{"id":41888,"date":"2024-05-06T21:20:18","date_gmt":"2024-05-07T04:20:18","guid":{"rendered":"https:\/\/www.syteca.com\/?p=41888"},"modified":"2024-05-23T02:26:19","modified_gmt":"2024-05-23T09:26:19","slug":"gartner-security-risk-management-summit-2024","status":"publish","type":"post","link":"https:\/\/www.syteca.com\/en\/blog\/gartner-security-risk-management-summit-2024","title":{"rendered":"Syteca to Participate in Gartner Security &amp; Risk Management Summit 2024"},"content":{"rendered":"\n<p>Syteca announces participation in the Gartner Security &amp; Risk Management Summit \u2014 a leading platform for cybersecurity professionals to exchange knowledge, gain valuable insights, and get updated on the latest cybersecurity advancements.<\/p>\n\n\n\n<p>The event has a <a href=\"https:\/\/www.gartner.com\/en\/conferences\/na\/security-risk-management-us\/agenda\" target=\"_blank\" rel=\"noreferrer noopener\">comprehensive agenda<\/a> and offers 150 sessions with the latest Gartner research. Attendees will be able to share their knowledge and find solutions to their most critical security and risk management challenges.&nbsp;<\/p>\n\n\n\n\t\t<div  class=\"block-14686bbd-90fd-4771-b07b-18739c127dc3 areoi-element container template-6 px-0\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-a119199e-6172-4d31-83b5-05c3440d9700 areoi-element p-3 table-head\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center p-poppins mb-0 has-text-color\" style=\"color:#ffffff;font-size:1.1rem;font-style:normal;font-weight:600\"><strong><strong>Event details<\/strong><\/strong><\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-5f30b4b3-f3c9-49b2-ae75-e4e04be544e1 areoi-element container\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-5ddb4ab0-cc83-40b6-863f-a9857000a57d row areoi-element row-cols-1 row-cols-md-2\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-827b4d90-706b-4090-a343-7ed959e9ddbf col areoi-element\">\n\t\t\t\n\t\t\t\n\n<p class=\"mb-0 p-4\" style=\"font-size:1.1rem;font-style:normal;font-weight:500\">Place<br><strong>National Harbor, MD, USA<\/strong><br><br><em>Gaylord National Resort &amp; Convention Center<br>165 Waterfront Street, National Harbor, MD<br>20745<\/em><\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-af6987dc-0ef5-413e-9f98-04085ef6ca68 col areoi-element\">\n\t\t\t\n\t\t<div class=\"areoi-background  d-md-none d-lg-none d-xl-none d-xxl-none\">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(55, 84, 115,0.05)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"mb-0 p-4\" style=\"font-size:1.1rem;font-style:normal;font-weight:500\">Date<br><strong>June 3 \u2013 5, 2024<\/strong><\/p>\n\n\n\n<p class=\"mb-0 p-4\" style=\"font-size:1.1rem;font-style:normal;font-weight:500\">Syteca\u2019s booth<br><strong>No. 128, Identity and Access Management Village<\/strong><\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-28b3d633-1691-4973-8d7b-d2c1838773fc row areoi-element row-cols-1 row-cols-md-2\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-1765243f-d41b-4e37-8d4d-7c7bde2c1da0 col areoi-element col-12 col-sm-12 col-md-12 col-lg-12 col-xl-12 col-xxl-12\">\n\t\t\t\n\t\t<div class=\"areoi-background  d-none d-sm-none d-md-block\">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(55, 84, 115,0.05)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center mb-0 p-4\" style=\"font-size:1.19rem;font-style:normal;font-weight:600\"><a href=\"https:\/\/meetings.hubspot.com\/maryna-yucel\/gartner-summit-2024?uuid=799d496d-e8fd-478c-add3-89101cee1cbe\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Book a meeting with us<\/strong><\/a><\/p>\n\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<h2  class=\"wp-block-heading\">Why visit Gartner Security &amp; Risk Management Summit?