Explore this year’s sessions

Gartner Security & Risk Management Summit 2025 dives deep into key topics for cybersecurity leaders around AI, risk management, cloud security and more.

Be the first to receive the 2026 conference updates

Get the latest details around the 2026 conference agenda, speakers and more sent straight to your inbox.

By clicking the "Continue" button, you are agreeing to the Gartner Terms of Use and Privacy Policy.

Contact Information

All fields are required.

Conference Topics at a Glance

Gartner Security & Risk Management Summit 2025 dives into key topics or CISOs and their teams around cybersecurity, IT risk management, AI, cost optimization and more.

Cybersecurity Leadership

Cybersecurity leaders face many disruptions: technological, geopolitical, organizational and human. Learn how to improve your effectiveness as a leader, communicate the value of cybersecurity, govern AI, optimize costs and help your organization to be more resilient.

Artificial Intelligence

AI’s rapid evolution presents many cybersecurity risks and opportunities. Learn how to effectively integrate AI into your cybersecurity roadmap, govern AI for your organization and navigate the AI hype to create real value.

Cyber-Risk Management

You might think risk has been overhyped, but don’t wait for it to materialize. Sessions on this topic covered risks relevant to privacy, supply chains and cybersecurity. Learn how to communicate value, correlate risk data to automate control monitoring and enable decision making.

background wave background wave background wave
Look back at 2025 Conference Sessions
While we work to develop the 2026 Gartner Security & Risk Management agenda, filter to see sessions that align with your role and interests.

Show Filters

Filter Sessions Cancel
Showing 90 Sessions
Clear All
Monday, 10 March, 2025

09:30 AM - 10:15 AM IST

Gartner Opening Keynote: Harness the Hype: Turning Disruption Into Cybersecurity Opportunity

Deepti Gopal, Director Analyst, Gartner
Dennis Xu, VP Analyst, Gartner
Our organizations have grand ambitions and know they can’t ignore cybersecurity. But in our fast-paced environment, we are endangered by the extremes of unbridled technology optimism and excessive preoccupation with risk. Hype, whether driven by AI, emerging technologies or the latest headline-grabbing cyber attack, threatens to derail strategic objectives and the partnership between cybersecurity and the rest of the business. This keynote will help cybersecurity leaders exploit the power of hype to drive an innovative and adaptive cybersecurity program. ... Show More Show Less

10:30 AM - 10:50 AM IST

Okta: Reimagining Identity In Business

Ben Goodman, SVP and GM, APJ, Okta
As organizations evolve with the changing global business climate, identity is no longer just a tool for logging into corporate systems. With advanced cyber threats, AI adoption, new partnerships expanding digital supply chains, and a surge in mergers and acquisitions, identity powers essential business services. We’ll explore how Okta helps organizations address traditional digital identity challenges while unlocking new capabilities. Discover how Okta enhances security, improves employee experiences, and provides a competitive edge in today’s evolving market. ... Show More Show Less

11:00 AM - 11:30 AM IST

Technical Insights: Cybersecurity Mesh Architecture v.3.0: The Next Generation of Security Architecture

Richard Bartley, VP Analyst, Gartner
This session will discuss the reference architecture and dive deep into how to build the cybersecurity mesh architecture (CSMA). We will discuss the evolution of best of breed to the new CSMA, along with the pros and cons of each approach. Finally, we will discuss the vendor landscape, from larger security vendors with full stacks to open-source or distributed CSM solutions. ... Show More Show Less

11:00 AM - 12:30 PM IST

Workshop: How to Build an IAM Program/Capability?

Gautham Mudra, Sr Director Analyst, Gartner
Abhyuday Data, Director Analyst, Gartner
A well-governed IAM program/product is crucial to enhancing cybersecurity posture while delivering digital transformation and business value. Analysis shows that leading IAM as a product can be successful. Learn how to create a strategy to communicate and manage IAM program/product scope, objectives and priorities, engage with stakeholders to build consensus around priorities, and mature your program/product. ... Show More Show Less

11:00 AM - 11:30 AM IST

Outlook for AI & Cybersecurity: The Perfect Storm for CISOs

Bart Willemsen, VP Analyst, Gartner
AI's promises shaped high expectations in the past, and every step forward in AI, such as LLM, created a new wave of "AI washing" and new hopes for concrete improvements.
This session puts
recent and upcoming changes in perspective and guides CISOs on integrating AI into their cybersecurity roadmap. ... Show More Show Less

11:00 AM - 12:30 PM IST

CISO Circle: Leadership Exchange: Building and Amplifying Your Brand as a CISO

Christopher Mixter, VP Analyst, Gartner
Everyone has a personal brand. Very few of us have an intentional one. Focusing on your brand isn't selfish; it's essential. A chief information security officer's (CISO's) personal effectiveness and even their entire department is often limited or amplified by the personal brand of its leader. ... Show More Show Less

11:00 AM - 11:45 AM IST

Executive Story Roundtable: A Strategic Perspective on IT-OT SOC Convergence

Nilanjan Chakraborti, CISO, TVS Group
Aman Mittal, Head of OT CyberSecurity, TVS Motor
Integrating IT and OT security operations can enhance threat detection, improve response times, and streamline resource management. This session will delve into the transformative benefits of a unified approach, offering insights into overcoming the top challenges in this convergence: bridging the cultural and operational divide between IT and OT teams, ensuring interoperability of diverse technologies, and maintaining robust cybersecurity across both domains. This is an interactive session where the audience will also have the opportunity to share their experiences in their journey towards a centralized SOC for IT/OT. ... Show More Show Less

11:00 AM - 11:30 AM IST

Technical Insights: The Five Tenets of Application Security

Manjunath Bhat, Distinguished VP Analyst, Gartner
Application security is a complex endeavor. There is an overwhelming landscape of technology, along with processes demanded by compliance bodies and a diversity of roles needed. This session will cover five areas that need to be part of any application security program, from threat modeling a design to getting context from the runtime environment. ... Show More Show Less

11:00 AM - 11:30 AM IST

You Need Posture Management in the 'Cloud' but Which SPM Is Right for You?

Manuel Acosta, Sr Director Analyst, Gartner
Posture management in the cloud is increasingly critical, but the range of flavors can be bewildering, especially as these products merge and combine. This session will provide an overview of common security posture management (SPM) platforms, their capabilities and when they should best be applied. Join the session to learn more. ... Show More Show Less

... Show More Show Less
Items per page: 19 of 90 Items
1 of 10 Pages

Sorry, no sessions match your criteria. Please refine your filters to display sessions.

“The summit was a great learning experience and an excellent platform to exchange ideas. It provided valuable opportunities to deliberate over key topics with peers, making the event both insightful and impactful.”

Mannan Godil,
CISO, BNP Paribas India Solutions

Discover what it’s like to experience Gartner Security & Risk Management Summit.