+ All Categories
Home > Documents > Gartner Security & Risk Management Summit 2017 Security & Risk Management Summit 2017 is a premier...

Gartner Security & Risk Management Summit 2017 Security & Risk Management Summit 2017 is a premier...

Date post: 26-May-2018
Category:
Upload: vohanh
View: 217 times
Download: 1 times
Share this document with a friend
12
Gartner Security & Risk Management Summit 2017 29 – 30 August / Mumbai, India gartner.com/in/security Early-bird discount Save 7,000 by 30 June 2017 #GartnerSEC Hot topics: • Risks and opportunities of smart machines, AI & IoT • Vision and strategy for digital business security • Enhancing data loss prevention and dealing with ransomware • Managed security services in the Indian context • Trends in cloud, mobile and application security • State of IoT and IT/OT security • Network-based advanced threat defense technologies • Security awareness best practices GARTNER PREDICTS By 2018, the 60% of enterprises that implement appropriate cloud visibility and control tools will experience one-third fewer security failures.
Transcript
Page 1: Gartner Security & Risk Management Summit 2017 Security & Risk Management Summit 2017 is a premier annual ... • Enterprise Mobility Management Products, V Services, Policies, BYOD

Gartner Security & Risk ManagementSummit 201729 – 30 August / Mumbai, Indiagartner.com/in/security

Early-bird discountSave 7,000 by 30 June 2017

#GartnerSEC

Hot topics:•Risksandopportunitiesofsmart

machines,AI&IoT

•Visionandstrategyfordigitalbusinesssecurity

•Enhancingdatalosspreventionanddealingwithransomware

•ManagedsecurityservicesintheIndiancontext

•Trendsincloud,mobileandapplicationsecurity

•StateofIoTandIT/OTsecurity

•Network-basedadvancedthreatdefensetechnologies

•Securityawarenessbestpractices

GARtnER PREdICtS

By 2018, the 60% of enterprises that implement appropriate cloud visibility and control tools will experience one-third fewer security failures.

Page 2: Gartner Security & Risk Management Summit 2017 Security & Risk Management Summit 2017 is a premier annual ... • Enterprise Mobility Management Products, V Services, Policies, BYOD

2 Gartner Security & Risk Management Summit 2017#GartnerSEC

Gartner Security & Risk Management Summit 2017 is a premier annual gathering of security, risk management and BCM leaders. It provides the insight you need to guide your organization into a secure digital business future. This year’s agenda addresses the latest threats, flexible new security architectures, governance strategies, the CISO role and more. It is a unique opportunity to reinvent your approach to security and risk for the digital age based on Gartner’s trusted independent research and practical recommendations.

Digital transformation demands a radical new approach to security and risk management. Success requires a dramatic departure from conventional security practices. At this year’s Summit, you’ll learn how to shift to more adaptive, dynamic, people-centric approaches to security, such as using context-based intelligence to build digital trust. You’ll also hear strategies to help you deliver IT resilience, the new standard when it comes to security. Join us to find out how you can address escalating risk exposure while giving your organization the freedom to innovate.

Manage Risk. Build trust. Embrace Change.

Why attend?

•Mostcomprehensiveprogramdeveloped based on thousands of inquiries and customer engagement

•Getliveanswerstoyourspecificquestions from 18 analysts through private one-on-one meetings and ask the analyst sessions

• Networkandsharebestpracticeswithpeers at roundtables, workshops and during breaks

• See,meetandhearfromleadingvendors in the security and risk space

• Hearcompellingguestkeynotesandcase study presentations by leading security and risk practitioners

Page 3: Gartner Security & Risk Management Summit 2017 Security & Risk Management Summit 2017 is a premier annual ... • Enterprise Mobility Management Products, V Services, Policies, BYOD

Visit gartner.com/in/security for updates and to register! 3

Who should attend

TheGartnerSecurity&RiskManagementSummitisthemostimportantgatheringforthefollowingteamsandroles:

• ITSecurity&Risk

– CISOs

– Security and risk management leaders

– Chief privacy officer

– Identity & access management professionals

– System integrators

– Technical architects

• CorporateInformationSecurity&Risk

– Steering committee members

– Security Architects

– Policy management professionals

– Business continuity professionals

– Program managers

– Security training & development managers

– Communications professionals

– Local information security officer (LISOs)

• ITSecurityOperations

– Cloud Security professionals

– Security operations managers

– Application and data security professionals

– Threat and vulnerability professionals

– End point and mobility professionals

– Networksecurityprofessionals

– IoT security professionals

• GovernanceRiskandCompliance

– Chief risk officers (CROs)

