12
EARLY-BIRD DISCOUNT Save $400 by 26 June Gartner Security & Risk Management Summit 2015 24 – 25 August | Hilton Sydney | gartner.com/ap/security Hot topics Effective Cloud Security Management Mobile Security in the Digital Age Vendor Risk Assessment and Monitoring Security Awareness and Culture Change The New Relationship of Risk and Digital Business Manage Risk and Deliver Security in a Digital World

Gartner Security & Risk Management Summit 2015€¦ · 2 Gartner Security & Risk Management Summit 2015 ... The annual Gartner Security & Risk Management Summit equips security and

Embed Size (px)

Citation preview

Page 1: Gartner Security & Risk Management Summit 2015€¦ · 2 Gartner Security & Risk Management Summit 2015 ... The annual Gartner Security & Risk Management Summit equips security and

EARLY-BIRD DIscount save $400 by 26 June

Gartner Security & Risk Management Summit 201524 – 25 August | Hilton Sydney | gartner.com/ap/security

Hot topics

Effective Cloud Security Management

Mobile Security in the Digital Age

Vendor Risk Assessment and Monitoring

Security Awareness and Culture Change

The New Relationship of Risk and Digital Business

Manage Risk and Deliver Security in a Digital World

Page 2: Gartner Security & Risk Management Summit 2015€¦ · 2 Gartner Security & Risk Management Summit 2015 ... The annual Gartner Security & Risk Management Summit equips security and

2 Gartner Security & Risk Management Summit 2015

Manage Risk and Deliver Security in a Digital World

Rob McMillan Research Director and Summit Chair, Gartner

From the desk of Rob McMillan, Research Director and Summit Chair

The recent spate of highly publicized, epic breaches across industries and government has made security and risk the hot topics of the day, as much in the public discourse as in the boardroom. Privacy, security and risk are no longer just IT concerns; they’re core business strategy concerns.

In the face of the ever increasing threats, security and risk leaders need to build resilient organizations that can withstand attacks and continue to attain enterprise objectives.

Successful security and risk leaders must embrace new approaches to digital business while maintaining proven control architecture that mitigates enterprise risk.

The annual Gartner Security & Risk Management Summit equips security and risk managers with the skills, knowledge, strategies and tactics that enable cost-effective security and risk management programs, support digital business and drive enterprise success. Get the tools you need to deliver secure digital business environments and ensure your organization can bounce back quickly from an attack or disruption.

Looking forward to seeing you at the Summit!

GaRtneR PReDictS

“ By 2020, risk assessment will drive more spending than government regulation, despite increases in government regulation.”

#GartnerSEC

Page 3: Gartner Security & Risk Management Summit 2015€¦ · 2 Gartner Security & Risk Management Summit 2015 ... The annual Gartner Security & Risk Management Summit equips security and

Visit gartner.com/ap/security for updates and to register! 3

Re-evaluate your security and risk strategies and investments for the digital ageDigital business technologies and the Internet of Things (IoT) are creating new threats and risks as regulatory compliance and legal risks continue to escalate, and sophisticated cyberthreats challenge even the best security strategies. Every business is now a digital business, and every business must become profi cient at risk assessment and mitigation — the foundation for success in the digital age.

New for 2015

• Increased number of regional and international Gartner analysts to provide greater coverage of topics including Vendor Management, Metrics and Incident Response

• New networking session formats, including Super Roundtables, to enable greater peer interaction onsite as well as Ask the Practitioner sessions to facilitate greater sharing of best practices

• New TechInsights track that takes a deep dive into the latest security architecture issues related to IT security and risk management

4 Keynotes

5 Meet the analysts

6 Plan your experience

8 Agenda at a glance

10 Solution Showcase

11 Registration and pricing

Senior business and IT professionals including:

• Chief Information Security Offi cer (CISO)

