View
225
Download
2
Category
Preview:
Citation preview
Visit gartner.com/in/security for updates and to register! 1
EARLY-BIRD DISCOUNT Save 6,500 by 1 July 2016
Gartner Security & Risk Management Summit 20161 – 2 September | Mumbai, Indiagartner.com/in/security
Hot topics
• Data Loss Prevention
• Internet of Things, Network and End Point Security Challenges
• Governance, Risk and Compliance
• Crisis/Incident Command and Management
• Recovery from a Targeted Cyberattack
• Enabling a Safer Cloud
• Mobile Security for Digital Business
• Identity and Access Management
• Business Continuity Management
2 Gartner Security & Risk Management Summit 2016#GartnerSEC
• Gain insights to stay ahead of expanding scopes of responsibility and threats
• Align security and risk strategies with enterprise objectives
• Apply the latest techniques to tackle risks in cloud, OT, IoT and IT
• Maximize enterprise ROI by using the latest BCM and enterprise resilience practices
• Build a culture that drives security performance through employee engagement
Key benefi ts
Build Trust and Resilience at the Speed of Business
The new digital business environment offers huge potential for organizations to transform the way they deliver services and products. However, in the rush to innovate, you must remain cognizant of the risks resulting from this innovation while continuing to enable business aspirations. Increasing integration of IT, OT and IoT pose unprecedented challenges to risk and security leaders.
Building trust and resilience are key to seizing opportunities and reducing risks. You need to challenge convention and consider new operating models to remain relevant.
Gartner’s 2nd annual Security & Risk Management Summit will provide you with the proven practices and strategies that you need to maintain cost effective security and risk programs in order to support digital business and drive enterprise success.
Visit gartner.com/in/security for updates and to register! 3
What’s new for 2016• CISO track – Content and networking for CISOs to help them infl uence their
peers, report to the board, and become better business leaders
• All new “State of the Market” series giving the latest Gartner assessment of the different security and risk technology spaces, and where they are heading
• New 2016 Magic Quadrants: IT Risk Management, Identity as a Service, Enterprise Mobility Management Suites, Enterprise Network Firewall
• New Industry Forums (Financial Services, Government) with dedicated content and networking opportunities.
• Brand new Gartner analysts never featured at the event including:
• Peter Firstbrook (Digital Workplace)
• Steve Riley (Cloud & IoT Security)
• Elizabeth Kim (Managed Secuirty Services)
• Rob Smith (Mobile & Client Platforms)
• Chief Information Security Offi cers (CISO)
• Infrastructure/Operational Technology Managers
• Compliance Managers/Fraud Managers
• Security Architects/Enterprise Architects
• IT Security Managers
• Chief Privacy Offi cers
• Chief Risk Offi cers
• Risk Managers
Who should attend
4 Gartner Security & Risk Management Summit 2016#GartnerSEC
KeynotesGartner keynotes
Gartner Opening Keynote: Build Trust and Resilience at the Speed of Business The new digital business environment offers huge potential for organizations to transform the way they deliver services and products. However, in the rush to innovate, you must remain cognizant of the risks resulting from it. Increasing integration of IT, OT and IoT pose unprecedented challenges to risk and security leaders. You need to challenge convention and consider new security models to remain relevant.
Gartner Closing Keynote: Cybersecurity and Risk Management in Digital Business (Signature Series) Influence scales, control does not. IT risk and security must not seek to impose its will on the business, but must become based on risk and trust. CIOs must effectively relate IT risk and security to business outcomes and engage non-IT executives. The goal is effective decision making that creates appropriate levels of security and IT risk that balances the need to protect with the needs to run the business. Using the 6 principles of resilience will support digital business transformation.
