Gartner Security & Risk Management Summit

26 – 28 July 2023|Tokyo, Japan

Risk Focused

As digital business transformation pervades the enterprise, and "digital" becomes essential to get every job done, security and risk leaders must become the change agent driving secure digital transformation. The security organization becomes a proactive business partner, anticipating and managing security risks in pursuit of enterprise excellence.
The Gartner Security & Risk Management Summithelps security and risk management leaders and practitioners to continuously improve the flexibility and responsiveness of security risk management techniques and technology to achieve mission objectives.

View theconference overview(PDF/as of May 10)

View theconference agenda(PDF/as of May 12)

把你的团队最大化学习:参加in relevant sessions together, or split up to cover more ground and share your take-aways later. Learn more aboutattending as a team.

Define your strategy for agility and resilience in uncertain times:

  • Effectively balance the increasing volume, variety and speed of security and risk decisions.
  • Successfully communicate security risks, challenges and opportunities to senior executives.
  • Assess and transform security programs to become digital business enablers.
  • Prepare for continuous change in the technology and threat landscape.
  • Overcome the barriers of organizational culture, resources and talent to grow and scale your digital initiatives.

Develop security programs to respond to emerging threats and advanced attacks as you:

  • Balance real-world risks with business drivers such as speed, agility, flexibility and performance
  • Develop and maintain effective security governance across the organization
  • Establish key metrics and indicators to measure effectiveness of security programs
  • Anticipate the emergence of advanced attacks that evade traditional security

Target the risks that matter most in the race to the digital future:

  • Build an effective risk management program when investing in digital business.
  • Evolve your risk management practices to stay on top of emerging and enterprise risks.
  • Successfully align risk appetite with business objectives.
  • Use metrics effectively to understand changes in risk exposure.
  • Effectively manage third-party risk.
  • Select and architect effective security and risk solutions:
  • Understand how the characteristics of digital business impact security architecture practices.
  • Enable a tighter alignment between security and business.
  • Develop security architecture frameworks to address compliance demands and evolving IT.
  • Gain insight into the increasingly complex market for security and risk management technologies and services.

Protect critical assets:

  • Develop new best practices to secure new enterprise network edges.
  • Keep pace with the changing technology application landscape and evolving data protection regulations.
  • Balance the imperative to rapidly modernize applications with the requirement to protect them.
  • Respond to the challenges of securing sensitive data while expanding the use of cloud services.

Network with experts and peers

At Gartner Security & Risk Management Summit, attendees have the opportunity to connect with Gartner experts and industry-leading chief information security officers (CISOs), security leaders and risk executives. Exchange ideas and experiences with others in similar roles or from similar organizations.

Attendees can build new relationships, broaden their perspectives and uncover ways to solve problems alongside other security and risk leaders.

Highlights

  • Roundtables:*Attendees join security and risk management peers from leading organizations and various industries to discuss relevant topics inspired by the latest research in these small-group sessions, moderated by a Gartner expert.
  • Peer conversations:Attendees organically join peer-to-peer discussions throughout the conference. With many CISOs and security executives, discover how others are tackling the challenges you face every day.
  • End-user case studies:详细的和记录的案例研究,通过Gartner我nvitation only, reveal lessons from peers during their organizations’ implementations.
  • Social engagements:Attendees can have fun and build new business relationships with peers as they engage in welcome receptions and special evening events in varied settings.

*Preregistration is required. These sessions are available to end users only; space is limited.

Prioritize what to accelerate, unlock resources for digital investments, make meaningful cultural changes and so much more. No matter where you are on your digital business acceleration journey, we’re here to help you get to your destination faster — with confidence.

Lean back and listen
Best speakers, brightest minds and the latest big ideas. These sessions provide the inspiration and actionable insight to transform your mission-critical priorities into business results.

Highlights

  • Guest speakers:Attendees hear firsthand experience from guest keynote speakers and guest speakers.
  • Solution Provider sessions:When you’re looking to address a specific issue, these strategic roadmap presentations and user-case studies provide real-world advice.

Lean in and engage
Facilitated by Gartner experts, these sessions challenge attendees to solve problems together, exchange their viewpoints and get to the core of the business imperatives that drive you and your peers.

Highlights

  • The CISO Circle:*The CISO Circle, a Gartner exclusive, is a dedicated program within the overall agenda designed for chief information security officers and those serving in the CISO role. Participants have the opportunity to explore new strategies, share innovative ideas, grow their community of peers and gain special access to Gartner experts in unique and highly educational, interactive sessions.Learn More
  • Workshops:*Small-scale and interactive, in these sessions, attendees collaborate with peers by taking the most important topics and learning how to apply them to their business.

*Preregistration is required. These sessions are available to end users only.

Our objective Gartner experts help you advance your mission-critical priorities through industry-leading insights, guidance and tools. Tap their unique expertise to make faster, smarter decisions.

Gartner one-on-one meetings:*Meet one-on-one with Gartner experts for tailored guidance to help you achieve your mission-critical priorities.These popular meetings offer you the undivided attention of a Gartner expert who listens and guides you on the matters most critical to your success.

Ask the Expert sessions:*这些提供一个更intimat topic-driven会话e discussion forum, featuring one Gartner expert and end-user peers posing questions.

*Preregistration is required. These sessions are available to end users only; space is limited.

Security threat is becoming more complex. Security leaders should identify security risk in the new business quickly and appropriately. At Gartner Security & Risk Management Summit, you hear from top Gartner experts on how to change security risk management strategy and to rethink security technology.

Kaoru Yano

Conference Chair and Sr Director Analyst, Gartner

The CISO Circle

The CISO Circle is an exclusive program within the overall agenda designed for chief information security officers (CISOs) and chief risk officers (CROs), to explore new strategies, share innovative ideas and grow their community of peers.

Tracks at a Glance

Access the latest Gartner research specifically designed to help security and risk management leaders improve and advance security capabilities to support the enterprise’s digital growth. Each track has a particular area of focus to help you deliver on what matters most to you and your organization.

Track A

Cybersecurity Leadership

Cybersecurity leaders must navigate economic uncertainty, distributed technology decisions, labor shortages and an exponentially expanding attack surface — all while managing risk and supporting business objectives. Learn how cybersecurity leaders can excel in their roles in the face of these mission-critical challenges.

Track B

Risk Management, Security Operation and Resilience

Security leaders struggle to mature their cyber and IT risk management practices beyond conducting risk assessments. This track helps security and risk management leaders increase business resilience through effective threat and exposure visibility, response planning and risk prioritization for your organization.

Track C

IT Strategy and Management

Both security and IT strategy should move toward the same direction. It is also a security leader’s responsibility to always catch up to and update IT strategy and its trend. In this session, we discuss topics in IT strategy and infrastructure that security leaders need to know.

Track D

Technology and Architecture

This track provides technical insights into security best practices, methodologies and tools needed to ensure operational success. We discuss how to successfully architect, implement and operate security controls for the hybrid enterprise.

The CISO Circle

Leadership and Professional Development Exclusively for CISOs

The CISO Circle is an exclusive forum — crafted specifically for CISOs and their peers — providing targeted research, workshops and networking opportunities for peer-to-peer interactions. Join us to form valuable and lasting connections, advance leadership opportunities and learn how to prioritize business objectives with cutting-edge advice from a variety of experts, including thought leaders from Gartner and industry experts.

Ready to register?

Secure your space now.