www.gartner.com Open in urlscan Pro
2606:4700:4400::6812:22dd  Public Scan

Submitted URL: https://app.gartnerformarketers.com/e/er?utm_campaign=EVT_IN_2025_SECI11_BB_E3_Generic_Agenda_MSTO&utm_medium=email&utm_source=Eloqu...
Effective URL: https://www.gartner.com/en/conferences/apac/security-risk-management-india/agenda?utm_campaign=EVT_IN_2025_SECI11_BB_E3_...
Submission: On October 28 via manual from IN — Scanned from DE

Form analysis 2 forms found in the DOM

<form id="form-one" class="formOne validator">
  <div class="form-heading">
    <div class="row">
      <div class="col-md-9 col-sm-12 col-xs-12">
        <h3 class="heading color-gartner-blue">Want to stay informed?</h3>
        <h5 class="sub-heading color-gartner-blue"> Get conference email updates.</h5>
      </div>
    </div>
  </div>
  <div class="row">
    <div class="form-one col-md-9 col-sm-12 col-xs-12">
      <span class="field-container">
        <label for="email-address">Work Email</label>
        <input id="email-address" class="form-control step-one-form-control emailAddress" type="email" name="emailAddress" placeholder="" data-validator="email" inputmode="email" errormessage="Please enter a valid email address." required="">
        <img src="https://emt.gartnerweb.com/ngw/commonassets/images/build-graphics/vis-cue-test-arrow.png" class="email-arrow-pointer" alt="">
        <span class="icon gcom-icon-check-circle"></span>
      </span>
      <span class="field-container personType">
        <label for="poID">Person Type</label>
        <input id="poID" class="form-control poID" type="text" name="poID">
        <span class="icon gcom-icon-check-circle"></span>
      </span>
    </div>
    <div class="form-one col-md-3 col-sm-12 col-xs-12 email-check">
      <button type="submit"
        class="btn btBtn btnNormalWidth button action-button step-one-action-button button-gray form-submit-button conference-theme-bg-color conference-theme-bg-color-hover conference-theme-border-2px btn-primary conference-theme-text-color"
        id="continue" errormessage="All fields are required.">
        <i class="gcom-icon-refresh icon-spinner" id="eloqua-final-submit-loading"></i> Continue </button>
    </div>
  </div>
  <div class="footer row">
    <div class="col-xs-12">
      <div class="row privacy-policy">
        <div class="col-xs-12">
          <div class="lock">
            <i class="dark gcom-icon-lock"></i>
          </div>
          <div class="privacy-container">
            <span class="privacy-text ">
              <p> By clicking the "Continue" button, you are agreeing to the <a href="https://www.gartner.com/en/about/policies/terms-of-use" target="_blank">
               Gartner Terms of Use
            </a> and <a href="https://www.gartner.com/en/about/policies/privacy" target="_blank">
               Privacy Policy.
            </a>
              </p>
            </span>
          </div>
        </div>
      </div>
    </div>
  </div>
</form>

