All 2026 Conference Sessions

Gartner Security & Risk Management Summit 2026 dove deep into key topics for cybersecurity leaders around AI, risk management, cloud security and more.

Session Takeaways

Dive into some of the key takeaways you may have missed from the Gartner Security & Risk Management Summit 2026.

Gartner Opening Keynote: Top Cybersecurity Trends

Speaker:

  • Wam Voster, VP Analyst, Gartner

Key Takeaways

  • “Amid regulatory volatility and broad geopolitical, technological and organizational forces, CISOs must rethink how they approach cyber risk management, resilience and resource allocation by strategically assessing each trend across the three core themes to determine whether to embrace, monitor or deprioritize it.”

  • Postquantum computing moves into action plans: “As quantum computing renders today’s cryptography unsafe by 2030, CISOs must inventory all crypto assets and establish a center of excellence to accelerate crypto‑agile readiness.”

  • Agentic AI demands cybersecurity oversight: “Identify both sanctioned and unsanctioned AI agents, and enforce robust controls for each based on access and agency.”

  • Global regulatory volatility drives cyber resilience efforts: “Treat compliance as a strategic advantage, not a checklist to drive cyber resilience.”
  • GenAI breaks traditional cybersecurity awareness tactics: “Stop relying on general awareness, and focus on adaptive training that provides visibility into individual employee behaviors.”

Securing the Quantum Frontier: Embracing Postquantum Cryptography Today

Speaker:

Sarah Almond, Director Analyst, Gartner

Key Takeaways

  • “Advances in quantum computing will make conventional asymmetric cryptography unsafe to use by 2030.”

  • “Security leaders often struggle to convey urgency around postquantum security because quantum threats seem distant, but four years isn’t a long time. Delaying action puts today’s encrypted data at risk of ‘harvest now, decrypt later’ attacks, where attackers steal data today with the intent to decrypt it once quantum capabilities mature.”

  • Security leaders need to adopt a preparation mindset focused on five key actions for postquantum (PQ) readiness:

    • Strategy: Build PQ efforts into the roadmap and secure investments for launching a multi-year program.

    • Visibility: Identify where cryptography is used across the enterprise.

    • Agility: Enable easy upgrades to algorithms, keys, and certificates.

    • POC: Begin practical experimentation with new PQ algorithms.

    • CCoE: Bring together the right stakeholders to drive coordinated progress.

  • “Take a phased approach to building cryptographic visibility rather than trying to discover everything at once. Don’t wait for a perfect inventory and use available information to prioritise remediation, identify vendor dependencies, and shape a roadmap.”

Outlook for Third-Party Cyber-Risk Management: Challenge the Status Quo to Evolve Your Program

Speaker:

Rahul Balakrishnan, Sr Director Analyst, Gartner

Key Takeaways

  • “As regulatory guidance around TPCRM has accelerated globally and in India over the last five years, cybersecurity leaders must use the expanding and prescriptive regulatory mandates to transform TPCRM risk into clear business requirements that drive the investment roadmap.”

  • “CISOs should create a strategy that uses indirect monitoring to spot potential risks in a third party’s security posture and direct monitoring to track risks through internally exposed services, ensuring resources are focused on the exposures that matter most.”

  • By 2028, half of all TPCRM programs will focus on continuous monitoring, allowing CISOs to repurpose due diligence resourcing to other high-value third-party risk mitigation activities.

  • “As developing GenAI applications in-house is costly, many organizations rely on third‑party LLMs or GenAI-enabled SaaS solutions, making it critical for CISOs to have a clear view of the data security controls these third parties have in place to protect the organization’s data held in third-party environments.”

  • “Gartner predicts that by 2028, 70% of organizations and vendors will use GenAI to complete and analyze TPCRM questionnaires, rendering the outputs increasingly unusable and disconnected from actual risk indicators. Therefore, it is essential to have human analysts validate the work done by GenAI for critical third parties.”

 

Preparing Privacy Program for What’s Next

Speaker:

Shadrock Roberts, Director Analyst, Gartner

Key Takeaways

  • “With the enactment of the Digital Personal Data Protection (DPDP) Act, India enters a global ecosystem where 75% of the world’s population is protected by modern privacy laws.” 

  • “Success in this dynamic landscape demands organizational agility, strategic foresight into emerging trends, and strong cross‑functional coordination.”

  • “It isn’t just about ticking boxes or avoiding penalties. Privacy is now a core expectation, and organizations that treat it as a business opportunity rather than a compliance task, will build trust, stand out in the market, and avert costly disruptions.”

  • “While privacy can seem complex, focusing on core principles such as purpose limitation, data minimization, security, transparency, and accountability gives organizations a clear and effective starting point for DPDP success.”

Be the first to receive the 2027 conference agenda

Get the latest details around the 2027 conference agenda, speakers and more sent straight to your inbox.

By clicking the "Continue" button, you are agreeing to the Gartner Terms of Use and Privacy Policy.

Contact Information

All fields are required.

