gartner security & risk management summit 2014...the gartner security & risk management...
TRANSCRIPT
Visit gartner.com/me/security for updates and to register! 1
Gartner Security & Risk Management Summit 201415 – 16 September | Raffl es Hotel, Dubai, UAE | gartner.com/me/security
hOT TOPICS
Cybersecurity
Risk and Compliance
Internet of Things
Mobile and Cloud Security
Single Sign-on and Identity Governance
Operational Technology Risks
Security Metrics and Analytics
Save $300
Register at
gartner.com/eu/security
by 18 July 2014
Smart Risk: Balancing Security and Opportunity
Table of contents
Define and achieve effective security and risk management programs to improve enterprise performance
The Gartner Security & Risk Management Summit will bring Gartner’s global
thought leadership, independent advice and best practices to the local IT
and Security community. The summit will help tackle security, risk, identity
management issues, from cyber security threats to protecting mobile devices
and operational technology, with forward thinking perspectives and practical
recommendations that can be applied immediately.
The Summit features multiple tracks, 11 analysts, and more than 25 sessions
and roundtables, and will provide the learning, collaboration, and networking
environment to get the big picture vision, and bring back immediate take-
aways you can apply back in the office.
Smart Risk: Balancing Security and Opportunity
3 Tracks
4 Agenda at a glance
6 Summit features
6 Meet the analysts
7 Solution showcase and Build your agenda
8 Registration and pricing
Key benefits of attending
Through analyst sessions, problem-solving workshops and peer interaction, you’ll gain the insight necessary to:
• Architectanoverallsecurityandriskmanagement strategy aligned to business needs
• Developacomprehensivecybersecurityplan
• Addressmobileandcloudsecurityissues
• Secureoperationaltechnologysystems,and control systems
• Createtherightorganizationandmindsetfor security and risk management initiatives
• Structureandmanageeachofyourindividual IT risk programs effectively
• Selectthebestapproachesandvendorsolutions
•Meetcomplianceregulations Eric PaulakManaging VP and Conference Chair, Gartner
Karthik CariappaDirector, Product Management, Gartner
Visit gartner.com/me/security for updates and to register! 3
Who should attend
Senior business and IT professionals including:
• CIOsandITSeniorLeadership
• ChiefInformationSecurityOfficers(CISO)
• Infrastructure/OperationalTechnologyManagers
• ComplianceManagers/FraudManagers
• SecurityArchitects/EnterpriseArchitects
• ITSecurityManagers
• ChiefPrivacyOfficers
• ChiefRiskOfficers
• RiskManagers
The tracks
A The CISO and Risk Management ProgramCISO’s must find and maintain a tricky balance between protection and productivity. The challenge is exacerbated by ongoing volatility in enterprises’ business, technology and threat environments. The CISO & Risk Management program explores the key capabilities, strategies and tactics that are essential for the contemporary security leader.
B Security Technology and OperationsThe potential positive business impact of cloud, social, mobility and big data brings undeniable opportunities for success but also challenges traditional approaches to information security to evolve at business speed. Asorganizationsacceleratetheiradoptionofthesenewplatforms,badators develop methods to exploit these emerging platforms. Your security program must rapidly mature in the breadth and effectiveness of techniques and technologies you use to maintain appropriate levels of security for applications, data and infrastructure regardless of location.
Virtual tracks
Identity and Access ManagementAs business and institutions mature, they must manage volatile and rapid change, establish effective formal governance, and provide accountability through transparency. IAM can enable these evolutionary steps, but must itself evolve. The IAM track features a wealth of presentations on current best practices and the latest issues and trends.
Mobile SecurityMobiledevicespresentahostofnewsecurityissues,withtheBYODphenomenonpresentingthegreatestchallenge.ITorganizationsmustadapt to this rapidly changing environment and implement new policies and new technologies to mitigate the risks of the mobile workplace. This track willhelpyounavigatethemobileenvironmentoverathree-yearhorizon.
Cloud SecurityAsorganizationsexplorethebenefitsofcloudcomputing,securityprofessionals must be prepared to highlight the risks and the costs of mitigating these risks. This track will show you how.
Internet of ThingsThe Internet of Things (IoT) has arrived. But as innovation and complexity expand, risk grows and threats expand with them. Securing the IoT is critical. This track will show you how.
Gartner keynotes
Gartner Opening Keynote: Smart Risk: Balancing Security and Opportunity
The central challenge for security and risk leaders is to find the best ways to achieve enterprise objectives while mitigating security risks to an acceptable level, so that everyone wins.
