Reset Your World: The Evolving Role of Risk Management and Information Security
On June 10-13, 2013, Gartner will host its Security & Risk Management Summit in Washington D.C.
Webroot will be on site, meeting with Gartner analysts and attendees. As a thought leader in the security industry, we are excited about meeting other security experts and analysts to discuss other viewpoints and emerging trends. If you are a business or IT professional who is attending the event and would like to chat with our own GeorgeA while you're there, send him a private message, and he'll reach out to you.
From Gartner:
After nearly a decade of steady progress toward maturity, IT security and risk management have reached a tipping point.
The Nexus of Forces — social, mobile, cloud and information — has unleashed a new wave of change and threats.
Emerging markets and a jumble of international regulatory and compliance obligations have also increased the complexity
of the business environment. In addition, the uncertainty of climate change — such as Superstorm Sandy — is making
business continuity management (BCM) more important than ever.
As these threats and changes transform markets and redefine competitive advantage, business leaders are recognizing the
critical role IT security and risk management disciplines play in ongoing business growth and transformation. This year’s
Gartner Security & Risk Management Summit, June 10 – 13, in National Harbor, MD, delivers the essential tools and
strategies CIOs, CISOs, CROs, CTOs and their teams need to identify and communicate emerging risks, manage them
appropriately and enable the business to grow and prosper as securely as possible.
Key benefits of attending:
• Reset your security and risk strategy to focus on enabling business objectives
• Stay relevant in your role as the Nexus of Forces redefines IT security and risk
• Implement BCM best practices to make the business more resilient to threats
• Understand, anticipate and mitigate the risks of new social collaboration tools
• Craft a strategy to deal with emerging BYOD and mobile threats
More on the summit is available from their website.
Be the first to reply!
Reply
Login to the community
No account yet? Create an account
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.