12
EARLY-BIRD OFFER! See page 11 for details Gartner Security & Risk Management Summit 2016 22 – 23 August | Hilton Sydney gartner.com/ap/security Hot topics • Cloud Security • Mobile Security • Application Security • Data Security • Security Awareness • Risk Management • Cybersecurity • Internet of Things • Endpoint Security • Identity and Access Management CELEBRATING 10 YEARS Ant Allan Research VP, Gartner

Gartner Security & Risk Management Summit 2016

Embed Size (px)

Citation preview

Page 1: Gartner Security & Risk Management Summit 2016

Visit gartner.com/ap/security for updates and to register! 1

EARLY-BIRD OFFER! See page 11 for details

Gartner Security & Risk Management Summit 201622 – 23 August | Hilton Sydneygartner.com/ap/security

Hot topics

• Cloud Security

• Mobile Security

• Application Security

• Data Security

• Security Awareness

• Risk Management

• Cybersecurity

• Internet of Things

• Endpoint Security

• Identity and Access Management

CELEBRATING 10 YEARS

Ant AllanResearch VP,Gartner

Page 2: Gartner Security & Risk Management Summit 2016

2 Gartner Security & Risk Management Summit 2016#GartnerSEC

• Expanded Agenda with Focus on Security Architecture: A deep dive into the architectures and solutions for security professionals

• Expanded Coverage for Application and Data Security

• “State of the Market” Series: Gartner’s view on the state of industry for security and risk

• Gartner “Essentials”: Core Gartner content that is essential for all security and risk professionals

• Gartner CISO Circle: Exclusive content and networking program for CISOs

What’s new for 2016

Build Trust and Resilience at the Speed of Business

The new digital business environment offers huge potential for organizations to transform the way they deliver services and products. However, in the rush to innovate, you must remain cognizant of the risks resulting from this innovation while continuing to enable business aspirations. Increasing integration of IT, OT and IoT pose unprecedented challenges to risk and security leaders. Building trust and resilience are key to seizing opportunities and reducing risks. You need to challenge convention and consider new operating models to remain relevant.

The 10th annual Gartner Security & Risk Management Summit, 22 – 23 August in Sydney, Australia will provide you with the proven practices and strategies that you need to maintain cost-effective security and risk programs to support digital business and drive enterprise success.

Build the trust and resilience needed to seize opportunities, reduce risks, and deploy new security models.

Page 3: Gartner Security & Risk Management Summit 2016

Visit gartner.com/ap/security for updates and to register! 3

Key benefits• Gain role-specifi c strategies, tools and insights to stay ahead of expanding

scopes of responsibility and increasing threats

• Align security and risk management strategies with enterprise objectives

• Assure compliance with new regulatory, compliance and privacy requirements

• Learn how to apply the latest techniques to tackle risks in cloud, OT, IoT and IT

• Maximize enterprise ROI by using the latest enterprise resilience practices

GARTneR PReDIcTs: By 2019, 30% of chief information security offi cers (CISOs) will adapt risk management practices to support bimodal IT and improve Mode 2 success rates while reducing costs.

• Chief Information Security Offi cer (CISO)

• Chief Risk Offi cer (CRO)

• Chief Privacy Offi cer

• Security Professionals

• Security Technology Professionals

• IT Risk Professionals

• Business Continuity and IT Disaster Recovery Professionals

• Network Security Managers

• Finance, Audit, Legal Risk and Compliance Managers

Who should attend

GARTneR PReDIcTs: By 2019, enterprises will spend over $1.2 billion on application security, doubling the $600 million spent in 2014.

Page 4: Gartner Security & Risk Management Summit 2016

4 Gartner Security & Risk Management Summit 2016#GartnerSEC

Anne Robins Research Director

KeynotesGuest keynotes

Leadership, Influence and Cultural Change We all have a leadership role which differs from the myriad of management tasks that fill our professional lives. Leaders see issues that shape the long term health of the organizations of which they are a part. They identify with those issues. They strive to find a logical and credible path to engender beneficial change. They are able to influence that change through being able to clearly articulate risk and reward. Through their actions they demonstrate their commitment. This address will provide insight as to how key issues are identified, how the language of change is best applied and how the development of an inclusive organizational culture is the foundation for corporate success.