– Digital risk officers

– IT risk professionals

– GRC application architects

– Information governance

– Big data litigation and regulatory risks

– Finance, audit, legal risk & compliance managers

What’s new for 2017•A brand new track of sessions focusing on how to build, deploy and implement

a security strategy

• IncreasednumberofGartnerAnalyststo address wider and in-depth coverage

•Additional emphasis on:

• Security awareness and behavior management

• Impact of emerging technology on security

• Data loss prevention

• Capacity building

• Digital Trust

• Cybersecurity

• Managed security services

• IT/OT convergence

• Cloud based security

• Network,mobileandendpointsecurity

•New interactive ‘Ask the Analyst’ Q&A sessions that provide you the opportunity to get live answers to your specific questions

Tom Scholtz Research VP

GARtnER PREdICtS

By 2020, more than 60% of organizations willfailtodecryptHTTPSefficiently,missing most targeted web malware.

Page 4: Gartner Security & Risk Management Summit 2017 Security & Risk Management Summit 2017 is a premier annual ... • Enterprise Mobility Management Products, V Services, Policies, BYOD

4 Gartner Security & Risk Management Summit 2017#GartnerSEC

GartnerOpeningKeynote

ManageRisk,BuildTrust,andEmbraceChangebyBecomingAdaptiveEverywhere In this keynote, Gartner will introduce a new charter for information security that will transform all areas of information security moving forward. Building on Gartner’s Adaptive Security Architecture vision, this keynote will extend the ability and need to be continuously adaptive to all disciplines of information security to balance the rapidly changing requirements of digital business with the need to protect the organization from advanced attacks while maintaining acceptable levels of risk and compliance.

Partha Iyengar, Michele Caminos and Ruggero Contu

GartnerClosingKeynote

AComprehensiveGuidetoConnectednessWithTrust,SecurityandEthicsintheDigital Business Trust is the foundation of all personal and business transactions. But who can you trust in digital business, with its endless connections and constantly shifting configurations? Trust is hard enough when it’s personal, but how do you trust and be trusted when dealing with a multitude of people, business and things? You think trust sounds soft and fluffy? Think again! Architecting for trust may be the most tangible contribution a CISO can make to the digital business.

Partha Iyengar

Keynote speakers

Partha Iyengar VP & Gartner Fellow

Michele C. Caminos Managing VP

Ruggero Contu Research Director

Page 5: Gartner Security & Risk Management Summit 2017 Security & Risk Management Summit 2017 is a premier annual ... • Enterprise Mobility Management Products, V Services, Policies, BYOD

Visit gartner.com/in/security for updates and to register! 5

Meet the analysts

Saniye Burcu Alaybeyi Research Director

Manjunath Bhat Research Director

Michele C. Caminos Managing VP

John Girard VP Distinguished Analyst

Partha Iyengar VP & Gartner Fellow

Rajpreet Kaur Sr Research Analyst

Ganesh Ramamoorthy Research VP

Brian Reed Research Director

Steve Riley Research Director

Ruggero Contu Research Director

Alan Dayley Research Director

Sid Deshpande Principal Research Analyst

Lawrence Orans Research VP

Eric Ouellet Research VP

Khushbu Pratap Principal Research Analyst

Tom Scholtz VP & Gartner Fellow

Anmol Singh Principal Research Analyst

Roberta J. Witty Research VP

• Go-to-MarketPlanning• MarketandCompetitiveIntelligenceManagement• NewMarketOpportunities• SalesandChannelStrategy• PositioningandMessaging

• MobileandEndpointStrategies• EndpointandMobileSecurity• InfrastructureandOperationsLeaders• Office365,GSuiteorOtherCloudOfficeInitiatives• BuildandMarketFixedandMobilityServices

• Marketing,SalesandChannelEffectiveness• NewMarketOpportunities• Go-to-MarketPlanning• DataCenterModernizationandConsolidation• InfrastructureandOperationsLeaders

• EndpointandMobileSecurity• MobileandEndpointStrategies• MobileSecurityMaturity• EnterpriseMobilityManagementProducts,

Services, Policies, BYOD

• BuildingandExpandingaDigitalBusiness• CIODesignofBimodalandotherITOperationaland

Organizational Models• CIORoleEvolution• LeadingITinaMidsizeEnterprise

• NetworkandGatewaySecurity• InformationSecurityManagementProgram• AdvancedThreatDetection(APT)Technologyand

