www.gartner.com
Open in
urlscan Pro
2606:4700:4400::6812:22dd
Public Scan
Submitted URL: https://app.gartnerformarketers.com/e/er?utm_campaign=EVT_IN_2025_SECI11_BB_E3_Generic_Agenda_MSTO&utm_medium=email&utm_source=Eloqu...
Effective URL: https://www.gartner.com/en/conferences/apac/security-risk-management-india/agenda?utm_campaign=EVT_IN_2025_SECI11_BB_E3_...
Submission: On October 28 via manual from IN — Scanned from DE
Effective URL: https://www.gartner.com/en/conferences/apac/security-risk-management-india/agenda?utm_campaign=EVT_IN_2025_SECI11_BB_E3_...
Submission: On October 28 via manual from IN — Scanned from DE
Form analysis
2 forms found in the DOM<form id="form-one" class="formOne validator">
<div class="form-heading">
<div class="row">
<div class="col-md-9 col-sm-12 col-xs-12">
<h3 class="heading color-gartner-blue">Want to stay informed?</h3>
<h5 class="sub-heading color-gartner-blue"> Get conference email updates.</h5>
</div>
</div>
</div>
<div class="row">
<div class="form-one col-md-9 col-sm-12 col-xs-12">
<span class="field-container">
<label for="email-address">Work Email</label>
<input id="email-address" class="form-control step-one-form-control emailAddress" type="email" name="emailAddress" placeholder="" data-validator="email" inputmode="email" errormessage="Please enter a valid email address." required="">
<img src="https://emt.gartnerweb.com/ngw/commonassets/images/build-graphics/vis-cue-test-arrow.png" class="email-arrow-pointer" alt="">
<span class="icon gcom-icon-check-circle"></span>
</span>
<span class="field-container personType">
<label for="poID">Person Type</label>
<input id="poID" class="form-control poID" type="text" name="poID">
<span class="icon gcom-icon-check-circle"></span>
</span>
</div>
<div class="form-one col-md-3 col-sm-12 col-xs-12 email-check">
<button type="submit"
class="btn btBtn btnNormalWidth button action-button step-one-action-button button-gray form-submit-button conference-theme-bg-color conference-theme-bg-color-hover conference-theme-border-2px btn-primary conference-theme-text-color"
id="continue" errormessage="All fields are required.">
<i class="gcom-icon-refresh icon-spinner" id="eloqua-final-submit-loading"></i> Continue </button>
</div>
</div>
<div class="footer row">
<div class="col-xs-12">
<div class="row privacy-policy">
<div class="col-xs-12">
<div class="lock">
<i class="dark gcom-icon-lock"></i>
</div>
<div class="privacy-container">
<span class="privacy-text ">
<p> By clicking the "Continue" button, you are agreeing to the <a href="https://www.gartner.com/en/about/policies/terms-of-use" target="_blank">
Gartner Terms of Use
</a> and <a href="https://www.gartner.com/en/about/policies/privacy" target="_blank">
Privacy Policy.
</a>
</p>
</span>
</div>
</div>
</div>
</div>
</div>
</form>
<form id="submit-form" class="submitForm validator">
<div class="form-two">
<div class="row">
<div class="col-xs-12">
<h5 class="contactFormTitle">Contact Information</h5>
<p class="fields-required">All fields are required.</p>
</div>
<div class="col-md-6 col-sm-12 col-xs-12 information">
<div class="personal-information">
<span class="field-container">
<label for="first-name">First Name</label>
<input id="first-name" class="form-control firstName" type="text" name="firstName" minlength="1" data-validator="string" inputmode="text" errormessage="Please enter your first name" required="">
<span class="icon gcom-icon-check-circle"></span>
</span>
<span class="field-container">
<label for="last-name">Last Name</label>
<input id="last-name" class="form-control lastName" type="text" name="lastName" minlength="1" data-validator="string" inputmode="text" errormessage="Please enter your last name" required="">
<span class="icon gcom-icon-check-circle"></span>
</span>
<span class="field-container">
<label for="bus-phone">Business Phone</label>
<input id="bus-phone" class="form-control busPhone" type="tel" name="busPhone" placeholder="" minlength="4" data-validator="number" inputmode="tel" errormessage="Please enter your phone number" required="">
<span class="icon gcom-icon-check-circle"></span>
</span>
<span class="field-container">
<label for="country">Country</label>
<select required="" name="country" id="country" class="form-control country" errormessage="Please select your country">
<option value="" disabled="" selected=""></option>
</select>
<span class="icon gcom-icon-check-circle"></span>
</span>
<span class="field-container personType">
<label for="poID">Person Type</label>
<input id="poID" class="form-control poID" type="text" name="poID">
<span class="icon gcom-icon-check-circle"></span>
</span>
</div>
</div>
<div class="col-md-6 col-sm-12 col-xs-12 information">
<div class="company-information">
<span class="field-container">
<label for="job-title">Job Title</label>
<input id="job-title" class="form-control jobTitle" type="text" name="jobTitle" placeholder="" minlength="1" errormessage="Please enter your job title" required="">
<span class="icon gcom-icon-check-circle"></span>
</span>
<span class="field-container">
<label for="company">Company Name</label>
<input id="company" class="form-control company" type="text" name="company" placeholder="" data-validator="string" errormessage="Please enter your company&#39;s name" required="">
<span class="icon gcom-icon-check-circle"></span>
</span>
<span class="field-container">
<label for="department">Job Function</label>
<div class="multilevel-dropdown">
<input id="department" class="form-control department optedinfield" type="button" name="jobFunction" data-toggle="dropdown" inputmode="text" errormessage="Please select your job function" required=""
onchange="FormUtils.populateJobRole(this);">
<i class="icon gcom-icon-check-circle"></i>
<ul class="dropdown-menu dropdown-list" style="top: 65px;"></ul>
</div>
</span>
<span class="field-container">
<label for="jobRole">Job Role</label>
