Gartner Security & Risk Management Summit

When:
 
More:
 
Phone:
+61 2 8569 7622
 

The Gartner Security & Risk Management Summit will provide a comprehensive update on the latest security and risk management strategies.

Gartner predicts by the end of 2015, security incidents will increase 25% or more in organisations that adopt Bring Your Own Devices (BYOD) without reinvesting at least one-third of the savings in security.”

The emergence of consumerisation, highly mobile workforces and cloud computing services present powerful opportunities for growth, but also more complex security problems to solve. The ongoing challenge for CISOs remains, as always, in keeping the bad guys out, keeping the good guys in and keeping the wheels turning.

The Gartner Security & Risk Management Summit will provide a comprehensive update on the latest security and risk management strategies, to help you protect your organisation's information resources in the most efficient and effective ways.

Learn how to enable new technology and business initiatives by proactively managing risks. Hear the latest views from Gartner analysts on market trends, opportunities and threats facing security and risk professionals, such as governance risk compliance, cloud computing and recovery, security architecture, mobile applications and security, as well as security threats and vulnerabilities.

If you're tasked with protecting critical infrastructure, you must attend this event.

 

Online: www.gartner.com/ap/security

Phone: +61 2 8569 7622
Email: apac.events@gartner.com

Venue Information:

Past Venues:

Over
Jul
17
Sydney Convention Centre
Jul 16, 2012 8:00 AM  to  Jul 17, 2012 17:00 PM
Darling Harbour
Sydney: City & inner suburbs, New South Wales, Australia
nextmedia takes no responsibility for the accuracy of the content contained in these listings. Please contact the vendor with any enquiries.
Sign up to receive iTnews email bulletins
   FOLLOW US...
Latest Comments
Polls
Which is the most prevalent cyber attack method your organisation faces?




   |   View results
Phishing and social engineering
  66%
 
Advanced persistent threats
  4%
 
Unpatched or unsupported software vulnerabilities
  11%
 
Denial of service attacks
  6%
 
Insider threats
  12%
TOTAL VOTES: 1355

Vote