<form id="submit-form" class="submitForm validator">
  <div class="form-two">
    <div class="row">
      <div class="col-xs-12">
        <h5 class="contactFormTitle">Contact Information</h5>
        <p class="fields-required">All fields are required.</p>
      </div>
      <div class="col-md-6 col-sm-12 col-xs-12 information">
        <div class="personal-information">
          <span class="field-container">
            <label for="first-name">First Name</label>
            <input id="first-name" class="form-control firstName" type="text" name="firstName" minlength="1" data-validator="string" inputmode="text" errormessage="Please enter your first name" required="">
            <span class="icon gcom-icon-check-circle"></span>
          </span>
          <span class="field-container">
            <label for="last-name">Last Name</label>
            <input id="last-name" class="form-control lastName" type="text" name="lastName" minlength="1" data-validator="string" inputmode="text" errormessage="Please enter your last name" required="">
            <span class="icon gcom-icon-check-circle"></span>
          </span>
          <span class="field-container">
            <label for="bus-phone">Business Phone</label>
            <input id="bus-phone" class="form-control busPhone" type="tel" name="busPhone" placeholder="" minlength="4" data-validator="number" inputmode="tel" errormessage="Please enter your phone number" required="">
            <span class="icon gcom-icon-check-circle"></span>
          </span>
          <span class="field-container">
            <label for="country">Country</label>
            <select required="" name="country" id="country" class="form-control country" errormessage="Please select your country">
              <option value="" disabled="" selected=""></option>
            </select>
            <span class="icon gcom-icon-check-circle"></span>
          </span>
          <span class="field-container personType">
            <label for="poID">Person Type</label>
            <input id="poID" class="form-control poID" type="text" name="poID">
            <span class="icon gcom-icon-check-circle"></span>
          </span>
        </div>
      </div>
      <div class="col-md-6 col-sm-12 col-xs-12 information">
        <div class="company-information">
          <span class="field-container">
            <label for="job-title">Job Title</label>
            <input id="job-title" class="form-control jobTitle" type="text" name="jobTitle" placeholder="" minlength="1" errormessage="Please enter your job title" required="">
            <span class="icon gcom-icon-check-circle"></span>
          </span>
          <span class="field-container">
            <label for="company">Company Name</label>
            <input id="company" class="form-control company" type="text" name="company" placeholder="" data-validator="string" errormessage="Please enter your company&amp;#39;s name" required="">
            <span class="icon gcom-icon-check-circle"></span>
          </span>
          <span class="field-container">
            <label for="department">Job Function</label>
            <div class="multilevel-dropdown">
              <input id="department" class="form-control department optedinfield" type="button" name="jobFunction" data-toggle="dropdown" inputmode="text" errormessage="Please select your job function" required=""
                onchange="FormUtils.populateJobRole(this);">
              <i class="icon gcom-icon-check-circle"></i>
              <ul class="dropdown-menu dropdown-list" style="top: 65px;"></ul>
            </div>
          </span>
          <span class="field-container">
            <label for="jobRole">Job Role</label>
            <select required="" name="jobRole" id="jobRole" class="form-control jobRole" errormessage="Please select your job role" onchange="FormUtils.populateJobFunctionValue(this);">
              <option hidden="" value=""></option>
            </select>
            <span class="icon gcom-icon-check-circle"></span>
          </span>
        </div>
      </div>
    </div>
  </div>
  <div class="steps">
    <div class="step-lists">
      <li></li>
      <li></li>
    </div>
    <div class="underline"></div>
    <p class="step-indicator">Step 2 of 2</p>
  </div>
  <div class="consent-error-msg hidden">
    <p>Please provide the consent below</p>
  </div>
  <div class="privacyConsent checkbox hidden">
    <input type="checkbox" name="consentbox" id="consentbox0">
    <label class="check-label consent-text" for="consentbox0">
      <p> I have read, understood and accepted Gartner <a href="https://www.gartner.com/en/about/policies/privacy/china-pipl-gartner" target="_blank">
     Separate Consent Letter
     </a> , whereby I agree (1) to provide Gartner with my personal information, and understand that information will be transferred outside of mainland China and processed by Gartner group companies and other legitimate processing parties and (2)
        to be contacted by Gartner group companies via internet, mobile/telephone and email, for the purposes of sales, marketing and research. </p>
    </label>
  </div>
  <div class="footer row">
    <div class="col-md-6 col-sm-6 col-xs-3 is-back-button">
      <a href="javascript:;" class="btn btBtn btnNormalWidth btn-secondary back-button" data-scroll-offset="1730084701588">
                  Back
               </a>
    </div>
    <div class="has-back-button form-action col-md-6 col-sm-6 col-xs-9">
      <button type="submit"
        class="btn btBtn btnNormalWidth button step-two-action-button col-md-6 col-sm-12 col-xs-12 form-submit-button button-gray conference-theme-bg-color conference-theme-bg-color-hover conference-theme-border-2px btn-primary conference-theme-text-color"
        id="submit" errormessage="All fields are required.">
        <i class="gcom-icon-refresh icon-spinner" id="eloqua-final-submit-loading"></i> Sign up Now </button>
    </div>
    <div class="col-xs-12">
      <div class="row privacy-policy">
        <div class="col-xs-12">
          <div class="lock">
            <i class="dark gcom-icon-lock"></i>
          </div>
          <div class="privacy-container">
            <span class="privacy-text ">
              <p> By clicking the "Sign up Now" button, you are agreeing to the <a href="https://www.gartner.com/en/about/policies/terms-of-use" target="_blank">
               Gartner Terms of Use
            </a> and <a href="https://www.gartner.com/en/about/policies/privacy" target="_blank">
               Privacy Policy.
            </a>
              </p>
            </span>
          </div>
        </div>
      </div>
    </div>
  </div>
  <!-- Hidden fields -->
  <input type="hidden" value="true" class="activateCountryFetch">
  <input id="lead-gen-elqFormName" name="elqFormName" type="hidden" value="EVT_GB_YOY_UNV_SU" class="hiddenParams">
  <input id="lead-gen-businessUnit" name="busUnit" type="hidden" value="EVT" class="hiddenParams">
  <input id="lead-gen-language" name="language" type="hidden" value="en" class="hiddenParams">
  <input id="lead-gen-mktgCode2" name="mktgCode2" type="hidden" value="" class="hiddenParams">
  <input id="lead-gen-elqCustomerGUID" name="guid" type="hidden" value="" class="hiddenParams">
  <input id="lead-gen-region" name="region" type="hidden" value="" class="hiddenParams">
  <input id="lead-gen-year" name="year" type="hidden" value="10 March 2025 00:00:00" class="hiddenParams">
  <input id="lead-gen-urlTarget" name="" type="hidden" value="false" class="hiddenParams">
  <input id="lead-gen-autoRedirect" name="" type="hidden" value="false" class="hiddenParams">
  <input id="lead-gen-campaignFunctionMapping" name="campaignFunctionMapping" type="hidden" value="false" class="hiddenParams">
  <input name="processingValue" type="hidden" value="" class="hiddenParams">
  <input name="retURL" type="hidden" class="hiddenParams">
  <input type="hidden" name="elqUserCountry" value="" class="elqUserCountry">
  <input type="hidden" name="chinaoptin" value="" class="chinaoptin hiddenParams">
  <!-- GTM Tracking fields -->
  <input name="refURL" type="hidden" value="" class="hiddenParams">
  <input name="refURL_Host" type="hidden" value="" class="hiddenParams">
  <input name="refURL_Path" type="hidden" value="" class="hiddenParams">
  <input name="curURL" type="hidden" value="" class="hiddenParams">
  <input name="ga_client_id" type="hidden" value="" class="hiddenParams">
  <input type="hidden" name="firsturl" value="" class="first_url hiddenParams">
  <!-- utm params  -->
  <input name="utm_source" type="hidden" value="" class="urlParams">
  <input name="utm_medium" type="hidden" value="" class="urlParams">
  <input name="utm_content" type="hidden" value="" class="urlParams">
  <input name="utm_term" type="hidden" value="" class="urlParams">
  <input name="utm_campaign" type="hidden" value="" class="urlParams">
  <input name="utm_adgroup" type="hidden" value="" class="urlParams">
  <input type="hidden" name="enableCamelCaseCountry" value="true" class="enableCamelCaseCountry">
  <!-- Data Layer fields -->
  <input id="eloquaDLEvent" type="hidden" value="formStep" class="datalayerParams">
  <input id="elqQCType" type="hidden" value="quick collect" class="datalayerParams">
  <input id="eloquaFormStep2" type="hidden" value="2 of 2" class="datalayerParams">
  <input id="eloquaFormStep3" type="hidden" value="3 of 3" class="datalayerParams">
  <input id="eloquaContactInfo" type="hidden" value="Contact Information" class="datalayerParams">
  <input id="eloquaCompanyInfo" type="hidden" value="Company Information" class="datalayerParams">
  <input id="eloquaDLAnonymousUser" type="hidden" value="anonymous" class="datalayerParams">
  <input id="eloquaDLKnownUser" type="hidden" value="known" class="datalayerParams">
  <input id="eloquaDLSuccessEvent" type="hidden" value="formSuccess" class="datalayerParams">
  <input id="eloquaDLValEvent" type="hidden" value="formValidationError" class="datalayerParams">
  <input id="eloquaDLSuccess" type="hidden" value="success" class="datalayerParams">
  <input id="eloquaFormType" type="hidden" value="quickCollect" class="datalayerParams">
  <input type="hidden" name="eloquaDLJobFunction" value="" class="eloquaDLJobFunction datalayerParams">
  <input type="hidden" name="eloquaDLJobRole" value="" class="eloquaDLJobRole datalayerParams">
  <!-- Custom Messages -->
  <input type="hidden" name="eloquaText" value="<p><strong>Please check your inbox to confirm your subscription and add the domain @gartner.com to your safe sender list to ensure receipt of future emails.</strong></p>
" class="eloqua-text">
  <input type="hidden" name="eloquaMessage" value="Thank you!" class="eloqua-message">
  <input type="hidden" name="optinMessage" value="Thank you!" class="optin-message">
  <input type="hidden" name="optinText" value="<p><strong>Please add the domain @gartner.com to your safe sender list to ensure receipt of future emails.</strong></p>
" class="optin-text">
  <input name="elqCampaignType" type="hidden" value="campaign" class="elqCampaignType datalayerParams">
  <input name="campaignName" type="hidden" value="" class="hiddenParams">
  <input name="mktgCode" type="hidden" value="SECI11" class="hiddenParams">
  <input name="programType" type="hidden" value="QC" class="hiddenParams">
  <input name="offer" type="hidden" value="Conference Agenda" class="hiddenParams">
  <input name="contentName" type="hidden" value="Gartner Security &amp; Risk Management Summit" class="hiddenParams">
  <input name="audience" type="hidden" value="" class="hiddenParams">
  <input id="lead-gen-elqCampaignId" name="cid" type="hidden" value="" class="hiddenParams">
</form>

