EARLY-BIRD
DIscount
save $300 by
4 september
Gartner
Security &
Risk Management
Summit 2015
2 – 3 November | Raffles Hotel, Dubai, UAE | gartner.com/me/security
Hot Topics
• Application, network and mobile security
• Security for and in the cloud
• Cyber security
• Digital business security and risk management
• Operational technology security and risk management
• Planning for The Internet of Things security
Manage Risk and Deliver Security in a Digital World
Manage Risk and Deliver
Security in a Digital World
Greg Young
Research VP and Summit Chair,
Gartner
Craft Your Strategy for Business Resiliency
Get the tools you need to deliver secure digital business
environments and ensure your organization can weather
an attack or disruption and bounce back quickly at
Gartner Security & Risk Management Summit 2015,
2 – 3 November, Dubai, UAE. This year’s Summit covers
the breadth of priorities in IT security, risk management,
governance, the role of the CISO, the business of security,
IAM and more.
Join us this November to fi nd out how you can advance your
security and risk management goals to support business
objectives and improve resilience across the organization.
Gain tools and strategies to stay ahead of your new responsibilities and increasing threats: • Align security and risk strategies with your enterprise objectives and digital transformation • Apply the latest techniques to tackle risks in cloud, OT and IoT • Build a culture that drives security performance through employee engagementKey Benefi ts of Attending
GarTNEr PrEDIcTs:
By 2017, 30% of threat intelligence
services will include vertical-market
security intelligence information
from the Internet of Things.
Program Tracks
A.
Security Technology
The potential positive business impact of cloud, social, mobility and big
data brings undeniable opportunities for success but also challenges
traditional approaches to information security to evolve at business speed.
As organizations accelerate their adoption of these new platforms, bad
ators develop methods to exploit these emerging platforms. Your security
program must rapidly mature in the breadth and effectiveness of techniques
and technologies you use to maintain appropriate levels of security for
applications, data and infrastructure regardless of location.
B.
CISO and Risk Management
CISO’s must fi nd and maintain a tricky balance between protection
and productivity. The challenge is exacerbated by ongoing volatility in
enterprises’ business, technology and threat environments. The CISO & Risk
Management program explores the key capabilities, strategies and tactics
that are essential for the contemporary security leader.
Virtual tracks
Identity and Access Management
As business and institutions mature, they must manage volatile and rapid
change, establish effective formal governance, and provide accountability
through transparency. IAM can enable these evolutionary steps, but must
itself evolve. The IAM track features a wealth of presentations on current best
practices and the latest issues and trends.
Mobile Security
Mobile devices present a host of new security issues, with the BYOD
phenomenon presenting the greatest challenge. IT organizations must adapt
to this rapidly changing environment and implement new policies and new
technologies to mitigate the risks of the mobile workplace. This track will help
you navigate the mobile environment over a three-year horizon.
Cloud Security
As organizations explore the benefi ts of cloud computing, security
professionals must be prepared to highlight the risks and the costs of
mitigating these risks. This track will show you how.
Internet of Things
The Internet of Things (IoT) has arrived. But as innovation and complexity
expand, risk grows and threats expand with them. Securing the IoT is critical.
This track will show you how.
4 Agenda at a glance 6 Meet the analysts 7 Solution Showcase 8 Registration and pricingTable of Contents
• CIOs, CSOs, CISOs, CROs, CPOs and their teams • CISOs, CTOs, IT security managers, IT security directors, IT security offi cers • Business continuity and IT disaster recovery managers • Enterprise architects and planners • Tech professionals • Network security manager, executives and directors • Governance, risk and compliance consultants • Finance, audit, legal risk and compliance managers • Researchers, investorsAgenda at a Glance
07:45 – 17:15 Registration and Information
08:30 – 09:00 Tutorial: Next Generation Firewalls vs UTM Rajpreet Kaur Tutorial: Foundations of Identity and Access Management Felix Gaehtgens
09:15 – 10:15 Summit Opening and Gartner Opening Keynote: Manage Risk and Deliver Security in a Digital World Dionisio Zumerle, Peter Firstbrook and Brian Reed
10:15 – 11:00 Refreshment Break in the Solution Showcase
Tracks
a. security Technology
B. cIsO and risk Management
Workshops
roundtables
11:00 – 11:30 Protecting Mobile Apps Dionisio Zumerle Best Practices in Crisis Communications Roberta Witty
11:45 – 12:15 Solution Provider Sessions 11:45 – 13:00 Workshop:
Defending Against Sophisticated Malware Mario de Boer
11:45 – 12:45 Roundtable:
Endpoint Security Roundtable Peter Firstbrook
12:15 – 13:30 Lunch in the Solution Showcase and Prayer Time
13:30 – 14:15 Regaining Control Visibility and Trust When You No Longer Control the Infrastructure Peter Firstbrook
