Gartner Security & Risk Management Summit

When:
Jul 16 - 17, 2012
 
Where:
Sydney Convention Centre, Darling Harbour
 
More:
 

Discover the latest tactics and long-term strategies to protect information resources in the most efficient and effective ways. Governance risk compliance, cloud computing, mobile applications and security, security architecture, threats/vulnerabilities and more.

Gartner predicts by the end of 2015, security incidents will increase 25% or more in organisations that adopt Bring Your Own Devices (BYOD) without reinvesting at least one-third of the savings in security.

The emergence of consumerisation, highly mobile workforces and cloud computing services present powerful opportunities for growth, but also more complex security problems to solve.

The ongoing challenge for CISOs remains, as always, in keeping the bad guys out, keeping the good guys in and keeping the wheels turning.

The Gartner Security & Risk Management Summit will provide a comprehensive update on the latest security and risk management strategies, to help you protect your organisation's information resources in the most efficient and effective ways.

Learn how to enable new technology and business initiatives by proactively managing risks. Hear the latest views from Gartner analysts on market trends, opportunities and threats facing security and risk professionals, such as governance risk compliance, cloud computing and recovery, security architecture, mobile applications and security, as well as security threats and vulnerabilities.

If you're tasked with protecting critical infrastructure, you must attend this event.
View the full agenda here: http://www.gartner.com/technology/summits/apac/security/


Phone: +61 2 8569 7622
Email: apac.events@gartner.com
nextmedia takes no responsibility for the accuracy of the content contained in these listings. Please contact the vendor with any enquiries.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
In which area is your IT shop hiring the most staff?




   |   View results
IT security and risk
  26%
 
Sourcing and strategy
  12%
 
IT infrastructure (servers, storage, networking)
  22%
 
End user computing (desktops, mobiles, apps)
  15%
 
Software development
  26%
TOTAL VOTES: 333

Vote
Would your InfoSec team be prepared to share threat data with the Australian Government?

   |   View results
Yes
  57%
 
No
  43%
TOTAL VOTES: 138

Vote