<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=2849132&amp;fmt=gif">
Elisity Blog

Don't Miss These Essential 37 Sessions at Gartner Security & Risk Management Summit 2025

The Gartner Security & Risk Management Summit returns to National Harbor, MD from June 9-11, 2025, marking another milestone for the premier conference that brings together CISOs and security leaders from around the world. For over two decades, this summit has served as the definitive gathering where security professionals tackle the most pressing challenges facing their organizations—from emerging AI threats to evolving compliance requirements and the ongoing journey to Zero Trust maturity.

This year's summit promises to be particularly relevant for security leaders navigating the complexities of microsegmentation, network security transformation, and the critical convergence of IT and OT environments. We're especially excited to share that Elisity CEO James Winebrenner will be joined by Jonathan Eastern, Global Head of Network and Security Infrastructure at Marsh McLennan, on Tuesday, June 10 at 10:00 AM EDT. They'll reveal how Marsh McLennan successfully extended their "Island of One" model enterprise-wide, integrating Elisity with CrowdStrike and Zscaler to deploy identity-based microsegmentation across 450+ sites and 120,000+ devices—achieving least-privilege access in weeks, not years.

As you plan your summit experience, we've curated this selection of 37 sessions that directly address the challenges facing CISOs, CTOs, Security Architects, and Network Architects at healthcare systems, manufacturing companies, and beyond. Key themes this year include:

  • The Evolving CISO-CIO Partnership: Multiple sessions explore how to strengthen collaboration between security and IT leadership, including marriage counseling techniques for the C-suite and practical playbooks for joint success
  • Zero Trust Implementation: From customizing CISA's maturity model to measuring year-three progress in public organizations, discover real-world strategies for accelerating your Zero Trust journey
  • AI and Cyber-Physical Systems: Learn how to harness AI for security while protecting against AI-driven threats, particularly crucial for OT environments in manufacturing and healthcare
  • Practical Security Operations: Sessions covering tool rationalization, vulnerability management at scale, and the real costs of cybersecurity beyond the security budget

Gartner-Security-Risk-Management-Summit-2025-Elisity-Sponsor

Gartner Security & Risk Management Summit 2025: Essential Sessions for Security Leaders

Gartner Opening Keynote: Harness the Hype: Turning Disruption Into Cybersecurity Opportunity
Monday, June 09, 2025 / 09:30 AM - 10:15 AM EDT
Speakers: Leigh McMullen, Distinguished VP Analyst, Gartner (LinkedIn) and Katell Thielemann, Distinguished VP Analyst, Gartner (LinkedIn)

Our organizations understand they can't ignore cybersecurity. In our turbulent environment, the extremes of unbridled technology optimism and excessive preoccupation with risk endanger us. Hype, whether driven by AI, emerging technologies, geopolitical changes or latest headline-grabbing cyber attack, threatens to derail strategic objectives and the partnership between cybersecurity and the rest of the business. This keynote will help exploit hype's power to drive your cybersecurity program and the resilience of your organization.

Outlook for Infrastructure Security 2025
Monday, June 09, 2025 / 11:00 AM - 11:30 AM EDT
Speaker: Rajpreet Kaur, Sr Director Analyst, Gartner (LinkedIn)

In 2025, the cybersecurity landscape will be characterized by unprecedented threats, necessitating innovative solutions and a proactive approach. Discover insights into how infrastructure security integrates endpoint security, network security, and cloud security to combine innovation and action in addressing the ever-changing threats to infrastructure.

Palo Alto Networks: AI Apps & Agents Work for You—Ensure They Don't Work Against You
Monday, June 09, 2025 / 12:00 PM - 12:30 PM EDT
Speaker: Rich Campagna, SVP Product NGFW, Palo Alto Networks (LinkedIn)

Enterprise AI applications and agents are on the rise. This proliferation has become a game-changer for streamlining operations, improving customer engagement, and driving business growth. However, they bring a whole new set of threats such as prompt injections, sensitive data loss and other AI agent-specific threats. Learn from a leading AI threat researcher by deconstructing how these AI applications and agents work, the novel research around threats such as prompt injections or memory manipulation, and how you can protect your organization's data as you put them to work in your business.

