Gartner Security and Risk MGMNT Summit 2013
Gartner Security and Risk MGMNT Summit 2013
Gartner Security and Risk MGMNT Summit 2013
Reset Your World: The Evolving Role of Risk Management and Information Security
Risk managers
North Americas
most important
annual gathering
of the IT security
and risk
community
TABLE OF CONTENTS
4 Summit Programs
5 Industry Day Perspective Forums
6 Virtual and Vertical Industry Tracks
7 Keynote Sessions
8 C
hief Information Security
Officer (CISO) Program
9 CISO Agenda Tracks
10 CISO Invitational Program
11 IT Security Program
13 IT Security Agenda
Industry Day Perspective Forums with dedicated content and Gartner analysts
for key industries
14 B
usiness Continuity Management
Program
15 BCM Agenda
More than 150 sessions, keynotes, workshops, tutorials and case studies
16 R
isk Management and Compliance
Program
17 R
isk Agenda
18 T
he Business of IT Security Program
19 Session Descriptions
35 Solution Showcase
38 Agenda at a Glance
41 Registration and Pricing
SUMMIT PROGRAMS
PROGRAMS
SUMMIT
ANALYST-USER
ROUNDTABLES
These topic-driven end-user discussions
are moderated by Gartner analysts.
Learn what your peers are doing around
particular issues and across industries
(preregistration required).
Program Descriptions
Chief Information Security Officer (CISO) Program
This year the CISO program graduates from CISO basics to strategic
and tactical planning. There are still too many things that should be done
with too few resources. So how do you make use of the best information
you have to set priorities and get things done, while moving toward
those elusive strategic goals?
IT Security Program
Cloud, social, mobile and big data drive new opportunities but challenge
traditional approaches to IT security. Their adoption for business
operations requires security programs to mature rapidly. This program
provides insights on security management from Gartner for IT Leaders
analysts, and on security technology management from Gartner for
Technical Professionals analysts.
Risk Management and Compliance Program
Integrated performance and risk management is the next promising
evolutionary step for risk management and compliance programs. But
new regulatory and legal challenges continue to mount. Early detection
and mitigation of emerging risks are critical. This program focuses on
the technologies and strategies to improve governance, manage risk,
ensure compliance and adhere to the letter and spirit of the law.
Business Continuity Management (BCM) Program
Can your organization survive another Superstorm Sandy? The number
of regional disasters is growing. How will your enterprise ensure
continuing operations when a business interruption occurs? These
sessions help organizations anticipate the unexpected, and reinforce
a discipline of risk management and mitigation, response and recovery
in the corporate culture.
The Business of IT Security Program
This program examines the latest technologies and trends, and financial
and strategic views, of the security and risk market. Find out how big
the market is for software and services, which market leaders are
succeeding, and why. Learn where the innovation is, and how Gartner
analysts rate the leading security vendors.
Government
Healthcare
Wes Rishel
Ruggero Contu
Lawrence Pingree
Financial Services
IF1. Case Study
TBA
Juergen Weiss
Erik T. Heidt
John A. Wheeler
VIRTUALAND
VIRTUAL
ANDVERTICAL
VERTICALINDUSTRY
INDUSTRY
TRACKS
TRACKS
Virtual and vertical industry tracks make it easy to follow a key trend, hot topic or address industry issues in relevant
sessions pulled from across all five conference programs. To further customize any track, visit Agenda Builder at
gartner.com/us/securityrisk.
Virtual Tracks
Financial Services
Fighting fraud while keeping online banking seamless and
efficient are just a few of the key issues covered at this
years event. See what else is covered for those in the
financial services industry.
Cloud Computing
This track explores this and more of the latest challenges
associated with cloud security.
IAM and Secure Business Enablement
This track features a wealth of presentations on current best
practices and the latest issues and trends.
Advanced CISO
Our CISO track contains best-practice and security
program planning information. For those with more
advanced needs, we have identified this curriculum as
a suggested set of sessions.
Technical Insights: Security Architecture
Explore the architecture and planning considerations for
protecting information, building secure applications,
understanding threats, auditing and monitoring activity,
and managing risk associated with new devices and service
hosting models. These sessions are delivered by Gartner
for Technical Professionals (GTP) analysts.
Cybersecurity
This track helps you separate the hype from the reality and
highlights best practices for protecting your organization in a
rapidly changing threat environment.
Big Data
These sessions analyze the role that big data plays in security,
and how it can enhance our defenses against targeted
attacks and advanced persistent threats (APT).
Government
Government agencies are looking to develop cohesive
national cybersecurity initiatives that are in partnership with
consumers and the public sector. This is just one of the
key issues covered at this years event. See what else is
covered for those in government.
Healthcare
Enterprises today are challenged to increase quality of service
delivery, reduce compliance costs and anticipate healthcare
reform while maintaining patient privacy and protecting
intellectual property. This track covers this and more,
specifically for the healthcare and pharmaceutical industries.
Energy/Utilities
Establishing effective and efficient smart grid technology
while combating for fraud, cyberattacks and the loss of
control are just a few of the key issues covered at this years
event. See what else is covered for those in energy/utilities.
Manufacturing
Managing and optimizing increasingly interconnected and
complex control networks while reducing costs and
maintaining system integrity and protecting proprietary data
are just some of the key issues covered at this years event.
See what else is covered for those in the manufacturing sector.
KEYNOTE SESSIONS
Guest keynotes
The Intersection of National Security, Leadership and the
Global Economy
Admiral
Mike Mullen
Serving at a critical juncture in our nations history, Admiral Mike Mullen was a
key influencer in shaping the security of our nation for decades to come. A man
of unparalleled experience, vision and integrity, Mullen shares with audiences
his belief that, Our financial health is directly related to our national security,
and discusses how the key to the United States economic success in the next
century is to create opportunity. With an eye on the horizon and to the threats
that still lie ahead, Mullen discusses Americas greatest challenges
economic growth, infrastructure, education and foreign and military policy.
Chairman of the
Joint Chiefs of Staff
2007-2011; Chief of
Naval Operations;
Commander, U.S.
Naval Forces Europe/
Allied Joint Force
Command Naples;
Vice Chief of
Naval Operations;
Commander, U.S.
Second Fleet
Keith Ferrazzi
CEO, Ferrazzi
Greenlight; Author of
Whos Got Your Back
and Never Eat Alone
Steve Bennett
Steve Bennett was named Symantecs chief executive officer in July 2012.
Prior to that, Bennett joined Symantecs board of directors in February 2010
and became chairman in 2011. Bennett previously led Intuit serving as
president and chief executive officer from 2000-2007. Under Bennetts
leadership Intuit grew its existing businesses while simultaneously expanding
into new markets. Bennett joined Intuit after a 23-year career at General
Electric, where he managed complex and diverse organizations from consumer
appliances to financial services. He currently serves on boards at American
Airlines and parent company AMR Corporation, along with Qualcomm.
Gartner keynotes
Opening Global Keynote: Reset
Paul E. Proctor, Vice President and Distinguished Analyst; Andrew Walls, Vice President and Conference Chair;
F. Christian Byrnes, Managing Vice President; John A. Wheeler, Director
Now is the time to break the inertia that blocks progress in security and risk management. The evolution of risk and
security officer roles shows the way to reset your approach to security and risk management, and create and sustain
significant security and risk benefits to your organization. (And it wont hurt your career any either!)
HOT TOPICS
Strategic planning for information
security
Business/IT security alignment
Governance and policy setting
Business value of information
security
Enterprise security architecture
Creating a risk-aware culture
Process maturity
WHO SHOULD ATTEND
CISOs, CIOs, CSOs, CROs, CTOs
and IT vice presidents
New CISOs who want to build their
leadership role based on leadingedge Gartner research, insights and
best practices
Experienced CISOs looking to
refresh their understanding of
the latest trends, tools, threats
and technologies
IT security executives on a CISO
career track
Rob McMillan
Director
Paul E. Proctor
Vice President and
Distinguished Analyst
Tom Scholtz
Vice President and
Distinguished Analyst
Andrew Walls
Vice President
and Conference Chair
John A. Wheeler
Director
CISO
4:30 p.m. A1. Transform Your Security and Risk Program or Find Another Job Paul E. Proctor
5:30 p.m. A2. Preparing a Security Strategic Plan F. Christian Byrnes
6:15 p.m. Solution Showcase Evening Reception and Theater Presentations
TUESDAY, JUNE 11
7:00 a.m. Power Breakfast: About Gartner and Security & Risk Management Research Andrew Walls, French Caldwell;
Roberta J. Witty; Lawrence Orans; Roman Krikken; F. Christian Byrnes
HC1. Healthcare Moderated Breakfast: Fraud, Waste, Abuse and ICD-10 Christina Lucero, Irma Fabular
(Registration required; end users only.)
8:00 a.m. K2. The Intersection of National Security, Leadership and the Global Economy Admiral Mike Mullen,
Chairman of the Joint Chiefs of Staff 2007-2011; Chief of Naval Operations; Commander, U.S. Naval
Forces Europe/Allied Joint Force Command Naples; Vice Chief of Naval Operations; Commander,
U.S. Second Fleet
8:45 a.m. K3. Guest Keynote The Gartner Mastermind Interview Steve Bennett, CEO and Chairman of the
Board, Symantec
10:00 a.m. W6. Workshop: Use a Balanced Scorecard to Demonstrate Securitys Value Rob McMillan
11:15 a.m. A3. Organizing for Success: Developing Process-centric Security Teams Tom Scholtz
2:00 p.m. A4. Finding the Optimal Balance Between Behavioral and Technical Controls
Andrew Walls
4:15 p.m. A5. Maverick Research: Transform Your Security Program From Control-centric to People-centric
Tom Scholtz
5:30 p.m. K4. Gartner Keynote The Gartner Five-Year Security and Risk Scenario Andrew Walls , Vice President
and Conference Chair; F. Christian Byrnes, Managing Vice President
6:30 p.m. Hospitality Suites
WEDNESDAY, JUNE 12
7:00 a.m. HC2. Healthcare Moderated Breakfast: BYOD Best Practices in Healthcare Barry Runyon; Irma Fabular
(Registration required; end users only.)
8:00 a.m. K5. Guest Keynote Whos Got Your Back: Creating and Developing Great Relationships
Keith Ferrazzi, CEO, Ferrazzi Greenlight; Author of Whos Got Your Back and Never Eat Alone
9:15 a.m. Solution Provider Sessions
10:30 a.m. A6. That Frightening Phrase: The Standard of Due Care Rob McMillan
11:30 a.m. A7. The Care and Feeding of an Effective Awareness Program Andrew Walls
1:45 p.m. A8. Using Outside Resources: Security Consultants and Threat Intelligence Services Rob McMillan
4:00 p.m. A9. To the Point: The Risk Management Maturity Pathway Rob McMillan
4:30 p.m. A10. To the Point: The Information Security Maturity Pathway Rob McMillan
6:00 p.m. Summit Party VIP Boat Cruise (By invitation only)
THURSDAY, JUNE 13
830 a.m. A11. Case Study
TBA
9:30 a.m. A12. Panel: Reset Your IAM Planning! Lessons From the Veterans Gregg Kreizman, Earl Perkins
10:30 a.m. A13. Open Mic
F. Christian Byrnes
11:30 a.m. K6. Gartner Closing Insights Andrew Walls, Vice President and Conference Chair; French Caldwell,
Vice President and Distinguished Analyst; Roberta J. Witty, Vice President; Lawrence Orans, Director;
Roman Krikken, Vice President; F. Christian Byrnes, Managing Vice President
CISO INVITATIONAL
PROGRAM FEATURES
Direct interaction with analysts
The latest research on top priorities
for CISOs
Boardroom case study
presentations with leading solution
providers
Advanced CISO virtual track for
more experienced CISOs
C-level-only roundtable discussions
Exclusive CISO networking events
Keynotes, general sessions and a
Mastermind Interview
Security management workshops
10
IT SECURITY PROGRAM
The Nexus of Forces social, mobile, cloud and information is having a
major impact on IT security, both on how its accomplished and with regard
to new threats and vulnerabilities. In this comprehensive program, sessions
will cover the breadth of todays IT security priorities, from network,
infrastructure and data protection to application security, identity and
access management, privacy and mobile and cloud security.