• Chief Risk Offi cer

• Information Security Program Manager

• Identity and Access Manager

• Privacy Offi cer and Chief Compliance Offi cer

• Network Manager

• Enterprise Architect

• IT Audit Leader

Table of contents

Who should attend

Key benefits of attending

• Understand the implications of Digital Business on security and risk initiatives, as proven conventional practices will no longer be enough

• Gain role-specifi c strategies, approaches and tools to stay ahead of expanding scopes of responsibility and increasing threats

• Apply the latest techniques to tackle risks in cloud, operational technology (OT), the Internet of Things (IoT) and IT

• Build a culture that drives security performance through employee engagement and awareness

Page 4: Gartner Security & Risk Management Summit 2015€¦ · 2 Gartner Security & Risk Management Summit 2015 ... The annual Gartner Security & Risk Management Summit equips security and

4 Gartner Security & Risk Management Summit 2015

KeynotesGuest keynotes

Dr Christine Nixon has 38 years of policing experience, rising to the position of Assistant Commissioner , New South Wales Police Force and Victoria Police Chief Commissioner in 2001.After the Black Saturday fires in 2009, she chaired the Victorian Bushfire Reconstruction and Recovery Authority. Today, Dr Nixon is Chair of the Board, Good Shepherd Microfinance, Chair of the Board Monash College and Deputy Chancellor, Monash University. Christine also teaches with the Australian and New Zealand School of Government and advises a variety of organizations on leadership and management. Christine fights for justice for women and minorities.

Dealing with the Dark Side Policing can teach us much about strengthening systems and reducing risk. Drawing from experiences with organized crime, corruption and managing a remote workforce, Christine Nixon will offer new insights into strengthening security and managing risk.

David Turner is a senior executive and trusted advisor with 18 years’ experience in the security and risk management industry, and is one of Australia’s most respected risk management leaders. David has a unique blend of expertise across these diverse areas with a focus on risk management of human behavior – one of the more complex, dynamic and often over-looked areas of the industry.

Human Risk Management — The Key to Organizational Success In this keynote, David breaks down the cause of organizational risk by real examples, he explains the important role of corporate governance, how to prepare your culture for change management and how to effectively use crucial risk management elements immediately to add value and decrease risk within your organization, through the 8 key elements of risk mitigation.

Gartner keynotes

Gartner Opening Keynote: Manage Risk and Deliver Security in a Digital World Effective cybersecurity is the foundation of successful digital business. As organizations leverage new technology and business processes to deliver services and products to global markets, security and risk managers must support achievement of enterprise objectives while mitigating security risks to an acceptable level. In the face of increasing threats to IT, OT and IoT, security and risk leaders need to build resilient organizations that can withstand attacks and continue to attain enterprise objectives. Successful security and risk leaders embrace new approaches to digital business while maintaining proven control architecture that mitigates enterprise risk. Gregg Kreizman, Earl Perkins and Tom Scholtz

Gartner Closing Keynote: Cybersecurity Scenario 2020 — The Impact of Digital Business on Security Two years ago, Gartner provided a scenario covering the evolution of the threat environment through 2020. Now our senior analysts have assembled a picture of how digital business will impact the security practice in that same time frame. This is another key input to your long term strategic planning. You have heard about the Nexus of Forces from us for years. We have provided you with the story of Digital Business. Now see how this will change your business life in security and risk management. Christian Byrnes

Christine Nixon

Gregg Kreizman Research VP

Earl Perkins Research VP

Tom Scholtz VP & Gartner Fellow

Christian Byrnes Managing VP, Risk & Security, Gartner

#GartnerSEC

David Turner

Page 5: Gartner Security & Risk Management Summit 2015€¦ · 2 Gartner Security & Risk Management Summit 2015 ... The annual Gartner Security & Risk Management Summit equips security and

Visit gartner.com/ap/security for updates and to register! 5

Meet the analysts

Christopher ambroseResearch VP

anton ChuvakinResearch VP

Khushbu PratapPrincipal Research Analyst

Craig LawsonResearch Director

Rob SmithResearch Director

John WheelerResearch Director

Christian ByrnesManaging VP

Jay HeiserResearch VP

anne RobinsResearch Director

Rob McMillanResearch Director

John MorencyResearch VP

Jonathan CareResearch Director

Gregg KreizmanResearch VP

Tom ScholtzVP & Gartner Fellow

Earl PerkinsResearch VP

Jeffrey WheatmanResearch Director

Engage with our team of Gartner analysts through track presentations, a complimentary one-on-one meeting, analyst-facilitated workshops, roundtables and more.

