The 2025 agenda will deliver the latest technology, strategy and leadership insights more critical to CISOs, and cybersecurity and risk leaders.
The 2025 agenda will deliver the latest technology, strategy and leadership insights more critical to CISOs, and cybersecurity and risk leaders.
Track A. Cybersecurity Leadership
Cybersecurity leaders face disruptions on multiple fronts: technological, organizational and human. This track will help you to overcome day-to-day leadership challenges, make well-informed strategic decisions and keep your organization secure in turbulent times.
Track B. Cyber-Risk Management
Excelling in risk management is not just essential—it's imperative. This track will deliver insights to help you outpace potential threats, fortify your defenses and navigate and mitigate the intricate risks tied to privacy, supply chains and more.
Track C. Infrastructure Security
Securing infrastructure is key to any organization’s security strategy, whether you are on-premises, in the cloud or hybrid. This track explores the evolving landscape of security solutions to secure your infrastructure and defend your organization from attack.
Track D. Application and Infrastructure Security
Applications and the data they support are critical security components for every organisation. This track covers key technologies and approaches to protecting your data and securely building, implementing and operating your applications.
Track D. Cybersecurity Operations
Security and risk management leaders depend on security operations to preserve their company, while business requires them to tolerate higher risks. This track explores the best practices and emerging approaches to reduce exposure to threats and minimize disruption caused by inevitable incidents.
Track E. CISO Circle Program
CISOs must help their organizations manage cybersecurity risk while enabling growth and mission objectives. The CISO Circle Program* curates Gartner’s most executive-relevant insights and guidance in interactive, peer-based sessions. *Application is required
Spotlight Track: Identity and Access Management
IAM has become the cornerstone of business enablement and enterprise agility. This track gives security leaders insight into the latest IAM strategies, trends and technologies.
Spotlight Track: Artificial Intelligence
AI’s rapid evolution presents many cybersecurity risks and opportunities. Learn how to effectively integrate AI into your cybersecurity roadmap and navigate the AI hype to create real value.
Spotlight Track: New-To-Role
Most organizations expect their new-to-role executives to deliver results quickly. Learn how to cultivate key stakeholder relationships, avoid pitfalls, prioritize projects, and make an immediate impact on your organization.