Partha Iyengar VP & Gartner Fellow
Ruggero Contu Research Director
Peter Firstbrook Research VP
Jie Zhang Research Director
Ruggero Contu Research Director
Visit gartner.com/in/security for updates and to register! 5
Meet the analystsManjunath BhatResearch Director
Rajpreet KaurSr Research Analyst
Peter FirstbrookResearch VP
Steve RileyResearch Director
Rob SmithResearch Director
Ruggero ContuResearch Director
Elizabeth KimSr Research Analyst
John GirardVP Distinguished Analyst
Tom ScholtzVP & Gartner Fellow
Roberta J. WittyResearch VP
Sid DeshpandePrincipal Research Analyst
Ganesh RamamoorthyResearch VP
Partha IyengarVP & Gartner Fellow
Anmol SinghPrincipal Research Analyst
Jie ZhangResearch Director
• Mobile and Endpoint Strategies
• Mobile Application Strategies
• Security and Risk Management Leaders
• Network and Gateway Security
• Information Security Management Program
• Mobile and Endpoint Strategies
• Cloud Computing
• Mobile and Endpoint Strategies
• Product Strategy
• Market and Competitive Intelligence Management
• Marketing, Sales and Channel Effectiveness
• Mobile and Endpoint Strategies
• Market and Competitive Intelligence Management
• New Market Opportunities
• Security and Risk Management Leaders
• Mobile and Endpoint Strategies
• Security and Risk Management Leaders
• Business Continuity Management
• Crisis Management
• Disaster Recovery
• Market and Competitive Intelligence Management
• New Market Opportunities
• Security and Risk Management Leaders
• Positioning and Messaging
• Go-to-Market Planning
• Positioning and Messaging
• Market and Competitive Intelligence Management
• Product Strategy
• Business and IT Strategy Alignment
• ITScore — CIO and Enterprise
• Bimodal Business/Bimodal IT
• IAM Strategy and Program Management
• Privileged Access Management
• Security and Privacy
• IoT Security
• Security and Risk Management Leaders
• Infrastructure and Operations Leaders
Book your Analyst One-on-One — your private consultation with a Gartner analyst
Many attendees tell us that an analyst one-on-one meeting is worth the price of admission, all by itself.
Book a private consultation on-site with a Gartner analyst to receive tailor-made advice that you can apply to your role and organization.
6 Gartner Security & Risk Management Summit 2016#GartnerSEC
A. CISO as Business Leader
Hot topics include:
• Good constant governance is critical part of the CISO’s role
• Build more effective communication strategies — learn to speak business to the business
• Understand how dynamic bimodal IT has changed the risk and security landscape
• Developing more effective and relevant measures and metrics to demonstrate value
• Leveraging and improving CISO soft skills
• What does the future of security look like and what should CISOs do to prepare
B. Building Trust and Resilience With More Agile Security
Hot topics include:
• Understanding the changing threat landscape and how it impacts cybersecurity
• How to enable a safer Use of Cloud
• Implementing and improving mobile security to support digital business
• Protecting critical Data
• Emerging security technologies
• IoT Security
• Overcoming network and endpoint security challenges
• Building a resilient infrastructure with better attack detection and remediation
C. Leverage Risk Management to Underpin the Digital Business Transition
Hot topics include:
• What has transpired in risk management when data and processes being moved into the cloud
• Impact of important regulatory changes on global business operations
• New responsibilities in risk management that allow risk managers to stay competitive and innovative
• New technologies that can facilitate managing digital risks
• How to partner with business leadership and gain their support as well as necessary resources to managing digital risks
• How to consolidate risk areas and components in order to form an integrated risk management program
Plan your experienceCustomize your agenda
Agenda tracks
Gartner Events Navigator AppGartner Events Navigator helps you organize, view and custom-create an agenda based on:
• Date and time
• Track
• Analyst/speaker profi les
• Session descriptions
• Key initiatives
• Vertical industries
Visit gartner.com/in/security and click the “Event Agenda” tab or download the Gartner Events mobile app (iPhone®, iPad® and Android™ compatible)
Visit gartner.com/in/security for updates and to register! 7
Analyst interaction Network with peers
Meet solution providers
Analyst one-on-one meeting A complimentary consultation with a Gartner analyst of your choice
Analyst-user roundtables* Moderated by Gartner analysts for exchanging ideas and best practices with your peers
Workshops* Small-scale and interactive; drill down on specific topics with a how-to focus
* Space is limited and pre-registration is required. Limited to end-user organizations only.
