Felipe Contin Sampaio 3:26 PM (0 minutes ago) to me

BR +55 11 3069 3925 | USA +1 469 620 7643

Why Go To The Gartner Security & Risk Management Summit 2019

by | Aug 1, 2019 | BLOG

Until some time ago, Business Risk Management was linked to aspects such as productivity, market, resources, or regulatory environment. However, with digital transformation through the introduction of technologies such as Big Data, Cloud, Internet of Things, Machine Learning and Artificial Intelligence, Information Technology has become a part of the strategy from organizations of various sizes and industries.

In addition, the need for data protection is now required not only by regulations such as LGPD and GDPR, but also by customers, suppliers, third parties, and service providers. Thus, the IT strategy has come to be directly connected with risks and business continuity, helping organizations overcome threat challenges in this new digital environment. 

In this context, Gartner offers, through its 15,000 associates, programs and services to assist companies in making strategic decisions, including those related to Risk Management and Cybersecurity. According to Gartner, 95% of CIOs believe cybersecurity threats will increase and impact their organizations. In addition, by the time LGPD takes effect in August 2020, less than 30% of all organizations subject to the new legislation will be fully compliant.

The Continuous Adaptive Risk and Trust Assessment (CARTA) approach, introduced in 2017, brings a new strategic cybersecurity model to support digital business transformation against the situation of new threats and challenges related to Information Security. In the Top 7 Security and Risk Trends document, Gartner highlights 7 security-and-risk-related trends. Despite not being widely recognized by the market yet, Gartner points out that these trends point to strategic changes in the security ecosystem, and possibly have a major impact on the industry.

Finally, more than 80,000 business leaders and executives attend more than 75 Gartner conferences held annually worldwide. These conferences address issues related not only to Technology, but also to Marketing, Sales, and Human Resources. One of these events is the Gartner’s Security and Risk Management Conference, which will be held in 2019 in several cities around the world, including Brazil. 

On the 13th and 14th of August, the Security and Risk Management Conference will bring over 50 sessions with its experts to the Sheraton São Paulo WTC Hotel. Gartner’s goal is to provide more than 1,900 IT professionals and leaders, from organizations across many industries and sizes, with insights on industry-leading topics, as well as networking opportunities. The sessions are presented in different formats and approaches: from case studies and round tables to lunch sessions and round tables with analysts. The sessions are also divided into categories, taking into consideration the subject addressed during the session. This year, the categories are as follows:

  1. Leadership and Strategy – Data privacy issues and new regulations such as LGPD and GDPR are the highlights of this category. This overview includes topics such as the leadership vision for Security and Risk Management and the role of Artificial Intelligence in Security and Risk Management;
  2. Trends and Capabilities – The subjects of this category address key security projects for 2019 such as Privileged Access Management, or PAM. Topics such as the CARTA approach and Magic Quadrant reports, associated with the Security Information and Event Management (SIEM) and Endpoint Management markets;
  3. Risk and Resilience – Some highlights are related to best practices associated with Privileged Access Management as well as Identity Management (IAM). This category includes topics such as Data Loss Prevention (DLP) and data breach response plans;
  4. Architecture and Operations – PAM focused on DevOps application and endpoint security are the highlights of this category. In addition, aspects related to Vulnerability Management as well as Cloud Security will be addressed.

In addition to being able to better understand the topics covered during the event, the conference attendees will also be able to meet more than 50 leading technology solution providers – including senhasegura – which can help them effectively apply the concepts of the sessions presented to them, thus being able to effectively manage privacy, risk, and security in their organizations.

senhasegura will participate in the Gartner’s Security and Risk Management Conference in 2019 as a PAM solution provider. This year, we will attend jointly with Vitara, a participating reseller of the senhasegura’s Affinity Partner Program, our relationship program with integrators, solution providers, and technology alliance partners.

For security and risk management leaders, CISO Circle sessions complete the conference agenda. The purpose of these sessions is to enable specific executive-level networking, as well as develop skills to successfully implement innovations and achieve their organizations’ IT strategy goals. The exclusive sessions will address topics such as the role of Artificial Intelligence in Security and Risk Management and the application of risk-adjusted performance indicators.

Remember that Gartner adopts some eligibility criteria for CISO Circle sessions: Participants must be Chief Information Officers (CISOs) at companies with more than $950 million in annual revenue, or Information Security directors from public sector organizations with over 1,000 employees. In addition, the organization must be a user of Gartner’s services. CISO Circle sessions do not apply to solution providers and security or risk management consulting or service providers.

In the context of growing cyber threats, attending an event such as the Gartner’s Security & Risk Management Conference in 2019 gives Information Security professionals and executives a complete overview of the top priorities in security, risk management, and leadership, and thus allow them to overcome the threats and vulnerabilities that multiply in the digital environment.

The main causes of data leaks

Data leaks occur whenever a user or organization has their sensitive information exposed, putting the security and privacy of companies and people at risk. Know more! The Data Breach Investigation Report 2022, conducted by the Ponemon Institute, provides an overview...

What is the SOC 2 report and why is it important for senhasegura?

SOC 2 provides a report after completing the audit. Recently, senhasegura conquered this milestone, providing details on the principles of confidentiality, processing integrity, availability, and information security. Want to know more about this subject? Read our...

What is a lateral movement attack and how does it occur?

A lateral movement attack occurs when the cybercriminal gains access to an initial target to move between devices within the network without their presence being noticed. In this article, we explain in detail what side threats are and how to avoid them. Want to know...

Why are government organizations favorite targets for cybercriminals?

The government segment was one of the most attacked by hackers in the last quarter of 2022. Learn more! In recent years, malicious actors have demonstrated a propensity to attack government organizations, including through ransomware, although governments are not...

Building a Ransomware Incident Response Plan

Ransomware is a type of cyberattack where malicious attackers lock down their victims' computers and demand a ransom to unlock. In this, we show you how to create a response plan for incidents involving ransomware. Want to know everything about it? Read our text until...