Vendor management; sourcing and vendor relationships leaders

Audit and compliance; information security technology and services; risk management; security and risk management leaders; positioning and messaging

Audit and compliance; risk management; security and risk management leaders; information security program management; privacy

Information security technology and services

Mobile enterprise strategy; IT strategic planning; professional effectiveness for IT professionals; audit and compliance; privacy

Risk management; security and risk management leaders; IT governance; business value of IT; competitive advantage and business transformation

Information security program management; risk management

Information security program management; risk management; cloud computing

Identity and access management; information security program management; professional effectiveness for IT professionals; information security technology and services

Security and risk management leaders; information security program management; risk management; IT governance; information security technology and services

Business continuity management; cloud computing; data center modernization and consolidation

Audit and compliance; privacy; information security technology and services; infrastructure and operations leaders; security and risk management leaders

Identity and access management

Information security program management; risk management; business continuity management; IT governance; information security technology and services

Security and risk management leaders; IT and operational technology alignment; information security technology and services; audit and compliance; smart grid

Information security program management; security and risk management leaders; risk management

Our community of more than 1,000 analysts engaged in over 215,000 one-to-one client interactions in the past year. Benefi t from the collective wisdom of the attending analysts to develop your strategy and implement fl awlessly.

Page 6: Gartner Security & Risk Management Summit 2015€¦ · 2 Gartner Security & Risk Management Summit 2015 ... The annual Gartner Security & Risk Management Summit equips security and

6 Gartner Security & Risk Management Summit 2015

Plan your experience

Agenda programsA. Chief Information Security Offi cer (CISO)Digital business is often at odds with conventional security strategies. While ongoing publicity regarding severe security incidents results in valuable executive support, CISO’s cannot only depend on proven practices anymore. It is incumbent upon you to challenge convention. The CISO program will help you gain the leadership skills needed to make these diffi cult decisions.

B. Risk Management and ComplianceDigital risks are mounting as newer technologies are woven into the fabric of the business. According to Gartner’s 2015 CIO survey, 89% of CIOs agree that new types of risks will be generated by digital business technologies. Yet, at the same time, regulatory compliance and legal risks continue to escalate for most enterprises. With continued economic and competitive uncertainty, early detection and mitigation of emerging risks are critical components of successful business and IT operations. This program will focus on practical methods to apply Gartner’s three dimensions of risk management: Creating new frameworks to assess the widening array of risks; developing new metrics to analyze risk impacts on business outcomes; deploying new governance, risk and compliance (GRC) technologies to integrate and streamline risk management practices.

C. Security: Technology and Operations Digital business drives new opportunities for business success but also challenges traditional approaches to information security. Attacks and threats change and adapt as organizations adjust to the new realities of digital business, including Internet of Things (IoT). As organizations accelerate their adoption of these new platforms for business operations, your security program must also rapidly adapt to the new reality and assimilate new technologies as you also mature in your use of and the effectiveness of existing technologies. Mature in the breadth and effectiveness of techniques and technologies you use to maintain appropriate levels of security for applications, data and infrastructure regardless of location. The Security Program provides insights into effective security management from Gartner’s IT Leader’s group as well as insights into security technology management from Gartner’s IT Professionals group.

