, IAM and more.

Join us this September to find out how you can advance your security and risk goals to support business objectives and improve resilience across the organization.

Key benefits of attending

• Gain tools and strategies to stay ahead of your new responsibilities and increasing threats

• Align security and risk strategies with your enterprise objectives and digital transformation

• Assure compliance with new regulatory, compliance, privacy and e-discovery requirements

• Apply the latest techniques to tackle risks in cloud, OT and IoT

• Build a culture that drives security performance through employee engagement

that drives security performance through employee engagement Visit gartner.com/eu/security for more information Who will

Visit gartner.com/eu/security for more information

Who will be there?

• Chief Information Security Officers

• Chief Risk Officers

• Chief Information Officers

• IT Vice Presidents/Directors

• IT Security Officers/Directors

• Risk, Compliance and Privacy Managers

• Information Security/Risk Managers

• Network, Infrastructure, Solutions and Security Architects

and Privacy Managers • Information Security/Risk Managers • Network, Infrastructure, Solutions and Security Architects

Reevaluate your security and risk strategies and investments for the digital age

Digital business technologies and the Internet of Things are creating new threats and risks even as regulatory compliance and legal risks continue to escalate, and sophisticated cyber threats challenge even the best security strategies. Every business is now a digital business, and every business must become proficient at risk assessment and mitigation, the foundation of success in the digital age.

This year’s summit delivers the latest research and recommendations across security and risk management priorities, and provides you with solutions to the latest hot topics, including:

• Application, network and infrastructure security

• Cloud security

• Mobile security

• Cybersecurity

• Digital business security and risk management

• Operational technology (OT) security and risk management

• Organizational resilience through BCM

• Risk management and compliance

• Security Awareness and Training

The intersection of IT, operational technology and the Internet of Things is spawning a new generation of threats. Join us for the latest strategies to help you anticipate risk, mitigate its impact and enable successful business outcomes.

What’s new for 2015

• Revamped agenda featuring new content, and covering key challenges such as applications, network and mobile security; security for the cloud; digital business security, risk management and privacy and EU regulations

• First ever presentation of Magic Quadrant for operational risk management

• Industry-orientated content, especially around financial services, banking and insurance

• Focused sessions on crisis and incident management

• Content tailored for small and medium businesses

• Expanded opportunity to network with your peers with networking lunches and drinks receptions available

businesses • Expanded opportunity to network with your peers with networking lunches and drinks receptions available
with networking lunches and drinks receptions available #gartnersecurity Gartner Security & Risk Management
with networking lunches and drinks receptions available #gartnersecurity Gartner Security & Risk Management
with networking lunches and drinks receptions available #gartnersecurity Gartner Security & Risk Management

#gartnersecurity

Gartner Security & Risk Management Summit 2015

Agenda at a Glance

Monday

14 September 2015

07:30 – 20:00 Registration and Information

08:00 – 08:45 Tutorial: Top Trends and Takeways for Cybersecurity Earl Perkins

09:00 – 10:00

Summit Chair Welcome and Gartner Keynote: manage risk and Deliver Security in a Digital World

Ant Allan, Peter Firstbrook and Dionisio Zumerle

10:00 – 10:30 Industry Panel

10:30 – 11:00 Refreshment Break in the Solution Showcase

11:00 – 12:00 Guest Keynote to be confirmed shortly

12:00 – 13:15 Lunch in the Solution Showcase

TRAcks

TRAcks A. chief Information security Officer (cIsO) Program B. Risk Management and compliance Program

A. chief Information security Officer (cIsO) Program

TRAcks A. chief Information security Officer (cIsO) Program B. Risk Management and compliance Program

B. Risk Management and compliance Program

13:15 – 14:00 The New CISO's Crucial First 100 Days Tom scholtz

 

A

Public Cloud Risk Model: Accepting Cloud

Risk is OK, Ignoring Cloud Risk is Tragic Paul Proctor

14:15 – 14:45 Solution Provider Sessions

Paul Proctor 14:15 – 14:45 Solution Provider Sessions c. security Manager Program: Technology, Tr Defensive

c. security Manager Program: Technology, Tr

Defensive Strategies in an Age of Digital

Insurgency

Oliver Rochford

14:45 – 15:15 Refreshment Break in the Solution Showcase

 

The Path to High Impact Security

15:15 – 16:00 Be Agile Not Fragile: Use Threat Intelligence Services to Defend Yourself Rob McMillan

Awareness

christian Byrnes

16:15 – 16:45 Solution Provider Sessions

17:00 – 17:30 Protecting Your House on the Prairie: Security Strategy for the Smaller Enterprise Tom scholtz

