Post on 26-May-2018
transcript
Gartner Security & Risk ManagementSummit 201729 – 30 August / Mumbai, Indiagartner.com/in/security
Early-bird discountSave 7,000 by 30 June 2017
#GartnerSEC
Hot topics:•Risksandopportunitiesofsmart
machines,AI&IoT
•Visionandstrategyfordigitalbusinesssecurity
•Enhancingdatalosspreventionanddealingwithransomware
•ManagedsecurityservicesintheIndiancontext
•Trendsincloud,mobileandapplicationsecurity
•StateofIoTandIT/OTsecurity
•Network-basedadvancedthreatdefensetechnologies
•Securityawarenessbestpractices
GARtnER PREdICtS
By 2018, the 60% of enterprises that implement appropriate cloud visibility and control tools will experience one-third fewer security failures.
2 Gartner Security & Risk Management Summit 2017#GartnerSEC
Gartner Security & Risk Management Summit 2017 is a premier annual gathering of security, risk management and BCM leaders. It provides the insight you need to guide your organization into a secure digital business future. This year’s agenda addresses the latest threats, flexible new security architectures, governance strategies, the CISO role and more. It is a unique opportunity to reinvent your approach to security and risk for the digital age based on Gartner’s trusted independent research and practical recommendations.
Digital transformation demands a radical new approach to security and risk management. Success requires a dramatic departure from conventional security practices. At this year’s Summit, you’ll learn how to shift to more adaptive, dynamic, people-centric approaches to security, such as using context-based intelligence to build digital trust. You’ll also hear strategies to help you deliver IT resilience, the new standard when it comes to security. Join us to find out how you can address escalating risk exposure while giving your organization the freedom to innovate.
Manage Risk. Build trust. Embrace Change.
Why attend?
•Mostcomprehensiveprogramdeveloped based on thousands of inquiries and customer engagement
•Getliveanswerstoyourspecificquestions from 18 analysts through private one-on-one meetings and ask the analyst sessions
• Networkandsharebestpracticeswithpeers at roundtables, workshops and during breaks
• See,meetandhearfromleadingvendors in the security and risk space
• Hearcompellingguestkeynotesandcase study presentations by leading security and risk practitioners
Visit gartner.com/in/security for updates and to register! 3
Who should attend
TheGartnerSecurity&RiskManagementSummitisthemostimportantgatheringforthefollowingteamsandroles:
• ITSecurity&Risk
– CISOs
– Security and risk management leaders
– Chief privacy officer
– Identity & access management professionals
– System integrators
– Technical architects
• CorporateInformationSecurity&Risk
– Steering committee members
– Security Architects
– Policy management professionals
– Business continuity professionals
– Program managers
– Security training & development managers
– Communications professionals
– Local information security officer (LISOs)
• ITSecurityOperations
– Cloud Security professionals
– Security operations managers
– Application and data security professionals
– Threat and vulnerability professionals
– End point and mobility professionals
– Networksecurityprofessionals
– IoT security professionals
• GovernanceRiskandCompliance
– Chief risk officers (CROs)
– Digital risk officers
– IT risk professionals
– GRC application architects
– Information governance
– Big data litigation and regulatory risks
– Finance, audit, legal risk & compliance managers
What’s new for 2017•A brand new track of sessions focusing on how to build, deploy and implement
a security strategy
• IncreasednumberofGartnerAnalyststo address wider and in-depth coverage
•Additional emphasis on:
• Security awareness and behavior management
• Impact of emerging technology on security
• Data loss prevention
• Capacity building
• Digital Trust
• Cybersecurity
• Managed security services
• IT/OT convergence
• Cloud based security
• Network,mobileandendpointsecurity
•New interactive ‘Ask the Analyst’ Q&A sessions that provide you the opportunity to get live answers to your specific questions
Tom Scholtz Research VP
GARtnER PREdICtS
By 2020, more than 60% of organizations willfailtodecryptHTTPSefficiently,missing most targeted web malware.