ETSS: OT Security Under Siege: Proactive Strategies from CISO Leaders, moderated by Trustwave
Monday, June 09, 2025 / 12:00 PM - 12:45 PM EDT
Speakers: David Sheidlower, Chief Information Security Officer, Turner Construction (LinkedIn), Wayman Cummings, CISO, Ochsner Health (LinkedIn), and Mike Petitti, Chief Revenue Officer, Trustwave

The convergence of IT and OT has expanded the attack surface, putting critical infrastructure at risk. Join CISOs Wayman Cummings, Ochsner Health, and David Sheindlower, Turner Construction, as they discuss the evolving threat landscape and proactive strategies for safeguarding OT environments. This session covers visibility, segmentation, and threat detection, offering actionable insights to help you build a resilient security posture for your OT assets and move beyond reactive measures.

Beyond Identity: Enforcing Device Trust for Secure Access in a Distributed Workforce
Monday, June 09, 2025 / 12:00 PM - 12:30 PM EDT
Speakers: Jing Reyhan, Vice President of Marketing, Beyond Identity, Adam Dimopoulos, VP Identity & Access Management, and Audley Dean, VP - Chief Information Security Officer, BMC Software (LinkedIn)

Identity alone isn't enough. Today's threats demand device trust at the point of access—before a risky device ever hits your network. This panel features security leaders who are rethinking access control, using real-time signals from any device—managed or not—to make instant, informed decisions. Discover how to move beyond passive monitoring and take proactive control over who—and what—gets in.

The Gartner Cybersecurity Business Value Benchmark, Second Generation
Monday, June 09, 2025 / 12:45 PM - 01:15 PM EDT
Speaker: Paul Proctor, Distinguished VP Analyst, Gartner (LinkedIn)

After two years, Gartner is enhancing the protection level benchmark with new metrics and new data. This will give existing participants new metrics to share with their executives and boards to guide cybersecurity investment. New categories include AI, cyber-physical systems, and application-level security. Also, gain insight into the future features and direction.

Outlook for Cyber-Physical Systems Security 2025
Monday, June 09, 2025 / 12:45 PM - 01:15 PM EDT
Speaker: Wam Voster, VP Analyst, Gartner

Cyber-physical systems have become ubiquitous in today's society. Whereas Operational Technology has been around for decades, more and more "smart" assets are deployed to connect the digital to the physical world. This session will provide security leaders with insights on topics such as the security implications of this trend, the role of regulators and whether any best practices are emerging.

CISO Circle Roundtable: Marriage Counseling for the C-Suite: Strengthening the CIO-CISO Partnership
Monday, June 09, 2025 / 12:45 PM - 01:30 PM EDT
Speakers: Lisa Neubauer, Sr Director Analyst, Gartner and Lisa Reginaldi, Sr Executive Partner, Domains, Gartner (LinkedIn)

In the corporate world, the CIO-CISO relationship can resemble a marriage — full of potential but challenging. In this collaborative discussion, participants will use marriage counseling techniques to explore strategies to enhance the CIO-CISO partnership for a more unified and secure leadership team. Please note that this session will be repeated later in the Conference.

Ask the Expert: How to Customize CISA's Zero Trust Maturity Model to Support Your Business
Monday, June 09, 2025 / 02:30 PM - 03:15 PM EDT
Speaker: Tiffany Taylor, Director Analyst, Gartner (LinkedIn)

This session will guide you in customizing zero trust maturity model by U.S. Department of Homeland Security (CISA) to perfectly align with your business needs. Discover how this tool can measure your organization's current capabilities and help define future goals for a successful zero-trust journey. Please note that this session will be repeated later in the Conference.

Generative AI and the SOC: The Good, the Bad and the Ugly
Monday, June 09, 2025 / 02:30 PM - 03:00 PM EDT
Speaker: Pete Shoard, VP Analyst, Gartner (LinkedIn)

During this session, we will discuss the possible advantages and disadvantages that SOC teams will experience from technologies offering generative AI as part of their SOC analyst interfaces. Attendees will gain insights into threat detection, investigation and response toolsets that include genuine AI capabilities and how to get the best out of them while avoiding bear traps.

