Gartner Security & Risk Management Summit

June 3 – 5, 2024 | National Harbor, MD

Building Cybersecurity Resilience
in a Complex World

In today’s interconnected and rapidly evolving digital landscape, cybersecurity resilience underscores the critical importance of adapting and fortifying your business defenses against an array of cyberthreats. As our reliance on technology deepens, organizations and cybersecurity leaders must navigate a complex and ever-changing environment where cyberattacks can range from sophisticated state-sponsored intrusions to opportunistic malware.

Gartner Security & Risk Management Summit brings together experts, thought leaders and innovators to explore the evolving landscape of digital risks and strategies for resilience. Gain insights into the multifaceted challenges of today’s complex cyber environment, addressing issues ranging from cutting-edge threat intelligence to effective incident response while emphasizing the critical role of human factors in building resilient security systems.

 

Bring your team to maximize learning: Participate in relevant sessions together, or split up to cover more ground and share your take-aways later. Learn more about attending as a team.

Define your strategy for agility and resilience in uncertain times:

  • Build a vision, strategy and operating model that can succeed in today’s distributed, fast-changing environment.
  • Improve your personal effectiveness, especially in dealing with key business stakeholders.
  • Develop a strategy to source, develop and retain talent on your team.
  • Accelerate the adoption of cyber judgment in the enterprise to enable scalability in digital cyber-risk management.
  • Measure all-in costs for security that enables the organization to make better informed decisions.
  • Learn the strategies CISOs are adopting to cope with the shift in risk landscape and risk appetite.

Exclusive CISO Circle: Learn more about the program

Develop security programs to respond to emerging threats and advanced attacks:

  • Discover how to develop and maintain effective governance across the organization.
  • Use key metrics and indicators to measure effectiveness of individual controls, as well as the whole program.
  • Establish business-driven risk requirements to identify and prioritize use cases that can assist with the evaluation and selection of detection and response technologies and services.
  • Manage and reduce threat exposure, across all environments in which business and IT units operate, that could lead to cybersecurity incidents.

Target the risks that matter most in the race to the digital future:

  • Understand the current and future role of risk management leadership. 
  • Build a risk culture that enables your organization’s digital future. 
  • Network with other senior risk management leaders in the CISO Circle program.
  • Learn how to monitor and assess third-party cybersecurity risk.
  • Learn how to use cyber-risk quantification to influence business decision making.
  • Understand the risks associated with AI. 

Select and architect effective security and risk solutions:

  • Address the organization’s cybersecurity and compliance requirements by developing appropriate technology solutions.
  • Advocate security requirements and objectives with stakeholders, while ensuring that security architectures and practices do not impede the needs of the business.
  • Adopt best practices in building aligned security architectures.
  • Learn how to take a systematic approach to model threats against a variety of systems and assets.

Protect critical assets:

  • Learn how to respond to threats and best practices to leverage before an incident.
  • Optimize prediction and prevention; know when detection is required.
  • Understand the unique security risks associated with IaaS, PaaS and SaaS and how they can be mitigated.
  • Learn about modern security platform consolidation and how to implement it to drive better protection; accelerate time to resolution and superior productivity. 

Network with experts and peers
At Gartner Security & Risk Management Summit, attendees have the opportunity to connect with Gartner experts and industry-leading chief information security officers (CISOs), security leaders and risk executives. Exchange ideas and experiences with others in similar roles or from similar organizations. 

CISOs will benefit from the unparalleled power of in-person Gartner conferences, with three days of impactful presentations that broaden your perspective, deepen your knowledge and transform your strategy. Learn more about how Gartner supports CISOs.

Attendees can build new relationships, broaden their perspectives and uncover ways to solve problems alongside other security and risk leaders.

Highlights

  • Roundtables:* Attendees join security and risk management peers from leading organizations and various industries to discuss relevant topics inspired by the latest research in these small-group sessions, moderated by a Gartner expert.  
  • Peer conversations: Attendees organically join peer-to-peer discussions throughout the conference. With more than 2,400 CISOs and security executives, discover how others are tackling the challenges you face every day.
  • End-user case studies: Detailed and documented case studies, by Gartner invitation only, reveal lessons from peers during their organizations’ implementations.
  • Social engagements: Attendees can have fun and build new business relationships with peers as they engage in welcome receptions and special evening events in varied settings.

*Preregistration is required. These sessions are available to end users only; space is limited.

Prioritize what to accelerate, unlock resources for digital investments, make meaningful cultural changes and so much more. No matter where you are on your digital business acceleration journey, we’re here to help you get to your destination faster — with confidence.

Lean back and listen

Best speakers, brightest minds and the latest big ideas. These sessions provide the inspiration and actionable insight to transform your mission-critical priorities into business results.

Highlights 

  • Guest speakers: Attendees hear firsthand experience from guest keynote speakers and guest speakers from such companies as Equinix, Healthfirst, Sabre and more.
  • Gartner Magic Quadrant™ sessions and Market Guides: Explore the Gartner Magic Quadrant™ methodology that helps attendees understand how well technology providers are executing against their stated vision.
  • Solution Provider sessions: When you’re looking to address a specific issue, these strategic roadmap presentations and user-case studies provide real-world advice. 