<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.gartner.com\/en\/conferences\/na\/security-risk-management-us\" target=\"_blank\" rel=\"noreferrer noopener\">Gartner Security &amp; Risk Management Summit<\/a> is a great place for security professionals to learn, network, and build new security strategies. Attendees will have access to numerous<strong> <\/strong>tracks on the following topics:<\/p>\n\n\n\n\t\t<div  class=\"block-210740fd-818c-4ee1-a62f-40a15d37e435 areoi-element container template-14 px-0\">\n\t\t\t\n\t\t\t\n\n<p class=\"has-text-align-center text-26-22 p-poppins\" style=\"font-style:normal;font-weight:600\"><\/p>\n\n\n\n\t\t<div  class=\"block-8f0376c9-1abf-41aa-9ba8-931baf3fd0de row areoi-element row-cols-1 row-cols-xl-2\">\n\t\t\t\n\n\t\t\t\n\n\t\t<div  class=\"block-50fe63ce-cfa8-4c12-93f6-0a657dfd572c col areoi-element\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-01a180d5-23cf-4316-8ca3-80c2e3adaaf0 areoi-element p-3 table-head\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center p-poppins mb-0 has-text-color\" style=\"color:#ffffff;font-size:1.15rem;font-style:normal;font-weight:600\">Role-based tracks<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-312db585-27ea-4ca9-97cf-897bbd6bdf17 areoi-element cell-content\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 246, 248,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<ul class=\"list-marker-color-dark-blue wp-block-list\">\n<li class=\"p-poppins ms-4 py-3\" style=\"font-size:1rem;font-style:normal;font-weight:600\">Cybersecurity Leadership<\/li>\n\n\n\n<li class=\"p-poppins ms-4 py-3\" style=\"font-size:1rem;font-style:normal;font-weight:600\">Infrastructure Security<\/li>\n\n\n\n<li class=\"p-poppins ms-4 py-3\" style=\"font-size:1rem;font-style:normal;font-weight:600\">Application and Data Security<\/li>\n\n\n\n<li class=\"p-poppins ms-4 py-3\" style=\"font-size:1rem;font-style:normal;font-weight:600\">Cybersecurity Operations<\/li>\n\n\n\n<li class=\"p-poppins ms-4 py-3\" style=\"font-size:1rem;font-style:normal;font-weight:600\">The CISO Circle Program<\/li>\n\n\n\n<li class=\"p-poppins ms-4 py-3\" style=\"font-size:1rem;font-style:normal;font-weight:600\">Cyber Risk Management<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-67bdd16a-074e-44f6-abe2-8363cc1a22f3 col areoi-element\">\n\t\t\t\n\t\t\t\n\n\t\t<div  class=\"block-fe69c249-45c9-41d3-818c-8d49c52c8020 areoi-element p-3 table-head\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(26, 59, 78,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<p class=\"has-text-align-center p-poppins mb-0 has-text-color\" style=\"color:#ffffff;font-size:1.15rem;font-style:normal;font-weight:600\">Spotlight tracks<\/p>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n\t\t<div  class=\"block-49555502-92b5-473b-93a0-1c33a0b24557 areoi-element cell-content\">\n\t\t\t\n\t\t<div class=\"areoi-background  \">\n\t\t\t<div class=\"container-fluid\" style=\"padding: 0;\">\n\t\t\t\t<div class=\"row justify-content-start\">\n\t\t\t\t\t<div class=\"col \">\n\t\t\t            <div class=\"areoi-background__color\" \n\t                        \tstyle=\"background: rgba(242, 246, 248,1)\">\n\t                        <\/div>\n\n\t                    \n\n\t                    \n\n\t                    \n\t    \t\t\t<\/div>\n\t    \t\t<\/div>\n\t    \t<\/div>\n\t    <\/div>\n\t\n\t\t\t\n\n<ul class=\"list-marker-color-dark-blue wp-block-list\">\n<li class=\"p-poppins ms-4 py-3\" style=\"font-size:1rem;font-style:normal;font-weight:600\">Artificial Intelligence<\/li>\n\n\n\n<li class=\"p-poppins ms-4 py-3\" style=\"font-size:1rem;font-style:normal;font-weight:600\">Government<\/li>\n\n\n\n<li class=\"p-poppins ms-4 py-3\" style=\"font-size:1rem;font-style:normal;font-weight:600\">Identity and Access Management (IAM)<\/li>\n\n\n\n<li class=\"p-poppins ms-4 py-3\" style=\"font-size:1rem;font-style:normal;font-weight:600\">Mid-Size Enterprise<\/li>\n\n\n\n<li class=\"p-poppins ms-4 py-3\" style=\"font-size:1rem;font-style:normal;font-weight:600\">Technical Insights for Security Practitioners<\/li>\n<\/ul>\n\n\n\t\t\t \n\t\t<\/div>\n\t\n \n\t\t\t\n\t\t<\/div>\n\t\n \n\t\t<\/div>\n\t\n\n\t\t\t \n\t\t<\/div>\n\t\n\n\n<p>During the event, visitors can explore new cybersecurity strategies, meet peers, and connect with top cybersecurity experts and service providers. Gartner Security &amp; Risk Management Summit will bring together more than 4,300 attendees, 50 experts, and 240 exhibitors, including <a href=\"https:\/\/www.gartner.com\/en\/conferences\/na\/security-risk-management-us\/exhibitors\/directory#ekransystem\" target=\"_blank\" rel=\"noreferrer noopener\">Syteca<\/a>.