inside fron t monday 19 august - gartner...scam since the ponzi scheme) john girard, gartner...

1
AGENDA AT A GLANCE End-Users Only/Pre-Registration Required Focus: Tactical Strategic Maturity Level: Foundational Advanced Financial Services FS Industry: Public Sector PS Healthcare H Perspective: Business Technical MONDAY 19 AUGUST TUESDAY 20 AUGUST 07:30 – 09:30 Refreshments on Arrival Location: Solution Showcase, Level 3 07:30 – 18:00 Registration Location: Level 3 08:30 – 09:15 Pre-Summit Tutorial Sessions: T1: Tutorial: Big Data Discovery Using Content-Aware Data Loss Prevention (DLP) Solutions Rob McMillan, Gartner Location: Room 1, Level 4 T2: Tutorial: How to Create Emergency Messages That Won’t Be Ignored — Best and Worst Practices Roberta Witty, Gartner Location: Room 5, Level 4 T3: Tutorial: Top Security Trends and Takeaways for 2013 and 2014 John Wheeler, Gartner Location: Grand Ballroom B, Level 3 FS PS H 09:30 – 10:30 P1a: Gartner Keynote: Reset Christian Byrnes, Paul Proctor, John Wheeler and Rob McMillan, r e n t r a G Location: Grand Ballroom A, Level 3 FS PS H 10:30 – 10:45 P1b: Summit Chair Welcome Rob McMillan, r e n t r a G Location: Grand Ballroom A, Level 3 10:45 – 11:15 P2: Industry Panel Discussion: IT Security and the Nexus of Forces – Impact and Exploits Rob Roe, AirWatch; Glenn Welby, Cisco and Andrzej Kawalec, HP Moderated by: Mark Nicolett, r e n t r a G Location: Grand Ballroom A, Level 3 11:15 – 11:45 Refreshment Break in the Solution Showcase Location: Solution Showcase, Level 3 11:45 – 12:15 Gartner Track, Ask the Analyst and Workshop Sessions: 11:45 – 13:15 1 Chief Information Security Officer (CISO) Program — Leadership in Motion 2 Risk Management and Compliance Program 3 IT Security Program — Technology and Operations Analyst-User Roundtable Workshop A1: To the Point: Cyber Security for the Internet of Everything Christian Byrnes, Gartner Location: Grand Ballroom A, Level 3 FS B1: To the Point: The Risk Management Maturity Pathway Rob McMillan, Gartner Location: Grand Ballroom B, Level 3 C1: To the Point: Predictions — Your Network Security in 2018 Mark Nicolett, Gartner Location: Room 1, Level 4 FS ATA1: Ask the Analyst: Extending Security and Identity from MDM to Mobile Apps Song Chuang, Gartner Location: Room 3, Level 4 W1: Workshop: Information Security Architecture 101 Tom Scholtz, Gartner Location: Room 5, Level 4 12:30 – 13:15 Gartner Track and Analyst-User Roundtable Sessions: 12:30 – 13:15 A2: Transform Your Security and Risk Program or Find Another Job Paul Proctor, Gartner Location: Grand Ballroom A, Level 3 B2: Top 10 Security Myths Jay Heiser, Gartner Location: Grand Ballroom B, Level 3 FS C2: CyberSecurity! (The Biggest Scam Since The Ponzi Scheme) John Girard, Gartner Location: Room 1, Level 4 FS AUR1: Roundtable: Business Continuity Management (BCM Metrics — What Works, What Doesn’t Roberta Witty, Gartner Location: Room 3, Level 4 PS H 13:15 – 14:30 Lunch in the Solution Showcase Location: Solution Showcase, Level 3 13:15 – 14:30 Exclusive Elite Lunch (By invitation Only) Location: Room 4, Level 4 13:30 – 13:45 MQ1: Magic Quadrant: Security Information and Event Management Mark Nicolett, Gartner Location: Theater Solution Showcase, Level 3 14:30 – 15:15 Gartner Track, Analyst-User Roundtable and Workshop Sessions: 14:30 – 15:15 14:30 – 16:00 A3: Transform Your Security Program — From Control-Centric to People-Centric Tom Scholtz, Gartner Location: Grand Ballroom A, Level 3 FS B3: Why ERM and GRC Depend on Each Other to Succeed John Wheeler, Gartner Location: Grand Ballroom B, Level 3 C3: Cost, Consequence and Value — The Economics of IAM Gregg Kreizman, Gartner Location: Room 1, Level 4 FS AUR2: Roundtable: Reporting to the Board: What Do You Tell Them? What Works, What Doesn’t? Christian Byrnes, Gartner Location: Room 3, Level 4 PS H W2: Workshop: Cloud Contracts — Develop Your Own Security and Risk Exhibits Gayla Sullivan, Gartner Location: Room 5, Level 4 FS PS H 15:30 – 16:00 Solution Provider Sessions and Ask the Analyst Session: 15:30 – 16:00 SPS1: Airwatch: How to Manage the Evolution of BYOD Through Secure Mobility Rob Roe, AirWatch Location: Grand Ballroom A, Level 3 SPS2: Cisco Systems Australia Pty Ltd: TOMORROW Starts Here Gary Hale, Cisco Location: Grand Ballroom B, Level 3 SPS3: Pirean Solution Provider Session For speaker details visit Agenda Builder. Location: Room 1, Level 4 AUR3: Ask the Analyst: Strategies for Mitigating Advanced Persistent Threats and Targeted Attacks John Girard, Gartner Location: Room 3, Level 4 16:00 – 16:30 Refreshment Break in the Solution Showcase Location: Level 3 16:30 – 17:15 Case Study Presentation, Gartner Track and Analyst-User Roundtable Sessions: 16:30 – 17:15 A4: Case Study: How a Security Program Encourages User Engagement and Grows Business Craig Davies, Cochlear Location: Grand Ballroom B, Level 3 B4: CyberInsurance — Evolution or Revolution? Christian Byrnes, John Wheeler and Paul Proctor, Gartner Location: Grand Ballroom A, Level 3 FS C4: Security Monitoring for Early Breach Detection Mark Nicolett, Gartner Location: Room 1, Level 4 FS AUR4: Roundtable: Strategies for a More Effective Vendor Relationship Gayla Sullivan, Gartner Location: Room 3, Level 4 PS H 17:15 – 18:00 P3: Guest Keynote: Closing the Gap — Security Privacy Malcolm Crompton, Information Integration Solutions Pty Ltd Location: Grand Ballroom A, Level 3 18:00 – 19:30 Networking Reception in the Solution Showcase Location: Level 3 07:30 – 08:30 Exclusive Breakfast for Public Sector: Cloud Risk Management Jay Heiser, Gartner Location: Room 6, Level 2 H Exclusive Breakfast for Financial Services: Strategic Road Map for Financial Services Enterprise Risk Management John Wheeler, Gartner Location: Room 3, Level 4 08:00 – 08:45 Refreshments on Arrival Location: Solution Showcase, Level 3 08:00 – 17:00 Registration Location: Level 3 08:45 – 09:15 Gartner Track and Workshop Sessions: 08:30 – 10:00 1 Chief Information Security Officer (CISO) Program — Leadership in Motion 2 Risk Management and Compliance Program 3 IT Security Program — Technology and Operations Workshops A5: To the Point: The Information Security Maturity Pathway Jay Heiser, Gartner Location: Grand Ballroom A, Level 3 PS H B5: To the Point: Managing Global Recovery and Continuity Risk Roberta Witty, Gartner Location: Grand Ballroom B, Level 3 C5: To the Point: Securing the OT Environment Christian Byrnes, Gartner Location: Room 1, Level 4 FS W3: Workshop: Build an Effective Security and Risk Program Tom Scholtz, Gartner Location: Room 5, Level 4 W4: Workshop: Supplier Contingency Planning: What You Need to Know for Supplier Recovery Gayla Sullivan, Gartner Location: Room 4, Level 4 09:30 – 10:00 Solution Provider Sessions SPS4: HP: Criminal Education: Lessons from the Criminals and Their Methods Andrzej Kawalec, Hewlett-Packard Location: Grand Ballroom A, Level 3 SPS5: Symantec: How to Manage and Monitor New Threats Whilst Meeting Compliance Requirements Peter Sparkes, Symantec Location: Grand Ballroom B, Level 3 SPS6: RSA, The Security Division of EMC: IT GRC: Breaking The Boundaries Between Technology and Business Matt Chantrell, RSA, The Security Division of EMC Location: Room 1, Level 4 10:00 – 10:30 Refreshment Break in the Solution Showcase 10:10 – 10:25 MQ2: Magic Quadrant: Data Loss Prevention Rob