12
EARLY-BIRD DISCOUNT Save 6,500 by 1 July 2016 Gartner Security & Risk Management Summit 2016 1 – 2 September | Mumbai, India gartner.com/in/security Hot topics • Data Loss Prevention • Internet of Things, Network and End Point Security Challenges • Governance, Risk and Compliance • Crisis/Incident Command and Management • Recovery from a Targeted Cyberattack • Enabling a Safer Cloud • Mobile Security for Digital Business • Identity and Access Management • Business Continuity Management

Gartner Security & Risk Management Summit 2016 · PDF file2 #GartnerSEC Gartner Security & Risk Management Summit 2016 ... share experiences Solution Showcase ... 8 #GartnerSEC Gartner

  • Upload
    hadien

  • View
    225

  • Download
    2

Embed Size (px)

Citation preview

Page 1: Gartner Security & Risk Management Summit 2016 · PDF file2 #GartnerSEC Gartner Security & Risk Management Summit 2016 ... share experiences Solution Showcase ... 8 #GartnerSEC Gartner

Visit gartner.com/in/security for updates and to register! 1

EARLY-BIRD DISCOUNT Save 6,500 by 1 July 2016

Gartner Security & Risk Management Summit 20161 – 2 September | Mumbai, Indiagartner.com/in/security

Hot topics

• Data Loss Prevention

• Internet of Things, Network and End Point Security Challenges

• Governance, Risk and Compliance

• Crisis/Incident Command and Management

• Recovery from a Targeted Cyberattack

• Enabling a Safer Cloud

• Mobile Security for Digital Business

• Identity and Access Management

• Business Continuity Management

Page 2: Gartner Security & Risk Management Summit 2016 · PDF file2 #GartnerSEC Gartner Security & Risk Management Summit 2016 ... share experiences Solution Showcase ... 8 #GartnerSEC Gartner

2 Gartner Security & Risk Management Summit 2016#GartnerSEC

• Gain insights to stay ahead of expanding scopes of responsibility and threats

• Align security and risk strategies with enterprise objectives

• Apply the latest techniques to tackle risks in cloud, OT, IoT and IT

• Maximize enterprise ROI by using the latest BCM and enterprise resilience practices

• Build a culture that drives security performance through employee engagement

Key benefi ts

Build Trust and Resilience at the Speed of Business

The new digital business environment offers huge potential for organizations to transform the way they deliver services and products. However, in the rush to innovate, you must remain cognizant of the risks resulting from this innovation while continuing to enable business aspirations. Increasing integration of IT, OT and IoT pose unprecedented challenges to risk and security leaders.

Building trust and resilience are key to seizing opportunities and reducing risks. You need to challenge convention and consider new operating models to remain relevant.

Gartner’s 2nd annual Security & Risk Management Summit will provide you with the proven practices and strategies that you need to maintain cost effective security and risk programs in order to support digital business and drive enterprise success.

Page 3: Gartner Security & Risk Management Summit 2016 · PDF file2 #GartnerSEC Gartner Security & Risk Management Summit 2016 ... share experiences Solution Showcase ... 8 #GartnerSEC Gartner

Visit gartner.com/in/security for updates and to register! 3

What’s new for 2016• CISO track – Content and networking for CISOs to help them infl uence their

peers, report to the board, and become better business leaders

• All new “State of the Market” series giving the latest Gartner assessment of the different security and risk technology spaces, and where they are heading

• New 2016 Magic Quadrants: IT Risk Management, Identity as a Service, Enterprise Mobility Management Suites, Enterprise Network Firewall

• New Industry Forums (Financial Services, Government) with dedicated content and networking opportunities.