4 Gartner Security & Risk Management Summit 2017#GartnerSEC
GartnerOpeningKeynote
ManageRisk,BuildTrust,andEmbraceChangebyBecomingAdaptiveEverywhere In this keynote, Gartner will introduce a new charter for information security that will transform all areas of information security moving forward. Building on Gartner’s Adaptive Security Architecture vision, this keynote will extend the ability and need to be continuously adaptive to all disciplines of information security to balance the rapidly changing requirements of digital business with the need to protect the organization from advanced attacks while maintaining acceptable levels of risk and compliance.
Partha Iyengar, Michele Caminos and Ruggero Contu
GartnerClosingKeynote
AComprehensiveGuidetoConnectednessWithTrust,SecurityandEthicsintheDigital Business Trust is the foundation of all personal and business transactions. But who can you trust in digital business, with its endless connections and constantly shifting configurations? Trust is hard enough when it’s personal, but how do you trust and be trusted when dealing with a multitude of people, business and things? You think trust sounds soft and fluffy? Think again! Architecting for trust may be the most tangible contribution a CISO can make to the digital business.
Partha Iyengar
Keynote speakers
Partha Iyengar VP & Gartner Fellow
Michele C. Caminos Managing VP
Ruggero Contu Research Director
Visit gartner.com/in/security for updates and to register! 5
Meet the analysts
Saniye Burcu Alaybeyi Research Director
Manjunath Bhat Research Director
Michele C. Caminos Managing VP
John Girard VP Distinguished Analyst
Partha Iyengar VP & Gartner Fellow
Rajpreet Kaur Sr Research Analyst
Ganesh Ramamoorthy Research VP
Brian Reed Research Director
Steve Riley Research Director
Ruggero Contu Research Director
Alan Dayley Research Director
Sid Deshpande Principal Research Analyst
Lawrence Orans Research VP
Eric Ouellet Research VP
Khushbu Pratap Principal Research Analyst
Tom Scholtz VP & Gartner Fellow
Anmol Singh Principal Research Analyst
Roberta J. Witty Research VP
• Go-to-MarketPlanning• MarketandCompetitiveIntelligenceManagement• NewMarketOpportunities• SalesandChannelStrategy• PositioningandMessaging
• MobileandEndpointStrategies• EndpointandMobileSecurity• InfrastructureandOperationsLeaders• Office365,GSuiteorOtherCloudOfficeInitiatives• BuildandMarketFixedandMobilityServices
• Marketing,SalesandChannelEffectiveness• NewMarketOpportunities• Go-to-MarketPlanning• DataCenterModernizationandConsolidation• InfrastructureandOperationsLeaders
• EndpointandMobileSecurity• MobileandEndpointStrategies• MobileSecurityMaturity• EnterpriseMobilityManagementProducts,
Services, Policies, BYOD
• BuildingandExpandingaDigitalBusiness• CIODesignofBimodalandotherITOperationaland
Organizational Models• CIORoleEvolution• LeadingITinaMidsizeEnterprise
• NetworkandGatewaySecurity• InformationSecurityManagementProgram• AdvancedThreatDetection(APT)Technologyand
Vendor Selection
• ExploitSemiconductorandElectronicsMarketDynamics• Go-to-MarketPlanning• PositioningandMessaging• MarketandCompetitiveIntelligenceManagement• ProductStrategy
• SecurityandRiskManagementLeaders• CloudSecurity• MobileandEndpointStrategies• ApplicationandDataSecurity• NetworkandGatewaySecurity
• SecurityCapabilitiesofMajorPublicCloudProviders• Cloud-basedSecurityServices,Securityasa
Service, Software-defined Security
• ProductStrategy• MarketandCompetitiveIntelligenceManagement• Marketing,SalesandChannelEffectiveness• MobileandEndpointStrategies
• ExploitInfrastructureSoftwareMarketDynamics• DataandAnalyticsPrograms• DataandAnalyticsLeaders• BuildandMarketDataandAnalyticsOfferings• AnalyticsandBusinessIntelligenceModernization
• MarketandCompetitiveIntelligenceManagement• NewMarketOpportunities• SecurityandRiskManagementLeaders• PositioningandMessaging• InformationSecurityTechnologyandServices
• InformationSecurityTechnologyandServices• SecurityandRiskManagementLeaders
• EndpointProtection• eEdpointDetectionandResponse• Ransomware• Malware• Anti-virus
• SecurityComplianceandAuditManagement• InformationSecurityManagementProgram• RiskManagementProgram• CloudSecurity• SecurityandRiskManagementLeaders
• InformationSecurityManagementProgram• SecurityandRiskManagementLeaders• RiskManagementProgram
• IdentityandAccessManagementStrategy,PolicyPlanning, Implementation and Operations
• PrivilegedAccessManagement• IdentityasaService(IDaaS),• IdentityandAccessGovernance
• WomeninIT• BusinessContinuityManagement• CrisisManagement• BusinessResilience
Gartner has the largest base of IT research analysts and consultants in the world. Gartner’s global research organization offers the combinedbrainpowerof1,280researchanalystsandconsultantswhoadviseexecutivesin85countrieseveryday.HearfromtheGartner Security & Risk Management Research community as they share their latest insight and advice.