Vendor Selection

• ExploitSemiconductorandElectronicsMarketDynamics• Go-to-MarketPlanning• PositioningandMessaging• MarketandCompetitiveIntelligenceManagement• ProductStrategy

• SecurityandRiskManagementLeaders• CloudSecurity• MobileandEndpointStrategies• ApplicationandDataSecurity• NetworkandGatewaySecurity

• SecurityCapabilitiesofMajorPublicCloudProviders• Cloud-basedSecurityServices,Securityasa

Service, Software-defined Security

• ProductStrategy• MarketandCompetitiveIntelligenceManagement• Marketing,SalesandChannelEffectiveness• MobileandEndpointStrategies

• ExploitInfrastructureSoftwareMarketDynamics• DataandAnalyticsPrograms• DataandAnalyticsLeaders• BuildandMarketDataandAnalyticsOfferings• AnalyticsandBusinessIntelligenceModernization

• MarketandCompetitiveIntelligenceManagement• NewMarketOpportunities• SecurityandRiskManagementLeaders• PositioningandMessaging• InformationSecurityTechnologyandServices

• InformationSecurityTechnologyandServices• SecurityandRiskManagementLeaders

• EndpointProtection• eEdpointDetectionandResponse• Ransomware• Malware• Anti-virus

• SecurityComplianceandAuditManagement• InformationSecurityManagementProgram• RiskManagementProgram• CloudSecurity• SecurityandRiskManagementLeaders

• InformationSecurityManagementProgram• SecurityandRiskManagementLeaders• RiskManagementProgram

• IdentityandAccessManagementStrategy,PolicyPlanning, Implementation and Operations

• PrivilegedAccessManagement• IdentityasaService(IDaaS),• IdentityandAccessGovernance

• WomeninIT• BusinessContinuityManagement• CrisisManagement• BusinessResilience

Gartner has the largest base of IT research analysts and consultants in the world. Gartner’s global research organization offers the combinedbrainpowerof1,280researchanalystsandconsultantswhoadviseexecutivesin85countrieseveryday.HearfromtheGartner Security & Risk Management Research community as they share their latest insight and advice.

Page 6: Gartner Security & Risk Management Summit 2017 Security & Risk Management Summit 2017 is a premier annual ... • Enterprise Mobility Management Products, V Services, Policies, BYOD

6 Gartner Security & Risk Management Summit 2017#GartnerSEC

Plan your experience

Agenda tracks

A TheCISOProgram—CISOasBusinessLeader

HotTopics:• VisionandStrategyforDigitalBusinessSecurity

• DigitalSecurityOrganizationNeededforIoTInnovation

• HowtoworkwithSecurityOperationsCentersServiceProviders

• CriticalQuestionstoAskAboutSecurityTestingPractices

• HowSecurityFunctioncanbePerformedbyNon-securityTeams

• ScalingInformation-CentricSecurity

• Drivingsecurityawarenessprograms

B TheCyberSecurityProgram—BuildingTrustandResiliencewithMore Agile Security

HotTopics:•OvercomingNetworkandEndpointSecurityChallenges

• NextGenerationofAnti-malware

• AddressingSecurityIssuesThatAriseinIntegratingIoTandCloud

• BusinessContinuityandResilience

• ChangingDDoSThreatLandscape

• EffectivelyDeployingThreatIntelligence

C TheRisk&ComplianceProgram—LeverageRiskManagementtoUnderpintheDigitalBusinessTransition

HotTopics:•GainingControlofUnstructuredData

• StateofIAM

• SecurityinInformationGovernance

• StateofIoTandIT/OTSecurity2017

• AssessingThird-partySecurityControls

• PropelYourBusinessWithDigitalRiskManagement

• TopTrendsintheIRMSMarket

D TheSecurityOperationProgram—HowtoBuild,DeployandImplementaSecurityStrategy

HotTopics:• BestPracticestoSource,ManageandRetainSecurityPersonnel

• SpeakingtheLanguageofBusiness–AnIntervention

• HowtoOutsourceSecurityFunctionsEffectively

• BestPracticesforImplementingaPrivilegedAccessManagementSolution

• HowtoProtectMobileApps

• HowtobeSecureinAmazonWebServicesandMicrosoftAzure

• StateofMobileSecurity

Customize your agenda

Gartner Events Navigator AppGartnerEventsNavigatorApphelpsyouorganize, view and custom-create an agenda based on:

• Dateandtime

• Track

• Analyst/speakerprofiles

• Sessiondescriptions

• Keyinitiatives

• Verticalindustries

Page 7: Gartner Security & Risk Management Summit 2017 Security & Risk Management Summit 2017 is a premier annual ... • Enterprise Mobility Management Products, V Services, Policies, BYOD

Visit gartner.com/in/security for updates and to register! 7

Analyst interaction

Analyst one-on-one meeting A complimentary consultation with a Gartner analyst of your choice

Ask the analyst roundtables* In these interactive sessions, you will hear the analyst answer commonly asked questions, learn from questions from your peers, and ask your own question

Analyst-user roundtable discussion* Moderated by Gartner analysts for exchanging ideas and best practices with your peers

Workshops* Small-scale and interactive; drill down on specific topics with a how-to focus

*Space is limited and pre-registration is required. Limited to end-user organizations only.

network with peers

End–user case studies Learn about recent implementations firsthand, with anopportunityforQ&AwiththeITand business executives leading the initiative

Solution Showcase reception Connect with peers in similar roles who face similar challenges, at the networking reception on the Solution Showcase designed to build relationships and facilitate the meaningful exchange of ideas and information

Meet solution providers

Solution Showcase Explore cutting-edge IT solutions from top providers

Solution provider sessions Exhibitors share their insights on the latest products and services

Vendor-user roundtable discussion* Moderated discussion and best practice sharing amongst attendees facilitated by a solution provider

GARtnER PREdICtS

Through2020,morethanhalfofIaaSsecurityfailureswillbe from inadequate customer management of identities, access and privilege.

GARtnER PREdICtS

By2021,25%ofcorporatedatatrafficwill bypass perimeter security (up from 10% in 2016) and flow directly from mobile devices to the cloud.

Page 8: Gartner Security & Risk Management Summit 2017 Security & Risk Management Summit 2017 is a premier annual ... • Enterprise Mobility Management Products, V Services, Policies, BYOD

8 Gartner Security & Risk Management Summit 2017#GartnerSEC

Agenda at a glance When attending this event, please refer to the Gartner Events mobile app for the most up to date session and location information.

07:30–20:45 Registration

08:30–09:00 Tutorial: Security in Information Governance: Align Risk, Optimization and Data Value Initiatives Alan Dayley Tutorial:UtilizationofNetworkSecurityPolicyManagementToolsinanEnterpriseNetwork Rajpreet Kaur

09:00–10:00 GartnerOpeningKeynote:ManageRisk,BuildTrust,andEmbraceChangebyBecomingAdaptiveEverywhere Partha Iyengar, Michelle Caminos and Ruggero Contu

10:00–10:30 Refreshment Break in the Solution Showcase

TRACKS A. The CISO Program – CISO as Business Leader

B. The Cyber Security Program – Building Trust and Resilience With More Agile Security

C. The Risk & Compliance Program – Leverage Risk Management to Underpin the Digital Business Transition

D. The Security Operation Program – How to Build, Deploy and Implement a Security Strategy

Workshops Analyst-User Roundtables and Ask the Analyst Sessions

10:30–11:15 Develop a Pragmatic Vision and Strategy for Digital Business Security Tom Scholtz

HowtoAddanEndpointDetectionandResponse Solution to Your Security Program Eric Ouellet

The State of IAM Anmol Singh StateofMobileSecurity2017:FromtheFireto the Frying Pan John Girard

10:30 – 12:00 Workshop: Recovering Your Business After a Targeted Cyberattack Roberta J. Witty

10:30 – 11:15 Ask the Analyst: Best Practices for Planning a OT Security Strategy Saniye Alaybeyi

11:30–12:15 TheDigitalSecurityOrganizationNeededforIoT Innovation Ganesh Ramamoorthy

Enhancing Data Loss Prevention, Dealing with Ransomware:WhyIdentityandDataSecurityNeedtoConverge Brian Reed

GainingControlofUnstructuredData:ReduceRisksWhileDerivingValue Alan Dayley

HowtobeSecureinAmazonWebServicesand Microsoft Azure Steve Riley

12:15–13:30 Lunch in the Solution Showcase 13:00 – 13:20 MagicQuadrantforEnterpriseMobilityManagementSuites Manjunath Bhat

13:30–14:15 Should You Build a Security Operations Center? Sid Deshpande

NextGenerationAnti-Malware,TheGood,BadandUgly Eric Ouellet

NetworkSecurityChallengesfor2017andBeyond Lawrence Orans

Identity and Access Management for the IoT Era Anmol Singh

13:30 – 14:30 Ask the Analyst: Making Your Organization Less Susceptible to Data Theft Brian Reed