<select required="" name="jobRole" id="jobRole" class="form-control jobRole" errormessage="Please select your job role" onchange="FormUtils.populateJobFunctionValue(this);">
<option hidden="" value=""></option>
</select>
<span class="icon gcom-icon-check-circle"></span>
</span>
</div>
</div>
</div>
</div>
<div class="steps">
<div class="step-lists">
<li></li>
<li></li>
</div>
<div class="underline"></div>
<p class="step-indicator">Step 2 of 2</p>
</div>
<div class="consent-error-msg hidden">
<p>Please provide the consent below</p>
</div>
<div class="privacyConsent checkbox hidden">
<input type="checkbox" name="consentbox" id="consentbox0">
<label class="check-label consent-text" for="consentbox0">
<p> I have read, understood and accepted Gartner <a href="https://www.gartner.com/en/about/policies/privacy/china-pipl-gartner" target="_blank">
Separate Consent Letter
</a> , whereby I agree (1) to provide Gartner with my personal information, and understand that information will be transferred outside of mainland China and processed by Gartner group companies and other legitimate processing parties and (2)
to be contacted by Gartner group companies via internet, mobile/telephone and email, for the purposes of sales, marketing and research. </p>
</label>
</div>
<div class="footer row">
<div class="col-md-6 col-sm-6 col-xs-3 is-back-button">
<a href="javascript:;" class="btn btBtn btnNormalWidth btn-secondary back-button" data-scroll-offset="1730084701588">
Back
</a>
</div>
<div class="has-back-button form-action col-md-6 col-sm-6 col-xs-9">
<button type="submit"
class="btn btBtn btnNormalWidth button step-two-action-button col-md-6 col-sm-12 col-xs-12 form-submit-button button-gray conference-theme-bg-color conference-theme-bg-color-hover conference-theme-border-2px btn-primary conference-theme-text-color"
id="submit" errormessage="All fields are required.">
<i class="gcom-icon-refresh icon-spinner" id="eloqua-final-submit-loading"></i> Sign up Now </button>
</div>
<div class="col-xs-12">
<div class="row privacy-policy">
<div class="col-xs-12">
<div class="lock">
<i class="dark gcom-icon-lock"></i>
</div>
<div class="privacy-container">
<span class="privacy-text ">
<p> By clicking the "Sign up Now" button, you are agreeing to the <a href="https://www.gartner.com/en/about/policies/terms-of-use" target="_blank">
Gartner Terms of Use
</a> and <a href="https://www.gartner.com/en/about/policies/privacy" target="_blank">
Privacy Policy.
</a>
</p>
</span>
</div>
</div>
</div>
</div>
</div>
<!-- Hidden fields -->
<input type="hidden" value="true" class="activateCountryFetch">
<input id="lead-gen-elqFormName" name="elqFormName" type="hidden" value="EVT_GB_YOY_UNV_SU" class="hiddenParams">
<input id="lead-gen-businessUnit" name="busUnit" type="hidden" value="EVT" class="hiddenParams">
<input id="lead-gen-language" name="language" type="hidden" value="en" class="hiddenParams">
<input id="lead-gen-mktgCode2" name="mktgCode2" type="hidden" value="" class="hiddenParams">
<input id="lead-gen-elqCustomerGUID" name="guid" type="hidden" value="" class="hiddenParams">
<input id="lead-gen-region" name="region" type="hidden" value="" class="hiddenParams">
<input id="lead-gen-year" name="year" type="hidden" value="10 March 2025 00:00:00" class="hiddenParams">
<input id="lead-gen-urlTarget" name="" type="hidden" value="false" class="hiddenParams">
<input id="lead-gen-autoRedirect" name="" type="hidden" value="false" class="hiddenParams">
<input id="lead-gen-campaignFunctionMapping" name="campaignFunctionMapping" type="hidden" value="false" class="hiddenParams">
<input name="processingValue" type="hidden" value="" class="hiddenParams">
<input name="retURL" type="hidden" class="hiddenParams">
<input type="hidden" name="elqUserCountry" value="" class="elqUserCountry">
<input type="hidden" name="chinaoptin" value="" class="chinaoptin hiddenParams">
<!-- GTM Tracking fields -->
<input name="refURL" type="hidden" value="" class="hiddenParams">
<input name="refURL_Host" type="hidden" value="" class="hiddenParams">
<input name="refURL_Path" type="hidden" value="" class="hiddenParams">
<input name="curURL" type="hidden" value="" class="hiddenParams">
<input name="ga_client_id" type="hidden" value="" class="hiddenParams">
<input type="hidden" name="firsturl" value="" class="first_url hiddenParams">
<!-- utm params -->
<input name="utm_source" type="hidden" value="" class="urlParams">
<input name="utm_medium" type="hidden" value="" class="urlParams">
<input name="utm_content" type="hidden" value="" class="urlParams">
<input name="utm_term" type="hidden" value="" class="urlParams">
<input name="utm_campaign" type="hidden" value="" class="urlParams">
<input name="utm_adgroup" type="hidden" value="" class="urlParams">
<input type="hidden" name="enableCamelCaseCountry" value="true" class="enableCamelCaseCountry">
<!-- Data Layer fields -->
<input id="eloquaDLEvent" type="hidden" value="formStep" class="datalayerParams">
<input id="elqQCType" type="hidden" value="quick collect" class="datalayerParams">
<input id="eloquaFormStep2" type="hidden" value="2 of 2" class="datalayerParams">
<input id="eloquaFormStep3" type="hidden" value="3 of 3" class="datalayerParams">
<input id="eloquaContactInfo" type="hidden" value="Contact Information" class="datalayerParams">
<input id="eloquaCompanyInfo" type="hidden" value="Company Information" class="datalayerParams">
<input id="eloquaDLAnonymousUser" type="hidden" value="anonymous" class="datalayerParams">
<input id="eloquaDLKnownUser" type="hidden" value="known" class="datalayerParams">
<input id="eloquaDLSuccessEvent" type="hidden" value="formSuccess" class="datalayerParams">
<input id="eloquaDLValEvent" type="hidden" value="formValidationError" class="datalayerParams">
<input id="eloquaDLSuccess" type="hidden" value="success" class="datalayerParams">