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201cAt the Gartner Security and Risk Management Summit, you will hear from top Gartner experts on how to keep pace with this incredible rate of change. You\u2019ll also learn best practices on how to evolve your current and future security strategies and architectures to stay ahead of the most complex attacks today and the future.\u201d<\/em><\/p>\n<cite><em>Patrick Hevesi, Conference Chair and VP Analyst, Gartner.&nbsp;<\/em><\/cite><\/blockquote>\n\n\n\n<h2  class=\"wp-block-heading\">What to expect from Syteca?<\/h2>\n\n\n\n<p>Syteca will exhibit at <strong>booth #128<\/strong> in the<strong> identity and access management village<\/strong>, ready to provide you with a live demo of our platform and offer solutions tailored to your needs. Syteca\u2019s Head of Business Development, <a href=\"https:\/\/www.linkedin.com\/in\/zhurer\/\" target=\"_blank\" rel=\"noreferrer noopener\">Yevhen Zhurer<\/a>, and Partner Account Manager, <a href=\"https:\/\/www.linkedin.com\/in\/mlturkey\/\" target=\"_blank\" rel=\"noreferrer noopener\">Marina Yucel<\/a>, will give you professional advice on how to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>fortify your defense against insider threats<\/li>\n\n\n\n<li>establish and enhance a user activity monitoring process<\/li>\n\n\n\n<li>ensure secure privileged access management.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"825\" height=\"330\" src=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/06211325\/graphics-1-Gartner.svg\" alt=\"Syteca is recognized by cybersecurity experts\" class=\"wp-image-41897\"\/><\/figure>\n\n\n\n<p>The Syteca platform offers comprehensive functionality to help you secure your IT perimeter against internal threats with our human-focused insider risk management.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"\/en\/product\/user-activity-monitoring\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Advanced user activity monitoring<\/strong><\/a><strong>.<\/strong> Monitor and analyze user activity in real time or review user sessions recorded in a screen-capture format and indexed with insightful text metadata. Even if a network connection is lost, Syteca continues to monitor activity and will send you the collected data once the connection is restored.<\/li>\n\n\n\n<li><a href=\"\/en\/product\/privileged-access-management\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Secure privileged account and session management<\/strong><\/a><strong>.<\/strong> Granularly control privileged user access permissions. Limit the time for which access is granted and deliver temporary credentials to specific users. Ensure secure remote access to your critical endpoints for third-party vendors, contractors, and other insiders with elevated access privileges.<\/li>\n\n\n\n<li><strong>Dashboarding and <\/strong><a href=\"\/en\/product\/alerts-and-notifications\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>alerting system<\/strong><\/a><strong>.<\/strong> Leverage Syteca\u2019s dashboards and customizable reporting tools to quickly get valuable insights into user behavior and security-related events. Receive a complete summary of all user sessions along with security alerts triggered by particular users. You can also receive real-time alerts on suspicious user activities to immediately respond to potential threats.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p>Thanks to these rich capabilities, many global giants like Visa, Samsung, Panasonic, and UPS already use our platform to mitigate insider risks and respond to security incidents driven by human factors. If you want to join these industry leaders by safeguarding your sensitive data with Syteca, visit us at <strong>booth # 128<\/strong> in the<strong> <\/strong>identity and access management village at the Gartner Security &amp; Risk Management Summit to discuss your cybersecurity needs with our experts.