14:30–15:00 Solution Provider Sessions

15:15–16:00 CISOPlaybook:CriticalQuestionstoAskAbout Security Testing Practices John Girard

The Marriage of Cloud and IoT Security Saniye Alaybeyi

IT Risk Management Solutions: Setting Right Expectations—HowNotToPutTheCartBeforeTheHorse Khushbu Pratap

HowtoProtectMobileApps Manjunath Bhat

15:30 – 16:30 Analyst-UserRoundtable: Best Practices to Source, Manage and Retain Security Personnel Michelle Caminos

16:15–16:45 Solution Provider Sessions

17:00–17:30 To the Point: One Shifting Delivery Models in Security: Cloud-Based Security Ruggero Contu

TothePoint:KeyCybersecurityInitiativesforIndian Enterprises Rajpreet Kaur

To the Point: Managed Security Services in the India Context Sid Deshpande

To the Point: Developing a SaaS Security Architecture Steve Riley

17:30–18:00 Refreshment Break in the Solution Showcase 17:35 – 18:55 EndpointProtectionPlatformMagicQuadrant Eric Ouellet

18:00–18:45 GuestKeynote

18:45–20:45 Solution Showcase Reception and Dinner

08:00–17:15 Registration

09:00–09:45 GuestKeynote

09:45–10:15 Refreshment Break in the Solution Showcase 09:50 – 10:10 ITRiskManagementSolutionsMagicQuadrant Khushbu Pratap

10:15–11:00 Maverick Research: Disband Your Security TeamNow! Tom Scholtz

State of Business Continuity Management for BusinessResilience2017 Roberta J. Witty

StateofIoTandIT/OTSecurity2017 Ganesh Ramamoorthy

Best Practices for Implementing a Privileged Access Management Solution Anmol Singh

10:15 – 11:45 Workshop: Consider Cultural and Organizational Challenges Ahead of Technology Deployment for OT Security Saniye Alaybeyi11:15–11:45 Solution Provider Sessions

12:00–12:45 RiskandTrustCultureareBroken—Here'sHowtoFixThem Partha Iyengar

EverythingYouNeedtoKnowAbouttheEver-Changing DDoS Threat Lawrence Orans

TenQuestionsCustomerOrganizationsNeedto Ask Their Vendors (including CSPs) on Security Assurance Khushbu Pratap

The Benefits of Central Log Management for Security Operations Sid Deshpande

12:00 – 13:30 Workshop: WomeninIT--ExclusiveWorkshopforDiverstiyForum Roberta J. Witty

12:00 – 12:45 Ask the Analyst: DemystifyingMobileSecurityforaPerimeter-lessWorkEnvironment Manjunath Bhat

13:00–13:30 Case Studies

13:30–14:30 Lunch in the Solution Showcase 13:40 – 14:00 MagicQuadrantsforNetworkSecurityDevices(EnterpriseFirewall,IPS,WAF) Rajpreet Kaur

14:30–15:00 To the Point: IT Cost Optimization and Significantly Reducing Security I&O Costs Michelle Caminos

TothePoint:HowisEnterpriseMobilityManagement (EMM) different from Mobile Threat Defense (MTD) Manjunath Bhat

To the Point: Full Spectrum Security for RemoteandMobileWorkers John Girard

To the Point: It’s Time to Isolate Your Services From the Internet Cesspool Steve Riley

14:15 – 15:00 Ask the Analyst: HowtoReduceRiskandLowerCostsforUnstructuredData Alan Dayley

15:15–16:00 The State of Security Behavior Management Tom Scholtz

Managing the Security Risks of IoT Innovation Ganesh Ramamoorthy

ThreatIntelligence:CuttingThroughtheHypeto Realize Opportunities for Your Organization Ruggero Contu

Scale Information-Centric Security From Internal Operations to Business Partners and Beyond Brian Reed

15:15 – 16:15 Analyst-UserRoundtable: DDoS Roundtable Lawrence Orans

16:00–16:30 Refreshment Break in the Solution Showcase

16:30–17:15 GartnerClosingKeynote:AComprehensiveGuidetoConnectednessWithTrust,SecurityandEthicsintheDigitalBusiness Partha Iyengar

Tues

day

29AUGUST20

17Wed

nesd

ay30

AUGUST20

17

Page 9: Gartner Security & Risk Management Summit 2017 Security & Risk Management Summit 2017 is a premier annual ... • Enterprise Mobility Management Products, V Services, Policies, BYOD