Look back at 2026 Conference Sessions

Hundreds of conference sessions were presented each day at the 2026 Gartner Security & Risk Management Summit. While we work to develop this year's agenda, filter to see sessions that align with your role and interests.

Show Filters

Filter Sessions Cancel
Showing 33 Sessions
Clear All
Monday, 09 March, 2026

11:00 AM - 11:30 AM IST

8 Essential Steps for CISOs to Elevate Their Zero Trust Journey

Thomas Lintemuth, VP Analyst, Gartner
Successful zero trust initiatives do not start with technology but with a series of activities that guide the first phases of the journey. This breakout will discuss eight milestones that should be completed to increase success and minimize risk. ... Show More Show Less

11:00 AM - 11:30 AM IST

CISO’s Outlook for Cybersecurity and AI: Building AI Resilience

Franz Hinner, Sr Director Analyst, Gartner
Predicting AI's impact on cybersecurity remains fluid, with some threats accelerating and others failing to materialize with the strength and impact we'd expected. In this session, we'll look at offensive and defensive use cases for generative AI spanning three-time horizons — near, far and uncertain and ambiguous. We'll share where we have consensus and where we're still debating, what is interesting and has caught our eye, as well as the dark cases we're eyeing on. ... Show More Show Less

11:00 AM - 11:30 AM IST

Technical Insights: Secure by Design: Engineering Secure Applications

Manjunath Bhat, Distinguished VP Analyst, Gartner
Secure by design is a security engineering approach that enables building software products that are foundationally secure and resilient. This session will review key tenets of the secure by design principle, such as threat modelling, secure by default and software supply chain security. ... Show More Show Less

11:00 AM - 11:30 AM IST

Use Security Reference Architectures to Industrialize Security-by-Design

Richard Bartley, VP Analyst, Gartner
Security-by-design employs a set of best-practice principles early in the architecting process to help ensure security aims are met throughout design. This session explains how to use Gartner’s resources including its reference architecture library to meet security-by-design goals. ... Show More Show Less

12:30 PM - 01:00 PM IST

CISO Edge: Focus on Risk Reduction, Not on Quantifying Cybersecurity’s Value

Wam Voster, VP Analyst, Gartner
CISOs struggle to demonstrate the business value of cybersecurity investment in terms that resonate with business executives. The continuing search for an effective way of quantifying business value is a wild goose chase and an ineffective way of utilizing scarce cybersecurity resources. Rather, focus on maximizing the defined output with available resources and use qualitative narratives and limited, defensible metrics to communicate cybersecurity's value. ... Show More Show Less

12:30 PM - 01:00 PM IST

How to Respond to the Current Threat Landscape

Thomas Lintemuth, VP Analyst, Gartner
The threat landscape is a moving target. Attack campaigns might hit multiple organizations, but each enterprise should analyze its own threat landscape. Security and risk management leaders should gain baseline knowledge on optimizing prediction and prevention, knowing when detection is required, and preparing to respond when things go wrong. ... Show More Show Less

12:45 PM - 01:15 PM IST

5 Security Maturity Assessment Mistakes You Must Not Make

Khushbu Pratap, VP, Team Manager, Gartner
Cybersecurity is a board imperative leading to more CISOs being asked by board members to show how the security program is performing when compared to peers. This session will answer the following questions — why security maturity assessments are critical to strategy creation, what are the types of assessments your peers are taking to measure current statistics and how to avoid common pitfalls. Leverage the results to inform your strategy and subsequent roadmap . ... Show More Show Less

12:45 PM - 01:15 PM IST

Securing the Quantum Frontier: Embracing Postquantum Cryptography Today

Sarah Almond, Director Analyst, Gartner
As quantum computing rapidly advances, the cryptographic foundations that secure our digital world face unprecedented challenges. Traditional encryption methods, which have long safeguarded sensitive data, are increasingly vulnerable to the immense computational power of quantum machines. This session delves into the critical need for transitioning to quantum-resistant encryption technologies. ... Show More Show Less

02:30 PM - 03:00 PM IST

Cybersecurity Isn't Ready for Agents

Shubhangi Vashisth, Sr Director Analyst, Gartner
Why do threat actors target humans? It's because humans have agency and the ability to break rules. What will multidomain autonomous agents possess? Precisely that same agency. As we hastily integrate a nondeterministic layer into an ecosystem built for predictability, the potential for unforeseen issues arises. In this engaging exploration of the future, Gartner experts discuss the challenges posed by agent-based systems and how insights from restaurants and biology might provide solutions. ... Show More Show Less

... Show More Show Less
Items per page: 19 of 33 Items
1 of 3 Pages

Sorry, no sessions match your criteria. Please refine your filters to display sessions.

“The summit was a great learning experience and an excellent platform to exchange ideas. It provided valuable opportunities to deliberate over key topics with peers, making the event both insightful and impactful.”

Mannan Godil,
CISO, BNP Paribas India Solutions

Discover what it’s like to experience Gartner Security & Risk Management Summit.