Gartner keynotes

Gartner Opening Keynote: Build Trust and Resilience at the Speed of Business The new digital business environment offers huge potential for organizations to transform the way they deliver services and products. However, in the rush to innovate, you must remain cognizant of the risks resulting from it. Increasing integration of IT, OT and IoT pose unprecedented challenges to risk and security leaders. You need to challenge convention and consider new security models to remain relevant.

Professor Andrew MacLeod Organizational Leader and Former Managing Director of Good Super

Jeffery Wheatman Research Director

Felix Gaehtgens Research Director

Rob McMillan Research Director

Lieutenant General David Morrison AO Australia’s Former Chief of Army and Australian of the Year 2016

Security and Risk Management TrendsDigital business is here to stay, and security is a growing concern in a world that increasingly intertwines business with IT, and the physical with the digital. The evolution of cloud and mobile technologies, as well as the emergence of the Internet of Things (IoT), is elevating the importance of security and risk management as foundations. In fact, these trends are also changing what organizations should incorporate into their information security or cybersecurity programs: Resilience is the foundation for digital business, and it encompasses privacy, safety and reliability. Security and identity technologies and practices are key factors in ensuring that these three objectives can be met. Figure 1 shows five aspects of cybersecurity that should be considered in 2016.

A Holistic Look at Risk — From Practical Experiences to Opportunities How do you attach value to risk? How do you manage public acceptance of risk to the general perception of it? How do you build resilience in difficult environments? How do you drive collaboration to lower risk and improve performance? These are just some of the questions that Andrew MacLeod will address in his keynote presentation, bringing in practical experiences from Rio Tinto, Barrick Gold, NGOs, government agencies and the finance sector.

Gartner Closing Keynote: Security 2020 — The Future of Cybersecurity Digital business is changing the way that IT is planned, delivered and managed. Cybersecurity will change as pressures from the cloud, IT/OT convergence and the Internet of Things become more intense. We continue our work on the intersecting forces that will drive your strategy through 2020.

Page 5: Gartner Security & Risk Management Summit 2016

Visit gartner.com/ap/security for updates and to register! 5

Meet the analysts

Ant AllanResearch VP

@antallan

sid DeshpandePrincipal Research Analyst

@deshpande_sid

Ramon KrikkenResearch VP

Paul ProctorVP Distinguished Analyst

Anne RobinsResearch Director

Toby BussaResearch Director

@tbussa

Felix GaehtgensResearch Director

craig LawsonResearch VP

Brian ReedResearch VP

Tom scholtzVP and Gartner Fellow

Perry carpenterResearch Director

@PerryCarpenter

John GirardVP Distinguished Analyst

earl PerkinsResearch VP

steve RileyResearch Director

Jeffrey WheatmanResearch Director

Rob McMillanResearch Director

sUMMIT cHAIR

Many attendees tell us that an analyst one-on-one meeting is worth the price of admission, all by itself.

Book a private consultation on-site with a Gartner analyst to receive tailor-made advice that you can apply to your role and organization.

• Security and Risk Management Leaders • Information Security Program Management • Risk Management • IT Governance • Information Security Technology and Services

• Identity Assurance Strategy and Planning• Identity Assurance Technology Selection and Implementation• Identity Assurance Policy• User Authentication Policies• Governance of Identity and Access Management

• Market and Competitive Intelligence Management• New Market Opportunities• Security and Risk Management Leaders• Positioning and Messaging• Information Security Technology and Services

• Application and Data Security• Cloud Security and Emerging Technology Security• Mobile and Endpoint Strategies

• Risk Management• Information Security Program Management• Security and Risk Management Leaders• Business Value of IT• IT Governance

• Managing Identities, Privileges, Access and Trust

• Security Monitoring and Operations • Threat and Vulnerability Management

• Identity and Access Management• Identity Governance and Administration • Privileged Access Management• Externalized Authorization Management

• Information Security Technology and Services• Security and Risk Management Leaders

• Information Security Technology and Services• Security and Risk Management Leaders• Offi ce 365, Google Apps for Work and Other Cloud Offi ce