Key Initiatives

• Creating an Effective Cloud Security Program

• Reshaping Mobile Security in the Digital Age

• Initiating and Sustaining an Effective Identity & Access Management (IAM) Program

• TechInsights: Security Architecture

Customize your agendaGartner Events NavigatorGartner Events Navigator helps you organize, view and custom-create an agenda based on:

• Date and time

• Agenda tracks

• Analyst/speaker profi les

• Session descriptions

• Key initiatives

• Vertical industries

Visit gartner.com/ap/security and click the “agenda” tab or download the Gartner Events mobile app (iPhone®, iPad® and Android™ compatible)

#GartnerSEC

Page 7: Gartner Security & Risk Management Summit 2015€¦ · 2 Gartner Security & Risk Management Summit 2015 ... The annual Gartner Security & Risk Management Summit equips security and

Visit gartner.com/ap/security for updates and to register! 7

Analyst interaction

Analyst one-on-one meeting A complimentary consultation with a Gartner analyst of your choice

Analyst-user roundtables*Moderated by Gartner analysts for exchanging ideas and best practices with your peers

Ask the analyst roundtables*Debate with the analysts directly and learn from the questions posed by your peers

Workshops*Small-scale and interactive; drill down on specifi c topics with a how-to focus

* Space is limited and pre-registration is required.Limited to end-user organizations only.

Network with peers

Meet solution providersSolution Showcase Explore cutting-edge IT solutions from top providers

Solution provider sessions Exhibitors share their insights on the latest products and services

End–user case studiesLearn about recent implementations fi rsthand, with an opportunity for Q&A with the IT and business executives leading the initiative

Ask the Practitioner sessionsInteract with your peers in this roundtable setting to discuss best practices and share experiences

Solution Showcase receptionConnect with peers in similar roles who face similar challenges, at the networking reception on the Solution Showcase designed to build relationships and facilitate the meaningful exchange of ideas and information

“ i have had a great experience at the Security & Risk Summit and will take with me some very valuable insights and resources. i look forward to the next Summit and gaining more insights and knowledge in the realm of security and risk.”

Page 8: Gartner Security & Risk Management Summit 2015€¦ · 2 Gartner Security & Risk Management Summit 2015 ... The annual Gartner Security & Risk Management Summit equips security and

8 Gartner Security & Risk Management Summit 2015

Agenda at a glance07:30 – 19:15 Registration

08:30 – 09:15 Tutorial: Use a Vendor Risk Management Framework to Mitigate Regulatory, Compliance, Security and Performance Issues christopher Ambrose

Tutorial: How To Build A Globally Legal and Successful BYOD Program Rob smith

Tutorial: Secure Use of AWS and Azure — Comparison and Best Practices Jay Heiser

Tutorial: Mind the SaaS Security Gaps craig Lawson

09:30 – 10:15 Gartner Opening Keynote: Manage Risk and Deliver Security in a Digital World Gregg Kriezman, Earl Perkins and tom scholtz

10:15 – 10:30 Welcome to the Gartner Security & Risk Management Summit 2015 Rob McMillan

10:30 – 11:00 Industry Panel Discussion Moderators: Anne Robins and craig Lawson

11:00 – 11:30 Refreshment Break in the Solution Showcase

TRaCKS a. Chief Information Security Officer Program (CISO)

B. Risk Management and Compliance Program

C. Security: Technology and Operations Program

Workshops, analyst-User Roundtables, ask the analyst Roundtablesand ask the Practitioner Sessions

11:30 – 12:15 Top Trends and Takeways for Cybersecurity Earl Perkins

Digital Business and Your New Relationship with Risk christian Byrnes

Mobile Security Threats and Trends, 2015 Rob smith

11:30 – 13:00 Workshop: Information Security Metrics: Building from the Business Down Facilitator: Jeffrey Wheatman

Roundtable: Threat Intelligence — Whys and Hows Facilitator: Anton chuvakin

12:30 – 13:00 People-Centric Security — Experiences and Lessons Learned tom scholtz

Challenging Decisions — Third Party Security Assurance Landscape Khushbu Pratap

Leveraging Social Identities to Enable Digital Business Anne Robins

Ask the Analyst: Cloud-Based Recovery Management — DRaaS Facilitator: John Morency