McMillan, Gartner Location: Theater, Solution Showcase, Level 3 10:30 – 11:15 Gartner Track, Case Study Presentation, Analyst-User Roundtable and Workshop Sessions: 10:30 – 11:15 10:30 – 12:00 A6: That Frightening Phrase: “The Standard of Due Care” Rob McMillan, Gartner Location: Grand Ballroom A, Level 3 FS B6: Case Study Presentation: The Mobile Banking Balancing Act — Balancing Risk and Security with User Experience Ben Issa, ING Bank Location: Grand Ballroom B, Level 3 FS PS H C6: Your Cloud and Mobile Devices Broke My IAM Gregg Kreizman, Gartner Location: Room 1, Level 4 FS PS H AUR5: Roundtable: People Centric Security: the What, the Who, the Why and the How Tom Scholtz, Gartner Location: Room 3, Level 4 W5: Workshop: Security Monitoring of Cloud Workloads Mark Nicolett, Gartner Location: Room 5, Level 4 11:30 – 12:00 Solution Provider Sessions and Ask the Analyst Session: 11:30 – 12:00 SPS7: Good Technology: Tackling Mobility Challenges in the Real Business World Johan Sulaiman, L.E.K Consulting Ken Gosselin, Good Technology Location: Grand Ballroom A, Level 3 SPS8: Sourcefire: The Case for Retrospective Security Oliver Friedrichs, Sourcefire Location: Grand Ballroom B, Level 3 SPS9: TrustSphere: Using Social Network Analytics to Detect and Decode Internal Fraud Manish Goel, TrustSphere Location: Room 1, Level 4 AUR6: Ask the Analyst: Your Next Security Strategy — How Will You Develop It and What Will It Contain? Christian Byrnes, Gartner Location: Room 3, Level 4 FS PS H 12:00 – 13:15 Lunch in the Solution Showcase Location: Level 3 12:30 – 12:45 MQ3: Magic Quadrant: Endpoint Protection Platforms John Girard, Gartner Location: Theater, Solution Showcase, Level 3 13:15 – 14:00 Gartner Track, Case Study Presentations, Analyst-User Roundtable and Workshop Sessions: 13:15 – 14:00 13:30 – 15:00 A7: Organizing for Success — Developing Process-Centric Security Teams Tom Scholtz, Gartner Location: Room 1, Level 4 B7: Linking Risk to Business Decision Making — Creating KRIs That Matter Paul Proctor, Gartner Location: Grand Ballroom B, Level 3 FS PS H C7: Case Study: An Entreprise Mobility Strategy Eric Cowperthwaite, Providence Health & Services Location: Grand Ballroom A, Level 3 FS AUR7: Roundtable: Biggest Challenges in Implementing Effective IT Governance Christian Byrnes, Gartner Location: Room 3, Level 4 W6: Workshop: ITScore for Privacy John Wheeler, Gartner Location: Room 5, Level 4 14:15 – 15:00 Gartner Track and Analyst-User Roundtable Sessions: 14:15 – 15:00 A8: Using Outside Resources — Security Consultants and Threat Intelligence Services Rob McMillan, Gartner Location: Grand Ballroom A, Level 3 B8: Practicing Safe SaaS Jay Heiser, Gartner Location: Grand Ballroom B, Level 3 FS C8: Endpoint Security — When the Consumer Is King Song Chuang, Gartner Location: Room 1, Level 4 PS H AUR8: Roundtable: Government Identity — Providing Constituents With Secure Access To Government Services Gregg Kreizman, Gartner Location: Room 3, Level 4 PS H 15:00 – 15:30 Refreshment Break in the Solution Showcase Location: Level 3 15:10 – 15:25 MQ4: Magic Quadrant: Secure Web Gateways John Girard, Gartner Location: Theater, Solution Showcase, Level 3 15:30 – 16:15 P4: Guest Keynote: Enterprise Security —Achieving Value & Relevance Eric Cowperthwaite, Providence Health & Services Moderated by: Paul Proctor, r e n t r a G Location: Grand Ballroom A, Level 3 FS PS H 16:15 – 17:00 P5: Gartner Keynote: The Gartner Five-Year Security and Risk Scenario Christian Byrnes and Rob McMillan, Gartner Location: Grand Ballroom A, Level 3 H 17:00 – 17:15 P6: Summit Chair Closing Remarks Rob McMillan, r e n t r a G Location: Grand Ballroom A, Level 3