The Next Three Years in Threats Greg Young
13:30 – 14:30 Roundtable:
Mobile Security and BYOD in the Enterprise Dionisio Zumerle
14:30 – 15:00 Solution Provider Sessions 14:15 – 15:45 Workshop: Selecting the Right Mix of Security Controls to Mitigate Mobility Risk Mario de Boer 15:15 – 15:45 Future Proofing IAM Felix Gaehtgens Bits, Bytes and Balanced Scorecards — A Practical View of Security Metrics Jeffrey Wheatman
15:00 – 16:00 Roundtable: Business Continuity and Disaster Recovery Roberta Witty 15:45 – 16:30 Refreshment Break and Prayer Time 15:50 – 16:20 Solution Provider Sessions 16:30 – 17:15 Guest Keynote 08:00 – 17:30 Registration and Information 08:00 – 09:00 Networking and Refreshment Break in the Solution Showcase 09:00 – 09:30 Securing the Next Generation Data Center With Software-Defined Security neil MacDonald
How to Get to Single Sign On Felix Gaehtgens 09:00 – 10:30 Workshop: Information Security Metrics Workshop — Building From the Business Down Jeffrey Wheatman 09:45 – 10:15 Solution Provider Sessions 10:15 – 11:00 Refreshment Break in the Solution Showcase 10:20 – 10:50 Solution Provider Sessions 10:45 – 11:45 Roundtable: DLP: Best Practices Brian Reed 11:00 – 11:45 Mobile Security Threats and Trends 2015 Dionisio Zumerle IT Supply Chain Integrity: Living in a World Without Trust neil MacDonald 12:00 – 12:30 Solution Provider Sessions 12:30 – 13:45 Lunch in the Solution Showcase and Prayer Time 13:45 – 14:15 Case Study: Integrating ICS With the IT Network: Need and Security Controls Mohit saraswat, senior It Infrastructure Project Manager, Dubai Refreshment PJsc
Case Study 13:45 – 15:15 Workshop: DLP: What Works, What Doesn’t Brian Reed 14:30 – 15:15 Defending Endpoints From Persistent Attack Peter Firstbrook Top Trends in Corporate Compliance and Oversight Jeffrey Wheatman
15:15 – 16:00 Refreshment Break and Prayer Time
16:00 – 16:30 Overcoming Five Key Obstacles to Success in Content-Aware DLP Deployments Brian Reed
Why Crisis Management is the Heart of BCM Software Roberta Witty
Monday
2 November 2015Tuesday
3 November 201507:45 – 17:15 Registration and Information
08:30 – 09:00 Tutorial: Next Generation Firewalls vs UTM Rajpreet Kaur Tutorial: Foundations of Identity and Access Management Felix Gaehtgens
09:15 – 10:15 Summit Opening and Gartner Opening Keynote: Manage Risk and Deliver Security in a Digital World Dionisio Zumerle, Peter Firstbrook and Brian Reed
10:15 – 11:00 Refreshment Break in the Solution Showcase
Tracks
a. security Technology
B. cIsO and risk Management
Workshops
roundtables
11:00 – 11:30 Protecting Mobile Apps Dionisio Zumerle Best Practices in Crisis Communications Roberta Witty
11:45 – 12:15 Solution Provider Sessions 11:45 – 13:00 Workshop:
Defending Against Sophisticated Malware Mario de Boer
11:45 – 12:45 Roundtable:
Endpoint Security Roundtable Peter Firstbrook
12:15 – 13:30 Lunch in the Solution Showcase and Prayer Time
13:30 – 14:15 Regaining Control Visibility and Trust When You No Longer Control the Infrastructure Peter Firstbrook
The Next Three Years in Threats Greg Young
13:30 – 14:30 Roundtable:
Mobile Security and BYOD in the Enterprise Dionisio Zumerle
14:30 – 15:00 Solution Provider Sessions 14:15 – 15:45 Workshop: Selecting the Right Mix of Security Controls to Mitigate Mobility Risk Mario de Boer 15:15 – 15:45 Future Proofi ng IAM Felix Gaehtgens Bits, Bytes and Balanced Scorecards — A Practical View of Security Metrics Jeffrey Wheatman
15:00 – 16:00 Roundtable: Business Continuity and Disaster Recovery Roberta Witty 15:45 – 16:30 Refreshment Break and Prayer Time 15:50 – 16:20 Solution Provider Sessions 16:30 – 17:15 Guest Keynote 08:00 – 17:30 Registration and Information 08:00 – 09:00 Networking and Refreshment Break in the Solution Showcase 09:00 – 09:30 Securing the Next Generation Data Center With Software-Defi ned Security neil MacDonald
How to Get to Single Sign On Felix Gaehtgens 09:00 – 10:30 Workshop: Information Security Metrics Workshop — Building From the Business Down Jeffrey Wheatman 09:45 – 10:15 Solution Provider Sessions 10:15 – 11:00 Refreshment Break in the Solution Showcase 10:20 – 10:50 Solution Provider Sessions 10:45 – 11:45 Roundtable: DLP: Best Practices Brian Reed 11:00 – 11:45 Mobile Security Threats and Trends 2015 Dionisio Zumerle IT Supply Chain Integrity: Living in a World Without Trust neil MacDonald 12:00 – 12:30 Solution Provider Sessions 12:30 – 13:45 Lunch in the Solution Showcase and Prayer Time 13:45 – 14:15 Case Study: Integrating ICS With the IT Network: Need and Security Controls Mohit saraswat, senior It Infrastructure Project Manager, Dubai Refreshment PJsc
Case Study 13:45 – 15:15 Workshop: DLP: What Works, What Doesn’t Brian Reed 14:30 – 15:15 Defending Endpoints From Persistent Attack Peter Firstbrook Top Trends in Corporate Compliance and Oversight Jeffrey Wheatman
15:15 – 16:00 Refreshment Break and Prayer Time
16:00 – 16:30 Overcoming Five Key Obstacles to Success in Content-Aware DLP Deployments Brian Reed
Why Crisis Management is the Heart of BCM Software Roberta Witty
Agenda as of 31 July 2015, and subject to change
When attending this event, please refer to the agenda handout provided or the Gartner Events mobile app for the most up to date session and location information.