13:00 – 14:15 Lunch in the Solution Showcase

14:15 – 15:00 End-User Case StudyPlease refer to website for updates

What's New and Hot in GRC? John Wheeler Security Incident Response in the Age of the APT Anton chuvakin

14:15 – 15:45 Workshop: Building a Constituent-Aware IAM Infrastructure Facilitator: Gregg Kreizman

Roundtable: Information Security Metrics Facilitator: Jeffrey Wheatman

Roundtable: What Risks are Microvendors Introducing to Your Enterprise? Facilitator: christopher Ambrose

Roundtable: Securing Mobile Payments and Mobile Wallets Facilitator: Rob smith

15:15 – 15:45 Solution Provider Sessions

15:45 – 16:15 Refreshment Break in the Solution Showcase

16:15 – 16:45 Pragmatic Policy — Making Your Security Policy Useful Rob McMillan

The Availability Implications for Digital Business John Morency

The Cyber Kill Chain craig Lawson Ask the Analyst: Changing User Behaviour — Challenges and Best Practices Facilitator: chris Byrnes

Ask the Practitioner

17:00 – 17:45 Guest Keynote: Dealing with the Dark Side christine nixon

17:45 – 19:15 Networking Reception in the Solution Showcase

07:30 – 16:45 Registration

08:30 – 09:15 Be Agile Not Fragile — Use Threat Intelligence Services to Defend Yourself Rob McMillan

Winning the Data Breach War with User Behavioral Analytics Jonathan care

Future-Proofing IAM Gregg Kreizman 08:30 – 10:00 Workshop: I’ve Already Invested in PKI — How can I Reuse it for Mobility and Internet of Things? Facilitator: Anne Robins

Roundtable: Third Party Security Audits — A Slippery Slope? Facilitator: Khushbu Pratap

09:30 – 10:00 Solution Provider Sessions

10:00 – 10:30 Refreshment Break in the Solution Showcase

10:30 – 11:15 The Path to High Impact Security Awareness Rob McMillan

End-User Case StudyPlease refer to website for updates

Gartner's Adaptive Security Achitecture — New Approaches for Advanced and Insider Threats craig Lawson

10:30 – 12:00 Workshop: IT Security — Planning a Self Audit Facilitator: Khushbu Pratap

Roundtable: Comparing Best Practices for Cloud Risk Management Facilitator: Jay Heiser

Roundtable: Developing an Information Security and Risk Management Strategy Facilitator: Jeffrey Wheatman

Roundtable: Why Social Media Risks Are Skyrocketing and What You Can Do To Protect Your Organization Facilitator: John Wheeler

11:30 – 12:00 Solution Provider Sessions

12:00 – 13:15 Lunch in the Solution Showcase

13:15 – 13:45 Protecting Your House on the Prairie — Security Strategy for the SMB Enterprise tom scholtz and Rob McMillan

The State of E-Discovery in 2015 and Beyond Jonathan care

Operational Technology Security is Not Just for Industries Anymore Earl Perkins

Ask the Analyst: Never Waste a Crisis Facilitator: christian Byrnes

Ask the Practitioner

14:00 – 14:45 The New CISO's Crucial First 100 Days tom scholtz

The Gartner Risk Treatment Model — Fixing Accountability and Risk Sign-off Jay Heiser

End-User Case StudyPlease refer to website for updates

Roundtable: How Do You Know When Your Security and Risk Program is Failing? Facilitator: John Wheeler

Roundtable: Managed Services Solution Providers (MSSP) Success and Failure TipsFacilitator: Anton chuvakin

14:45 – 15:15 Refreshment Break in the Solution Showcase

15:15 – 16:00 Guest Keynote: Human Risk Management —The Key to Organizational Success David turner

16:00 – 16:45 Gartner Closing Keynote: Cybersecurity Scenario 2020 — The Impact of Digital Business on Security christian Byrnes