Solution Showcase Explore cutting-edge IT solutions from top providers
Solution provider sessions Exhibitors share their insights on the latest products and services
End-user case studies Learn about recent implementations firsthand, with an opportunity for Q&A with the IT and business executives leading the initiative
Ask the practitioner roundtables* These roundtable discussions, led by your peer, will enable you to interact with others facing the same challenges to discuss best practices and share experiences
Solution Showcase reception Connect with peers in similar roles who face similar challenges, at the networking reception on the Solution Showcase designed to build relationships and facilitate the meaningful exchange of ideas and information
8 Gartner Security & Risk Management Summit 2016#GartnerSEC
07:30 Registration
08:00 – 08:30 Tutorial: Critical Capabilities for High Security Mobility Management Rob Smith Tutorial: Balance Employee Engagement and Security Needs of the Digital Workplace Manjunath Bhat
09:00 – 10:00 Gartner Opening Keynote: Build Trust and Resilience at the Speed of Business Peter Firstbrook, Jie Zhang and Ruggero Contu
10:00 – 10:30 Refreshment Break in the Solution Showcase
TRACKS A. CISO as Business Leader B. Building Trust and Resilience With More Agile Security
C. Leverage Risk Management to Underpin the Digital Business Transition
Workshops Analyst-User Roundtables
10:30 – 11:15 Top Security Predictions/SPAs 2016 Partha Iyengar
State of Cloud Security 2016 Steve Riley
Put Citizen IT App Development To Work, Safely and Securely John Girard
10:30 – 12:00 Workshop: Make the Business Case and Obtain BCM Program Executive SponsorshipRoberta Witty
10:30 – 11:30 Roundtable:Integrative Approaches to Authentication, Identity Proofing, Fraud Detection and Behavior Analytics Anmol Singh
11:30 – 12:15 The New CISO's Crucial First 100 Days Tom Scholtz
State of Data Security 2016 Sid Deshpande
Market Overview to Corporate Compliance and Oversight Elizabeth Kim
12:15 – 13:30 Networking Lunch in the Solution Showcase 13:00 – 13:20 Magic Quadrant for IT Risk Management Elizabeth Kim
13:30 – 14:15 How to Keep Your Legal Counsel and Compliance Officer Happy When Migrating to Microsoft Office 365 Jie Zhang
Network Security for Indian Enterprises in 2016 Rajpreet Kaur
Signature Series: State of Business Resilience 2016 Roberta Witty
13:30 – 15:00 Workshop:How to Manage the Identity of Things in the Internet of ThingsGanesh Ramamoorthy
14:30 – 15:00 Solution Provider Sessions 14:15 – 15:15 Roundtable:How Much Security Does the Cloud Provide? Steve Riley
15:00 – 15:15 15:00 – 15:20 Magic Quadrant and Critical Capabilities: Identity as a Service Manjunath Bhat
15:15 – 16:00 What Does Securing the IoT Really Mean? Ganesh Ramamoorthy
Next-Generation Endpoint Protection Peter Firstbrook
Take a Risk-Based Approach to Selecting New Authentication Methods (But Don't Neglect UX) Anmol Singh
15:30 – 17:00 Workshop:Creating Your 15-Minute Risk Management Presentation for the BoardTom Scholtz
15:30 – 16:30 Roundtable:Threat Intelligence, is there any value for your security practice Ruggero Contu
16:15 – 16:45 Solution Provider Sessions
17:15 – 17:45 To the Point: Hype Cycle for Governance, Risk and Compliance Technologies Elizabeth Kim
To the Point: Mobile Security: Myth vs. Reality Rob Smith
To the Point How to be Secure in Amazon Web Services Steve Riley
17:45 – 18:15 Refreshment Break in the Solution Showcase 17:50 – 18:10 Magic Quadrant and Critical Capabilities: Identity as a Service Manjunath Bhat
18:15 – 19:00 Guest Keynote:
19:00 – 21:00 Solution Showcase Reception and Dinner
Thur
sday
1 S