Gone are the days when walling off intruders and controlling access was
enough. Thanks to the cloud, social media and BYOD, the line of defense
has blurred beyond recognition. Securitys new mandate is to focus on
business objectives and find ways to enable new opportunities in a secure,
trusted environment.
Featuring Technical Insights sessions from Gartner for Technical
Professionals, the IT Security Program delivers the tools and next steps to
get things done today and understand where the technology is taking us
tomorrow. The program agenda features:
More than 70 sessions, workshops and roundtables covering all of the
latest issues enterprises are faced with today
10 Technical Insights sessions by Gartner for Technical Professionals
analysts that drill down on best practices in cloud, mobile and virtualization
Tutorials on topics including top security trends and identity and access
management
Plus, 10 IT security-focused workshops, 12 To the Point sessions,
networking events, panels, analyst-user roundtables, and much more
25 on-site Gartner analysts focused on IT security, available for private
one-on-one meetings
HOT TOPICS
Advanced targeted threats
(advanced persistent threat APT)
BYOD security
DDoS mitigation
Mobility
Data loss prevention (DLP)
Next-generation firewalls
Next-generation intrusion prevention
Security information and event
management
Network access control
Anti-malware
Secure email
Secure Web
DNS security
Unparalleled opportunity
to network at a national
level. Great info on
industry trends, tools and
overall solutions.
2012 conference attendee
Visit gartner.com/us/securityrisk for agenda updates and to register
11
SECURITYPROGRAM
AGENDA
IT SECURITY
Meet the analysts
Gartner analysts draw on the real-life challenges and solutions experienced by clients from over 13,000 distinct
organizations worldwide.
Ant Allan
Vice President
Anton Chuvakin
Director, Gartner
for Technical
Professionals Analyst
Alan Dayley
Director
Mario de Boer
Director, Gartner
for Technical
Professionals Analyst
Joe Feiman
Vice President
and Gartner Fellow
Peter Firstbrook
Vice President
John Girard
Vice President and
Distinguished Analyst
Jay Heiser
Vice President
Kelly M. Kavanagh
Principal Analyst
Gregg Kreizman
Vice President
Ramon Krikken
Vice President,
Gartner for Technical
Professionals Analyst
Avivah Litan
Vice President and
Distinguished Analyst
Brian Lowans
Principal Analyst
Neil MacDonald
Vice President and
Gartner Fellow
Eric Maiwald
Vice President,
Gartner for Technical
Professionals Analyst
Rob McMillan
Director
Mark Nicolett
Managing Vice President
Lawrence Orans
Director and IT Security
Program Lead
Eric Ouellet
Vice President
Earl Perkins
Vice President
Tom Scholtz
Vice President and
Distinguished Analyst
Ray Wagner
Managing Vice President
Jeffrey Wheatman
Leadership Partner
Greg Young
Vice President
12
IT SECURITY AGENDA
MONDAY, JUNE 10
8:00 a.m. Event Orientation
8:15 a.m. K1a. Gartner Opening Global Keynote Reset Andrew Walls, Vice President and Conference Chair; Paul E. Proctor, Vice President and Distinguished Analyst;
F. Christian Byrnes, Managing Vice President; John A. Wheeler, Director
9:05 a.m. K1b. Gartner Opening Remarks Andrew Walls, Vice President and Conference Chair
9:45 a.m. IF1. Case Study TBA
IH1. Dont Give Them the Keys to the
IME1. Understand OT: The Emerging
IME2. Supply Chain IT Risk
Kingdom Until You Know Who They Are
Risks From Advanced Automation
Challenges: What Exactly Is That
Barry Runyon H
Earl Perkins, Kristian Steenstrup EU M
Supplier Doing? Erik T. Heidt GTP
10:45 a.m. Solution Provider Sessions
11:30 a.m. IF2. Do I Need Cyberinsurance? Juergen Weiss
IH2. HIPAA Bites: Getting Ready for HIPAA IME3. Securing the OT Environment
F
2:15 p.m. IF3. Strategic Road Map for Financial Services
Enterprise Risk Management John A. Wheeler
IT SECURITY
4:30 p.m. B1. Practicing Safe SaaS Jay Heiser
W4. Workshop: Build an Effective Security and Risk Program Tom Scholtz,
Rob McMillan, Jeremy DHoinne
5:30 p.m. B2. Cyberthreat Lawrence Orans
C2. Panel: What Is the Future of Mobile
Management and Security?
Peter Firstbrook, Neil MacDonald,
John Girard
6:15 p.m. Solution Showcase Evening Reception and Theater Presentations
TUESDAY, JUNE 11
7:00 a.m. Power Breakfast: About Gartner and Security & Risk Management Research Andrew Walls, French Caldwell; Roberta J. Witty; Lawrence Orans; Roman Krikken; F. Christian Byrnes
HC1. Healthcare Moderated Breakfast: Fraud, Waste, Abuse and ICD-10
10:00 a.m. W7. Getting Value Out of IT Security and Risk Metrics Programs Ramon Krikken GTP
11:15 a.m. B3. Presenting a Hard Target to Attackers:
C3. Top 10 Security Myths Jay Heiser
Operationally Effective Vulnerability Management
Mark Nicolett
2:00 p.m. B4. Panel: Real-World Case Studies in Mobile
C4. How Can You Leverage Content-Aware
Banking Security Moderator: Avivah Litan;, Dave
DLP to Ensure Your Corporate Policies and
Jevans, Chairman, Anti-Phishing Working Group,
Processes Are Effective? Eric Ouellet
Marble Security; Vas Rajan, Chief Information
Security Officer, CLS Bank; Tim Wainwright,
Managing Director, CISSP, Security Risk Advisor
4:15 p.m. B5. Mobile Device Security Exploits in Depth John
C5. Endpoint Security When the
Girard, Dionisio Zumerle
Consumer Is King Peter Firstbrook
5:30 p.m. K4. Gartner Keynote The Gartner Five-Year Security and Risk Scenario
E3. TBA
WEDNESDAY, JUNE 12
7:00 a.m. HC2. Healthcare Moderated Breakfast: BYOD Best Practices in Healthcare Barry Runyon; Irma Fabular (Registration required; end users only.)
8:00 a.m. K5. Guest Keynote Whos Got Your Back: Creating and Developing Great Relationships
Never Eat Alone
9:15 a.m. Solution Provider Sessions
10:30 a.m. B6. Preparing Your Security Program for BYOD
Eric Ahlm
Keith Ferrazzi, CEO, Ferrazzi Greenlight; Author of Whos Got Your Back and
Eric Maiwald
THURSDAY, JUNE 13
8:30 a.m. B11. The Seven Dimensions of Context-Aware
Security Avivah Litan
13
BUSINESSCONTINUITY
CONTINUITYMANAGEMENT
MANAGEMENT
PROGRAM
BUSINESS
PROGRAM
HOT TOPICS
BCM planning tools and
their implementation
ISO 22301 implementation
best practices
The nexus of technology to take
your BCM program to the next level
IT-DRM architectures and
technologies for recovery,
high-availability and exercising
BIA best practices
Exercising best practices
Supplier/third-party risk
BCM metrics
Cloud service provider risk
Recovery plan
development workshop
14
BCM AGENDA
Meet the analysts
Gartner analysts draw on the real-life challenges and solutions experienced by
clients from over 13,000 distinct organizations worldwide.
Leif Eriksen
Director
John Girard
Vice President and
Distinguished Analyst
Jay Heiser
Vice President
John P. Morency
Vice President
Donna Scott
Vice President and
Distinguished Analyst
Gayla Sullivan
Director
Belinda Wilson
Senior Director,
Gartner Consulting
Roberta J. Witty
Vice President and
BCM Program Lead
MONDAY, JUNE 10
8:00 a.m. Event Orientation
8:15 a.m. K1a. Gartner Opening Global Keynote Reset Andrew Walls, Vice President and Conference Chair; Paul E. Proctor, Vice President and Distinguished Analyst;
F. Christian Byrnes, Managing Vice President; John A. Wheeler, Director
9:05 a.m. K1b. Gartner Opening Remarks Andrew Walls, Vice President and Conference Chair
9:45 a.m. PC2. ISO 22301 Implementation Session Roberta J. Witty; John P. Morency; Brian Zawada, ISO TC 223 U.S. Representative, Avalution Consulting
10:45 a.m. Solution Provider Sessions
11:30 a.m. T4. TBA
2:00 p.m. W3. Workshop: Selecting Solutions for the Control and Monitoring of Public Social Media
2:15 p.m. PC7. Using MSSPs for Effective Threat Management Kelly M. Kavanagh
Mario de Boer
GTP
BCM
4:30 p.m. H1. What Are the BCM Software Markets and How to Get the Most Out of Them
5:30 p.m. H2. What You Can and Cannot Do With Recovery Exercise Management Automation
John P. Morency
TUESDAY, JUNE 11
7:00 a.m. Power Breakfast: About Gartner and Security & Risk Management Research Andrew Walls, French Caldwell; Roberta J. Witty; Lawrence Orans; Roman Krikken;
F. Christian Byrnes
HC1. Healthcare Moderated Breakfast: Fraud, Waste, Abuse and ICD-10 Christina Lucero, Irma Fabular (Registration required; end users only.)
8:00 a.m. K2. The Intersection of National Security, Leadership and the Global Economy Admiral Mike Mullen, Chairman of the Joint Chiefs of Staff 2007-2011; Chief of Naval
Operations; Commander, U.S. Naval Forces Europe/Allied Joint Force Command Naples; Vice Chief of Naval Operations; Commander, U.S. Second Fleet
8:45 a.m. K3. Guest Keynote The Gartner Mastermind Interview Steve Bennett, CEO and Chairman of the Board, Symantec
11:15 a.m. H3. Case Study: Business Continuity Metrics From Project to Program to Incident Management Roberta J. WittyBCM Metrics
TBA
2:00 p.m. H4. Cloud Service Provider Risk Management Donna Scott, John P. Morency, Jay Heiser
4:15 p.m. H5. Managing Global Recovery and Continuity Risk
5:30 p.m. K4. Gartner Keynote The Gartner Five-Year Security and Risk Scenario
Managing Vice President
6:30 p.m. Hospitality Suites
WEDNESDAY, JUNE 12
7:00 a.m. HC2. Healthcare Moderated Breakfast: BYOD Best Practices in Healthcare Barry Runyon; Irma Fabular (Registration required; end users only.)