Incident Response Platforms —

A

Long Time Coming Rob McMillan

17:30 – 20:00 Networking Reception in the Solution Showcase

Mobile Security Threats and Trends

2015 Dionisio Zumerle

Your Cloud Service Adoption Strategy Must

Include Data Protection Brian Lowans

Tuesday

15 September 2015

07:45 – 17:15 Registration and Information

08:00 – 08:45 People-Centric Security: Experiences and Lessons Learnt Tom scholtz

 

09:00 – 09:45 Case Study

What's New and Hot in GRC? John Wheeler

09:45 – 10:15 Refreshment Break in the Solution Showcase

How to Get Single Sign On Ant Allan

Future of Endpoint Management Rob smith

10:15 – 10:45 Solution Provider Sessions

11:00 – 11:45 Case Study

Use a Vendor Risk Management Framework to Mitigate Regulatory, Compliance, Security and Performance Issues Gayla sullivan

11:45 – 13:00 Lunch in the Solution Showcase

 

Digital Business and Your New Relationship with

13:00 – 13:45 Avoid Five Security Staffing Disasters Jeremy D’Hoinne

Risk

Paul Proctor

14:00 – 14:30 Chief Data Officers and Chief Information Security Officers: Friends or Foes? Debra Logan

What Can We Expect from the Upcoming EU Data Protection Regulation? carsten casper

14:30 – 15:00 Refreshment Break in the Solution Showcase

Panel: Mobile Security and Management: A Real World Discussion Rob smith et al.

12:30 – 12:50 Magic Quadrant for Enterprise Net

What Role Will VPNs Play in Your Business

Future?

John Girard

Lessons Learned on Advanced Threat Defense Strategies and Tools Jeremy D’Hoinne

15:00 – 15:30 Case Study

15:45 – 16:15 One Simple Way to Get Your CEO to Embrace Risk Management John Wheeler

15:00 – 15:30 Case Study 15:45 – 16:15 One Simple Way to Get Your CEO to
15:00 – 15:30 Case Study 15:45 – 16:15 One Simple Way to Get Your CEO to

How To Build A Globally Legal and Successful BYOD Program John Girard

Assessing Cloud Service Providers: Getting Beyond the Checklists Erik Heidt

16:30 – 17:15

Gartner Closing Keynote and Summit Chair Closing remarks: Cybersecurity Scenario 2020: the Impact of Digital business on Security

Neil

Gartner Security & Risk Management Summit 2015

2020: the Impact of Digital business on Security Neil Gartner Security & Risk Management Summit 2015

#gartnersecurity

Agenda as of 19 June 2015

During the event, please refer to the printed Agenda or the Gartner Events mobile app for complete, up to the minute session information.

Tutorial: Best Practices in Crisis Communications Roberta Witty

10:35 – 10:55 Magic Quadrant for Security Information and Event Management Oliver Rochford

ends and Operations

Gartner's Adaptive Security Architecture: New Approaches for Advanced and Insider Threats Neil MacDonald

Securing Sensitive SaaS Using Cloud Access

Security Brokers Ramon krikken

The Dark Side of Payment Card

Security

Jonathan care

 

12:15 – 12:35 Magic Quadrant for Operational Risk Management John Wheeler

 
for Operational Risk Management John Wheeler     D. Business continuity Management Program and
for Operational Risk Management John Wheeler     D. Business continuity Management Program and
for Operational Risk Management John Wheeler     D. Business continuity Management Program and
 

D. Business continuity Management Program and

 

Workshops and contract Negotiation clinics

Roundtables

E. Internet of Things security Program

 
 

The Availability Implications for Digital Business Roberta Witty

 

12:45 – 14:15

Workshop:

13:15 – 14:15 Roundtable:

Get Incident-Ready. Test Your Plan with a Scenario Rob McMillan

Reduce The Risks and Implement Data Access Controls Now! Brian Lowans

   

14:30 – 16:00

Workshop:

 
 

Get Security Right in an SMB Environment Rob McMillan

 
 

Case Study

 

15:15 – 16:15 Roundtable:

 

Changing Your Security Culture:

Why Change is Hard and What to Do

About It

Debra Logan

   

16:15 – 17:45

Workshop:

16:30 – 17:30 Roundtable:

 

Why Crisis Management is the Heart of BCM Software Roberta Witty

Secure Self-Assessing and Self- Cleansing Systems with DevOps? Joerg Fritsch

Managing the Identity of Things Ant Allan

Defending Endpoints from the Persistent Attack Peter Firstbrook

Defending Against Sophisticated Malware Mario de Boer

Privacy and the Internet of Things: How to Avoid Crossing the Creepy Line carsten casper

08:00 – 09:30 Contract Negotiating Clinic: Cloud Contracts, Develop Your Own Security and Risk

08:00 – 09:00 Roundtable:

Do you Measure the Impact of Your Awareness Program? christian Byrnes

Balancing Trust and User Experience for User Authentication Ant Allan

Exhibits

Gayla sullivan

 

Designing the Modern Application Security Perimeter — With Mobile and Cloud in Mind Ramon krikken

Cybersecurity Panel: IT Security, OT Security, IoT Security: Impacts and Recommendations Earl Perkins et al.

