Gartner’s Chief of Research for Risk & Security, Paul Proctor, announced a year ago that Gartner had reset its approach for analyst coverage of Governance, Risk & Compliance (GRC) technologies. After a year of effort transforming our approach, we are expanding our coverage to include additional new research deliverables in 2015. I worked with Paul and our GRC analyst team to architect our expanded coverage in alignment with Gartner’s pace-layering approach for building a GRC Application Strategy. See my research note on “How to Use Pace Layering to Build a GRC Application Strategy” to learn more.
In 2014, we published the following GRC related deliverables under the respective analyst leadership:
- Magic Quadrant for Business Continuity Management Planning Software – Roberta Witty
- Magic Quadrant for IT Vendor Risk Management (New) – Chris Ambrose
- Magic Quadrant for Operational Risk Management (New) – John Wheeler
- Market Guide for Audit Management Solutions (New) – Khushbu Pratap
In 2015, we plan to publish the following additional GRC related deliverables under the respective analyst leadership:
- Magic Quadrant for IT Risk Management (New) – Paul Proctor
- Market Guide for Corporate Compliance & Oversight (New) – Jeffrey Wheatman
- Market Guide for Enterprise Legal Management (New) – Jie Zhang
- Market Guide for GRC Software Platforms (New) – John Wheeler
- Hype Cycle for GRC Technologies – John Wheeler
In addition, we will be developing additional coverage in 2015 of targeted GRC topics with our Gartner for Technical Professionals (GTP) analyst team as well as GRC market sizing and trend analysis with our Gartner Technology & Service Providers (T&SP) team. Our complete planned coverage and associated lead analysts are provided below.
If you are a vendor in one of these GRC market segments and want to learn more about our expanded coverage, please tweet me at @JohnAWheeler or schedule a vendor briefing with our Vendor Briefings team by emailing email@example.com.
Read Complimentary Relevant Research
Five Golden Rules for Creating Effective Security Policy
Policy writing is a risk communication exercise that is frequently performed by people who lack the skills needed to create good security...
View Relevant Webinars
What Matters When Securing IoT?
Category: audit-management business-continuity-management compliance-management cyber-risk cyber-security digital-risk enterprise-risk-management grc information-technology it-risk-management it-vendor-risk-management legal-risk operational-risk-management risk-management security sod-continuous-control-monitoring third-party-risk-management
Tags: analytics audit-management-2 big-data business-continuity compliance cyber-risk-2 digital-business digital-risk-2 enterprise-risk enterprise-risk-management-2 gartner grc grc-software legal-management operational-risk-management risk-management vendor-risk
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.