• No results found

Gartner Security & Risk Management Summit 2015

N/A
N/A
Protected

Academic year: 2021

Share "Gartner Security & Risk Management Summit 2015"

Copied!
8
0
0

Loading.... (view fulltext now)

Full text

(1)

EARLY-BIRD

DIscount

save $300 by

4 september

Gartner

Security &

Risk Management

Summit 2015

2 – 3 November | Raffles Hotel, Dubai, UAE | gartner.com/me/security

Hot Topics

• Application, network and mobile security

• Security for and in the cloud

• Cyber security

• Digital business security and risk management

• Operational technology security and risk management

• Planning for The Internet of Things security

Manage Risk and Deliver Security in a Digital World

(2)

Manage Risk and Deliver

Security in a Digital World

Greg Young

Research VP and Summit Chair,

Gartner

Craft Your Strategy for Business Resiliency

Get the tools you need to deliver secure digital business

environments and ensure your organization can weather

an attack or disruption and bounce back quickly at

Gartner Security & Risk Management Summit 2015,

2 – 3 November, Dubai, UAE. This year’s Summit covers

the breadth of priorities in IT security, risk management,

governance, the role of the CISO, the business of security,

IAM and more.

Join us this November to fi nd out how you can advance your

security and risk management goals to support business

objectives and improve resilience across the organization.

Gain tools and strategies to stay ahead of your new responsibilities and increasing threats: • Align security and risk strategies with your enterprise objectives and digital transformation • Apply the latest techniques to tackle risks in cloud, OT and IoT • Build a culture that drives security performance through employee engagement

Key Benefi ts of Attending

GarTNEr PrEDIcTs:

By 2017, 30% of threat intelligence

services will include vertical-market

security intelligence information

from the Internet of Things.

(3)

Program Tracks

A.

Security Technology

The potential positive business impact of cloud, social, mobility and big

data brings undeniable opportunities for success but also challenges

traditional approaches to information security to evolve at business speed.

As organizations accelerate their adoption of these new platforms, bad

ators develop methods to exploit these emerging platforms. Your security

program must rapidly mature in the breadth and effectiveness of techniques

and technologies you use to maintain appropriate levels of security for

applications, data and infrastructure regardless of location.

B.

CISO and Risk Management

CISO’s must fi nd and maintain a tricky balance between protection

and productivity. The challenge is exacerbated by ongoing volatility in

enterprises’ business, technology and threat environments. The CISO & Risk

Management program explores the key capabilities, strategies and tactics

that are essential for the contemporary security leader.

Virtual tracks

Identity and Access Management

As business and institutions mature, they must manage volatile and rapid

change, establish effective formal governance, and provide accountability

through transparency. IAM can enable these evolutionary steps, but must

itself evolve. The IAM track features a wealth of presentations on current best

practices and the latest issues and trends.

Mobile Security

Mobile devices present a host of new security issues, with the BYOD

phenomenon presenting the greatest challenge. IT organizations must adapt

to this rapidly changing environment and implement new policies and new

technologies to mitigate the risks of the mobile workplace. This track will help

you navigate the mobile environment over a three-year horizon.

Cloud Security

As organizations explore the benefi ts of cloud computing, security

professionals must be prepared to highlight the risks and the costs of

mitigating these risks. This track will show you how.

Internet of Things

The Internet of Things (IoT) has arrived. But as innovation and complexity

expand, risk grows and threats expand with them. Securing the IoT is critical.

This track will show you how.

4 Agenda at a glance 6 Meet the analysts 7 Solution Showcase 8 Registration and pricing

Table of Contents

• CIOs, CSOs, CISOs, CROs, CPOs and their teams • CISOs, CTOs, IT security managers, IT security directors, IT security offi cers • Business continuity and IT disaster recovery managers • Enterprise architects and planners • Tech professionals • Network security manager, executives and directors • Governance, risk and compliance consultants • Finance, audit, legal risk and compliance managers • Researchers, investors

(4)

Agenda at a Glance

07:45 – 17:15 Registration and Information

08:30 – 09:00 Tutorial: Next Generation Firewalls vs UTM Rajpreet Kaur Tutorial: Foundations of Identity and Access Management Felix Gaehtgens