<input id="eloquaFormType" type="hidden" value="quickCollect" class="datalayerParams">
<input type="hidden" name="eloquaDLJobFunction" value="" class="eloquaDLJobFunction datalayerParams">
<input type="hidden" name="eloquaDLJobRole" value="" class="eloquaDLJobRole datalayerParams">
<!-- Custom Messages -->
<input type="hidden" name="eloquaText" value="<p><strong>Please check your inbox to confirm your subscription and add the domain @gartner.com to your safe sender list to ensure receipt of future emails.</strong></p>
" class="eloqua-text">
<input type="hidden" name="eloquaMessage" value="Thank you!" class="eloqua-message">
<input type="hidden" name="optinMessage" value="Thank you!" class="optin-message">
<input type="hidden" name="optinText" value="<p><strong>Please add the domain @gartner.com to your safe sender list to ensure receipt of future emails.</strong></p>
" class="optin-text">
<input name="elqCampaignType" type="hidden" value="campaign" class="elqCampaignType datalayerParams">
<input name="campaignName" type="hidden" value="" class="hiddenParams">
<input name="mktgCode" type="hidden" value="SECI11" class="hiddenParams">
<input name="programType" type="hidden" value="QC" class="hiddenParams">
<input name="offer" type="hidden" value="Conference Agenda" class="hiddenParams">
<input name="contentName" type="hidden" value="Gartner Security & Risk Management Summit" class="hiddenParams">
<input name="audience" type="hidden" value="" class="hiddenParams">
<input id="lead-gen-elqCampaignId" name="cid" type="hidden" value="" class="hiddenParams">
</form>
Text Content
* Gartner.com * Gartner Conferences * Log In * Conference Navigator * Conference Navigator * Log In Gartner Security & Risk Management Summit 10 – 11 March 2025 | Mumbai, India Pricing & Registration * Pricing & Registration * Log In * Home * Agenda * Speakers * Exhibitors * Venue * Conference Navigator * Pricing & Registration * Gartner.com * Gartner Conferences Gartner Security & Risk Management Summit 10 – 11 March 2025 | Mumbai, India Agenda GAIN THE LATEST CYBERSECURITY LEADERSHIP, RISK MANAGEMENT AND TECHNICAL SECURITY INSIGHTS AT GARTNER SECURITY & RISK MANAGEMENT SUMMIT 2025 IN MUMBAI, INDIA. VIEW BY: View By : * Track * Topic * Day TRACK A: CYBERSECURITY LEADERSHIP Monday, 26 February, 2024 / 08:45 AM - 09:15 AM IST CISO CIRCLE: WELCOME AND ORIENTATION Rob McMillan, Managing Vice President, Gartner This session, exclusive to CISO Circle attendees, will give you an overview of the sessions that comprise the program, enabling you to select the sessions that are best suited to you. The CISO Circle is designed to be highly interactive, giving you an opportunity to network and share best practices and experiences with your peers. This session will kickstart that process, enabling you to connect with your fellow CISO Circle members and prepare for these conversations during the Summit. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Monday, 26 February, 2024 / 09:30 AM - 10:15 AM IST GARTNER OPENING KEYNOTE: DISPELLING 4 MYTHS THAT PREVENT CYBERSECURITY FROM UNLOCKING ITS TRUE VALUE Oscar Isaka, Sr Director Analyst, Gartner Deepti Gopal, Director Analyst, Gartner Cybersecurity can generate massive value for our enterprises, but only if we have the courage to challenge the myths that we as cybersecurity professionals tell ourselves. Our self-deceptions lock us into obsolete principles and practices that prevent us from truly aligning with our executive partners and enabling our organizations. This keynote will unpack the biggest myths we must defeat, highlighting the decisions and practical steps cybersecurity leaders must take to deliver the success they deserve. Monday, 26 February, 2024 / 11:00 AM - 12:30 PM IST CISO CIRCLE: WORKSHOP: SELLING YOUR CYBER STRATEGY Victoria Cason, Sr Principal Analyst, Gartner Rob McMillan, Managing Vice President, Gartner CISOs need to do focus on sales every day. Getting your board, stakeholders, allies in IT and even your own people with your agenda, is much easier if we employ the right tools. In this workshop, we'll take a hands on approach as we work a common case and learn the best way to position our agenda. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Monday, 26 February, 2024 / 12:30 PM - 01:00 PM IST TOP TRENDS FOR CYBERSECURITY, 2024 Deepti Gopal, Director Analyst, Gartner CISOs and their teams are facing disruptions across multiple converging fronts: technological, structural and the human element. Proactive preparation and pragmatic execution are vital to address these disruptions, and deliver an effective, optimized cybersecurity program. This session will describe the significant trends in security risk management and how organizations are taking advantage to drive cybersecurity outcomes. Monday, 26 February, 2024 / 02:30 PM - 03:00 PM IST ACCELERATE CYBERSECURITY EFFECTIVENESS: 8 TACTICS TO DELIVER VALUE FASTER Victoria Cason, Sr Principal Analyst, Gartner Challenging global economic conditions continue to see the digital business evolve. CISOs must identify and execute a mix of new methods and other smart tactics to continuously adjust to business demand and demonstrate the cybersecurity team’s role and criticality as an enabler of the organization’s digital ambitions. Join this session to know tactics CISOs use to shorten the runway to program effectiveness and deliver business value. Monday, 26 February, 2024 / 02:30 PM - 03:00 PM IST EXECUTIVE STORIES: FRIENDLY FIRE – THE ‘UNTRUSTED’ SUPPLY CHAIN Jacxine Fernandez, VP – Information Security & ICT Governance & ICT Revenue Management, Bengaluru International Airport Limited While many organizations have woken up to the cybersecurity challenges presented by third parties in their ecosystem, the current mitigation initiatives are centered around policies and processes and their effective