10:45 – 12:15

Workshop:

10:45 – 11:45 Roundtable:

Introduction to Mobile Security

Building Successful Business Metrics for Technology Risk Paul Proctor

Self-Assessments John Girard and Dionisio Zumerle

 

work Firewalls

Jeremy D’Hoinne

   

Secure Use of AWS and Azure: Comparison and Best Practices Neil MacDonald

Operational Technology Security is Not Just for Industries Anymore Earl Perkins

13:00 – 14:30

Workshop:

13:00 – 14:00 Roundtable:

Identity Proofing Revisited as Data

Why Social Media Risks Are Skyrocketing and What You Can Do to Protect Your Company John Wheeler

   

Privacy Dies

Jonathan care

Protecting Mobile Apps Dionisio Zumerle

Case Study

   
 

14:45 – 16:15

Workshop:

 

Friends at the Gate? Best Practices for Enabling Remote Privileged Access From Vendors and

The Legality and Ethics of IoT and Employee Monitoring TBD

Reporting Risk and Security to your Board of Directors Paul Proctor

15:00 – 16:00 Roundtable:

Secure Use of Public Cloud Neil MacDonald

Third Parties

Felix Gaehtgens

What Your Containers do Not Contain! About the Security Properties of Containers Managed by

Women in Security and Risk Management:

Do Women Approach Security and Risk Management Differently Than Men? Roberta Witty

 

Docker

Joerg Fritsch

MacDonald

Visit gartner.com/eu/security for more information

Solution Showcase

Develop a “shortlist” of technology and service providers who can meet your particular needs. We offer you exclusive access to some of the world’s leading technology and service solution providers in a variety of settings.

Premier Sponsor

solution providers in a variety of settings. Premier Sponsor As a global leader in IT security,

As a global leader in IT security, Trend Micro develops innovative security solutions that make the world safe for businesses and consumers to exchange digital information. With over 25 years of security expertise, we’re recognized as the market leader in server security, cloud security, and small business content security. Our security is powered by Trend Micro™ Smart Protection Network™ global threat intelligence and is supported by over 1,200 security experts around the world.

www.trendmicro.co.uk

Sponsorship Opportunities

the world. www.trendmicro.co.uk Sponsorship Opportunities For further information about sponsoring this event:

For further information about sponsoring this event:

Telephone: +44 1784 267456

Email: european.exhibits@gartner.com

Platinum Sponsors

Email: european.exhibits@gartner.com Platinum Sponsors AirWatch by VMware is the leader in enterprise mobility

AirWatch by VMware is the leader in enterprise mobility management (EMM). We enable end users with a seamless digital workspace, and empower IT with a future-proof mobility platform that provides flexibility to manage multiple use cases, unified management of endpoints, end-to-end security, and seamless integration across enterprise systems.

www.air-watch.com

integration across enterprise systems. www.air-watch.com Qualys (www.qualys.com) is a pioneer and leading provider of

Qualys (www.qualys.com) is a pioneer and leading provider of cloud security and compliance solutions with over 7,700 customers in more than 100 countries. The Qualys Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance, delivering critical security intelligence on demand.

www.qualys.com

Darktrace is a fast-growing cyber threat defense company and world leader in Enterprise Immune System technology. Darktrace’s award-winning solution is powered by machine learning and mathematics developed at the University of Cambridge, and helping organizations defend against advanced cyber-attacks and insider threat by detecting previously- unidentified anomalies in real time.

www.darktrace.com

unidentified anomalies in real time. www. darktrace.com Splunk Inc. provides the leading platform for Operational

Splunk Inc. provides the leading platform for Operational Intelligence. Splunk ® software searches, monitors, analyzes and visualizes machine-generated big data from websites, applications, servers, networks, sensors and mobile devices. More than 8,400 organizations use Splunk software to deepen business and customer understanding, mitigate cybersecurity risk, improve service performance and reduce costs.

www.splunk.com

improve service performance and reduce costs. www.splunk.com Fortinet is a worldwide provider of network security

