Mumbai, India, March 10, 2026
Mumbai, India, March 10, 2026
It’s not too late to join the conference
Overview
We are bringing you news and highlights from the Gartner Security & Risk Management Summit, taking place this week in Mumbai, India. Below is a collection of the key announcements and insights coming out of the conference. You can read the highlights from Day 1 here.
On Day 2 of the conference, we are discussing how chief information security officers can strategically optimize their third‑party cyber-risk management investments in 2026 and beyond, exploring how to elevate identity and access management (IAM) with an identity‑first security approach, and examining how organizations can build privacy programs capable of adapting to the evolving regulatory landscape. Be sure to check this page throughout the day for updates.
Key Announcements
Presented by Rahul Balakrishnan, Sr Director Analyst, Gartner
As the frequency and impact of disruptions caused by third‑party cyber incidents continue to rise, it is becoming clear that most third‑party cyber risk programs are not adequately prepared to meet current challenges. In this session, Rahul Balakrishnan, Senior Director Analyst at Gartner, outlined how chief information security officers (CISOs) can strategically optimize their third‑party cyber-risk management (TPCRM) investments in 2026 and beyond.
“As regulatory guidance around TPCRM has accelerated globally and in India over the last five years, cybersecurity leaders must use the expanding and prescriptive regulatory mandates to transform TPCRM risk into clear business requirements that drive the investment roadmap.”
“CISOs should create a strategy that uses indirect monitoring to spot potential risks in a third party’s security posture and direct monitoring to track risks through internally exposed services, ensuring resources are focused on the exposures that matter most.”
By 2028, half of all TPCRM programs will focus on continuous monitoring, allowing CISOs to repurpose due diligence resourcing to other high-value third-party risk mitigation activities.
“As developing GenAI applications in-house is costly, many organizations rely on third‑party LLMs or GenAI-enabled SaaS solutions, making it critical for CISOs to have a clear view of the data security controls these third parties have in place to protect the organization’s data held in third-party environments.”
“Gartner predicts that by 2028, 70% of organizations and vendors will use GenAI to complete and analyze TPCRM questionnaires, rendering the outputs increasingly unusable and disconnected from actual risk indicators. Therefore, it is essential to have human analysts validate the work done by GenAI for critical third parties.”
Journalists can receive additional information and/or request an interview with the Gartner expert by contacting Sonika Choubey at sonika.choubey@gartner.com
Presented by Sarah Almond, Director Analyst, Gartner
Modern identity and access management (IAM) strategies now strengthen security while reducing the friction caused by legacy cybersecurity controls. In this session, Sarah Almond, Director Analyst at Gartner, explained why cybersecurity leaders must elevate IAM from a tactical or a checkbox exercise to a core pillar of cybersecurity strategy.
“Identity‑first security succeeds only when it is consistent, context‑aware, and continuous.”
“Traditional IAM approaches, designed for human users, fall short of addressing the unique requirements of machines, such as devices and workloads. Without a cohesive machine IAM strategy, organizations risk compromising the security and integrity of their IT infrastructure.”
“Identity visibility and intelligence platforms (IVIP) unify IAM data, activities, relationships, configurations, and posture into a single‑pane‑of‑glass view with actionable insights, giving cybersecurity leaders a comprehensive understanding of the IAM attack surface.”
“Gartner predicts that by 2028, 70% of chief information security officers (CISOs) will utilize an IVIP to shrink their IAM attack surface.”
Journalists can receive additional information and/or request an interview with the Gartner expert by contacting Sonika Choubey at sonika.choubey@gartner.com
Presented by Shadrock Roberts, Director Analyst, Gartner
With emerging regulations, advancing technologies and rising stakeholder expectations, cybersecurity leaders are navigating an increasingly complex and fast‑shifting landscape. In this session, Shadrock Roberts, Director Analyst at Gartner, explored how organizations can build privacy programs capable of adapting to uncertainty.
“Success in this dynamic landscape demands organizational agility, strategic foresight into emerging trends, and strong cross‑functional coordination.”
“It isn’t just about ticking boxes or avoiding penalties. Privacy is now a core expectation, and organizations that treat it as a business opportunity rather than a compliance task, will build trust, stand out in the market, and avert costly disruptions.”
“While privacy can seem complex, focusing on core principles such as purpose limitation, data minimization, security, transparency, and accountability gives organizations a clear and effective starting point for DPDP success.”
Journalists can receive additional information and/or request an interview with the Gartner expert by contacting Sonika Choubey at sonika.choubey@gartner.com
Gartner (NYSE: IT) delivers actionable, objective business and technology insights that drive smarter decisions and stronger performance on an organization’s mission-critical priorities. To learn more, visit gartner.com.