Text Content

 * Gartner.com
 * Gartner Conferences

 * Log In
 * Conference Navigator

 * Conference Navigator
   
 * Log In

Gartner Security & Risk Management Summit

10 – 11 March 2025 | Mumbai, India
Pricing & Registration
 * Pricing & Registration
 * Log In
   
 * Home
   
 * Agenda
   
 * Speakers
   
 * Exhibitors
   
 * Venue
   
 * Conference Navigator
   
 * Pricing & Registration
   
 * Gartner.com
 * Gartner Conferences
   

Gartner Security & Risk Management Summit

10 – 11 March 2025 | Mumbai, India


Agenda


GAIN THE LATEST CYBERSECURITY LEADERSHIP, RISK MANAGEMENT AND TECHNICAL SECURITY
INSIGHTS AT GARTNER SECURITY & RISK MANAGEMENT SUMMIT 2025 IN MUMBAI, INDIA.

VIEW BY:

View By :
 * Track
 * Topic
 * Day


TRACK A: CYBERSECURITY LEADERSHIP

Monday, 26 February, 2024 / 08:45 AM - 09:15 AM IST


CISO CIRCLE: WELCOME AND ORIENTATION

Rob McMillan, Managing Vice President, Gartner

This session, exclusive to CISO Circle attendees, will give you an overview of
the sessions that comprise the program, enabling you to select the sessions that
are best suited to you. The CISO Circle is designed to be highly interactive,
giving you an opportunity to network and share best practices and experiences
with your peers. This session will kickstart that process, enabling you to
connect with your fellow CISO Circle members and prepare for these conversations
during the Summit.

Please Note: Based on availability and eligibility you may sign-up for the
session via Conference Navigator after you register for this conference.

Monday, 26 February, 2024 / 09:30 AM - 10:15 AM IST


GARTNER OPENING KEYNOTE: DISPELLING 4 MYTHS THAT PREVENT CYBERSECURITY FROM
UNLOCKING ITS TRUE VALUE

Oscar Isaka, Sr Director Analyst, Gartner

Deepti Gopal, Director Analyst, Gartner

Cybersecurity can generate massive value for our enterprises, but only if we
have the courage to challenge the myths that we as cybersecurity professionals
tell ourselves. Our self-deceptions lock us into obsolete principles and
practices that prevent us from truly aligning with our executive partners and
enabling our organizations. This keynote will unpack the biggest myths we must
defeat, highlighting the decisions and practical steps cybersecurity leaders
must take to deliver the success they deserve.

Monday, 26 February, 2024 / 11:00 AM - 12:30 PM IST


CISO CIRCLE: WORKSHOP: SELLING YOUR CYBER STRATEGY

Victoria Cason, Sr Principal Analyst, Gartner

Rob McMillan, Managing Vice President, Gartner

CISOs need to do focus on sales every day. Getting your board, stakeholders,
allies in IT and even your own people with your agenda, is much easier if we
employ the right tools. In this workshop, we'll take a hands on approach as we
work a common case and learn the best way to position our agenda.

Please Note: Based on availability and eligibility you may sign-up for the
session via Conference Navigator after you register for this conference.

Monday, 26 February, 2024 / 12:30 PM - 01:00 PM IST


TOP TRENDS FOR CYBERSECURITY, 2024

Deepti Gopal, Director Analyst, Gartner

CISOs and their teams are facing disruptions across multiple converging fronts:
technological, structural and the human element. Proactive preparation and
pragmatic execution are vital to address these disruptions, and deliver an
effective, optimized cybersecurity program. This session will describe the
significant trends in security risk management and how organizations are taking
advantage to drive cybersecurity outcomes.

Monday, 26 February, 2024 / 02:30 PM - 03:00 PM IST


ACCELERATE CYBERSECURITY EFFECTIVENESS: 8 TACTICS TO DELIVER VALUE FASTER

Victoria Cason, Sr Principal Analyst, Gartner

Challenging global economic conditions continue to see the digital business
evolve. CISOs must identify and execute a mix of new methods and other smart
tactics to continuously adjust to business demand and demonstrate the
cybersecurity team’s role and criticality as an enabler of the organization’s
digital ambitions. Join this session to know tactics CISOs use to shorten the
runway to program effectiveness and deliver business value.

