Agenda
There are no results for this filter set. Try refining to see more options.
Bold Starts: Monday
Dec 9- 2:00 pm – 4:30 pm ET Forrester Women's Leadership Program
- 4:45 pm – 6:00 pm ET Level-Up Workshop: Build Your Zero Trust Roadmap
- 4:45 pm – 6:00 pm ET Forrester Summit Certification Workshop: Improve Security With AI
- 6:00 pm – 7:30 pm ET Welcome Reception
Tuesday
Dec 10- 8:00 am – 9:30 am ET General Breakfast
- 9:00 am – 9:30 am ET Welcome & Opening Remarks
- 9:30 am – 9:40 am ET Host Remarks
- 9:40 am – 10:10 am ET Keynote: Data Security Reborn: Pioneering Strategies For AI And Post-Quantum
- 10:15 am – 11:05 am ET Marketplace Coffee Break & Networking (In-Person Only)
- 10:25 am – 11:40 am ET Level-Up Workshop: Measure Your IAM Maturity
- 11:05 am – 11:35 am ET Breakout Sessions
- 11:45 am – 12:15 pm ET Case Study Sessions (In-Person Only)
- 12:15 pm – 1:45 pm ET Lunch & Marketplace (In-Person Only)
- 12:15 pm – 1:25 pm ET Lunch & Learn Session (In-Person Only)
- 1:45 pm – 2:30 pm ET Breakout Sessions + Ask An Expert
- 2:40 pm – 3:10 pm ET Case Study Sessions (In-Person Only)
- 3:20 pm – 3:50 pm ET Breakout Sessions
- 3:20 pm – 4:35 pm ET Level-Up Workshop: Thwarting Social Engineering: A Balancing Act
- 3:50 pm – 4:35 pm ET Marketplace Coffee Break & Networking (In-Person Only)
- 4:35 pm – 5:05 pm ET Keynote: Security & Risk Enterprise Leadership Award
- 5:05 pm – 5:35 pm ET Keynote: It’s Not You! The Three Lines Of Defense Create False Assurances
- 5:35 pm – 5:40 pm ET Closing Remarks
- 5:40 pm – 6:40 pm ET General Reception
Wednesday
Dec 11- 8:00 am – 9:00 am ET General Breakfast
- 8:15 am – 9:00 am ET Breakfast Boardroom (In-Person Only)
- 9:00 am – 9:00 am ET Welcome Back
- 9:10 am – 9:40 am ET Keynote: Biometric Frontiers: Unlocking the Future Of Engagement
- 9:40 am – 10:10 am ET Keynote: From Fragile To Agile: Reimagining Software Supply Chain Security
- 10:15 am – 11:05 am ET Marketplace Coffee Break & Networking (In-Person Only)
- 10:25 am – 11:40 am ET Level-Up Workshop: Transform Your Collaboration Efforts To Protect OT Environments
- 11:05 am – 11:35 am ET Breakout Sessions
- 11:40 am – 12:10 pm ET Case Study Sessions (In-Person Only)
- 12:10 pm – 1:25 pm ET Lunch & Marketplace (In-Person Only)
- 12:10 pm – 2:10 pm ET Level-Up Workshop: Take Tactical Steps To Adopt Proactive Security
- 1:25 pm – 2:10 pm ET Breakout Sessions + Ask An Expert
- 2:15 pm – 2:45 pm ET Case Study Sessions (In-Person Only)
- 2:45 pm – 3:15 pm ET Keynote: The Human Element
- 3:15 pm – 3:20 pm ET Closing Remarks
Bold Starts: Monday Dec 9
Forrester Women's Leadership Program
Communities. Advancement. Change.
The Forrester Women’s Leadership Program focuses on building community and advancing women in the organization by breaking down barriers and overcoming challenges. Learn advancement strategies and engage in conversations about developing meaningful relationships with women across technology, data, and security. All are welcome to join!