<\/p>\n\n\n\n<p><em>In the meantime, you can follow our <\/em><a href=\"\/en\/blog\" target=\"_blank\" rel=\"noreferrer noopener\"><em>blog<\/em><\/a><em> to get the latest cybersecurity insights. You\u2019re also welcome to visit our <\/em><a href=\"\/en\/partners\/become-a-partner\" target=\"_blank\" rel=\"noreferrer noopener\"><em>partnership portal<\/em><\/a><em> to get firsthand partner offerings.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Syteca announces participation in the Gartner Security &amp; Risk Management Summit \u2014 a leading platform for cybersecurity professionals to exchange knowledge, gain valuable insights, and get updated on the latest cybersecurity advancements. The event has a comprehensive agenda and offers 150 sessions with the latest Gartner research. Attendees will be able to share their knowledge [&hellip;]<\/p>\n","protected":false},"author":41,"featured_media":41907,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[61],"tags":[],"class_list":["post-41888","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Syteca at Gartner Security &amp; Risk Management Summit 2024 | Syteca<\/title>\n<meta name=\"description\" content=\"Meet Syteca at Gartner Security &amp; Risk Management Summit to learn human-focused insider risk management strategies to secure your organization.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.syteca.com\/en\/blog\/gartner-security-risk-management-summit-2024\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Syteca at Gartner Security &amp; Risk Management Summit 2024 | Syteca\" \/>\n<meta property=\"og:description\" content=\"Meet Syteca at Gartner Security &amp; Risk Management Summit to learn human-focused insider risk management strategies to secure your organization.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.syteca.com\/en\/blog\/gartner-security-risk-management-summit-2024\" \/>\n<meta property=\"og:site_name\" content=\"Syteca\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-07T04:20:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-23T09:26:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/06211801\/OG-Gartner.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Helen Gamasenko\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/06211820\/OG-TW-Gartner.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Helen Gamasenko\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/gartner-security-risk-management-summit-2024#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/gartner-security-risk-management-summit-2024\"},\"author\":{\"name\":\"Helen Gamasenko\",\"@id\":\"https:\/\/www.syteca.com\/en\/#\/schema\/person\/a8ca758893cd2328f15dd3cd668552ad\"},\"headline\":\"Syteca to Participate in Gartner Security &amp; Risk Management Summit 2024\",\"datePublished\":\"2024-05-07T04:20:18+00:00\",\"dateModified\":\"2024-05-23T09:26:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/gartner-security-risk-management-summit-2024\"},\"wordCount\":641,\"image\":{\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/gartner-security-risk-management-summit-2024#primaryimage\"},\"thumbnailUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/06211645\/banner-Gartner.png\",\"articleSection\":[\"Company News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/gartner-security-risk-management-summit-2024\",\"url\":\"https:\/\/www.syteca.com\/en\/blog\/gartner-security-risk-management-summit-2024\",\"name\":\"Syteca at Gartner Security & Risk Management Summit 2024 | Syteca\",\"isPartOf\":{\"@id\":\"https:\/\/www.syteca.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/gartner-security-risk-management-summit-2024#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/gartner-security-risk-management-summit-2024#primaryimage\"},\"thumbnailUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/06211645\/banner-Gartner.png\",\"datePublished\":\"2024-05-07T04:20:18+00:00\",\"dateModified\":\"2024-05-23T09:26:19+00:00\",\"author\":{\"@id\":\"https:\/\/www.syteca.com\/en\/#\/schema\/person\/a8ca758893cd2328f15dd3cd668552ad\"},\"description\":\"Meet Syteca at Gartner Security & Risk Management Summit to learn human-focused insider risk management strategies to secure your organization.