Monday, 26 February, 2024 / 02:30 PM - 03:00 PM IST


EXECUTIVE STORIES: FRIENDLY FIRE – THE ‘UNTRUSTED’ SUPPLY CHAIN

Jacxine Fernandez, VP – Information Security & ICT Governance & ICT Revenue
Management, Bengaluru International Airport Limited

While many organizations have woken up to the cybersecurity challenges presented
by third parties in their ecosystem, the current mitigation initiatives are
centered around policies and processes and their effective governance. This
predicament is compounded due to factors like lack of visibility and control,
increasing attack surface, little to absent risk management on third parties,
and contractual limitations. Organizations end up with large functions or teams
trying to manage 3rd party risk through Excel sheets and compliance checklists.
These are point-in-time assessments cannot provide a continuous posture and
assurance on how these 3rd parties handle security. Also, there is gap in
technology-related controls to addresses this risk.

Monday, 26 February, 2024 / 02:30 PM - 04:00 PM IST


CISO CIRCLE: LEADERSHIP EXCHANGE: MEASURE THE REAL COST OF CYBERSECURITY

Paul Furtado, VP Analyst, Gartner

The security budget is only a part of the story describing the real cost of
cybersecurity. Other costs include elements like the IT budget, business
friction and business partner costs. Measuring the all-in costs for security
enables an organization to make better-informed decisions and gain greater
control over its security costs.

Please Note: Based on availability and eligibility you may sign-up for the
session via Conference Navigator after you register for this conference.

Monday, 26 February, 2024 / 05:00 PM - 05:45 PM IST


GUEST KEYNOTE: THE NEVER NORMAL

Peter Hinssen, Entrepreneur and Author, nexxworks

We’re at a crossroads. Certainly since the COVID-19 crisis but even before that,
we have been evolving into a world with many new types of disruptions. There’s
this potent cocktail of global platforms, information, intelligence, and
automation that is accelerating the pace of change. But technology is no longer
the biggest driver of disruption. What’s coming at us is ecological, biological,
societal and geopolitical in nature and this is just the beginning. These many
disruptions are going to evolve into seismic shocks that will completely
overturn how we live and work. Think about the rising sea levels we might
experience the next decades. Or pandemics like COVID-19. Or the cold (trade) war
between the US and China.

Tuesday, 27 February, 2024 / 09:00 AM - 09:45 AM IST


GARTNER KEYNOTE: TREAT CYBERSECURITY AS A BUSINESS INVESTMENT

Paul Furtado, VP Analyst, Gartner

Cost and value drive every business outcome, except cybersecurity (until now).
Measuring cybersecurity value delivery by establishing consistent outcome-driven
metrics accrues many benefits and helps enhance decision-making and board
governance. In this session, we will share an approach to help CIOs and CISOs
guide a board toward apt and defensible cybersecurity investments and execution.

Tuesday, 27 February, 2024 / 10:30 AM - 12:00 PM IST


CISO CIRCLE: LEADERSHIP EXCHANGE: EMPLOYEES DON'T NEED MORE AWARENESS, THEY NEED
CYBER JUDGMENT!

Rob McMillan, Managing Vice President, Gartner

As "citizen development" moves into the mainstream (50% of employees now
acquire, adapt or create technology for work), traditional awareness programs
focused on 'what not to do' fail in the face of the workforce's "need to do."
High-performing cybersecurity functions are pivoting from mere awareness
training to building competencies in the broader workforce so that all employees
can independently make cyber-risk-informed decisions.

Please Note: Based on availability and eligibility you may sign-up for the
session via Conference Navigator after you register for this conference.

Tuesday, 27 February, 2024 / 12:00 PM - 12:30 PM IST


SHIFTING SANDS: EVOLVING CYBERSECURITY OPERATING MODELS

Oscar Isaka, Sr Director Analyst, Gartner

CISOs are losing control as business leaders embrace digitalization, implying a
shift in risk landscapes and risk appetites. Based on new primary research, this
presentation will share the strategies and practices that CISOs are adopting in
reaction to these seismic shifts.

Tuesday, 27 February, 2024 / 12:00 PM - 12:30 PM IST


EXECUTIVE STORIES: DEFENDING AGAINST PHISHING

Rajender Singh, Director of Cyber Security Risk & Compliance, Marvell Technology

Today, the battle against phishing attacks is an ongoing challenge that requires
constant innovation and vigilance. Cyber-attacks are on the rise and present a
significant threat to users and organizations. Beware of cybercriminals using
inventive new tactics for phishing attacks.
See how you can defend your business from phishing attacks and threats that are
escalating in complexity and preventing attackers from infiltrating accounts,
gaining access, moving laterally, monetizing their crimes, and causing damage
from within.
Join this session to uncover a comprehensive strategy to combat phishing attacks
on multiple fronts, reducing the risk of unauthorized access and data breaches:
- A framework for defending against phishing (technical and administrative
controls)
- Receive practical guidance on implementing phishing-resistant strategies
within your organization and eco-system
- Building detection and prevention capabilities in your organization
- Applying the NIST CSF framework (Identify, Protect, Detect, Respond, and
Recover) to defend against phishing attacks

Tuesday, 27 February, 2024 / 02:00 PM - 02:30 PM IST


HOW TO RESPOND TO THE EVOLVING THREAT ENVIRONMENT

John Watts, VP Analyst, Gartner

The threat landscape is a moving target. Attack campaigns might hit multiple
organizations, but each enterprise should analyze its own threat landscape.
Security and risk management leaders should gain baseline knowledge on
optimizing prediction and prevention; knowing when detection is required; and
preparing to respond when things go wrong.

Tuesday, 27 February, 2024 / 02:00 PM - 02:45 PM IST


EXECUTIVE STORIES ROUNDTABLE: HOW TO UPGRADE INFO-SEC IN LARGE, GOVT. OWNED
SERVICES BUSINESS

Vijay Devnath, Group General Manager (Infra and Common Devices Group), Center
for Railway Information Systems

Issue-focused discussion among industry peers, particularly the CISOs, on
pressing issues and their possible solutions for improving the Information
Security posture of a large Govt. owned Service Business, by mitigating the
recurring internal /external Risks of (Govt. style) People and Processes, with
highly dynamic ICT of the businesses to be made resilient to Info-Sec incidents.
Come prepared to exchange insights and best practices with your peers.