• Information Security Program Management• Risk Management• Business Continuity Management• IT Governance• Security and Risk Management Leaders

• Identity and Access Management • Security and Risk Management Leaders • Information Security Technology and Services • Positioning and Messaging • Go-to-Market Planning

• Mobile and Endpoint Strategies• Enterprise Mobility Management • Remote Access, Security, Telework• Mobile Data Encryption and Protection• Mobile Security Maturity

• Security and Risk Management Leaders• IT and Operational Technology Alignment• Information Security Technology and Services• Audit and Compliance• Smart Grid

• Information Security Technology and Services• Cloud Computing• Offi ce 365, Google Apps for Work and Other Cloud Offi ce

• Information Security Program Management• Security and Risk Management Leaders• Risk Management

Page 6: Gartner Security & Risk Management Summit 2016

6 Gartner Security & Risk Management Summit 2016#GartnerSEC

A Chief Information Security Offi cer (CISO) ProgramThe acceleration toward digital business has presented CISOs with new challenges. They must understand the goals of the business, quickly identify and assess the associated risks, and communicate the relevant risks to the business in business terms. The CISO Program helps you become a recognized business leader, superstar communicator and facilitator, and problem-solver.

HOT TOPIcs:

• Establish and maintain governance

• Manage bimodal risks

• Effective communication

• Demonstrate value

• Improve soft skills

• Prepare for the future

• Identity and access management

B Risk Management and Compliance ProgramDigital risks are increasing as newer data sources and technologies are woven into the fabric of the business. As organizations adopt more cloud technology and explore more digital business opportunities, existing risk management strategies and practices become quickly outdated. This program highlights risks and complexities that you should expect in transitioning to digital business, as well as methods for mitigating these new risk management challenges.

HOT TOPIcs:

• Risk management and the cloud

• The risk manager of tomorrow

• Technologies and digital risk

• Aligning with business goals

• Developing an integrated risk management program

• Threat landscape

c IT Security ProgramGet practical methods and long-term strategies to build a more trusted and resilient environment for digital business and to support an IT organization that’s more agile than ever. Sessions cover emerging trends and state-of-the-art practices and technologies for cloud, mobile, data, application endpoint and network security.

HOT TOPIcs:

• Cybersecurity

• Enabling a safer cloud

• Mobile security for digital business

• Protecting critical data

• Emerging security technologies

• IoT, network and endpoint security challenges

• Building a resilient infrastructure

D NEW! TechInsights: Security ArchitectureThe demands on information security and IT risk practitioners are ever increasing. Not only does the attack and threat landscape change constantly, but organizations’ digital business objectives accelerate the adoption of current and emerging technology. Learn technical and tactical insights that enable risk-aware, business-outcome-focused architectures and solutions.

HOT TOPIcs:

• Addressing cloud serviced adoption risk

• Safety and security in Internet of Things

• Application security

• Improving the measurement and management of risk

• Optimizing SIEM and threat intelligence tools

• Privileged account management

Plan your experienceCustomize your agenda

Agenda tracks

Gartner Events Navigator AppGartner Events Navigator helps you organize, view and custom-create an agenda based on:

• Date and time

• Track

• Analyst/speaker profi les

• Session descriptions

• Key initiatives

• Vertical industries

Visit events.gartner.com/go/SEC10A and click the “Event Agenda” tab or download the Gartner Events mobile app (iPhone®, iPad® and Android™ compatible)

Page 7: Gartner Security & Risk Management Summit 2016

Visit gartner.com/ap/security for updates and to register! 7

Analyst interaction Network with peers

Meet solution providers

Analyst one-on-one meeting A complimentary consultation with a Gartner analyst of your choice

Analyst-user roundtables* Moderated by Gartner analysts for exchanging ideas and best practices with your peers

Workshops* Small-scale and interactive; drill down on specific topics with a how-to focus

* Space is limited and pre-registration is required. Limited to end-user organizations only.