• Brand new Gartner analysts never featured at the event including:

• Peter Firstbrook (Digital Workplace)

• Steve Riley (Cloud & IoT Security)

• Elizabeth Kim (Managed Secuirty Services)

• Rob Smith (Mobile & Client Platforms)

• Chief Information Security Offi cers (CISO)

• Infrastructure/Operational Technology Managers

• Compliance Managers/Fraud Managers

• Security Architects/Enterprise Architects

• IT Security Managers

• Chief Privacy Offi cers

• Chief Risk Offi cers

• Risk Managers

Who should attend

Page 4: Gartner Security & Risk Management Summit 2016 · PDF file2 #GartnerSEC Gartner Security & Risk Management Summit 2016 ... share experiences Solution Showcase ... 8 #GartnerSEC Gartner

4 Gartner Security & Risk Management Summit 2016#GartnerSEC

KeynotesGartner keynotes

Gartner Opening Keynote: Build Trust and Resilience at the Speed of Business The new digital business environment offers huge potential for organizations to transform the way they deliver services and products. However, in the rush to innovate, you must remain cognizant of the risks resulting from it. Increasing integration of IT, OT and IoT pose unprecedented challenges to risk and security leaders. You need to challenge convention and consider new security models to remain relevant.

Gartner Closing Keynote: Cybersecurity and Risk Management in Digital Business (Signature Series) Influence scales, control does not. IT risk and security must not seek to impose its will on the business, but must become based on risk and trust. CIOs must effectively relate IT risk and security to business outcomes and engage non-IT executives. The goal is effective decision making that creates appropriate levels of security and IT risk that balances the need to protect with the needs to run the business. Using the 6 principles of resilience will support digital business transformation.

Partha Iyengar VP & Gartner Fellow

Ruggero Contu Research Director

Peter Firstbrook Research VP

Jie Zhang Research Director

Ruggero Contu Research Director

Page 5: Gartner Security & Risk Management Summit 2016 · PDF file2 #GartnerSEC Gartner Security & Risk Management Summit 2016 ... share experiences Solution Showcase ... 8 #GartnerSEC Gartner

Visit gartner.com/in/security for updates and to register! 5

Meet the analystsManjunath BhatResearch Director

Rajpreet KaurSr Research Analyst

Peter FirstbrookResearch VP

Steve RileyResearch Director

Rob SmithResearch Director

Ruggero ContuResearch Director

Elizabeth KimSr Research Analyst

John GirardVP Distinguished Analyst

Tom ScholtzVP & Gartner Fellow

Roberta J. WittyResearch VP

Sid DeshpandePrincipal Research Analyst

Ganesh RamamoorthyResearch VP

Partha IyengarVP & Gartner Fellow

Anmol SinghPrincipal Research Analyst

Jie ZhangResearch Director

• Mobile and Endpoint Strategies

• Mobile Application Strategies

• Security and Risk Management Leaders

• Network and Gateway Security

• Information Security Management Program

• Mobile and Endpoint Strategies

• Cloud Computing

• Mobile and Endpoint Strategies

• Product Strategy

• Market and Competitive Intelligence Management

• Marketing, Sales and Channel Effectiveness

• Mobile and Endpoint Strategies

• Market and Competitive Intelligence Management

• New Market Opportunities

• Security and Risk Management Leaders

• Mobile and Endpoint Strategies

• Security and Risk Management Leaders

• Business Continuity Management

• Crisis Management

• Disaster Recovery

• Market and Competitive Intelligence Management

• New Market Opportunities

• Security and Risk Management Leaders

• Positioning and Messaging

• Go-to-Market Planning

• Positioning and Messaging

• Market and Competitive Intelligence Management

• Product Strategy

• Business and IT Strategy Alignment

• ITScore — CIO and Enterprise

• Bimodal Business/Bimodal IT

• IAM Strategy and Program Management

• Privileged Access Management

• Security and Privacy

• IoT Security

• Security and Risk Management Leaders

• Infrastructure and Operations Leaders

Book your Analyst One-on-One — your private consultation with a Gartner analyst

Many attendees tell us that an analyst one-on-one meeting is worth the price of admission, all by itself.

Book a private consultation on-site with a Gartner analyst to receive tailor-made advice that you can apply to your role and organization.