The Forrester Women’s Leadership Program will:
- Build Community
- Inspire Change
- Drive Advancement
- Foster Allyship and Individual Empowerment
- Facilitate Meaningful Connections
Speakers:
Laura Koetzle, VP, Group Director, Forrester
Amy DeMartine, VP, Research Director, Forrester
Level-Up Workshop: Build Your Zero Trust Roadmap
This workshop will help attendees build a comprehensive roadmap to implement a Zero Trust strategy. Attendees will:
- Define clear objectives and prioritize business initiatives, ensuring alignment with organizational goals and security needs.
- Conduct current-state assessments to evaluate existing posture and identify gaps, as well as prioritize critical initiatives.
- Create a practical roadmap that balances robust security with operational efficiency, fostering collaboration and breaking down organizational silos for a unified approach to Zero Trust implementation.
Speakers:
Peter Cerrato, Principal Consultant, Forrester
Tope Olufon, Sr Analyst, Forrester
Carlos Rivera, Senior Analyst, Forrester
Ron Woerner, Senior Consultant, Forrester
Forrester Summit Certification Workshop: Improve Security With AI
The Certification program at this year’s S&R Summit is designed to help leaders and teams harness the power of AI to improve security operations and build resilience. Guided by a hands-on project to capture key takeaways and ideas for the future, attendees on the Certification program will get an orchestrated experience to help them hone their approach to AI while having space to explore other great sessions and activities throughout the event. To earn a certification credential with Forrester, attendees will be required to fulfill the following completion requirements:
- 1-kick-off workshop: Ignore The Hype: Use Generative AI To Actually Improve Security Operations with Allie Mellen; taking place December 9, 4:45-6:00 PM EST.
- 2 keynote sessions
- 3 breakout sessions
- 1 Analyst-led AI roundtable discussion taking place December 11, 10:20-11:00 AM EST.
- 1 wrap-up lunch taking place December 11, 12:20-1:15 PM EST
- 1 certification reflection workbook
Speakers:
Allie Mellen, Principal Analyst, Forrester
Patrick Hayes, Product Manager, Certification, Forrester
Welcome Reception
Join us for refreshments and light appetizers. All registered attendees are welcome.
Tuesday Dec 10
General Breakfast
Host Remarks
Speakers:
Joseph Blankenship, VP, Research Director, Forrester
Amy DeMartine, VP, Research Director, Forrester
Keynote: Data Security Reborn: Pioneering Strategies For AI And Post-Quantum
Data security today is overhyped and nebulous. A deliberate approach to data security is elusive for many organizations. Forces like AI and post-quantum threats up the ante, while the journey to improve Zero Trust maturity requires advancing core data security capabilities and controls. Reimagine and advance your data security program:
- Reconceptualize the scope of what constitutes sensitive data today.
- Bring clarity to the data risks that require mitigating controls.
- Define data-centric security capabilities and controls.
Speakers:
Heidi Shey, Principal Analyst, Forrester
Marketplace Coffee Break & Networking (In-Person Only)
Marketplace breaks are your chance to connect with sponsors and catch up with colleagues on the show floor.
10:20am – 10:30am - OneTrust Spotlight Session
10:35am - 10:45am - OnSpring Technologies Spotlight Session
10:50am - 11:00am - Axonius Spotlight Session
Level-Up Workshop: Measure Your IAM Maturity
In today’s digital world, identity-centric security is crucial. An effective identity and access management (IAM) program plays an instrumental role, not only in defending against increasingly sophisticated cyberthreats but also in enhancing user experience and improving business agility. This interactive workshop will provide security leaders with:
- Insights to key elements of a modern IAM program.
- An executive-level IAM program maturity assessment.
- Best practices for developing a business-driven IAM program.
Speakers:
Geoff Cairns, Principal Analyst, Forrester
Breakout Sessions
Case Study Sessions (In-Person Only)
Hear real world case studies showcasing the value of partnering with the right security and risk provider.