Ask the Expert: Demystifying Cyber Insurance
Monday, June 09, 2025 / 02:30 PM - 03:15 PM EDT
Speaker: Paul Furtado, VP Analyst, Gartner

Cyber insurance creates a lot of questions for organizations. Qualification requirements and premiums keep shifting. Join this session to ask your questions about the cyber insurance landscape. IMPORTANT: We cannot discuss individual policies or premium pricing due to legal limitations.

Future of AI in Cybersecurity: AI Predictions and Roadmap Challenges for 2025-2028
Monday, June 09, 2025 / 02:30 PM - 03:00 PM EDT
Speaker: Jeremy D'Hoinne, Distinguished VP Analyst, Gartner

This session delves into key AI predictions and current challenges, providing CISOs with actionable insights to build effective and resilient 3-year roadmaps. Learn to optimize AI initiatives for cybersecurity and adapt security programs to align with future businesses uses.

Leadership Vision for Security and Risk Management 2025 and 2026
Monday, June 09, 2025 / 02:30 PM - 03:00 PM EDT
Speaker: Tom Scholtz, Distinguished VP Analyst, Gartner

CISOs are key enablers of digital business and are accountable for helping the enterprise balance the associated risks and benefits. This presentation provides a clear vision for CISOs on how to optimize their cybersecurity programs for performance, resilience and agility in 2025.

CISO Circle Workshop: How to Influence Key Stakeholders
Monday, June 09, 2025 / 04:00 PM - 05:30 PM EDT
Speaker: Cynthia Phillips, Sr Director Analyst, Gartner

As cybersecurity becomes central to achieving business outcomes, the need to engage and partner with a broader range of senior management increases. Join this session to elevate your power skill of influencing key stakeholders and maximize your executive impact.

CISO Circle Roundtable: From Prevention to Resilience — How Do We Shift Cybersecurity's Mindset?
Monday, June 09, 2025 / 04:15 PM - 05:00 PM EDT
Speaker: Wayne Hankins, Sr Director Analyst, Gartner

Join your peers to discuss how CISOs can drive a new culture of resilience. How can we pivot the cybersecurity team away from a "hero culture" with a zero-tolerance-for-failure mindset? Since incidents cannot be entirely prevented, CISOs must measure success by achieving sustained of business outcomes, not just cyber incident prevention. This shift poses a significant challenge for cybersecurity professionals and leadership stakeholders. Please note that this session will be repeated later in the Conference.

Security Summit Today: Top Trends in Zero Trust
Monday, June 09, 2025 / 04:15 PM - 04:35 PM EDT
Speakers: Tiffany Taylor, Director Analyst, Gartner (LinkedIn) and Paul Furtado, VP Analyst, Gartner

Take the pulse of the Gartner Security & Risk Management Summit! Join this live session where we will interview Gartner expert Tiffany Taylor to hear what questions clients are asking about the top trends in zero trust, what he is hearing on the show floor and on social media, and which upcoming sessions she is most excited about.

Top Security Trends for 2025
Monday, June 09, 2025 / 04:15 PM - 04:45 PM EDT
Speaker: Richard Addiscott, VP Analyst, Gartner

Top security trends highlights the most prominent cybersecurity risk management focus for security leaders when responding to persistent forces, often outside of their control, that are impacting their security programs. Key trends in 2025 are focused on enabling secure transformation and embedding resilience into the organization and the cybersecurity function. Please note that this session will be repeated later in the Conference.

Ask the Expert: How to Own the Room With Your Cybersecurity Executive Communications
Monday, June 09, 2025 / 04:15 PM - 05:00 PM EDT
Speaker: Tom Scholtz, Distinguished VP Analyst, Gartner

Want to get better at making sure you make the best impression in your upcoming cybersecurity presentations? Come and join your peers at this interactive session and ask all the questions you want to help make that leap from being a "deer in the headlights" to a "star in the spotlight" with your cybersecurity Board and Executive reporting and communications.

