Explore this year’s sessions

Gartner Security & Risk Management Summit 2026 dives deep into key topics for cybersecurity leaders around AI, risk management, cloud security and more.

2026 Conference Theme

Smarter, Faster, Stronger … Together

Tariffs, global instability, and AI threats are making CISOs’ jobs tougher. As we defend AI investments and fight AI-enabled attacks, sharing insights within the cybersecurity community is crucial. Together, we’re smarter and stronger.

Explore our conference sessions below, all developed with this theme in mind.

Find Conference Sessions

There are hundreds of sessions happening each day. Filter to see sessions that align with your role and interests. After registering for the conference, craft your agenda and book priority sessions — all through Conference Navigator.

Show Filters

Filter Sessions Cancel
Showing 29 Sessions
Clear All
Monday, 09 March, 2026

11:00 AM - 11:30 AM IST

CISO Edge: Focus on Risk Reduction, Not on Quantifying Cybersecurity’s Value

Wam Voster, VP Analyst, Gartner
CISOs struggle to demonstrate the business value of cybersecurity investment in terms that resonate with business executives. The continuing search for an effective way of quantifying business value is a wild goose chase and an ineffective way of utilizing scarce cybersecurity resources. Rather, focus on maximizing the defined output with available resources and use qualitative narratives and limited, defensible metrics to communicate cybersecurity's value. ... Show More Show Less

11:00 AM - 11:30 AM IST

Use Security Reference Architectures to Industrialize Security-by-Design

Patrick Hevesi, VP Analyst, Gartner
Security-by-design employs a set of best-practice principles early in the architecting process to help ensure security aims are met throughout design. This session explains how to use Gartner’s resources including its reference architecture library to meet security-by-design goals. ... Show More Show Less

11:00 AM - 11:30 AM IST

Technical Insights: Secure by Design: Engineering Secure Applications

Manjunath Bhat, Distinguished VP Analyst, Gartner
Secure by design is a security engineering approach that enables building software products that are foundationally secure and resilient. This session will review key tenets of the secure by design principle, such as threat modelling, secure by default and software supply chain security. ... Show More Show Less

12:30 PM - 01:00 PM IST

Outlook for Human Factors in Cybersecurity

Will Candrick, Sr Director Analyst, Gartner
The vast majority of cybersecurity investment prioritizes technical solutions. Yet most cyber incidents involve human error. What many cybersecurity leaders miss is the human factor. People-ranging from the c-suite to line-level employees — have a massive impact on cyber risk outcomes. Learn how cybersecurity leaders can use human factors in security to their advantage! ... Show More Show Less

12:45 PM - 01:15 PM IST

5 Emerging Tactics for CISOs to Harness and Scale Generative AI Securely

Craig Porter, Director Analyst, Gartner
Security leaders are challenged to provide solid governance to securely scale multiple use-cases generative AI provides for the business. Join this session to learn how to lead your organization's generative AI transformation confidently. ... Show More Show Less

12:45 PM - 01:15 PM IST

The CISO’s Guide to Their First Year In Role

Tom Scholtz, Distinguished VP Analyst, Gartner
Your first 100 days as a CISO determine your success in creating a security-conscious organization. This presentation provides guidance and support to help new cybersecurity leaders maximize their success during this pivotal transition phase. ... Show More Show Less

02:30 PM - 03:00 PM IST

Technical Insights: How to Mitigate the Threat of Identity Impersonation Using Deepfakes

Abhyuday Data, Director Analyst, Gartner
Attackers are increasingly using deepfakes to try and defeat automated voice biometrics and identity verification processes. Additionally, security leaders are dealing with person-to-person use cases, such as attackers impersonating company executives to request money transfers from employees. Learn about the current state-of-the-art in deepfake detection and approaches to mitigation. ... Show More Show Less

02:30 PM - 03:00 PM IST

Forget the Hype: 5 Key Things You Should Be Doing to Secure Your Endpoints

Deepak Mishra, Sr Director Analyst, Gartner
In a world full of hype and distractions, organizations need to focus on fundamentals and foundational security techniques before moving on to the latest and greatest hype. In this session, attendees will learn the 5 key things that every organization should be doing to secure their endpoints and reduce the attack surface. ... Show More Show Less

02:30 PM - 03:00 PM IST

Cybersecurity Isn't Ready for Agents

Meghan Hollis, Sr Principal Analyst, Gartner
Why do threat actors target humans? It's because humans have agency and the ability to break rules. What will multidomain autonomous agents possess? Precisely that same agency. As we hastily integrate a nondeterministic layer into an ecosystem built for predictability, the potential for unforeseen issues arises. In this engaging exploration of the future, Gartner experts discuss the challenges posed by agent-based systems and how insights from restaurants and biology might provide solutions. ... Show More Show Less

... Show More Show Less
Items per page: 19 of 29 Items
1 of 3 Pages

Sorry, no sessions match your criteria. Please refine your filters to display sessions.

“The summit was a great learning experience and an excellent platform to exchange ideas. It provided valuable opportunities to deliberate over key topics with peers, making the event both insightful and impactful.”

Mannan Godil,
CISO, BNP Paribas India Solutions

Discover what it’s like to experience Gartner Security & Risk Management Summit.

Learn more about Gartner Security & Risk Management Summit 2026

Get our latest conference schedules, updates and insights sent straight to your inbox.

By clicking the "Continue" button, you are agreeing to the Gartner Terms of Use and Privacy Policy.

Contact Information

All fields are required.