6 Gartner Security & Risk Management Summit 2017#GartnerSEC
Plan your experience
Agenda tracks
A TheCISOProgram—CISOasBusinessLeader
HotTopics:• VisionandStrategyforDigitalBusinessSecurity
• DigitalSecurityOrganizationNeededforIoTInnovation
• HowtoworkwithSecurityOperationsCentersServiceProviders
• CriticalQuestionstoAskAboutSecurityTestingPractices
• HowSecurityFunctioncanbePerformedbyNon-securityTeams
• ScalingInformation-CentricSecurity
• Drivingsecurityawarenessprograms
B TheCyberSecurityProgram—BuildingTrustandResiliencewithMore Agile Security
HotTopics:•OvercomingNetworkandEndpointSecurityChallenges
• NextGenerationofAnti-malware
• AddressingSecurityIssuesThatAriseinIntegratingIoTandCloud
• BusinessContinuityandResilience
• ChangingDDoSThreatLandscape
• EffectivelyDeployingThreatIntelligence
C TheRisk&ComplianceProgram—LeverageRiskManagementtoUnderpintheDigitalBusinessTransition
HotTopics:•GainingControlofUnstructuredData
• StateofIAM
• SecurityinInformationGovernance
• StateofIoTandIT/OTSecurity2017
• AssessingThird-partySecurityControls
• PropelYourBusinessWithDigitalRiskManagement
• TopTrendsintheIRMSMarket
D TheSecurityOperationProgram—HowtoBuild,DeployandImplementaSecurityStrategy
HotTopics:• BestPracticestoSource,ManageandRetainSecurityPersonnel
• SpeakingtheLanguageofBusiness–AnIntervention
• HowtoOutsourceSecurityFunctionsEffectively
• BestPracticesforImplementingaPrivilegedAccessManagementSolution
• HowtoProtectMobileApps
• HowtobeSecureinAmazonWebServicesandMicrosoftAzure
• StateofMobileSecurity
Customize your agenda
Gartner Events Navigator AppGartnerEventsNavigatorApphelpsyouorganize, view and custom-create an agenda based on:
• Dateandtime
• Track
• Analyst/speakerprofiles
• Sessiondescriptions
• Keyinitiatives
• Verticalindustries
Visit gartner.com/in/security for updates and to register! 7
Analyst interaction
Analyst one-on-one meeting A complimentary consultation with a Gartner analyst of your choice
Ask the analyst roundtables* In these interactive sessions, you will hear the analyst answer commonly asked questions, learn from questions from your peers, and ask your own question
Analyst-user roundtable discussion* Moderated by Gartner analysts for exchanging ideas and best practices with your peers
Workshops* Small-scale and interactive; drill down on specific topics with a how-to focus
*Space is limited and pre-registration is required. Limited to end-user organizations only.
network with peers
End–user case studies Learn about recent implementations firsthand, with anopportunityforQ&AwiththeITand business executives leading the initiative
Solution Showcase reception Connect with peers in similar roles who face similar challenges, at the networking reception on the Solution Showcase designed to build relationships and facilitate the meaningful exchange of ideas and information
Meet solution providers
Solution Showcase Explore cutting-edge IT solutions from top providers
Solution provider sessions Exhibitors share their insights on the latest products and services
Vendor-user roundtable discussion* Moderated discussion and best practice sharing amongst attendees facilitated by a solution provider
GARtnER PREdICtS
Through2020,morethanhalfofIaaSsecurityfailureswillbe from inadequate customer management of identities, access and privilege.