8:00 a.m. K5. Guest Keynote Whos Got Your Back: Creating and Developing Great Relationships Keith Ferrazzi, CEO, Ferrazzi Greenlight; Author of Whos Got Your Back
and Never Eat Alone
10:30 a.m. H6. What You Need to Know About Technical IT-DRM Architectures Donna Scott, John P. Morency
11:30 a.m. H7. Case Study TBA
1:45 p.m. H8. Recovery Exercising Best Practices Belinda Wilson
4:00 p.m. H9. To the Point: BCM Grows Up How a Nexus of Technologies Is Moving BCM Into the C-Suite Roberta J. Witty
4:30 p.m. H10. To the Point: The Business Continuity Management Planning Market in Depth Roberta J. Witty, John P. Morency
6:00 p.m. Summit Party VIP Boat Cruise (By invitation only)
THURSDAY, JUNE 13
8:30 a.m. H11. Supplier Contingency Planning: What You Need to Know for Supplier Recovery Gayla Sullivan
9:30 a.m. H12. Designing and Architecting for 24/7 Availability Donna Scott
10:30 a.m. H13. How to Conduct an Effective BIA Belinda Wilson
11:30 a.m. K6. Gartner Closing Insights Andrew Walls, Vice President and Conference Chair; French Caldwell, Vice President and Distinguished Analyst; Roberta J. Witty,
Vice President; Lawrence Orans, Director; Roman Krikken, Vice President; F. Christian Byrnes, Managing Vice President
15
RISK MANAGEMENT
MANAGEMENTAND
ANDCOMPLIANCE
COMPLIANCE
PROGRAM
RISK
PROGRAM
HOT TOPICS
Enterprise and IT risk management
Integrated performance and risk
Emerging risks
Cloud risks
Social media compliance and
risk management
Third-party risk management
Risk-Adjusted Value
Management (using risk to
drive performance)
Creating key risk indicators
IT and corporate governance
Information governance
E-discovery
The fourth generation of GRC
Privacy
IT audit
16
French Caldwell
Vice President and
Gartner Fellow and
Risk Program Lead
Carsten Casper
Vice President
Richard Hunter
Vice President and
Distinguished Analyst
Jorge Lopez
Vice President and
Distinguished Analyst
Khushbu Pratap
Senior Analyst
Paul E. Proctor
Vice President and
Distinguished Analyst
Julie Short
Director
Andrew Walls
Vice President
and Conference Chair
Jeffrey Wheatman
Leadership Partner
John A. Wheeler
Director
RISK AGENDA
MONDAY, JUNE 10
8:00 a.m. Event Orientation
8:15 a.m. K1a. Gartner Opening Global Keynote Reset Andrew Walls, Vice President and Conference Chair; Paul E. Proctor, Vice President and Distinguished Analyst;
F. Christian Byrnes, Managing Vice President; John A. Wheeler, Director
9:05 a.m. K1b. Gartner Opening Remarks Andrew Walls, Vice President and Conference Chair
9:45 a.m. W1. Workshop: Information Security Architecture 101 Tom Scholtz, Doug Simmons
10:15 a.m. T1. Tutorial: Top Security Trends and Take-Aways for 2013 and 2014 Ray Wagner
PC1. Sharing Data Without Losing It Jay Heiser
10:45 a.m. Solution Provider Sessions
11:30 a.m. PC4. SIEM Architecture and Operational Processes Anton Chuvakin GTP
PC5. Forget MDM: Extending Security and Identity to Mobile Apps Ramon Krikken GTP
2:00 p.m. W2. Workshop: How to Develop Effective and Efficient Disaster Recovery Plans Brian Zawada, ISO TC 223 U.S. Representative, Avalution Consulting; Roberta J. Witty,
John P. Morency, Belinda Wilson
2:15 p.m. T3. Tutorial: IAM Myths and Monsters
Ray Wagner
G2. GRC 4G: How Social, Big Data and Risk Analytics Are Changing GRC
French Caldwell
TUESDAY, JUNE 11
7:00 a.m. Power Breakfast: About Gartner and Security & Risk Management Research Andrew Walls, French Caldwell; Roberta J. Witty; Lawrence Orans; Roman Krikken; F. Christian Byrnes
HC1. Healthcare Moderated Breakfast: Fraud, Waste, Abuse and ICD-10
8:00 a.m. K2. The Intersection of National Security, Leadership and the Global Economy Admiral Mike Mullen, Chairman of the Joint Chiefs of Staff 2007-2011; Chief of Naval
Operations; Commander, U.S. Naval Forces Europe/Allied Joint Force Command Naples; Vice Chief of Naval Operations; Commander, U.S. Second Fleet
8:45 a.m. K3. Guest Keynote The Gartner Mastermind Interview Steve Bennett, CEO and Chairman of the Board, Symantec
11:15 a.m. F3. Security and Risk Management Technologies for Social Media
Andrew Walls
2:00 p.m. F4. CEO Concerns 2013 and the IT Implications Jorge Lopez
4:00 p.m. W8. Workshop: TBA
4:15 p.m. F5./G5. General Session: A Clash of Forces Managing Emerging Risks of the Nexus
5:30 p.m. K4. Gartner Keynote The Gartner Five-Year Security and Risk Scenario
G3. A New Way Forward: How to Create a Strategic Road Map for Compliance
John A. Wheeler
Andrew Walls , Vice President and Conference Chair; F. Christian Byrnes, Managing Vice President
WEDNESDAY, JUNE 12
7:00 a.m. HC2. Healthcare Moderated Breakfast: BYOD Best Practices in Healthcare Barry Runyon; Irma Fabular (Registration required; end users only.)
8:00 a.m. K5. Guest Keynote Whos Got Your Back: Creating and Developing Great Relationships Keith Ferrazzi, CEO, Ferrazzi Greenlight; Author of Whos Got Your Back and
Never Eat Alone
10:30 a.m. F6./G6. Leadership, Governance and Risk David Marquet, Author of the Award-Winning Book, Turn the Ship Around!; French Caldwell
11:30 a.m. F7. Road Map for Intelligent Information Governance Alan Dayley
G7. Defining Three Segments in the Audit Technology Market Khushbu Pratap
1:45 p.m. F8. Align Governance to Your Organization for Success
Julie Short
4:00 p.m. F9. To the Point: Working With the Board of Directors on Risk and Technology for
Competitive Advantage Jorge Lopez
4:30 p.m. F10. To the Point: Conquering the Last Frontier of Governance With Enterprise Legal
Management John A. Wheeler
6:00 p.m. Summit Party VIP Boat Cruise (By invitation only)
THURSDAY, JUNE 13
8:30 a.m. F11. The Four Faces of Governance
John A. Wheeler
10:30 a.m. F13. Shrink-Wrap Governance: A Guide to Understanding GRC Software and Services
G13. Debate: Cyberinsurance Evolution or Revolution? Paul E. Proctor, John A. Wheeler
French Caldwell
11:30 a.m. K6. Gartner Closing Insights Andrew Walls, Vice President and Conference Chair; French Caldwell, Vice President and Distinguished Analyst; Roberta J. Witty, Vice
President; Lawrence Orans, Director; Roman Krikken, Vice President; F. Christian Byrnes, Managing Vice President
Leadership, Governance and Risk David Marquet, Author of the Award-Winning book
Turn the Ship Around!; French Caldwell
Special risk-management-and-compliance networking opportunities
Gartner analysts focused on risk management and compliance, available for private one-on-one meetings
Visit gartner.com/us/securityrisk for agenda updates and to register
17
David W. Cearley
Vice President and
Gartner Fellow
Ruggero Contu
Director
Tom Scholtz
Business OF IT SECURITY
Lawrence Pingree
Director and Business of
IT Security Program Lead
4:30 p.m. J1. Global Security Markets: Where Are We Going From Here? Eric Ahlm, Ruggero Contu, Lawrence Pingree
5:30 p.m. J2. Survey Analysis: Examining the Gartner Global 2012 Security Conference Survey Results Eric Ahlm,
Ruggero Contu, Lawrence Pingree
6:15 p.m. Solution Showcase Evening Reception and Theater Presentations
TUESDAY, JUNE 11
HOT TOPICS
Forecast report/analysis
Market share reports
User wants and needs survey
Key vendor SWOT analysis
MQ/trend analysis
Startup company panel
7:00 a.m. Power Breakfast: About Gartner and Security & Risk Management Research Andrew Walls, French Caldwell;
Roberta J. Witty; Lawrence Orans; Roman Krikken; F. Christian Byrnes
HC1. Healthcare Moderated Breakfast: Fraud, Waste, Abuse and ICD-10 Christina Lucero, Irma Fabular
(Registration required; end users only.)
8:00 a.m. K2. The Intersection of National Security, Leadership and the Global Economy Admiral Mike Mullen,
Chairman of the Joint Chiefs of Staff 2007-2011; Chief of Naval Operations; Commander, U.S. Naval
Forces Europe/Allied Joint Force Command Naples; Vice Chief of Naval Operations; Commander,
U.S. Second Fleet
8:45 a.m. K3. Guest Keynote The Gartner Mastermind Interview Steve Bennett, CEO and Chairman of the Board,
Symantec
11:15 a.m. J3. User Survey Analysis: Security Services Market Trends Eric Ahlm
2:00 p.m. J4. Panel: Security Startups Leading the Way to Success Ruggero Contu, Lawrence Pingree, Gaurav
Banga,CEO, Bromiun; Mike Horn, CEO, NetCitadel; Pravin Kothari, CEO, CipherCloud; George Kurtz, CEO,
Crowdstrike; Gordon Shevlin, CEO, Allgress
4:15 p.m. J5. Buyers Are From Mars, Vendors Are From Venus Eric Ahlm, Rob McMillan
5:30 p.m. K4. Gartner Keynote The Gartner Five-Year Security and Risk Scenario
and Conference Chair; F. Christian Byrnes, Managing Vice President
6:30 p.m. Hospitality Suites
WEDNESDAY, JUNE 12
7:00 a.m. HC2. Healthcare Moderated Breakfast: BYOD Best Practices in Healthcare Barry Runyon; Irma Fabular
(Registration required; end users only.)
8:00 a.m. K5. Guest Keynote Whos Got Your Back: Creating and Developing Great Relationships Keith Ferrazzi,
CEO, Ferrazzi Greenlight; Author of Whos Got Your Back and Never Eat Alone
10:30 a.m. J6. Information Security: Process or Technology Which Way Do We Go? Jeffrey Wheatman, Jay Heiser,
Anton Chuvakin, Neil MacDonald, Tom Scholtz
11:30 a.m. J7. Management Still Doesnt Get Security (And What You Can Do About That) Paul E. Proctor
1:45 p.m. J8. TBA
4:00 p.m. J9. To the Point: Security Specialist Career Guide Prosper, Survive or Leave Joseph Feiman
4:30 p.m. J10. The Evolving Security Software Ecosystems: Gartner Predictions for the Markets Future Ruggero Contu
6:00 p.m. Summit Party VIP Boat Cruise (By invitation only)
THURSDAY, JUNE 13
8:30 a.m. J11. Top 10 Technology Trends for 2013: The Security Perspective David W. Cearley
9:30 a.m. J12. Gartner Security Market Magic Quadrant Reviews
Neil MacDonald, Joseph Feiman, Mark Nicolett
10:30 a.m. J13. Case Study TBA
11:30 a.m. K6. Gartner Closing Insights Andrew Walls, Vice President and Conference Chair; French Caldwell, Vice
President and Distinguished Analyst; Roberta J. Witty, Vice President; Lawrence Orans, Director; Roman
Krikken, Vice President; F. Christian Byrnes, Managing Vice President
18
SESSION DESCRIPTIONS
GTP Sessions by Gartner for Technical Professionals analysts
F Financial Services
G Government
Track A
The CISO
A1. Transform Your Security
and Risk Program or Find
Another Job
Only about 30% of IT risk and
security officers have truly risk-based
programs. The other 70% continue
to struggle with outdated security
programs that are doomed to repeat
the same failures. We have reached
a tipping point where transformation
is not just an option but a
requirement to keep your job.