The Key Drivers of CISO Effectiveness 2025
Monday, June 09, 2025 / 04:15 PM - 04:45 PM EDT
Speaker: Fadeen Davis, Sr Principal Analyst, Gartner

The CISO role and expectations are evolving. CISO's need to be effectively managing their priorities. Are you modeling the right behaviors? Building the right skills? Prioritizing time management? In this session, attendees will explore the latest findings from Gartner's CISO Effectiveness benchmarking that are most conducive to effectiveness in role.

Implement Collaborative Cyber Risk Management to Enable IT Democratization
Monday, June 09, 2025 / 04:15 PM - 04:45 PM EDT
Speaker: Oscar Isaka, Sr Director Analyst, Gartner

As organizations embrace digital transformation, technology decisions are increasingly being made autonomously by business technologists in the lines of business and traditional centralized cyber risk management processes fail to scale. Digital transformation based on IT democratization requires a collaborative cyber risk management approach. Join this session to learn more.

Reducing the Risks of Cybersecurity Consolidation and Converged Security Platforms
Monday, June 09, 2025 • 05:00 PM – 05:30 PM EDT
Speaker: Neil MacDonald — Distinguished VP Analyst, Gartner (LinkedIn)

Abstract: CISOs are actively reducing the number of point solutions in their security portfolio, helping to drive the emergence of converged security platforms. Some vendors now have a broad portfolio of cybersecurity capabilities that can address most cybersecurity needs. However, with convergence comes risks. This session will provide specific guidance on how to reduce risk and improve resilience while gaining the benefits of consolidation.

Elisity-Talk-at-Gartner-Security-Risk-Management-Summit-2025

Elisity: Unifying Security at Scale: How Marsh McLennan Extended 'Island of One' with Elisity

Tuesday, June 10, 2025 / 10:00 AM - 10:20 AM EDT
Speakers: James Winebrenner, CEO, Elisity (LinkedIn) and Jonathan Eastern, Global Head of Network and Security Infrastructure, Marsh McLennan (LinkedIn)

Join Elisity's CEO and Jonathan Eastern, Global Head of Network and Security Infrastructure at Marsh Mclennan to learn how Marsh McLennan extended their "Island of One" model enterprise-wide. Discover how they integrated Elisity with CrowdStrike and Zscaler to deploy identity-based microsegmentation across 450+ sites and 120,000+ devices—without network disruption. This unified approach enabled security policies, streamlined compliance with evolving regulations, and accelerated their Zero Trust maturity—achieving least-privilege access in weeks, not years.

Radiant Logic: Boost Your Identity Security Posture with AI-Driven Visibility and Risk Mitigation
Tuesday, June 10, 2025 / 10:00 AM - 10:20 AM EDT
Speakers: Akshay Srinivas Rajanbabu, VP Solutions Architect, Radiant Logic and Jay Baskar, SE, Radiant Logic

With roughly 90% of breaches starting from compromised identities, visibility into identity risk is critical. The biggest blind spots are often overprivileged access, orphaned accounts, and unmanaged non-human identities. In this session, discover how AI can be used to uncover anomalies and misconfigurations, enhance detection, and automate mitigation ensuring rapid, secure, and scalable resolution of identity and access risks.

Ask the Expert: From Planning to Partnership — CISOs and Budgeting Excellence
Tuesday, June 10, 2025 / 10:30 AM - 11:15 AM EDT
Speaker: Elizabeth Davis, Sr Director Analyst, Gartner

Join us for a dynamic session designed for cybersecurity leaders eager to explore the intricacies of corporate budgeting. This interactive discussion will equip you with the insights needed to transform your budget into a strategic tool. Explore the tactical components of effective budgeting, discover best practices for collaborating with finance partners, and gain the confidence to lead impactful budget conversations. Bring your questions to enhance your budgeting acumen and drive success in your cybersecurity initiatives.

