gartner security & risk management summit 2014...the gartner security & risk management...

8
Visit gartner.com/me/security for updates and to register! 1 Gartner Security & Risk Management Summit 2014 15 – 16 September | Raffles Hotel, Dubai, UAE | gartner.com/me/security HOT TOPICS Cybersecurity Risk and Compliance Internet of Things Mobile and Cloud Security Single Sign-on and Identity Governance Operational Technology Risks Security Metrics and Analytics Save $300 Register at gartner.com/eu/security by 18 July 2014 Smart Risk: Balancing Security and Opportunity

Upload: others

Post on 29-May-2020

16 views

Category:

Documents


0 download

TRANSCRIPT

Visit gartner.com/me/security for updates and to register! 1

Gartner Security & Risk Management Summit 201415 – 16 September | Raffl es Hotel, Dubai, UAE | gartner.com/me/security

hOT TOPICS

Cybersecurity

Risk and Compliance

Internet of Things

Mobile and Cloud Security

Single Sign-on and Identity Governance

Operational Technology Risks

Security Metrics and Analytics

Save $300

Register at

gartner.com/eu/security

by 18 July 2014

Smart Risk: Balancing Security and Opportunity

Table of contents

Define and achieve effective security and risk management programs to improve enterprise performance

The Gartner Security & Risk Management Summit will bring Gartner’s global

thought leadership, independent advice and best practices to the local IT

and Security community. The summit will help tackle security, risk, identity

management issues, from cyber security threats to protecting mobile devices

and operational technology, with forward thinking perspectives and practical

recommendations that can be applied immediately.

The Summit features multiple tracks, 11 analysts, and more than 25 sessions

and roundtables, and will provide the learning, collaboration, and networking

environment to get the big picture vision, and bring back immediate take-

aways you can apply back in the office.

Smart Risk: Balancing Security and Opportunity

3 Tracks

4 Agenda at a glance

6 Summit features

6 Meet the analysts

7 Solution showcase and Build your agenda

8 Registration and pricing

Key benefits of attending

Through analyst sessions, problem-solving workshops and peer interaction, you’ll gain the insight necessary to:

• Architectanoverallsecurityandriskmanagement strategy aligned to business needs

• Developacomprehensivecybersecurityplan

• Addressmobileandcloudsecurityissues

• Secureoperationaltechnologysystems,and control systems

• Createtherightorganizationandmindsetfor security and risk management initiatives

• Structureandmanageeachofyourindividual IT risk programs effectively

• Selectthebestapproachesandvendorsolutions

•Meetcomplianceregulations Eric PaulakManaging VP and Conference Chair, Gartner

Karthik CariappaDirector, Product Management, Gartner

Visit gartner.com/me/security for updates and to register! 3

Who should attend

Senior business and IT professionals including:

• CIOsandITSeniorLeadership

• ChiefInformationSecurityOfficers(CISO)

• Infrastructure/OperationalTechnologyManagers

• ComplianceManagers/FraudManagers

• SecurityArchitects/EnterpriseArchitects

• ITSecurityManagers

• ChiefPrivacyOfficers

• ChiefRiskOfficers

• RiskManagers

The tracks

A The CISO and Risk Management ProgramCISO’s must find and maintain a tricky balance between protection and productivity. The challenge is exacerbated by ongoing volatility in enterprises’ business, technology and threat environments. The CISO & Risk Management program explores the key capabilities, strategies and tactics that are essential for the contemporary security leader.

B Security Technology and OperationsThe potential positive business impact of cloud, social, mobility and big data brings undeniable opportunities for success but also challenges traditional approaches to information security to evolve at business speed. Asorganizationsacceleratetheiradoptionofthesenewplatforms,badators develop methods to exploit these emerging platforms. Your security program must rapidly mature in the breadth and effectiveness of techniques and technologies you use to maintain appropriate levels of security for applications, data and infrastructure regardless of location.

Virtual tracks

Identity and Access ManagementAs business and institutions mature, they must manage volatile and rapid change, establish effective formal governance, and provide accountability through transparency. IAM can enable these evolutionary steps, but must itself evolve. The IAM track features a wealth of presentations on current best practices and the latest issues and trends.

Mobile SecurityMobiledevicespresentahostofnewsecurityissues,withtheBYODphenomenonpresentingthegreatestchallenge.ITorganizationsmustadapt to this rapidly changing environment and implement new policies and new technologies to mitigate the risks of the mobile workplace. This track willhelpyounavigatethemobileenvironmentoverathree-yearhorizon.