Upload: others

Post on 06-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: INSIDE FRON T MONDAY 19 AUGUST - Gartner...Scam Since The Ponzi Scheme) John Girard, Gartner Location: Room 1, Level 4 FS AUR1: Roundtable: Business Continuity Management (BCM Metrics

INSID

E BACK: 148M

MIN

SIDE FRO

NT: 148M

MIN

SIDE BA

CK COVER: 146M

M

AGENDA AT A GLANCE End-Users Only/Pre-Registration Required

Focus: TacticalStrategic Maturity Level: Foundational Advanced

Financial ServicesFSIndustry: Public SectorPS HealthcareH

Perspective: Business Technical

MONDAY 19 AUGUST

TUESDAY 20 AUGUST

07:30 – 09:30 Refreshments on Arrival Location: Solution Showcase, Level 3

07:30 – 18:00 Registration Location: Level 3

08:30 – 09:15 Pre-Summit Tutorial Sessions:

T1: Tutorial: Big Data Discovery Using Content-Aware Data Loss Prevention (DLP) Solutions

Rob McMillan, GartnerLocation: Room 1, Level 4

T2: Tutorial: How to Create Emergency Messages That Won’t Be Ignored — Best and Worst PracticesRoberta Witty, GartnerLocation: Room 5, Level 4

T3: Tutorial: Top Security Trends and Takeaways for 2013 and 2014

John Wheeler, GartnerLocation: Grand Ballroom B, Level 3

FS PS H

09:30 – 10:30 P1a: Gartner Keynote: Reset Christian Byrnes, Paul Proctor, John Wheeler and Rob McMillan, rentraG Location: Grand Ballroom A, Level 3 FS PS H

10:30 – 10:45 P1b: Summit Chair Welcome Rob McMillan, rentraG Location: Grand Ballroom A, Level 3

10:45 – 11:15 P2: Industry Panel Discussion: IT Security and the Nexus of Forces – Impact and Exploits Rob Roe, AirWatch; Glenn Welby, Cisco and Andrzej Kawalec, HP Moderated by: Mark Nicolett, rentraG Location: Grand Ballroom A, Level 3

11:15 – 11:45 Refreshment Break in the Solution Showcase Location: Solution Showcase, Level 3

11:45 – 12:15 Gartner Track, Ask the Analyst and Workshop Sessions: 11:45 – 13:15

1 Chief Information Security Offi cer (CISO) Program — Leadership in Motion

2 Risk Management and Compliance Program 3 IT Security Program —

Technology and OperationsAnalyst-User Roundtable Workshop

A1: To the Point: Cyber Security for the Internet of Everything Christian Byrnes, GartnerLocation: Grand Ballroom A, Level 3

FS

B1: To the Point: The Risk Management Maturity PathwayRob McMillan, GartnerLocation: Grand Ballroom B, Level 3

C1: To the Point: Predictions — Your Network Security in 2018Mark Nicolett, GartnerLocation: Room 1, Level 4

FS

ATA1: Ask the Analyst: Extending Security and Identity from MDM to Mobile Apps Song Chuang, GartnerLocation: Room 3, Level 4

W1: Workshop: Information Security Architecture 101

Tom Scholtz, GartnerLocation: Room 5, Level 4

12:30 – 13:15 Gartner Track and Analyst-User Roundtable Sessions: 12:30 – 13:15

A2: Transform Your Security and Risk Program or Find Another Job

Paul Proctor, GartnerLocation: Grand Ballroom A, Level 3

B2: Top 10 Security Myths

Jay Heiser, GartnerLocation: Grand Ballroom B, Level 3

FS

C2: CyberSecurity! (The Biggest Scam Since The Ponzi Scheme)

John Girard, GartnerLocation: Room 1, Level 4

FS

AUR1: Roundtable: Business Continuity Management (BCM Metrics — What Works, What Doesn’t Roberta Witty, GartnerLocation: Room 3, Level 4

PS H

13:15 – 14:30 Lunch in the Solution Showcase Location: Solution Showcase, Level 3 13:15 – 14:30 Exclusive Elite Lunch (By invitation Only) Location: Room 4, Level 4

13:30 – 13:45 MQ1: Magic Quadrant: Security Information and Event Management Mark Nicolett, Gartner Location: Theater Solution Showcase, Level 3

14:30 – 15:15 Gartner Track, Analyst-User Roundtable and Workshop Sessions: 14:30 – 15:15 14:30 – 16:00

A3: Transform Your Security Program — From Control-Centric to People-Centric Tom Scholtz, GartnerLocation: Grand Ballroom A, Level 3