Page 6: Gartner Security & Risk Management Summit 2016 · PDF file2 #GartnerSEC Gartner Security & Risk Management Summit 2016 ... share experiences Solution Showcase ... 8 #GartnerSEC Gartner

6 Gartner Security & Risk Management Summit 2016#GartnerSEC

A. CISO as Business Leader

Hot topics include:

• Good constant governance is critical part of the CISO’s role

• Build more effective communication strategies — learn to speak business to the business

• Understand how dynamic bimodal IT has changed the risk and security landscape

• Developing more effective and relevant measures and metrics to demonstrate value

• Leveraging and improving CISO soft skills

• What does the future of security look like and what should CISOs do to prepare

B. Building Trust and Resilience With More Agile Security

Hot topics include:

• Understanding the changing threat landscape and how it impacts cybersecurity

• How to enable a safer Use of Cloud

• Implementing and improving mobile security to support digital business

• Protecting critical Data

• Emerging security technologies

• IoT Security

• Overcoming network and endpoint security challenges

• Building a resilient infrastructure with better attack detection and remediation

C. Leverage Risk Management to Underpin the Digital Business Transition

Hot topics include:

• What has transpired in risk management when data and processes being moved into the cloud

• Impact of important regulatory changes on global business operations

• New responsibilities in risk management that allow risk managers to stay competitive and innovative

• New technologies that can facilitate managing digital risks

• How to partner with business leadership and gain their support as well as necessary resources to managing digital risks

• How to consolidate risk areas and components in order to form an integrated risk management program

Plan your experienceCustomize your agenda

Agenda tracks

Gartner Events Navigator AppGartner Events Navigator helps you organize, view and custom-create an agenda based on:

• Date and time

• Track

• Analyst/speaker profi les

• Session descriptions

• Key initiatives

• Vertical industries

Visit gartner.com/in/security and click the “Event Agenda” tab or download the Gartner Events mobile app (iPhone®, iPad® and Android™ compatible)

Page 7: Gartner Security & Risk Management Summit 2016 · PDF file2 #GartnerSEC Gartner Security & Risk Management Summit 2016 ... share experiences Solution Showcase ... 8 #GartnerSEC Gartner

Visit gartner.com/in/security for updates and to register! 7

Analyst interaction Network with peers

Meet solution providers

Analyst one-on-one meeting A complimentary consultation with a Gartner analyst of your choice

Analyst-user roundtables* Moderated by Gartner analysts for exchanging ideas and best practices with your peers

Workshops* Small-scale and interactive; drill down on specific topics with a how-to focus

* Space is limited and pre-registration is required. Limited to end-user organizations only.

Solution Showcase Explore cutting-edge IT solutions from top providers

Solution provider sessions Exhibitors share their insights on the latest products and services

End-user case studies Learn about recent implementations firsthand, with an opportunity for Q&A with the IT and business executives leading the initiative

Ask the practitioner roundtables* These roundtable discussions, led by your peer, will enable you to interact with others facing the same challenges to discuss best practices and share experiences

Solution Showcase reception Connect with peers in similar roles who face similar challenges, at the networking reception on the Solution Showcase designed to build relationships and facilitate the meaningful exchange of ideas and information

Page 8: Gartner Security & Risk Management Summit 2016 · PDF file2 #GartnerSEC Gartner Security & Risk Management Summit 2016 ... share experiences Solution Showcase ... 8 #GartnerSEC Gartner

8 Gartner Security & Risk Management Summit 2016#GartnerSEC

07:30 Registration

08:00 – 08:30 Tutorial: Critical Capabilities for High Security Mobility Management Rob Smith Tutorial: Balance Employee Engagement and Security Needs of the Digital Workplace Manjunath Bhat

09:00 – 10:00 Gartner Opening Keynote: Build Trust and Resilience at the Speed of Business Peter Firstbrook, Jie Zhang and Ruggero Contu

10:00 – 10:30 Refreshment Break in the Solution Showcase

TRACKS A. CISO as Business Leader B. Building Trust and Resilience With More Agile Security

