Cybersecurity Conferences

Accelerating the Evolution of Security: Reframe and Simplify

Recent global events have shown that innovation is essential for enterprises to survive and flourish. But accelerating digital innovation brings new complexity and risk.

As a cybersecurity professional, you can enable your enterprise to embrace the technologies of tomorrow, today — and do it in the safest possible manner. You can help your colleagues understand the risks inherent in digital initiatives so that they can realize the benefits of technology innovation securely. And you play a key role in making sure that security resilience is built-in from the start. 

At Gartner cybersecurity conferences, you’ll find objective insights, strategic advice and practical tools to help you manage your most critical IT security and risk priorities:

  • Secure your organization and identify vulnerabilities
  • Adopt a modern security perspective, transform security into a business function and enable business growth
  • Understand and evaluate emerging technology business impacts and cybersecurity risk
  • Foster a proactive culture by moving from threat-responsive to monitoring and detecting

Join us to hear from independent experts on what matters most now and how to prepare for a new, dynamic business environment:

Gartner Security & Risk Management Summit

27 – 28 February 2023 | Dubai, UAE
28 – 29 March 2023 | Sydney, Australia
5 – 7 June 2023 | National Harbor, MD
26 – 28 July 2023 | Tokyo, Japan
26 – 28 September 2023 | London, U.K.
26 – 27 February 2024 | Mumbai, India

Gartner Security & Risk Management Summit 2023

Objective, expert insights on cybersecurity, cloud security, privacy, risk management & advanced threat detection
What will be covered in 2023?

Discover what matters most now and how to prepare for what’s ahead. Explore the types of tracks you can expect at the 2023 conference:

A: Cybersecurity Leadership
B: Infrastructure Security
C: Application and Data Security
D: Cyberthreat: Mitigation, Preparedness and Exposure Management
E: Cyber and IT Risk
F: Competitive Security Market Dynamics for Product Leaders
G: CISO Circle
H: Technical Insights for Security Practitioners

Spotlight Tracks: 

  • Midsize Enterprise
  • Diversity, Equity and Inclusion
  • Identity & Access Management
Who should attend

Attendees will explore how to plot their next move and build resilience. Attendees included:

CISOs and security professionals:
Define your strategy for agility and resilience in uncertain times

Security executives:
Develop security programs to respond to emerging threats and advanced attacks

Risk management leaders:
Target the risks that matter most in the race to the digital future

Security architects and planners:
Select and architect effective security and risk solutions

Network, application, data security managers:
Protect critical assets

This is by far the best IT security and risk conference. The quality of the speakers, workshops, sessions and peer connections is outstanding. Add to that, leading vendors.

Donna Ross

CISO, Radian

Anticipate cybersecurity threats and build resilience

Business leaders are launching their digital business initiatives and making technology-related risk choices. Increased cyber threat is real, but information security leaders can reinvent security to keep pace with business demands. Security programs need to manage security and risk, identify the right talent and ensure appropriate levels of protection. Gartner IT security conferences offer the right planning insights, tools, guidance and best practices to help you get the job done effectively. You will come away with a clear path to implement the changes required in strategies, governance, technology and architecture.

We are focused on bringing you the highest-quality, most relevant security conferences. As we prepare to deliver future conference experiences, we are compiling our most relevant resources in one place to help you answer your top questions today. Explore research, articles, webinars, Q&As with Gartner experts and much more below to help you maximize productivity, minimize risk and enable cybersecurity innovation.

Explore the latest cybersecurity insights most relevant to you

Use our insights, advice and tools to create a change strategy, hone your leadership skills and meet increasing business expectations so you can keep your organization safe.

Take a fresh look at security management

As digital business evolves, CISOs must strike a balance between what is needed in a security program and the risks to undertake for the business to move forward. Help your organization seize opportunity with a vision for security and risk based on an ecosystem that enables trust and resilience.

Take a fresh look at cybersecurity

Many organizations take an ineffective approach to cybersecurity. Anticipate the emergence of attacks and new risks of digital business, cloud security, mobility and IoT by improving capabilities and implementing the right technologies.

Prepare for heightened uncertainty

Gain critical insights to measure and manage the impact of risk on digital business and develop a forward-looking view on the risks that will impact your organization.

Top Security and Risk Management Trends

As rapid changes to the global working environment continue to drive digital business transformation and challenge traditional cybersecurity practices, security and risk management leaders must address Gartner’s top five security and risk trends to enable rapid reinvention in their organizations. These trends are expected to have a broad industry impact and significant potential for disruption.

Continual disruption has pushed organizations toward a distributed infrastructure, with critical IT assets going beyond physical boundaries and traditional security measures. In this exposed environment, there can be many vulnerable access points that hackers can exploit. A cybersecurity mesh architecture is a composable and scalable approach to effectively offset such security-related concerns.

Cybersecurity mesh creates a foundational fabric for flexible security tools to interoperate and participate in a common environment and share security intelligence. Instead of building a common perimeter around all devices or nodes of a network, it provides security at a granular level by building individual perimeters for each access point.

With the major pivot to remote work resulting in technical and cultural changes, “identity first security” is now a reality, and organizations need to shift from traditional setups. Managing and monitoring identities have become critical in remote and distributed environments, where users can access systems from anywhere and at any given time. Besides spending money on technologies like biometrics, multi-factor identification and single sign-on, organizations need to invest in identifying potential hackers who can attack this infrastructure.

In the 2020 CISO Effectiveness Survey, Gartner found that 78% of CISOs have 16 or more tools in their cybersecurity vendor portfolio; 12% have 46 or more. With so many tools at their disposal, security leaders are showing interest in vendor consolidation to reduce integration costs and streamline security operations. In fact, 80% of IT organizations plan to consolidate vendors over the next three years. Vendor consolidation strategies require at least two years to yield meaningful results.

As digital business continues to grow and result in more nonhuman entities, an enterprise-wide strategy to manage machine identities across hybrid and multi-cloud environments is vital. Included in machine identities are workloads (containers, applications, services) and devices (mobile devices, desktop computers, IoT/OT devices). Machine identity management ensures that the interaction between a machine and other entities (such as devices, applications, cloud services or gateways) remains foolproof and trustworthy.

Remote work is a new, expected reality that has been largely accepted.  According to the 2021 Gartner CIO Survey, 64% of employees can work from home, and 40% are actually working from home. This shift in work requires organizations to leverage security tools and architectures suitable for a modern remote workspace. Security teams need to zero in on technologies that can provide appropriate security levels to remote assets without affecting productivity. They must also consider securing, managing and monitoring employees who are off-LAN.

Not finding what you’re looking for?
Experience Gartner conferences.

Gartner provides world-class conferences across six core business areas to help you master your role, transform your business and tap into an unsurpassed peer network. Gartner conferences bring together forward-thinking leaders like you to explore emerging trends, accelerate your learning and guide near-term decisions.