FS

B3: Why ERM and GRC Depend on Each Other to Succeed

John Wheeler, GartnerLocation: Grand Ballroom B, Level 3

C3: Cost, Consequence and Value — The Economics of IAM

Gregg Kreizman, GartnerLocation: Room 1, Level 4

FS

AUR2: Roundtable: Reporting to the Board: What Do You Tell Them? What Works, What Doesn’t? Christian Byrnes, GartnerLocation: Room 3, Level 4

PS H

W2: Workshop: Cloud Contracts — Develop Your Own Security and Risk Exhibits

Gayla Sullivan, GartnerLocation: Room 5, Level 4

FS PS H

15:30 – 16:00 Solution Provider Sessions and Ask the Analyst Session: 15:30 – 16:00

SPS1: Airwatch: How to Manage the Evolution of BYOD Through Secure Mobility Rob Roe, AirWatch Location: Grand Ballroom A, Level 3

SPS2: Cisco Systems Australia Pty Ltd: TOMORROW Starts Here Gary Hale, Cisco Location: Grand Ballroom B, Level 3

SPS3: Pirean Solution Provider SessionFor speaker details visit Agenda Builder.Location: Room 1, Level 4

AUR3: Ask the Analyst: Strategies for Mitigating Advanced Persistent Threats and Targeted Attacks John Girard, GartnerLocation: Room 3, Level 4

16:00 – 16:30 Refreshment Break in the Solution Showcase Location: Level 3

16:30 – 17:15 Case Study Presentation, Gartner Track and Analyst-User Roundtable Sessions: 16:30 – 17:15

A4: Case Study: How a Security Program Encourages User Engagement and Grows Business Craig Davies, CochlearLocation: Grand Ballroom B, Level 3

B4: CyberInsurance — Evolution or Revolution?Christian Byrnes, John Wheeler and Paul Proctor, GartnerLocation: Grand Ballroom A, Level 3

FS

C4: Security Monitoring for Early Breach Detection

Mark Nicolett, GartnerLocation: Room 1, Level 4

FS

AUR4: Roundtable: Strategies for a More Effective Vendor Relationship Gayla Sullivan, GartnerLocation: Room 3, Level 4

PS H

17:15 – 18:00 P3: Guest Keynote: Closing the Gap — Security Privacy Malcolm Crompton, Information Integration Solutions Pty Ltd Location: Grand Ballroom A, Level 3

18:00 – 19:30 Networking Reception in the Solution Showcase Location: Level 3

07:30 – 08:30 Exclusive Breakfast for Public Sector: Cloud Risk Management Jay Heiser, Gartner Location: Room 6, Level 2 H

Exclusive Breakfast for Financial Services: Strategic Road Map for Financial Services Enterprise Risk Management John Wheeler, Gartner Location: Room 3, Level 4

08:00 – 08:45 Refreshments on Arrival Location: Solution Showcase, Level 3

08:00 – 17:00 Registration Location: Level 3

08:45 – 09:15 Gartner Track and Workshop Sessions: 08:30 – 10:00

1 Chief Information Security Offi cer (CISO) Program — Leadership in Motion

2 Risk Management and Compliance Program 3 IT Security Program —

Technology and OperationsWorkshops

A5: To the Point: The Information Security Maturity Pathway Jay Heiser, GartnerLocation: Grand Ballroom A, Level 3

PS H

B5: To the Point: Managing Global Recovery and Continuity RiskRoberta Witty, GartnerLocation: Grand Ballroom B, Level 3

C5: To the Point: Securing the OT EnvironmentChristian Byrnes, GartnerLocation: Room 1, Level 4

FS

W3: Workshop: Build an Effective Security and Risk Program

Tom Scholtz, GartnerLocation: Room 5, Level 4

W4: Workshop: Supplier Contingency Planning: What You Need to Know for Supplier Recovery

Gayla Sullivan, GartnerLocation: Room 4, Level 4

09:30 – 10:00 Solution Provider Sessions

SPS4: HP: Criminal Education: Lessons from the Criminals and Their Methods

Andrzej Kawalec, Hewlett-Packard Location: Grand Ballroom A, Level 3

SPS5: Symantec: How to Manage and Monitor New Threats Whilst Meeting Compliance Requirements

Peter Sparkes, Symantec Location: Grand Ballroom B, Level 3

SPS6: RSA, The Security Division of EMC: IT GRC: Breaking The Boundaries Between Technology and Business Matt Chantrell, RSA, The Security Division of EMC Location: Room 1, Level 4

10:00 – 10:30 Refreshment Break in the Solution Showcase

10:10 – 10:25 MQ2: Magic Quadrant: Data Loss Prevention Rob McMillan, Gartner Location: Theater, Solution Showcase, Level 3

