page 1
page 2
page 3
page 4
page 5
page 6
page 7
page 8
page 9
page 10
page 11
page 12
page 13
page 14
page 15
page 16

Gartner Information Security Summit 2009 21 - 22 September | London europe. gartner. com/ security Managing risk and securing information: your role, your priorities, your tactics Jay Heiser Research VP, Gartner Tom Scholtz Research VP, Gartner Spencer Kelly Technology Tourist, Presenter of the BBC's international technology programme Click Professor Fred Piper Information Security Group, Royal Holloway, University of London Summit Co- Chairs Thought Leader Keynote Guru Keynote Register by 24 July 2009 and save ? 500

2 Register today at europe. gartner. com/ security CONTENTS SUMMARY Page 4 Plenary Page 5 Foundation Sessions and Gartner Analyst/ User Roundtables Page 6- 9 Summit Program: The Tracks and Sessions Page 10 End- User Case Studies Page 12 Gartner Research Page 13 Maximize Your Summit Experience Page 14 Solution Showcase Page 15 How to Register Your Summit - Your Agenda! With a wealth of sessions, it is helpful to have a tool to build your own agenda focusing on your own needs. The online Agenda Builder helps you select the relevant sessions and schedule them in your calendar, and to build in networking and refl ection time into your schedule. Go to ab/ gartner. com/ sec10i to view the full agenda and plan your on- site schedule. Introduction Managing risk and securing information: your contribution to the success of your organization! We are living in challenging times. Money is tight, and cyber- risks are increasing. As an information security or risk professional, you have a special contribution to make to the success of your organization. Traditional emphasis has been on effectiveness in preventing security breaches and incidents, but the focus is increasingly turning toward the effi ciency with which this can be achieved. It might sound like alchemy, but you have an important duty to simultaneously improve security, while reducing costs. This year's Gartner Information Security Summit emphasizes the role of the individual practitioner, which is becoming increasingly specialized. What should you be doing, and what are the best practices of your peers? The event will provide the information and networking opportunities to help you do your job better. Summit Timetable Networking Reception: 18: 30 - 20: 00 Jay Heiser Research VP, Gartner Tom Scholtz Research VP, Gartner Key Benefi ts that you will derive from attendance at the Gartner Information Security Summit: . Meet business needs: protect and support critical systems and processes to ensure delivery of the organization's overall objectives . Make wise investments: gain the most up- to- date understanding of the vendor landscape allowing you to assess your best- fi t approaches . Sound deployment of resources: learn where to place your time, energy and budget in order to achieve quick-wins and clear results . Make the business case: explain to c- level executives where and how your work in security has delivered value and why it is worth the investment . Safeguard clients: both internally and externally individuals rely on you and need to have full confi dence if you are to have their support at every step . Deepen tactical knowledge: you know what your problems are... come meet the Gartner analysts and learn what the solutions look like . Strengthen strategic vision: advantage is gained by knowing where to jump and how soon. Don't learn to be fi rst, learn to be the best . Develop your most vital resource: yourself: increased expertise, broader awareness at all levels, connections within the industry, and ways to make an impact; the Gartner Summit experience is designed to make you an asset to your organization and a true knowledge worker. Sunday 18: 00 - 19: 30 Monday 07: 30 - 20: 00 Tuesday 07: 30 - 17: 30