7 Essential Insights From the 2025 Cybersecurity Technology Adoption Roadmap Research
Tuesday, June 10, 2025 / 10:30 AM - 11:00 AM EDT
Speaker: Wayne Hankins, Sr Director Analyst, Gartner

In this session, we will explore key findings from the 2025 Gartner Technology Adoption Roadmap Survey of cybersecurity leaders. The session will highlight technologies currently on their radar and their stages of adoption. As a CISO, you will gain insights into best practices and pitfalls to avoid when investing in technology.

From Overload to Optimization: Gartner's Approach to Rationalizing Cybersecurity Tools
Tuesday, June 10, 2025 / 10:30 AM - 11:00 AM EDT
Speaker: Dionisio Zumerle, VP Analyst, Gartner

Gartner surveys indicate organizations have a mean of 43 cybersecurity tools with 5% managing over 100 tools. This session guides security leaders on how to optimzie their cybersecurity tools by identifying gaps and overlaps, setting up a vision for consolidation vs best-of-breed approaches and walking through Gartner's Cybersecurity Platform Consolidation Workbook.

Workshop: How to Trust It; Strategies to Enable Work on Unmanaged Devices
Tuesday, June 10, 2025 / 10:30 AM - 12:00 PM EDT
Speaker: Max Taggett, Sr Principal Analyst, Gartner

Organizations struggle to let "all or nothing" access models extend to devices they do not own or cannot control. As a result, these users, use cases and devices are often simply blocked. Common modern technologies when used creatively can offer secure work capabilities on devices that lack the local agents and controls enterprises traditionally rely on; this session will discuss how.

Axonius: 7 Best Practices for Vulnerability and Exposure Management
Tuesday, June 10, 2025 / 11:30 AM - 12:00 PM EDT
Speaker: Elizabeth Morton, Field CISO, Axonius

Security teams face a scalability crisis. Resources (staff, budget, and tools) grow only linearly, while work grows exponentially. Learn seven best practices to handle vulnerability and exposure management in a world of noise with a focus on optimization, automation, and reducing the burnout of the security staff. - Recognize why security is facing a scalability crisis - Learn the seven best practices to handle vulnerability management in a world of noise - Get resources and an action plan to put it into practice within your organization

CyberArk Software: Machine Identity Security 2025: Top Trends, Challenges, and Strategies for your Org
Tuesday, June 10, 2025 / 11:30 AM - 12:00 PM EDT
Speaker: Dan Ryan, Director of Product Management and Strategy, CyberArk

Machine identities have become critical components of organizations, proliferating virtually every area of a company's infrastructure. As the volume of machine identities continues to scale exponentially, securing these identities has grown in complexity and become a paramount concern for enterprises. Join this session to understand the current trends, challenges, and strategies to secure your enterprise's machine identities.

Security Summit Today: Top Trends in Cybersecurity for 2025
Tuesday, June 10, 2025 / 12:15 PM - 12:35 PM EDT
Speakers: Richard Addiscott, VP Analyst, Gartner and Paul Furtado, VP Analyst, Gartner

Take the pulse of the Gartner Security & Risk Management Summit! Join this live session with Gartner expert, Richard Addiscott, to hear his thoughts on the top security trends in 2025, the questions clients are asking about these trends in the one-on-one booths, and what he's hearing on the show floor and on social media.

The CISO/CIO Collaboration Playbook
Tuesday, June 10, 2025 / 12:15 PM - 12:45 PM EDT
Speaker: Paul Proctor, Distinguished VP Analyst, Gartner (LinkedIn)

Whether a CISO reports into IT or the CIO is a peer, CIOs play a critical role in CISO effectiveness and cybersecurity readiness. This playbook is designed to address aspects of security that fall under joint CISO/CIO responsibility and influence. Covering key topics such as the cybersecurity operating model, board engagement, balancing security with IT operations, and investing in security to support business growth, this playbook is a must-have for all CISOs and the CIOs they work with.