10:30 – 11:15 Gartner Track, Case Study Presentation, Analyst-User Roundtable and Workshop Sessions: 10:30 – 11:15 10:30 – 12:00

A6: That Frightening Phrase: “The Standard of Due Care”

Rob McMillan, GartnerLocation: Grand Ballroom A, Level 3

FS

B6: Case Study Presentation: The Mobile Banking Balancing Act — Balancing Risk and Security with User ExperienceBen Issa, ING BankLocation: Grand Ballroom B, Level 3

FS PS H

C6: Your Cloud and Mobile Devices Broke My IAM

Gregg Kreizman, GartnerLocation: Room 1, Level 4

FS PS H

AUR5: Roundtable: People Centric Security: the What, the Who, the Why and the How

Tom Scholtz, GartnerLocation: Room 3, Level 4

W5: Workshop: Security Monitoring of Cloud Workloads

Mark Nicolett, GartnerLocation: Room 5, Level 4

11:30 – 12:00 Solution Provider Sessions and Ask the Analyst Session: 11:30 – 12:00

SPS7: Good Technology: Tackling Mobility Challenges in the Real Business World Johan Sulaiman, L.E.K Consulting Ken Gosselin, Good TechnologyLocation: Grand Ballroom A, Level 3

SPS8: Sourcefi re: The Case for Retrospective Security

Oliver Friedrichs, Sourcefi re Location: Grand Ballroom B, Level 3

SPS9: TrustSphere: Using Social Network Analytics to Detect and Decode Internal Fraud

Manish Goel, TrustSphere Location: Room 1, Level 4

AUR6: Ask the Analyst: Your Next Security Strategy — How Will You Develop It and What Will It Contain? Christian Byrnes, GartnerLocation: Room 3, Level 4

FS PS H

12:00 – 13:15 Lunch in the Solution Showcase Location: Level 3

12:30 – 12:45 MQ3: Magic Quadrant: Endpoint Protection Platforms John Girard, Gartner Location: Theater, Solution Showcase, Level 3

13:15 – 14:00 Gartner Track, Case Study Presentations, Analyst-User Roundtable and Workshop Sessions: 13:15 – 14:00 13:30 – 15:00

A7: Organizing for Success — Developing Process-Centric Security Teams Tom Scholtz, GartnerLocation: Room 1, Level 4

B7: Linking Risk to Business Decision Making — Creating KRIs That MatterPaul Proctor, GartnerLocation: Grand Ballroom B, Level 3

FS PS H

C7: Case Study: An Entreprise Mobility StrategyEric Cowperthwaite, Providence Health & ServicesLocation: Grand Ballroom A, Level 3

FS

AUR7: Roundtable: Biggest Challenges in Implementing Effective IT Governance Christian Byrnes, GartnerLocation: Room 3, Level 4

W6: Workshop: ITScore for Privacy

John Wheeler, GartnerLocation: Room 5, Level 4

14:15 – 15:00 Gartner Track and Analyst-User Roundtable Sessions: 14:15 – 15:00

A8: Using Outside Resources — Security Consultants and Threat Intelligence Services

Rob McMillan, GartnerLocation: Grand Ballroom A, Level 3

B8: Practicing Safe SaaS

Jay Heiser, GartnerLocation: Grand Ballroom B, Level 3

FS

C8: Endpoint Security — When the Consumer Is King

Song Chuang, GartnerLocation: Room 1, Level 4

PS H

AUR8: Roundtable: Government Identity — Providing Constituents With Secure Access To Government Services Gregg Kreizman, GartnerLocation: Room 3, Level 4

PS H

15:00 – 15:30 Refreshment Break in the Solution Showcase Location: Level 3

15:10 – 15:25 MQ4: Magic Quadrant: Secure Web Gateways John Girard, Gartner Location: Theater, Solution Showcase, Level 3

15:30 – 16:15 P4: Guest Keynote: Enterprise Security —Achieving Value & Relevance Eric Cowperthwaite, Providence Health & Services Moderated by: Paul Proctor, rentraG Location: Grand Ballroom A, Level 3 FS PS H

16:15 – 17:00 P5: Gartner Keynote: The Gartner Five-Year Security and Risk Scenario Christian Byrnes and Rob McMillan, Gartner Location: Grand Ballroom A, Level 3 H

17:00 – 17:15 P6: Summit Chair Closing Remarks Rob McMillan, rentraG Location: Grand Ballroom A, Level 3