Visit gartner.com/in/security for updates and to register! 9

07:30–20:45 Registration

08:30–09:00 Tutorial: Security in Information Governance: Align Risk, Optimization and Data Value Initiatives Alan Dayley Tutorial:UtilizationofNetworkSecurityPolicyManagementToolsinanEnterpriseNetwork Rajpreet Kaur

09:00–10:00 GartnerOpeningKeynote:ManageRisk,BuildTrust,andEmbraceChangebyBecomingAdaptiveEverywhere Partha Iyengar, Michelle Caminos and Ruggero Contu

10:00–10:30 Refreshment Break in the Solution Showcase

TRACKS A. The CISO Program – CISO as Business Leader

B. The Cyber Security Program – Building Trust and Resilience With More Agile Security

C. The Risk & Compliance Program – Leverage Risk Management to Underpin the Digital Business Transition

D. The Security Operation Program – How to Build, Deploy and Implement a Security Strategy

Workshops Analyst-User Roundtables and Ask the Analyst Sessions

10:30–11:15 Develop a Pragmatic Vision and Strategy for Digital Business Security Tom Scholtz

HowtoAddanEndpointDetectionandResponse Solution to Your Security Program Eric Ouellet

The State of IAM Anmol Singh StateofMobileSecurity2017:FromtheFireto the Frying Pan John Girard

10:30 – 12:00 Workshop: Recovering Your Business After a Targeted Cyberattack Roberta J. Witty

10:30 – 11:15 Ask the Analyst: Best Practices for Planning a OT Security Strategy Saniye Alaybeyi

11:30–12:15 TheDigitalSecurityOrganizationNeededforIoT Innovation Ganesh Ramamoorthy

Enhancing Data Loss Prevention, Dealing with Ransomware:WhyIdentityandDataSecurityNeedtoConverge Brian Reed

GainingControlofUnstructuredData:ReduceRisksWhileDerivingValue Alan Dayley

HowtobeSecureinAmazonWebServicesand Microsoft Azure Steve Riley

12:15–13:30 Lunch in the Solution Showcase 13:00 – 13:20 MagicQuadrantforEnterpriseMobilityManagementSuites Manjunath Bhat

13:30–14:15 Should You Build a Security Operations Center? Sid Deshpande

NextGenerationAnti-Malware,TheGood,BadandUgly Eric Ouellet

NetworkSecurityChallengesfor2017andBeyond Lawrence Orans

Identity and Access Management for the IoT Era Anmol Singh

13:30 – 14:30 Ask the Analyst: Making Your Organization Less Susceptible to Data Theft Brian Reed

14:30–15:00 Solution Provider Sessions

15:15–16:00 CISOPlaybook:CriticalQuestionstoAskAbout Security Testing Practices John Girard

The Marriage of Cloud and IoT Security Saniye Alaybeyi

IT Risk Management Solutions: Setting Right Expectations—HowNotToPutTheCartBeforeTheHorse Khushbu Pratap

HowtoProtectMobileApps Manjunath Bhat

15:30 – 16:30 Analyst-UserRoundtable: Best Practices to Source, Manage and Retain Security Personnel Michelle Caminos

16:15–16:45 Solution Provider Sessions

17:00–17:30 To the Point: One Shifting Delivery Models in Security: Cloud-Based Security Ruggero Contu

TothePoint:KeyCybersecurityInitiativesforIndian Enterprises Rajpreet Kaur

To the Point: Managed Security Services in the India Context Sid Deshpande

To the Point: Developing a SaaS Security Architecture Steve Riley

17:30–18:00 Refreshment Break in the Solution Showcase 17:35 – 18:55 EndpointProtectionPlatformMagicQuadrant Eric Ouellet

18:00–18:45 GuestKeynote

18:45–20:45 Solution Showcase Reception and Dinner

08:00–17:15 Registration

09:00–09:45 GuestKeynote

09:45–10:15 Refreshment Break in the Solution Showcase 09:50 – 10:10 ITRiskManagementSolutionsMagicQuadrant Khushbu Pratap

10:15–11:00 Maverick Research: Disband Your Security TeamNow! Tom Scholtz

State of Business Continuity Management for BusinessResilience2017 Roberta J. Witty

StateofIoTandIT/OTSecurity2017 Ganesh Ramamoorthy

Best Practices for Implementing a Privileged Access Management Solution Anmol Singh

10:15 – 11:45 Workshop: Consider Cultural and Organizational Challenges Ahead of Technology Deployment for OT Security Saniye Alaybeyi11:15–11:45 Solution Provider Sessions