Please Note: Based on availability and eligibility you may sign-up for the
session via Conference Navigator after you register for this conference.

Tuesday, 27 February, 2024 / 02:00 PM - 03:30 PM IST


CISO CIRCLE: WORKSHOP: ANXIETY, STRESS AND FATIGUE, BEGONE! MINDFULNESS FOR THE
BURNT OUT CYBERSECURITY PROFESSIONAL

Rahul Balakrishnan, Sr Director, Research, Gartner

Victoria Cason, Sr Principal Analyst, Gartner

Cybersecurity professionals work in high-stress, high-burnout environments.
CISOs are on 24/7 and have short tenures compared to the rest of the C-suite.
Their teams, stretched thin due to talent shortages and never-ending threats,
suffer from chronic exhaustion. This workshop will offer practical techniques -
rooted in mindfulness - to alleviate anxiety, stress, and fatigue, skills
critical to flourishing at work and in life.

Please Note: Based on availability and eligibility you may sign-up for the
session via Conference Navigator after you register for this conference.


TRACK B: CYBER AND IT RISK MANAGEMENT

Monday, 26 February, 2024 / 11:00 AM - 11:45 AM IST


ASK THE EXPERT: HOW SHOULD I PREPARE FOR THE DIGITAL PERSONAL DATA PROTECTION
ACT?

Tisha Bhambry, Director Analyst, Gartner

Are you ready to establish a robust privacy program? Explore the requirements
for privacy initiatives in light of the Indian Digital Personal Data Protection
Act 2023. Our expert will provide insights and guidance on building a strong
foundation for privacy programs in this evolving regulatory landscape.

Please Note: Based on availability and eligibility you may sign-up for the
session via Conference Navigator after you register for this conference.

Monday, 26 February, 2024 / 12:30 PM - 01:00 PM IST


TOP 7 CRITICAL CHECKLIST ITEMS WHEN FACED WITH RANSOMWARE ATTACK

Franz Hinner, Sr Director Analyst, Gartner

As Cybersecurity criminals continue to become better organized, Security Leaders
need to follow best practices to minimize the impact to their business. This
session will cover the Top 7 critical items that all security and risk
management leaders should leverage before an event.

Monday, 26 February, 2024 / 12:30 PM - 01:00 PM IST


EXECUTIVE STORIES: BUILDING AN OT CYBERSECURITY PROGRAM – A PRACTITIONER’S VIEW

Rohit Sharma, Head of Cyber Security, Adani Power

This session is based on the experiential knowledge acquired in building an OT
Cybersecurity program in a critical sector organization. During this session, we
would discuss the key challenges in setting up the OT Cybersecurity program in
the real world.
We will deep dive into the challenges faced in – People, Process and Technology
dimensions of the program.
We will also discuss on the divergence of the existing paradigm of the IT
Cybersecurity from the OT landscape and how to bridge this gap.

Monday, 26 February, 2024 / 02:30 PM - 03:00 PM IST


HOW TO SELECT YOUR CYBER-PHYSICAL SYSTEMS PROTECTION PLATFORM

Ruggero Contu, Sr Director Analyst, Gartner

The market for security products for operational technology and other
cyber-physical systems (CPS) is evolving rapidly. New vendors enter the scene,
and mergers and acquisitions are abundant. How can security and risk management
leaders evaluate and compare CPS protection platforms to select the product that
best fits their situation?

Monday, 26 February, 2024 / 04:00 PM - 04:30 PM IST


5 THINGS YOU NEED TO KNOW ABOUT CONTINUOUS CONTROL MONITORING

Tisha Bhambry, Director Analyst, Gartner

Continuous controls monitoring (CCM) allows high-frequency and automated
management of controls to validate the effectiveness of controls designed to
mitigate risk. This session clarifies the most important five things to use CCM
for extending automation capabilities, processes and risk culture.

Monday, 26 February, 2024 / 04:00 PM - 04:30 PM IST


OUTLOOK FOR IDENTITY AND ACCESS MANAGEMENT

Abhyuday Data, Director Analyst, Gartner

Digital identity requirements and importance are growing as organizations
migrate their infrastructure and apps to the cloud. Enterprises anticipate
innovations to enable continuous, dynamic and intelligent IAM controls while
bracing for emerging decentralized identity impact and potential Web3 business
model disruption. This session discusses key trends and the IAM outlook in the
coming years.

Tuesday, 27 February, 2024 / 10:30 AM - 11:00 AM IST


DON'T LET YOUR AI CONTROL YOU: MANAGE AI TRUST, RISK AND SECURITY

Dale Gardner, Sr Director Analyst, Gartner

AI teams are perceiving risk differently than security teams. Especially given
upcoming regulations and guidelines across the globe, things to not overlook
include data and model drift, uncontrolled bias and privacy and security
concerns specific to AI model training and deployment. This session will explain
Gartner's AI trust, risk and security management (TRiSM) market guide and how to
coordinate AI issues collaboratively and consistently.

Tuesday, 27 February, 2024 / 10:30 AM - 12:00 PM IST


WORKSHOP: INTRODUCING THE GARTNER CYBERSECURITY CONTROLS ASSESSMENT

Victoria Cason, Sr Principal Analyst, Gartner

Rahul Balakrishnan, Sr Director, Research, Gartner

Sixty-six percent of CISOs ranked the ability to benchmark their security
controls as critical to addressing their challenges. But accomplishing this can
be costly and time-consuming. This session will detail how the Gartner
Cybersecurity Controls Assessment allows you to benchmark the current state of
security controls against your peers, get a baseline for tracking improvements
and learn to prioritize controls for greater investment.

Please Note: Based on availability and eligibility you may sign-up for the
session via Conference Navigator after you register for this conference.

Tuesday, 27 February, 2024 / 12:00 PM - 12:30 PM IST


CONNECT BUSINESS VALUE AND IDENTITY MANAGEMENT

Abhyuday Data, Director Analyst, Gartner

Leaders responsible for IAM generally focus on the technical benefits of an IAM
solution rather than its impact on the organization's goals and objectives. They
are unaccustomed to recognizing and accommodating the influence IAM has on
business outcomes or associating IAM with environmental, organizational or
social change. These skills are critical to an initiative with IAM's scope and
breadth.