governance. This predicament is compounded due to factors like lack of visibility and control, increasing attack surface, little to absent risk management on third parties, and contractual limitations. Organizations end up with large functions or teams trying to manage 3rd party risk through Excel sheets and compliance checklists. These are point-in-time assessments cannot provide a continuous posture and assurance on how these 3rd parties handle security. Also, there is gap in technology-related controls to addresses this risk. Monday, 26 February, 2024 / 02:30 PM - 04:00 PM IST CISO CIRCLE: LEADERSHIP EXCHANGE: MEASURE THE REAL COST OF CYBERSECURITY Paul Furtado, VP Analyst, Gartner The security budget is only a part of the story describing the real cost of cybersecurity. Other costs include elements like the IT budget, business friction and business partner costs. Measuring the all-in costs for security enables an organization to make better-informed decisions and gain greater control over its security costs. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Monday, 26 February, 2024 / 05:00 PM - 05:45 PM IST GUEST KEYNOTE: THE NEVER NORMAL Peter Hinssen, Entrepreneur and Author, nexxworks We’re at a crossroads. Certainly since the COVID-19 crisis but even before that, we have been evolving into a world with many new types of disruptions. There’s this potent cocktail of global platforms, information, intelligence, and automation that is accelerating the pace of change. But technology is no longer the biggest driver of disruption. What’s coming at us is ecological, biological, societal and geopolitical in nature and this is just the beginning. These many disruptions are going to evolve into seismic shocks that will completely overturn how we live and work. Think about the rising sea levels we might experience the next decades. Or pandemics like COVID-19. Or the cold (trade) war between the US and China. Tuesday, 27 February, 2024 / 09:00 AM - 09:45 AM IST GARTNER KEYNOTE: TREAT CYBERSECURITY AS A BUSINESS INVESTMENT Paul Furtado, VP Analyst, Gartner Cost and value drive every business outcome, except cybersecurity (until now). Measuring cybersecurity value delivery by establishing consistent outcome-driven metrics accrues many benefits and helps enhance decision-making and board governance. In this session, we will share an approach to help CIOs and CISOs guide a board toward apt and defensible cybersecurity investments and execution. Tuesday, 27 February, 2024 / 10:30 AM - 12:00 PM IST CISO CIRCLE: LEADERSHIP EXCHANGE: EMPLOYEES DON'T NEED MORE AWARENESS, THEY NEED CYBER JUDGMENT! Rob McMillan, Managing Vice President, Gartner As "citizen development" moves into the mainstream (50% of employees now acquire, adapt or create technology for work), traditional awareness programs focused on 'what not to do' fail in the face of the workforce's "need to do." High-performing cybersecurity functions are pivoting from mere awareness training to building competencies in the broader workforce so that all employees can independently make cyber-risk-informed decisions. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Tuesday, 27 February, 2024 / 12:00 PM - 12:30 PM IST SHIFTING SANDS: EVOLVING CYBERSECURITY OPERATING MODELS Oscar Isaka, Sr Director Analyst, Gartner CISOs are losing control as business leaders embrace digitalization, implying a shift in risk landscapes and risk appetites. Based on new primary research, this presentation will share the strategies and practices that CISOs are adopting in reaction to these seismic shifts. Tuesday, 27 February, 2024 / 12:00 PM - 12:30 PM IST EXECUTIVE STORIES: DEFENDING AGAINST PHISHING Rajender Singh, Director of Cyber Security Risk & Compliance, Marvell Technology Today, the battle against phishing attacks is an ongoing challenge that requires constant innovation and vigilance. Cyber-attacks are on the rise and present a significant threat to users and organizations. Beware of cybercriminals using inventive new tactics for phishing attacks. See how you can defend your business from phishing attacks and threats that are escalating in complexity and preventing attackers from infiltrating accounts, gaining access, moving laterally, monetizing their crimes, and causing damage from within. Join this session to uncover a comprehensive strategy to combat phishing attacks on multiple fronts, reducing the risk of unauthorized access and data breaches: - A framework for defending against phishing (technical and administrative controls) - Receive practical guidance on implementing phishing-resistant strategies within your organization and eco-system - Building detection and prevention capabilities in your organization - Applying the NIST CSF framework (Identify, Protect, Detect, Respond, and Recover) to defend against phishing attacks Tuesday, 27 February, 2024 / 02:00 PM - 02:30 PM IST HOW TO RESPOND TO THE EVOLVING THREAT ENVIRONMENT John Watts, VP Analyst, Gartner The threat landscape is a moving target. Attack campaigns might hit multiple organizations, but each enterprise should analyze its own threat landscape. Security and risk management leaders should gain baseline knowledge on optimizing prediction and prevention; knowing when detection is required; and preparing to respond when things go wrong. Tuesday, 27 February, 2024 / 02:00 PM - 02:45 PM IST EXECUTIVE STORIES ROUNDTABLE: HOW TO UPGRADE INFO-SEC IN LARGE, GOVT. OWNED SERVICES BUSINESS Vijay Devnath, Group General Manager (Infra and Common Devices Group), Center for Railway Information Systems Issue-focused discussion among industry peers, particularly the CISOs, on pressing issues and their possible solutions for improving the Information Security posture of a large Govt. owned Service Business, by mitigating the recurring internal /external Risks of (Govt. style) People and Processes, with highly dynamic ICT of the businesses to be made resilient to Info-Sec incidents. Come prepared to exchange insights and best practices with your peers. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Tuesday, 27 February, 2024 / 02:00 PM - 03:30 PM IST CISO CIRCLE: WORKSHOP: ANXIETY, STRESS AND FATIGUE, BEGONE! MINDFULNESS FOR THE BURNT OUT CYBERSECURITY PROFESSIONAL Rahul Balakrishnan, Sr Director, Research, Gartner Victoria Cason, Sr Principal Analyst, Gartner Cybersecurity professionals work in high-stress, high-burnout environments. CISOs are on 24/7 and have short tenures compared to the rest of the C-suite. Their teams, stretched thin due to talent shortages and never-ending threats, suffer from chronic exhaustion. This workshop will offer practical techniques - rooted in mindfulness - to alleviate anxiety, stress, and fatigue, skills critical to flourishing at work and in life. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. TRACK B: CYBER AND IT RISK MANAGEMENT Monday, 26 February, 2024 / 11:00 AM - 11:45 AM IST ASK THE EXPERT: HOW SHOULD I PREPARE FOR THE DIGITAL PERSONAL DATA PROTECTION ACT? Tisha Bhambry, Director Analyst, Gartner Are you ready to establish a robust privacy program? Explore the requirements for privacy initiatives in light of the Indian Digital Personal Data Protection Act 2023. Our expert will provide insights and guidance on building a strong foundation for privacy programs in this evolving regulatory landscape. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Monday, 26 February, 2024 / 12:30 PM - 01:00 PM IST TOP 7 CRITICAL CHECKLIST ITEMS WHEN FACED WITH RANSOMWARE ATTACK Franz Hinner, Sr Director Analyst, Gartner As Cybersecurity criminals continue to become better organized, Security Leaders need to follow best practices to minimize the impact to their business. This session will cover the Top 7 critical items that all security and risk management leaders should leverage before an event. Monday, 26 February, 2024 / 12:30 PM - 01:00 PM IST EXECUTIVE STORIES: BUILDING AN OT CYBERSECURITY PROGRAM – A PRACTITIONER’S VIEW Rohit Sharma, Head of Cyber Security, Adani Power This session is based on the experiential knowledge acquired in building an OT Cybersecurity program in a critical sector organization. During this session, we would discuss the key challenges in setting up the OT Cybersecurity program in the real world. We will deep dive into the challenges faced in – People, Process and Technology dimensions of the program. We will also discuss on the divergence of the existing paradigm of the IT Cybersecurity from the OT landscape and how to bridge this gap. Monday, 26 February, 2024 / 02:30 PM - 03:00 PM IST HOW TO SELECT YOUR CYBER-PHYSICAL SYSTEMS PROTECTION PLATFORM Ruggero Contu, Sr Director Analyst, Gartner The market for security products for operational technology and other cyber-physical systems (CPS) is evolving rapidly. New vendors enter the scene, and mergers and acquisitions are abundant. How can security and risk management leaders evaluate and compare CPS protection platforms to select the product that best fits their situation? Monday, 26 February, 2024 / 04:00 PM - 04:30 PM IST 5 THINGS YOU NEED TO KNOW ABOUT CONTINUOUS CONTROL MONITORING Tisha Bhambry, Director Analyst, Gartner Continuous controls monitoring (CCM) allows high-frequency and automated management of controls to validate the effectiveness of controls designed to mitigate risk. This session clarifies the most important five things to use CCM for extending automation capabilities, processes and risk culture. Monday, 26 February, 2024 / 04:00 PM - 04:30 PM IST OUTLOOK FOR IDENTITY AND ACCESS MANAGEMENT Abhyuday Data, Director Analyst, Gartner Digital identity requirements and importance are growing as organizations migrate their infrastructure and apps to the cloud. Enterprises anticipate innovations to enable continuous, dynamic and intelligent IAM controls while bracing for emerging decentralized identity impact and potential Web3 business model disruption. This session discusses key trends and the IAM outlook in the coming years. Tuesday, 27 February, 2024 / 10:30 AM - 11:00 AM IST DON'T LET YOUR AI CONTROL YOU: MANAGE AI TRUST, RISK AND SECURITY Dale Gardner, Sr Director Analyst, Gartner AI teams are perceiving risk differently than security teams. Especially given upcoming regulations and guidelines across the globe, things to not overlook include data and model drift, uncontrolled bias and privacy and security concerns specific to AI model training and deployment. This session will explain Gartner's AI trust, risk and security management (TRiSM) market guide and how to coordinate AI issues collaboratively and consistently. Tuesday, 27 February, 2024 / 10:30 AM - 12:00 PM IST WORKSHOP: INTRODUCING THE GARTNER CYBERSECURITY CONTROLS ASSESSMENT Victoria Cason, Sr Principal Analyst, Gartner Rahul Balakrishnan, Sr Director, Research, Gartner Sixty-six percent of CISOs ranked the ability to benchmark their security controls as critical to addressing their challenges. But accomplishing this can be costly and time-consuming. This session will detail how the Gartner Cybersecurity Controls Assessment allows you to benchmark the current state of security controls against your peers, get a baseline for tracking improvements and learn to prioritize controls for greater investment. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Tuesday, 27 February, 2024 / 12:00 PM - 12:30 PM IST CONNECT BUSINESS VALUE AND IDENTITY MANAGEMENT Abhyuday Data, Director Analyst, Gartner Leaders responsible for IAM generally focus on the technical benefits of an IAM solution rather than its impact on the organization's goals and objectives. They are unaccustomed to recognizing and accommodating the influence IAM has on business outcomes or associating IAM with environmental, organizational or social change. These skills are critical to an initiative with IAM's scope and breadth. Tuesday, 27 February, 2024 / 12:00 PM - 12:45 PM IST ASK THE EXPERT: RISK-BASED VULNERABILITY MANAGEMENT Steve Santos, Sr Director Analyst, Gartner Join this ask the expert session to get answers to key questions around risk-based vulnerability management. This session will offer answers to questions such as: - How to do RBVM with process - How to do RBVM with tools - Best practices for RBVM Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Tuesday, 27 February, 2024 / 03:45 PM - 04:15 PM IST WEAPONIZE RISK APPETITE WITH PROTECTION-LEVEL AGREEMENTS Paul Furtado, VP Analyst, Gartner Risk appetite fails when expressed in fuzzy, imprecise terms. Repositioning risk appetite in the context of investment and value delivery creates a measurable scale of risk that powers a new type of governance. Concrete assertions of risk appetite make executive decisions binding. Tuesday, 27 February, 2024 / 03:45 PM - 04:15 PM IST TECHNICAL INSIGHTS: TOP 5 DATA SECURITY CHALLENGES Andrew Bales, Sr Principal Analyst, Gartner Businesses are turning to data analytics and sharing data with third parties to identify opportunities, improve performance and drive decision making. At the same time the push to the cloud and the fact that structured and unstructured data has been growing exponentially leave lots of room for data theft, compliance violations and waste. In this session we will discuss the top 5 data security challenges facing business today and how to remediate them. Tuesday, 27 February, 2024 / 03:45 PM - 04:15 PM IST OUTLOOK FOR CYBER RISK MANAGEMENT Tisha Bhambry, Director Analyst, Gartner Cyber risk management is a key investment area of interest for organizations. But for security and risk management leaders, it is an on-going challenge to continuously assess the increasing scope of risks as well as mitigate the ones that can maximize protection and innovation to the business. This session offers an overview of the state of art as well as what the future will hold in cyber-risk management. Tuesday, 27 February, 2024 / 03:45 PM - 04:30 PM IST ROUNDTABLE: BEST PRACTICES IN ASSESSING THIRD-PARTY SECURITY AND RISK Oscar Isaka, Sr Director Analyst, Gartner Security and risk leaders struggle to effectively assess third-party (including IT vendor) security and risk, leading to unknown risks or security breaches. This roundtable provides you with the opportunity to participate in a facilitated discussion with your peers regarding the most effective assessment practices used today. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Tuesday, 27 February, 2024 / 04:30 PM - 05:00 PM IST FOUR THIRD-PARTY CYBER RISK PRINCIPLES THAT YOU MUST ADOPT Rahul Balakrishnan, Sr Director, Research, Gartner Third-party risk management is a very broad and potentially complex topic. This session will discuss principles that security and risk management leaders must adopt for more effective management of third-party risk and the common pitfalls to watch out for. Tuesday, 27 February, 2024 / 04:30 PM - 05:00 PM IST EMERGING CYBERSECURITY TECHNOLOGIES AND CHALLENGES TO THE MODERN CISO Ruggero Contu, Sr Director Analyst, Gartner This session will explore key cybersecurity technologies in information security. For each category explored, we'll discuss impact and recommendations for CISOs. TRACK C: INFRASTRUCTURE SECURITY Monday, 26 February, 2024 / 11:00 AM - 11:30 AM IST ZERO-TRUST PREDICTIONS John Watts, VP Analyst, Gartner Zero trust is moving away from excessive marketing hype. Many organizations have set zero trust as a strategy for their organizations, but are looking at the reality of implementing zero trust at scale for their organization. This session highlights three key predications for zero trust and what you can do to prepare for the future. Monday, 26 February, 2024 / 11:00 AM - 11:30 AM IST OUTLOOK FOR NETWORK SECURITY Thomas Lintemuth, VP Analyst, Gartner Users, devices, applications and data are everywhere and so are networks. As organizations rapidly expand their footprint and support a hybrid workforce, how does network security evolve to keep up? Security and risk management leaders must understand the current trends in network security and make business-aligned, risk-focused decisions on where best to use network security today. Monday, 26 February, 2024 / 11:00 AM - 11:30 AM IST OUTLOOK FOR CLOUD SECURITY Richard Bartley, VP Analyst, Gartner Cloud security remains a top priority. This presentation summarizes the problems, recommended processes and emerging and evolving product types to address three key issues: - What are the unique risks associated with public cloud service providers? - What are the unique security challenges of IaaS and PaaS and how can they be mitigated? - What are the unique control challenges of SaaS and how can they be addressed? Monday, 26 February, 2024 / 02:30 PM - 03:15 PM IST ASK THE EXPERT: WHAT'S THE BEST REMOTE ACCESS STRATEGY FOR THE FUTURE OF WORK TRENDS John Watts, VP Analyst, Gartner The future of work is hybrid, but most remote access architecture today is caught between a rock and a hard place — scale up the historical approach, or experiment with more recent solutions even if nobody knows what their application architecture will look like in a few years. In this session, a Gartner Expert will answer questions on remote access best practices for a hybrid workforce. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Monday, 26 February, 2024 / 04:00 PM - 04:45 PM IST ASK THE EXPERT: ZTNA VS. VPN - DOES IT REALLY MATTER? Thomas Lintemuth, VP Analyst, Gartner Remote access, whether for the full-time or hybrid work environment, is top of mind for many network and security engineers. Does it matter if one sticks with VPN? Should an organization move to ZTNA? What may be some considerations organizations should consider? Join this session to get answers to such questions. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Tuesday, 27 February, 2024 / 10:30 AM - 11:00 AM IST CLOUD SECURITY 201: A CLOUD SECURITY COOKBOOK Charlie Winckless, VP Analyst, Gartner Cloud security remains a challenge; we have to protect data when it is out of our control. This session will address the emerging trends in cloud security, what they bring to your organization and how to use them most effectively. Security is seen as an obstruction to cloud adoption; this will show you how to enable without losing protection. Tuesday, 27 February, 2024 / 10:30 AM - 11:00 AM IST TECHNICAL INSIGHTS — CYBERSECURITY MESH ARCHITECTURE: THE NEXT GENERATION OF SECURITY ARCHITECTURE Richard Bartley, VP Analyst, Gartner This session will discuss the reference architecture and dive deep into how to build the cybersecurity mesh architecture (CSMA). We will discuss the evolution of best of breed to the new CSMA, along with pros and cons of each approach. Finally, we will discuss the vendor landscape from larger security vendors with full stacks to open source or distributed CSM solutions. Tuesday, 27 February, 2024 / 12:00 PM - 12:30 PM IST HOW TO SECURELY DEVELOP, DEPLOY AND OPERATE CLOUD NATIVE APPLICATIONS Charlie Winckless, VP Analyst, Gartner Cloud native applications live at the nexus of microservices-architected applications built on Linux containers using DevSecOps deployed onto programmatic cloud infrastructure and managed with an immutable infrastructure mindset. Securing cloud native applications requires new approaches for securing the entire lifecycle of the application. This session will provide specific guidance, tools and vendors to secure cloud native applications. Tuesday, 27 February, 2024 / 02:00 PM - 02:30 PM IST OUTLOOK FOR ENDPOINT AND MOBILE SECURITY Franz Hinner, Sr Director Analyst, Gartner Endpoint security has long been a foundational security control, a must-have toolset that no enterprise security program can do without. But the role of endpoint security continues to evolve, covering an expanding portfolio of tools, techniques and devices. In this session, we will explore the current "state of the art" of endpoint and mobile security, and look to the future of how we can expect this crucial technology to evolve. Tuesday, 27 February, 2024 / 02:00 PM - 02:30 PM IST TECHNICAL INSIGHTS: SSE 101- HOW TO SECURE WEB ACCESS, SAAS, AND PRIVATE APPS WITH SECURITY SERVICE EDGE Thomas Lintemuth, VP Analyst, Gartner Security service edge (SSE) is an emerging market that consolidates CASB, SWG, and ZTNA. We will walk through the key capabilities of SSE and how it helps you to secure outbound web and SaaS access, protect your sanctioned SaaS apps, and provides secure remote access to private applications. TRACK D: APPLICATION AND DATA SECURITY Monday, 26 February, 2024 / 11:00 AM - 12:30 PM IST WORKSHOP: BUILD AN APPLICATION SECURITY CHAMPIONS PROGRAM Dale Gardner, Sr Director Analyst, Gartner Dedicated application security resources typically come at a premium, so organizations must seek to scale by using security champions within respective development teams. Attendees at this workshop will put together a plan to build out a security champions program. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Monday, 26 February, 2024 / 12:30 PM - 01:00 PM IST TECHNICAL INSIGHTS: OUTLOOK FOR APPLICATION SECURITY Manjunath Bhat, VP Analyst, Gartner Application security continues to evolve, with DevSecOps and API security coming into maturity. However, organizations must also look to secure their software supply chain and cloud-native deployments effectively. This session will explore this evolving landscape and provide organizations with the insights they need to consider for 2024 and beyond. Monday, 26 February, 2024 / 02:30 PM - 03:00 PM IST SECURE CODING AND CHATGPT: MIRACLE OR MIRAGE? Kevin Schmidt, Director Analyst, Gartner Chat GPT has made an impressive debut, developing clever, easy-to-understand explanations for complex subject matter. However, security problems don't lend themselves to easy explanations. While there is a lot of potential benefit in using AI for things like security-oriented paired programming, is it really possible to get high-quality answers using AI assistants? Monday, 26 February, 2024 / 02:30 PM - 04:00 PM IST WORKSHOP: SO, YOU PURCHASED MICROSOFT'S E5; WHAT NOW? EVALUATING SECURITY VENDOR CONSOLIDATION USING MICROSOFT Franz Hinner, Sr Director Analyst, Gartner This workshop guides you to all aspects of vendor consolidation based on your Microsoft E5 security capabilities. To determine options to replace or augment. The result will be a personalized decision guide to consolidate vendors. Attendees will be able to define security posture goals, identify areas for improvement, consolidate vendor evaluation and criteria, and create their personalized decision guide. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Monday, 26 February, 2024 / 04:00 PM - 04:30 PM IST MANAGING APPLICATION SECURITY RISKS WITH APPLICATION SECURITY POSTURE MANAGEMENT Dale Gardner, Sr Director Analyst, Gartner As development teams take on more day-to-day security responsibilities, application security teams can begin to shift to a risk management approach to manage AppSec programs. In this session, we’ll discuss: - What is ASPM? - What to consider when evaluating and implementing tools - Organizational impacts Tuesday, 27 February, 2024 / 10:30 AM - 11:00 AM IST HOW TO MITIGATE SECURITY AND COMPLIANCE RISKS WITH AI-GENERATED CODE Manjunath Bhat, VP Analyst, Gartner Generative AI coding assistants are poised to fundamentally alter the way software engineers build applications. However, security and compliance risks can hinder their legitimate use and create the need for new compensating controls. This session will cover 5 ways to mitigate the risks associated with AI coding assistants. Tuesday, 27 February, 2024 / 10:30 AM - 11:15 AM IST ASK THE EXPERT: HOW TO SUCCEED IN DATA CLASSIFICATION PROGRAM? Andrew Bales, Sr Principal Analyst, Gartner This session offers anything you want to know about data classification: from policies to processes to technology; and across privacy, regulatory requirements, and intellectual property protection use cases. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Tuesday, 27 February, 2024 / 02:00 PM - 02:45 PM IST ROUNDTABLE: BEST PRACTICES FOR SECURITY IN DEVOPS (MULTI-GROUP) Manjunath Bhat, VP Analyst, Gartner Want to turn DevOps into DevSecOps? This roundtable engages developers, program managers and security personnel to share the best (and worst) practices they have tried with their team. Come prepared to exchange insights and best practices with your peers during these Gartner-facilitated, simultaneous small-group discussions around a set topic. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. TRACK E: CYBERSECURITY OPERATIONS Monday, 26 February, 2024 / 11:00 AM - 11:30 AM IST IS YOUR SOC REALLY A MODERN SOC? Steve Santos, Sr Director Analyst, Gartner Modern SOCs require proactive and automated capabilities, such as threat hunting, prioritized threat intelligence and automated response. This session will describe modern SOC core capabilities, and guide SRM leaders on how to evaluate whether their current SOC has established those capabilities and processes. Monday, 26 February, 2024 / 12:30 PM - 01:15 PM IST ASK THE EXPERT: HOW TO MEASURE THE SOC EFFECTIVELY A session that answers the question of how to develop common metrics used to measure SOC capabilities and how to improve these internally using tools and more granular processes. We will spend time identifying the most useful metrics for SOC teams and senior leaders as well as highlighting those that provide little or no value to the organization. Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference. Monday, 26 February, 2024 / 04:00 PM - 04:30 PM IST OUTLOOK FOR SECURITY OPERATIONS Security operations are undergoing a transformative change when our security is planned and delivered. Do you really need to centralize data for security? Is there a single solution to solve all my security needs? How do we determine what is threat intelligence for us? Learn what technologies, processes and services will have the biggest impact on how security operations are delivered in 2024. Tuesday, 27 February, 2024 / 02:00 PM - 02:30 PM IST TECHNICAL INSIGHTS: HOW SECURITY OPERATIONS TEAMS CAN LEVERAGE CHATGPT Kevin Schmidt, Director Analyst, Gartner Advances in generative artificial intelligence (AI) like OpenAI's ChatGPT are causing organizations and teams to rethink how they approach staffing, training, operations and threat detection. This presentation will help practitioners and managers alike understand what is possible and what is hype. Tuesday, 27 February, 2024 / 03:45 PM - 04:15 PM IST THE FUTURE OF SIEM AND THE EVOLUTION OF THREAT DETECTION, INVESTIGATION AND RESPONSE Steve Santos, Sr Director Analyst, Gartner This session will address the changes in the SIEM market, the progression toward SaaS platforms, the impact of consolidated solutions such as XDR and the desire for a solution that is able to detect, investigate and respond to threats in an integrated capability that can be effectively used in line with modern infrastructure and modern SOC processes. Tuesday, 27 February, 2024 / 04:30 PM - 05:00 PM IST THE EXPANDING ATTACK SURFACE, DO YOU REALLY KNOW YOUR INFRASTRUCTURE? As organizations update their IT and security for modern work, they now have to manage a growing attack surface due to their technological environments becoming increasingly complex and dispersed. New technologies and business initiatives, such as SaaS and supply chain pose new threats. Organizations need to invest in a better understanding of the continuous expansion of their attack surface. Back to Top WANT TO STAY INFORMED? GET CONFERENCE EMAIL UPDATES. Work Email Person Type Continue By clicking the "Continue" button, you are agreeing to the Gartner Terms of Use and Privacy Policy. CONTACT INFORMATION All fields are required. First Name Last Name Business Phone Country Person Type Job Title Company Name Job Function Job Role Step 2 of 2 Please provide the consent below I have read, understood and accepted Gartner Separate Consent Letter , whereby I agree (1) to provide Gartner with my personal information, and understand that information will be transferred outside of mainland China and processed by Gartner group companies and other legitimate processing parties and (2) to be contacted by Gartner group companies via internet, mobile/telephone and email, for the purposes of sales, marketing and research. Back Sign up Now By clicking the "Sign up Now" button, you are agreeing to the Gartner Terms of Use and Privacy Policy. * Gartner Conferences * Contact Conferences * Exhibit * Contact Gartner * IT Glossary * Privacy * Policies * Terms of Use * Site Index * Careers * Gartner.com * Frequently Asked Questions * Pricing & Registration * Sitemap * Gartner Conferences * Contact Conferences * Exhibit * Contact Gartner * IT Glossary * Privacy * Policies * Terms of Use * Site Index * Careers * Gartner.com * Frequently Asked Questions * Pricing & Registration * Sitemap ©2024 Gartner, Inc. and/or its affiliates. All rights reserved. YOUR PRIVACY IS IMPORTANT TO US By clicking “Accept all,” you agree to the storing of cookies on your device to enhance site navigation, analyze site usage and assist in our marketing efforts. To learn more, visit our Privacy Policy and Cookie Notice. Customize Accept all