BR +55 11 3069 3925 | USA +1 469 620 7643

Why Go To The Gartner Security & Risk Management Summit 2019

by | Aug 1, 2019 | BLOG

Until some time ago, Business Risk Management was linked to aspects such as productivity, market, resources, or regulatory environment. However, with digital transformation through the introduction of technologies such as Big Data, Cloud, Internet of Things, Machine Learning and Artificial Intelligence, Information Technology has become a part of the strategy from organizations of various sizes and industries.

In addition, the need for data protection is now required not only by regulations such as LGPD and GDPR, but also by customers, suppliers, third parties, and service providers. Thus, the IT strategy has come to be directly connected with risks and business continuity, helping organizations overcome threat challenges in this new digital environment. 

In this context, Gartner offers, through its 15,000 associates, programs and services to assist companies in making strategic decisions, including those related to Risk Management and Cybersecurity. According to Gartner, 95% of CIOs believe cybersecurity threats will increase and impact their organizations. In addition, by the time LGPD takes effect in August 2020, less than 30% of all organizations subject to the new legislation will be fully compliant.

The Continuous Adaptive Risk and Trust Assessment (CARTA) approach, introduced in 2017, brings a new strategic cybersecurity model to support digital business transformation against the situation of new threats and challenges related to Information Security. In the Top 7 Security and Risk Trends document, Gartner highlights 7 security-and-risk-related trends. Despite not being widely recognized by the market yet, Gartner points out that these trends point to strategic changes in the security ecosystem, and possibly have a major impact on the industry.

Finally, more than 80,000 business leaders and executives attend more than 75 Gartner conferences held annually worldwide. These conferences address issues related not only to Technology, but also to Marketing, Sales, and Human Resources. One of these events is the Gartner’s Security and Risk Management Conference, which will be held in 2019 in several cities around the world, including Brazil. 

On the 13th and 14th of August, the Security and Risk Management Conference will bring over 50 sessions with its experts to the Sheraton São Paulo WTC Hotel. Gartner’s goal is to provide more than 1,900 IT professionals and leaders, from organizations across many industries and sizes, with insights on industry-leading topics, as well as networking opportunities. The sessions are presented in different formats and approaches: from case studies and round tables to lunch sessions and round tables with analysts. The sessions are also divided into categories, taking into consideration the subject addressed during the session. This year, the categories are as follows:

  1. Leadership and Strategy – Data privacy issues and new regulations such as LGPD and GDPR are the highlights of this category. This overview includes topics such as the leadership vision for Security and Risk Management and the role of Artificial Intelligence in Security and Risk Management;
  2. Trends and Capabilities – The subjects of this category address key security projects for 2019 such as Privileged Access Management, or PAM. Topics such as the CARTA approach and Magic Quadrant reports, associated with the Security Information and Event Management (SIEM) and Endpoint Management markets;
  3. Risk and Resilience – Some highlights are related to best practices associated with Privileged Access Management as well as Identity Management (IAM). This category includes topics such as Data Loss Prevention (DLP) and data breach response plans;
  4. Architecture and Operations – PAM focused on DevOps application and endpoint security are the highlights of this category. In addition, aspects related to Vulnerability Management as well as Cloud Security will be addressed.

In addition to being able to better understand the topics covered during the event, the conference attendees will also be able to meet more than 50 leading technology solution providers – including senhasegura – which can help them effectively apply the concepts of the sessions presented to them, thus being able to effectively manage privacy, risk, and security in their organizations.

senhasegura will participate in the Gartner’s Security and Risk Management Conference in 2019 as a PAM solution provider. This year, we will attend jointly with Vitara, a participating reseller of the senhasegura’s Affinity Partner Program, our relationship program with integrators, solution providers, and technology alliance partners.

For security and risk management leaders, CISO Circle sessions complete the conference agenda. The purpose of these sessions is to enable specific executive-level networking, as well as develop skills to successfully implement innovations and achieve their organizations’ IT strategy goals. The exclusive sessions will address topics such as the role of Artificial Intelligence in Security and Risk Management and the application of risk-adjusted performance indicators.

Remember that Gartner adopts some eligibility criteria for CISO Circle sessions: Participants must be Chief Information Officers (CISOs) at companies with more than $950 million in annual revenue, or Information Security directors from public sector organizations with over 1,000 employees. In addition, the organization must be a user of Gartner’s services. CISO Circle sessions do not apply to solution providers and security or risk management consulting or service providers.

In the context of growing cyber threats, attending an event such as the Gartner’s Security & Risk Management Conference in 2019 gives Information Security professionals and executives a complete overview of the top priorities in security, risk management, and leadership, and thus allow them to overcome the threats and vulnerabilities that multiply in the digital environment.

Building Digital Manufacturing Through PAM

With the evolution of technology, manufacturing sectors are increasingly digitalized through solutions that optimize the processes carried out in these environments, reducing costs, eliminating human failures, and generating more productivity.  Among the technologies...

Just-In-Time Privileged Access: Understand this Subject

In this article, we present the concept of just-in-time privileged access, its benefits, and mode of operation, among other extremely important information on the subject. To facilitate your reading, we divided our text into topics. They are: What Is Just-In-Time...

What Can I Do to Decrease Cyber Insurance Amounts?

When it comes to information security, the risks to organizations are increasing by several factors. As an example, we can mention the increase in the number of cyberattacks, especially after the Covid-19 pandemic, which accelerated the mass adoption of remote work,...

What are the actions performed during a privileged access

Nowadays, cyber-attacks have become increasingly common and hit more and more companies, of all verticals and sizes. According to the SonicWall 2022 Cyber ​​Threat report, the number of cyberattacks involving data encryption increased by 167% in 2021, reaching 10.4...

Achieving Sarbanes-Oxley (SOX) Compliance Using Cybersecurity Controls

The Sarbanes-Oxley Act (SOX) is primarily associated with business transparency and the use of accounting and financial controls to protect investors from fraudulent financial reporting. However, it is always important to remember the ever-increasing pivotal role...
Copy link