Paul E. Proctor
A2. Preparing a Security
Strategic Plan
The Gartner five-year security and
risk scenario provides a target for
where your security and risk program
should be in 2018. This presentation
explains how to create a strategic
plan that can get you there.
F. Christian Byrnes
A3. Organizing for Success:
Developing Process-centric
Security Teams
There is no such thing as a perfect,
universally appropriate model for
security organizations. Security
organizations must reflect the political
and cultural realities of the enterprise.
Every enterprise must develop its
own process-based model, taking
into consideration basic principles
and practical realities.
Tom Scholtz
H Healthcare
EU Energy/Utilities
M Manufacturing
session DESCRIPTIONS
descriptions
SESSION
the risk effectiveness and business
alignment of the enterprises security
activities. The Gartner ITScore for
Information Security is designed to
help you achieve this. Take a brief
tour to see what maturity levels 1
through 4 look like, and where your
organization may fit.
Rob McMillan
A11. Case Study
TBA
A12. Panel: Reset Your IAM
Planning! Lessons from
the Veterans
Many enterprises have planned and
implemented IAM systems Now
its your turn. Where to begin? What
are the best practices? How do you
measure IAM project success? What
are the characteristics of a successful
IAM solution? This panel of IAM
veterans takes your questions and
discusses details about their
deployments.
Gregg Kreizman, Earl Perkins
A13. CISO Open Mic
Open opportunity for discussion and
sharing among CIO participants.
F. Christian Byrnes
20
IT Security
B1. Practicing Safe SaaS
Most enterprises continue to struggle
with the appropriate use of SaaS,
but for most organizations, no is
not the right answer. Standards and
practices for risk assessment and use
continue to evolve, but gaps still
remain. This presentation provides
guidance on the creation of a SaaS
usage profiles.
Jay Heiser
Track B
B2. Cyberthreat
Lawrence Orans
B3. Presenting a Hard Target to
Attackers: Operationally
Effective Vulnerability
Management
Todays attackers are getting better
at finding and exploiting security
weaknesses. The first order of
business is to present a hard target
to the attacker. Vulnerability
management needs to be extended
to deal with emerging threats, and
to accommodate the requirements
of cloud services. This presentation
G Government
H Healthcare
EU Energy/Utilities
M Manufacturing
Brian Lowans
Eric Ouellet
Brian Lowans
Eric Maiwald
GTP
21
session DESCRIPTIONS
descriptions
SESSION
Track C
IT Security
C1. Securing Private, Public and
Hybrid Cloud Computing
Neil MacDonald
C2. Panel: What Is the Future
of Mobile Management and
Security?
This debate tackles numerous
strategic and tactical questions on
the future of mobile security that are
vexing both vendors and clients
alike. The analyst presents multiple
scenarios and attempt to form a
consensus understanding where the
mobile security market is headed and
how it will transform IT.
Peter Firstbrook, Neil MacDonald,
John Girard
C3. Top 10 Security Myths
It is often said that ignorance is
bliss but only until the hack
occurs. This presentation introduces
some of the most common
misconceptions about security, and
concludes with best practices on
how to improve your organizations
risk management culture.
Jay Heiser
C4. How Can You Leverage
Content-Aware DLP to Ensure
Your Corporate Policies and
Processes Are Effective?
Your organization has expended
significant effort creating the perfect
policies and processes to address its
risk management needs. Sadly, most
organizations expect their staff and
contractors to automagically learn
and apply each of the policies in the
exact context intended, based solely
on a directive sent by email or via
22
G Government
H Healthcare
EU Energy/Utilities
M Manufacturing
Track D
IT Security
D1. Panel: Getting IAM Going
Best Practices for Formalizing
Your IAM Program
Moving from an informal, unmanaged
IAM program to a formal, managed,
efficient and effective model program
is a daunting task. This panel
discusses where to start and best
practices for creating a process
catalog, assigning program roles and
responsibilities, and implementing
policy and technology for a
successful maturation process.
Ant Allan, Earl Perkins, Ray Wagner
23
session DESCRIPTIONS
descriptions
SESSION
current and evolving solutions
to these problems.
Gregg Kreizman
TBA
Mario de Boer
D11. Getting to Single
Sign-on Securely
The quest for single sign-on (SSO) is
the result of disparate identity silos,
increased password-related support
costs, and user frustration. This
session helps attendees make
decisions regarding strategies and
tools to achieve SSO securely.
Gregg Kreizman
D12. Panel: A World Without
Passwords and Tokens
Ant Allan, Avivah Litan, Ian Glazer
D13. Identity and Access
Management Gets Social
Ant Allan
Track E
IT Security
E1. Big Data Discovery Using
Content-Aware Data Loss
Prevention (DLP) Solutions
Organizations large and small report
that they face significant challenges in
properly locating and identifying their
sensitive data within their big data
environments. This session discusses
how content-aware DLP tools are
Eric Ouellet
E2. Cloud Encryption: Strong
Security, Obfuscation or
Snake Oil?
Encryption is often used as a primary
means to protect data. But does
encryption work in the cloud? Maybe
it does for all of it, or maybe just for
some of it and this does matter,
because incorrect use of encryption
can result in a complete lack of
security. Understanding algorithm
and architecture options, and
knowing which ones work and which
ones dont, is critical to keeping your
data safe in the public cloud.
Ramon Krikken
GTP
E3. TBA
E4. Security Monitoring of
Public Cloud
Cloud security monitoring is an
afterthought for most organizations,
and as cloud usage expands and
new risks emerge, it can be left
behind altogether. However, security
monitoring must be deployed across
public clouds, private clouds and
traditional infrastructure and
enterprises, not the providers, own
that responsibility. Organizations
should push their providers for more
data feeds and telemetry, and plan
their monitoring architectures.
Anton Chuvakin
GTP
E5. Using Managed Containers
to Protect Information on
Mobile Devices
Managed containers are a
mechanism to protect enterprise
information on the mobile device
while separating it from employee
data. Enterprises should consider
G Government
H Healthcare
EU Energy/Utilities
M Manufacturing
Eric Maiwald
GTP
Kelly M. Kavanagh
Dionisio Zumerle
E11. Facing Information Sprawl:
Secure Synchronization of Data
on Endpoints
Organizations increasingly allow the
use of multiple endpoints for business
purposes. If no enterprise solution is
provided, users are creative in
synchronizing data to each of their
devices, increasing information
sprawl. Learn about the latest
synchronization solutions, their
security and deployment challenges.
Mario de Boer
GTP
Avivah Litan
E8. Case Study: A Successful
Implementation of the FICAM
Guidelines
TBA
E9. To the Point: Refresh
Vulnerability Assessment
Network vulnerability assessment is
a mature market. Vendors have
steadily added capabilities to their
VA scanning products to differentiate
Visit gartner.com/us/securityrisk for agenda updates and to register
25
session DESCRIPTIONS
descriptions
SESSION
IT SECURITY
PRECONFERENCE
SESSIONS
PC3. Now What? How to Use
Service Providers to Support
SIEM Operations
Gartner customers increasingly
request external services to support
their operational SIEM deployments.
In this presentation, we address the
best opportunities for external
support, and assess the capabilities
of several types of providers to
deliver operational support.
Kelly M. Kavanagh, Mark Nicolett
PC4. SIEM Architecture and
Operational Processes
Security information and event
management (SIEM) is a key
technology that provides security
visibility, but it suffers from challenges
with operational deployments.
This presentation reveals a guidance
framework that offers a structured
approach for architecting and
running an SIEM deployment at
a large enterprise or evolving a
stalled deployment.
Anton Chuvakin
GTP
IT SECURITY
WORKSHOPS
W1. Information Security
Architecture 101
Information security architecture is a
foundational element of any security
program. However, the term
architecture means different things
to different people, resulting in
confusion about the role of security
architecture. Gartner experts facilitate
a structured discussion on the
elements and success criteria of
security architecture practice.
Tom Scholtz
W4. Build an Effective Security
and Risk Program
Security and risk management is
maturing. Creating and formalizing a
program is relatively inexpensive, but
developing a mature program requires
support, a strategic approach and
adequate time. Modern enterprises
must transform their programs to align
with business need and address
cultural gaps with the non-IT parts
of the business.
Tom Scholtz, Rob McMillan,
Jeremy DHoinne
W5. Gartner Network
Security Design
This workshop highlights elements of
modern technical network security
architecture. These elements are
drawn from principles of the Gartner
Network Security Reference Model.
The majority of the workshop is
focused on examining participants
architecture and design issues.
Greg Young
W7. Getting Value Out of IT
Security and Risk Metrics
Programs
Security and risk metrics are subjects
of never-ending discussions. In this
26
G Government
H Healthcare
EU Energy/Utilities
M Manufacturing
IT SECURITY INDUSTRY
DAY SESSIONS
IG1. Case Study: Advanced,
Persistent and Threatening
Who Are the Attackers and
What Are They Doing?
Dave Monnier, Security Evangelist and
Fellow, Team Cymru; Lawrence Pingree
IG2. Critical Infrastructure
Protection Requirements Driving
New Security Demand
Government-led cybersecurity
initiatives and private sector critical
infrastructure protection activities
are pushing for greater industry
specific focus on security. This
session discusses how growing
pressure to protect from cyberthreat
will drive spend and strategies toward
information security.
Ruggero Contu
G
IG3. Best Practices for Mitigating
Advanced Persistent Threats
Advanced threats have increased in
recent years taking on much more
destructive characteristics than in the
past. This presentation covers
recommended best practices for
mitigating the risks associated with
advanced targeted attacks and teach
Gartner clients practical things they
can do.
Lawrence Pingree
G
IF1. Case Study
TBA
27
session DESCRIPTIONS
descriptions
SESSION
IH1. Dont Give Them The Keys to
the Kingdom Until You Know
Who They Are
This presentation outlines and
underscores the increasing
importance of identity management/
user provisioning within the
healthcare provider.
Barry Runyon
H
IT SECURITY TUTORIALS
T1. Top Security Trends and
Take-Aways for 2013 and 2014
With the Nexus of Forces driving
continuing trends in cloud,
consumerization, mobility and big
data, the way IT is delivered is
28
Ray Wagner
Ray Wagner
Track F
Risk Management
and Compliance
F2. Linking Risk to Business
Decision Making: Creating
KRIs That Matter
The term key risk indicator (KRI) has
come to mean our most important
metrics, but the criteria for most
important usually falls short of most
useful. The definition varies greatly
across different organizations, so there
are no standards. Good KRIs should
be tied to business impact and
influence business decision making.