Solution Showcase Explore cutting-edge IT solutions from top providers

Solution provider sessions Exhibitors share their insights on the latest products and services

End-user case studies Learn about recent implementations firsthand, with an opportunity for Q&A with the IT and business executives leading the initiative

Ask the practitioner roundtables* These roundtable discussions, led by your peer, will enable you to interact with others facing the same challenges to discuss best practices and share experiences

Solution Showcase reception Connect with peers in similar roles who face similar challenges, at the networking reception on the Solution Showcase designed to build relationships and facilitate the meaningful exchange of ideas and information

GARTneR PReDIcTs: By 2020, over 50% of all large IoT implementations will require cloud-based security services to operate within acceptable risks.

Earn CPE creditsAs an attendee of this event, any session you participate in that advances your knowledge within that discipline may earn you continuing professional education (CPE) credits from the following organizations:

• (ISC)2 (CISSP, CAP, SSCP and CSSLP)

• ISACA (CISA, CISM and CGEIT)

• DRII (CEAP)

• Business Continuity Institute (BCI) CPD

Anne Robins Research Director, Gartner

Page 8: Gartner Security & Risk Management Summit 2016

8 Gartner Security & Risk Management Summit 2016#GartnerSEC

07:30 – 18:30 Registration

08:30 – 09:15 Tutorial: How to Outsource Security Functions Effectively sid Deshpande Tutorial: How to Build Advanced KRIs: Risk Metrics That Influence Business Decisions Paul Proctor

Tutorial: Keeping SaaS Secure steve Riley Tutorial: TechInsights: Designing Security Into the Internet of Things: A Technical Primer Ramon Krikken

09:30 – 10:15 Gartner Opening Keynote: Build Trust and Resilience at the Speed of Business Anne Robins, Felix Gaehtgens and Jeffrey Wheatman

10:15 – 10:30 Welcome to the Gartner Security & Risk Management Summit 2016 Rob McMillan

10:30 – 11:00 Refreshment Break in the Solution Showcase

TRAcKs A. chief Information security Officer (cIsO) Program

B. Risk Management and compliance Program

c. IT security Program D. TechInsights: security Architecture

Workshops Analyst-User Roundtables andAsk the Practitioner Roundtables

11:00 – 11:45 State of Security Governance 2016 Jeffrey Wheatman

Gartner Essentials: Cybersecurity and Risk Management in Digital Business Paul Proctor

Gartner Essentials: Identity and Access Management In the Digital Business Ant Allan

TechInsights: Moving Applications to the Cloud Using a Pragmatic Approach to Security Risk Assessment and Management Ramon Krikken

11:45 – 13:00 Networking Lunch in the Solution Showcase

13:00 – 13:45 Gartner Essentials: Manage Risk and Security in Bimodal IT Paul Proctor

Eliminating the Risk Buried in Your Unstructured Dark Data Brian Reed

Roadmap Convergence: The State of IoT and OT Security, 2016 earl Perkins

Information-Centric Mobile Security: Your Data Can Move Without Leaking John Girard

13:00 – 14:30 Workshop:How to Build Your Security Strategy Moderators: Tom scholtz and Rob McMillan

13:00 – 14:00 Analyst-User Roundtable: Integrative Approaches to Authentication, Identity Proofing, Fraud Detection and Behavior Analytics Moderator: Ant Allan

13:00 – 14:00 Analyst-User Roundtable: Are the Rumors of the Death of SIEM Exaggerated? Moderator: Toby Bussa

13:00 – 14:00 Ask the Practitioner Roundtable

14:00 – 14:30 Solution Provider Sessions

14:30 – 15:00 Refreshment Break in the Solution Showcase

15:00 – 15:45 End-User Case Study Effective SOD Controls: A Risk-Based Approach to Segregation of Duties in Enterprise Applications Ant Allan

Gartner Essentials: Top Cybersecurity Trends for 2016 — 2017 earl Perkins

TechInsights: The New Role for Identity Proofing in Digital Business Anne Robins

15:00 – 16:00 Workshop:What to Watch For When your IT Security Vendor is Acquired Moderator: Brian Reed

15:00 – 16:00 Analyst-User Roundtable: How Much Security Does the Cloud Provide? Moderator: steve Riley