GARtnER PREdICtS
By2021,25%ofcorporatedatatrafficwill bypass perimeter security (up from 10% in 2016) and flow directly from mobile devices to the cloud.
8 Gartner Security & Risk Management Summit 2017#GartnerSEC
Agenda at a glance When attending this event, please refer to the Gartner Events mobile app for the most up to date session and location information.
07:30–20:45 Registration
08:30–09:00 Tutorial: Security in Information Governance: Align Risk, Optimization and Data Value Initiatives Alan Dayley Tutorial:UtilizationofNetworkSecurityPolicyManagementToolsinanEnterpriseNetwork Rajpreet Kaur
09:00–10:00 GartnerOpeningKeynote:ManageRisk,BuildTrust,andEmbraceChangebyBecomingAdaptiveEverywhere Partha Iyengar, Michelle Caminos and Ruggero Contu
10:00–10:30 Refreshment Break in the Solution Showcase
TRACKS A. The CISO Program – CISO as Business Leader
B. The Cyber Security Program – Building Trust and Resilience With More Agile Security
C. The Risk & Compliance Program – Leverage Risk Management to Underpin the Digital Business Transition
D. The Security Operation Program – How to Build, Deploy and Implement a Security Strategy
Workshops Analyst-User Roundtables and Ask the Analyst Sessions
10:30–11:15 Develop a Pragmatic Vision and Strategy for Digital Business Security Tom Scholtz
HowtoAddanEndpointDetectionandResponse Solution to Your Security Program Eric Ouellet
The State of IAM Anmol Singh StateofMobileSecurity2017:FromtheFireto the Frying Pan John Girard
10:30 – 12:00 Workshop: Recovering Your Business After a Targeted Cyberattack Roberta J. Witty
10:30 – 11:15 Ask the Analyst: Best Practices for Planning a OT Security Strategy Saniye Alaybeyi
11:30–12:15 TheDigitalSecurityOrganizationNeededforIoT Innovation Ganesh Ramamoorthy
Enhancing Data Loss Prevention, Dealing with Ransomware:WhyIdentityandDataSecurityNeedtoConverge Brian Reed
GainingControlofUnstructuredData:ReduceRisksWhileDerivingValue Alan Dayley
HowtobeSecureinAmazonWebServicesand Microsoft Azure Steve Riley
12:15–13:30 Lunch in the Solution Showcase 13:00 – 13:20 MagicQuadrantforEnterpriseMobilityManagementSuites Manjunath Bhat
13:30–14:15 Should You Build a Security Operations Center? Sid Deshpande
NextGenerationAnti-Malware,TheGood,BadandUgly Eric Ouellet
NetworkSecurityChallengesfor2017andBeyond Lawrence Orans
Identity and Access Management for the IoT Era Anmol Singh
13:30 – 14:30 Ask the Analyst: Making Your Organization Less Susceptible to Data Theft Brian Reed
14:30–15:00 Solution Provider Sessions
15:15–16:00 CISOPlaybook:CriticalQuestionstoAskAbout Security Testing Practices John Girard
The Marriage of Cloud and IoT Security Saniye Alaybeyi
IT Risk Management Solutions: Setting Right Expectations—HowNotToPutTheCartBeforeTheHorse Khushbu Pratap
HowtoProtectMobileApps Manjunath Bhat
15:30 – 16:30 Analyst-UserRoundtable: Best Practices to Source, Manage and Retain Security Personnel Michelle Caminos
16:15–16:45 Solution Provider Sessions
17:00–17:30 To the Point: One Shifting Delivery Models in Security: Cloud-Based Security Ruggero Contu
TothePoint:KeyCybersecurityInitiativesforIndian Enterprises Rajpreet Kaur
To the Point: Managed Security Services in the India Context Sid Deshpande
To the Point: Developing a SaaS Security Architecture Steve Riley
17:30–18:00 Refreshment Break in the Solution Showcase 17:35 – 18:55 EndpointProtectionPlatformMagicQuadrant Eric Ouellet
18:00–18:45 GuestKeynote
18:45–20:45 Solution Showcase Reception and Dinner