Tuesday, 27 February, 2024 / 12:00 PM - 12:45 PM IST


ASK THE EXPERT: RISK-BASED VULNERABILITY MANAGEMENT

Steve Santos, Sr Director Analyst, Gartner

Join this ask the expert session to get answers to key questions around
risk-based vulnerability management. This session will offer answers to
questions such as:
- How to do RBVM with process
- How to do RBVM with tools
- Best practices for RBVM

Please Note: Based on availability and eligibility you may sign-up for the
session via Conference Navigator after you register for this conference.

Tuesday, 27 February, 2024 / 03:45 PM - 04:15 PM IST


WEAPONIZE RISK APPETITE WITH PROTECTION-LEVEL AGREEMENTS

Paul Furtado, VP Analyst, Gartner

Risk appetite fails when expressed in fuzzy, imprecise terms. Repositioning risk
appetite in the context of investment and value delivery creates a measurable
scale of risk that powers a new type of governance. Concrete assertions of risk
appetite make executive decisions binding.

Tuesday, 27 February, 2024 / 03:45 PM - 04:15 PM IST


TECHNICAL INSIGHTS: TOP 5 DATA SECURITY CHALLENGES

Andrew Bales, Sr Principal Analyst, Gartner

Businesses are turning to data analytics and sharing data with third parties to
identify opportunities, improve performance and drive decision making. At the
same time the push to the cloud and the fact that structured and unstructured
data has been growing exponentially leave lots of room for data theft,
compliance violations and waste. In this session we will discuss the top 5 data
security challenges facing business today and how to remediate them.

Tuesday, 27 February, 2024 / 03:45 PM - 04:15 PM IST


OUTLOOK FOR CYBER RISK MANAGEMENT

Tisha Bhambry, Director Analyst, Gartner

Cyber risk management is a key investment area of interest for organizations.
But for security and risk management leaders, it is an on-going challenge to
continuously assess the increasing scope of risks as well as mitigate the ones
that can maximize protection and innovation to the business. This session offers
an overview of the state of art as well as what the future will hold in
cyber-risk management.

Tuesday, 27 February, 2024 / 03:45 PM - 04:30 PM IST


ROUNDTABLE: BEST PRACTICES IN ASSESSING THIRD-PARTY SECURITY AND RISK

Oscar Isaka, Sr Director Analyst, Gartner

Security and risk leaders struggle to effectively assess third-party (including
IT vendor) security and risk, leading to unknown risks or security breaches.
This roundtable provides you with the opportunity to participate in a
facilitated discussion with your peers regarding the most effective assessment
practices used today.

Please Note: Based on availability and eligibility you may sign-up for the
session via Conference Navigator after you register for this conference.

Tuesday, 27 February, 2024 / 04:30 PM - 05:00 PM IST


FOUR THIRD-PARTY CYBER RISK PRINCIPLES THAT YOU MUST ADOPT

Rahul Balakrishnan, Sr Director, Research, Gartner

Third-party risk management is a very broad and potentially complex topic. This
session will discuss principles that security and risk management leaders must
adopt for more effective management of third-party risk and the common pitfalls
to watch out for.

Tuesday, 27 February, 2024 / 04:30 PM - 05:00 PM IST


EMERGING CYBERSECURITY TECHNOLOGIES AND CHALLENGES TO THE MODERN CISO

Ruggero Contu, Sr Director Analyst, Gartner

This session will explore key cybersecurity technologies in information
security. For each category explored, we'll discuss impact and recommendations
for CISOs.


TRACK C: INFRASTRUCTURE SECURITY

Monday, 26 February, 2024 / 11:00 AM - 11:30 AM IST


ZERO-TRUST PREDICTIONS

John Watts, VP Analyst, Gartner

Zero trust is moving away from excessive marketing hype. Many organizations have
set zero trust as a strategy for their organizations, but are looking at the
reality of implementing zero trust at scale for their organization. This session
highlights three key predications for zero trust and what you can do to prepare
for the future.

Monday, 26 February, 2024 / 11:00 AM - 11:30 AM IST


OUTLOOK FOR NETWORK SECURITY

Thomas Lintemuth, VP Analyst, Gartner

Users, devices, applications and data are everywhere and so are networks. As
organizations rapidly expand their footprint and support a hybrid workforce, how
does network security evolve to keep up? Security and risk management leaders
must understand the current trends in network security and make
business-aligned, risk-focused decisions on where best to use network security
today.

Monday, 26 February, 2024 / 11:00 AM - 11:30 AM IST


OUTLOOK FOR CLOUD SECURITY

Richard Bartley, VP Analyst, Gartner

Cloud security remains a top priority. This presentation summarizes the
problems, recommended processes and emerging and evolving product types to
address three key issues:
- What are the unique risks associated with public cloud service providers?
- What are the unique security challenges of IaaS and PaaS and how can they be
mitigated?
- What are the unique control challenges of SaaS and how can they be addressed?

Monday, 26 February, 2024 / 02:30 PM - 03:15 PM IST


ASK THE EXPERT: WHAT'S THE BEST REMOTE ACCESS STRATEGY FOR THE FUTURE OF WORK
TRENDS

John Watts, VP Analyst, Gartner

The future of work is hybrid, but most remote access architecture today is
caught between a rock and a hard place — scale up the historical approach, or
experiment with more recent solutions even if nobody knows what their
application architecture will look like in a few years. In this session, a
Gartner Expert will answer questions on remote access best practices for a
hybrid workforce.

Please Note: Based on availability and eligibility you may sign-up for the
session via Conference Navigator after you register for this conference.

Monday, 26 February, 2024 / 04:00 PM - 04:45 PM IST


ASK THE EXPERT: ZTNA VS. VPN - DOES IT REALLY MATTER?

