Accelerate learning and build a shared vision by attending as a group

Organizations are becoming more agile and composable. Security and risk management leaders must improve resilience, better support business objectives and elevate the organizational standing. It is imperative for chief information security officers (CISOs), security executives, risk management leaders, security architects and data security managers to accelerate progress on your initiatives and optimize the value of risk management investment.

There is no better environment for stakeholders to align, learn and network

Divide and conquer

Split up to attend more sessions designed for every member of your team.

Evaluate vendors and solution providers

Compare solutions for all stakeholders across your business.

Meet as a team with experts

Discuss your challenges and validate your strategies. 

Buy more, save more

Group Rate Discount

Save on registration when you attend the conference with your colleagues. Receive complimentary registration(s) when you register as a team.*

  • 1 for 3 paid registrations
  • 2 for 5 paid registrations
  • 3 for 7 paid registrations
  • 4 for 10 paid registrations

For more information, email GlobalConferences@gartner.com or contact your Gartner representative. 

Tips for attending a conference as a team

Align your vision as you forge strong relationships and a deeper, shared understanding with your colleagues and peers to help drive your strategies forward.

  • Have a team-planning call to set key objectives.
  • Decide a strategy for how to divide and conquer the agenda (which sessions you attend collectively could be as important).
  • Agree on how you will share key lessons.
  • Create a document repository for notes, slides, etc., on Google Drive or other file-sharing platform.
  • Add colleagues to your expert one-on-ones.
  • Create a Microsoft Teams/Slack/Google Hangout channel to stay in touch during the conference.
  • Share sessions with your teammates — make notes of times they would find especially helpful.
  • Make a plan to share a coffee or lunch break together as a team.
  • Set up a.m. or p.m. meetings to discuss what you hope to learn, what you did learn, and stay connected.
  • Set up a meeting to review key take-aways and create an action plan for how you will apply what you have learned. What are you going to start doing/stop doing/do differently as a result of what you have learned?
  • Connect on LinkedIn with any peers you met during the conference.
  • Schedule follow-up meetings with any exhibitors that piqued your interest (through the Gartner Conference Navigator).