C. Leverage Risk Management to Underpin the Digital Business Transition

Workshops Analyst-User Roundtables

10:30 – 11:15 Top Security Predictions/SPAs 2016 Partha Iyengar

State of Cloud Security 2016 Steve Riley

Put Citizen IT App Development To Work, Safely and Securely John Girard

10:30 – 12:00 Workshop: Make the Business Case and Obtain BCM Program Executive SponsorshipRoberta Witty

10:30 – 11:30 Roundtable:Integrative Approaches to Authentication, Identity Proofing, Fraud Detection and Behavior Analytics Anmol Singh

11:30 – 12:15 The New CISO's Crucial First 100 Days Tom Scholtz

State of Data Security 2016 Sid Deshpande

Market Overview to Corporate Compliance and Oversight Elizabeth Kim

12:15 – 13:30 Networking Lunch in the Solution Showcase 13:00 – 13:20 Magic Quadrant for IT Risk Management Elizabeth Kim

13:30 – 14:15 How to Keep Your Legal Counsel and Compliance Officer Happy When Migrating to Microsoft Office 365 Jie Zhang

Network Security for Indian Enterprises in 2016 Rajpreet Kaur

Signature Series: State of Business Resilience 2016 Roberta Witty

13:30 – 15:00 Workshop:How to Manage the Identity of Things in the Internet of ThingsGanesh Ramamoorthy

14:30 – 15:00 Solution Provider Sessions 14:15 – 15:15 Roundtable:How Much Security Does the Cloud Provide? Steve Riley

15:00 – 15:15 15:00 – 15:20 Magic Quadrant and Critical Capabilities: Identity as a Service Manjunath Bhat

15:15 – 16:00 What Does Securing the IoT Really Mean? Ganesh Ramamoorthy

Next-Generation Endpoint Protection Peter Firstbrook

Take a Risk-Based Approach to Selecting New Authentication Methods (But Don't Neglect UX) Anmol Singh

15:30 – 17:00 Workshop:Creating Your 15-Minute Risk Management Presentation for the BoardTom Scholtz

15:30 – 16:30 Roundtable:Threat Intelligence, is there any value for your security practice Ruggero Contu

16:15 – 16:45 Solution Provider Sessions

17:15 – 17:45 To the Point: Hype Cycle for Governance, Risk and Compliance Technologies Elizabeth Kim

To the Point: Mobile Security: Myth vs. Reality Rob Smith

To the Point How to be Secure in Amazon Web Services Steve Riley

17:45 – 18:15 Refreshment Break in the Solution Showcase 17:50 – 18:10 Magic Quadrant and Critical Capabilities: Identity as a Service Manjunath Bhat

18:15 – 19:00 Guest Keynote:

19:00 – 21:00 Solution Showcase Reception and Dinner

Thur

sday

1 S

EP

TEM

BE

R 2

016

08:00 Registration

09:00 – 09:45 Guest Keynote:

09:45 – 10:15 Refreshment Break in the Solution Showcase 09:50 – 10:10 Magic Quadrant and Critical Capabilities: Enterprise Mobility Management Suites Manjunath Bhat

10:15 – 11:00 Gartner Essentials: Manage Risk and Security in Bimodal IT Partha Iyengar

Top Cybersecurity Trends for 2016 — 2017 Peter Firstbrook

Managing an Aggressive Business Disruption Cybersecurity Attack Roberta Witty

10:15 – 11:15 Roundtable:Security Strategy Planning Best Practices Tom Scholtz

11:15 – 11:45 Solution Provider Sessions

12:00 – 12:45 Emerging Approaches to Securing the IoT Infrastructure Ganesh Ramamoorthy

Information-Centric Mobile Security: Your Data Can Move Without Leaking John Girard

Roadmap/State of IAM 2016 Anmol Singh

12:00 – 13:30 Workshop: Creating a Balanced Mobile Strategy With BYOD and CYOD at the CoreRob Smith

12:00 – 13:00 Roundtable:When Does the Clock Start? Roberta Witty

13:00 – 13:30 To the Point: Five Tips for Better Security and Risk Management Communication Jie Zhang