08:00–17:15 Registration
09:00–09:45 GuestKeynote
09:45–10:15 Refreshment Break in the Solution Showcase 09:50 – 10:10 ITRiskManagementSolutionsMagicQuadrant Khushbu Pratap
10:15–11:00 Maverick Research: Disband Your Security TeamNow! Tom Scholtz
State of Business Continuity Management for BusinessResilience2017 Roberta J. Witty
StateofIoTandIT/OTSecurity2017 Ganesh Ramamoorthy
Best Practices for Implementing a Privileged Access Management Solution Anmol Singh
10:15 – 11:45 Workshop: Consider Cultural and Organizational Challenges Ahead of Technology Deployment for OT Security Saniye Alaybeyi11:15–11:45 Solution Provider Sessions
12:00–12:45 RiskandTrustCultureareBroken—Here'sHowtoFixThem Partha Iyengar
EverythingYouNeedtoKnowAbouttheEver-Changing DDoS Threat Lawrence Orans
TenQuestionsCustomerOrganizationsNeedto Ask Their Vendors (including CSPs) on Security Assurance Khushbu Pratap
The Benefits of Central Log Management for Security Operations Sid Deshpande
12:00 – 13:30 Workshop: WomeninIT--ExclusiveWorkshopforDiverstiyForum Roberta J. Witty
12:00 – 12:45 Ask the Analyst: DemystifyingMobileSecurityforaPerimeter-lessWorkEnvironment Manjunath Bhat
13:00–13:30 Case Studies
13:30–14:30 Lunch in the Solution Showcase 13:40 – 14:00 MagicQuadrantsforNetworkSecurityDevices(EnterpriseFirewall,IPS,WAF) Rajpreet Kaur
14:30–15:00 To the Point: IT Cost Optimization and Significantly Reducing Security I&O Costs Michelle Caminos
TothePoint:HowisEnterpriseMobilityManagement (EMM) different from Mobile Threat Defense (MTD) Manjunath Bhat
To the Point: Full Spectrum Security for RemoteandMobileWorkers John Girard
To the Point: It’s Time to Isolate Your Services From the Internet Cesspool Steve Riley
14:15 – 15:00 Ask the Analyst: HowtoReduceRiskandLowerCostsforUnstructuredData Alan Dayley
15:15–16:00 The State of Security Behavior Management Tom Scholtz
Managing the Security Risks of IoT Innovation Ganesh Ramamoorthy
ThreatIntelligence:CuttingThroughtheHypeto Realize Opportunities for Your Organization Ruggero Contu
Scale Information-Centric Security From Internal Operations to Business Partners and Beyond Brian Reed
15:15 – 16:15 Analyst-UserRoundtable: DDoS Roundtable Lawrence Orans
16:00–16:30 Refreshment Break in the Solution Showcase
16:30–17:15 GartnerClosingKeynote:AComprehensiveGuidetoConnectednessWithTrust,SecurityandEthicsintheDigitalBusiness Partha Iyengar
Tues
day
29AUGUST20
17Wed
nesd
ay30
AUGUST20
17
Visit gartner.com/in/security for updates and to register! 9
07:30–20:45 Registration
08:30–09:00 Tutorial: Security in Information Governance: Align Risk, Optimization and Data Value Initiatives Alan Dayley Tutorial:UtilizationofNetworkSecurityPolicyManagementToolsinanEnterpriseNetwork Rajpreet Kaur
09:00–10:00 GartnerOpeningKeynote:ManageRisk,BuildTrust,andEmbraceChangebyBecomingAdaptiveEverywhere Partha Iyengar, Michelle Caminos and Ruggero Contu
10:00–10:30 Refreshment Break in the Solution Showcase
TRACKS A. The CISO Program – CISO as Business Leader
B. The Cyber Security Program – Building Trust and Resilience With More Agile Security
C. The Risk & Compliance Program – Leverage Risk Management to Underpin the Digital Business Transition
D. The Security Operation Program – How to Build, Deploy and Implement a Security Strategy
Workshops Analyst-User Roundtables and Ask the Analyst Sessions
10:30–11:15 Develop a Pragmatic Vision and Strategy for Digital Business Security Tom Scholtz
HowtoAddanEndpointDetectionandResponse Solution to Your Security Program Eric Ouellet