16:00 – 16:45 Guest Keynote: Leadership, Influence and Cultural Change Lieutenant General David Morrison AO, Australia’s Former chief of Army and Australian of the Year 2016

16:45 – 18:15 Networking Reception in the Solution Showcase

Mon

day

22 A

UG

US

T 20

16

08:00 – 17:00 Registration

07:30 – 08:15 CISO Circle Breakfast: Navigating the Political Layer — Tactics to Protect and Grow Your Security Budget Rob McMillan

Breakfast for Public Sector Breakfast for Financial Services

08:15 – 08:45 Magic Quadrant for Identity Governance and Administration Magic Quadrant and Critical Capabilities Perry carpenter

Magic Quadrant for Managed Security Services, Worldwide Toby Bussa

Magic Quadrant for Enterprise Data Loss Prevention Brian Reed

Magic Quadrant for Intrusion Prevention Systems craig Lawson

Magic Quadrant for Security Awareness Computer-Based Training Perry carpenter

Critical Capabilities for Enterprise Mobility Management Suites John Girard

Critical Capabilities for Security Information and Event Management craig Lawson

09:00 – 09:45 Roadmap/State of IAM 2016 Felix Gaehgtens

End-User Case Study State of Cloud Security 2016 steve Riley

State of Application Security 2016 Ramon Krikken

09:00 – 10:30 Workshop:Report Cybersecurity and IT Risk to Your Board of Directors Moderator: Paul Proctor

09:00 – 10:00 Analyst-User Roundtable: Who, What, Where and Why of Threat Intelligence Moderator: craig Lawson

09:00 – 10:00 Analyst-User Roundtable: Is FIDO Going to Change Authentication as We Know It? Moderator: Anne Robins

09:00 – 10:00 Analyst-User Roundtable: Best Practices in Information Security Awareness Training Moderator: Perry carpenter

10:00 – 10:30 Solution Provider Sessions

10:30 – 11:00 Refreshment Break in the Solution Showcase

11:00 – 11:45 Gartner Essentials: Top Security Predictions/SPAs 2016 Tom scholtz

State of the Threat Environment 2016 Toby Bussa

End-User Case Study TechInsights: Privileged Account Management: How Recent Well Known Breaches Could Have Been Thwarted Anne Robins

11:00 – 12:30 Workshop:Self-Assessing Your Organization’s Mobile Security Moderator: John Girard

11:00 – 12:00 Analyst-User Roundtable: Got a DDoS Problem? Let's Talk Moderator: craig Lawson

11:00 – 12:00 Analyst-User Roundtable: How Security Organizations Must Evolve in the Digital Business Era Moderator: earl Perkins

11:00 – 12:00 Analyst-User Roundtable: Using the “Predict, Prevent, Detect, Respond” Framework to Communicate Your Security Program Strategy Moderator: Perry carpenter

12:00 – 12:30 Solution Provider Sessions

12:30 – 13:45 Networking Lunch in the Solution Showcase13:30 – 14:30 Ask the Practitioner Roundtable

13:30 – 14:30 Analyst-User Roundtable: Comparing Notes on Advanced Threat Defense Solutions Moderator: Toby Bussa

13:30 – 14:30 Analyst-User Roundtable: Stories from the Trenches — Peer Experiences with Public Cloud Security

13:45 – 14:15 The Five Tests You Must Apply to Your Security Metrics Jeffrey Wheatman and Rob McMillan

Securing the Digital Supply Chain of Your Organization earl Perkins

How Digital Business Reshapes Mobile Security John Girard

TechInsights: Security for Mobile Apps Using SDKs, Wrapping and Hardening Ramon Krikken

13:45 – 15:15 Workshop:Essential Communication and Conflict Resolution Skills for Security Leaders Moderator: Perry carpenter14:30 – 15:00 Socio-Analysing IT Control:

Leveraging Social Science to Improve IT Control Tom scholtz

Career Path: Digital Risk Officer Paul Proctor

State of Data Security 2016 Brian Reed

The Technology and Deployment Options Behind a CASB craig Lawson

15:00 – 15:30 Refreshment Break in the Solution Showcase

15:30 – 16:15 Guest Keynote: A Holistic Look at Risk — From Practical Experiences to Opportunities Professor Andrew MacLeod, Organizational Leader and Former Managing Director of Good super

16:15 – 17:00 Gartner Closing Keynote: Security 2020 — The Future of Cybersecurity Rob McMillan

17:00 – 17:15 Closing Remarks Rob McMillan

Tues

day

23 A

UG

US

T 20

16Agenda at a Glance

When attending this event, please refer to the agenda handout provided or the Gartner Events mobile app for the most up to date session and location information.

