Gartner Security & Risk Management Summit

March 28-29, 2023 | Australia

Gartner Security & Risk Management Summit
The endlessly expanding digital footprint of modern organizations is introducing new security challenges. The pandemic response has accelerated hybrid work and the digitalization of business processes in the cloud. Concurrently, last year experienced sustained big game ransomware attacks, multiple attacks on the digital supply chain, deeply embedded vulnerabilities, and increasing attacks on identity systems. These accumulated security challenges are compounded by a shortage of skilled security staff at all levels. These factors are impacting how security and risk management leaders:

Spotlight

Discover What Makes an ASM Program Successful Cloud and remote work have not only revolutionized the way business is done, but they have irrevocably changed attack surfaces. Assets move, change and appear constantly, and this dynamic nature means traditional manual asset inventory processes simply cannot keep up. The modern atta


OTHER PAST CONFERENCES

IDC Security Roadshow

May 16, 2023 | UAE

Among the host of C-suite titles, the CISO is perhaps the most unique. CISOs are at the frontlines of maintaining security in a rapidly evolving threat landscape punctuated with relentless threat actors. In the UAE, CISOs in both the private and public sectors face incredible challenges. Their organizations demand best-in-class security as well as the agility and speed needed to make the right decisions and balance enterprise-related risks and benefits.

All Access Third Party Risk Management 2023

March 21, 2023 | USA

Third parties represent a significant cyber security risk. 74 percent of organizations say they had experienced a cybersecurity breach in the previous 12 months because they gave “too much privileged access” to third parties. Not only are their numbers increasing year on year (with 60% of companies having more than 1000 third parties), but they also broaden a business’s potential attack surface, often have less stringent cyber security measures in place and can be seen as a softer target by cyber criminals. Despite this risk, many organizations are unaware of the number of third parties they have exposure to, the nature of the cyber security measures in place with their partners and an ability to monitor threats across their full attack surface.

All Access Threat Intelligence APAC 2023

March 8-9, 2023 | Singapore

Remediation-based, orchestrated, automated and customized threat intelligence is the goal. Most organizations have a few steps to go before reaching that goal. Cyber Security executives have realized that raw data is not intelligence. The discipline is not called Threat Raw Data, it’s called Threat Intelligence. Global corporate enterprise cyber security executives must move past a collective present ‘feed-based’ mindset.

Security Strategy 2023: Managing Risk to Enable Digital Business

April 20, 2023 | Portugal

At IDC, we know that data tell a story, we know how to listen to it. Join these security sessions to get insights into security and privacy technology evolution and viewpoints on top-of-mind themes for security practitioners.

Spotlight

Discover What Makes an ASM Program Successful Cloud and remote work have not only revolutionized the way business is done, but they have irrevocably changed attack surfaces. Assets move, change and appear constantly, and this dynamic nature means traditional manual asset inventory processes simply cannot keep up. The modern atta

resources