Attend one session:
BitSight Case Study
More information coming soon!
ThreatLocker Case Study
More information coming soon!
ProcessUnity Case Study
More information coming soon!
Lunch & Marketplace (In-Person Only)
Marketplace breaks are your chance to connect with sponsors and catch up with colleagues on the show floor.
12:50pm - 1:00pm - ThreatLocker Spotlight Session
Lunch & Learn Session (In-Person Only)
This session will have limited capacity and is first come, first served. Lunch will be provided.
Safe Security Lunch & Learn
Breakout Sessions + Ask An Expert
Case Study Sessions (In-Person Only)
Hear real world case studies showcasing the value of partnering with the right security and risk provider.
Attend one session:
Illumio Case Study
More information coming soon!
Rocket Software Case Study
More information coming soon!
Safe Security Case Study
More information coming soon!
Breakout Sessions
Level-Up Workshop: Thwarting Social Engineering: A Balancing Act
Attackers prey on your workforce’s better angels – the desire to be helpful and efficient. This opens them up to social engineering attacks like phishing, SMShing, and business email compromise (BEC). Thwarting social engineering attacks means striking the right balance between effective technology, skilled security practitioners, and a human-centric approach to building an empowered security culture across the workforce. This interactive workshop will help security leaders and practitioners:
- Understand security practitioner and workforce needs and motivations.
- Explore strategies for optimizing the synergy between technology and people to protect data and IP.
- Create people and technology “balance sheets” for specific social engineering scenarios.
Speakers:
Jess Burn, Principal Analyst, Forrester
Marketplace Coffee Break & Networking (In-Person Only)
Marketplace breaks are your chance to connect with sponsors and catch up with colleagues on the show floor.
3:55pm - 4:05pm - Recorded Future Spotlight Session
4:10pm - 4:20pm - ExtraHop Spotlight Session
4:25pm - 4:35pm - ServiceNow Spotlight Session
Keynote: Security & Risk Enterprise Leadership Award
Welcome to the highly anticipated Forrester Security And Risk Enterprise Leadership Award, the only assessment dedicated to recognizing excellence in security, privacy, and risk strategy, integral to building a trusted and resilient business.
In this session, we will hear from this year’s award winner on how they continually build trust with customers, employees, and partners.
Speakers:
Stephanie Balaouras, VP, Group Director, Forrester
Keynote: It’s Not You! The Three Lines Of Defense Create False Assurances
The “three lines of defense” model is no longer fit for purpose. Organizations struggle to retrofit this two-decades-old compliance model to meet modern risk management needs. Not only does this not work, it creates false assurances. Instead, leaders need better processes to break out of their silos and align risk decisions with business goals. Stop managing risk via artificial lines and level up your organization with continuous risk management. This session will:
- Highlight common pitfalls when relying on three lines of defense as a risk management strategy.
- Introduce Forrester’s new continuous risk management model.
- Chart a path to start using continuous risk management today.
Speakers:
Alla Valente, Senior Analyst, Forrester
Cody Scott, Senior Analyst, Forrester
Closing Remarks
General Reception
Wednesday Dec 11
General Breakfast
Breakfast Boardroom (In-Person Only)
This session will have limited capacity and is first come, first served. Breakfast will be provided.
ExtraHop Breakfast Boardroom
Welcome Back
Keynote: Biometric Frontiers: Unlocking the Future Of Engagement
Biometrics holds the keys to a range of engagement models of the future. But that future comes with a lot of baggage, including profound geographical fragmentation from a cultural, regulatory, and implementation perspective, as well as unnerving reports of deepfakes. This keynote compares and contrasts regional approaches to biometrics; explores the good, bad, and ugly of face, voice, and fingerprint biometrics; and examines the security, risk, and privacy challenges; and the benefits of their implementation. Join us to:
- Learn proven best practices on how to bolster adoption.
- Prepare to defend against deepfakes.
- Prevent legal, regulatory, and audit failures.
