Gartner Blog Network

Gartner Security and Risk Summits are back!

by Sam Olyaei  |  May 22, 2017  |  Submit a Comment

It’s that time of the year again… less than a month away from event season! We start in DC on June 12th , we tour the world (Tokyo, Sao Paolo, Sydney, Mumbai, London) …and end up in my hometown, Dubai on October 31st.


This year’s theme is “Manage Risk. Build Trust. Embrace Change.” In a world where digital business and ecosystems are inevitably the future, we must manage risks to acceptable levels sponsored by the highest authorities in our enterprises, build trust with the very same stakeholders and other partners in our ecosystem (including customers and regulators), and embrace a change in agility and versatility that challenge conventional approaches to security. These very same challenges are supplemented by the continued rise in threats, evolving tactics in attacks, increased evasion and staffing shortages. The security summits are a great opportunity for leaders to be armed with the knowledge and tools to stay ahead of the curve.

You can catch me on stage starting in National Harbor (June 12-15th) delivering the following pitches:

CISO Circle Power Breakfast: 2017 CIO Agenda – A Security and Risk Management Perspective : “The 2017 CIO Agenda highlights the importance of building a digital ecosystem for enterprises. Security and risk management leaders must understand CIO priorities and incorporate security and risk management practices into the digital ecosystem to reap growth benefits. This session discusses the implications for security leaders and actions they need to take to ensure security gets a seat at the table.”

Confront the Cybersecurity Talent Shortage: ” Security and Risk Management Leaders struggle to identify, hire and retain security staff that have the competencies required, especially in the age of digital business. The result– increased risk for the organization. This session offers actionable and concrete approaches to confront the Cybersecurity talent shortage.”

Five Tests That You Must Apply to Your Security Policy: “Good security policy is a fundamental component to a sound information security posture, but security and risk management leaders may struggle to write and implement effective policy documents, resulting in inflexible policies that can do more harm than good. Apply these five tests to ensure that you are developing and implementing effective policy.”

Roundtable: Collaborative Techniques for Building and Developing Security Staff: “Leverage best practices from Gartner and your peers to address the talent shortage in cybersecurity and digital security. This interactive roundtable will result in actionable guidance to improve recruiting efforts.”

Besides the above, you can catch my colleagues and I at the 1 on 1 desk for customized consults and interactions.

Hope to see you there! Can’t think of a better way to collect miles 🙂

You can access the full agenda for National Harbor here.

Additional Resources

Five Board Questions That Security and Risk Leaders Must Be Prepared to Answer

As board members realize how critical security and risk management is, they are asking leaders more complex and nuanced questions. This research helps security and risk management leaders decipher five categories of questions they must be prepared to answer at any board or executive meeting.

Read Free Gartner Research

Category: security  security-of-applications-and-data  

Tags: cybersecurity  digital-business  digital-ecosystem  digital-security  information-security  risk-management  security  security-talent  talent  

Sam Olyaei
Sr. Research Analyst
4 years at Gartner
6 years IT Industry

Sam Olyaei is a Sr Research Analyst in Gartner Research, where he is part of the Risk and Security Management group. His primary research efforts are geared toward advising clients on issues related to their information security and risk management program such as security maturity, security policy, security budget, and high-level security strategy/governance principles. Read Full Bio

Leave a Reply

Your email address will not be published. Required fields are marked *

Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.