Event Spotlight: Gartner Security & Risk Management Summit

The 2025 Gartner Security & Risk Management Summit invites attendees to "Engage. Innovate. Lead." The event draws on the expertise of Gartner analysts to address the challenges of increasingly complex cyber environments, providing insights on cybersecurity strategy and innovation, leadership, business engagement, metrics, risk management, cloud security, data security, AI, and more.

Access to Gartner analysts is a major feature of the summit. In addition to presenting research and insights in sessions, analysts are available to meet with attendees throughout the event.

This year's summit is being held June 9-11 in National Harbor, MD, just outside of Washington, DC. Gartner has seen tremendous growth in interest over the years, and this year's gathering is expected to be the biggest yet, with around 5,400 attendees. This growth can be attributed to the increased use of artificial intelligence (AI). AI use introduces new efficiencies to organizations but also opens up new opportunities for threat actors to infiltrate and impact those groups. Additionally, regulations around AI use are just being developed, leaving many chief information security officers (CISOs) unsure of how best to implement and secure AI, as well as how to communicate the associated risks to senior stakeholders. Continue reading

Paving the Way for Quantum Computing

While data is traveling faster than ever thanks to the dizzying pace of technical evolution, we haven't seen anything yet. Quantum computing promises to make today's computing speeds look like a carnival merry-go-round. This is because quantum computing multiplies the speed of today's computers by employing quantum bits (qubits), which use both types of regular computer bits--0s and 1s--at the same time. This means quantum computers can look at, process, and analyze information at much faster rates.

This speed can be leveraged in a wide variety of ways across government, including improving cybersecurity threat detection and response, speeding intelligence analysis, optimizing logistics, enabling more in-depth economic trend prediction, providing faster modeling for research and development, and more. Several programs, initiatives, and pieces of legislation have been created to support the development of quantum computing in government.
Continue reading

How Agencies are Building Experience and Trust with AI

State and local agencies are looking for ways to incorporate artificial intelligence (AI), and specifically generative AI, into their operations. While the promise of increased efficiency is a driving force in AI adoption, there is considerable resistance to implementing this technology when it remains largely untested in government settings. Additionally, states and localities lack the personnel and infrastructure to manage and effectively use some of the more advanced AI solutions now available.

The adoption and success of AI in state and local government requires an open mind and a measured approach. Agencies are looking for low-risk, high-reward opportunities to begin testing out AI effectiveness. A recent report from the National Association of State Chief Information Officers found that transcribing meetings, managing and generating documents, and generating software code were some of the top processes for which state CIOs reported currently using generative AI. Continue reading

Three Approaches to Identity Management

Identity management is the way organizations control access to resources to ensure that the right individuals have access to the right resources at the right time, and it is a key pillar of zero trust architecture. In a zero trust system, a user has to validate and verify their identity continually as they access data and systems. But to function well, this process has to be seamless for the end user. Traditional security measures dependent on passwords cannot scale to meet the needs of zero trust--imagine how time-consuming and frustrating it would be to continually enter a password every time you move to a new application or data set. Fortunately, there are several approaches organizations can use to achieve high levels of both security and useability.

FIDO

Fast identity online (FIDO) is an authentication standard designed to improve security and convenience in identity management by eliminating reliance on traditional passwords. Strong authentication is achieved by using biometrics (such as fingerprints or facial recognition), security keys, or PINs stored on a local device. Continue reading

Zero Trust Passes Key Milestone

In January 2022, the Zero Trust Federal Strategy set a deadline of September 30, 2024, for agencies to adopt some level of zero trust architecture. Based on early indications, agencies have largely met zero-trust goals. The Federal CIO reported in early September that the 24 CFO Act agencies were all over 90% of the way to meeting the zero-trust goals. Beyond that group, the federal government as a whole was at 87% goal completion.

What's Changed?

The shift to zero trust is a response to the way government and citizens are using technology. With the increased use of cloud-based solutions, the traditional "castle and moat" security that protected on-premise infrastructure no longer supports the way applications are being deployed. Zero Trust focuses on continually verifying that users have permission to access the data and systems they are using. Gaining access requires coordination among a number of technologies that all work with a common set of user identification and access policies. Continue reading