16:45 – 17:00 Closing Remarks Rob McMillan

Mo

nday

24 A

ug

us

t 2

015

Tues

day

25 A

ug

us

t 2

015

#GartnerSEC

Page 9: Gartner Security & Risk Management Summit 2015€¦ · 2 Gartner Security & Risk Management Summit 2015 ... The annual Gartner Security & Risk Management Summit equips security and

Visit gartner.com/ap/security for updates and to register! 9

07:30 – 19:15 Registration

08:30 – 09:15 Tutorial: Use a Vendor Risk Management Framework to Mitigate Regulatory, Compliance, Security and Performance Issues christopher Ambrose

Tutorial: How To Build A Globally Legal and Successful BYOD Program Rob smith

Tutorial: Secure Use of AWS and Azure — Comparison and Best Practices Jay Heiser

Tutorial: Mind the SaaS Security Gaps craig Lawson

09:30 – 10:15 Gartner Opening Keynote: Manage Risk and Deliver Security in a Digital World Gregg Kriezman, Earl Perkins and tom scholtz

10:15 – 10:30 Welcome to the Gartner Security & Risk Management Summit 2015 Rob McMillan

10:30 – 11:00 Industry Panel Discussion Moderators: Anne Robins and craig Lawson

11:00 – 11:30 Refreshment Break in the Solution Showcase

TRaCKS a. Chief Information Security Officer Program (CISO)

B. Risk Management and Compliance Program

C. Security: Technology and Operations Program

Workshops, analyst-User Roundtables, ask the analyst Roundtablesand ask the Practitioner Sessions

11:30 – 12:15 Top Trends and Takeways for Cybersecurity Earl Perkins

Digital Business and Your New Relationship with Risk christian Byrnes

Mobile Security Threats and Trends, 2015 Rob smith

11:30 – 13:00 Workshop: Information Security Metrics: Building from the Business Down Facilitator: Jeffrey Wheatman

Roundtable: Threat Intelligence — Whys and Hows Facilitator: Anton chuvakin

12:30 – 13:00 People-Centric Security — Experiences and Lessons Learned tom scholtz

Challenging Decisions — Third Party Security Assurance Landscape Khushbu Pratap

Leveraging Social Identities to Enable Digital Business Anne Robins

Ask the Analyst: Cloud-Based Recovery Management — DRaaS Facilitator: John Morency

13:00 – 14:15 Lunch in the Solution Showcase

14:15 – 15:00 End-User Case StudyPlease refer to website for updates

What's New and Hot in GRC? John Wheeler Security Incident Response in the Age of the APT Anton chuvakin

14:15 – 15:45 Workshop: Building a Constituent-Aware IAM Infrastructure Facilitator: Gregg Kreizman

Roundtable: Information Security Metrics Facilitator: Jeffrey Wheatman

Roundtable: What Risks are Microvendors Introducing to Your Enterprise? Facilitator: christopher Ambrose

Roundtable: Securing Mobile Payments and Mobile Wallets Facilitator: Rob smith

15:15 – 15:45 Solution Provider Sessions

15:45 – 16:15 Refreshment Break in the Solution Showcase

16:15 – 16:45 Pragmatic Policy — Making Your Security Policy Useful Rob McMillan

The Availability Implications for Digital Business John Morency

The Cyber Kill Chain craig Lawson Ask the Analyst: Changing User Behaviour — Challenges and Best Practices Facilitator: chris Byrnes

Ask the Practitioner

17:00 – 17:45 Guest Keynote: Dealing with the Dark Side christine nixon

17:45 – 19:15 Networking Reception in the Solution Showcase

07:30 – 16:45 Registration

08:30 – 09:15 Be Agile Not Fragile — Use Threat Intelligence Services to Defend Yourself Rob McMillan

Winning the Data Breach War with User Behavioral Analytics Jonathan care

Future-Proofing IAM Gregg Kreizman 08:30 – 10:00 Workshop: I’ve Already Invested in PKI — How can I Reuse it for Mobility and Internet of Things? Facilitator: Anne Robins

Roundtable: Third Party Security Audits — A Slippery Slope? Facilitator: Khushbu Pratap