EP
TEM
BE
R 2
016
08:00 Registration
09:00 – 09:45 Guest Keynote:
09:45 – 10:15 Refreshment Break in the Solution Showcase 09:50 – 10:10 Magic Quadrant and Critical Capabilities: Enterprise Mobility Management Suites Manjunath Bhat
10:15 – 11:00 Gartner Essentials: Manage Risk and Security in Bimodal IT Partha Iyengar
Top Cybersecurity Trends for 2016 — 2017 Peter Firstbrook
Managing an Aggressive Business Disruption Cybersecurity Attack Roberta Witty
10:15 – 11:15 Roundtable:Security Strategy Planning Best Practices Tom Scholtz
11:15 – 11:45 Solution Provider Sessions
12:00 – 12:45 Emerging Approaches to Securing the IoT Infrastructure Ganesh Ramamoorthy
Information-Centric Mobile Security: Your Data Can Move Without Leaking John Girard
Roadmap/State of IAM 2016 Anmol Singh
12:00 – 13:30 Workshop: Creating a Balanced Mobile Strategy With BYOD and CYOD at the CoreRob Smith
12:00 – 13:00 Roundtable:When Does the Clock Start? Roberta Witty
13:00 – 13:30 To the Point: Five Tips for Better Security and Risk Management Communication Jie Zhang
To the Point: Security 2020 — The Future of Cybersecurity Sid Deshpande
To the Point: How to be Secure in Microsoft Azure Steve Riley
13:30 – 14:30 Networking Lunch in the Solution Showcase 13:40 – 14:00 Magic Quadrant and Critical Capabilities: Enterprise Network Firewall Rajpreet Kaur
14:30 – 15:00 Case Study Case Study Case Study 14:30 – 16:00 Workshop:How to Secure your Operational TechnologyGanesh Ramamoorthy15:15 – 16:00 Articulating the Business Value of Information
Security Tom ScholtzState of Mobile Security John Girard
How to Outsource Security Functions Effectively Sid Deshpande
15:15 – 16:15 Roundtable:Is Your EMM/MDM Meeting Your Requirements?Rob Smith
16:15 – 16:45 To the Point: Manjunath Bhat
To the Point: Network Security Services and Support Challenges in India Rajpreet Kaur
To the Point: How to Enhance the Security of Office 365 Steve Riley
16:45 – 17:15 Refreshment Break in the Solution Showcase
17:15 – 18:00 Gartner Closing Keynote: Cybersecurity and Risk Management in Digital Business (Signature Series) Ruggero Contu and Partha Iyengar
Frid
ay2
SE
PTE
MB
ER
201
6Agenda at a Glance
Visit gartner.com/in/security for updates and to register! 9
07:30 Registration
08:00 – 08:30 Tutorial: Critical Capabilities for High Security Mobility Management Rob Smith Tutorial: Balance Employee Engagement and Security Needs of the Digital Workplace Manjunath Bhat
09:00 – 10:00 Gartner Opening Keynote: Build Trust and Resilience at the Speed of Business Peter Firstbrook, Jie Zhang and Ruggero Contu
10:00 – 10:30 Refreshment Break in the Solution Showcase
TRACKS A. CISO as Business Leader B. Building Trust and Resilience With More Agile Security
C. Leverage Risk Management to Underpin the Digital Business Transition
Workshops Analyst-User Roundtables
10:30 – 11:15 Top Security Predictions/SPAs 2016 Partha Iyengar
State of Cloud Security 2016 Steve Riley
Put Citizen IT App Development To Work, Safely and Securely John Girard
10:30 – 12:00 Workshop: Make the Business Case and Obtain BCM Program Executive SponsorshipRoberta Witty
10:30 – 11:30 Roundtable:Integrative Approaches to Authentication, Identity Proofing, Fraud Detection and Behavior Analytics Anmol Singh
11:30 – 12:15 The New CISO's Crucial First 100 Days Tom Scholtz
State of Data Security 2016 Sid Deshpande
Market Overview to Corporate Compliance and Oversight Elizabeth Kim
12:15 – 13:30 Networking Lunch in the Solution Showcase 13:00 – 13:20 Magic Quadrant for IT Risk Management Elizabeth Kim
13:30 – 14:15 How to Keep Your Legal Counsel and Compliance Officer Happy When Migrating to Microsoft Office 365 Jie Zhang
