BR +55 11 3069 3925 | USA +1 469 620 7643

Why Go To The Gartner Security & Risk Management Summit 2019

by | Aug 1, 2019 | BLOG

Until some time ago, Business Risk Management was linked to aspects such as productivity, market, resources, or regulatory environment. However, with digital transformation through the introduction of technologies such as Big Data, Cloud, Internet of Things, Machine Learning and Artificial Intelligence, Information Technology has become a part of the strategy from organizations of various sizes and industries.

In addition, the need for data protection is now required not only by regulations such as LGPD and GDPR, but also by customers, suppliers, third parties, and service providers. Thus, the IT strategy has come to be directly connected with risks and business continuity, helping organizations overcome threat challenges in this new digital environment. 

In this context, Gartner offers, through its 15,000 associates, programs and services to assist companies in making strategic decisions, including those related to Risk Management and Cybersecurity. According to Gartner, 95% of CIOs believe cybersecurity threats will increase and impact their organizations. In addition, by the time LGPD takes effect in August 2020, less than 30% of all organizations subject to the new legislation will be fully compliant.

The Continuous Adaptive Risk and Trust Assessment (CARTA) approach, introduced in 2017, brings a new strategic cybersecurity model to support digital business transformation against the situation of new threats and challenges related to Information Security. In the Top 7 Security and Risk Trends document, Gartner highlights 7 security-and-risk-related trends. Despite not being widely recognized by the market yet, Gartner points out that these trends point to strategic changes in the security ecosystem, and possibly have a major impact on the industry.

Finally, more than 80,000 business leaders and executives attend more than 75 Gartner conferences held annually worldwide. These conferences address issues related not only to Technology, but also to Marketing, Sales, and Human Resources. One of these events is the Gartner’s Security and Risk Management Conference, which will be held in 2019 in several cities around the world, including Brazil. 

On the 13th and 14th of August, the Security and Risk Management Conference will bring over 50 sessions with its experts to the Sheraton São Paulo WTC Hotel. Gartner’s goal is to provide more than 1,900 IT professionals and leaders, from organizations across many industries and sizes, with insights on industry-leading topics, as well as networking opportunities. The sessions are presented in different formats and approaches: from case studies and round tables to lunch sessions and round tables with analysts. The sessions are also divided into categories, taking into consideration the subject addressed during the session. This year, the categories are as follows:

  1. Leadership and Strategy – Data privacy issues and new regulations such as LGPD and GDPR are the highlights of this category. This overview includes topics such as the leadership vision for Security and Risk Management and the role of Artificial Intelligence in Security and Risk Management;
  2. Trends and Capabilities – The subjects of this category address key security projects for 2019 such as Privileged Access Management, or PAM. Topics such as the CARTA approach and Magic Quadrant reports, associated with the Security Information and Event Management (SIEM) and Endpoint Management markets;
  3. Risk and Resilience – Some highlights are related to best practices associated with Privileged Access Management as well as Identity Management (IAM). This category includes topics such as Data Loss Prevention (DLP) and data breach response plans;
  4. Architecture and Operations – PAM focused on DevOps application and endpoint security are the highlights of this category. In addition, aspects related to Vulnerability Management as well as Cloud Security will be addressed.

In addition to being able to better understand the topics covered during the event, the conference attendees will also be able to meet more than 50 leading technology solution providers – including senhasegura – which can help them effectively apply the concepts of the sessions presented to them, thus being able to effectively manage privacy, risk, and security in their organizations.

senhasegura will participate in the Gartner’s Security and Risk Management Conference in 2019 as a PAM solution provider. This year, we will attend jointly with Vitara, a participating reseller of the senhasegura’s Affinity Partner Program, our relationship program with integrators, solution providers, and technology alliance partners.

For security and risk management leaders, CISO Circle sessions complete the conference agenda. The purpose of these sessions is to enable specific executive-level networking, as well as develop skills to successfully implement innovations and achieve their organizations’ IT strategy goals. The exclusive sessions will address topics such as the role of Artificial Intelligence in Security and Risk Management and the application of risk-adjusted performance indicators.

Remember that Gartner adopts some eligibility criteria for CISO Circle sessions: Participants must be Chief Information Officers (CISOs) at companies with more than $950 million in annual revenue, or Information Security directors from public sector organizations with over 1,000 employees. In addition, the organization must be a user of Gartner’s services. CISO Circle sessions do not apply to solution providers and security or risk management consulting or service providers.

In the context of growing cyber threats, attending an event such as the Gartner’s Security & Risk Management Conference in 2019 gives Information Security professionals and executives a complete overview of the top priorities in security, risk management, and leadership, and thus allow them to overcome the threats and vulnerabilities that multiply in the digital environment.

An Overview of Saudi Arabia’s Personal Data Protection Act (PDPL)

Saudi Arabia’s Personal Data Protection Law (PDPL) was implemented by Royal Decree M/19 of 9/2/1443H (September 16, 2021), which approved Resolution No. 98 of 7/2/1443 H (September 14, 2021). It was published in the Republic Journal on September 24, 2021. The Saudi...

The 5 Biggest Data Leaks of 2021

During the pandemic, cyberattacks grew more than ever. Theft, hijacks, and data leaks are increasingly popular practices in cybercrime. The lock and hijack for ransom (ransomware) category has stood out a lot, as data is a highly valuable resource and most companies...

HIPAA: Five Tips for Complying with The Certificate

What is HIPAA? Currently, this is one of the most frequently asked questions by many professionals working in the healthcare industry, especially in times of the Covid-19 pandemic. But why is it so important and what are its benefits for healthcare companies? First,...

How Does The LGPD Impact Companies?

Due to the growing technological development in the market, we can clearly see how much how consumers tend to buy products and services has changed. Through more practical technologies, such as cellphones, laptops, and tablets, for example, they are just a click away...

What Is the Difference Between IAM and PAM?

It is important to know the differences between IAM (Identity & Access Management) and PAM (Privileged Access Management). However, this theme still raises doubts for some people. First, it is necessary to understand that the need to obtain an identity is...
Copy link
Powered by Social Snap