All 2025 Conference Sessions

Gartner Security & Risk Management Summit 2025 dove deep into key topics for CISOs & IT leaders around AI, cloud, risk management and more.

Session Take-Aways

Dive into some of the key take-aways you may have missed from Gartner Security & Risk Management Summit.

Gartner Keynote: Harness the Hype: Turning Disruption Into Cybersecurity Opportunity

Speakers:

  • Leigh McMullen, Distinguished Vice President
  • Christine Lee, Vice President

Key take-aways

  • Be mission-aligned: When CISOs communicate in terms of protection levels and buying down exposure levels, they are less likely to get caught up in someone else’s marketing hype. This eventually helps CISOs prove that their cybersecurity efforts are aligned to their organization’s mission.
  • Be innovation-ready: CISOs must cultivate AI literacy, experiment with AI in cybersecurity and protect AI investments in their organizations.
  • Be change-agile: CISOs must be able to empower their teams to be part of the solution and feel agency. If CISOs’ teams feel agency, they will want to focus on automating repetitive tasks and developing new skills to fuel your growth, as well as theirs, which in turn will make them resilient agents of change no matter what that change is.

Technical Insights: How to Mitigate Deepfake Identity Impersonation Attacks

Speaker:

  • Akif Khan, Vice President

Key take-aways

  • GenAI-created deepfakes can be used by attackers to impersonate the identity of genuine customers or employees. Deepfakes can be combined with social engineering in calls to employees to try to trick them into helping the attackers achieve their goals.
  • Preventing deepfake identity impersonation attacks is not just about being able to detect the deepfake, as all risk signals are useful.
  • Deepfakes and social engineering are a bad combination. CISOs must make their people and processes more resilient but stay aware of nascent technical solutions.

Future of AI in Cybersecurity: Predictions and Challenges for 2025-2028

Speaker:

  • Jeremy D’Hoinne, Distinguished Vice President

Key take-aways

  • Do not use AI as an excuse and hope for a magical AI solution to solve all cybersecurity issues.
  • Cybersecurity objectives must lead AI adoption, not the other way around.
  • AI requires increased cybersecurity investments, not less.
  • CISOs must become "Agile AI Tinkerers.”
  • Ensure cybersecurity objectives drive the use cases.

Be the first to receive the 2026 conference agenda.

Get the latest details around the 2026 conference agenda, speakers and more straight to your inbox.

By clicking the "Continue" button, you are agreeing to the Gartner Terms of Use and Privacy Policy.

Contact Information

All fields are required.

background wave background wave background wave
Look back at 2025 conference sessions

Hundreds of conference sessions were presented each day at Gartner Security & Risk Management Summit 2025. While we work to develop this year’s agenda, filter to see sessions that align with your role and interests.

Show Filters

Filter Sessions Cancel
Showing 252 Sessions
Clear All
Monday, 22 September, 2025

09:30 AM - 10:15 AM BST

Gartner Opening Keynote: Harness the Hype: Turning Disruption Into Cybersecurity Opportunity

Christine Lee, VP, Research, Gartner
Leigh McMullen, Distinguished VP Analyst, Gartner
Organizations understand that cybersecurity can't be ignored. In this turbulent environment, we're endangered by the extremes of unbridled technology optimism and excessive preoccupation. Hype, whether driven by AI, emerging technologies, geopolitical changes or latest headline-grabbing cyber attack, threatens to derail strategic objectives and the partnership between cybersecurity and the rest of the business. This keynote will help cybersecurity leaders exploit hype's power to strengthen the cybersecurity program and organizational resilience. ... Show More Show Less

10:30 AM - 10:50 AM BST

DataBee: The Dawn of Frameworks and Measuring Cybersecurity Business Value

Robin Das, SENIOR DIRECTOR, Comcast
Since the dawn of cyber, we’ve focused on tools and technologies to protect, defend and respond to threats. Although organizations are spending more, why don’t they feel more protected? When showing the board how good their catching and patching is, why doesn’t it resonate? Attendees will learn how to leverage frameworks that evolve the discussion to risk, business value and investment trade-offs and how unified data underpins this discussion. ... Show More Show Less