Speakers:
Andras Cser, VP, Principal Analyst, Forrester
Enza Iannopollo, Principal Analyst, Forrester
Keynote: From Fragile To Agile: Reimagining Software Supply Chain Security
The fragility of software is all too evident in worldwide outages, targeted attacks on customers, and needless breaches due to vendor vulnerabilities and missteps. To stop the onslaught, U.S. and international governments are pushing for better transparency, resiliency, and security. This won’t be enough; Security leaders must adopt a systematic approach that treats software as an interconnected supply chain, ensuring robust security at every link. This keynote is a must-attend event to:
- Learn the crucial roles and responsibilities of software supply chain: chooser, producer, and operator
- Grasp the vital steps and processes of a secure software supply chain
- Gain real-world perspective from peers who are actively implementing a software supply chain program.
Speakers:
Janet Worthington, Senior Analyst, Forrester
Marketplace Coffee Break & Networking (In-Person Only)
Marketplace breaks are your chance to connect with sponsors and catch up with colleagues on the show floor.
10:20am - 10:30am - Incode Technologies Spotlight Session
Level-Up Workshop: Transform Your Collaboration Efforts To Protect OT Environments
CISOs are being tasked with implementing cybersecurity strategies to protect OT environments from cyberattacks. Despite this directive, initiatives to improve cybersecurity controls in OT environments are lagging. Workshop participants will learn:
- Why traditional cybersecurity processes and technologies fail in OT.
- How to customize cybersecurity initiatives to fit the unique characteristics of OT.
- Ways to collaborate more effectively with a new set of OT stakeholders and coworkers.
Speakers:
Brian Wrozek, Principal Analyst, Forrester
Breakout Sessions
Case Study Sessions (In-Person Only)
Hear real world case studies showcasing the value of partnering with the right security and risk provider.
Lunch & Marketplace (In-Person Only)
Marketplace breaks are your chance to connect with sponsors and catch up with colleagues on the show floor.
12:30pm - 12:40pm - Safe Security Spotlight Session
Level-Up Workshop: Take Tactical Steps To Adopt Proactive Security
Join Senior Analyst Erik Nost for a workshop that breaks down the steps organizations can take to begin implementing more proactive security. Grounded on the three principles of proactive security (visibility, prioritization, and remediation), this workshop will provide methods to:
- Identify inputs and synergies for visibility, prioritization, and remediation.
- Guide participants in data management strategies.
- Discuss options for asset categorization and remediation prioritization.
- Learn how to work with a diverse set of vendors.
Speakers:
Erik Nost, Senior Analyst, Forrester
Breakout Sessions + Ask An Expert
Case Study Sessions (In-Person Only)
Hear real world case studies showcasing the value of partnering with the right security and risk provider.
Keynote: The Human Element
Ask almost anyone in security, and they’ll tell you that the missing silver bullet to solve anything relating to human element breaches is security awareness and training. They also say (without any proof) that training improves the outcomes of these breaches. Not the rebels and innovators! They long ago recognized the various downfalls of compliance-driven, one-size-fits-all, often perfunctory training. And they have chosen to play bigger. Cue human risk management – the evidence-based art and science of positively influencing cybersecurity behavior and instilling a security culture. Join us for this keynote to examine the fundamental mindset, process and technology shift that is occurring , and how you too can and should, lead this movement.
- Challenge traditional security training and awareness: Recognize the limitations of conventional security awareness programs and the need for a more tailored approach to addressing human element breaches.
- Embrace human risk management: Embrace the evidence-based practice of human risk management to positively influence cybersecurity behavior and foster a strong security culture within your organization.
- Lead the change: Be a part of the fundamental shift in mindset, process, and technology to spearhead the movement towards effective human risk management in cybersecurity.
Speakers:
Jinan Budge, VP, Principal Analyst, Forrester
Closing Remarks
Security & Risk Summit · December 9 – 11, 2024 · Baltimore & Digital
Contact us at events@forrester.com.