CISOs and cybersecurity leaders can now build specific agendas filled with actionable, objective insights from key security areas. Explore Gartner Security & Risk Management Summit’s agenda now: GartnerSEC CISO Cybersecurity
Gartner Opening Keynote: Dispelling 4 Myths that Prevent Cybersecurity from Unlocking its True ValueCybersecurity can generate massive value for our enterprises, but only if we have the courage to challenge the lies that we as cybersecurity professionals tell ourselves. Our self-deceptions lock us into obsolete principles and practices that prevent us from truly aligning with our executive partners and enabling our organizations.
Resilience is a goal of every organization and what we consider to be a strategic imperative in today’s complex and turbulent world. But you know when resilience efforts miss the mark or just aren’t there.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.Shifting Sands: Evolving Cybersecurity Operating ModelsCISOs are losing control as business leaders embrace digitalization, implying a shift in risk landscapes and risk appetites. Based on new primary research, this presentation will share the strategies and practices that CISOs are adopting in reaction to these seismic shifts.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.Privacy and Ethics: Prepare for Digital SocietySociety is digitalizing at unprecedented speed, and the nature of our interactions has changed fundamentally.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.Jie Zhang, VP Analyst, Gartner Cloud security remains a top priority. This presentation summarizes the problems, recommended processes and emerging and evolving product types to address three key issues:- What are the unique security challenges of IaaS and PaaS and how can they be mitigated?Tuesday, 26 September, 2023 / 12:45 PM - 01:30 PM BSTThe Security Service Edge provides a method of effectively securing user to application traffic, regardless of the location of either user OR application.
Where are you in your zero-trust journey? Zero trust often feels vague and something that is full of promise with few concrete implementations. However, organizations are finding success in reducing risk with zero trust. Discuss with your peers the zero-trust strategy and implementation and the challenges faced in real-world implementations.
Choose your investment in ransomware readiness carefully. The executive-level trade-off for poor investment results in a terrible position to negotiate with the criminals, business cost to downtime will be greater, and lack of defensibility with key stakeholders like customers, shareholders and regulators.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.Secure Your Identity Infrastructure With ITDRAttackers have methods to compromise identity infrastructure. Traditional IAM tools cannot take the necessary actions when they are compromised. This session focuses on how identity threat detection and response tools can close this gap.
Security and privacy can effectively co-exist on personal devices to a degree never before possible, but privacy implications remain. This session explores effective security controls and their implications for security and privacy. Modern organizations are increasingly demanding a mix of options when it comes to BYOD, this session will outline the ideal mix of technology, user education and privacy considerations for each.
Security operations are undergoing a transformative change when our security is planned and delivered. Do you really need to centralize data for security? Is there a single solution to solve all my security needs? How do we determine what is threat intelligence for us? Learn what technologies, processes and services will have the biggest impact on how security operations are delivered in 2023.
Tabletop game about sorting different events that can happen during a security incident. Each player will receive five cards and should place them in the Incident Timeline during their turn, If you're right you got rid of one card, if not, draw another card, the first one that successfully places all the cards win.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.Ask the Expert: Technical Insights: Best Practices for Moving From On-Premises Device Management to Modern ManagementDevice security begins with configuration management. This session will cover best practices, considerations and gotchas when moving device management from on-premises to modern device management in the cloud.
Please Note: Based on availability and eligibility you may sign-up for the session via Conference Navigator after you register for this conference.CISO Circle: Leadership Exchange: The Top Cybersecurity Board Reporting Dynamics CISOs Must ConsiderCybersecurity is common agenda item for boards of directors across all industries, with 88% of respondents to the 2022 Gartner “View from the Board of Directors Survey” now regarding cybersecurity as a business risk and not a technology risk.
Dr. Manuel Hepfer, Researcher in Cybersecurity and Strategic Management, University of Oxford; Saïd Business School
United States Latest News, United States Headlines
Similar News:You can also read news stories similar to this one that we have collected from other news sources.
Canon Warns Discarding Its Printers May Pose a Wi-Fi Security RiskCanon has warned that a large number of its inkjet printers continue to store Wi-Fi connection settings even after normal initialization. This means they pose a privacy risk whenever they leave your house, such as for repair or disposal.
Read more »
Gartner Data & Analytics Summit 2023 Sydney: Day 1 HighlightsThat's a wrap on Day 1 of the Gartner Data & Analytics Summit in Sydney. Highlights include: ✅ This year's opening keynote ✅ The effects of dangerous data ✅ Enterprise implications of generative AI Learn more GartnerDA Data Analytics
Read more »
Gartner Data & Analytics Summit 2023 Sydney: Day 2 HighlightsThat's a wrap on Day 2 of the Gartner Data & Analytics Summit in Sydney. Highlights include: ✅ A look into the foundations of AI ✅ Top data and analytics trends ✅ Future of data science and machine learning Learn more: GartnerDA Data Analytics
Read more »
Gartner Identifies Top Trends Shaping the Future of Data Science and Machine LearningGartner today highlighted the top trends impacting the future of data science and machine learning (DSML) as the industry rapidly grows and evolves to meet the increasing significance of data in artificial intelligence.
Read more »
Vice Media Closes $350 Million Sale to Investors Fortress, Soros Fund Management and Monroe CapitalVice Media Group announced the completion of its post-bankruptcy sale to a consortium of former lenders, in a deal valuing the once-high-flying media company at $350 million. As previously announce…
Read more »
Ares Management stock holds gains despite broad market losses on stronger-than-expected profitAres Management Corp. stock was up 1.5% on Tuesday after beating its second-quarter earnings target, despite losses in financial stocks. Ares reported an...
Read more »