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/gartner-security-risk-management-summit-2024#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.syteca.com\/en\/blog\/gartner-security-risk-management-summit-2024\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/gartner-security-risk-management-summit-2024#primaryimage\",\"url\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/06211645\/banner-Gartner.png\",\"contentUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/06211645\/banner-Gartner.png\",\"width\":1920,\"height\":601},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.syteca.com\/en\/blog\/gartner-security-risk-management-summit-2024#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Company News\",\"item\":\"https:\/\/www.syteca.com\/en\/blog\/category\/company-news\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Syteca to Participate in Gartner Security &amp; Risk Management Summit 2024\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.syteca.com\/en\/#website\",\"url\":\"https:\/\/www.syteca.com\/en\/\",\"name\":\"Syteca\",\"description\":\"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.syteca.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.syteca.com\/en\/#\/schema\/person\/a8ca758893cd2328f15dd3cd668552ad\",\"name\":\"Helen Gamasenko\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.syteca.com\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/02\/20111320\/Helen.png\",\"contentUrl\":\"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/02\/20111320\/Helen.png\",\"caption\":\"Helen Gamasenko\"},\"description\":\"Helen is a Chief Marketing Officer at Syteca. She builds marketing and brand development strategies that make Syteca known around the globe. Elena is an effective manager who helps our experts to prepare for conferences, simultaneously coordinates the marketing team in running PR campaigns, partner marketing projects and Syteca\u2019s brand awareness growth.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/elena-gamasenko-24415aa3\/\"],\"url\":\"https:\/\/www.syteca.com\/en\/blog\/author\/helen-gamasenko\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Syteca at Gartner Security & Risk Management Summit 2024 | Syteca","description":"Meet Syteca at Gartner Security & Risk Management Summit to learn human-focused insider risk management strategies to secure your organization.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.syteca.com\/en\/blog\/gartner-security-risk-management-summit-2024","og_locale":"en_US","og_type":"article","og_title":"Syteca at Gartner Security & Risk Management Summit 2024 | Syteca","og_description":"Meet Syteca at Gartner Security & Risk Management Summit to learn human-focused insider risk management strategies to secure your organization.","og_url":"https:\/\/www.syteca.com\/en\/blog\/gartner-security-risk-management-summit-2024","og_site_name":"Syteca","article_published_time":"2024-05-07T04:20:18+00:00","article_modified_time":"2024-05-23T09:26:19+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/06211801\/OG-Gartner.png","type":"image\/png"}],"author":"Helen Gamasenko","twitter_card":"summary_large_image","twitter_image":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/06211820\/OG-TW-Gartner.png","twitter_misc":{"Written by":"Helen Gamasenko","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.syteca.com\/en\/blog\/gartner-security-risk-management-summit-2024#article","isPartOf":{"@id":"https:\/\/www.syteca.com\/en\/blog\/gartner-security-risk-management-summit-2024"},"author":{"name":"Helen Gamasenko","@id":"https:\/\/www.syteca.com\/en\/#\/schema\/person\/a8ca758893cd2328f15dd3cd668552ad"},"headline":"Syteca to Participate in Gartner Security &amp; Risk Management Summit 