Gartner Security & Risk Management Summit

Jul 16 - 17, 2012
Sydney Convention Centre, Darling Harbour

Discover the latest tactics and long-term strategies to protect information resources in the most efficient and effective ways. Governance risk compliance, cloud computing, mobile applications and security, security architecture, threats/vulnerabilities and more.

Gartner predicts by the end of 2015, security incidents will increase 25% or more in organisations that adopt Bring Your Own Devices (BYOD) without reinvesting at least one-third of the savings in security.

The emergence of consumerisation, highly mobile workforces and cloud computing services present powerful opportunities for growth, but also more complex security problems to solve.

The ongoing challenge for CISOs remains, as always, in keeping the bad guys out, keeping the good guys in and keeping the wheels turning.

The Gartner Security & Risk Management Summit will provide a comprehensive update on the latest security and risk management strategies, to help you protect your organisation's information resources in the most efficient and effective ways.

Learn how to enable new technology and business initiatives by proactively managing risks. Hear the latest views from Gartner analysts on market trends, opportunities and threats facing security and risk professionals, such as governance risk compliance, cloud computing and recovery, security architecture, mobile applications and security, as well as security threats and vulnerabilities.

If you're tasked with protecting critical infrastructure, you must attend this event.
View the full agenda here:

Phone: +61 2 8569 7622
nextmedia takes no responsibility for the accuracy of the content contained in these listings. Please contact the vendor with any enquiries.
Sign up to receive iTnews email bulletins
Latest Comments
Which is the most prevalent cyber attack method your organisation faces?

   |   View results
Phishing and social engineering
Advanced persistent threats
Unpatched or unsupported software vulnerabilities
Denial of service attacks
Insider threats