Meet the Analysts
Mario de Boer
Research VP
rajpreet kaur
Senior Research
Analyst
Jeffrey Wheatman
Research Director
Peter Firstbrook
Research VP
Neil MacDonald
VP Distinguished
Analyst
roberta Witty
Research VP
Greg Young
Research VP
Felix Gaehtgens
Research Director
Brian reed
Research Director
Dionisio Zumerle
Research Director
Engage with our team of Gartner analysts through track presentations, a complimentary one-on-one meeting, analyst-facilitated workshops, roundtables and more. Below they are listed with the top issues they help clients address:• Protecting endpoints against malware
• Protecting the confi dentiality of data on endpoints through encryption or rights management • Safeguarding the confi dentiality of emails • Enabling secure collaboration
• Firewall vendor selection • NGFW and UTM selection • IPS vendor selection
• Advanced threat detection (APT) technology and vendor selection
• Web application fi rewall selection
• Building a security program from scratch • Leveraging GRC investments to support business
goals and objectives
• Security and risk metrics and reporting • Build, improve, mature and leverage processes for
security and risk management
• How do we reduce the number of endpoint infections?
• How do we evaluate the different endpoint protection platforms?
• How do we control and monitor web traffi c across all devices and offi ces?
• What are the trends in email security?
• Should we move email hygiene to a cloud provider?
• Securing next-generation virtualized data centres and workloads
• Securing cloud-based infrastructure-as-a-service deployments
• Successfully removing administrative rights from Windows users
• Endpoint protection strategies and contract reviews • How to secure SharePoint in extranet scenarios
• Develop and manage business continuity management programs
• Business value of BCM to management • How to execute BCM programs
• Create and manage BCM plans that actually work • Technologies organizations should use to manage
their BCM programs
• Network security decisions • Network security of virtualization • Stopping network threats • Securing data canters • DMZ design
• Identity and access management planning, implementation, operations
• Identity governance and administration (IGA) • Privileged access management (PAM) • Enterprise directories, virtual directories • Externalized authorization management
• Selection of data loss prevention (DLP) technologies • DLP deployment strategies
• Mobile data security concerns
• Data Discovery and Classifi cation initiatives • Cloud security
• Securing mobile devices • Securing mobile applications • Securing BYOD
• Protecting enterprise data on mobile and wireless networks
• Enterprise mobility management (EMM) security
Our community of more than 1,000 analysts engaged in over 215,000 one-to-one
client interactions in the past year. Benefi t from the collective wisdom of the
Solution Showcase
Premier Sponsors
Platinum Sponsors
Silver Sponsors
Sponsorship Opportunities
Explore cutting-edge IT solutions from top providers; plus, participate in solution provider sessions, networking reception and more. For further information about sponsoring this event: Mudassir Ehsan Telephone: +971 43 913204 Email: mudassir.ehsan@gartner.com Nasar Butt Telephone: +971 52 8350421 Email: nasar.butt@gartner.com2 – 3 November | Raffl es Hotel, Dubai, UAE | gartner.com/me/security
Gartner
Security &
Risk Management
Summit 2015
Gartner Security & Risk Management Summit
8 – 11 June | National Harbor, MD
Gartner Security & Risk Management Summit
13 – 15 July | Tokyo, Japan
Gartner Security & Risk Management Summit
10 – 11 August | Sao Paulo, Brazil
Gartner Security & Risk Management Summit
24 – 25 August | Sydney, Australia
Gartner Security & Risk Management Summit
14 – 15 September | London, U.K.
Gartner Identity & Access Management Summit 7 – 9 December | Las Vegas, NV
Gartner Security Summits Around the Globe
Join the conversation!
United Kingdom 14 – 15 September United States 7 – 9 December United States 8 – 11 June Brazil 10 – 11 August Dubai 2 – 3 November Australia 24 – 25 August Japan 13 – 15 July3 Ways to Register
Web: gartner.com/me/security
Email: emea.registration@gartner.com
Telephone: +44 20 8879 2430
Save $300
early-bird Price: $2,225
(offer ends 4 September 2015)
Standard Price: $2,525
Public Sector Price: $2,125
Gartner Clients
A Gartner ticket covers both days of the summit. contact your account manager or email emea.events@gartner.com to register using a ticket.