2023 suggested sessions by role

  • Leadership Exchange: Mock Board Presentation — The 3 Stages of Reporting Cybersecurity to Your Board
  • Research Discussion: The CISO’s Guide to Cyber-Risk Quantification
  • Workshop: Building Risk, Value and Cost Charts for Cybersecurity
  • A Security View of the 2023 CIO, CEO and Board of Directors Agenda
  • Leadership Vision for Security and Risk Management 2022
  • Outlook for Organizational Resilience
  • The Top 10 Cybersecurity Value Metrics Every Organization Should Use
  • The Top Cybersecurity Predictions for 2022-2023
  • Top Trends in Security and Risk Management
  • What Goes Where: A Guide to Security Organization Design
  • A Security View of the 2023 CIO and CEO Agenda
  • Drive Cybersecurity Investments With the Gartner Cybersecurity Value Benchmark
  • Leadership Vision for Security and Risk Management, 2023
  • Life on the Edge: What’s New in Cyberwarfare?
  • Roundtable: Security Organizational Structure Planning and Design
  • CISO Circle: Selling Your Cyber Strategy
  • CISO Circle: Townhall — How to Nudge People to Care More About Security and Risk
  • CISO Circle: Measure the Real Cost of Cybersecurity
  • CISO Circle Leadership Exchange: Employees Don’t Need More Awareness, They Need Cyber Judgment!
  • CISO Circle: The 5 Cybersecurity Board Questions That You Must Be Prepared to Answer
  • Develop an Actionable Workforce Strategy for Cybersecurity
  • A Pragmatic Approach to Implementing a Zero Trust Security Architecture
  • Developing a Strategy for SASE Adoption to Securely Enable the Anywhere Workforce
  • Security Strategy Planning Best Practices
  • How SASE, XDR and Security Vendor Consolidation Are Shaping Your Security Strategy
  • Outlook for Cloud Security
  • Outlook for Endpoint Security 2022
  • Solving the Challenges of Modern Remote Access in the Hybrid World
  • 3 Best Practices for Balancing Security and Innovation in the Public Cloud
  • What Is “XDR” and Why Should You Care?
  • Top Trends in Cybersecurity, 2023
  • 5 Cost Optimization Techniques for Security Leaders Facing Economic Headwinds
  • Inside the Mind of the Recruiter: Tips and Tricks to Overcome Security Recruiting Struggles
  • The 2023 Outlook for Human Factors in Security
  • The Top Predictions for Cybersecurity, 2023-2024
  • The Role of the Manager in Building a Diverse, Equitable and Inclusive Organization
  • 4 Ways Baby Boomers, Gen Yers and Gen Zers Think Differently About Cybersecurity
  • Accelerate Your Cybersecurity Program’s Effectiveness: 12 Tactics to Deliver Cybersecurity Business Value
  • Inside the Mind of the Recruiter: Tips and Tricks to Overcome Security Recruiting Struggles
  • Roundtable: Building a Positive Security Culture — Stories From the Field
  • 10 Cyber and IT Risk Fundamentals You Must Get Right
  • A Guide to Navigating the Vendor Risk Management Market
  • A New Look at Insider Risk
  • CPS Security: Top 10 Must-Do’s 
  • Do You Want to Play a Game? Leveraging Game Theory in Cyber-Risk Management
  • Outlook for Cyber-Risk Management
  • Outlook for Privacy, 2022-2023
  • Prepare to Use Privacy-Enhancing Computation and Other Top Privacy Trends
  • Process Mining: A Game Changer for Business Process Risk Modeling
  • Technology Supply Chain Risk Management: Where Do You Start?
  • Outlook for Cybersecurity Risk Management, 2023
  • Explaining Cloud Risks to an Executive Audience
  • Outlook for Privacy, 2023: Trends and Technologies
  • Cybersecurity Mesh and the Metaverse
  • State of the Threat Environment, 2023
  • Cyber-Risk Essentials You Must Get Right
  • 4 Third-Party Cyber-Risk Principles That You Must Adopt
  • Outlook for Organizational Resilience, 2023
  • Don’t Let Your AI Control You: Manage AI Trust, Risk and Security
  • Roundtable: How to Plan for a Successful Ransomware Tabletop Exercise
  • Outlook for Network Security 2022
  • Fix What Matters: Provide DevOps Teams With Risk-Prioritized Vulnerability Guidance
  • How to Protect Confidential Data in Cloud Processing
  • Managing Open-Source Software Risks in DevSecOps Environments
  • Outlook for Application Security 2022
  • Outlook for Data Security
  • Why You Need a Cross-Functional Committee in a Data Security Program
  • Outlook for Security Operations 2022
  • Ransomware Is Inevitable: If You Can’t Prevent It, Prepare for It
  • The Future of MDR, Where Next?
  • Top Application Trends That Change the Security Landscape
  • Outlook for Data Security
  • Outlook for Application Security, 2023
  • Workshop: Building a Secure Software Development Life Cycle
  • Outlook for Network Security, 2023
  • The State of Public Cloud Data Security
  • The Changing Face of Data Security: Navigation Systems, Not Seat Belts
  • How to Securely Develop, Deploy and Operate Cloud-Native Applications
  • Top Open-Source Security Tools
  • Ask the Expert: Technical Insights — How to Secure Your APIs From Exploits and Abuse
  • Technical Insights: Don’t Get Burned by the Next Sunburst — How the Network Can Detect Supply Chain Attacks
  • Technical Insights: Cybersecurity Mesh Architecture — The Next Gen of Security Architecture
  • Technical Insights: 5 Steps to Start the Zero Trust Journey
  • Technical Insights: Adversary-Generated Threat Intelligence
  • Technical Insights: Cloud Security 201
  • Technical Insights: Dark Data, Data Security’s Biggest Miss 
  • Technical Insights: Plotting Your Course to Ransomware Defense
  • Technical Insights: Guide to Architecting Cloud Security — Start Here for Effective Cloud Security
  • Technical Insights: Working From Home Securely — You Need More Than ZTNA
  • Workshop: Learning the Craft of the Ransomware Dungeon Master
  • Technical Insights: Security Architecture LIVE
  • Technical Insights: Cybersecurity Mesh Architecture — The Next Generation of Security Architecture
  • Technical Insights: Top 10 SaaS Security “Gotchas” and the Mitigation Strategies
  • Technical Insights: Focus on Eliminating Your Cloud Risks With CNAPP
  • Cloud Security 201: A Cloud Security Cookbook
  • Technical Insights: Top Container Threats and How to Mitigate Them
  • Cybersecurity Mesh and the Metaverse
  • Roundtable: Real-World Zero Trust
  • Roundtable Technical Insights: Cloud Security Lessons Learned — The Good, the Bad and the Ugly
  • Workshop Technical Insights: Learning the Craft of the Ransomware Dungeon Master

Ready to register?

Secure your space today.