The State of IAM Anmol Singh StateofMobileSecurity2017:FromtheFireto the Frying Pan John Girard
10:30 – 12:00 Workshop: Recovering Your Business After a Targeted Cyberattack Roberta J. Witty
10:30 – 11:15 Ask the Analyst: Best Practices for Planning a OT Security Strategy Saniye Alaybeyi
11:30–12:15 TheDigitalSecurityOrganizationNeededforIoT Innovation Ganesh Ramamoorthy
Enhancing Data Loss Prevention, Dealing with Ransomware:WhyIdentityandDataSecurityNeedtoConverge Brian Reed
GainingControlofUnstructuredData:ReduceRisksWhileDerivingValue Alan Dayley
HowtobeSecureinAmazonWebServicesand Microsoft Azure Steve Riley
12:15–13:30 Lunch in the Solution Showcase 13:00 – 13:20 MagicQuadrantforEnterpriseMobilityManagementSuites Manjunath Bhat
13:30–14:15 Should You Build a Security Operations Center? Sid Deshpande
NextGenerationAnti-Malware,TheGood,BadandUgly Eric Ouellet
NetworkSecurityChallengesfor2017andBeyond Lawrence Orans
Identity and Access Management for the IoT Era Anmol Singh
13:30 – 14:30 Ask the Analyst: Making Your Organization Less Susceptible to Data Theft Brian Reed
14:30–15:00 Solution Provider Sessions
15:15–16:00 CISOPlaybook:CriticalQuestionstoAskAbout Security Testing Practices John Girard
The Marriage of Cloud and IoT Security Saniye Alaybeyi
IT Risk Management Solutions: Setting Right Expectations—HowNotToPutTheCartBeforeTheHorse Khushbu Pratap
HowtoProtectMobileApps Manjunath Bhat
15:30 – 16:30 Analyst-UserRoundtable: Best Practices to Source, Manage and Retain Security Personnel Michelle Caminos
16:15–16:45 Solution Provider Sessions
17:00–17:30 To the Point: One Shifting Delivery Models in Security: Cloud-Based Security Ruggero Contu
TothePoint:KeyCybersecurityInitiativesforIndian Enterprises Rajpreet Kaur
To the Point: Managed Security Services in the India Context Sid Deshpande
To the Point: Developing a SaaS Security Architecture Steve Riley
17:30–18:00 Refreshment Break in the Solution Showcase 17:35 – 18:55 EndpointProtectionPlatformMagicQuadrant Eric Ouellet
18:00–18:45 GuestKeynote
18:45–20:45 Solution Showcase Reception and Dinner
08:00–17:15 Registration
09:00–09:45 GuestKeynote
09:45–10:15 Refreshment Break in the Solution Showcase 09:50 – 10:10 ITRiskManagementSolutionsMagicQuadrant Khushbu Pratap
10:15–11:00 Maverick Research: Disband Your Security TeamNow! Tom Scholtz
State of Business Continuity Management for BusinessResilience2017 Roberta J. Witty
StateofIoTandIT/OTSecurity2017 Ganesh Ramamoorthy
Best Practices for Implementing a Privileged Access Management Solution Anmol Singh
10:15 – 11:45 Workshop: Consider Cultural and Organizational Challenges Ahead of Technology Deployment for OT Security Saniye Alaybeyi11:15–11:45 Solution Provider Sessions
12:00–12:45 RiskandTrustCultureareBroken—Here'sHowtoFixThem Partha Iyengar
EverythingYouNeedtoKnowAbouttheEver-Changing DDoS Threat Lawrence Orans
TenQuestionsCustomerOrganizationsNeedto Ask Their Vendors (including CSPs) on Security Assurance Khushbu Pratap
The Benefits of Central Log Management for Security Operations Sid Deshpande
12:00 – 13:30 Workshop: WomeninIT--ExclusiveWorkshopforDiverstiyForum Roberta J. Witty
12:00 – 12:45 Ask the Analyst: DemystifyingMobileSecurityforaPerimeter-lessWorkEnvironment Manjunath Bhat
13:00–13:30 Case Studies
13:30–14:30 Lunch in the Solution Showcase 13:40 – 14:00 MagicQuadrantsforNetworkSecurityDevices(EnterpriseFirewall,IPS,WAF) Rajpreet Kaur