Paul Proctor, Andrew Walls and Eric Paulak
Gartner Closing Keynote: Top Security Trends and Takeaways for 2014 and 2015
WiththeNexusofForcesdriving continuing trends incloud,consumerization,mobility and big data, the way
ITisdeliveredischanging.Eachchangebrings new threats and breaks old security processes. This session reviews the hot trends in Security for 2014 and beyond while providing a roadmap to the summit and relevant Gartner Research.
Eric Paulak
4 Gartner Security & Risk Management Summit 2014
Agenda at a glance
08:00 – 20:00 Registration and Information
09:00 – 09:30 Tutorial: Introduction to Identity and Access Management Felix Gaehtgens
Tutorial:PreparingforAdvancedThreatsandCyberAttacks Greg Young and Oliver Rochford
09:30 – 10:00 Refreshment Break in the Solution Showcase
10:00 – 11:15 Welcome and Gartner Opening Keynote: Smart Risk: Balancing Security and Opportunity Paul Proctor, Andrew Walls and Eric Paulak
11:15 – 11:45 Refreshment Break in the Solution Showcase
TRACK A
The CISO and Risk Management Program
TRACK B
Security Technology and Operations
WORKShOPS
Interactive Sessions
ROunDTABleS
Analyst-user Roundtables
11:45 – 12:15 TothePoint:CybersecurityandtheInternetofThings Earl Perkins
TothePoint:WhenWillweReach‘PeakThreat’,andWhat do we do After? Greg Young
11:30 – 12:45 Workshop:LeveragingContent-AwareDLPtoEliminateaSnowdenEventinYourOrganization Eric Ouellet
11:30 – 12:30 Roundtable:PresentingaHardTargettoAttackers—OperationallyEffectiveVulnerabilityManagement Oliver Rochford
12:15 – 13:30 LunchandPrayerTime
13:30 – 14:15 The Gartner Business Risk Model Paul Proctor
Architecting a New Approach for Continous Advanced ThreatProtection Neil MacDonald
13:30 – 14:30 Roundtable:IT,OTandPhysicalSecurity—IsitTimeforIntegration? Earl Perkins
14:30 – 15:00 SolutionProviderSessions 14:15 – 15:45 Workshop:HowtoBuildanEffectiveCybersecurityAwarenessCampaign Andrew Walls
15:15 – 15:45 TothePoint:TheTopRisksforPublicandPrivateCloud Neil MacDonald
TothePoint:WhatdoyouBuyfortheUsersthatHave(Accessto)Everything? Felix Gaehtgens
15:00 – 16:00 Roundtable:CuringDataResidencyHeadachesinBigDataandCloud Eric Ouellet
15:45 – 16:30 RefreshmentBreakintheSolutionShowcaseandPrayerTime 16:00 – 16:20 EnterpriseNetworkFirewallsMagicQuadrants Oliver Rochford
16:30 – 17:30 Guest Keynote
17:30 – 18:30 Networking Reception in the Soution Showcase
08:30 – 17:30 Registration and Information
09:00 – 09:30 TothePoint:MobileSecurityThreatsandTrends in 2014 Dionisio Zumerle
TothePoint:HowWillContentandContextAwarenessChangeYourExistingIAMDeployment? Eric Ouellet
09:00 – 10:30 Workshop:CreatingRiskMetricstoInfluenceBusinessDecisions Paul Proctor
09:45 – 10:15 SolutionProviderSessions
10:15 – 11:00 Refreshment Break in the Solution Showcase 10:30 – 10:50 IdentityGovernanceandAdministrationMagicQuadrants Felix Gaehtgens
11:00 – 11:45 CIOAgenda:AGCCperspective-HowCISO’sNeedtoRespond Ed Gabrys
iPhones,iPads,Androids+SSO,VPN,DLP,SWG=AchievingEnterpriseMobilitySecurely Dionisio Zumerle
10:45 – 11:45 Roundtable:Securing Cloud Computing Neil MacDonald
12:00 – 12:30 Case Study Case Study
12:30 – 13:45 LunchandPrayerTime
13:45 – 14:15 SolutionProviderSessions 13:45 – 15:15 Workshop:Resolved:TheMostEffectiveApproach to Security Monitoring is… Oliver Rochford
14:30 – 15:15 Social Media Risk Management and Compliance Technologies Andrew Walls
Securing Operational Technology: The Next Big EnterpriseChallenge Earl Perkins
