by Neil Wynne | June 10, 2019 | Comments Off on Speaking at Gartner Security & Risk Management Summit 2019
Here are the sessions I’ll be presenting, moderating and facilitating at the Gartner Security & Risk Management Summit 2019 in National Harbor, MD from June 17-20, 2019.
Monday, June 17 ▪ 2:15pm – 3:15pm ▪ Chesapeake C, Ballroom Level
Roundtable: Security Vendors That Midsize Enterprises Love
Join this peer-driven discussion about security vendors that midsize enterprises love. This session is a good fit for you if your organization has between five and 50 people in IT and an IT budget between $5 million and $30 million.
Monday, June 17 ▪ 4:15pm – 5:00pm ▪ Maryland D, Ballroom Level
Outlook for Midsize Enterprise Security and Risk Management 2019
The threat level and risk to midsize enterprises continue to rise with the volume and frequency of attacks, while the resources available to defend against them remain flat. Join us for a discussion about how you can identify the most appropriate technologies and prioritize the actions you can take to protect your organization and manage risk effectively. This session is a good fit for you if your organization has between five and 50 people in IT and an IT budget between $5 million and $30 million.
Tuesday, June 18 ▪ 7:15am – 8:15am ▪ National Harbor 2, National Harbor Level
Midsize Enterprise Kickoff and Networking Breakfast
Join us for this exclusive breakfast to kickoff the midsize enterprise attendee experience at the Security & Risk Management Summit. This is an excellent opportunity to learn about the specific midsize enterprise sessions planned for the event as well as connect with peers. To start the conversation, attendees will be presented with some of the key findings from recent midsize enterprise surveys and research. This session is a good fit for you if your organization has between 5 and 50 people in IT and an IT budget between $5 million an d $30 million.
Tuesday, June 18 ▪ 2:30pm – 4:00pm ▪ Chesapeake E, Ballroom Level
Workshop: Incident Response Scenario for Phishing Attacks
This workshop session will cover diving into an incident response scenario that requires for planning, response and recovery from a phishing attack. The initial phishing attack will be due to an accidental data disclosure that then enables the adversary to commit fraud, tarnish your brand, and includes elements of account takeover and business email compromise.
Wednesday, June 19 ▪ 4:30pm – 5:00pm ▪ Potomac B, Ballroom Level
Redefining Your Email Security Strategy for 2020 and Beyond
Organizations continue to be plagued (and breached) by malicious emails because they’re using a fragmented approach that is inadequate against evolving attack tactics. Join us for a fresh perspective that will cover the components of an effective security strategy.
Thursday, June 20 ▪ 8:30am – 9:30am ▪ Chesapeake B, Ballroom Level
Roundtable: Overcoming Cybersecurity Staffing and Skill Shortages in Midsize Enterprises
Many midsize enterprises are struggling to attract and retain cybersecurity talent. Join us for this peer-driven discussion on how to manage with a small team. How have you successfully overcome these constraints? When is a managed service the answer? What makes the most sense to keep in-house? This session is a good fit for you if your organization has between five and 50 people in IT and an IT budget between $5 million and $30 million.
Paul Furtado will be joining me for all of the midsize enterprise (MSE) sessions, as I will be “handing off the baton” to him as lead for our MSE security and risk management research and future MSE track manager for this conference. Paul started at Gartner in March and brings a wealth of experience and midmarket perspective to this role as a former midsize enterprise CIO and CISO.
See you there!
View Free, Relevant Gartner Research
Gartner's research helps you cut through the complexity and deliver the knowledge you need to make the right decisions quickly, and with confidence.Read Free Gartner Research
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.