2026 Security Conference Sessions

Gartner Security & Risk Management Summit 2026 dives deep into key topics for cybersecurity leaders around AI, leadership, cloud security and more to help you address your organization’s mission-critical challenges.

2026 Conference Theme

This year’s conference theme is Smarter, Faster, Stronger … Together.

In an environment characterized by an expanding threat landscape, AI, tariffs, global instability and regulations, the cybersecurity community must gain and share insights faster. Together, we are smarter and stronger.

Explore our conference sessions below, all developed with this theme and top mission critical priorities in mind.

Find Security Conference Sessions

There are hundreds of sessions happening each day. Filter to see sessions that align with your role and interests. After registering for the conference, craft your agenda and book priority sessions — all through Conference Navigator.

Show Filters

Filter Sessions Cancel
Showing 375 Sessions
Clear All
Sunday, May 31, 2026

06:00 PM - 07:30 PM EDT

CISO Welcome Reception Hosted by Sophos

CISO Welcome Reception Hosted by Sophos Show Less
Monday, June 01, 2026

09:30 AM - 10:15 AM EDT

Gartner Opening Keynote: Seize the Moment

Leigh McMullen, Distinguished VP Analyst, Gartner
It feels like everything is happening, everywhere, all at once. But amidst the chaos, there are opportunities, “moments” that we can seize, to ensure Cybersecurity’s success. What if we could use our organizations’ rush to AI as an opportunity to modernize both human and machine identity? What if we could turn the inevitability of cyber-attacks into a learning cycle that continuously makes us smarter, stronger, faster and more resilient? What if we could monetize our innovation with a cycle of continuous learning to fund even more innovation? Join this keynote and learn how to seize these moments! ... Show More Show Less

11:00 AM - 11:30 AM EDT

3 Things You Need to Do Today to Enable Postquantum Cryptography

Sarah Almond, Director Analyst, Gartner
The move to postquantum cryptography will be a companywide effort that will affect every part of data security, cloud management, I&O, IAM and most other systems. But, with a problem so large, where should you begin? In this session, we will go over the three initial steps that will form a solid foundation for ongoing efforts in the transition, promoting a smooth and scalable process over the next two years. ... Show More Show Less

11:00 AM - 11:45 AM EDT

Ask the Analyst: Technical Insights: Starting and Scaling DevSecOps

Greg Harris, Sr Director Analyst, Gartner
Stuck on your DevSecOps journey or not sure where to begin? Bring your questions to this analyst-led session focused on practical ways to embed AppSec into DevOps and empower security champions. Get unstuck and accelerate your progress — no presentation, just actionable advice. ... Show More Show Less

11:00 AM - 11:45 AM EDT

Ask the Analyst: Using AI for Cybersecurity

Jeremy D'Hoinne, Distinguished VP Analyst, Gartner
This open-ended session is an opportunity for attendees to ask any questions they have about AI and cybersecurity. “What is the best AI for cybersecurity?” “What should we expect from AI in the future?” “Should I wait or trust my vendor about this new GenAI feature?”, are some of the questions that will be answered. ... Show More Show Less

11:00 AM - 11:45 AM EDT

Ask the Analyst: What’s New in U.S. Federal Cybersecurity Policy and Regulations?

Katell Thielemann, Distinguished VP Analyst, Gartner
Cybersecurity concerns are remarkably bipartisan due to their direct link to national security and economic prosperity, but each administration puts its own stamp on how to address these concerns. One and a half years into the current administration, what has changed, what’s the impact and what’s next? ... Show More Show Less

11:00 AM - 12:00 PM EDT

CISO Circle Leadership Exchange: A New Framework for Cybersecurity Board Reporting

Tom Scholtz, Distinguished VP Analyst, Gartner
Sam Olyaei, Managing Vice President, Gartner
Board reporting on cybersecurity must be clear, concise and consistent. Using a framework derived from financial reporting standards will help CISOs and CIOs achieve this goal. Show Less

11:00 AM - 11:30 AM EDT

How to Create, Implement and Use a Vendor Trust Index to Guide Cybersecurity Product Selection

Wayne Hankins, Sr Director Analyst, Gartner
Many cybersecurity buying decisions are based on technical capabilities and price (and not necessarily in that order). As platforms become the norm and more and more functionalities depend on less vendors, it is equally as important to have an index of vendor trust that can inform your buying decisions, especially in more commoditized markets. This session will introduce the Vendor Trust Index, explain its use, and show how to effectively develop one that is tailored to your organizational objectives. ... Show More Show Less

11:00 AM - 11:30 AM EDT

How to Prepare a Cybersecurity Budget in a VUCA World

Elizabeth Davis, Sr Director Analyst, Gartner
In a volatile, uncertain, complex and ambiguous (VUCA) world, preparing a cybersecurity budget requires shifting from a static, reactive approach to a flexible, risk-based strategy. The goal is to build resilience against unpredictable threats by aligning security investments with dynamic business priorities. ... Show More Show Less

... Show More Show Less
Items per page: 19 of 375 Items
1 of 41 Pages

Sorry, no sessions match your criteria. Please refine your filters to display sessions.

“Insightful, informative and actionable. This provides our organization opportunity to succeed in this space and provide value to our stakeholders. This conference continuously provided learning opportunities, networking with fellow practitioners [and more].”

Dennis Mathew Opiso
CISO, JG Summit Holdings

Discover what it’s like to experience #GartnerSEC

Learn more about Gartner Security & Risk Management Summit 2026

Get our latest conference schedules, updates and insights sent straight to your inbox.

By clicking the "Continue" button, you are agreeing to the Gartner Terms of Use and Privacy Policy.

Contact Information

All fields are required.