page 1
page 2
page 3
page 4
page 5
page 6
page 7
page 8
page 9
page 10
page 11
page 12
page 13
page 14
page 15
page 16

12 Register today at europe. gartner. com/ security Gartner Research Worldwide Expertise at Your Fingertips - Your Questions on Information Security Answered Gartner analysts draw constantly from the real- life challenges and solutions experienced by more than 45,000 clients worldwide. The value of this resource, combined with our deep analysis of technology vendors, is unrivalled. Ant Allan Research VP Focus Areas: User authentication, password management, user provisioning, role life cycle management Jay Heiser Research VP Focus Areas: Trust communities, risk management, compliance, forensics and investigation Eric Ouellet Research VP Focus Areas: Resource and access audits, PKI/ PKO integration, IAM Carsten Casper Research Director Focus Areas: Privacy legislation, EU and cross- border privacy, compliance Tom Scholtz Research VP Focus Areas: Security strategy, security architecture, organization, outsourcing, BCP/ DRP John Girard VP Distinguished Analyst Focus Areas: Wireless security, mobile device management, mobile data encryption, mobile user authentication Mark Nicolett VP Distinguished Analyst Focus Areas: Security information and event management, vulnerability management, IT GRC management Gartner for IT Leaders Every day you're faced with decisions that will determine success or failure that could infl uence your organization's fi nancial results, customer retention rates or ability to compete. Getting information is easy, but is it insightful and relevant? Your time is scarce. Spend less time searching for information and more time applying relevant insight to your IT initiatives that need effective solutions- right now. Ensure your success as an IT leader. Get the insight you need - when you need it. With instant Web access to exclusive Gartner research that's relevant, insightful and tailored for IT leaders in Applications. Your Role. Your Event. Insightful and relevant events aligned to your role, your priorities and your challenges. Applications Business Intelligence & Information Management Business Process Improvement CIO Enterprise Architecture Infrastructure & Operations Program & Portfolio Management Security & Risk Management Sourcing & Vendor Relationships Interested in our role- based events? Visit gartner. com/ events for further information. Meet the Analysts Focus Areas: Risk program management Christian Byrnes Managing VP Focus Areas: Governance, risk and compliance, knowledge French Caldwellmanagement, regulatory developments Research VP Focus Areas: Security program management, audit and compliance, network security, content monitoring and fi ltering Paul Proctor VP Distinguished Analyst Focus Areas: Information governance, e- discovery, enterprise information management Debra Logan VP Distinguished Analyst Focus Areas: Anti- virus, anti- spyware, antispam, e- mail Peter Firstbrooksecurity Research Director Focus Areas: Risk management and compliance, future technology trends in the insurance industry Juergen Weiss Principal Research Analyst

13 Hype Cycles - Interpret Technology Hype When new technologies make bold promises, how do you discern the hype from what's commercially viable? Gartner can help! Market Share - Validate Leading Providers Understand where and how you can take advantage of shifts in market share, both now and in the future. Vendor Ratings - Track and Monitor Vendor Performance Manage the risk of your provider portfolio while you keep an eye on up- and- coming players and potential alternate providers. Magic Quadrants - Speed up your knowledge of competing technology providers Who are the competing players in the major technology markets? How are they positioned to help you over the long haul? Gartner can help. Assessing a market and its participants is a daunting task. Vendor differentiation caused by differing sizes, levels of complexity and strategies can inhibit comparisons of vendor offerings, and the market's overall direction is often murky. The Magic Quadrant Power Session will solve these challenges by offering snapshots of markets and their participants, enabling you to map vendor strengths against your current and future needs. Maximize Your Summit Experience Depth, Discipline, Decisiveness Gartner Summits are unique in the experience that they bring to attendees. A mixture of session formats brings extended opportunities to interact with Gartner analysts, with fellow attendees and focused solution providers. Register Now and builder your agenda at europe. gartner. com/ security Gartner Analyst One- on- One Meetings Don't you think you deserve a little private and focused time? Meeting face- to- face with a Gartner Analyst is one of the key benefi ts for attending this Summit. [ Number tbc] Gartner analysts specializing in various aspects of Information Security will be at the Summit. Bring your issue, select the relevant Analyst, set the agenda and walk away with invaluable, tailor- made advice. Gartner Analyst/ User Roundtables Learn from your peers. Moderated by a Gartner analyst, these roundtables are a great forum for hearing what your industry peers are experiencing on issues similar to those you face. Be prepared to join the discussion and share best practices and practical advice. All end- user attendees at the event are invited to register for Gartner Analyst/ User Roundtables by reserving at the at the One- on- One booking desk. Solution Provider Sessions Selected technology providers will give their advice on the latest technologies and best practices. The providers, and in many cases their clients, will explore best practices, key learning's and future trends and technologies. These sessions give you a unique opportunity to learn from the organizations that will shape the future of technology and to benefi t from the real- life experiences of their clients. Personalize Your Experience Your Summit - your agenda. With a wealth of sessions, it is helpful to have a tool to build your own agenda focusing on your own needs. The online Agenda Builder helps you select the relevant sessions and schedule them in your calendar to build in networking. Gartner clients have instant access to exclusive research tailored to their specifi c role via the Gartner for IT Leaders resource. The Gartner Information Security Summit is your chance to access Gartner research and Gartner analysts presenting their latest insights whilst giving you direct access to the individual experts. In 2009 we have worked to weave the key GITL initiatives directly to the Gartner content with insights on all areas including: Identity and Access Management Information Security Program Management Infrastructure Protection IT Compliance Management IT Risk Management Reinforce your Gartner for IT Leaders' research by attending and hearing it live and direct. Gartner for IT Leaders: Security & Risk Management