Cloud SecurityAsorganizationsexplorethebenefitsofcloudcomputing,securityprofessionals must be prepared to highlight the risks and the costs of mitigating these risks. This track will show you how.

Internet of ThingsThe Internet of Things (IoT) has arrived. But as innovation and complexity expand, risk grows and threats expand with them. Securing the IoT is critical. This track will show you how.

Gartner keynotes

Gartner Opening Keynote: Smart Risk: Balancing Security and Opportunity

The central challenge for security and risk leaders is to find the best ways to achieve enterprise objectives while mitigating security risks to an acceptable level, so that everyone wins.

Paul Proctor, Andrew Walls and Eric Paulak

Gartner Closing Keynote: Top Security Trends and Takeaways for 2014 and 2015

WiththeNexusofForcesdriving continuing trends incloud,consumerization,mobility and big data, the way

ITisdeliveredischanging.Eachchangebrings new threats and breaks old security processes. This session reviews the hot trends in Security for 2014 and beyond while providing a roadmap to the summit and relevant Gartner Research.

Eric Paulak

4 Gartner Security & Risk Management Summit 2014

Agenda at a glance

08:00 – 20:00 Registration and Information

09:00 – 09:30 Tutorial: Introduction to Identity and Access Management Felix Gaehtgens

Tutorial:PreparingforAdvancedThreatsandCyberAttacks Greg Young and Oliver Rochford

09:30 – 10:00 Refreshment Break in the Solution Showcase

10:00 – 11:15 Welcome and Gartner Opening Keynote: Smart Risk: Balancing Security and Opportunity Paul Proctor, Andrew Walls and Eric Paulak

11:15 – 11:45 Refreshment Break in the Solution Showcase

TRACK A

The CISO and Risk Management Program

TRACK B

Security Technology and Operations

WORKShOPS

Interactive Sessions

ROunDTABleS

Analyst-user Roundtables

11:45 – 12:15 TothePoint:CybersecurityandtheInternetofThings Earl Perkins

TothePoint:WhenWillweReach‘PeakThreat’,andWhat do we do After? Greg Young

11:30 – 12:45 Workshop:LeveragingContent-AwareDLPtoEliminateaSnowdenEventinYourOrganization Eric Ouellet

11:30 – 12:30 Roundtable:PresentingaHardTargettoAttackers—OperationallyEffectiveVulnerabilityManagement Oliver Rochford

12:15 – 13:30 LunchandPrayerTime

13:30 – 14:15 The Gartner Business Risk Model Paul Proctor

Architecting a New Approach for Continous Advanced ThreatProtection Neil MacDonald

13:30 – 14:30 Roundtable:IT,OTandPhysicalSecurity—IsitTimeforIntegration? Earl Perkins

14:30 – 15:00 SolutionProviderSessions 14:15 – 15:45 Workshop:HowtoBuildanEffectiveCybersecurityAwarenessCampaign Andrew Walls

15:15 – 15:45 TothePoint:TheTopRisksforPublicandPrivateCloud Neil MacDonald

TothePoint:WhatdoyouBuyfortheUsersthatHave(Accessto)Everything? Felix Gaehtgens

15:00 – 16:00 Roundtable:CuringDataResidencyHeadachesinBigDataandCloud Eric Ouellet

15:45 – 16:30 RefreshmentBreakintheSolutionShowcaseandPrayerTime 16:00 – 16:20 EnterpriseNetworkFirewallsMagicQuadrants Oliver Rochford

16:30 – 17:30 Guest Keynote

17:30 – 18:30 Networking Reception in the Soution Showcase

08:30 – 17:30 Registration and Information

09:00 – 09:30 TothePoint:MobileSecurityThreatsandTrends in 2014 Dionisio Zumerle

TothePoint:HowWillContentandContextAwarenessChangeYourExistingIAMDeployment? Eric Ouellet

09:00 – 10:30 Workshop:CreatingRiskMetricstoInfluenceBusinessDecisions Paul Proctor

09:45 – 10:15 SolutionProviderSessions

10:15 – 11:00 Refreshment Break in the Solution Showcase 10:30 – 10:50 IdentityGovernanceandAdministrationMagicQuadrants Felix Gaehtgens

11:00 – 11:45 CIOAgenda:AGCCperspective-HowCISO’sNeedtoRespond Ed Gabrys

iPhones,iPads,Androids+SSO,VPN,DLP,SWG=AchievingEnterpriseMobilitySecurely Dionisio Zumerle