Fortinet is a worldwide provider of network security appliances and a market leader in Network Security. Our products and subscription services provide broad, integrated and high-performance protection against dynamic security threats while simplifying the IT security infrastructure. Our customers include enterprises, service providers and government entities worldwide, including the majority of the 2012 Fortune Global 100.

www.fortinet.com

majority of the 2012 Fortune Global 100. www.fortinet.com Gartner Security & Risk Management Summit 2015

Gartner Security & Risk Management Summit 2015

of the 2012 Fortune Global 100. www.fortinet.com Gartner Security & Risk Management Summit 2015 #gartnersecurity
of the 2012 Fortune Global 100. www.fortinet.com Gartner Security & Risk Management Summit 2015 #gartnersecurity

#gartnersecurity

Silver Sponsors

Silver Sponsors Avecto is an innovative technology business specializing in endpoint security. The company’s

Avecto is an innovative technology business specializing in endpoint security. The company’s revolutionary Defendpoint software ensures defense in depth while empowering users to work freely.

www.avecto.com

depth while empowering users to work freely. www.avecto.com Certes protects data in motion. Our CryptoFlow™ Solutions

Certes protects data in motion. Our CryptoFlow™ Solutions safeguard sensitive applications over any network with user-aware policies that protect data when firewalls can’t stop hackers.

certesnetworks.com

when firewalls can’t stop hackers. certesnetworks.com eSentire ® is the leader in Active Threat Protection

eSentire ® is the leader in Active Threat Protection solutions and services, the most comprehensive way to defend enterprises from advanced and never-before-seen cyber threats.

www.esentire.com

and never-before-seen cyber threats. www.esentire.com MetricStream is the market leader for integrated Governance,

MetricStream is the market leader for integrated Governance, Risk, and Compliance (GRC) Management Solutions that enable organizations to deliver better business performance.

www.metricstream.com

to deliver better business performance. www.metricstream.com Provide secure identity management and single sign-on to any

Provide secure identity management and single sign-on to any application, whether in the cloud, on-premises or on a mobile device for your employees, partners and customers with Okta.

www.okta.com

employees, partners and customers with Okta. www.okta.com As the inventor of the SSH protocol, we have

As the inventor of the SSH protocol, we have a twenty-year history of leading the market in developing advanced security solutions that enable, monitor, and manage encrypted networks.

www.ssh.com

enable, monitor, and manage encrypted networks. www.ssh.com Voltage Security provides end-to-end, data-centric

Voltage Security provides end-to-end, data-centric encryption, tokenization and key management solutions that allows companies to seamlessly secure all types of sensitive information wherever it resides.

www.voltage.com

sensitive information wherever it resides. www.voltage.com Wombat Security Technologies provides information security

Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior.

www.wombatsecurity.com

their employees secure behavior. www.wombatsecurity.com BlackBerry provides an end-to-end suite of secure mobile

BlackBerry provides an end-to-end suite of secure mobile solutions, delivering innovative mobile technologies to users and organizations that value productivity and achievement. Learn more: www.BlackBerry.com.

www.blackberry.com

Learn more: www.BlackBerry.com. www.blackberry.com CSG Invotas is an award-winning leader in security

CSG Invotas is an award-winning leader in security orchestration and automation for global security operations, delivering an automated threat response solution to unify, orchestrate and automate key elements of incident response.

www.csginvotas.com

key elements of incident response. www.csginvotas.com Imperva® is a leading provider of security solutions that

Imperva® is a leading provider of security solutions that protect business-critical data and applications. The company’s products enable organizations to discover vulnerabilities, protect information, and comply with regulations.

www.imperva.com

information, and comply with regulations. www.imperva.com Netskope™ is the leader in safe cloud enablement. With

Netskope™ is the leader in safe cloud enablement. With Netskope, IT can protect data and ensure compliance across cloud apps so businesses can move fast, with confidence.

www.netskope.com

businesses can move fast, with confidence. www.netskope.com Pirean are recognised leaders in Identity and Access

Pirean are recognised leaders in Identity and Access management solutions, delivering industry best practice and expertise through a unique Software, Consulting and Support Services blend.

http://pirean.com
http://pirean.com

Tenable Network Security provides continuous network monitoring to identify vulnerabilities, reduce risk and ensure compliance. Our family of products includes SecurityCenter Continuous View™, which provides the most comprehensive and integrated view of network health, and Nessus ® , the global standard in detecting and assessing network data.

www.tenable.com

in detecting and assessing network data. www.tenable.com Secure Mobile Gateway pioneer. Mobile threat prevention and

Secure Mobile Gateway pioneer. Mobile threat prevention and data usage optimization with real-time analytics. On device and in the cloud. Gartner Cool Vendor.

