Gartner Security & Risk Management Summit

June 7 – 10, 2022 | National Harbor, MD

Accelerating the Evolution of Security: Reframe and Simplify

Enterprises are accelerating their adoption of digitalization and agile methodologies, dramatically changing their risk profiles. Many organizations continue to add layers of defense, which in turn increases the complexity of defending against the continued onslaught of more and more advanced attacks. You must evolve your security strategy by reframing your current thinking and simplifying your processes, organization and defenses.

Join Gartner experts and your peers at Gartner Security & Risk Management Summit 2022 to share valuable insights into key strategic imperatives, such as establishing an agile security program; fostering a human-centric, security-conscious culture; devolving risk ownership; and establishing a new simplified cybersecurity mesh architecture. It will enable you to safeguard your organization, defend against your attackers and deliver business value.

Bring your team to maximize learning - participate in relevant sessions together, or split up to cover more ground and share your take-aways later. Learn more about attending as a team

Define your strategy for agility and resilience in uncertain times

  • Effectively balance the increasing volume, variety and speed of security and risk decisions. 
  • Successfully communicate security risks, challenges and opportunities to senior executives.
  • Assess and transform security programs to become digital business enablers.
  • Prepare for continuous change in the technology and threat landscape.
  • Overcome the barriers of organizational culture, resources and talent to grow and scale your digital initiatives.

Develop security programs to respond to emerging threats and advanced attacks

  • Balance real-world risks with business drivers such as speed, agility, flexibility and performance.
  • Develop and maintain effective security governance across the organization.
  • Establish key metrics and indicators to measure effectiveness of security programs.
  • Anticipate the emergence of advanced attacks that evade traditional security.

Target the risks that matter most in the race to the digital future

  • Build an effective risk management program when investing in digital business.
  • Evolve your risk management practices to stay on top of emerging and enterprise risks.
  • Successfully align risk appetite with business objectives.
  • Use metrics effectively to understand changes in risk exposure.
  • Effectively manage third-party risk.

Select and architect effective security and risk solutions

  • Understand how the characteristics of digital business impact security architecture practices.
  • Enable a tighter alignment between security and business.
  • Develop security architecture frameworks to address compliance demands and evolving IT.
  • Gain insight into the increasingly complex market for security and risk management technologies and services.

Protect critical assets

  • Develop new best practices to secure new enterprise network edges.
  • Keep pace with the changing technology application landscape and evolving data protection regulations.
  • Balance the imperative to rapidly modernize applications with the requirement to protect them.
  • Respond to the challenges of securing sensitive data while expanding the use of cloud services.

Network with experts and peers
At Gartner Security & Risk Management Summit, attendees have the opportunity to connect with Gartner experts and industry-leading CISOs, security leaders and risk executives. Exchange ideas and experiences with others in simililar roles or from similar organizations. 

Build new relationships, broaden your perspectives and uncover ways to solve problems alongside other security & risk leaders. When you engage with like-minded peers, you’ll find opportunities to share your ideas and experiences. 

Highlights:

  • Roundtable sessions.* Join your security & risk management peers from leading organizations and various industries to discuss relevant topics inspired by the latest research in these small-group sessions, moderated by a Gartner expert.  
  • Peer conversations. Join peer-to-peer discussions organically throughout the conference. With over 2,400 CISO and security executives, discover how others are tackling the challenges you face every day.
  • End-user case studies. Detailed and documented case studies, by Gartner invitation, reveal lessons from your peers during their own organization’s implementations.
  • Social engagements. Have fun and build new business relationships with peers as you engage in welcome receptions and special evening events in varied settings.

*Preregistration is required. These sessions are available to end users only; space is limited.

Prioritize what to accelerate, unlock resources for digital investments, make meaningful cultural changes and so much more. No matter where you are on your digital business acceleration journey, we’re here to help you get to your destination faster — with confidence.

Lean back and listen
Expect the best speakers, brightest minds and the latest big ideas. These sessions provide the inspiration and actionable insight to transform your most critical priorities into business results.

Highlights:

  • Guest Speakers. Hear first-hand experience from guest keynote speakers and guest speakers from companies like Facebook, Verizon and more.
  • Magic Quadrant Sessions and Market Guides. Explore Magic Quadrants to help understand how well technology providers are executing against their stated vision.
  • Solution Provider Sessions. When you’re looking to address a specific issue, these strategic roadmap presentations and user-case studies provide real-world advice. 

Lean in and engage
Facilitated by Gartner experts, these sessions challenge you to solve problems together, exchange viewpoints and get to the core of the business imperatives that drive you and your peers.

Highlights:

  • CISO Circle.* The CISO Circle, a Gartner exclusive, is a dedicated program within the overall agenda designed for Chief Information Security Officers (CISOs) and those serving in the CISO role. Participants will have the opportunity to explore new strategies, share innovative ideas, grow their community of peers and have special access to Gartner experts in unique and highly educational, interactive sessions. Learn more & apply.
  • Workshops.* Small-scale and interactive: Collaborate with peers by taking the most important topics and learning how to apply them to your business.
  • Midsize Enterprise Program. Designed with scale and resources in mind, the Midsize Enterprise Program is specifically for security executives from midsize enterprises. View Sessions
  • Diversity, Equity and Inclusion. Track sessions and interactive experiences focus on issues relevant to diverse identities, including LGBTQ and neurodiversity, as well as corporate sustainability, equity and inclusion. View Sessions.

