2026 conference sessions coming soon!

Explore this year’s topics for cybersecurity and risk, and dive into last year’s sessions while we work on the full 2026 agenda.

Learn more about Gartner Security & Risk Management Summit 2026

Get our latest conference schedules, updates and insights sent straight to your inbox.

By clicking the "Continue" button, you are agreeing to the Gartner Terms of Use and Privacy Policy.

Contact Information

All fields are required.

Conference Topics at a Glance

Gartner Security & Risk Management Summit 2026 dives deep into key topics for CISOs and their teams around cybersecurity, IT risk management, AI, cost optimization and more.

AI in Cybersecurity

Separate the hype from reality and learn how AI will disrupt the world of cybersecurity while preparing for its evolutions.

Cloud Security

Explore the evolving landscape of infrastructure security solutions needed to prepare for the shifting network requirements of cloud workloads and remote workspaces.

Data Security and Governance

Use data security governance to orchestrate policies across security technologies and to discover, classify and protect sensitive data throughout its life cycle.

background wave background wave background wave
Look back at 2025 conference sessions
Hundreds of conference sessions were presented at Gartner Security & Risk Management Summit 2025. While we work to develop this year’s agenda, filter to see sessions that align with your role and interests.

Show Filters

Filter Sessions Cancel
Showing 121 Sessions
Clear All
Monday, 03 March, 2025

09:00 AM - 09:45 AM AEDT

Gartner Opening Keynote: Harness the Hype: Turning Disruption Into Cybersecurity Opportunity

Richard Addiscott, VP Analyst, Gartner
Christine Lee, VP, Research, Gartner
Our organizations have grand ambitions and know they can’t ignore cybersecurity. But in our fast-paced environment, we are endangered by the extremes of unbridled technology optimism and excessive preoccupation with risk. Hype, whether driven by AI, emerging technologies or the latest headline-grabbing cyber attack, threatens to derail strategic objectives and the partnership between cybersecurity and the rest of the business. This keynote will help cybersecurity leaders exploit the power of hype to drive an innovative and adaptive cybersecurity program. ... Show More Show Less

10:00 AM - 10:20 AM AEDT

ARCON: Use Intelligent Robotics Agents and AI/ML for Zero Touch Compliance

Nirma Varma, Sr. Director- Digital Risk and Robotics GRC., ANB
Imagine a world where cybersecurity compliance is effortless—no spreadsheets, no last-minute audits, no human errors. Essential 8 compliance today demands constant monitoring, manual reporting, and significant resources.
What if your Essential 8 reporting happened automatically, in real-time?
Join this session to explore how AI and automation can seamlessly integrate compliance into IT workflows. Real-time monitoring ensures continuous alignment with ACSC guidelines—no stress, no surprises.
Step into the future of effortless compliance!
... Show More Show Less

10:00 AM - 10:20 AM AEDT

Protegrity: Bridging Security and Business Innovation In The AI and Data Sharing Era

Bobby Cuthill, HEAD OF CUSTOMER SOLUTIONS APAC, Protegrity
Bobby Cuthill, Senior Manager, Solution Engineering, Protegrity
Struggling to balance AI-driven innovation with security and compliance? Organisations are racing to leverage AI, advanced analytics, and the cloud for a competitive edge—but growing regulations and data protection requirements create significant challenges.

This session will provide practical strategies to maximise AI potential while safeguarding sensitive data, ensuring compliance, and mitigating risk.

Learn how to harness innovation without compromise and position your organisation for success in a rapidly evolving digital landscape.
... Show More Show Less

10:30 AM - 11:00 AM AEDT

Be Comfortable in the Hot Seat, Having Cybersecurity Conversations With Executives

Paul Furtado, VP Analyst, Gartner
Join this session to find out how to leverage outcome-driven metrics to support your security program. We will cover three challenging scenarios, how to articulate risk at the appropriate level, and provide the right level of risk awareness to your executive leadership and board of directors. ... Show More Show Less

10:30 AM - 11:00 AM AEDT

Demystifying the Hype: Identity Security, Posture Management, Threat Detection and Response

Felix Gaehtgens, VP Analyst, Gartner
As identity becomes fundamental to business enablement, it presents an expanding attack surface and is the No. 1 vector for breaches. Join this session to understand how design principles that combine identity hygiene, security posture management and identity threat detection and response (ITDR) can help organizations achieve improved resilience against such threats. ... Show More Show Less

10:30 AM - 11:15 AM AEDT

Ask the Expert: How to Transform Your Cybersecurity into Cyber Resilience

Arthur Sivanathan, Sr Director Analyst, Gartner
There is a heightened regulator shift that significantly focuses on Cyber Resilience, coupled with stakeholders and boards asking more questions from cybersecurity functions around resilience requirements and capabilities. This is causing a lot of confusion around what cyber resilience really is, what should be the focus areas, and how to become more resilient as a cyber function. Ask the expert questions on how to shift your cybersecurity program to be more cyber resilience focused. ... Show More Show Less

10:30 AM - 11:15 AM AEDT

Executive Story Roundtable: Essential 8 – Can you Risk Accept Your Way to Compliance?

Sean Hugo, Deputy Chief Information Security Officer, Department of Home Affairs
Niall Prendeville, VP, Team Manager, Gartner
Mardi Paterson, Executive Partner, Domains, Gartner
Join this roundtable to discuss Essential 8, across public sector and commercial organizations and partake in a discussion to share your views on if you can risk accept your way to compliance. ... Show More Show Less

10:30 AM - 11:00 AM AEDT

Outlook for Cyber-Physical Systems (CPS) Security in 2025

Katell Thielemann, Distinguished VP Analyst, Gartner
Cyber-physical systems are becoming more prevalent in organizations across the board as OT/IoT assets become increasingly connected and new robotics and automation efforts accelerate. Join the session to gain insights into pressing questions about the security implications they have, what their prevalence in national critical infrastructure means, emerging best practices and what the future holds. ... Show More Show Less

10:30 AM - 11:00 AM AEDT

Technical Insights: Stop Thinking About Endpoints and Start Thinking About Workspaces!

Eric Grenier, Sr Director Analyst, Gartner
The endpoint is the largest part of your business' attack surface. But what we think of as "endpoint protection" only addresses part of the problems of securing this attack surface. In this session, we will explore the evolution of end-user computing and how we can evolve our protection as the endpoint evolves. ... Show More Show Less

... Show More Show Less
Items per page: 19 of 121 Items
1 of 13 Pages

Sorry, no sessions match your criteria. Please refine your filters to display sessions.

“Quality presentations with incisive and interesting topics. Would recommend to cyber and risk professionals alike.”

Craig Thompson
IT Risk Manager, Hollard

Discover what it’s like to experience Gartner Security & Risk Management Summit.