15:15 – 16:00 RefreshmentBreakintheSolutionShowcaseandPrayerTime 15:25 – 15:45 MobileDataProtectionMagicQuadrants Dionisio Zumerle
16:00 – 16:30 TothePoint:IdentityIntelligenceorCyberSurveillance? Andrew Walls
TothePoint:TheCyberThreatLandscape Greg Young
16:45 – 17:45 Gartner Closing Keynote: Top Security Trends and Takeaways for 2014 and 2015 Eric Paulak
17:45 Conference Close
Mon
day
15SEPTEMBER2014
Tues
day
16SEPTEMBER2014
TothePoint:CybersecurityandtheInternetofThings Earl Perkins
TothePoint:MobileSecurityThreatsandTrends in 2014 Dionisio Zumerle
Social Media Risk Management and Compliance Technologies Andrew Walls
TothePoint:TheCyberThreatLandscape Greg Young
The Gartner Business Risk Model Paul Proctor
CIOAgenda:AGCCperspective—HowCISO’sNeedto Respond Ed Gabrys
Visit gartner.com/me/security for updates and to register! 5
08:00 – 20:00 Registration and Information
09:00 – 09:30 Tutorial: Introduction to Identity and Access Management Felix Gaehtgens
Tutorial:PreparingforAdvancedThreatsandCyberAttacks Greg Young and Oliver Rochford
09:30 – 10:00 Refreshment Break in the Solution Showcase
10:00 – 11:15 Welcome and Gartner Opening Keynote: Smart Risk: Balancing Security and Opportunity Paul Proctor, Andrew Walls and Eric Paulak
11:15 – 11:45 Refreshment Break in the Solution Showcase
TRACK A
The CISO and Risk Management Program
TRACK B
Security Technology and Operations
WORKShOPS
Interactive Sessions
ROunDTABleS
Analyst-user Roundtables
11:45 – 12:15 TothePoint:CybersecurityandtheInternetofThings Earl Perkins
TothePoint:WhenWillweReach‘PeakThreat’,andWhat do we do After? Greg Young
11:30 – 12:45 Workshop:LeveragingContent-AwareDLPtoEliminateaSnowdenEventinYourOrganization Eric Ouellet
11:30 – 12:30 Roundtable:PresentingaHardTargettoAttackers—OperationallyEffectiveVulnerabilityManagement Oliver Rochford
12:15 – 13:30 LunchandPrayerTime
13:30 – 14:15 The Gartner Business Risk Model Paul Proctor
Architecting a New Approach for Continous Advanced ThreatProtection Neil MacDonald
13:30 – 14:30 Roundtable:IT,OTandPhysicalSecurity—IsitTimeforIntegration? Earl Perkins
14:30 – 15:00 SolutionProviderSessions 14:15 – 15:45 Workshop:HowtoBuildanEffectiveCybersecurityAwarenessCampaign Andrew Walls
15:15 – 15:45 TothePoint:TheTopRisksforPublicandPrivateCloud Neil MacDonald
TothePoint:WhatdoyouBuyfortheUsersthatHave(Accessto)Everything? Felix Gaehtgens
15:00 – 16:00 Roundtable:CuringDataResidencyHeadachesinBigDataandCloud Eric Ouellet
15:45 – 16:30 RefreshmentBreakintheSolutionShowcaseandPrayerTime 16:00 – 16:20 EnterpriseNetworkFirewallsMagicQuadrants Oliver Rochford
16:30 – 17:30 Guest Keynote
17:30 – 18:30 Networking Reception in the Soution Showcase
08:30 – 17:30 Registration and Information
09:00 – 09:30 TothePoint:MobileSecurityThreatsandTrends in 2014 Dionisio Zumerle
TothePoint:HowWillContentandContextAwarenessChangeYourExistingIAMDeployment? Eric Ouellet
09:00 – 10:30 Workshop:CreatingRiskMetricstoInfluenceBusinessDecisions Paul Proctor
09:45 – 10:15 SolutionProviderSessions
10:15 – 11:00 Refreshment Break in the Solution Showcase 10:30 – 10:50 IdentityGovernanceandAdministrationMagicQuadrants Felix Gaehtgens
11:00 – 11:45 CIOAgenda:AGCCperspective-HowCISO’sNeedtoRespond Ed Gabrys
iPhones,iPads,Androids+SSO,VPN,DLP,SWG=AchievingEnterpriseMobilitySecurely Dionisio Zumerle
10:45 – 11:45 Roundtable:Securing Cloud Computing Neil MacDonald
12:00 – 12:30 Case Study Case Study