www.wandera.com

and in the cloud. Gartner Cool Vendor. www.wandera.com For 30 years, Boldon James has been a

For 30 years, Boldon James has been a leader in data classification solutions, helping organisations manage sensitive information securely & in compliance with legislation and standards.

www.boldonjames.com

with legislation and standards. www.boldonjames.com DenyAll is a European software vendor, an expert in next

DenyAll is a European software vendor, an expert in next generation application security, building on 15 years of experience securing web applications and services.

www.denyall.com

securing web applications and services. www.denyall.com LogRhythm, a leader in security intelligence and analytics,

LogRhythm, a leader in security intelligence and analytics, empowers companies to rapidly detect, respond to and neutralize damaging cyber threats.

www.logrhythm.com

to and neutralize damaging cyber threats. www.logrhythm.com ObserveIT, a pioneer in User Activity Monitoring, provides

ObserveIT, a pioneer in User Activity Monitoring, provides video recordings of user activity, analytics and alerting to address user- based attacks. Over 1,200 companies use ObserveIT. Visithttp://www.observeit.com for more information.

www.observeit.com

for more information. www.observeit.com RedSocks is a Dutch IT security company specialising in

RedSocks is a Dutch IT security company specialising in detecting and defeating malware in the corporate market. RedSocks supplies the RedSocks Malware Threat Defender (MTD) as a network appliance.

www.redsocks.nl

Defender (MTD) as a network appliance. www.redsocks.nl Vectra Networks’ X-series detection platform continuously

Vectra Networks’ X-series detection platform continuously monitors traffic to automatically detect cyber attacks, prioritizing them by greatest risk and enabling organizations to focus resources.

www.vectranetworks.com

organizations to focus resources. www.vectranetworks.com WatchGuard ® Technologies, Inc. is a global leader of

WatchGuard ® Technologies, Inc. is a global leader of integrated, multi-function business security solutions that intelligently combine industry standard hardware, best-of-breed security features, and policy-based management tools.

www.watchguard.com

Sponsors correct as of 12 June 2015

Visit gartner.com/eu/security for more information

Gartner Security & Risk Management Summit 2015

14 – 15 September | London, UK | gartner.com/eu/security

14 – 15 September | London, UK | gartner.com/eu/security Registration and pricing     Pricing 3

Registration and pricing

 
 
 

Pricing

3 easy ways to register

Pricing subject to change

early-bird price:

Web: gartner.com/eu/security

€2,150 + UK VAT (offer ends 17 July 2015)

Email: emea.registration@gartner.com

Standard price:

€2,475 + UK VAT

Telephone: +44 20 8879 2430

public Sector price:

€1,950 + UK VAT

 
 
public Sector price: €1,950 + UK VAT   Gartner Clients A Gartner ticket covers both days

Gartner Clients

A Gartner ticket covers both days of the Summit. Contact your account

manager or email emea.events@gartner.com to register using a ticket.

Group Rate discount

Maximize learning by participating together in relevant sessions or splitting up

to cover more topics, sharing your session take-aways later.

Complementary registrations:

• 1 for every 3 paid registrations

• 2 for every 5 paid registrations

• 3 for every 7 paid registrations

For more information, email emea.teamsend@gartner.com or contact your Gartner account manager.

WHY AttEnD A GARtnER EVEnt?

Build a successful strategy •

Get validation from Gartner analysts

• Meet with suppliers to support your tactical planning

Expand your peer network •

Innovate and problem-solve with like-minded peers

• Join the largest, most influential network of its kind

Grow in your role •

Get content and solutions that are most relevant to you

• Lead more effectively — and develop your team

WHAt MAKEs GARtnER EVEnts unIQuE?

Our analysts •

Analyst-led presentations

• Analyst one-on-one

private meetings

• Analyst-facilitated

roundtables

100% independent and objectiveOur research •

Our research

Proven and reliable

Relevant to your role

• Proven and reliable • Relevant to your role Venue Park Plaza Westminster Bridge 200 Westminster

Venue

Proven and reliable • Relevant to your role Venue Park Plaza Westminster Bridge 200 Westminster Bridge

Park Plaza Westminster Bridge 200 Westminster Bridge Road London, UK SE1 7UT

Phone +44 844 415 6780

www.parkplaza.com

Gartner Hotel Room Rate

Prices start at £175 per night at Park

Plaza when using promotional code

GART130915

Money-back guarantee

If you are not completely satisfied with this Gartner conference, please notify us in writing within 15 days of the conference and we will refund 100% of your registration fee.

© 2015 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. For more information, email info@gartner.com or visit gartner.com.