Page 9: Gartner Security & Risk Management Summit 2016

Visit gartner.com/ap/security for updates and to register! 9

cloud security Application and Data security endPoint and Mobile security Identity and Access Management

VIRTuAL TRACKS

07:30 – 18:30 Registration

08:30 – 09:15 Tutorial: How to Outsource Security Functions Effectively sid Deshpande Tutorial: How to Build Advanced KRIs: Risk Metrics That Influence Business Decisions Paul Proctor

Tutorial: Keeping SaaS Secure steve Riley Tutorial: TechInsights: Designing Security Into the Internet of Things: A Technical Primer Ramon Krikken

09:30 – 10:15 Gartner Opening Keynote: Build Trust and Resilience at the Speed of Business Anne Robins, Felix Gaehtgens and Jeffrey Wheatman

10:15 – 10:30 Welcome to the Gartner Security & Risk Management Summit 2016 Rob McMillan

10:30 – 11:00 Refreshment Break in the Solution Showcase

TRAcKs A. chief Information security Officer (cIsO) Program

B. Risk Management and compliance Program

c. IT security Program D. TechInsights: security Architecture

Workshops Analyst-User Roundtables andAsk the Practitioner Roundtables

11:00 – 11:45 State of Security Governance 2016 Jeffrey Wheatman

Gartner Essentials: Cybersecurity and Risk Management in Digital Business Paul Proctor

Gartner Essentials: Identity and Access Management In the Digital Business Ant Allan

TechInsights: Moving Applications to the Cloud Using a Pragmatic Approach to Security Risk Assessment and Management Ramon Krikken

11:45 – 13:00 Networking Lunch in the Solution Showcase

13:00 – 13:45 Gartner Essentials: Manage Risk and Security in Bimodal IT Paul Proctor

Eliminating the Risk Buried in Your Unstructured Dark Data Brian Reed

Roadmap Convergence: The State of IoT and OT Security, 2016 earl Perkins

Information-Centric Mobile Security: Your Data Can Move Without Leaking John Girard

13:00 – 14:30 Workshop:How to Build Your Security Strategy Moderators: Tom scholtz and Rob McMillan

13:00 – 14:00 Analyst-User Roundtable: Integrative Approaches to Authentication, Identity Proofing, Fraud Detection and Behavior Analytics Moderator: Ant Allan

13:00 – 14:00 Analyst-User Roundtable: Are the Rumors of the Death of SIEM Exaggerated? Moderator: Toby Bussa

13:00 – 14:00 Ask the Practitioner Roundtable

14:00 – 14:30 Solution Provider Sessions

14:30 – 15:00 Refreshment Break in the Solution Showcase

15:00 – 15:45 End-User Case Study Effective SOD Controls: A Risk-Based Approach to Segregation of Duties in Enterprise Applications Ant Allan

Gartner Essentials: Top Cybersecurity Trends for 2016 — 2017 earl Perkins

TechInsights: The New Role for Identity Proofing in Digital Business Anne Robins

15:00 – 16:00 Workshop:What to Watch For When your IT Security Vendor is Acquired Moderator: Brian Reed

15:00 – 16:00 Analyst-User Roundtable: How Much Security Does the Cloud Provide? Moderator: steve Riley

16:00 – 16:45 Guest Keynote: Leadership, Influence and Cultural Change Lieutenant General David Morrison AO, Australia’s Former chief of Army and Australian of the Year 2016

16:45 – 18:15 Networking Reception in the Solution Showcase

08:00 – 17:00 Registration

07:30 – 08:15 CISO Circle Breakfast: Navigating the Political Layer — Tactics to Protect and Grow Your Security Budget Rob McMillan