10:45 – 11:45 Roundtable:Securing Cloud Computing Neil MacDonald

12:00 – 12:30 Case Study Case Study

12:30 – 13:45 LunchandPrayerTime

13:45 – 14:15 SolutionProviderSessions 13:45 – 15:15 Workshop:Resolved:TheMostEffectiveApproach to Security Monitoring is… Oliver Rochford

14:30 – 15:15 Social Media Risk Management and Compliance Technologies Andrew Walls

Securing Operational Technology: The Next Big EnterpriseChallenge Earl Perkins

15:15 – 16:00 RefreshmentBreakintheSolutionShowcaseandPrayerTime 15:25 – 15:45 MobileDataProtectionMagicQuadrants Dionisio Zumerle

16:00 – 16:30 TothePoint:IdentityIntelligenceorCyberSurveillance? Andrew Walls

TothePoint:TheCyberThreatLandscape Greg Young

16:45 – 17:45 Gartner Closing Keynote: Top Security Trends and Takeaways for 2014 and 2015 Eric Paulak

17:45 Conference Close

Mon

day

15SEPTEMBER2014

Tues

day

16SEPTEMBER2014

TothePoint:CybersecurityandtheInternetofThings Earl Perkins

TothePoint:MobileSecurityThreatsandTrends in 2014 Dionisio Zumerle

Social Media Risk Management and Compliance Technologies Andrew Walls

TothePoint:TheCyberThreatLandscape Greg Young

The Gartner Business Risk Model Paul Proctor

CIOAgenda:AGCCperspective—HowCISO’sNeedto Respond Ed Gabrys

Visit gartner.com/me/security for updates and to register! 5

08:00 – 20:00 Registration and Information

09:00 – 09:30 Tutorial: Introduction to Identity and Access Management Felix Gaehtgens

Tutorial:PreparingforAdvancedThreatsandCyberAttacks Greg Young and Oliver Rochford

09:30 – 10:00 Refreshment Break in the Solution Showcase

10:00 – 11:15 Welcome and Gartner Opening Keynote: Smart Risk: Balancing Security and Opportunity Paul Proctor, Andrew Walls and Eric Paulak

11:15 – 11:45 Refreshment Break in the Solution Showcase

TRACK A

The CISO and Risk Management Program

TRACK B

Security Technology and Operations

WORKShOPS

Interactive Sessions

ROunDTABleS

Analyst-user Roundtables

11:45 – 12:15 TothePoint:CybersecurityandtheInternetofThings Earl Perkins

TothePoint:WhenWillweReach‘PeakThreat’,andWhat do we do After? Greg Young

11:30 – 12:45 Workshop:LeveragingContent-AwareDLPtoEliminateaSnowdenEventinYourOrganization Eric Ouellet

11:30 – 12:30 Roundtable:PresentingaHardTargettoAttackers—OperationallyEffectiveVulnerabilityManagement Oliver Rochford

12:15 – 13:30 LunchandPrayerTime

13:30 – 14:15 The Gartner Business Risk Model Paul Proctor

Architecting a New Approach for Continous Advanced ThreatProtection Neil MacDonald

13:30 – 14:30 Roundtable:IT,OTandPhysicalSecurity—IsitTimeforIntegration? Earl Perkins

14:30 – 15:00 SolutionProviderSessions 14:15 – 15:45 Workshop:HowtoBuildanEffectiveCybersecurityAwarenessCampaign Andrew Walls

15:15 – 15:45 TothePoint:TheTopRisksforPublicandPrivateCloud Neil MacDonald

TothePoint:WhatdoyouBuyfortheUsersthatHave(Accessto)Everything? Felix Gaehtgens

15:00 – 16:00 Roundtable:CuringDataResidencyHeadachesinBigDataandCloud Eric Ouellet

15:45 – 16:30 RefreshmentBreakintheSolutionShowcaseandPrayerTime 16:00 – 16:20 EnterpriseNetworkFirewallsMagicQuadrants Oliver Rochford

16:30 – 17:30 Guest Keynote

17:30 – 18:30 Networking Reception in the Soution Showcase

08:30 – 17:30 Registration and Information

09:00 – 09:30 TothePoint:MobileSecurityThreatsandTrends in 2014 Dionisio Zumerle

TothePoint:HowWillContentandContextAwarenessChangeYourExistingIAMDeployment? Eric Ouellet

09:00 – 10:30 Workshop:CreatingRiskMetricstoInfluenceBusinessDecisions Paul Proctor

09:45 – 10:15 SolutionProviderSessions

10:15 – 11:00 Refreshment Break in the Solution Showcase 10:30 – 10:50 IdentityGovernanceandAdministrationMagicQuadrants Felix Gaehtgens