09:15 – 10:15 Summit Opening and Gartner Opening Keynote: Manage Risk and Deliver Security in a Digital World Dionisio Zumerle, Peter Firstbrook and Brian Reed

10:15 – 11:00 Refreshment Break in the Solution Showcase

Tracks

a. security Technology

B. cIsO and risk Management

Workshops

roundtables

11:00 – 11:30 Protecting Mobile Apps Dionisio Zumerle Best Practices in Crisis Communications Roberta Witty

11:45 – 12:15 Solution Provider Sessions 11:45 – 13:00 Workshop:

Defending Against Sophisticated Malware Mario de Boer

11:45 – 12:45 Roundtable:

Endpoint Security Roundtable Peter Firstbrook

12:15 – 13:30 Lunch in the Solution Showcase and Prayer Time

13:30 – 14:15 Regaining Control Visibility and Trust When You No Longer Control the Infrastructure Peter Firstbrook

The Next Three Years in Threats Greg Young

13:30 – 14:30 Roundtable:

Mobile Security and BYOD in the Enterprise Dionisio Zumerle

14:30 – 15:00 Solution Provider Sessions 14:15 – 15:45 Workshop: Selecting the Right Mix of Security Controls to Mitigate Mobility Risk Mario de Boer 15:15 – 15:45 Future Proofing IAM Felix Gaehtgens Bits, Bytes and Balanced Scorecards — A Practical View of Security Metrics Jeffrey Wheatman

15:00 – 16:00 Roundtable: Business Continuity and Disaster Recovery Roberta Witty 15:45 – 16:30 Refreshment Break and Prayer Time 15:50 – 16:20 Solution Provider Sessions 16:30 – 17:15 Guest Keynote 08:00 – 17:30 Registration and Information 08:00 – 09:00 Networking and Refreshment Break in the Solution Showcase 09:00 – 09:30 Securing the Next Generation Data Center With Software-Defined Security neil MacDonald

How to Get to Single Sign On Felix Gaehtgens 09:00 – 10:30 Workshop: Information Security Metrics Workshop — Building From the Business Down Jeffrey Wheatman 09:45 – 10:15 Solution Provider Sessions 10:15 – 11:00 Refreshment Break in the Solution Showcase 10:20 – 10:50 Solution Provider Sessions 10:45 – 11:45 Roundtable: DLP: Best Practices Brian Reed 11:00 – 11:45 Mobile Security Threats and Trends 2015 Dionisio Zumerle IT Supply Chain Integrity: Living in a World Without Trust neil MacDonald 12:00 – 12:30 Solution Provider Sessions 12:30 – 13:45 Lunch in the Solution Showcase and Prayer Time 13:45 – 14:15 Case Study: Integrating ICS With the IT Network: Need and Security Controls Mohit saraswat, senior It Infrastructure Project Manager, Dubai Refreshment PJsc

Case Study 13:45 – 15:15 Workshop: DLP: What Works, What Doesn’t Brian Reed 14:30 – 15:15 Defending Endpoints From Persistent Attack Peter Firstbrook Top Trends in Corporate Compliance and Oversight Jeffrey Wheatman

15:15 – 16:00 Refreshment Break and Prayer Time

16:00 – 16:30 Overcoming Five Key Obstacles to Success in Content-Aware DLP Deployments Brian Reed

Why Crisis Management is the Heart of BCM Software Roberta Witty

Monday

2 November 2015

Tuesday

3 November 2015

(5)

07:45 – 17:15 Registration and Information

08:30 – 09:00 Tutorial: Next Generation Firewalls vs UTM Rajpreet Kaur Tutorial: Foundations of Identity and Access Management Felix Gaehtgens

09:15 – 10:15 Summit Opening and Gartner Opening Keynote: Manage Risk and Deliver Security in a Digital World Dionisio Zumerle, Peter Firstbrook and Brian Reed

10:15 – 11:00 Refreshment Break in the Solution Showcase

Tracks

a. security Technology

B. cIsO and risk Management

Workshops

roundtables

11:00 – 11:30 Protecting Mobile Apps Dionisio Zumerle Best Practices in Crisis Communications Roberta Witty

11:45 – 12:15 Solution Provider Sessions 11:45 – 13:00 Workshop:

Defending Against Sophisticated Malware Mario de Boer

11:45 – 12:45 Roundtable:

Endpoint Security Roundtable Peter Firstbrook

12:15 – 13:30 Lunch in the Solution Showcase and Prayer Time

13:30 – 14:15 Regaining Control Visibility and Trust When You No Longer Control the Infrastructure Peter Firstbrook

The Next Three Years in Threats Greg Young

13:30 – 14:30 Roundtable:

Mobile Security and BYOD in the Enterprise Dionisio Zumerle

14:30 – 15:00 Solution Provider Sessions 14:15 – 15:45 Workshop: Selecting the Right Mix of Security Controls to Mitigate Mobility Risk Mario de Boer 15:15 – 15:45 Future Proofi ng IAM Felix Gaehtgens Bits, Bytes and Balanced Scorecards — A Practical View of Security Metrics Jeffrey Wheatman

15:00 – 16:00 Roundtable: Business Continuity and Disaster Recovery Roberta Witty 15:45 – 16:30 Refreshment Break and Prayer Time 15:50 – 16:20 Solution Provider Sessions 16:30 – 17:15 Guest Keynote 08:00 – 17:30 Registration and Information 08:00 – 09:00 Networking and Refreshment Break in the Solution Showcase 09:00 – 09:30 Securing the Next Generation Data Center With Software-Defi ned Security neil MacDonald

How to Get to Single Sign On Felix Gaehtgens 09:00 – 10:30 Workshop: Information Security Metrics Workshop — Building From the Business Down Jeffrey Wheatman 09:45 – 10:15 Solution Provider Sessions 10:15 – 11:00 Refreshment Break in the Solution Showcase 10:20 – 10:50 Solution Provider Sessions 10:45 – 11:45 Roundtable: DLP: Best Practices Brian Reed 11:00 – 11:45 Mobile Security Threats and Trends 2015 Dionisio Zumerle IT Supply Chain Integrity: Living in a World Without Trust neil MacDonald 12:00 – 12:30 Solution Provider Sessions 12:30 – 13:45 Lunch in the Solution Showcase and Prayer Time 13:45 – 14:15 Case Study: Integrating ICS With the IT Network: Need and Security Controls Mohit saraswat, senior It Infrastructure Project Manager, Dubai Refreshment PJsc

Case Study 13:45 – 15:15 Workshop: DLP: What Works, What Doesn’t Brian Reed 14:30 – 15:15 Defending Endpoints From Persistent Attack Peter Firstbrook Top Trends in Corporate Compliance and Oversight Jeffrey Wheatman

15:15 – 16:00 Refreshment Break and Prayer Time

16:00 – 16:30 Overcoming Five Key Obstacles to Success in Content-Aware DLP Deployments Brian Reed

Why Crisis Management is the Heart of BCM Software Roberta Witty

Agenda as of 31 July 2015, and subject to change

When attending this event, please refer to the agenda handout provided or the Gartner Events mobile app for the most up to date session and location information.

(6)

Meet the Analysts

Mario de Boer

Research VP

rajpreet kaur

Senior Research

Analyst

Jeffrey Wheatman

Research Director

Peter Firstbrook

Research VP

Neil MacDonald

VP Distinguished

Analyst

roberta Witty

Research VP

Greg Young

Research VP

Felix Gaehtgens

Research Director

Brian reed

Research Director

Dionisio Zumerle

Research Director

Engage with our team of Gartner analysts through track presentations, a complimentary one-on-one meeting, analyst-facilitated workshops, roundtables and more. Below they are listed with the top issues they help clients address:

• Protecting endpoints against malware

• Protecting the confi dentiality of data on endpoints through encryption or rights management • Safeguarding the confi dentiality of emails • Enabling secure collaboration

• Firewall vendor selection • NGFW and UTM selection • IPS vendor selection

• Advanced threat detection (APT) technology and vendor selection

• Web application fi rewall selection

• Building a security program from scratch • Leveraging GRC investments to support business

goals and objectives

• Security and risk metrics and reporting • Build, improve, mature and leverage processes for

security and risk management

• How do we reduce the number of endpoint infections?

• How do we evaluate the different endpoint protection platforms?

• How do we control and monitor web traffi c across all devices and offi ces?

