Gartner Security & Risk Management Summit

7 – 8 March 2022 | India | Virtual

Enabling Innovation: Secure the Future. Manage Risk. Build Resiliency.

Recent global events have shown that innovation is essential for enterprises to survive and flourish. But accelerating digital innovation brings new complexity and risk.

As a security and risk management leader, you can enable your enterprise to embrace the technologies of tomorrow, today — and do it in the safest possible manner. You can help your colleagues understand the risks inherent in digital initiatives so that they can realize the benefits of innovation securely. And you play a key role in making sure that security resilience is built-in from the start.

Leadership & Strategy

Advance your leadership skills and learn how to develop a security strategy for agility and resilience in uncertain times.


Unlock the potential of new and emerging technologies, and meet the providers changing the security and risk landscape.

Critical Insights

Explore the latest trends in cloud security, privacy, threat management, infrastructure protection, application security, cybersecurity mesh and more. 

As we turn the corner on what has been categorized as the great challenge of our generation, there is an immense need to clear the slate and refocus. The Gartner Security & Risk Management Summit allows us to come together as a community, explore the latest insights and recommendations, exchange new ideas, and help one another. This is your chance to reset the clock and align your focus for a new landscape and a new set of opportunities.

Nader Henein

VP Analyst

2022 Conference Brochure

Explore the 2022 virtual conference brochure to learn more about the tracks directly from the track managers, topic-focused agenda delivering the latest technology, strategy and leadership insights across topics, covering the challenges most critical to CISOs, security and risk management executives.

Want to stay informed?

Get conference email updates.
Contact Information

All fields are required.

  • Step 2 of 2

    Join a global community of CISOs and security and risk leaders

    Whether you’re a chief information security officer (CISO) looking to improve your leadership skills, a security professional who needs practical advice to accelerate progress on your next initiative or a business continuity management leader trying to implement resilience practices across the organization, you’ll find your program, peers and strategic partners at this conference:

    Define your strategy for agility and resilience in uncertain times
    • Effectively balance the increasing volume, variety, and speed of security and risk decisions. 
    • Successfully communicate security risks, challenges and opportunities to senior executives.
    • Assess and transform security programs to become digital business enablers.
    • Prepare for continuous change in the technology and threat landscape.
    • Overcome the barriers of organizational culture, resources and talent to grow and scale your digital initiatives.
    Develop security programs to respond to emerging threats and advanced attacks
    • Balance real-world risks with business drivers such as speed, agility, flexibility and performance.
    • Develop and maintain effective security governance across the organization.
    • Establish key metrics and indicators to measure the effectiveness of security programs.
    • Anticipate the emergence of advanced attacks that evade traditional security.
    Gain critical insights to measure and manage the impact of risk on digital business
    • Measure and manage the impact of risk on business performance.
    • Establish and maintain your organization’s overall IT risk management program.
    • Manage and oversee the monitoring of risk mitigation and coordination of policy and controls.
    • Implement practices that meet defined policies and standards for information risk management.
    • Determine acceptable levels of risk for the company as a whole and for various internal departments and organizations.
    • Benchmark risk management practices of other companies, understand industry best practices and monitor the legal and regulatory environment.
    Select and architect effective security and risk solutions
    • Understand how the characteristics of digital business impact security architecture practices.
    • Enable a tighter alignment between security and business.
    • Develop security architecture frameworks to address compliance demands and evolving IT.
    • Gain insight into the increasingly complex market for security and risk management technologies and services.
    Gain critical insights to sustain effective IAM programs to provide the right access to the right people
    • Improve capabilities and implement technologies to establish advanced threat detection and protection.
    • Strengthen privileged access management practices to prevent breaches.
    • Manage the acceleration of multifactor authentication deployments.
    • Meet changing customer needs with consumer IAM.

    The CISO Circle

    The CISO Circle is an exclusive program within the overall agenda designed for chief information security officers (CISOs) to explore new strategies, share innovative ideas and grow their community of peers.

    Tracks at a Glance

    Access the latest Gartner research specifically designed to help security and risk management leaders improve resilience, accelerate innovation and drive business growth. Each track has a particular area of focus to help you deliver on what matters most to you and your organization.

    Track A

    Management & Leadership

    Prioritizing decisions related to unknown risks and known exposures is a constant challenge. This track discusses top security and risk management trends in 2022, leadership vision for actionable change and practical use cases for risk decision making.

    Track B

    Digital Risk Management

    New risk assessment models are designed to address two critical aspects of digital business: speed and scalability. This track offers ideas and tools for you, a risk leader, to innovate risk management practices and optimize the value of your risk management investment.

    Track C

    Security Technology and Architecture

    The number of security product and service solutions in the market is staggering and is complicated by the evolving range of delivery models. This track provides insights into the security markets and best practices in adopting and using technology solutions.

    Spotlight Track

    Infrastructure Protection Strategies

    This spotlight track provides fresh, practical strategies to address the most significant future risks: transformation to location-independent enterprise, migrating to cloud-delivered and cloud-secured solutions, evolution of networks in the cornerstone of IOT security and Identity first security in a perimeter-less enterprise

    Spotlight Track

    Business Enablement

    This spotlight track provides insights into and guidance on core security disciplines. It offers a foundation that enables organizations to embrace digital initiatives more rapidly, with reduced risk and greater confidence.

    Spotlight Track

    Technical Insights

    This spotlight track delivers actionable, technical insights into security best practices, methodologies and tools needed to ensure deployment success. Learn how to successfully architect, implement and operate scalable security controls in and beyond the enterprise and across the cloud.

    Ready to register?

    Secure your space now.