12:00–12:45 RiskandTrustCultureareBroken—Here'sHowtoFixThem Partha Iyengar

EverythingYouNeedtoKnowAbouttheEver-Changing DDoS Threat Lawrence Orans

TenQuestionsCustomerOrganizationsNeedto Ask Their Vendors (including CSPs) on Security Assurance Khushbu Pratap

The Benefits of Central Log Management for Security Operations Sid Deshpande

12:00 – 13:30 Workshop: WomeninIT--ExclusiveWorkshopforDiverstiyForum Roberta J. Witty

12:00 – 12:45 Ask the Analyst: DemystifyingMobileSecurityforaPerimeter-lessWorkEnvironment Manjunath Bhat

13:00–13:30 Case Studies

13:30–14:30 Lunch in the Solution Showcase 13:40 – 14:00 MagicQuadrantsforNetworkSecurityDevices(EnterpriseFirewall,IPS,WAF) Rajpreet Kaur

14:30–15:00 To the Point: IT Cost Optimization and Significantly Reducing Security I&O Costs Michelle Caminos

TothePoint:HowisEnterpriseMobilityManagement (EMM) different from Mobile Threat Defense (MTD) Manjunath Bhat

To the Point: Full Spectrum Security for RemoteandMobileWorkers John Girard

To the Point: It’s Time to Isolate Your Services From the Internet Cesspool Steve Riley

14:15 – 15:00 Ask the Analyst: HowtoReduceRiskandLowerCostsforUnstructuredData Alan Dayley

15:15–16:00 The State of Security Behavior Management Tom Scholtz

Managing the Security Risks of IoT Innovation Ganesh Ramamoorthy

ThreatIntelligence:CuttingThroughtheHypeto Realize Opportunities for Your Organization Ruggero Contu

Scale Information-Centric Security From Internal Operations to Business Partners and Beyond Brian Reed

15:15 – 16:15 Analyst-UserRoundtable: DDoS Roundtable Lawrence Orans

16:00–16:30 Refreshment Break in the Solution Showcase

16:30–17:15 GartnerClosingKeynote:AComprehensiveGuidetoConnectednessWithTrust,SecurityandEthicsintheDigitalBusiness Partha Iyengar

Agenda as of 31 May 2017 and subject to change

Page 10: Gartner Security & Risk Management Summit 2017 Security & Risk Management Summit 2017 is a premier annual ... • Enterprise Mobility Management Products, V Services, Policies, BYOD

10 Gartner Security & Risk Management Summit 2017#GartnerSEC

Solution ShowcaseDevelop a “shortlist” of technology and service providers. Get exclusive access to client case studies, product roadmaps, and demos. Talk to solution experts who can answer your specific questions.

Sponsorship opportunities For further information about sponsoring this event:

Email: [email protected]

Tel: +91 22 6613 2140

Exhi

bito

r lis

t as

of 3

1 M

ay 2

017

and

subj

ect t

o ch

ange

Premier Sponsors

Platinum Sponsors

Silver Sponsors

Managing Security at the Speed of Business

Check Point Software Technologies Ltd. is the largest network cyber security vendor globally, providing industry-leading solutions and protecting customers from cyberattacks with an unmatched catch rate of malware and other types of threats. Check Point offers a complete security architecture defending enterprises – from networks to mobile devices – in addition to the most comprehensive and intuitive security management. Check Point protects over 100,000 organizations of all sizes.

Akamai Cloud Security Solutions provide the scale to stop the largest DDoS and web application attacks without reducing performance, as well as intelligence into the latest threats and the expertise to adapt to shifting tactics and attack vectors.

RSA offers business-driven security solutions that uniquely link business context with security incidents to help organizations manage risk and protect what matters most.

More than 100 million users in 150 countries rely on Sophos Complete Security solutions as the best protection against complex threats and data loss which is simple to deploy, manage and use.

Tenable provides continuous network monitoring to eliminate blind spots, prioritize threats, and reduce exposure and loss. More than one million Nessus users and 24,000 enterprise customers worldwide trust Tenable.

Citrix aims to power a world where people, organizations and things are securely connected and accessible to make the extraordinary possible. Its technology makes the world’s apps and data secure and easy to access, empowering people to work anywhere and at any time.

Fortinet protects the most valuable assets of over 210,000 organizations worldwide. The company’s fast, secure and global cyber security solutions provide broad, high-performance protection against dynamic threats.

Build more than a network.Juniper Networks challenges the status quo with innovative products, solutions and services critical to businesses by transforming the economics of networking in the connected world.