A Needle in a Haystack? Find it Quickly With GenAI, Network and Observability Tools
Tuesday, June 10, 2025 / 12:15 PM - 12:45 PM EDT
Speaker: Marissa Schmidt, Sr Director Analyst, Gartner

Despite the widespread availability of monitoring tools, customers struggle to identify the root cause of network, application performance and security issues. Breakdown the silos with network, app and security teams by leveraging GenAI, network monitoring, and automation or security remediation tools to find network, application and security issues quickly and take actions.

The Future of Digital Identity
Tuesday, June 10, 2025 / 02:00 PM - 02:30 PM EDT
Speaker: Marty Resnick, VP Analyst, Gartner

The future world that businesses will operate in cannot thrive without identity. This session discusses the plausible future where organizations work across the globe, the space, the metaverse and the synthetic worlds created by generative AI, and how stakeholders will need a stronger and more innovative system of digital identity.

Claroty: Taking Back Control - Centralizing Remote Access for Industrial Systems
Tuesday, June 10, 2025 / 02:45 PM - 03:15 PM EDT
Speaker: Grant Geyer, Chief Strategy Officer, Claroty (LinkedIn

Industrial organizations often rely on vendors with their own remote access tools, leading to fragmented, insecure OT environments. With 73% using 3+ tools, this lack of control increases risk. This session explores strategies for organizations to centralize remote access in order to reduce risk, manage change, and improve governance—regaining visibility and control while ensuring vendor compliance and protecting mission-critical systems.

ETSS: Key Findings from The Summer 2025 IT Risk and Compliance Benchmark Report, moderated by Hyperproof
Tuesday, June 10, 2025 / 02:45 PM - 03:30 PM EDT
Speakers: Kayne McGladrey, Field CISO, Hyperproof and Lena Licata, VP, Hyperproof

In this expert-led roundtable, join peers for an interactive discussion as we explore insights from Hyperproof's Summer 2025 IT Risk and Compliance Benchmark Report, which cross-references the findings in our Winter report with 10 other industry reports published around the same time. We'll discuss top CISO concerns, surprising trends across reports, and practical takeaways to enhance your GRC program. Bring your perspective and join the conversation on where GRC is headed next.

The Real Cost of Cybersecurity
Tuesday, June 10, 2025 / 03:30 PM - 04:00 PM EDT
Speaker: Paul Proctor, Distinguished VP Analyst, Gartner (LinkedIn)

Cybersecurity costs are not fully captured in the security budget. The real cost includes the comprehensive expenses required to deliver cybersecurity, encompassing capital and operational expenses across both IT and security, and business friction. This session will explain how to embrace this new perspective and develop a more complete understanding of security costs to better inform cybersecurity investment decisions.

Pathlock: Elevating Identity Governance for Continuous Compliance and Security Excellence
Tuesday, June 10, 2025 / 04:15 PM - 04:35 PM EDT
Speaker: Jason Gzym, VP Solutions Engineering & Advisory, Pathlock

Establishing a successful identity governance program involves more than just automating identity and access management. To go from good to great, it's necessary to move beyond the basics. Organizations must take a proactive approach to security—starting with a clear understanding of the financial impact of identity and access risks. In this session, we'll show you how to break down operational silos and shift from reactive security measures and compliance checklists to an integrated continuous approach that empowers your organization to reduce risk and audits costs.

Gartner Keynote: Mastering the Art of Persuasive Leadership
Tuesday, June 10, 2025 / 04:45 PM - 05:30 PM EDT
Speaker: Alicia Mullery, VP Analyst, Gartner

What makes a great leader? Beyond technical experience and business knowledge, security and risk management leaders must be persuasive. This session explores three stories one must master to be a more persuasive leader.

Zero Trust in Public Organizations: Year Three, Beyond the Strategy
Wednesday, June 11, 2025 / 10:30 AM - 11:00 AM EDT
Speaker: Manuel Acosta, Sr Director Analyst, Gartner

This session is designed to help chief information security officers (CISOs) understand how to measure the progress of their zero-trust journey, explore industry trends and identify common pitfalls across both the public and private sectors. It will cover the developments from of the first, second, and now third year, and metrics to better comprehend the best practices that support your progress and processes in your zero-trust journey.