*Preregistration is required. These sessions are available to end users only. 

Our unbiased Gartner experts help you advance your most critical priorities through industry-leading insights, guidance and tools. Tap their unique expertise to make faster, smarter decisions. 

Gartner one-on-one meetings.* Meet one-on-one with Gartner experts for tailored advice to help you achieve your most critical priorities. These popular meetings offer you the undivided attention of a Gartner expert who will listen and guide you on the matters most critical to your success.

Ask the Expert sessions.* Topic-driven sessions provide a more intimate discussion forum, featuring one Gartner expert and end-user peers posing questions.

*Preregistration is required. These sessions are available to end users only; space is limited.

Cybersecurity is constantly evolving, but with it comes more complexity, which possibly gives malicious actors the advantage. At Gartner Security & Risk Management Summit, you will hear from top Gartner experts on the best way to evolve your security strategy by reframing and simplifying your defenses to be ready for current and future attacks.

Patrick Hevesi

VP Analyst and Conference Chair

The Chief Information Security Officer (CISO) Circle

The CISO Circle, a Gartner exclusive, is a dedicated program within the overall agenda designed for Chief Information Security Officers (CISOs) and those serving in the CISO role. Participants will have the opportunity to explore new strategies, share innovative ideas, grow their community of peers and have special access to Gartner experts in unique and highly educational, interactive sessions.

Want to stay informed?

Get conference email updates.
Contact Information

All fields are required.

  • Step 2 of 2

    Tracks at a Glance

    Access over 150 sessions of the latest Gartner research specifically designed to help security and risk management leaders meet the demands of the future. Each track has a particular area of focus to help you deliver on what matters most to you and your organization.

    For a full overview of the Security & Risk Management Summit, view the Conference Brochure. 

    Track A

    Cybersecurity Leadership

    Faced with a fragmented, interdependent world, cybersecurity leaders have less control over decisions around cyber risk than ever before. This track gives you practical guidance on how to manage security teams, and stakeholders, through the evolving threat landscape.

    View Sessions
    Track B

    Infrastructure Security

    Hybrid work and cloud/everything as a service have reframed security around a zero-trust identity and API security. Leading organizations are simplifying the complexity for understaffed and overwhelmed teams. This track provides strategy and tactics to help you plan.

    View Sessions
    Track C

    Application and Data Security

    Spanning the cycle from developers to customers, today’s leaders face a wide, diverse array of both risks and ways to manage, mitigate and respond to them. These sessions provide practical, real-world guidance on achieving a more secure software development life cycle and data management program.

    View Sessions
    Track D

    Cyberthreat: Mitigation, Preparedness and Exposure Management

    SecOps is evolving from securing the business’s systems to securing its business operations as well. This track helps you understand the expanding attack surface, use automation to standardize, and prepare to effectively respond to a security incident.

    View Sessions
    Track E

    Cyber and IT Risk

    Due to new challenges and lack of agility in program management, cybersecurity leaders struggle to mature their cyber and IT risk management practices beyond conducting assessments. This track highlights the latest trends and tools to help you improve automation and models.

    View Sessions
    Track F

    Competitive Security Market Dynamics for Product Leaders

    Security product leaders must transform their offerings to be relevant in a new world and culture, rethink strategies and anticipate new buyer needs. This track focuses on helping leaders simplify and reframe current product offerings to succeed in changed markets.

    View Sessions
    Track G

    The CISO Circle*

    As the role evolves, CISOs must adapt to ensure that the organization can balance risk decisions with business goals. The CISO Circle provides targeted content, workshops and networking opportunities. Join us and form valuable connections with peers and Gartner experts. (*Application is required.)

    View Sessions
    Track H

    Technical Insights for Security Practitioners

    Gartner for Technical Professionals research explores insights into the security best practices, methodologies and tools needed to ensure operational success. Sessions provide advice on architecting, implementing and operating security controls for the hybrid enterprise.

    View Sessions
    Spotlight Track

    Midsize Enterprise

    Midsize organizations face the same threats and manage the same vulnerabilities as large ones, but with limited people, budget and time. This track provides pragmatic advice on overcoming the resource obstacles and applying the right level of protection and risk management.

    Spotlight Track

    Diversity, Equity and Inclusion

    Anyone in security can benefit from a greater awareness of diversity, equity and inclusion (DEI) efforts, but it is increasingly a mandatory skill set for leaders. This track helps you frame your DEI efforts with a security lens and assists you in your efforts to reduce intentional and unintentional bias.

    Spotlight Track

    Identity and Access Management

    Identity is a critical foundation for the security of the systems that support our rapidly expanding virtual world. This track ensures you have the tools and insights to support effective identity and fraud initiatives, enabling organizational success.

    Health & Safety Requirements for Destination Conferences through June

    We are excited to welcome you back to our in-person conferences this year. Our current health & safety guidelines for our conferences through June are outlined below, as well as additional details to help you plan for the in-person experience.

    As a part of our commitment to creating the safest possible environment for our community, we will require all attendees, exhibitors, staff and partners to be fully vaccinated to participate in this year’s in-person conferences. All participants will be asked to agree to adhere to Gartner’s on-site safety guidelines and measures.

    We will continue to monitor the global and regional response to the pandemic and may adjust our plans accordingly. To ensure you have the most up-to-date information, the latest health & safety guidelines for each conference will be communicated directly to all registered participants via email no later than two weeks prior to the conference start date.

    Ready to Register?

    Secure your space now.