Thomas Lintemuth, VP Analyst, Gartner

Remote access, whether for the full-time or hybrid work environment, is top of
mind for many network and security engineers. Does it matter if one sticks with
VPN? Should an organization move to ZTNA? What may be some considerations
organizations should consider? Join this session to get answers to such
questions.

Please Note: Based on availability and eligibility you may sign-up for the
session via Conference Navigator after you register for this conference.

Tuesday, 27 February, 2024 / 10:30 AM - 11:00 AM IST


CLOUD SECURITY 201: A CLOUD SECURITY COOKBOOK

Charlie Winckless, VP Analyst, Gartner

Cloud security remains a challenge; we have to protect data when it is out of
our control. This session will address the emerging trends in cloud security,
what they bring to your organization and how to use them most effectively.
Security is seen as an obstruction to cloud adoption; this will show you how to
enable without losing protection.

Tuesday, 27 February, 2024 / 10:30 AM - 11:00 AM IST


TECHNICAL INSIGHTS — CYBERSECURITY MESH ARCHITECTURE: THE NEXT GENERATION OF
SECURITY ARCHITECTURE

Richard Bartley, VP Analyst, Gartner

This session will discuss the reference architecture and dive deep into how to
build the cybersecurity mesh architecture (CSMA). We will discuss the evolution
of best of breed to the new CSMA, along with pros and cons of each approach.
Finally, we will discuss the vendor landscape from larger security vendors with
full stacks to open source or distributed CSM solutions.

Tuesday, 27 February, 2024 / 12:00 PM - 12:30 PM IST


HOW TO SECURELY DEVELOP, DEPLOY AND OPERATE CLOUD NATIVE APPLICATIONS

Charlie Winckless, VP Analyst, Gartner

Cloud native applications live at the nexus of microservices-architected
applications built on Linux containers using DevSecOps deployed onto
programmatic cloud infrastructure and managed with an immutable infrastructure
mindset. Securing cloud native applications requires new approaches for securing
the entire lifecycle of the application. This session will provide specific
guidance, tools and vendors to secure cloud native applications.

Tuesday, 27 February, 2024 / 02:00 PM - 02:30 PM IST


OUTLOOK FOR ENDPOINT AND MOBILE SECURITY

Franz Hinner, Sr Director Analyst, Gartner

Endpoint security has long been a foundational security control, a must-have
toolset that no enterprise security program can do without. But the role of
endpoint security continues to evolve, covering an expanding portfolio of tools,
techniques and devices. In this session, we will explore the current "state of
the art" of endpoint and mobile security, and look to the future of how we can
expect this crucial technology to evolve.

Tuesday, 27 February, 2024 / 02:00 PM - 02:30 PM IST


TECHNICAL INSIGHTS: SSE 101- HOW TO SECURE WEB ACCESS, SAAS, AND PRIVATE APPS
WITH SECURITY SERVICE EDGE

Thomas Lintemuth, VP Analyst, Gartner

Security service edge (SSE) is an emerging market that consolidates CASB, SWG,
and ZTNA. We will walk through the key capabilities of SSE and how it helps you
to secure outbound web and SaaS access, protect your sanctioned SaaS apps, and
provides secure remote access to private applications.


TRACK D: APPLICATION AND DATA SECURITY

Monday, 26 February, 2024 / 11:00 AM - 12:30 PM IST


WORKSHOP: BUILD AN APPLICATION SECURITY CHAMPIONS PROGRAM

Dale Gardner, Sr Director Analyst, Gartner

Dedicated application security resources typically come at a premium, so
organizations must seek to scale by using security champions within respective
development teams. Attendees at this workshop will put together a plan to build
out a security champions program.

Please Note: Based on availability and eligibility you may sign-up for the
session via Conference Navigator after you register for this conference.

Monday, 26 February, 2024 / 12:30 PM - 01:00 PM IST


TECHNICAL INSIGHTS: OUTLOOK FOR APPLICATION SECURITY

Manjunath Bhat, VP Analyst, Gartner

Application security continues to evolve, with DevSecOps and API security coming
into maturity. However, organizations must also look to secure their software
supply chain and cloud-native deployments effectively. This session will explore
this evolving landscape and provide organizations with the insights they need to
consider for 2024 and beyond.

Monday, 26 February, 2024 / 02:30 PM - 03:00 PM IST


SECURE CODING AND CHATGPT: MIRACLE OR MIRAGE?

Kevin Schmidt, Director Analyst, Gartner

Chat GPT has made an impressive debut, developing clever, easy-to-understand
explanations for complex subject matter. However, security problems don't lend
themselves to easy explanations. While there is a lot of potential benefit in
using AI for things like security-oriented paired programming, is it really
possible to get high-quality answers using AI assistants?

Monday, 26 February, 2024 / 02:30 PM - 04:00 PM IST


WORKSHOP: SO, YOU PURCHASED MICROSOFT'S E5; WHAT NOW? EVALUATING SECURITY VENDOR
CONSOLIDATION USING MICROSOFT

Franz Hinner, Sr Director Analyst, Gartner

This workshop guides you to all aspects of vendor consolidation based on your
Microsoft E5 security capabilities. To determine options to replace or augment.
The result will be a personalized decision guide to consolidate vendors.
Attendees will be able to define security posture goals, identify areas for
improvement, consolidate vendor evaluation and criteria, and create their
personalized decision guide.

Please Note: Based on availability and eligibility you may sign-up for the
session via Conference Navigator after you register for this conference.

Monday, 26 February, 2024 / 04:00 PM - 04:30 PM IST


MANAGING APPLICATION SECURITY RISKS WITH APPLICATION SECURITY POSTURE MANAGEMENT

Dale Gardner, Sr Director Analyst, Gartner

As development teams take on more day-to-day security responsibilities,
application security teams can begin to shift to a risk management approach to
manage AppSec programs. In this session, we’ll discuss:
- What is ASPM?
- What to consider when evaluating and implementing tools
- Organizational impacts

Tuesday, 27 February, 2024 / 10:30 AM - 11:00 AM IST


HOW TO MITIGATE SECURITY AND COMPLIANCE RISKS WITH AI-GENERATED CODE

Manjunath Bhat, VP Analyst, Gartner

Generative AI coding assistants are poised to fundamentally alter the way
software engineers build applications. However, security and compliance risks
can hinder their legitimate use and create the need for new compensating
controls. This session will cover 5 ways to mitigate the risks associated with
AI coding assistants.