09:30 – 10:00 Solution Provider Sessions

10:00 – 10:30 Refreshment Break in the Solution Showcase

10:30 – 11:15 The Path to High Impact Security Awareness Rob McMillan

End-User Case StudyPlease refer to website for updates

Gartner's Adaptive Security Achitecture — New Approaches for Advanced and Insider Threats craig Lawson

10:30 – 12:00 Workshop: IT Security — Planning a Self Audit Facilitator: Khushbu Pratap

Roundtable: Comparing Best Practices for Cloud Risk Management Facilitator: Jay Heiser

Roundtable: Developing an Information Security and Risk Management Strategy Facilitator: Jeffrey Wheatman

Roundtable: Why Social Media Risks Are Skyrocketing and What You Can Do To Protect Your Organization Facilitator: John Wheeler

11:30 – 12:00 Solution Provider Sessions

12:00 – 13:15 Lunch in the Solution Showcase

13:15 – 13:45 Protecting Your House on the Prairie — Security Strategy for the SMB Enterprise tom scholtz and Rob McMillan

The State of E-Discovery in 2015 and Beyond Jonathan care

Operational Technology Security is Not Just for Industries Anymore Earl Perkins

Ask the Analyst: Never Waste a Crisis Facilitator: christian Byrnes

Ask the Practitioner

14:00 – 14:45 The New CISO's Crucial First 100 Days tom scholtz

The Gartner Risk Treatment Model — Fixing Accountability and Risk Sign-off Jay Heiser

End-User Case StudyPlease refer to website for updates

Roundtable: How Do You Know When Your Security and Risk Program is Failing? Facilitator: John Wheeler

Roundtable: Managed Services Solution Providers (MSSP) Success and Failure TipsFacilitator: Anton chuvakin

14:45 – 15:15 Refreshment Break in the Solution Showcase

15:15 – 16:00 Guest Keynote: Human Risk Management —The Key to Organizational Success David turner

16:00 – 16:45 Gartner Closing Keynote: Cybersecurity Scenario 2020 — The Impact of Digital Business on Security christian Byrnes

16:45 – 17:00 Closing Remarks Rob McMillan

Agenda as of 5 May 2015, and subject to change

When attending this event, please refer to the agenda handout provided or the Gartner Events mobile app for the most up to date session and location information.

Each Gartner session has been identified with icons to help you locate the sessions that give you the most value.

Maturity Level Foundational: Offers the necessary understanding and first steps to those in the early stages of initiatives

Advanced: Uses complex concepts requiring foundational knowledge and prior experience to take initiatives to the next level

Focus

Tactical: Provides tactical information that can be used straightaway, with a focus on how-to’s, do’s and don’ts and best practices

Strategic: Focuses on the strategic insight supporting the development and implementation of an action plan

Perspective

Business: Targets business leaders or IT professionals who need to understand the challenges and opportunities from a business organizational or cultural perspective

Technology: Aids IT professionals who need to understand the challenges and opportunities from a technology perspective

Agenda key

Page 10: Gartner Security & Risk Management Summit 2015€¦ · 2 Gartner Security & Risk Management Summit 2015 ... The annual Gartner Security & Risk Management Summit equips security and

10 Gartner Security & Risk Management Summit 2015

Solution Showcase

Premier sponsors

Platinum sponsors

Silver sponsors

Sponsorship opportunities

Explore cutting-edge IT solutions from top providers; plus, participate in solution provider sessions, networking reception and more.