Network Security for Indian Enterprises in 2016 Rajpreet Kaur
Signature Series: State of Business Resilience 2016 Roberta Witty
13:30 – 15:00 Workshop:How to Manage the Identity of Things in the Internet of ThingsGanesh Ramamoorthy
14:30 – 15:00 Solution Provider Sessions 14:15 – 15:15 Roundtable:How Much Security Does the Cloud Provide? Steve Riley
15:00 – 15:15 15:00 – 15:20 Magic Quadrant and Critical Capabilities: Identity as a Service Manjunath Bhat
15:15 – 16:00 What Does Securing the IoT Really Mean? Ganesh Ramamoorthy
Next-Generation Endpoint Protection Peter Firstbrook
Take a Risk-Based Approach to Selecting New Authentication Methods (But Don't Neglect UX) Anmol Singh
15:30 – 17:00 Workshop:Creating Your 15-Minute Risk Management Presentation for the BoardTom Scholtz
15:30 – 16:30 Roundtable:Threat Intelligence, is there any value for your security practice Ruggero Contu
16:15 – 16:45 Solution Provider Sessions
17:15 – 17:45 To the Point: Hype Cycle for Governance, Risk and Compliance Technologies Elizabeth Kim
To the Point: Mobile Security: Myth vs. Reality Rob Smith
To the Point How to be Secure in Amazon Web Services Steve Riley
17:45 – 18:15 Refreshment Break in the Solution Showcase 17:50 – 18:10 Magic Quadrant and Critical Capabilities: Identity as a Service Manjunath Bhat
18:15 – 19:00 Guest Keynote:
19:00 – 21:00 Solution Showcase Reception and Dinner
08:00 Registration
09:00 – 09:45 Guest Keynote:
09:45 – 10:15 Refreshment Break in the Solution Showcase 09:50 – 10:10 Magic Quadrant and Critical Capabilities: Enterprise Mobility Management Suites Manjunath Bhat
10:15 – 11:00 Gartner Essentials: Manage Risk and Security in Bimodal IT Partha Iyengar
Top Cybersecurity Trends for 2016 — 2017 Peter Firstbrook
Managing an Aggressive Business Disruption Cybersecurity Attack Roberta Witty
10:15 – 11:15 Roundtable:Security Strategy Planning Best Practices Tom Scholtz
11:15 – 11:45 Solution Provider Sessions
12:00 – 12:45 Emerging Approaches to Securing the IoT Infrastructure Ganesh Ramamoorthy
Information-Centric Mobile Security: Your Data Can Move Without Leaking John Girard
Roadmap/State of IAM 2016 Anmol Singh
12:00 – 13:30 Workshop: Creating a Balanced Mobile Strategy With BYOD and CYOD at the CoreRob Smith
12:00 – 13:00 Roundtable:When Does the Clock Start? Roberta Witty
13:00 – 13:30 To the Point: Five Tips for Better Security and Risk Management Communication Jie Zhang
To the Point: Security 2020 — The Future of Cybersecurity Sid Deshpande
To the Point: How to be Secure in Microsoft Azure Steve Riley
13:30 – 14:30 Networking Lunch in the Solution Showcase 13:40 – 14:00 Magic Quadrant and Critical Capabilities: Enterprise Network Firewall Rajpreet Kaur
14:30 – 15:00 Case Study Case Study Case Study 14:30 – 16:00 Workshop:How to Secure your Operational TechnologyGanesh Ramamoorthy15:15 – 16:00 Articulating the Business Value of Information
Security Tom ScholtzState of Mobile Security John Girard
How to Outsource Security Functions Effectively Sid Deshpande
15:15 – 16:15 Roundtable:Is Your EMM/MDM Meeting Your Requirements?Rob Smith
16:15 – 16:45 To the Point: Manjunath Bhat
To the Point: Network Security Services and Support Challenges in India Rajpreet Kaur
To the Point: How to Enhance the Security of Office 365 Steve Riley
16:45 – 17:15 Refreshment Break in the Solution Showcase
17:15 – 18:00 Gartner Closing Keynote: Cybersecurity and Risk Management in Digital Business (Signature Series) Ruggero Contu and Partha Iyengar
When attending this event, please refer to the agenda handout provided or the Gartner Events mobile app for the most up to date session and location information.