Tuesday, 27 February, 2024 / 10:30 AM - 11:15 AM IST


ASK THE EXPERT: HOW TO SUCCEED IN DATA CLASSIFICATION PROGRAM?

Andrew Bales, Sr Principal Analyst, Gartner

This session offers anything you want to know about data classification: from
policies to processes to technology; and across privacy, regulatory
requirements, and intellectual property protection use cases.

Please Note: Based on availability and eligibility you may sign-up for the
session via Conference Navigator after you register for this conference.

Tuesday, 27 February, 2024 / 02:00 PM - 02:45 PM IST


ROUNDTABLE: BEST PRACTICES FOR SECURITY IN DEVOPS (MULTI-GROUP)

Manjunath Bhat, VP Analyst, Gartner

Want to turn DevOps into DevSecOps? This roundtable engages developers, program
managers and security personnel to share the best (and worst) practices they
have tried with their team. Come prepared to exchange insights and best
practices with your peers during these Gartner-facilitated, simultaneous
small-group discussions around a set topic.

Please Note: Based on availability and eligibility you may sign-up for the
session via Conference Navigator after you register for this conference.


TRACK E: CYBERSECURITY OPERATIONS

Monday, 26 February, 2024 / 11:00 AM - 11:30 AM IST


IS YOUR SOC REALLY A MODERN SOC?

Steve Santos, Sr Director Analyst, Gartner

Modern SOCs require proactive and automated capabilities, such as threat
hunting, prioritized threat intelligence and automated response. This session
will describe modern SOC core capabilities, and guide SRM leaders on how to
evaluate whether their current SOC has established those capabilities and
processes.

Monday, 26 February, 2024 / 12:30 PM - 01:15 PM IST


ASK THE EXPERT: HOW TO MEASURE THE SOC EFFECTIVELY

A session that answers the question of how to develop common metrics used to
measure SOC capabilities and how to improve these internally using tools and
more granular processes. We will spend time identifying the most useful metrics
for SOC teams and senior leaders as well as highlighting those that provide
little or no value to the organization.

Please Note: Based on availability and eligibility you may sign-up for the
session via Conference Navigator after you register for this conference.

Monday, 26 February, 2024 / 04:00 PM - 04:30 PM IST


OUTLOOK FOR SECURITY OPERATIONS

Security operations are undergoing a transformative change when our security is
planned and delivered. Do you really need to centralize data for security? Is
there a single solution to solve all my security needs? How do we determine what
is threat intelligence for us? Learn what technologies, processes and services
will have the biggest impact on how security operations are delivered in 2024.

Tuesday, 27 February, 2024 / 02:00 PM - 02:30 PM IST


TECHNICAL INSIGHTS: HOW SECURITY OPERATIONS TEAMS CAN LEVERAGE CHATGPT

Kevin Schmidt, Director Analyst, Gartner

Advances in generative artificial intelligence (AI) like OpenAI's ChatGPT are
causing organizations and teams to rethink how they approach staffing, training,
operations and threat detection. This presentation will help practitioners and
managers alike understand what is possible and what is hype.

Tuesday, 27 February, 2024 / 03:45 PM - 04:15 PM IST


THE FUTURE OF SIEM AND THE EVOLUTION OF THREAT DETECTION, INVESTIGATION AND
RESPONSE

Steve Santos, Sr Director Analyst, Gartner

This session will address the changes in the SIEM market, the progression toward
SaaS platforms, the impact of consolidated solutions such as XDR and the desire
for a solution that is able to detect, investigate and respond to threats in an
integrated capability that can be effectively used in line with modern
infrastructure and modern SOC processes.

Tuesday, 27 February, 2024 / 04:30 PM - 05:00 PM IST


THE EXPANDING ATTACK SURFACE, DO YOU REALLY KNOW YOUR INFRASTRUCTURE?

As organizations update their IT and security for modern work, they now have to
manage a growing attack surface due to their technological environments becoming
increasingly complex and dispersed. New technologies and business initiatives,
such as SaaS and supply chain pose new threats. Organizations need to invest in
a better understanding of the continuous expansion of their attack surface.

Back to Top



WANT TO STAY INFORMED?

GET CONFERENCE EMAIL UPDATES.

Work Email Person Type
Continue

By clicking the "Continue" button, you are agreeing to the Gartner Terms of Use
and Privacy Policy.

CONTACT INFORMATION

All fields are required.

First Name Last Name Business Phone Country Person Type
Job Title Company Name Job Function

Job Role

Step 2 of 2

Please provide the consent below

I have read, understood and accepted Gartner Separate Consent Letter , whereby I
agree (1) to provide Gartner with my personal information, and understand that
information will be transferred outside of mainland China and processed by
Gartner group companies and other legitimate processing parties and (2) to be
contacted by Gartner group companies via internet, mobile/telephone and email,
for the purposes of sales, marketing and research.

Back
Sign up Now

By clicking the "Sign up Now" button, you are agreeing to the Gartner Terms of
Use and Privacy Policy.






 * Gartner Conferences
 * Contact Conferences
 * Exhibit
 * Contact Gartner

 * IT Glossary
 * Privacy
 * Policies
 * Terms of Use

 * Site Index
 * Careers
 * Gartner.com
 * Frequently Asked Questions

 * Pricing & Registration
 * Sitemap

 * Gartner Conferences
 * Contact Conferences
 * Exhibit
 * Contact Gartner
 * IT Glossary
 * Privacy
 * Policies

 * Terms of Use
 * Site Index
 * Careers
 * Gartner.com
 * Frequently Asked Questions
 * Pricing & Registration
 * Sitemap



©2024 Gartner, Inc. and/or its affiliates. All rights reserved.


YOUR PRIVACY IS IMPORTANT TO US


By clicking “Accept all,” you agree to the storing of cookies on your device to
enhance site navigation, analyze site usage and assist in our marketing efforts.
To learn more, visit our Privacy Policy and Cookie Notice.
Customize Accept all