11:00 – 11:45 CIOAgenda:AGCCperspective-HowCISO’sNeedtoRespond Ed Gabrys

iPhones,iPads,Androids+SSO,VPN,DLP,SWG=AchievingEnterpriseMobilitySecurely Dionisio Zumerle

10:45 – 11:45 Roundtable:Securing Cloud Computing Neil MacDonald

12:00 – 12:30 Case Study Case Study

12:30 – 13:45 LunchandPrayerTime

13:45 – 14:15 SolutionProviderSessions 13:45 – 15:15 Workshop:Resolved:TheMostEffectiveApproach to Security Monitoring is… Oliver Rochford

14:30 – 15:15 Social Media Risk Management and Compliance Technologies Andrew Walls

Securing Operational Technology: The Next Big EnterpriseChallenge Earl Perkins

15:15 – 16:00 RefreshmentBreakintheSolutionShowcaseandPrayerTime 15:25 – 15:45 MobileDataProtectionMagicQuadrants Dionisio Zumerle

16:00 – 16:30 TothePoint:IdentityIntelligenceorCyberSurveillance? Andrew Walls

TothePoint:TheCyberThreatLandscape Greg Young

16:45 – 17:45 Gartner Closing Keynote: Top Security Trends and Takeaways for 2014 and 2015 Eric Paulak

17:45 Conference Close Age

nda

corr

ect a

s of

12

May

201

4. S

essi

ons

sub

ject

to c

hang

e.A

t the

Sum

mit,

ple

ase

refe

r to

the

age

nda

in t

he e

vent

gui

de

pro

vid

ed,

for

the

mos

t up

to d

ate

sess

ion

and

loca

tion

info

rmat

ion.

Conference Chair’s Choice

14:15 – 15:45 Workshop:HowtoBuildanEffectiveCybersecurityAwarenessCampaign Andrew Walls

10:45 – 11:45 Roundtable:Securing Cloud Computing Neil MacDonald

09:00 – 10:30 Workshop:CreatingRiskMetricstoInfluenceBusinessDecisions Paul Proctor

11:30 – 12:30 Roundtable:PresentingaHardTargettoAttackers—OperationallyEffectiveVulnerabilityManagement Oliver Rochford

6 Gartner Security & Risk Management Summit 2014

Meet the analysts

Ed GabrysResearch Director

Felix GaehtgensResearch Director

• ITStrategicPlanning• ITOrganizationalDesign• ITGovernance• InnovationManagement• BusinessValueofIT

• IdentityandAccessManagement• PrivilegedAccessManagement• PasswordManagement• ExternalizedAuthorizationManagement

Paul E. ProctorVPDistinguishedAnalyst

Oliver RochfordResearch Director

• RiskManagement• InformationSecurityProgramManagement• InformationSecurityTechnologyandServices• AuditandCompliance• ITGovernance

• InformationSecurityTechnologyandServices• VulnerabilityManagement• SecurityInformationandEventManagement

Dionisio ZumerlePrincipalResearchAnalyst

• MobileEnterpriseStrategy• SecurityandRiskManagementLeaders• InformationSecurityTechnologyandServices

Eric OuelletResearch VP

Neil MacDonaldVPandGartnerFellow

• InformationSecurityProgramManagement• InformationSecurityTechnologyandServices

• SharePoint• InformationSecurityTechnologyandServices• Virtualization• CloudComputing• DataCenterModernizationandConsolidation

Eric PaulakManaging VP

Earl PerkinsResearch VP

• MobileEnterpriseStrategy• InformationSecurityTechnologyandServices• CommunicationsInfrastructureModernization

• SecurityandRiskManagementLeaders• ITandOperationalTechnologyAlignment• InformationSecurityTechnologyandServices• AuditandCompliance• SmartGrid

Greg YoungResearch VP

Andrew WallsResearch VP

• InformationSecurityTechnologyandServices• NetworkFirewalls• SecurityArchitecture

• InformationSecurityProgramManagement• InformationSecurityTechnologyandServices• Privacy• SecurityandRiskManagementLeaders• BusinessGetsSocial

Gartner Analyst One-on-One MeetingsGartnerEventsgiveyoumorethanwhatyournormalindustryeventoffers.Meetingface-to-face with a Gartner analyst is one of the key benefits of attending a Gartner Summit. Personalizeyour30minuteprivateappointmenttodiscussyourspecificissueandwalk away with invaluable, tailor-made advice that you can apply to your role and your organizationstraightaway.