10:30 AM - 10:50 AM BST

Google Chrome Enterprise: Seamlessly Integrate Your Secure Enterprise Browser & Security Operations

Oliver Madden, Chrome Enterprise Specialist, Google
Max Boella, CUSTOMER ENGINEER, CHROME ENTERPRISE PRE, Google
Delve into the critical integration of Chrome Enterprise Premium (CEP) and Google SecOps, highlighting key strategies for enhancing organizational security posture. We will explore the security reporting capabilities within the CEP Console and discuss best practices for operationalising CEP within your SecOps framework. Gain insights into streamlining security workflows and maximizing the power of their Chrome Enterprise Premium deployment. ... Show More Show Less

10:30 AM - 10:50 AM BST

BeyondTrust: A CISO’s Journey to Zero Trust

Morey Haber, CHIEF SECURITY ADVISOR, BeyondTrust
Zero Trust is now essential as legacy security architectures and network defenses are ineffective in this cloud-first, remote world. Public and private sectors are adopting its principles as the best defense. NIST and DoD offer guidance, and solutions like BeyondTrust Privileged Access Management help bridge theory and practice. Learn why Zero Trust matters, how to build a path to it, and how PAM supports it beyond the buzzword. ... Show More Show Less

10:45 AM - 12:15 PM BST

CISO Circle: Workshop - Elevating Power Skills to Influence Key Stakeholders

Christopher Mixter, VP Analyst, Gartner
As cybersecurity becomes central to achieving business outcomes, the need to engage and partner with a broader range of senior management increases. Join this session to elevate your power skill of influencing key stakeholders and maximize your executive impact. ... Show More Show Less

11:00 AM - 11:30 AM BST

Outlook for Infrastructure Security 2026

Thomas Lintemuth, VP Analyst, Gartner
In 2026, the cybersecurity landscape will be characterized by unprecedented threats, necessitating innovative solutions and a proactive approach. Discover insights into how infrastructure security integrates endpoint security, network security, and cloud security to combine innovation and action in addressing the ever-changing threats to infrastructure. ... Show More Show Less

11:00 AM - 11:30 AM BST

Technical Insights: You Can't Patch Them All: Prioritize Your VM Program in 2026

Steve Santos, Sr Director Analyst, Gartner
The ultimate goal of patching everything quickly is unobtainable for any organization. The goal leads to a business risk objective that remains unrealized while impacting operation team morale. This session discusses how to prioritize your VM program to obtain measurable risk reductions for your organization. ... Show More Show Less

11:00 AM - 11:45 AM BST

Roundtable: Use Regulatory Expansion to Drive Investment in Cyber Resilience

David Gregory, VP Analyst, Gartner
There is a global shift in regulations and thus, a heightened focus on cyber resilience. Join us to know how this shift is impacting boardroom dynamics and budget discussions, and if the security leaders are seeing increased financial support and backing from the executives for addressing cyber risk and resilience. We explore how this is playing out when it comes to acceptance, mitigation and funding decision around security compliance. ... Show More Show Less

11:00 AM - 11:45 AM BST

Ask the Expert: What to Expect When You're Expecting Quantum Computing: A CISO Discussion

Mark Horvath, VP Analyst, Gartner
Quantum computing is just the starting point to entering the market, but what is it really good for? Is this something your organizations needs or is it just nice to have? With all of the hyperbole, how should CISOs set their expectations about the scope, impact and utility of quantum computing. This session gives IT leaders an opportunity to ask questions about this emerging technology and get a pragmatic view. ... Show More Show Less

... Show More Show Less
Items per page: 19 of 252 Items
1 of 28 Pages

Sorry, no sessions match your criteria. Please refine your filters to display sessions.

“Gartner Security & Risk Management Summit enables me to plan the roadmap in an efficient matter that makes the organization reach its business goals. This is a high-end conference that all security leaders should attend.”

Runar Viken
Head of Cybersecurity, Brønnøysundregistrene

Discover what it’s like to experience #GartnerSEC