To the Point: Security 2020 — The Future of Cybersecurity Sid Deshpande

To the Point: How to be Secure in Microsoft Azure Steve Riley

13:30 – 14:30 Networking Lunch in the Solution Showcase 13:40 – 14:00 Magic Quadrant and Critical Capabilities: Enterprise Network Firewall Rajpreet Kaur

14:30 – 15:00 Case Study Case Study Case Study 14:30 – 16:00 Workshop:How to Secure your Operational TechnologyGanesh Ramamoorthy15:15 – 16:00 Articulating the Business Value of Information

Security Tom ScholtzState of Mobile Security John Girard

How to Outsource Security Functions Effectively Sid Deshpande

15:15 – 16:15 Roundtable:Is Your EMM/MDM Meeting Your Requirements?Rob Smith

16:15 – 16:45 To the Point: Manjunath Bhat

To the Point: Network Security Services and Support Challenges in India Rajpreet Kaur

To the Point: How to Enhance the Security of Office 365 Steve Riley

16:45 – 17:15 Refreshment Break in the Solution Showcase

17:15 – 18:00 Gartner Closing Keynote: Cybersecurity and Risk Management in Digital Business (Signature Series) Ruggero Contu and Partha Iyengar

Frid

ay2

SE

PTE

MB

ER

201

6Agenda at a Glance

Page 9: Gartner Security & Risk Management Summit 2016 · PDF file2 #GartnerSEC Gartner Security & Risk Management Summit 2016 ... share experiences Solution Showcase ... 8 #GartnerSEC Gartner

Visit gartner.com/in/security for updates and to register! 9

07:30 Registration

08:00 – 08:30 Tutorial: Critical Capabilities for High Security Mobility Management Rob Smith Tutorial: Balance Employee Engagement and Security Needs of the Digital Workplace Manjunath Bhat

09:00 – 10:00 Gartner Opening Keynote: Build Trust and Resilience at the Speed of Business Peter Firstbrook, Jie Zhang and Ruggero Contu

10:00 – 10:30 Refreshment Break in the Solution Showcase

TRACKS A. CISO as Business Leader B. Building Trust and Resilience With More Agile Security

C. Leverage Risk Management to Underpin the Digital Business Transition

Workshops Analyst-User Roundtables

10:30 – 11:15 Top Security Predictions/SPAs 2016 Partha Iyengar

State of Cloud Security 2016 Steve Riley

Put Citizen IT App Development To Work, Safely and Securely John Girard

10:30 – 12:00 Workshop: Make the Business Case and Obtain BCM Program Executive SponsorshipRoberta Witty

10:30 – 11:30 Roundtable:Integrative Approaches to Authentication, Identity Proofing, Fraud Detection and Behavior Analytics Anmol Singh

11:30 – 12:15 The New CISO's Crucial First 100 Days Tom Scholtz

State of Data Security 2016 Sid Deshpande

Market Overview to Corporate Compliance and Oversight Elizabeth Kim

12:15 – 13:30 Networking Lunch in the Solution Showcase 13:00 – 13:20 Magic Quadrant for IT Risk Management Elizabeth Kim

13:30 – 14:15 How to Keep Your Legal Counsel and Compliance Officer Happy When Migrating to Microsoft Office 365 Jie Zhang

Network Security for Indian Enterprises in 2016 Rajpreet Kaur

Signature Series: State of Business Resilience 2016 Roberta Witty

13:30 – 15:00 Workshop:How to Manage the Identity of Things in the Internet of ThingsGanesh Ramamoorthy

14:30 – 15:00 Solution Provider Sessions 14:15 – 15:15 Roundtable:How Much Security Does the Cloud Provide? Steve Riley

15:00 – 15:15 15:00 – 15:20 Magic Quadrant and Critical Capabilities: Identity as a Service Manjunath Bhat

15:15 – 16:00 What Does Securing the IoT Really Mean? Ganesh Ramamoorthy

Next-Generation Endpoint Protection Peter Firstbrook

Take a Risk-Based Approach to Selecting New Authentication Methods (But Don't Neglect UX) Anmol Singh