Paul E. Proctor
F3. Security and Risk Management
Technologies for Social Media
Its all about social these days. Whether
it is social media, user behavior or the
interplay of society and your
organization, there are new risk and
security variables that must be
assessed and managed. This panel of
analysts will examine the risks and
G Government
H Healthcare
EU Energy/Utilities
M Manufacturing
French Caldwell
Track G
Risk Management
and Compliance
G2. GRC 4G: How Social,
Big Data and Risk Analytics
Are Changing GRC
GRC vendors have a lot of catching up
to do. Most vendors have yet to offer
effective third generation GRC, which
focuses on performance, much less
apply fourth generation GRC, which
focuses on decision making. However,
risk managers can help push the
envelope on what will be within the art
of the possible for the fourth generation
of GRC.
French Caldwell
G3. A New Way Forward:
How to Create a Strategic Road
Map for Compliance
Senior IT and business leaders face
an increasing number of compliance
requirements and a continued rise in
associated costs. In this session, you
learn how to create a strategic road map
for compliance highlighting key initiatives
that promote a risk-aware compliance
culture and leads to real business value.
Khushbu Pratap
G8. Top 5 IT Audit Trends in
2012-2013
Khushbu Pratap
G9. To the Point: Is Your Business
Keeping Up With the Changes and
Best Practices for E-Discovery?
As information compliance and
regulatory requirements mature, so
does the need for organizations to
hone e-discovery best practices and
implementations. This session
discusses changes in the e-discovery
market and how you can best adhere
to these changes.
Alan Dayley
G10. To the Point: Anti-Bribery
Fear and Hype Limits and
Uses of FCPA Solutions
French Caldwell
G11. Case Study
TBA
John A. Wheeler
Visit gartner.com/us/securityrisk for agenda updates and to register
29
session DESCRIPTIONS
descriptions
SESSION
G12. Why ERM and GRC Depend
on Each Other to Succeed
This session defines and explores the
symbiotic relationship between
enterprise risk management (ERM) and
governance, risk and compliance
(GRC). Today, companies are
challenged with finding better ways to
understand and analyze risk. Some
may look to ERM and others may focus
on GRC. To be truly effective, however,
companies need both.
John A. Wheeler
G13. Debate: Cyberinsurance
Evolution or Revolution?
Cyberinsurance should be a great idea,
but Gartner sees challenges for the
industry and for the insured. There is an
evolution of cyberinsurance that will
make it a worthy vehicle for risk transfer
by 2016, but today it is more of a
gamble. This debate covers the pros
and cons of cyberinsurance so you can
make an informed decision.
Paul E. Proctor, John A. Wheeler
RISK PRECONFERENCE
SESSIONS
PC1. Sharing Data Without
Losing It
Todays security managers are
struggling to meet the growing
demands to share enterprise data
with personal devices and external
parties. This pitch will provide a use
case model for the choice of
collaborative systems with data
protection technology that matches
business needs for data protection.
Jay Heiser
PC8. Road Stories: Lessons
Learnt (and Fingers Burnt) in IT
Risk Management
Risk management is more art than
science. The best way to learn risk
management is to practice it. The
approach must suit the culture of the
30
Tom Scholtz
RISK WORKSHOPS
W3. Selecting Solutions for the
Control and Monitoring of Public
Social Media
Public social media are used by
enterprises and individuals within the
enterprise. Security professionals
must assess security and compliance
risks, and understand the strengths and
weaknesses of monitoring and control
solutions. In this workshop you assess
the risks to your organization, and
select a set of technologies to
mitigate these.
Mario de Boer
GTP
W8. Workshop
TBA
W9. IT Risk Management:
Selecting the Best Assessment
Methods and Tools
This workshop focuses on the best
effort to select the an appropriate IT
risk assessment method.
Jeffrey Wheatman, Khushbu Pratap
W15. The Gartner Network
Security Architecture Reference
Model
TBA
RISK ANALYST-USER
ROUNDTABLES
AUR6. Supply Chain Risks
Leif Eriksen
AUR9. Auditors Role in
Emerging Risks
Internal auditors are sometimes the
G Government
H Healthcare
EU Energy/Utilities
M Manufacturing
RISK TUTORIALS
T2. Tell Me, Whats IT GRC Again?
(Solutions to Common Challenges)
IT GRC programs continue to be a
catch-all for policy, risk and compliance
activities. No clear and complete vision
of IT GRC has emerged, and GRC
activities tend to be matrixed across
the enterprise. Here a summary of
current research on IT GRC programs
will be reviewed, including
recommendations for planning and
executing IT GRC programs.
Erik T. Heidt
GTP
Track H
Business Continuity
Management (BCM)
H1. What Are the BCM Software
Markets and How to Get the
Most Out of Them
The BCM software market is a
subset of the broader response and
recovery marketplace for business
and IT disruptions. This session
provides the latest market analysis of
these tools so that organizations can
make the right tool choice for their
needs. It also discusses
complementary markets to ensure
better operational resilience.
Roberta J. Witty, John P. Morency,
Leif Eriksen, John Girard
H2. What You Can and Cannot
Do With Recovery Exercise
Management Automation
Exercising IT DRM plans is a must
do, not a would like to do activity.
However, increasing time and
resource costs demand more
efficient and effective approaches.
This session discusses recovery
31
session DESCRIPTIONS
descriptions
SESSION
exercise automation software, its
associated strengths and
weaknesses and how
it can be used to improve exercise
scope, execution and results.
John P. Morency
BCM PRECONFERENCE
SESSIONS
PC2. ISO 22301 Implementation
Session
Roberta J. Witty; John P. Morency;
Brian Zawada, ISO TC 223 U.S.
Representative, Avalution Consulting
PC6. End-User Case Study
TBA
G Government
BCM WORKSHOPS
W2. How to Develop Effective and
Efficient Disaster Recovery Plans
Regardless of size, industry or location,
every organization needs a BCM
program with a variety of recovery plans.
This workshop presents the steps and
processes required to develop effective
recovery plans. In addition, participants
are given a method to assess their
existing plans for improvement once
back at the office.
Brian Zawada, ISO TC 223 U.S.
Representative, Avalution Consulting;
Roberta J. Witty, John P. Morency,
Belinda Wilson
H Healthcare
Roberta J. Witty
AUR8. IT-DRM Management
Automation Roundtable
This roundtable allows conference
participants to discuss their
experience in using IT-DRM planning,
implementation and exercise
management automation software.
The focus is on the time and
cost required to implement the
software products, as well as the
related efficiency, effectiveness
and cost reduction benefits that
were achieved.
John P. Morency
T4. TBA
M Manufacturing
BCM ANALYST-USER
RoUNDTABLES
Roberta J. Witty
EU Energy/Utilities
BCM TUTORIALS
Track J
he Business of
T
IT Security
J1. Global Security Markets:
Where Are We Going From Here?
This presentation covers the security
markets worldwide and details the
market dynamics that are changing the
future of information security globally.
Gartner Invest clients and technology
providers must understand market
competitive dynamics in order to
compete into the future.
Eric Ahlm, Ruggero Contu,
Lawrence Pingree
J2. Survey Analysis: Examining the
Gartner Global 2012 Security
Conference Survey Results
This session examines the results
of survey data from Gartners
session DESCRIPTIONS
descriptions
SESSION
work efficiently and successfully on
your next deal.
Eric Ahlm, Rob McMillan
J6. Information Security: Process
or Technology Which Way Do
We Go?
The information security market is huge
and continually growing. Client
organizations have spent billions of
dollars on technology to solve the
information security problem; yet when
we speak to clients they dont really
feel any safer now than they did five or
10 years ago. Maybe throwing tools at
the problem is not the way to go!
Maybe the key to success is building
scalable, repeatable patterns of
behavior. This panel of analysts
discusses why process might be a
better point of focus than technology.
Jeffrey Wheatman, Jay Heiser,
Anton Chuvakin, Neil MacDonald,
Tom Scholtz
J7. Management Still Doesnt Get
Security (And What You Can Do
About That)
Many management teams just dont
get it. Security and IT risk become
priorities (for a while) after a failure but
after long periods without visible
failures they go back to not caring. A
modern security and IT risk program
needs continuously engaged decision
makers. Learn how to engage
executive management teams and
keep them continuously engaged.
Paul E. Proctor
34
J8. TBA
J9. To the Point: Security
Specialist Career Guide
Prosper, Survive or Leave
Cloud is a transformational
phenomenon that changes our
businesses and our IT organizations.
Will cloud transform IT workforce? Will
it threaten peoples job security?
Joseph Feiman
J10. The Evolving Security
Software Ecosystems: Gartner
Predictions for the Markets Future
The security market is being
transformed by new end-user
requirements as a result changes
brought by social, mobile, cloud and
big data. While consolidation remains
an important factor shaping the
marketplace, regeneration and
innovation introduced by constant
influx of startup players continues also
to be an influencer in this market. This
presentation analyzes the market-share
dynamics that have been shaping the
security ecosystem and discusses
potential future developments across
different segments.
Ruggero Contu
SOLUTION SHOWCASE
PREMIER SPONSORS
Cisco offers one of the largest portfolios of security solutions available. With these solutions, organizations can embrace new
market transformations, protect assets, empower employees, and accelerate business. Cisco takes a comprehensive approach
by integrating security into all parts of the network, and simplifies security challenges, such as: An increase of mobile devices on
the network; a move to a cloud-based infrastructure; and hackers that pose sophisticated and persistent threats to the network.
Dell SecureWorks uses cyber threat intelligence to provide predictive, continuous and responsive protection for thousands of organizations
worldwide. Enriched by intelligence from our Counter Threat Unit research team, Dell SecureWorks Information Security Services help
organizations predict threats, proactively fortify defenses, continuously detect and stop cyber-attacks, and recover faster from security
breaches. To learn more, visit www.secureworks.com.
Dell Software makes it easy to securely manage and protect applications, systems, devices and data to help organizations of all sizes fully
deliver on the promise of technology. Our simple yet powerful software combined with Dell hardware and services provide scalable,
end-to-end solutions to drive value and accelerate results. Whether its Windows infrastructure, the cloud and mobile computing, or networks,
databases and business intelligence, we dramatically reduce complexity and risk to unlock the power of IT. www.dell.com/software
HP provides complete information security solutions that protect the hybrid Enterprise. Our proactive approach to information security
optimizes your investment and improves your risk posture, thus enabling you to achieve better business results. HPs unrivalled capabilities
spanning security consulting, managed security services and market-leading products from HP ArcSight, HP Fortify, HP Atalla, and HP
TippingPoint deliver integrated security solutions to manage risk, deliver actionable security intelligence and integrated security operations.
HP is a trusted partner to thousands of global enterprise and government clients; We work with you to define and implement a holistic,
risk-based security strategy that supports your unique business requirements balancing risk with opportunity. www.hp.com
Lieberman Software provides award-winning privileged identity management and security management products to more than
1200 active customers worldwide, including 40% of the Fortune 50. By automatically discovering and managing privileged accounts
throughout the network, Lieberman Software helps secure access to sensitive systems and data, thereby reducing internal and external
security vulnerabilities, improving IT productivity and helping ensure regulatory compliance. Lieberman Software products scale to the largest
enterprises in the world and deploy in minutes.
Qualys is a pioneer and leading provider of cloud security and compliance solutions with over 6,000 customers in more than 100 countries,
and partnerships with leading managed service providers and consulting organizations worldwide. The QualysGuard Cloud Platform and
integrated suite of solutions helps organizations simplify security operations and lower the cost of compliance, delivering critical security
intelligence on demand and automating the full spectrum of auditing, compliance and protection for IT systems and Web applications.
RSA, The Security Division of EMC, is the premier provider of security, risk and compliance management solutions for business acceleration.