Now, with the ServiceNow System of Action, every employee, customer, and machine can make requests on a single cloud platform. Every department working on tasks can assign and prioritize, collaborate, get down to root cause issues, gain real-time insights, and drive to action. Your employees are energized, your service levels improve, and you realize game-changing economics. Work at Lightspeed.

Trend Micro Incorporated, a global leader in cyber security solutions, helps to make the world safe for exchanging digital information. Our innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud environments, networks, and endpoints. For more information, visit www.trendmicro.com.

VMware, a global leader in cloud infrastructure and business mobility, helps customers accelerate their digital transformation. VMware enables enterprises to master a software-defined approach to business and IT with VMware Cross-Cloud Architecture™ and solutions for the data center, mobility, and security. VMware is headquartered in Palo Alto, CA and has over 500,000 customers and 75,000 partners worldwide.

Page 11: Gartner Security & Risk Management Summit 2017 Security & Risk Management Summit 2017 is a premier annual ... • Enterprise Mobility Management Products, V Services, Policies, BYOD

Visit gartner.com/in/security for updates and to register! 11

Registration and pricing

Early-bird discount Early-bird price:

47,500 plus taxes

SaveINR7,000whenyouregister by 30 June 2017

Standard price: 54,500plustaxes

Public sector price: 44,000plustaxes

3 ways to register Web: gartner.com/in/security

Email: [email protected]

Phone: +918022222079

Gartner event tickets WeacceptoneGartnerSummitticketorone Gartner Catalyst ticket for payment. If you are a client with questions about tickets, please contact your sales representativeorcall+918022222079.

Summit venue

Renaissance Mumbai Convention Centre Hotel #2&3B,NearChinmayanandAshram, Powai,Mumbai,MH,400087

Tel:+912266928888

Termsandconditions To view our Gartner events terms and conditions, visit gartner.com/in/security

Gartner events deliver what you needIn addition to four tracks of the latest Gartner analyst research, keynote speakers and case studies, your Summit registration fee includes complimentary access to these special features:

•Analystone-on-onemeeting

•Asktheanalystroundtables*

•Analyst-userroundtables*

•Workshops*

•SolutionShowcase

•Networkinglunchesandreceptions

*Space is limited and pre-registration is required. Limited to end-user organizations only.

Group rate discount Maximize learning by participating together in relevant sessions or splitting up to cover more ground, sharing your session take-aways later.

Complimentary registrations:

• 1forevery3paidregistrations

• 2forevery5paidregistrations

• 3forevery7paidregistrations

For more information, email [email protected] or contact your Gartner account manager.

Attending a Gartner event can help spur new ideas,fasttrackprojectstrategyandadvanceyourprofessionalskills.We’vedevelopedasetofmaterialsthat will aid in gaining approval from your manager. For more details visit gartner.com/in/security

Convince your boss

Page 12: Gartner Security & Risk Management Summit 2017 Security & Risk Management Summit 2017 is a premier annual ... • Enterprise Mobility Management Products, V Services, Policies, BYOD

Gartner Security & Risk ManagementSummit 201729 – 30 August / Mumbai, Indiagartner.com/in/security

Register now and save 7,000Early-bird discount expires 30 June

Join the conversation!

Gartner Security & Risk Management Summit is on Twitter.

#GartnerSEC

3 ways to register

Web: gartner.com/in/security

Email: [email protected]

Phone: +918022222079

©2017Gartner,Inc.and/oritsaffiliates.Allrightsreserved.GartnerisaregisteredtrademarkofGartner, Inc. or its affiliates. For more information, email [email protected] or visit gartner.com.

Identity&AccessManagementSummit 6–7March / London,UK

Security & Risk Management Summit 12–15June / NationalHarbor,MD

Security & Risk Management Summit 12–14July / Tokyo, Japan

Security & Risk Management Summit 8–9August / Sao Paulo, Brazil

Security & Risk Management Summit 21 – 22 August / Sydney, Australia

Security & Risk Management Summit 29–30August / Mumbai, India

Security & Risk Management Summit 18–19September / London,UK

Security & Risk Management Summit 30–31October / Dubai,UAE

Identity&AccessManagementSummit 28–30November / LasVegas,NV

United Kingdom6 – 7 March18 – 19 September

United States28 – 30 November

United States12 – 15 June

Brazil8 – 9 August

Dubai30 – 31 October

Mumbai29 – 30 August

Australia21 – 22 August

Japan12 – 14 June

Gartner Security & Risk Management events around the globe


Recommended