The CISO Circle Program

With new risks, rapidly evolving technology, geopolitical shifts and AI-driven advancements, the volume and the complexity of cybersecurity decisions across the organization steadily increase. To positively impact enterprise risk decision making, it’s critical for CISOs to effectively engage with the board and fellow C-level executives.

Designed specifically for chief information security officers (CISOs) and chief risk officers (CROs), the CISO Circle Program offers a curated executive experience, delivering presentations, discussions and networking opportunities throughout the conference. 

This experience includes:

Networking and knowledge-sharing opportunities with a group of CISO attendees to swap experiences, trade best practices and expand your executive peer community. 

Access to exclusive sessions throughout the conference, including thought leader lunches, workshops, roundtables, Leadership Exchanges and research discussions tailored to the most important topics for CISOs.

Priority booking capabilities for limited-capacity sessions and One-on-One Meeting(s) with a Gartner expert to ensure you don’t miss out on these conference offerings.

CISO-only sessions

Integrated within the broader conference agenda, the CISO Circle Program includes interactive discussions covering the top priorities of CISOs, as well as casual networking opportunities to connect with other cybersecurity leaders from a variety of regions and industries. Through these sessions, participants connect over common initiatives and accelerate, validate and solidify their strategies. See examples below.

Workshops

  • Workshop: Build Resilience, Avoid Burnout: Mindfulness for Cybersecurity Leaders

Roundtables

  • CISO Circle Roundtable: From Prevention to Resilience — How Do We Shift Cybersecurity’s Mindset?

Research discussions

  • CISO Circle: Elevating Power Skills to Influence Key Stakeholders
  • CISO Circle: Leadership Exchange: Negotiate Protection Levels With Your Executives
  • CISO Circle: Leadership Exchange: How to Explain Cybersecurity to Anyone
  • CISO Circle: Leadership Exchange: Essential Tactics for Mastering Board-Level Cybersecurity Presentations

“This conference is the most direct group of sessions that directly impact my job. This is my fifth year, which is a testament to how I feel this helps me. The CISO sessions are always highly valuable.”

Mario Colon

Global IT Director, Cybersecurity, EBI

Apply to join the program

The CISO Circle Program is exclusive to eligible CISOs attending Gartner Security & Risk Management Summit. We recommend applying when you register for the conference as session seats are limited and fill up quickly.

Applicants must meet the following qualification criteria to participate:

  1. Enterprise-wide Chief Information Security Officer (CISO)/ Chief Risk Officer (CRO), or

  2. Business unit/ regional/ government agency Chief Information Security Officer (CISO)/ Chief Risk Officer (CRO) responsible for:

    • Private sector: €250+ million in revenue

    • Public sector: 1,000+ employees

CISOs/ CROs with client facing/ external responsibilities from an IT security vendor or consultancy are not eligible to participate.

You can apply to participate in the CISO Circle Program when you register for Gartner Security & Risk Management Summit. During the registration process, the program application will be prompted by answering ‘yes’ to the question, “Are you the Chief Information Security Officer or Chief Risk Officer, or do you serve in the Chief Information Security Officer or Chief Risk Officer role for your organization?”. You will be notified via email regarding the status of your application.

Application and approval are required for participation.

Qualifying CISOs or CROs from an information security and risk vendor or consultancy must be involved exclusively in their organization’s internal IT.

Log back into your Gartner conference profile, click “Edit” next to “Registration Profile,” and scroll down to answer the “Attendee Profile” questions.