Breakfast for Public Sector Breakfast for Financial Services

08:15 – 08:45 Magic Quadrant for Identity Governance and Administration Magic Quadrant and Critical Capabilities Perry carpenter

Magic Quadrant for Managed Security Services, Worldwide Toby Bussa

Magic Quadrant for Enterprise Data Loss Prevention Brian Reed

Magic Quadrant for Intrusion Prevention Systems craig Lawson

Magic Quadrant for Security Awareness Computer-Based Training Perry carpenter

Critical Capabilities for Enterprise Mobility Management Suites John Girard

Critical Capabilities for Security Information and Event Management craig Lawson

09:00 – 09:45 Roadmap/State of IAM 2016 Felix Gaehgtens

End-User Case Study State of Cloud Security 2016 steve Riley

State of Application Security 2016 Ramon Krikken

09:00 – 10:30 Workshop:Report Cybersecurity and IT Risk to Your Board of Directors Moderator: Paul Proctor

09:00 – 10:00 Analyst-User Roundtable: Who, What, Where and Why of Threat Intelligence Moderator: craig Lawson

09:00 – 10:00 Analyst-User Roundtable: Is FIDO Going to Change Authentication as We Know It? Moderator: Anne Robins

09:00 – 10:00 Analyst-User Roundtable: Best Practices in Information Security Awareness Training Moderator: Perry carpenter

10:00 – 10:30 Solution Provider Sessions

10:30 – 11:00 Refreshment Break in the Solution Showcase

11:00 – 11:45 Gartner Essentials: Top Security Predictions/SPAs 2016 Tom scholtz

State of the Threat Environment 2016 Toby Bussa

End-User Case Study TechInsights: Privileged Account Management: How Recent Well Known Breaches Could Have Been Thwarted Anne Robins

11:00 – 12:30 Workshop:Self-Assessing Your Organization’s Mobile Security Moderator: John Girard

11:00 – 12:00 Analyst-User Roundtable: Got a DDoS Problem? Let's Talk Moderator: craig Lawson

11:00 – 12:00 Analyst-User Roundtable: How Security Organizations Must Evolve in the Digital Business Era Moderator: earl Perkins

11:00 – 12:00 Analyst-User Roundtable: Using the “Predict, Prevent, Detect, Respond” Framework to Communicate Your Security Program Strategy Moderator: Perry carpenter

12:00 – 12:30 Solution Provider Sessions

12:30 – 13:45 Networking Lunch in the Solution Showcase13:30 – 14:30 Ask the Practitioner Roundtable

13:30 – 14:30 Analyst-User Roundtable: Comparing Notes on Advanced Threat Defense Solutions Moderator: Toby Bussa

13:30 – 14:30 Analyst-User Roundtable: Stories from the Trenches — Peer Experiences with Public Cloud Security

13:45 – 14:15 The Five Tests You Must Apply to Your Security Metrics Jeffrey Wheatman and Rob McMillan

Securing the Digital Supply Chain of Your Organization earl Perkins

How Digital Business Reshapes Mobile Security John Girard

TechInsights: Security for Mobile Apps Using SDKs, Wrapping and Hardening Ramon Krikken

13:45 – 15:15 Workshop:Essential Communication and Conflict Resolution Skills for Security Leaders Moderator: Perry carpenter14:30 – 15:00 Socio-Analysing IT Control:

Leveraging Social Science to Improve IT Control Tom scholtz

Career Path: Digital Risk Officer Paul Proctor

State of Data Security 2016 Brian Reed

The Technology and Deployment Options Behind a CASB craig Lawson

15:00 – 15:30 Refreshment Break in the Solution Showcase

15:30 – 16:15 Guest Keynote: A Holistic Look at Risk — From Practical Experiences to Opportunities Professor Andrew MacLeod, Organizational Leader and Former Managing Director of Good super

16:15 – 17:00 Gartner Closing Keynote: Security 2020 — The Future of Cybersecurity Rob McMillan

17:00 – 17:15 Closing Remarks Rob McMillan

Age

nda

as o

f 10

May

201

6 an

d su

bjec

t to

chan

ge

Page 10: Gartner Security & Risk Management Summit 2016

10 Gartner Security & Risk Management Summit 2016#GartnerSEC

Solution Showcase Develop a “shortlist” of technology and service providers. Get exclusive access to client case studies, product roadmaps, and demos. Talk to solution experts who can answer your specific questions.