RSA helps organizations solve their most complex and sensitive security challenges by bringing visibility and trust to millions of user identities,
the transactions they perform and the data that is generated. RSA delivers identity assurance, encryption & key management, SIEM, Data
Loss Prevention, Continuous Network Monitoring, and Fraud Protection with industry leading eGRC capabilities and robust consulting services.
www.RSA.com
Symantec is a global leader in providing security, storage and system management solutions to help our customers from consumers and
small businesses to the largest global organizations secure and manage their information-driven world against more risks at more points,
more completely and efficiently. Our software and services protect completely, in ways that can be easily managed and with controls that can
be enforced automatically enabling confidence wherever information is used or stored.
Trend Micro is celebrating 25 years of innovation security and sharing our vision for a data-centric security framework. In our booth youll see
the Trend Micro Custom Defense Solution against advanced persistent threats (APTs). You will earn what we mean by complete end user
protection. And, youll understand how our virtualization and cloud customers are winning in the data center with integrated, agentless security.
Websense, Inc. (NASDAQ: WBSN), is a global leader in unified web security, email security, mobile security and data loss prevention
(DLP). The companys proven best-in-class information security solutions are available as appliance-based software or SaaS-based
cloud-based services. The Websense TRITON unified security solutions help organizations securely leverage traditional, social media
and cloud-based communications, while protecting from advanced threats, preventing loss of confidential information, and enforcing
Internet use and security policies.
Verizon Enterprise Solutions creates global connections that help generate growth, drive business innovation and move society forward.
With industry-specific solutions and a full range of global wholesale offerings provided over the companys secure mobility, cloud,
strategic networking and advanced communications platforms, Verizon Enterprise Solutions helps open new opportunities around the
world for innovation, investment and business transformation. Visit verizon.com/enterprise. Verizon Enterprise Solutions can help
safeguard your information from tomorrows threats and provide secure access where and when you need it. Access our dedicated
security solutions site to get the latest information, including insightful blogs from our engineers and consultants, plus in-depth papers,
video snapshots and our flagship Data Breach Investigations Report (DBIR), the most comprehensive review of security incidents
available. www.verizonenterprise.com/us/solutions/security/
PLATINUM SPONSORS
AirWatch is the leader in enterprise-grade mobility management and security solutions. Our highly scalable solution provides a real-time view
of an entire fleet of corporate and employee-owned Apple iOS, Android, Windows, BlackBerry and Symbian devices. As the largest MDM
provider, AirWatch offers the most comprehensive mobility management solution.
Akamai is the leading cloud platform for helping enterprises provide secure, high-performing user experiences on any device, anywhere.
Our Intelligent Platform removes the complexities of connecting the increasingly mobile world, supporting 24/7 consumer demand, and
enabling enterprises to securely leverage the cloud Akamai accelerates innovation in our hyperconnected world.
AT&T Inc. is a global leader in communications and a recognized leader in Business-related voice and data services, including global IP
services, hosting, applications, and managed services. Businesses all over the world, deploy AT&T services to improve productivity, manage
overall costs, and position themselves to take advantage of future technology enhancements.
Check Point Software Technologies Ltd. the worldwide leader in securing the Internet, provides customers with uncompromised protection
against all types of threats, reduces security complexity and lowers total cost of ownership. Customers include tens of thousands of
organizations of all sizes, including all Fortune and Global 100 companies. www.checkpoint.com
The Citrix Mobile Solutions Bundle, which is comprised of XenMobile MDM and CloudGateway, offers a complete enterprise mobility
management solution. It gives IT a comprehensive set of tools that make it easy to manage and secure devices, apps, and data. It allows
users to access any app from any device, giving them the freedom to experience work and life their way.
Fasoo has been successfully building its worldwide reputation as a leading enterprise DRM solution provider with the best-in-class solutions
and services. Fasoo has successfully retained its leadership in the enterprise DRM market by deploying solutions for more than 1,100
organizations in enterprise-wide level, securing more than 2 million users.
SOLUTION SHOWCASE
PLATINUM SPONSORS continued
FireEye is the leader in stopping todays new breed of cyber attacks such as zero-day and APT attacks that bypass traditional defenses
and compromise over 95% of networks. The FireEye solution is the worlds only signature-less protection against multiple threat vectors.
FireEye solutions are deployed by more than 25% of the Fortune 100.
Fortinet, a global provider of IT security, delivers customer-proven solutions that provide organizations with the power to protect and
control their IT infrastructure. Our customers rely on our technologies, solution architecture, and global security intelligence to block
threats and gain control of their network, data, and users.
IBM Security offers one of the worlds broadest, most advanced and integrated portfolios of enterprise security products and services.
The portfolio, supported by world-renowned IBM X-Force research and development, provides the security intelligence to help
holistically protect people, infrastructure, data and applications for protection against advanced threats in todays hyper-connected world.
McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC), is the worlds largest dedicated security technology company.
We are relentlessly focused on constantly finding new ways to keep our customers safe.
MetricStream is the market leader for integrated Governance, Risk, Compliance (GRC) Management Solutions, which includes solutions
for IT Risk & Compliance Management, Information Security Risk Management, Business Continuity Management, IT Disaster Recovery
Management, Audit Management, Policy Management, Supplier/Vendor Governance and Quality Management.
Palo Alto Networks is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy
control of applications and content at up to 20Gbps with no performance degradation regardless of port, protocol, evasive tactic or SSL
encryption.
Secunia is the leading provider of IT security solutions that help businesses and private individuals globally manage and control
vulnerability threats and risks across their networks and endpoints. This is enabled by Secunias award-winning Vulnerability Intelligence,
Vulnerability Assessment, and Patch Management solutions that ensure optimal protection of critical information assets.
SilverSky is the expert provider of cloud security services. The company delivers the industrys only advanced Security-as-a-Service
platform thats simple to deploy and transformational to use. By tirelessly safeguarding corporate communications and infrastructure,
SilverSky enables growth-minded leaders to pursue their business ambitions without security worry.
R E L EVA N T . I N T E L L I G E N T . S EC U R IT Y
Solutionary reduces the information security and compliance burden, providing flexible managed security and compliance services that
work the way clients want; enhancing existing initiatives, infrastructure and personnel. Our patented technology, systems and process,
and our actionable threat intelligence make our clients smarter. We call this relevant, intelligent security
Sonatype CLM fixes the risk in open source. Security teams and application developers rely on Sonatype CLM across the software
lifecycle to identify risky open source components, enforce policy, and fix flaws. http://www.sonatype.com/
Sourcefire, Inc. is world leader in intelligent cybersecurity solutions. Trusted by organizations and government agencies in more than
180 countries, Sourcefires solutions, including industry-leading next-generation network security appliances and advanced malware
protection, provide customers with Agile Security for continuous protection in a world of continuous change.
Stonesoft delivers software-based network security to secure information flow and simplify security management. The companys
products include next generation firewalls, intrusion prevention systems, and SSL VPN solutions. Stonesoft has the highest customer
retention rate in the industry due to low TCO, ease of management, and prevention of advanced evasion techniques.
Tripwire is a leading global provider of IT security solutions for enterprises, government agencies and service providers who need to
protect their sensitive data on critical infrastructure from breaches, vulnerabilities, and threats. Thousands of customers rely on Tripwires
critical security controls like security configuration management, file integrity monitoring, and log and event management.
Trustwave is a leading provider of compliance, Web, application, network and data security solutions delivered through the cloud,
managed security services, software and appliances. Trustwave has helped hundreds of thousands of organization manage compliance
and secure their network infrastructures, data communications and critical information assets. For more information,
visit https://www.trustwave.com.
Veracode provides the worlds leading Application Risk Management Platform. Veracodes patented and proven cloud-based capabilities
allow customers to govern and mitigate software security risk across a single application or an enterprise portfolio with unmatched
simplicity. Veracode was founded with one simple mission in mind: to make it simple and cost-effective for organizations to accurately
identify and manage application security risk.
VMware is the global leader in virtualization and cloud infrastructure solutions that enable businesses to thrive in the Cloud Era.
With more than 400,000 customers and 55,000 partners, organizations of all sizes rely on VMware to help them transform the way
they build, deliver and consume Information Technology resources in a manner that is evolutionary and based on their specific needs.
Voltage Security, Inc. is the leading data protection provider, delivering secure, scalable, and proven data-centric encryption solutions,
enabling our customers to effectively combat new and emerging security threats. Our data protection solutions allow any company to
seamlessly secure all types of sensitive information, while efficiently meeting compliance and privacy requirements.
WhiteHat Security is the leading provider of website risk management solutions that protect critical data, ensure compliance and narrow
the window of risk. WhiteHat Sentinel, the companys flagship product family, is the most accurate and cost-effective website vulnerability
management solution available, delivering the visibility, flexibility, and control that organizations need to prevent website attacks.
www.whitehatsec.com.
36
SOLUTION SHOWCASE
SILVER SPONSORS
Absolute Software Corp.
EventTracker
Lancope
PhishMe, Inc.
AccessData
Bradford Networks
F5 Networks
LANDesk Software
Proofpoint, Inc.
TITUS
Brinqa
Fiberlink
LockPath
TrustSphere
AgeTak
Bromium
FireHost
LogRythm
Rapid7
Tufin Technologies
Agiliance
Centrify
FireMon
Mandiant
RedSeal Networks
Venafi, Inc.
AhnLab
Core Security
Rsam
Verdasys
AlertEnterprise Inc.
Courion Corporation
Fischer International
Identity
Modulo
SailPoint
Vormetric, Inc.
Appthority, Inc.
Coverity, Inc.
NetIQ
Sath Technologies
WatchDox
Aveksa
Critical Watch
Neustar
SecureAuth
Axis Technology
Cyber-Ark Software
HID Global
Norman AS
SOA Software
WatchGuard
Technologies, Inc.
Axway
CYBEROAM
Hitachi ID Systems
NSFOCUS
Software AG
Damballa
Identropy
NuData Security
Splunk
BeyondTrust
Imperva
Okta
Integralis
OpenTrust
SSH Communications
Security
Juniper Networks
Oracle
Bit9
Bloomberg Vault
DriveSavers Data
Recovery
FishNet Security
General Dynamics Fidelis
Cybersecurity Solutions
Wontok
Xceedium, Inc.
