Speaker Bio
Richard (Rich) Addiscott is a Vice President Analyst with Gartner. Mr. Addiscott works with Chief Information Security Officers and cybersecurity leaders covering topics focused on improving information and cybersecurity risk management maturity and outcomes, executive cybersecurity leadership capability, Board and executive communication, fostering secure behavior and culture, optimizing organisational security risk postures, building high performing security teams, and demonstrating clear alignment between security and strategic business outcomes.
Show More
Show Less
Sessions
Tuesday, 04 August, 2026
11:00 AM - 12:30 PM BRT
Workshop: Design your Future-State Cybersecurity Operating Model
Richard Addiscott,
VP Analyst, Gartner
With constant change in technology, threats and business demands, success depends on a cybersecurity operating model tailored to your organization’s unique context. This workshop will guide attendees in defining the current state of their operating model and envisioning the future state needed to drive optimal cybersecurity outcomes in a rapidly evolving environment.
...
Show More
Show Less
Wednesday, 05 August, 2026
12:00 PM - 12:30 PM BRT
Cybersecurity Planning Guide: Navigate AI Disruption and Geopolitical Volatility
Richard Addiscott,
VP Analyst, Gartner
Global conflict, AI-based disruption and political upheaval continue to impact the risk landscape for organizations. In this environment, cybersecurity programs become paramount. This session will provide insights into the current global cybersecurity landscape.
...
Show More
Show Less
Wednesday, 05 August, 2026
03:45 PM - 04:15 PM BRT
Outlook for Human Factors in Cybersecurity: Adapt to Optimize
Richard Addiscott,
VP Analyst, Gartner
The human factor continues to be one of the biggest contributors to data breaches and in the age of AI, this is only amplified. CISOs must take into account omnipresent and emerging human-centric factors to ensure they have an effective cybersecurity program. Join this session to hear about the how the human element is shaping and being shaped to optimize your cybersecurity program.
...
Show More
Show Less