Sponsorship opportunities

For further information about sponsoring this event:

Maria Kamberidis | Tel: +61 427 327 222 Email: [email protected]

Oliver Lee | Tel: +61 477 717 986 Email: [email protected]

Dan Giacco | Tel: +61 438 874 149 Email: [email protected]

Premier exhibitors

Platinum exhibitors

Silver exhibitors

Exhibitor list as of 10 April 2016 and subject to change

Page 11: Gartner Security & Risk Management Summit 2016

Visit gartner.com/ap/security for updates and to register! 11

Registration and pricing

Group rate discountMaximize learning by participating together in relevant sessions or splitting up to cover more ground, sharing your session take-aways later.

Complimentary registrations

• 1 for every 3 paid registrations

• 2 for every 5 paid registrations

• 3 for every 7 paid registrations

For more information, email [email protected] or contact your Gartner account manager.

Register before 24 June to save $375 and receive a complimentary Gartner research report.

3 ways to registerWeb: gartner.com/ap/security

Email: [email protected]

Phone: +61 2 8569 7622

Early-bird offer!

Early-bird price: $2,575 exc. GST

Standard price: $2,950 exc. GST

Public sector price: $2,450 exc. GST *Eligibility for the public sector price will be verified

Ticket pricing

Gartner event tickets We accept one Gartner Summit ticket or one Gartner Catalyst ticket for payment. If you are a client with questions about tickets, please contact your sales representative or call +61 2 8569 7622.

Gartner events deliver what you needIn addition to four tracks of the latest Gartner analyst research, keynote speakers and case studies, your Summit registration fee includes complimentary access to these special features:

• Analystone-on-onemeeting

• Analyst-userroundtables*

• Workshops*

• Askthepractitionerroundtables*

• SolutionShowcase

• Networkingbreakfasts,lunchesand receptions

• Year-roundaccesstovideotapedanalyst sessions from the North America event

*Space is limited and pre-registration is required. Limited to end-user organizations only.

Terms and conditionsTo view our Gartner events terms and conditions, visit gartner.com/ap/security.

Convince your bossAttending a Gartner event can help spur new ideas, fast track project strategy and advance your professional skills. We’ve developed a set of materials that will aid in gaining approval from your manager. For more details, visit gartner.com/ap/security.

Hilton Sydney 488 George Street Sydney, NSW 2000, Australia

Phone: +61 2 9266 2000

www.hilton.com/sydney

Gartner hotel room rate: $306 incl. GST per night at the Hilton Sydney

Summit venue

Page 12: Gartner Security & Risk Management Summit 2016

Gartner Security & Risk Management Summit 201622 – 23 August | Hilton Sydney

gartner.com/ap/security

3 ways to registerWeb: gartner.com/ap/security

Email: [email protected]

Phone: +61 2 8569 7622

Gartner Security & Risk Management Summit is on Twitter and LinkedIn.

#GartnerSEC Gartner Security & Risk Management XChange

Join the conversation!

© 2016 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. For more information, email [email protected] or visit gartner.com.

Security & Risk Management Summit 13 – 16 June | National Harbor, MD

Security & Risk Management Summit 11 – 13 July | Tokyo, Japan

Security & Risk Management Summit 2 – 3 August | São Paulo, Brazil

Security & Risk Management Summit 1 – 2 September | Mumbai, India

Security & Risk Management Summit 12 – 13 September | London, U.K.

Identity & Access Management Summit 29 Nov. – 1 Dec. | Las Vegas, NV

Security & Risk Management Summit 31 Oct. – 1 Nov. | Dubai, UAE

Gartner Security & Risk Management Summits around the globe

United Kingdom12 – 13 September

United States29 Nov – 1 Dec

United States13 – 16 June

Brazil2 – 3 August

Dubai31 Oct – 1 Nov

Mumbai1 – 2 September

Australia22– 23 August

Japan11 – 13 July