ZixCorp
Zscaler
MEDIA PARTNERS
BECOME A SPONSOR
Jason Bonsignore
Account Manager
+1 203 316 6050
jason.bonsignore@gartner.com
Silas Mante
Account Manager
+1 203 316 3778
silas.mante@gartner.com
John Forcino
Account Manager
+1 203 316 6142
john.forcino@gartner.com
David Sorkin
Sales Director
+1 203 316 3561
david.sorkin@gartner.com
Krista Way
Account Manager
+1 203 316 6763
krista.way@gartner.com
Visit gartner.com/us/securityrisk for agenda updates and to register
37
AGENDA at a glance
Agenda as of April 25, 2013, and subject to change
MONDAY, JUNE 10
8:00 a.m. Event Orientation
8:15 a.m. K1a. Gartner Opening Global Keynote Reset Andrew Walls, Vice President and Conference Chair; Paul E. Proctor, Vice President and Distinguished Analyst;
F. Christian Byrnes, Managing Vice President; John A. Wheeler, Director
9:05 a.m. K1b. Gartner Opening Remarks Andrew Walls, Vice President and Conference Chair
9:45 a.m. IG1. Case Study: Advanced, Persistent and Threatening Who Are the Attackers and What Are They Doing? Dave Monnier, Security Evangelist and Fellow, Team Cymru;
Lawrence Pingree
10:45 a.m. Solution Provider Sessions
11:30 a.m. IG2. Critical Infrastructure Protection Requirements Driving New Security Demand Ruggero Contu G
2:15 p.m. IG3. Best Practices for Mitigating Advanced Persistent Threats Lawrence Pingree G
CISO
4:30 p.m. A1. Transform Your Security and Risk Program or Find Another Job Paul E. Proctor
5:30 p.m. A2. Preparing a Security Strategic Plan F. Christian Byrnes
6:15 p.m. Solution Showcase Evening Reception and Theater Presentations
TUESDAY, JUNE 11
7:00 a.m. Power Breakfast: About Gartner and Security & Risk Management Research Andrew Walls, French Caldwell; Roberta J. Witty; Lawrence Orans; Roman Krikken; F. Christian Byrnes
HC1. Healthcare Moderated Breakfast: Fraud, Waste, Abuse and ICD-10
8:00 a.m. K2. The Intersection of National Security, Leadership and the Global Economy Admiral Mike Mullen, Chairman of the Joint Chiefs of Staff 2007-2011; Chief of Naval
Operations; Commander, U.S. Naval Forces Europe/Allied Joint Force Command Naples; Vice Chief of Naval Operations; Commander, U.S. Second Fleet
8:45 a.m. K3. Guest Keynote The Gartner Mastermind Interview Steve Bennett, CEO and Chairman of the Board, Symantec
10:00 a.m. W6. Workshop: Use a Balanced Scorecard to Demonstrate Securitys Value Rob McMillan
11:15 a.m. A3. Organizing for Success: Developing Process-centric Security Teams Tom Scholtz
2:00 p.m. A4. Finding the Optimal Balance Between Behavioral and Technical Controls
Andrew Walls
4:15 p.m. A5. Maverick Research: Transform Your Security Program From Control-centric to People-centric Tom Scholtz
5:30 p.m. K4. Gartner Keynote The Gartner Five-Year Security and Risk Scenario
Vice President
6:30 p.m. Hospitality Suites
Andrew Walls , Vice President and Conference Chair; F. Christian Byrnes, Managing
WEDNESDAY, JUNE 12
7:00 a.m. HC2. Healthcare Moderated Breakfast: BYOD Best Practices in Healthcare Barry Runyon; Irma Fabular (Registration required; end users only.)
8:00 a.m. K5. Guest Keynote Whos Got Your Back: Creating and Developing Great Relationships
and Never Eat Alone
9:15 a.m. Solution Provider Sessions
Keith Ferrazzi, CEO, Ferrazzi Greenlight; Author of Whos Got Your Back
10:30 a.m. A6. That Frightening Phrase: The Standard of Due Care Rob McMillan
11:30 a.m. A7. The Care and Feeding of an Effective Awareness Program Andrew Walls
1:45 p.m. A8. Using Outside Resources: Security Consultants and Threat Intelligence Services Rob McMillan
4:00 p.m. A9. To the Point: The Risk Management Maturity Pathway Rob McMillan
4:30 p.m. A10. To the Point: The Information Security Maturity Pathway Rob McMillan
6:00 p.m. Summit Party VIP Boat Cruise (By invitation only)
THURSDAY, JUNE 13
7:00 a.m. HC3. HIPPA Security (Registration required; end users only.) Irma Fabular, Wes Rishel, Alice Wang
8:30 a.m. A11. Case Study
TBA
9:30 a.m. A12. Panel: Reset Your IAM Planning! Lessons From the Veterans Gregg Kreizman, Earl Perkins
10:30 a.m. A13. Open Mic
F. Christian Byrnes
11:30 a.m. K6. Gartner Closing Insights Andrew Walls, Vice President and Conference Chair; French Caldwell, Vice President and Distinguished Analyst; Roberta J. Witty,
Vice President; Lawrence Orans, Director; Roman Krikken, Vice President; F. Christian Byrnes, Managing Vice President
F Financial Services
G Government
H Healthcare
M Manufacturing
AGENDA at a glance
MONDAY, JUNE 10
8:00 a.m. Event Orientation
8:15 a.m. K1a. Gartner Opening Global Keynote Reset Andrew Walls, Vice President and Conference Chair; Paul E. Proctor, Vice President and Distinguished Analyst;
F. Christian Byrnes, Managing Vice President; John A. Wheeler, Director
9:05 a.m. K1b. Gartner Opening Remarks Andrew Walls, Vice President and Conference Chair
9:45 a.m. IF1. Case Study TBA
IH1. Dont Give Them the Keys to the
IME1. Understand OT: The Emerging
IME2. Supply Chain IT Risk
Kingdom Until You Know Who They Are
Risks From Advanced Automation
Challenges: What Exactly Is That
Barry Runyon H
Earl Perkins, Kristian Steenstrup EU M
Supplier Doing? Erik T. Heidt GTP
10:45 a.m. Solution Provider Sessions
11:30 a.m. IF2. Do I Need Cyberinsurance? Juergen Weiss
IH2. HIPAA Bites: Getting Ready for HIPAA IME3. Securing the OT Environment
F
2:15 p.m. IF3. Strategic Road Map for Financial Services
Enterprise Risk Management John A. Wheeler
IT SECURITY
4:30 p.m. B1. Practicing Safe SaaS Jay Heiser
W4. Workshop: Build an Effective Security and Risk Program Tom Scholtz,
Rob McMillan, Jeremy DHoinne
5:30 p.m. B2. Cyberthreat Lawrence Orans
C2. Panel: What Is the Future of Mobile
Management and Security?
Peter Firstbrook, Neil MacDonald,
John Girard
6:15 p.m. Solution Showcase Evening Reception and Theater Presentations
TUESDAY, JUNE 11
7:00 a.m. Power Breakfast: About Gartner and Security & Risk Management Research Andrew Walls, French Caldwell; Roberta J. Witty; Lawrence Orans; Roman Krikken; F. Christian Byrnes
HC1. Healthcare Moderated Breakfast: Fraud, Waste, Abuse and ICD-10
10:00 a.m. W7. Getting Value Out of IT Security and Risk Metrics Programs Ramon Krikken GTP
11:15 a.m. B3. Presenting a Hard Target to Attackers:
C3. Top 10 Security Myths Jay Heiser
Operationally Effective Vulnerability Management
Mark Nicolett
2:00 p.m. B4. Panel: Real-World Case Studies in Mobile
C4. How Can You Leverage Content-Aware
Banking Security Moderator: Avivah Litan;, Dave
DLP to Ensure Your Corporate Policies and
Jevans, Chairman, Anti-Phishing Working Group,
Processes Are Effective? Eric Ouellet
Marble Security; Vas Rajan, Chief Information
Security Officer, CLS Bank; Tim Wainwright,
Managing Director, CISSP, Security Risk Advisor
4:15 p.m. B5. Mobile Device Security Exploits in Depth John
C5. Endpoint Security When the
Girard, Dionisio Zumerle
Consumer Is King Peter Firstbrook
5:30 p.m. K4. Gartner Keynote The Gartner Five-Year Security and Risk Scenario
E3. TBA
WEDNESDAY, JUNE 12
7:00 a.m. HC2. Healthcare Moderated Breakfast: BYOD Best Practices in Healthcare Barry Runyon; Irma Fabular (Registration required; end users only.)
8:00 a.m. K5. Guest Keynote Whos Got Your Back: Creating and Developing Great Relationships
Never Eat Alone
9:15 a.m. Solution Provider Sessions
10:30 a.m. B6. Preparing Your Security Program for BYOD
Eric Ahlm
Keith Ferrazzi, CEO, Ferrazzi Greenlight; Author of Whos Got Your Back and
Eric Maiwald
THURSDAY, JUNE 13
8:30 a.m. B11. The Seven Dimensions of Context-Aware
Security Avivah Litan
AGENDA at a glance
Agenda as of April 25, 2013, and subject to change
MONDAY, JUNE 10
8:00 a.m. Event Orientation
8:15 a.m. K1a. Gartner Opening Global Keynote Reset Andrew Walls, Vice President and Conference Chair; Paul E. Proctor, Vice President and Distinguished Analyst;
F. Christian Byrnes, Managing Vice President; John A. Wheeler, Director
9:05 a.m. K1b. Gartner Opening Remarks Andrew Walls, Vice President and Conference Chair
9:45 a.m. PC2. ISO 22301 Implementation Session Roberta J. Witty; John P. Morency; Brian Zawada, ISO TC 223 U.S. Representative, Avalution Consulting
10:45 a.m. Solution Provider Sessions
11:30 a.m. T4. TBA
2:00 p.m. W3. Workshop: Selecting Solutions for the Control and Monitoring of Public Social Media
2:15 p.m. PC7. Using MSSPs for Effective Threat Management Kelly M. Kavanagh
Mario de Boer
GTP
BCM
4:30 p.m. H1. What Are the BCM Software Markets and How to Get the Most Out of Them
5:30 p.m. H2. What You Can and Cannot Do With Recovery Exercise Management Automation
John P. Morency
TUESDAY, JUNE 11
7:00 a.m. Power Breakfast: About Gartner and Security & Risk Management Research Andrew Walls, French Caldwell; Roberta J. Witty; Lawrence Orans; Roman Krikken;
F. Christian Byrnes
HC1. Healthcare Moderated Breakfast: Fraud, Waste, Abuse and ICD-10 Christina Lucero, Irma Fabular (Registration required; end users only.)
8:00 a.m. K2. The Intersection of National Security, Leadership and the Global Economy Admiral Mike Mullen, Chairman of the Joint Chiefs of Staff 2007-2011; Chief of Naval
Operations; Commander, U.S. Naval Forces Europe/Allied Joint Force Command Naples; Vice Chief of Naval Operations; Commander, U.S. Second Fleet
8:45 a.m. K3. Guest Keynote The Gartner Mastermind Interview Steve Bennett, CEO and Chairman of the Board, Symantec
11:15 a.m. H3. Case Study: Business Continuity Metrics From Project to Program to Incident Management Roberta J. WittyBCM Metrics
TBA
2:00 p.m. H4. Cloud Service Provider Risk Management Donna Scott, John P. Morency, Jay Heiser
4:15 p.m. H5. Managing Global Recovery and Continuity Risk
5:30 p.m. K4. Gartner Keynote The Gartner Five-Year Security and Risk Scenario
Managing Vice President
6:30 p.m. Hospitality Suites
WEDNESDAY, JUNE 12
7:00 a.m. HC2. Healthcare Moderated Breakfast: BYOD Best Practices in Healthcare Barry Runyon; Irma Fabular (Registration required; end users only.)