15:30 – 17:00 Workshop:Creating Your 15-Minute Risk Management Presentation for the BoardTom Scholtz

15:30 – 16:30 Roundtable:Threat Intelligence, is there any value for your security practice Ruggero Contu

16:15 – 16:45 Solution Provider Sessions

17:15 – 17:45 To the Point: Hype Cycle for Governance, Risk and Compliance Technologies Elizabeth Kim

To the Point: Mobile Security: Myth vs. Reality Rob Smith

To the Point How to be Secure in Amazon Web Services Steve Riley

17:45 – 18:15 Refreshment Break in the Solution Showcase 17:50 – 18:10 Magic Quadrant and Critical Capabilities: Identity as a Service Manjunath Bhat

18:15 – 19:00 Guest Keynote:

19:00 – 21:00 Solution Showcase Reception and Dinner

08:00 Registration

09:00 – 09:45 Guest Keynote:

09:45 – 10:15 Refreshment Break in the Solution Showcase 09:50 – 10:10 Magic Quadrant and Critical Capabilities: Enterprise Mobility Management Suites Manjunath Bhat

10:15 – 11:00 Gartner Essentials: Manage Risk and Security in Bimodal IT Partha Iyengar

Top Cybersecurity Trends for 2016 — 2017 Peter Firstbrook

Managing an Aggressive Business Disruption Cybersecurity Attack Roberta Witty

10:15 – 11:15 Roundtable:Security Strategy Planning Best Practices Tom Scholtz

11:15 – 11:45 Solution Provider Sessions

12:00 – 12:45 Emerging Approaches to Securing the IoT Infrastructure Ganesh Ramamoorthy

Information-Centric Mobile Security: Your Data Can Move Without Leaking John Girard

Roadmap/State of IAM 2016 Anmol Singh

12:00 – 13:30 Workshop: Creating a Balanced Mobile Strategy With BYOD and CYOD at the CoreRob Smith

12:00 – 13:00 Roundtable:When Does the Clock Start? Roberta Witty

13:00 – 13:30 To the Point: Five Tips for Better Security and Risk Management Communication Jie Zhang

To the Point: Security 2020 — The Future of Cybersecurity Sid Deshpande

To the Point: How to be Secure in Microsoft Azure Steve Riley

13:30 – 14:30 Networking Lunch in the Solution Showcase 13:40 – 14:00 Magic Quadrant and Critical Capabilities: Enterprise Network Firewall Rajpreet Kaur

14:30 – 15:00 Case Study Case Study Case Study 14:30 – 16:00 Workshop:How to Secure your Operational TechnologyGanesh Ramamoorthy15:15 – 16:00 Articulating the Business Value of Information

Security Tom ScholtzState of Mobile Security John Girard

How to Outsource Security Functions Effectively Sid Deshpande

15:15 – 16:15 Roundtable:Is Your EMM/MDM Meeting Your Requirements?Rob Smith

16:15 – 16:45 To the Point: Manjunath Bhat

To the Point: Network Security Services and Support Challenges in India Rajpreet Kaur

To the Point: How to Enhance the Security of Office 365 Steve Riley

16:45 – 17:15 Refreshment Break in the Solution Showcase

17:15 – 18:00 Gartner Closing Keynote: Cybersecurity and Risk Management in Digital Business (Signature Series) Ruggero Contu and Partha Iyengar

When attending this event, please refer to the agenda handout provided or the Gartner Events mobile app for the most up to date session and location information.

Agenda as of 1 June 2016 and subject to change

Page 10: Gartner Security & Risk Management Summit 2016 · PDF file2 #GartnerSEC Gartner Security & Risk Management Summit 2016 ... share experiences Solution Showcase ... 8 #GartnerSEC Gartner

10 Gartner Security & Risk Management Summit 2016#GartnerSEC

Solution Showcase Develop a “shortlist” of technology and service providers. Get exclusive access to client case studies, product roadmaps, and demos. Talk to solution experts who can answer your specific questions.