• What are the trends in email security?

• Should we move email hygiene to a cloud provider?

• Securing next-generation virtualized data centres and workloads

• Securing cloud-based infrastructure-as-a-service deployments

• Successfully removing administrative rights from Windows users

• Endpoint protection strategies and contract reviews • How to secure SharePoint in extranet scenarios

• Develop and manage business continuity management programs

• Business value of BCM to management • How to execute BCM programs

• Create and manage BCM plans that actually work • Technologies organizations should use to manage

their BCM programs

• Network security decisions • Network security of virtualization • Stopping network threats • Securing data canters • DMZ design

• Identity and access management planning, implementation, operations

• Identity governance and administration (IGA) • Privileged access management (PAM) • Enterprise directories, virtual directories • Externalized authorization management

• Selection of data loss prevention (DLP) technologies • DLP deployment strategies

• Mobile data security concerns

• Data Discovery and Classifi cation initiatives • Cloud security

• Securing mobile devices • Securing mobile applications • Securing BYOD

• Protecting enterprise data on mobile and wireless networks

• Enterprise mobility management (EMM) security

Our community of more than 1,000 analysts engaged in over 215,000 one-to-one

client interactions in the past year. Benefi t from the collective wisdom of the

(7)

Solution Showcase

Premier Sponsors

Platinum Sponsors

Silver Sponsors

Sponsorship Opportunities

Explore cutting-edge IT solutions from top providers; plus, participate in solution provider sessions, networking reception and more. For further information about sponsoring this event: Mudassir Ehsan Telephone: +971 43 913204 Email: mudassir.ehsan@gartner.com Nasar Butt Telephone: +971 52 8350421 Email: nasar.butt@gartner.com

(8)

2 – 3 November | Raffl es Hotel, Dubai, UAE | gartner.com/me/security

Gartner

Security &

Risk Management

Summit 2015

Gartner Security & Risk Management Summit

8 – 11 June | National Harbor, MD

Gartner Security & Risk Management Summit

13 – 15 July | Tokyo, Japan

Gartner Security & Risk Management Summit

10 – 11 August | Sao Paulo, Brazil

Gartner Security & Risk Management Summit

24 – 25 August | Sydney, Australia

Gartner Security & Risk Management Summit

14 – 15 September | London, U.K.

Gartner Identity & Access Management Summit 7 – 9 December | Las Vegas, NV

Gartner Security Summits Around the Globe

Join the conversation!

United Kingdom 14 – 15 September United States 7 – 9 December United States 8 – 11 June Brazil 10 – 11 August Dubai 2 – 3 November Australia 24 – 25 August Japan 13 – 15 July

3 Ways to Register

Web: gartner.com/me/security

Email: emea.registration@gartner.com

Telephone: +44 20 8879 2430

Save $300

early-bird Price: $2,225

(offer ends 4 September 2015)

Standard Price: $2,525

Public Sector Price: $2,125

Gartner Clients

A Gartner ticket covers both days of the summit. contact your account manager or email emea.events@gartner.com to register using a ticket.

References

Related documents

Cochrane group of 15 randomized trials with 1714 pa- tients (including patients with alcoholic fibrosis, alcoholic hepatitis, and/or alcoholic cirrhosis as well as patients with

Therefore, this study focused on the direct effect of social wellness integration strategies that were integrated into fifth grade science lesson plans within a general

The analysis concludes that there is no evidence that reported county-level infection rates affected HDZ support or turnout.. However, results using this approach may be affected

Cybersecurity is a key area of risk management for businesses and organizations, and has been demonstrated to affect information systems early in the life cycle

The construction of medical information is important to improve the hospital medical care capability, the management decision-making level of health and the hospital

asluubta/xabsiga ee sharci ahaan adiga ku haya si hay’addu kuu siiso daryeelka caafimaadka, si loo badbaadiyo ammaankaada iyo caafimaadkaada ama ammaanka iyo caafimaadka dadka

temperature data, the magnitude of the urban heat island effect can be estimated as a proxy for the amount of vegetation in the metro area to evaluate the effectiveness

For the Master Policyholder: Within 15 days [thirty (30) days in case this Plan is issued under the provisions of IRDA Guidelines on Distanc e Marketing of