Explore this year’s tracks

View tracks for cybersecurity executives and dive into last year’s sessions while we work on the full 2026 agenda.

Learn more about Gartner Security & Risk Management Summit 2026

Get our latest conference schedules, updates and insights sent straight to your inbox.

By clicking the "Continue" button, you are agreeing to the Gartner Terms of Use and Privacy Policy.

Contact Information

All fields are required.

Conference Tracks at a Glance

This year's conference theme is Smarter, Faster, Stronger … Together. In an environment characterized by tariffs, global instability, regulations, an expanding threat landscape and AI, the cybersecurity community must gain and share insight faster. Together, we are smarter and stronger.

A: Cybersecurity Leadership and Innovation

Cybersecurity leaders face relentless change from AI, regulation and business demands. Learn how to shape business-aligned cybersecurity strategies, optimize resources, improve your leadership effectiveness and drive innovation, resilience, and executive confidence.

B: Cyber Risk and Resilience

Cyber risk management is an operational imperative driven by global regulations. This track delivers insights to help you strengthen cyber resilience and effectively manage risks. Key topics include cyber resilience, third-party risk, privacy, AI, operational technology and organizational resilience.

C: Infrastructure and Cloud Security

Securing infrastructure is key to any organization’s cybersecurity strategy. The move to a hybrid-focused environment is increasing this challenge. This track explores how zero trust and AI can come together with traditional cybersecurity products to secure your infrastructure and defend your organization from attack.

Look back at 2025 Conference Sessions

Lots of conference sessions were presented each day at Gartner Security & Risk Management Summit 2025. While we work to develop this year's agenda, filter to see sessions that align with your role and interests.

Show Filters

Filter Sessions Cancel
Showing 112 Sessions
Clear All
Wednesday, 23 July, 2025

09:30 AM - 10:15 AM JST

Gartner Opening Keynote: Harness the Hype: Turning Disruption Into Cybersecurity Opportunity

Mark Horvath, VP Analyst, Gartner
Richard Addiscott, VP Analyst, Gartner
Our organizations understand they can’t ignore cybersecurity. In our turbulent environment, the extremes of unbridled technology optimism and excessive preoccupation with risk endanger us. Hype, whether driven by AI, emerging technologies, geopolitical changes or latest headline-grabbing cyber attack, threatens to derail strategic objectives and the partnership between cybersecurity and the rest of the business. This keynote will help exploit hype's power to drive your cybersecurity program and the resilience of your organization. ... Show More Show Less

10:30 AM - 11:15 AM JST

Guest Keynote: Integration of Cyber Attack Observation and Cybercrime-as-a-Service Monitoring for Threat Trends and Risk Assessment

Katsunari Yoshioka, Professor, Institute of Advanced Sciences & Graduate School of Environment and Information Sciences and Chief Information Security Officer (CISO), Yokohama National University
This presentation delves into our participation in the ""Advanced Cyber Defense and Analysis Capability Enhancement"" project, selected under the Key and Advanced Technology R&D through Cross-Community Collaboration Program (K Program) led by the Cabinet Office and the Ministry of Economy, Trade, and Industry to foster critical technologies in economic security.
We introduce our efforts in collecting and analyzing cyber threat intelligence and assessing risks. This project enhances the accuracy of threat trend and risk assessment by integrating dark web, Telegram, Discord, and other social media monitoring key platforms for cybercriminal activity into existing cyber attack observation mechanisms. Additionally, we showcase the latest AI-driven research and development in this field.
... Show More Show Less

11:25 AM - 12:25 PM JST

VIP Lunch by Google Japan

More information is coming soon. Show Less

11:30 AM - 12:00 PM JST

[Luncheon] Menlo Security: Securing your Browser with Browser Security

Hiroto Takayanagi, COUNTRY MANAGER, Menlo Security
The ‘Browser’ is an important asset for companies to protect and secure. In recent years, business conducted via the browsers have increased, but so have the security risks such as information leaks and malware infections are targeting the browser. By using Browser Security you can control and secure your browser to create a secure work environment to protect the ‘Browser’. ... Show More Show Less

11:30 AM - 12:00 PM JST

[Luncheon] Netskope: Information coming soon

Mick Etoh, CXO Advisor, Netskope, Inc.
More information is coming soon. Show Less

11:30 AM - 12:00 PM JST

[Luncheon] Proofpoint: Gen AI Breaks Language Barriers-Japan Must Rethink Defense

Yukimi Sohta, CHIEF EVENGELIST, Proofpoint Japan K.K.
Since late 2023, DDoS attacks have continued, but new email threats are now rapidly increasing worldwide. Japan is especially targeted—84.6% of such attacks from January to April 2025 were aimed at Japan. The rise of generative AI has removed language barriers, making it easier to craft attacks in Japanese. This presentation examines attacker tactics, how Japan is being targeted, and what new threat landscape Japanese companies face. We will also explore how CISOs must now redefine their defenses. ... Show More Show Less

11:30 AM - 12:00 PM JST

[Luncheon] Yubico: Cyber Resilience Starts with Creating Phishing-Resistant Users

Junichi Ohtomo, Sales Director, Commercial Sales, Yubico
Enterprise cyber resilience depends on reliable, predictable and consistent user authentication. Malicious actors target individual users, aiming to steal credentials or bypass legacy MFA. Adopting phishing-resistant MFA is an important step, but too often enterprises look at authentication as disconnected points-in-time, leaving account lifecycle management and users vulnerable. Learn why true cyber resilience requires authentication to move seamlessly and consistently with users, creating a fully phishing-resistant enterprise. ... Show More Show Less

12:10 PM - 12:25 PM JST

[Theater] GMO Flatt Security: Next-Gen Pen Testing for AI Application Development

Keijiro Toyoda, Chief Creative Officer, Flatt Security Inc.
The rapid proliferation of AI technology has introduced new security challenges that are difficult to address with conventional penetration testing methods.
In this session, we present strategies
for addressing risks unique to AI applications by drawing from our extensive experience conducting penetration tests for applications leveraging AI agents along with our development of "Takumi", Japan's first AI agent for security.
We'll explain emerging threats like prompt injection and RAG data poisoning. Recognizing that attackers are also leveraging AI as a weapon, we'll discuss the critical necessity of automating and enhancing security operations. We'll provide CISOs and security practitioners with an essential, up-to-date understanding of penetration testing in the AI era.
... Show More Show Less

12:10 PM - 12:25 PM JST

[Theater] Splunk Services: Reconstructing Security in the AI Era

Hidekazu Fujimori, Sr. Solutions Architect, Splunk Services Japan
Nowadays, as the term AI is becoming commonplace, the era of AI in security has certainly arrived. Previously, Cisco and Splunk have been actively adopting AI in security, providing solutions and services that are Better Together in this field as well. In this session, we will explain Cisco and Splunk's approach to AI, and the next-generation security using AI that will be essential in the future. ... Show More Show Less

... Show More Show Less
Items per page: 19 of 112 Items
1 of 12 Pages

Sorry, no sessions match your criteria. Please refine your filters to display sessions.

“I attended to gather the latest security trends. The sessions covered various topics from technology to human skills, which were useful for my work. I also learned that generative AI is a key topic, as it was featured in many sessions.”

Security Specialist, Technology and Telecom

Discover what it’s like to experience Gartner Security & Risk Management Summit.