For further information about sponsoring this event:

Dan GiaccoTel: +61 438 874 149Email: [email protected]

Maria KamberidisTel: +61 427 327 222Email: [email protected]

Sponsors as of 5 May 2015, and subject to change

Media partnersPavilion

#GartnerSEC

Page 11: Gartner Security & Risk Management Summit 2015€¦ · 2 Gartner Security & Risk Management Summit 2015 ... The annual Gartner Security & Risk Management Summit equips security and

Visit gartner.com/ap/security for updates and to register! 11

Registration and pricing

3 ways to register

Web: gartner.com/ap/securityEmail: [email protected]: +61 2 8569 7622

Save $400 before 26 June

Early-bird price: A$2,475 exc. gstStandard price: A$2,875 exc. GSTPublic sector price*: $2,375 exc. GST

*Public-Sector: National Government, State and Local Government, Public Administration

Early-bird discount

Gartner event tickets

We accept one Gartner Summit ticket for payment. If you are a client with questions about tickets, please contact your sales representative or call +61 2 8569 7622

Hilton Sydney488 George StreetSydney, NSW 2000, Australia

Phone: +61 2 9266 2000

www.hilton.com/sydney

Gartner hotel room rate:$299 per night at the Hilton Sydney

Summit venue

Money-back guarantee

If you are not completely satisfi ed with this Gartner conference, please notify us in writing within 15 days of the conference and we will refund 100% of your registration fee.

Earn CPE CreditsRegistered participants can earn CPE credits towards our association partners’ certifi cation programs. Certifi cates will be available at the event to complete.Please see the website for further details.

Group Rate DiscountMaximize learning by participating together in relevant sessions or splitting up to cover more ground, sharing your session take-aways later.

Complimentary registrations

• 1 for every 3 paid registrations

• 2 for every 5 paid registrations

• 3 for every 7 paid registrations

For more information, email [email protected] or contact your Gartner account manager.

Gartner events deliver what you needIn addition to four tracks of the latest Gartner analyst research, keynote speakers and case studies, your Summit registration fee includes complimentary access to these special features:

• One analyst one-on-one

• Analyst-user roundtables

• Workshops

• Solution Showcase

• Networking breakfasts, lunches and receptions

• Year-round access to videotaped analyst sessions from the North America event*

Online pre-registration is required for one-on-ones, workshops and roundtables. Reserve your place early, as space is limited.

Event Approval ToolsFor use pre-event, on-site and post-event, our Event Approval Tools make it easy to demonstrate the substantial value of your Gartner event experience to your manager. They include a customizable letter, cost-benefi t analysis and more.

Visit gartner.com/ap/security for details.

Gartner Events On Demand Online access for one year*Provides year-round access to videotaped analyst sessions. For details, visit gartnereventsondemand.com

Early-bird offer

Secure Early Bird Research: The Legality and Ethics of IoT and Employee Monitoring by Andrew Walls, Managing VP, Gartner

Page 12: Gartner Security & Risk Management Summit 2015€¦ · 2 Gartner Security & Risk Management Summit 2015 ... The annual Gartner Security & Risk Management Summit equips security and

© 2015 Gartner, Inc. and/or its affi liates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affi liates. For more information, email [email protected] or visit gartner.com.

24 – 25 august | Hilton Sydney | gartner.com/ap/security

Gartner Security & Risk Management Summit 2015

Gartner Security & Risk Management Summit8 – 11 June | National Harbor, MD

Gartner Security & Risk Management Summit13 – 15 July | Tokyo, Japan

Gartner Security & Risk Management Summit10 – 11 August | Sao Paulo, Brazil

Gartner Security & Risk Management Summit14 – 15 September | London, U.K.

Gartner Security & Risk Management Summit2 – 3 November | Dubai, U.A.E.

Gartner Identity & Access Management Summit7 – 9 December | Las Vegas, NV

Gartner Security Summits around the globe

Gartner Security & Risk Management Summit is on Twitter and LinkedIn. #GartnerSEC

Gartner Security & Risk Management (Xchange)

Join the conversation!

United Kingdom14 – 15 September

United States7 – 9 December

United States8 – 11 June

Brazil10 – 11 August

Dubai2 – 3 November

Australia24 – 25 August

Japan13 – 15 July

3 ways to registerWeb: gartner.com/ap/security

Email: [email protected]

Telephone: +61 2 8569 7622

Register now and save $400

Early-bird discount expires 26 June

Early-bird discount