Summit features

end-user case studiesGartner-invitedend-usersrevealtheirpersonalchallenges,issuesandlessonslearned.

Track sessionsPresentedbyGartneranalysts,invitedguestspeakersandindustrypresenters,thesesessionsfocusontheissuesthatmattermosttoyouandprovidereal-worldinformationthatwillhelpyoumakebetterdecisionsanddrivesuccessfulresults.

“To the Point” sessionsSometimesyoujustwanttohearthe“Top5ThingsYouWanttoKnow”aboutatrend,atechnologyoranapproach.Gartneranalystsprovidetopconcepts,keytrendsoraquickoverviewofaparticulartopic,inacondensedformat.

WorkshopsPresentedbyGartnerorguestexperts,theseworkshopsprovideanopportunitytodrilldownonspecific“howto”topicsinanextended,smallgroupsession.Thecoursesaredesignedforanintimateandinteractivelearningexperience.Reservedforend-usersonly.

Analyst-user roundtablesJoinusforahostedpeergroupdiscussionwithyourend-userpeers,alongwithaGartneranalystlendinghisorherexpertisetoassistyou.Theseshouldnotbemissed!

Tutorial sessionsThesepresentationsarefocusedonlayeringthefoundationsforattendees’understandingofatopic,trendortechnologywithbasic101“buildingblock”definitionsandanalysis.

Visit gartner.com/me/security for updates and to register! 7

Solution showcaseDevelopa“shortlist”oftechnologyproviderswhocanmeetyourparticularneeds.Weofferyouexclusiveaccesstosomeoftheworld’sleading technology and service solution providers in a variety of settings.

Sponsorship opportunitiesFor further information about sponsoring this event contact:

MUDASSIR EHSANTelephone: +971 43913204email: [email protected]

NASAR BUTTTelephone: +44 7540920980email: [email protected]

Premier sponsor Platinum sponsor Silver sponsor

Powerful tools to navigate manage and decideTo get the most out of your Summit experience, we’ve created a range of tools to help you manage your goals and objectives of attending.

Gartner events navigatorWe’re excited to introduce a new and enhanced agenda planning tool which replaces our previous Agenda Builder tool. GartnerEventsNavigatorallowsyoutoplanyourpersonaleventexperienceandgainthemostfromyourtimeon-site.Organize,viewandcustomizeyouragendausingthefollowingcriteria:

• Gartneranalystandspeakerprofiles

•GartnerAnalystOne-on-OneMeetings

• Sessiondetailsincludingtracks,date,time,etc.

• YourGartnerAnalyst-UserRoundtableorworkshopreservations

• Dailyactivitiesandnetworking

Gartner events navigator Mobile AppManage your agenda on your mobile device!

•Getup-to-the-minuteeventupdates

• Integratesocialmediaintoyoureventexperience

• Accesssessiondocumentsandaddyournotes

• AvailableforiPhone®,iPad® and Android™

event Approval ToolsForusepre-event,on-siteandpost-event,ourEventApprovalToolsmake it easy to demonstrate the substantial value of your Gartner eventexperiencetoyourmanager.Theyincludeacustomizableletter,cost-benefi t analysis, top reasons to attend and more.

Visit gartner.com/me/security for details.

Build your agenda

“ There are a lot of interesting topics that can contribute to your way of thinking.”

DUBAI CUSTOMS

Save $300 whenyouregisterby18July2014.

early-bird discount

©2014Gartner,Inc.and/oritsaffiliates.Allrightsreserved.GartnerisaregisteredtrademarkofGartner,Inc.oritsaffiliates.Formoreinformation,[email protected].

Gartner Security & Risk Management Summit 201415 – 16 September | Raffles hotel, Dubai, uAegartner.com/me/security

3 easy ways to register

Web: gartner.com/me/security

email: [email protected]

Telephone: +442088792430

Pricing Pricing and Date is subject to change

early-bird price: $2,150 (offer ends 18 July 2014)

Standard Price: $2,450

Public Sector Price: $2,050

Gartner clients A Gartner ticket covers both days of the Summit. Contact your account manager or email [email protected] to register using a ticket.

Team attendance

Attend with your team — discounts availableGartnerEventshasdesignedanexperiencethatwillhelpteamsof4to25maximizetheirSummitexperiencewhileon-siteandlongaftertheeventconcludes.

Summit team discount offers:

• 4forthepriceof3

• 7forthepriceof5

• 10forthepriceof7

Formoreinformationaboutteamattendancevisitgartner.com/me/security