5 Security Maturity Assessment Mistakes You Must Not Make
Wednesday, June 11, 2025 / 10:30 AM - 11:00 AM EDT
Speaker: Fadeen Davis, Sr Principal Analyst, Gartner

Cybersecurity is a board imperative leading to more CISOs being asked by board members to show how the security program is performing when compared to peers. This session will answer the following questions — why security maturity assessments are critical to strategy creation, what are the types of assessments your peers are taking to measure current statistics and how to avoid common pitfalls. Leverage the results to inform your strategy and subsequent roadmap.

Armis: The New Cyber Warfare Front - 17 AI Attack Vectors Exploited by Nation-States
Wednesday, June 11, 2025 / 11:15 AM - 11:45 AM EDT
Speaker: Michael Freeman, Head of Threat Intelligence, Armis (LinkedIn

AI is rapidly transforming the threat landscape with nation-state threat actors such as China and Russia exploiting these new capabilities, setting off alarms among Western security experts. This new cyber warfare front underscores the urgency for governments, economies, and critical infrastructure to leverage robust AI-enhanced threat intelligence to proactively counter these evolving threats. This session examines 17 attack vectors by which nation-state threat actors are using AI - from subtle manipulation of compromised AI tools to aggressive cyber attacks.

CISO Edge: Focus on Risk Reduction, Not on Quantifying Cybersecurity's Value
Wednesday, June 11, 2025 / 12:00 PM - 12:30 PM EDT
Speaker: Wam Voster, VP Analyst, Gartner

CISOs struggle to demonstrate the business value of cybersecurity investment in terms that resonate with business executives. The continuing search for an effective way of quantifying business value is a wild goose chase and an ineffective way of utilizing scarce cybersecurity resources. Rather, focus on maximizing the defined output with available resources and use qualitative narratives and limited, defensible metrics to communicate cybersecurity's value.

Roundtable: CMMC Demystified
Wednesday, June 11, 2025 / 12:00 PM - 12:45 PM EDT
Speaker: Glenn Schoonover, Leadership Partner, Gartner

Cybersecurity is a top priority for the Department of Defense (DoD) because the defense industrial base (DIB) faces increasingly frequent, and complex cyberattacks. To strengthen DIB cybersecurity and better safeguard DoD information, the DoD developed the Cybersecurity Maturity Model Certification (CMMC) Program. In this session, we'll discuss features and requirements of CMMC 2.0.

Security Planning Guide 2025
Wednesday, June 11, 2025 / 12:00 PM - 12:30 PM EDT
Speaker: TBD

Global conflict, AI-based disruption and political upheaval continue to impact the risk landscape for organizations. In this environment, cybersecurity programs become paramount. This session provides insights into the current global security landscape.

Value of Network Detection and Response in the Zero Trust Ecosystem
Wednesday, June 11, 2025 / 02:45 PM - 03:15 PM EDT
Speaker: Andrew Lerner, Distinguished VP Analyst, Gartner (LinkedIn)

This session will explore the growing network detection and response market, the evolving platforms, and the zero-trust-focused core to enhance the defense for the growing attack surface. We discuss how buyers can differentiate between vendors and emerging technology, including growth in AI techniques, coverage across OT/IoT and cloud environments, and integration with adjacent security tools.


Connect with Elisity at Gartner Summit

As you navigate these critical sessions and explore solutions for your organization's microsegmentation and Zero Trust initiatives, we invite you to connect with the Elisity team at the summit. Whether you're looking to accelerate your Zero Trust maturity like Marsh McLennan, seeking to improve security posture across IT/OT environments, or need to address compliance requirements while reducing operational complexity, our experts are ready to discuss your specific challenges.

Stop by the Elisity booth to see a live demonstration of our identity-based microsegmentation platform, meet with our leadership team, or schedule a dedicated meeting to explore how we can help you achieve comprehensive device visibility and granular security policies without network disruption.

Schedule your meeting with Elisity at Gartner Summit 2025 →



Gartner-Security-Risk-Management-Summit-2025-Elisity-Sponsor-Speaker

 

No Comments Yet

Let us know what you think