14:30–15:00 To the Point: IT Cost Optimization and Significantly Reducing Security I&O Costs Michelle Caminos
TothePoint:HowisEnterpriseMobilityManagement (EMM) different from Mobile Threat Defense (MTD) Manjunath Bhat
To the Point: Full Spectrum Security for RemoteandMobileWorkers John Girard
To the Point: It’s Time to Isolate Your Services From the Internet Cesspool Steve Riley
14:15 – 15:00 Ask the Analyst: HowtoReduceRiskandLowerCostsforUnstructuredData Alan Dayley
15:15–16:00 The State of Security Behavior Management Tom Scholtz
Managing the Security Risks of IoT Innovation Ganesh Ramamoorthy
ThreatIntelligence:CuttingThroughtheHypeto Realize Opportunities for Your Organization Ruggero Contu
Scale Information-Centric Security From Internal Operations to Business Partners and Beyond Brian Reed
15:15 – 16:15 Analyst-UserRoundtable: DDoS Roundtable Lawrence Orans
16:00–16:30 Refreshment Break in the Solution Showcase
16:30–17:15 GartnerClosingKeynote:AComprehensiveGuidetoConnectednessWithTrust,SecurityandEthicsintheDigitalBusiness Partha Iyengar
Agenda as of 31 May 2017 and subject to change
10 Gartner Security & Risk Management Summit 2017#GartnerSEC
Solution ShowcaseDevelop a “shortlist” of technology and service providers. Get exclusive access to client case studies, product roadmaps, and demos. Talk to solution experts who can answer your specific questions.
Sponsorship opportunities For further information about sponsoring this event:
Email: india.exhibits@gartner.com
Tel: +91 22 6613 2140
Exhi
bito
r lis
t as
of 3
1 M
ay 2
017
and
subj
ect t
o ch
ange
Premier Sponsors
Platinum Sponsors
Silver Sponsors
Managing Security at the Speed of Business
Check Point Software Technologies Ltd. is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyberattacks with an unmatched catch rate of malware and other types of threats. Check Point offers a complete security architecture defending enterprises – from networks to mobile devices – in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes.
Akamai Cloud Security Solutions provide the scale to stop the largest DDoS and web application attacks without reducing performance, as well as intelligence into the latest threats and the expertise to adapt to shifting tactics and attack vectors.
RSA offers business-driven security solutions that uniquely link business context with security incidents to help organizations manage risk and protect what matters most.
More than 100 million users in 150 countries rely on Sophos Complete Security solutions as the best protection against complex threats and data loss which is simple to deploy, manage and use.
Tenable provides continuous network monitoring to eliminate blind spots, prioritize threats, and reduce exposure and loss. More than one million Nessus users and 24,000 enterprise customers worldwide trust Tenable.
Citrix aims to power a world where people, organizations and things are securely connected and accessible to make the extraordinary possible. Its technology makes the world’s apps and data secure and easy to access, empowering people to work anywhere and at any time.
Fortinet protects the most valuable assets of over 210,000 organizations worldwide. The company’s fast, secure and global cyber security solutions provide broad, high-performance protection against dynamic threats.
Build more than a network.Juniper Networks challenges the status quo with innovative products, solutions and services critical to businesses by transforming the economics of networking in the connected world.