Sponsorship opportunities

For further information about sponsoring this event:

Email: [email protected]

Tel: +91 22 6613 2140

Platinum exhibitors

Silver exhibitors

Exhibitor list as of 1 June 2016 and subject to change

Page 11: Gartner Security & Risk Management Summit 2016 · PDF file2 #GartnerSEC Gartner Security & Risk Management Summit 2016 ... share experiences Solution Showcase ... 8 #GartnerSEC Gartner

Visit gartner.com/in/security for updates and to register! 11

Registration and pricing

Group rate discountMaximize learning by participating together in relevant sessions or splitting up to cover more ground, sharing your session take-aways later.

Complimentary registrations

• 1 for every 3 paid registrations

• 2 for every 5 paid registrations

• 3 for every 7 paid registrations

For more information, email [email protected] or contact your Gartner account manager.

Gartner events deliver what you needIn addition to three tracks of the latest Gartner analyst research, keynote speakers and case studies, your Summit registration fee includes complimentary access to these special features:

• Analyst one-on-one meeting

• Analyst-user roundtables*

• Workshops*

• Ask the practitioner roundtables*

• Solution Showcase

• Networking breakfasts, lunches and receptions

• Year-round access to videotaped analyst sessions from the North America event

*Space is limited and pre-registration is required. Limited to end-user organizations only.

Terms and conditionsTo view our Gartner events terms and conditions, visit gartner.com/in/security.

Convince your bossAttending a Gartner event can help spur new ideas, fast track project strategy and advance your professional skills. We’ve developed a set of materials that will aid in gaining approval from your manager. For more details, visit gartner.com/in/security.

JW Mariott Mumbai SaharIA Project Road, Chhatrapati Shivaji International Airport, Andheri East,Mumbai, MH, 400 099

Summit venue

Save 6,500 before 1 July 2016Early-bird price: 43,250 plus taxes

Standard price: 49,750 plus taxes

Public sector price: 40,150 plus taxes

3 ways to registerWeb: gartner.com/in/security

Email: [email protected]

Phone: +91 80 2222 2079

Early-bird discount

Gartner event tickets We accept one Gartner Summit ticket or one Gartner Catalyst ticket for payment. If you are a client with questions about tickets, please contact your sales representative or call +91 80 2222 2079.

Page 12: Gartner Security & Risk Management Summit 2016 · PDF file2 #GartnerSEC Gartner Security & Risk Management Summit 2016 ... share experiences Solution Showcase ... 8 #GartnerSEC Gartner

Gartner Security & Risk Management Summit 20161 – 2 September | Mumbai, India | gartner.com/in/security

3 ways to registerWeb: gartner.com/in/security

Email: [email protected]

Phone: +61 2 8569 7622

Gartner Security & Risk Management Summit is on Twitter and LinkedIn.

#GartnerSEC Gartner Security & Risk Management XChange

Join the conversation!

© 2016 Gartner, Inc. and/or its affi liates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affi liates. For more information, email [email protected] or visit gartner.com.

Security & Risk Management Summit13 – 16 June | National Harbor, MD

Security & Risk Management Summit11 – 13 July | Tokyo, Japan

Security & Risk Management Summit2 – 3 August | São Paulo, Brazil

Security & Risk Management Summit 22 – 23 August | Sydney, Australia

Security & Risk Management Summit12 – 13 September | London, U.K.

Identity & Access Management Summit 29 Nov. – 1 Dec. | Las Vegas, NV

Security & Risk Management Summit 31 Oct. – 1 Nov. | Dubai, UAE

Gartner Security & Risk Management Summits around the globe

United Kingdom12 – 13 September

United States29 Nov – 1 Dec

United States13 – 16 June

Brazil2 – 3 August

Dubai31 Oct – 1 Nov

Mumbai1 – 2 September

Australia22– 23 August

Japan11 – 13 July

Register now and save 6,500

Early-bird discount expires 1 July.