Lean in and engage

Facilitated by Gartner experts, these sessions challenge attendees to solve problems together, exchange their viewpoints and get to the core of the business imperatives that drive you and your peers.

Highlights

  • The CISO Circle:* A Gartner exclusive, the CISO Circle is a dedicated program within the overall agenda designed for chief information security officers and those serving in the CISO role. Participants have the opportunity to explore new strategies, share innovative ideas, grow their community of peers and gain special access to Gartner experts in unique and highly educational, interactive sessions. Learn More and Apply
  • Workshops:* Small-scale and interactive, workshops allow attendees to collaborate with peers by taking the most important topics and learning how to apply their findings to their business.
  • Midsize Enterprise Program: Designed with scale and resources in mind, the Midsize Enterprise Program spotlight track is designed specifically for security executives from midsize enterprises. 
  • Diversity, Equity and Inclusion: Sessions and interactive experiences from this spotlight track focus on issues relevant to diverse identities, including LGBTQ+ and neurodiversity, as well as corporate sustainability, equity and inclusion.

*Preregistration is required. These sessions are available to end users only. 

Our objective Gartner experts help you advance your mission-critical priorities through industry-leading insights, guidance and tools. Tap their unique expertise to make faster, smarter decisions. 

Gartner one-on-one meetings:* Meet one-on-one with Gartner experts for tailored guidance to help you achieve your mission-critical priorities. These popular meetings offer you the undivided attention of a Gartner expert who listens and guides you on the matters most critical to your success.

Ask the Expert sessions:* These topic-driven sessions provide a more intimate discussion forum, featuring one Gartner expert and end-user peers posing questions.

*Preregistration is required. These sessions are available to end users only; space is limited.

Why attend Gartner Security & Risk Management Summit?

Discover the security and risk management summit and hear what 2023 attendees had to say about why this is the premier conference for cyber executives.

Cybersecurity is constantly evolving, but with it comes more complexity, which possibly gives malicious actors the advantage. At Gartner Security & Risk Management Summit, you hear from top Gartner experts on the best way to evolve your security strategy by reframing and simplifying your defenses to be ready for current and future attacks.

Patrick Hevesi

Conference Chair and VP Analyst, Gartner, Gartner

Want to stay informed?

Get conference email updates.
Contact Information

All fields are required.

  • Step 2 of 2

    Tracks at a Glance

    Attendees have access to more than 150 sessions of the latest Gartner research specifically designed to help security and risk leaders meet the demands of the future. Each track has a particular area of focus that helps deliver what matters most to you and your organization.

    Track A

    Cybersecurity Leadership

    Learn how cybersecurity leaders can excel in their roles in the face of mission-critical challenges, including distributed technology decisions, labor shortages and an exponentially expanding attack surface.

    Track B

    Cyber Risk Management

    You might think risk has been overhyped, but don’t wait for it to materialize! This track covers risks relevant to privacy, supply chains and cybersecurity. Learn how to communicate value, correlate risk data to automate control monitoring and enable decision making.

    Track C

    Infrastructure Security

    This track explores the evolving landscape of infrastructure security solutions, from managed and unmanaged endpoints to the rapidly evolving network requirements to support cloud workloads and remote workspaces.

    Track D

    Application and Data Security

    New technologies mean new threats and an increasing attack surface, not all of which are visible by the teams responsible for threat management. This track explores the latest developments and future roadmaps to traditional application and data security problems.

    Track E

    Cybersecurity Operations

    Security operations is a crucial component of an effective security program. This track helps leaders increase business resilience through effective threat and exposure visibility, response planning and risk prioritization for your organization.

    Track F

    The CISO Circle

    Effectiveness in the CISO role continues to be a “moving target” in the face of ever-increasing business expectations. The CISO Circle curates Gartner's best insights and guidance in highly interactive sessions.

    Spotlight Track

    Technical Insights for Security Practitioners

    The Technical Insights track leverages Gartner for Technical Professionals research to deliver actionable, technical insights into security best practices, methodologies and tools that your organization needs to assure operational success.

    Spotlight Track

    Identity and Access Management

    Security leaders must evolve their IAM toward an identity-first approach that puts identity-based controls at the heart of your organization’s protection architecture to enhance its cybersecurity posture, while delivering digital transformation and business value.

    Spotlight Track

    Midsize Enterprise

    Midsize enterprises (MSEs) need to defend against the same threats and manage the same vulnerabilities as large organizations, but MSEs are resource-limited for people, budget and time. This track focuses on providing pragmatic advice.

    Spotlight Track

    Government

    The mission objectives and dynamics of governmental organizations require unique skills and technical capabilities in the cybersecurity program. This track explores the challenges in and real-world solutions to supporting successful cybersecurity programs in government.

    Ready to register?

    Secure your space now.