Gartner Security & Risk Management Summit 2015 14 – 15 September | London, UK | gartner.com/eu/security Five Programs • Chief Information Security Officer (CISO) • Risk Management and Compliance • Security Manager Program: Technology, Trends and Operations • Business Continuity Management • Internet of Things Security The World’s Most Important Gathering for Security and Risk Executives EARLY-BIRD DISCOUNT Save €325 by 17 July
8
Embed
Gartner Security & Risk Management Summit 2015 · #gartnersecurity Gartner Security & Risk Management Summit 2015 Reevaluate your security and risk strategies and investments for
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Gartner Security & Risk Management Summit 201514 – 15 September | London, UK | gartner.com/eu/security
What’s new for 2015•Revampedagendafeaturingnewcontent,andcoveringkeychallengessuchasapplications,networkandmobilesecurity;securityforthecloud;digitalbusinesssecurity,riskmanagementandprivacyandEUregulations
08:00–08:45 Tutorial:TopTrendsandTakewaysforCybersecurity Earl Perkins Tutorial:BestPracticesinCrisisCommunications Roberta Witty
09:00–10:00 Summit Chair Welcome and Gartner Keynote: manage risk and Deliver Security in a Digital World Ant Allan, Peter Firstbrook and Dionisio Zumerle
10:00–10:30 IndustryPanel
10:30–11:00 RefreshmentBreakintheSolutionShowcase 10:35 – 10:55 MagicQuadrantforSecurityInformationandEventManagement Oliver Rochford
11:00–12:00 Guest Keynote tobeconfirmedshortly
12:00–13:15 LunchintheSolutionShowcase 12:15 – 12:35 MagicQuadrantforOperationalRiskManagement John Wheeler
TRAcks A. chief Information security Officer (cIsO) Program
B. Risk Management and compliance Program
c. security Manager Program: Technology, Trends and Operations D. Business continuity Management Program and
E. Internet of Things security Program
Workshops and contract Negotiation clinics
Roundtables
13:15–14:00 TheNewCISO'sCrucialFirst100Days Tom scholtz
APublicCloudRiskModel:AcceptingCloudRiskisOK,IgnoringCloudRiskisTragic Paul Proctor
DefensiveStrategiesinanAgeofDigitalInsurgency Oliver Rochford
WomeninSecurityandRiskManagement:DoWomenApproachSecurityandRiskManagementDifferentlyThanMen? Roberta Witty
16:30–17:15 Gartner Closing Keynote and Summit Chair Closing remarks: Cybersecurity Scenario 2020: the Impact of Digital business on Security Neil MacDonald
Visit gartner.com/eu/security for more information
Agenda as of 19 June 2015
During the event, please refer to the printed Agenda or the Gartner Events mobile app for complete, up to the minute session information.
07:30–20:00 RegistrationandInformation
08:00–08:45 Tutorial:TopTrendsandTakewaysforCybersecurity Earl Perkins Tutorial:BestPracticesinCrisisCommunications Roberta Witty
09:00–10:00 Summit Chair Welcome and Gartner Keynote: manage risk and Deliver Security in a Digital World Ant Allan, Peter Firstbrook and Dionisio Zumerle
10:00–10:30 IndustryPanel
10:30–11:00 RefreshmentBreakintheSolutionShowcase 10:35 – 10:55 MagicQuadrantforSecurityInformationandEventManagement Oliver Rochford
11:00–12:00 Guest Keynote tobeconfirmedshortly
12:00–13:15 LunchintheSolutionShowcase 12:15 – 12:35 MagicQuadrantforOperationalRiskManagement John Wheeler
TRAcks A. chief Information security Officer (cIsO) Program
B. Risk Management and compliance Program
c. security Manager Program: Technology, Trends and Operations D. Business continuity Management Program and
E. Internet of Things security Program
Workshops and contract Negotiation clinics
Roundtables
13:15–14:00 TheNewCISO'sCrucialFirst100Days Tom scholtz
APublicCloudRiskModel:AcceptingCloudRiskisOK,IgnoringCloudRiskisTragic Paul Proctor
DefensiveStrategiesinanAgeofDigitalInsurgency Oliver Rochford
WomeninSecurityandRiskManagement:DoWomenApproachSecurityandRiskManagementDifferentlyThanMen? Roberta Witty
16:30–17:15 Gartner Closing Keynote and Summit Chair Closing remarks: Cybersecurity Scenario 2020: the Impact of Digital business on Security Neil MacDonald
As a global leader in IT security, Trend Micro develops innovative security solutions that make the world safe for businesses and consumers to exchange digital information. With over 25 years of security expertise, we’re recognized as the market leader in server security, cloud security, and small business content security. Our security is powered by Trend Micro™ Smart Protection Network™ global threat intelligence and is supported by over 1,200 security experts around the world.
www.trendmicro.co.uk
AirWatch by VMware is the leader in enterprise mobility management (EMM). We enable end users with a seamless digital workspace, and empower IT with a future-proof mobility platform that provides fl exibility to manage multiple use cases, unifi ed management of endpoints, end-to-end security, and seamless integration across enterprise systems.
www.air-watch.com
Darktrace is a fast-growing cyber threat defense company and world leader in Enterprise Immune System technology. Darktrace’s award-winning solution is powered by machine learning and mathematics developed at the University of Cambridge, and helping organizations defend against advanced cyber-attacks and insider threat by detecting previously-unidentifi ed anomalies in real time.
www.darktrace.com
Qualys (www.qualys.com) is a pioneer and leading provider of cloud security and compliance solutions with over 7,700 customers in more than 100 countries. The Qualys Cloud Platform and integrated suite of solutions help organizations simplify security operations and lower the cost of compliance, delivering critical security intelligence on demand.