Agenda as of 1 June 2016 and subject to change
10 Gartner Security & Risk Management Summit 2016#GartnerSEC
Solution Showcase Develop a “shortlist” of technology and service providers. Get exclusive access to client case studies, product roadmaps, and demos. Talk to solution experts who can answer your specific questions.
Sponsorship opportunities
For further information about sponsoring this event:
Email: india.exhibits@gartner.com
Tel: +91 22 6613 2140
Platinum exhibitors
Silver exhibitors
Exhibitor list as of 1 June 2016 and subject to change
Visit gartner.com/in/security for updates and to register! 11
Registration and pricing
Group rate discountMaximize learning by participating together in relevant sessions or splitting up to cover more ground, sharing your session take-aways later.
Complimentary registrations
• 1 for every 3 paid registrations
• 2 for every 5 paid registrations
• 3 for every 7 paid registrations
For more information, email apac.registration@gartner.com or contact your Gartner account manager.
Gartner events deliver what you needIn addition to three tracks of the latest Gartner analyst research, keynote speakers and case studies, your Summit registration fee includes complimentary access to these special features:
• Analyst one-on-one meeting
• Analyst-user roundtables*
• Workshops*
• Ask the practitioner roundtables*
• Solution Showcase
• Networking breakfasts, lunches and receptions
• Year-round access to videotaped analyst sessions from the North America event
*Space is limited and pre-registration is required. Limited to end-user organizations only.
Terms and conditionsTo view our Gartner events terms and conditions, visit gartner.com/in/security.
Convince your bossAttending a Gartner event can help spur new ideas, fast track project strategy and advance your professional skills. We’ve developed a set of materials that will aid in gaining approval from your manager. For more details, visit gartner.com/in/security.
JW Mariott Mumbai SaharIA Project Road, Chhatrapati Shivaji International Airport, Andheri East,Mumbai, MH, 400 099
Summit venue
Save 6,500 before 1 July 2016Early-bird price: 43,250 plus taxes
Standard price: 49,750 plus taxes
Public sector price: 40,150 plus taxes
3 ways to registerWeb: gartner.com/in/security
Email: india.registration@gartner.com
Phone: +91 80 2222 2079
Early-bird discount
Gartner event tickets We accept one Gartner Summit ticket or one Gartner Catalyst ticket for payment. If you are a client with questions about tickets, please contact your sales representative or call +91 80 2222 2079.
Gartner Security & Risk Management Summit 20161 – 2 September | Mumbai, India | gartner.com/in/security
3 ways to registerWeb: gartner.com/in/security
Email: india.registration@gartner.com
Phone: +61 2 8569 7622
Gartner Security & Risk Management Summit is on Twitter and LinkedIn.
#GartnerSEC Gartner Security & Risk Management XChange
Join the conversation!
© 2016 Gartner, Inc. and/or its affi liates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affi liates. For more information, email info@gartner.com or visit gartner.com.
Security & Risk Management Summit13 – 16 June | National Harbor, MD
Security & Risk Management Summit11 – 13 July | Tokyo, Japan
Security & Risk Management Summit2 – 3 August | São Paulo, Brazil
Security & Risk Management Summit 22 – 23 August | Sydney, Australia
Security & Risk Management Summit12 – 13 September | London, U.K.
Identity & Access Management Summit 29 Nov. – 1 Dec. | Las Vegas, NV
Security & Risk Management Summit 31 Oct. – 1 Nov. | Dubai, UAE
Gartner Security & Risk Management Summits around the globe
United Kingdom12 – 13 September
United States29 Nov – 1 Dec
United States13 – 16 June
Brazil2 – 3 August
Dubai31 Oct – 1 Nov
Mumbai1 – 2 September
Australia22– 23 August
Japan11 – 13 July
Register now and save 6,500
Early-bird discount expires 1 July.
Recommended