8:00 a.m. K5. Guest Keynote Whos Got Your Back: Creating and Developing Great Relationships Keith Ferrazzi, CEO, Ferrazzi Greenlight; Author of Whos Got Your Back
and Never Eat Alone
10:30 a.m. H6. What You Need to Know About Technical IT-DRM Architectures Donna Scott, John P. Morency
11:30 a.m. H7. Case Study TBA
1:45 p.m. H8. Recovery Exercising Best Practices Belinda Wilson
4:00 p.m. H9. To the Point: BCM Grows Up How a Nexus of Technologies Is Moving BCM Into the C-Suite Roberta J. Witty
4:30 p.m. H10. To the Point: The Business Continuity Management Planning Market in Depth Roberta J. Witty, John P. Morency
6:00 p.m. Summit Party VIP Boat Cruise (By invitation only)
THURSDAY, JUNE 13
8:30 a.m. H11. Supplier Contingency Planning: What You Need to Know for Supplier Recovery Gayla Sullivan
9:30 a.m. H12. Designing and Architecting for 24/7 Availability Donna Scott
10:30 a.m. H13. How to Conduct an Effective BIA Belinda Wilson
11:30 a.m. K6. Gartner Closing Insights Andrew Walls, Vice President and Conference Chair; French Caldwell, Vice President and Distinguished Analyst; Roberta J. Witty,
Vice President; Lawrence Orans, Director; Roman Krikken, Vice President; F. Christian Byrnes, Managing Vice President
F Financial Services
G Government
H Healthcare
M Manufacturing
AGENDA at a glance
Agenda as of April 25, 2013, and subject to change
MONDAY, JUNE 10
8:00 a.m. Event Orientation
8:15 a.m. K1a. Gartner Opening Global Keynote Reset Andrew Walls, Vice President and Conference Chair; Paul E. Proctor, Vice President and Distinguished Analyst;
F. Christian Byrnes, Managing Vice President; John A. Wheeler, Director
9:05 a.m. K1b. Gartner Opening Remarks Andrew Walls, Vice President and Conference Chair
9:45 a.m. W1. Workshop: Information Security Architecture 101 Tom Scholtz, Doug Simmons
10:15 a.m. T1. Tutorial: Top Security Trends and Take-Aways for 2013 and 2014 Ray Wagner
PC1. Sharing Data Without Losing It Jay Heiser
10:45 a.m. Solution Provider Sessions
11:30 a.m. PC4. SIEM Architecture and Operational Processes Anton Chuvakin GTP
PC5. Forget MDM: Extending Security and Identity to Mobile Apps Ramon Krikken GTP
2:00 p.m. W2. Workshop: How to Develop Effective and Efficient Disaster Recovery Plans Brian Zawada, ISO TC 223 U.S. Representative, Avalution Consulting; Roberta J. Witty,
John P. Morency, Belinda Wilson
2:15 p.m. T3. Tutorial: IAM Myths and Monsters
Ray Wagner
G2. GRC 4G: How Social, Big Data and Risk Analytics Are Changing GRC
French Caldwell
TUESDAY, JUNE 11
7:00 a.m. Power Breakfast: About Gartner and Security & Risk Management Research Andrew Walls, French Caldwell; Roberta J. Witty; Lawrence Orans; Roman Krikken;
F. Christian Byrnes
HC1. Healthcare Moderated Breakfast: Fraud, Waste, Abuse and ICD-10 Christina Lucero, Irma Fabular (Registration required; end users only.)
8:00 a.m. K2. The Intersection of National Security, Leadership and the Global Economy Admiral Mike Mullen, Chairman of the Joint Chiefs of Staff 2007-2011; Chief of Naval
Operations; Commander, U.S. Naval Forces Europe/Allied Joint Force Command Naples; Vice Chief of Naval Operations; Commander, U.S. Second Fleet
8:45 a.m. K3. Guest Keynote The Gartner Mastermind Interview Steve Bennett, CEO and Chairman of the Board, Symantec
11:15 a.m. F3. Security and Risk Management Technologies for Social Media
Andrew Walls
2:00 p.m. F4. CEO Concerns 2013 and the IT Implications Jorge Lopez
4:00 p.m. W8. Workshop: TBA
4:15 p.m. F5./G5. General Session: A Clash of Forces Managing Emerging Risks of the Nexus
5:30 p.m. K4. Gartner Keynote The Gartner Five-Year Security and Risk Scenario
Managing Vice President
6:30 p.m. Hospitality Suites
G3. A New Way Forward: How to Create a Strategic Road Map for Compliance
John A. Wheeler
G4. Maverick Research: Crowdsource Your Management of Operational Risk
Leif Eriksen, Paul E. Proctor
W9. Workshop: IT Risk Management Selecting the Best Assessment Methods and
Tools Jeffrey Wheatman, Khushbu Pratap
French Caldwell, Andrew Walls, panelists
WEDNESDAY, JUNE 12
7:00 a.m. HC2. Healthcare Moderated Breakfast: BYOD Best Practices in Healthcare Barry Runyon; Irma Fabular (Registration required; end users only.)
8:00 a.m. K5. Guest Keynote Whos Got Your Back: Creating and Developing Great Relationships Keith Ferrazzi, CEO, Ferrazzi Greenlight; Author of Whos Got Your Back
and Never Eat Alone
10:30 a.m. F6./G6. Leadership, Governance and Risk David Marquet, Author of the Award-Winning Book, Turn the Ship Around!; French Caldwell
11:30 a.m. F7. Road Map for Intelligent Information Governance Alan Dayley
G7. Defining Three Segments in the Audit Technology Market Khushbu Pratap
1:45 p.m. F8. Align Governance to Your Organization for Success
Julie Short
4:00 p.m. F9. To the Point: Working With the Board of Directors on Risk and Technology for
Competitive Advantage Jorge Lopez
4:30 p.m. F10. To the Point: Conquering the Last Frontier of Governance With Enterprise Legal
Management John A. Wheeler
6:00 p.m. Summit Party VIP Boat Cruise (By invitation only)
THURSDAY, JUNE 13
8:30 a.m. F11. The Four Faces of Governance
John A. Wheeler
F Financial Services
G Government
H Healthcare
M Manufacturing
AGENDA at a glance
Agenda as of April 25, 2013, and subject to change
MONDAY, JUNE 10
8:00 a.m. Event Orientation
8:15 a.m. K1a. Gartner Opening Global Keynote Reset Andrew Walls, Vice President and Conference Chair; Paul E. Proctor, Vice President and Distinguished Analyst;
F. Christian Byrnes, Managing Vice President; John A. Wheeler, Director
9:05 a.m. K1b. Gartner Opening Remarks Andrew Walls, Vice President and Conference Chair
9:45 a.m. PC3. Now What? How to Use Service Providers to Support SIEM Operations Kelly M. Kavanagh, Mark Nicolett
10:45 a.m. Solution Provider Sessions
11:30 a.m. T2. Tutorial: Tell Me, Whats IT GRC Again? (Solutions to Common Challenges) Erik T. Heidt GTP
2:15 p.m. PC8. Road Stories: Lessons Learnt (and Fingers Burnt) in IT Risk Management
Tom Scholtz
Business OF IT SECURITY
4:30 p.m. J1. Global Security Markets: Where Are We Going From Here? Eric Ahlm, Ruggero Contu, Lawrence Pingree
5:30 p.m. J2. Survey Analysis: Examining the Gartner Global 2012 Security Conference Survey Results Eric Ahlm,
Ruggero Contu, Lawrence Pingree
6:15 p.m. Solution Showcase Evening Reception and Theater Presentations
TUESDAY, JUNE 11
7:00 a.m. Power Breakfast: About Gartner and Security & Risk Management Research Andrew Walls, French Caldwell; Roberta J. Witty; Lawrence Orans; Roman Krikken; F. Christian Byrnes
HC1. Healthcare Moderated Breakfast: Fraud, Waste, Abuse and ICD-10
8:00 a.m. K2. The Intersection of National Security, Leadership and the Global Economy Admiral Mike Mullen, Chairman of the Joint Chiefs of Staff 2007-2011; Chief of Naval
Operations; Commander, U.S. Naval Forces Europe/Allied Joint Force Command Naples; Vice Chief of Naval Operations; Commander, U.S. Second Fleet
8:45 a.m. K3. Guest Keynote The Gartner Mastermind Interview Steve Bennett, CEO and Chairman of the Board, Symantec
11:15 a.m. J3. User Survey Analysis: Security Services Market Trends Eric Ahlm
2:00 p.m. J4. Panel: Security Startups Leading the Way to Success Ruggero Contu, Lawrence Pingree, Gaurav Banga,CEO, Bromiun; Mike Horn, CEO, NetCitadel; Pravin Kothari, CEO,
CipherCloud; George Kurtz, CEO, Crowdstrike; Gordon Shevlin, CEO, Allgress
4:15 p.m. J5. Buyers Are From Mars, Vendors Are From Venus Eric Ahlm, Rob McMillan
5:30 p.m. K4. Gartner Keynote The Gartner Five-Year Security and Risk Scenario
Vice President
6:30 p.m. Hospitality Suites
Andrew Walls , Vice President and Conference Chair; F. Christian Byrnes, Managing
WEDNESDAY, JUNE 12
HC2. Healthcare Moderated Breakfast: BYOD Best Practices in Healthcare Barry Runyon; Irma Fabular (Registration required; end users only.)
8:00 a.m. K5. Guest Keynote Whos Got Your Back: Creating and Developing Great Relationships Keith Ferrazzi, CEO, Ferrazzi Greenlight; Author of Whos Got Your Back
and Never Eat Alone
10:30 a.m. J6. Information Security: Process or Technology Which Way Do We Go? Jeffrey Wheatman, Jay Heiser, Anton Chuvakin, Neil MacDonald, Tom Scholtz
11:30 a.m. J7. Management Still Doesnt Get Security (And What You Can Do About That)
Paul E. Proctor
THURSDAY, JUNE 13
8:30 a.m. J11. Security: A Financial Perspective Frank Marsala
9:30 a.m. J12. Gartner Security Market Magic Quadrant Reviews
10:30 a.m. J13. Case Study
Avivah Litan, John Girard, Kelly M. Kavanagh, Neil MacDonald, Joseph Feiman, Mark Nicolett
TBA
11:30 a.m. K6. Gartner Closing Insights Andrew Walls, Vice President and Conference Chair; French Caldwell, Vice President and Distinguished Analyst; Roberta J. Witty,
Vice President; Lawrence Orans, Director; Roman Krikken, Vice President; F. Christian Byrnes, Managing Vice President
F Financial Services
G Government
H Healthcare
M Manufacturing
3 WAYS TO REGISTER
Web: gartner.com/us/securityrisk
Email: us.registration@gartner.com
Phone: 1 866 405 2511
REGISTER TODAY
Standard price: $2,375
Team benefits
Complimentary registrations
SPECIAL GARTNER
HOTEL ROOM RATE
$247 per night (plus tax) at
Gaylord National Resort and
Convention Center
201 Waterfront Street
National Harbor, MD 20745
Phone: +1 301 965 4000
gaylordhotels.com
43
Gartner, Inc.
56 Top Gallant Road
Stamford, CT 06902-7700
Presorted
Standard
U.S. Postage
PAID
Gartner
PO Box 29307
Shawnee, KS 66201
Priority code
3 WAYS TO REGISTER
Web: gartner.com/us/securityrisk
Email: us.registration@gartner.com
ABOUT GARTNER
Gartner is the worlds leading information technology research and advisory
company. We deliver to our clients the technology-related insight and intelligence
necessary to make the right decisions, every day. Our pivotal advantage: More
than 900 analysts delivering independent thinking and actionable guidance to
clients in over 13,000 organizations worldwide the majority from the Fortune
1000 and Global 500. This extensive body of knowledge, insight and expertise
informs all of our 60+ events around the world. You simply wont find this
unique quality of content at any other IT conference. Why? Because no one
understands the impact of technology on global business like we do.
2013 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a
registered trademark of Gartner, Inc. or its affiliates. For more information,
email info@gartner.com or visit gartner.com.