Now, with the ServiceNow System of Action, every employee, customer, and machine can make requests on a single cloud platform. Every department working on tasks can assign and prioritize, collaborate, get down to root cause issues, gain real-time insights, and drive to action. Your employees are energized, your service levels improve, and you realize game-changing economics. Work at Lightspeed.
Trend Micro Incorporated, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information. Our innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud environments, networks, and endpoints. For more information, visit www.trendmicro.com.
VMware, a global leader in cloud infrastructure and business mobility, helps customers accelerate their digital transformation. VMware enables enterprises to master a software-defined approach to business and IT with VMware Cross-Cloud Architecture™ and solutions for the data center, mobility, and security. VMware is headquartered in Palo Alto, CA and has over 500,000 customers and 75,000 partners worldwide.
Visit gartner.com/in/security for updates and to register! 11
Registration and pricing
Early-bird discount Early-bird price:
47,500 plus taxes
SaveINR7,000whenyouregister by 30 June 2017
Standard price: 54,500plustaxes
Public sector price: 44,000plustaxes
3 ways to register Web: gartner.com/in/security
Email: india.registration@gartner.com
Phone: +918022222079
Gartner event tickets WeacceptoneGartnerSummitticketorone Gartner Catalyst ticket for payment. If you are a client with questions about tickets, please contact your sales representativeorcall+918022222079.
Summit venue
Renaissance Mumbai Convention Centre Hotel #2&3B,NearChinmayanandAshram, Powai,Mumbai,MH,400087
Tel:+912266928888
Termsandconditions To view our Gartner events terms and conditions, visit gartner.com/in/security
Gartner events deliver what you needIn addition to four tracks of the latest Gartner analyst research, keynote speakers and case studies, your Summit registration fee includes complimentary access to these special features:
•Analystone-on-onemeeting
•Asktheanalystroundtables*
•Analyst-userroundtables*
•Workshops*
•SolutionShowcase
•Networkinglunchesandreceptions
*Space is limited and pre-registration is required. Limited to end-user organizations only.
Group rate discount Maximize learning by participating together in relevant sessions or splitting up to cover more ground, sharing your session take-aways later.
Complimentary registrations:
• 1forevery3paidregistrations
• 2forevery5paidregistrations
• 3forevery7paidregistrations
For more information, email apac.registration@gartner.com or contact your Gartner account manager.
Attending a Gartner event can help spur new ideas,fasttrackprojectstrategyandadvanceyourprofessionalskills.We’vedevelopedasetofmaterialsthat will aid in gaining approval from your manager. For more details visit gartner.com/in/security
Convince your boss
Gartner Security & Risk ManagementSummit 201729 – 30 August / Mumbai, Indiagartner.com/in/security
Register now and save 7,000Early-bird discount expires 30 June
Join the conversation!
Gartner Security & Risk Management Summit is on Twitter.
#GartnerSEC
3 ways to register
Web: gartner.com/in/security
Email: india.registration@gartner.com
Phone: +918022222079
©2017Gartner,Inc.and/oritsaffiliates.Allrightsreserved.GartnerisaregisteredtrademarkofGartner, Inc. or its affiliates. For more information, email info@gartner.com or visit gartner.com.
Identity&AccessManagementSummit 6–7March / London,UK
Security & Risk Management Summit 12–15June / NationalHarbor,MD
Security & Risk Management Summit 12–14July / Tokyo, Japan
Security & Risk Management Summit 8–9August / Sao Paulo, Brazil
Security & Risk Management Summit 21 – 22 August / Sydney, Australia
Security & Risk Management Summit 29–30August / Mumbai, India
Security & Risk Management Summit 18–19September / London,UK
Security & Risk Management Summit 30–31October / Dubai,UAE
Identity&AccessManagementSummit 28–30November / LasVegas,NV
United Kingdom6 – 7 March18 – 19 September
United States28 – 30 November
United States12 – 15 June
Brazil8 – 9 August
Dubai30 – 31 October
Mumbai29 – 30 August
Australia21 – 22 August
Japan12 – 14 June
Gartner Security & Risk Management events around the globe