|By Business Wire||
|June 23, 2014 06:02 AM EDT||
When: June 23 – 26, 2014
Where: Gaylord National, National Harbor, MD
Details: In its 20th year, the Gartner Security & Risk Management Summit offers six complete programs and nearly 150 sessions delivered by more than 50 Gartner analysts, all focusing on the theme Smart Risk: Balancing Security and Opportunity. Each session will delve in to the latest strategies and best practices for maintaining an effective balance between risk and opportunity to mitigate security threats.
The event features:
- Analyst-moderated user roundtables, user case studies and workshops and solution provider sessions
- New research, trend updates, best practices, Magic Quadrants, long-range scenarios
- Continuing professional education where you can earn CPE credits toward ISC2, ISACA, and DRII Certification programs
- New Gartner for Technical Professional (GTP) track that takes a deep dive into the latest technical issues related to IT security and risk management
- Industry forums with content focused on healthcare, financial services, government, manufacturing, energy/utilities and education
- New! CISO Circle, an invitation-only program featuring advanced insight and C-level networking
- An all expenses paid Invitational Program available to a limited number of qualified CISOs.
*Guest Keynote: Gen. Keith B. Alexander, USA (Ret.) Commander, U.S. Cyber Command from 2010-2014, and Director, National Security Agency/Chief, Central Security Service from 2005-2014
*Guest Keynote: PETER H. DIAMANDIS, MD: Chairman and CEO of the X PRIZE Foundation; Co-Founder and Vice-Chairman of Human Longevity Inc; Co-Founder/Co-Chairman of Planetary Resources; and New York Times Bestselling author of Abundance – The Future Is Better Than You Think.
*Gartner Opening Keynote - Smart Risk: Balancing Security & Opportunity: John Girard, Gartner VP & Distinguished Analyst
*Gartner Keynote: The Wolf in CIO’s Clothing: A Machiavellian Strategy for Successful IT Leadership Tina Nunno, Vice President and Gartner Fellow
The latest security and risk management tools will be demonstrated by over 120 companies that will be exhibiting at the conference. A listing of current sponsors is available on the Exhibitors page at http://www.gartner.com/technology/summits/na/security/exhibitor-directory.jsp.
For complete event details, please visit the Gartner Security & Risk Management Summit Web site at www.gartner.com/us/securityrisk.
Join the discussion on Twitter using #GartnerSEC.
Members of the media can register for the event by contacting Christy Pettey at [email protected]
Gartner, Inc. (NYSE:IT) is the world's leading information technology research and advisory company. Gartner delivers the technology-related insight necessary for its clients to make the right decisions, every day. From CIOs and senior IT leaders in corporations and government agencies, to business leaders in high-tech and telecom enterprises and professional services firms, to technology investors, Gartner is a valuable partner in more than 14,000 distinct organizations. Through the resources of Gartner Research, Gartner Executive Programs, Gartner Consulting and Gartner Events, Gartner works with every client to research, analyze and interpret the business of IT within the context of their individual role. Founded in 1979, Gartner is headquartered in Stamford, Connecticut, USA, and has 6,100 associates, including more than 1,460 research analysts and consultants, and clients in 85 countries. For more information, visit www.gartner.com.
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
Jul. 28, 2016 06:45 AM EDT Reads: 1,855
There will be new vendors providing applications, middleware, and connected devices to support the thriving IoT ecosystem. This essentially means that electronic device manufacturers will also be in the software business. Many will be new to building embedded software or robust software. This creates an increased importance on software quality, particularly within the Industrial Internet of Things where business-critical applications are becoming dependent on products controlled by software. Qua...
Jul. 28, 2016 06:45 AM EDT Reads: 1,531
Jul. 28, 2016 05:45 AM EDT Reads: 2,319
Jul. 28, 2016 04:45 AM EDT Reads: 1,365
Jul. 28, 2016 04:15 AM EDT Reads: 1,283
Jul. 28, 2016 03:45 AM EDT Reads: 2,320
Jul. 28, 2016 03:30 AM EDT Reads: 1,593
Jul. 28, 2016 03:15 AM EDT Reads: 2,641
Jul. 28, 2016 03:00 AM EDT Reads: 1,626
Jul. 28, 2016 02:30 AM EDT Reads: 1,551
Jul. 28, 2016 02:30 AM EDT Reads: 1,799
Jul. 28, 2016 02:15 AM EDT Reads: 1,405
Jul. 28, 2016 02:00 AM EDT Reads: 2,059
Jul. 28, 2016 01:45 AM EDT Reads: 1,113
Jul. 28, 2016 01:15 AM EDT Reads: 861