12:30 – 13:45 LunchandPrayerTime
13:45 – 14:15 SolutionProviderSessions 13:45 – 15:15 Workshop:Resolved:TheMostEffectiveApproach to Security Monitoring is… Oliver Rochford
14:30 – 15:15 Social Media Risk Management and Compliance Technologies Andrew Walls
Securing Operational Technology: The Next Big EnterpriseChallenge Earl Perkins
15:15 – 16:00 RefreshmentBreakintheSolutionShowcaseandPrayerTime 15:25 – 15:45 MobileDataProtectionMagicQuadrants Dionisio Zumerle
16:00 – 16:30 TothePoint:IdentityIntelligenceorCyberSurveillance? Andrew Walls
TothePoint:TheCyberThreatLandscape Greg Young
16:45 – 17:45 Gartner Closing Keynote: Top Security Trends and Takeaways for 2014 and 2015 Eric Paulak
17:45 Conference Close Age
nda
corr
ect a
s of
12
May
201
4. S
essi
ons
sub
ject
to c
hang
e.A
t the
Sum
mit,
ple
ase
refe
r to
the
age
nda
in t
he e
vent
gui
de
pro
vid
ed,
for
the
mos
t up
to d
ate
sess
ion
and
loca
tion
info
rmat
ion.
Conference Chair’s Choice
14:15 – 15:45 Workshop:HowtoBuildanEffectiveCybersecurityAwarenessCampaign Andrew Walls
10:45 – 11:45 Roundtable:Securing Cloud Computing Neil MacDonald
09:00 – 10:30 Workshop:CreatingRiskMetricstoInfluenceBusinessDecisions Paul Proctor
11:30 – 12:30 Roundtable:PresentingaHardTargettoAttackers—OperationallyEffectiveVulnerabilityManagement Oliver Rochford
6 Gartner Security & Risk Management Summit 2014
Meet the analysts
Ed GabrysResearch Director
Felix GaehtgensResearch Director
• ITStrategicPlanning• ITOrganizationalDesign• ITGovernance• InnovationManagement• BusinessValueofIT
• IdentityandAccessManagement• PrivilegedAccessManagement• PasswordManagement• ExternalizedAuthorizationManagement
Paul E. ProctorVPDistinguishedAnalyst
Oliver RochfordResearch Director
• RiskManagement• InformationSecurityProgramManagement• InformationSecurityTechnologyandServices• AuditandCompliance• ITGovernance
• InformationSecurityTechnologyandServices• VulnerabilityManagement• SecurityInformationandEventManagement
Dionisio ZumerlePrincipalResearchAnalyst
• MobileEnterpriseStrategy• SecurityandRiskManagementLeaders• InformationSecurityTechnologyandServices
Eric OuelletResearch VP
Neil MacDonaldVPandGartnerFellow
• InformationSecurityProgramManagement• InformationSecurityTechnologyandServices
• SharePoint• InformationSecurityTechnologyandServices• Virtualization• CloudComputing• DataCenterModernizationandConsolidation
Eric PaulakManaging VP
Earl PerkinsResearch VP
• MobileEnterpriseStrategy• InformationSecurityTechnologyandServices• CommunicationsInfrastructureModernization
• SecurityandRiskManagementLeaders• ITandOperationalTechnologyAlignment• InformationSecurityTechnologyandServices• AuditandCompliance• SmartGrid
Greg YoungResearch VP
Andrew WallsResearch VP
• InformationSecurityTechnologyandServices• NetworkFirewalls• SecurityArchitecture
• InformationSecurityProgramManagement• InformationSecurityTechnologyandServices• Privacy• SecurityandRiskManagementLeaders• BusinessGetsSocial
Gartner Analyst One-on-One MeetingsGartnerEventsgiveyoumorethanwhatyournormalindustryeventoffers.Meetingface-to-face with a Gartner analyst is one of the key benefits of attending a Gartner Summit. Personalizeyour30minuteprivateappointmenttodiscussyourspecificissueandwalk away with invaluable, tailor-made advice that you can apply to your role and your organizationstraightaway.
Summit features
end-user case studiesGartner-invitedend-usersrevealtheirpersonalchallenges,issuesandlessonslearned.