www.qualys.com
Fortinet is a worldwide provider of network security appliances and a market leader in Network Security. Our products and subscription services provide broad, integrated and high-performance protection against dynamic security threats while simplifying the IT security infrastructure. Our customers include enterprises, service providers and government entities worldwide, including the majority of the 2012 Fortune Global 100.
www.fortinet.com
Splunk Inc. provides the leading platform for Operational Intelligence. Splunk® software searches, monitors, analyzes and visualizes machine-generated big data from websites, applications, servers, networks, sensors and mobile devices. More than 8,400 organizations use Splunk software to deepen business and customer understanding, mitigate cybersecurity risk, improve service performance and reduce costs.
www.splunk.com
Visit gartner.com/eu/security for more information
Silver Sponsors
Avecto is an innovative technology business specializing in endpoint security. The company’s revolutionary Defendpoint software ensures defense in depth while empowering users to work freely.
www.avecto.com
BlackBerry provides an end-to-end suite of secure mobile solutions, delivering innovative mobile technologies to users and organizations that value productivity and achievement. Learn more: www.BlackBerry.com.
www.blackberry.com
For 30 years, Boldon James has been a leader in data classifi cation solutions, helping organisations manage sensitive information securely & in compliance with legislation and standards.
www.boldonjames.com
Certes protects data in motion. Our CryptoFlow™ Solutions safeguard sensitive applications over any network with user-aware policies that protect data when fi rewalls can’t stop hackers.
certesnetworks.com
CSG Invotas is an award-winning leader in security orchestration and automation for global security operations, delivering an automated threat response solution to unify, orchestrate and automate key elements of incident response.
www.csginvotas.com
DenyAll is a European software vendor, an expert in next generation application security, building on 15 years of experience securing web applications and services.
www.denyall.com
Provide secure identity management and single sign-on to any application, whether in the cloud, on-premises or on a mobile device for your employees, partners and customers with Okta.
www.okta.com
Pirean are recognised leaders in Identity and Access management solutions, delivering industry best practice and expertise through a unique Software, Consulting and Support Services blend.
http://pirean.com
RedSocks is a Dutch IT security company specialising in detecting and defeating malware in the corporate market. RedSocks supplies the RedSocks Malware Threat Defender (MTD) as a network appliance.
www.redsocks.nl
eSentire® is the leader in Active Threat Protection solutions and services, the most comprehensive way to defend enterprises from advanced and never-before-seen cyber threats.
www.esentire.com
Imperva® is a leading provider of security solutions that protect business-critical data and applications. The company’s products enable organizations to discover vulnerabilities, protect information, and comply with regulations.
www.imperva.com
LogRhythm, a leader in security intelligence and analytics, empowers companies to rapidly detect, respond to and neutralize damaging cyber threats.
www.logrhythm.com
As the inventor of the SSH protocol, we have a twenty-year history of leading the market in developing advanced security solutions that enable, monitor, and manage encrypted networks.
www.ssh.com
Vectra Networks’ X-series detection platform continuously monitors traffi c to automatically detect cyber attacks, prioritizing them by greatest risk and enabling organizations to focus resources.
www.vectranetworks.com
Voltage Security provides end-to-end, data-centric encryption, tokenization and key management solutions that allows companies to seamlessly secure all types of sensitive information wherever it resides.
www.voltage.com
MetricStream is the market leader for integrated Governance, Risk, and Compliance (GRC) Management Solutions that enable organizations to deliver better business performance.
www.metricstream.com
Netskope™ is the leader in safe cloud enablement. With Netskope, IT can protect data and ensure compliance across cloud apps so businesses can move fast, with confi dence.
www.netskope.com
ObserveIT, a pioneer in User Activity Monitoring, provides video recordings of user activity, analytics and alerting to address user- based attacks. Over 1,200 companies use ObserveIT. Visithttp://www.observeit.com for more information.
www.observeit.com
Secure Mobile Gateway pioneer. Mobile threat prevention and data usage optimization with real-time analytics. On device and in the cloud. Gartner Cool Vendor.
www.wandera.com
WatchGuard® Technologies, Inc. is a global leader of integrated, multi-function business security solutions that intelligently combine industry standard hardware, best-of-breed security features, and policy-based management tools.
www.watchguard.com
Wombat Security Technologies provides information security awareness and training software to help organizations teach their employees secure behavior.
www.wombatsecurity.com
Tenable Network Security provides continuous network monitoring to identify vulnerabilities, reduce risk and ensure compliance. Our family of products includes SecurityCenter Continuous View™, which provides the most comprehensive and integrated view of network health, and Nessus®, the global standard in detecting and assessing network data.
www.tenable.com
Sponsors correct as of 12 June 2015
Our analysts•Analyst-ledpresentations
•Analystone-on-oneprivatemeetings
•Analyst-facilitatedroundtables
Our research•100%independentandobjective
•Provenandreliable
•Relevanttoyourrole
Build a successful strategy•GetvalidationfromGartneranalysts
•Meetwithsupplierstosupportyourtacticalplanning
Expand your peer network•Innovateandproblem-solvewithlike-mindedpeers
•Jointhelargest,mostinfluentialnetworkofitskind
Grow in your role•Getcontentandsolutionsthataremostrelevanttoyou
•Leadmoreeffectively—anddevelopyourteam
WHY AttEnD A GARtnER EVEnt? WHAt MAKEs GARtnER EVEnts unIQuE?
If you are not completely satisfi ed with this Gartner conference, please notify us in writing within 15 days of the conference and we will refund 100% of your registration fee.