Top Sessions To Attend At Gartner SRM 2020!

Attending this year’s Gartner Security and Risk Management Summit (Gartner SRM) virtually this week?  We know there are a lot of sessions to choose from, so we wanted to make your life easier by giving you an inside look into our top picks for Gartner SRM 2020.

  • Top Trends in Security and Risk Management – Thursday, 9/17 – 2 PM EST
    “Top trends” highlights ongoing strategic shifts in the security ecosystem that aren’t yet widely recognized, but are expected to have broad industry impact and significant potential for disruption. This presentation will describe the most significant trends in security and risk management and how leading organizations are taking advantage of these trends.
  • Technology Risk and Cybersecurity Metrics for Your Board – Tuesday, 9/15 – 11:45 AM EST
    Reporting risk and security to your board is challenging for every organization in the Gartner client base. Executives don’t know what they need. We offer these concrete examples that share all the necessary characteristics to satisfy non-IT executives and your board.
  • Five Cost Optimization Techniques That CISOs Must Use for Cybersecurity – Wednesday, 9/16 – 12:30 PM EST
    Looking past the immediate implications of the current health and economic crisis, organizations are ill prepared to confront the impact on their services and goals. As economic uncertainty settles in and working environments become more difficult, leaders must create a cost-optimization plan to aid their organizations in navigating past this challenging turn, especially as it relates to security and risk management. This session will equip leaders with the information necessary to make a decision on where the balance between running the business and protecting the business shall be.

These sessions discuss top security and risk management trends and projects for 2020-2021, the leadership vision for actionable change and how to develop agile cybersecurity programs to be better prepared for global shocks.

  • Model Your Risk Assessment on the Digital Business Runway – Tuesday, 9/15 – 12:30 PM EST
    Digital transformation relies heavily on new technology adoptions. While organizations innovate and create values through digital business, a set of new risks are emerging. These emerging risks require security and risk leaders’ special attention.

Learn about ideas and tools to innovate your risk management practices, prepare your organization to be resilient through the new normal and prepare for the next inevitable crisis.

  • Technical Insights: Do You Still Need a SIEM? – Tuesday, 9/15 – 11:45 AM EST
    For years SIEMs have been the cornerstone of security operations centers and the primary security monitoring tool for many organizations. However, with the adoption of newer threat detection tools, massive migrations to cloud services and the increasing adoption of technologies such as IoT and mobile, does it still make sense to invest in a SIEM?
  • Security Operations Center in the Era of Cloud – Wednesday, 9/16 – 12:30 PM EST
    How are SecOps and SOC evolving in the era of cloud-first initiatives? On-prem, legacy approaches need to be rethought considering the changing landscape, and the unique requirements that organizations are putting on their security operations

Get insights into the security markets, best practices in adopting and using technology solutions, the potential of new and emerging technologies, and how to architect complex solutions based on a variety of delivery models in a post-COVID-19 world.

Visit our booth at Gartner to get to know us, our Platform, and be entered to win our awesome giveaways.

We look forward to “seeing” you there this week!

About the Author
ThreatConnect

ThreatConnect is the only security platform with comprehensive intelligence, analytics, automation, orchestration, and workflow capabilities native within a single solution. With ThreatConnect, you will be able to increase accuracy and efficiency, improve collaboration of teams and technology, strengthen business-security goal alignment, and build a single source of truth for your entire security team.