Track sessionsPresentedbyGartneranalysts,invitedguestspeakersandindustrypresenters,thesesessionsfocusontheissuesthatmattermosttoyouandprovidereal-worldinformationthatwillhelpyoumakebetterdecisionsanddrivesuccessfulresults.
“To the Point” sessionsSometimesyoujustwanttohearthe“Top5ThingsYouWanttoKnow”aboutatrend,atechnologyoranapproach.Gartneranalystsprovidetopconcepts,keytrendsoraquickoverviewofaparticulartopic,inacondensedformat.
WorkshopsPresentedbyGartnerorguestexperts,theseworkshopsprovideanopportunitytodrilldownonspecific“howto”topicsinanextended,smallgroupsession.Thecoursesaredesignedforanintimateandinteractivelearningexperience.Reservedforend-usersonly.
Analyst-user roundtablesJoinusforahostedpeergroupdiscussionwithyourend-userpeers,alongwithaGartneranalystlendinghisorherexpertisetoassistyou.Theseshouldnotbemissed!
Tutorial sessionsThesepresentationsarefocusedonlayeringthefoundationsforattendees’understandingofatopic,trendortechnologywithbasic101“buildingblock”definitionsandanalysis.
Visit gartner.com/me/security for updates and to register! 7
Solution showcaseDevelopa“shortlist”oftechnologyproviderswhocanmeetyourparticularneeds.Weofferyouexclusiveaccesstosomeoftheworld’sleading technology and service solution providers in a variety of settings.
Sponsorship opportunitiesFor further information about sponsoring this event contact:
MUDASSIR EHSANTelephone: +971 43913204email: [email protected]
NASAR BUTTTelephone: +44 7540920980email: [email protected]
Premier sponsor Platinum sponsor Silver sponsor
Powerful tools to navigate manage and decideTo get the most out of your Summit experience, we’ve created a range of tools to help you manage your goals and objectives of attending.
Gartner events navigatorWe’re excited to introduce a new and enhanced agenda planning tool which replaces our previous Agenda Builder tool. GartnerEventsNavigatorallowsyoutoplanyourpersonaleventexperienceandgainthemostfromyourtimeon-site.Organize,viewandcustomizeyouragendausingthefollowingcriteria:
• Gartneranalystandspeakerprofiles
•GartnerAnalystOne-on-OneMeetings
• Sessiondetailsincludingtracks,date,time,etc.
• YourGartnerAnalyst-UserRoundtableorworkshopreservations
• Dailyactivitiesandnetworking
Gartner events navigator Mobile AppManage your agenda on your mobile device!
•Getup-to-the-minuteeventupdates
• Integratesocialmediaintoyoureventexperience
• Accesssessiondocumentsandaddyournotes
• AvailableforiPhone®,iPad® and Android™
event Approval ToolsForusepre-event,on-siteandpost-event,ourEventApprovalToolsmake it easy to demonstrate the substantial value of your Gartner eventexperiencetoyourmanager.Theyincludeacustomizableletter,cost-benefi t analysis, top reasons to attend and more.
Visit gartner.com/me/security for details.
Build your agenda
“ There are a lot of interesting topics that can contribute to your way of thinking.”
DUBAI CUSTOMS
Save $300 whenyouregisterby18July2014.
early-bird discount
©2014Gartner,Inc.and/oritsaffiliates.Allrightsreserved.GartnerisaregisteredtrademarkofGartner,Inc.oritsaffiliates.Formoreinformation,[email protected].
Gartner Security & Risk Management Summit 201415 – 16 September | Raffles hotel, Dubai, uAegartner.com/me/security
3 easy ways to register
Web: gartner.com/me/security
email: [email protected]
Telephone: +442088792430
Pricing Pricing and Date is subject to change
early-bird price: $2,150 (offer ends 18 July 2014)
Standard Price: $2,450
Public Sector Price: $2,050
Gartner clients A Gartner ticket covers both days of the Summit. Contact your account manager or email [email protected] to register using a ticket.
Team attendance
Attend with your team — discounts availableGartnerEventshasdesignedanexperiencethatwillhelpteamsof4to25maximizetheirSummitexperiencewhileon-siteandlongaftertheeventconcludes.
Summit team discount offers:
• 4forthepriceof3
• 7forthepriceof5
• 10forthepriceof7
Formoreinformationaboutteamattendancevisitgartner.com/me/security