BR +55 11 3069 3925 | USA +1 469 620 7643

Why Go To The Gartner Security & Risk Management Summit 2019

by | Aug 1, 2019 | BLOG

Until some time ago, Business Risk Management was linked to aspects such as productivity, market, resources, or regulatory environment. However, with digital transformation through the introduction of technologies such as Big Data, Cloud, Internet of Things, Machine Learning and Artificial Intelligence, Information Technology has become a part of the strategy from organizations of various sizes and industries.

In addition, the need for data protection is now required not only by regulations such as LGPD and GDPR, but also by customers, suppliers, third parties, and service providers. Thus, the IT strategy has come to be directly connected with risks and business continuity, helping organizations overcome threat challenges in this new digital environment. 

In this context, Gartner offers, through its 15,000 associates, programs and services to assist companies in making strategic decisions, including those related to Risk Management and Cybersecurity. According to Gartner, 95% of CIOs believe cybersecurity threats will increase and impact their organizations. In addition, by the time LGPD takes effect in August 2020, less than 30% of all organizations subject to the new legislation will be fully compliant.

The Continuous Adaptive Risk and Trust Assessment (CARTA) approach, introduced in 2017, brings a new strategic cybersecurity model to support digital business transformation against the situation of new threats and challenges related to Information Security. In the Top 7 Security and Risk Trends document, Gartner highlights 7 security-and-risk-related trends. Despite not being widely recognized by the market yet, Gartner points out that these trends point to strategic changes in the security ecosystem, and possibly have a major impact on the industry.

Finally, more than 80,000 business leaders and executives attend more than 75 Gartner conferences held annually worldwide. These conferences address issues related not only to Technology, but also to Marketing, Sales, and Human Resources. One of these events is the Gartner’s Security and Risk Management Conference, which will be held in 2019 in several cities around the world, including Brazil. 

On the 13th and 14th of August, the Security and Risk Management Conference will bring over 50 sessions with its experts to the Sheraton São Paulo WTC Hotel. Gartner’s goal is to provide more than 1,900 IT professionals and leaders, from organizations across many industries and sizes, with insights on industry-leading topics, as well as networking opportunities. The sessions are presented in different formats and approaches: from case studies and round tables to lunch sessions and round tables with analysts. The sessions are also divided into categories, taking into consideration the subject addressed during the session. This year, the categories are as follows:

  1. Leadership and Strategy – Data privacy issues and new regulations such as LGPD and GDPR are the highlights of this category. This overview includes topics such as the leadership vision for Security and Risk Management and the role of Artificial Intelligence in Security and Risk Management;
  2. Trends and Capabilities – The subjects of this category address key security projects for 2019 such as Privileged Access Management, or PAM. Topics such as the CARTA approach and Magic Quadrant reports, associated with the Security Information and Event Management (SIEM) and Endpoint Management markets;
  3. Risk and Resilience – Some highlights are related to best practices associated with Privileged Access Management as well as Identity Management (IAM). This category includes topics such as Data Loss Prevention (DLP) and data breach response plans;
  4. Architecture and Operations – PAM focused on DevOps application and endpoint security are the highlights of this category. In addition, aspects related to Vulnerability Management as well as Cloud Security will be addressed.

In addition to being able to better understand the topics covered during the event, the conference attendees will also be able to meet more than 50 leading technology solution providers – including senhasegura – which can help them effectively apply the concepts of the sessions presented to them, thus being able to effectively manage privacy, risk, and security in their organizations.

senhasegura will participate in the Gartner’s Security and Risk Management Conference in 2019 as a PAM solution provider. This year, we will attend jointly with Vitara, a participating reseller of the senhasegura’s Affinity Partner Program, our relationship program with integrators, solution providers, and technology alliance partners.

For security and risk management leaders, CISO Circle sessions complete the conference agenda. The purpose of these sessions is to enable specific executive-level networking, as well as develop skills to successfully implement innovations and achieve their organizations’ IT strategy goals. The exclusive sessions will address topics such as the role of Artificial Intelligence in Security and Risk Management and the application of risk-adjusted performance indicators.

Remember that Gartner adopts some eligibility criteria for CISO Circle sessions: Participants must be Chief Information Officers (CISOs) at companies with more than $950 million in annual revenue, or Information Security directors from public sector organizations with over 1,000 employees. In addition, the organization must be a user of Gartner’s services. CISO Circle sessions do not apply to solution providers and security or risk management consulting or service providers.

In the context of growing cyber threats, attending an event such as the Gartner’s Security & Risk Management Conference in 2019 gives Information Security professionals and executives a complete overview of the top priorities in security, risk management, and leadership, and thus allow them to overcome the threats and vulnerabilities that multiply in the digital environment.

Top 7 Types of Phishing Attacks and How to Prevent Them

Social engineering, in the context of information security, consists of practices performed by hackers to manipulate users to take actions that go against their interests, exploiting their vulnerability and lack of knowledge for their benefit. One of the main types of...

ISO 27001 – What is the importance of having achieved the certification

The process of digital transformation has intensified in companies of all sizes and industries, and is considered an essential factor for business success. One of the main consequences of this process is the exponential growth in the amount of data from customers,...

Principle of Least Privilege: Understand the Importance of this Concept

Granting administrator access to a user who does not even have time to explain why they need this permission is not an efficient way to solve a company's problems but rather to harm its security.  This is because sensitive data can fall into the wrong hands through a...

How to Prevent DDoS Attacks in Your Company?

There are several methods by which malicious agents attack websites and destabilize network services and resources. One of the most widely used techniques is the DDoS attack, which means distributed denial-of-service. Through this attack, a website ends up becoming...

Gartner and PAM: What Does One of the Most Important Consulting Companies in the World Say About this Cybersecurity Solution?

All of us have already heard of digital transformation at some point. This phenomenon affects companies of all verticals and sizes and has been gaining prominence in the market.  Digital transformation increasingly requires organizational leaders to adapt their...