2024","datePublished":"2024-05-07T04:20:18+00:00","dateModified":"2024-05-23T09:26:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.syteca.com\/en\/blog\/gartner-security-risk-management-summit-2024"},"wordCount":641,"image":{"@id":"https:\/\/www.syteca.com\/en\/blog\/gartner-security-risk-management-summit-2024#primaryimage"},"thumbnailUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/06211645\/banner-Gartner.png","articleSection":["Company News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.syteca.com\/en\/blog\/gartner-security-risk-management-summit-2024","url":"https:\/\/www.syteca.com\/en\/blog\/gartner-security-risk-management-summit-2024","name":"Syteca at Gartner Security & Risk Management Summit 2024 | Syteca","isPartOf":{"@id":"https:\/\/www.syteca.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.syteca.com\/en\/blog\/gartner-security-risk-management-summit-2024#primaryimage"},"image":{"@id":"https:\/\/www.syteca.com\/en\/blog\/gartner-security-risk-management-summit-2024#primaryimage"},"thumbnailUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/06211645\/banner-Gartner.png","datePublished":"2024-05-07T04:20:18+00:00","dateModified":"2024-05-23T09:26:19+00:00","author":{"@id":"https:\/\/www.syteca.com\/en\/#\/schema\/person\/a8ca758893cd2328f15dd3cd668552ad"},"description":"Meet Syteca at Gartner Security & Risk Management Summit to learn human-focused insider risk management strategies to secure your organization.","breadcrumb":{"@id":"https:\/\/www.syteca.com\/en\/blog\/gartner-security-risk-management-summit-2024#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.syteca.com\/en\/blog\/gartner-security-risk-management-summit-2024"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.syteca.com\/en\/blog\/gartner-security-risk-management-summit-2024#primaryimage","url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/06211645\/banner-Gartner.png","contentUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/05\/06211645\/banner-Gartner.png","width":1920,"height":601},{"@type":"BreadcrumbList","@id":"https:\/\/www.syteca.com\/en\/blog\/gartner-security-risk-management-summit-2024#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Company News","item":"https:\/\/www.syteca.com\/en\/blog\/category\/company-news"},{"@type":"ListItem","position":2,"name":"Syteca to Participate in Gartner Security &amp; Risk Management Summit 2024"}]},{"@type":"WebSite","@id":"https:\/\/www.syteca.com\/en\/#website","url":"https:\/\/www.syteca.com\/en\/","name":"Syteca","description":"Syteca | software to monitor privileged users and audit employee activity, detect insider threats, and protect servers in real time. Try a free demo now!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.syteca.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.syteca.com\/en\/#\/schema\/person\/a8ca758893cd2328f15dd3cd668552ad","name":"Helen Gamasenko","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.syteca.com\/en\/#\/schema\/person\/image\/","url":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/02\/20111320\/Helen.png","contentUrl":"https:\/\/syteca_site_uploads.storage.googleapis.com\/wp-content\/uploads\/2024\/02\/20111320\/Helen.png","caption":"Helen Gamasenko"},"description":"Helen is a Chief Marketing Officer at Syteca. She builds marketing and brand development strategies that make Syteca known around the globe. Elena is an effective manager who helps our experts to prepare for conferences, simultaneously coordinates the marketing team in running PR campaigns, partner marketing projects and Syteca\u2019s brand awareness growth.","sameAs":["https:\/\/www.linkedin.com\/in\/elena-gamasenko-24415aa3\/"],"url":"https:\/\/www.syteca.com\/en\/blog\/author\/helen-gamasenko"}]}},"_links":{"self":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/posts\/41888","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/users\/41"}],"replies":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/comments?post=41888"}],"version-history":[{"count":0,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/posts\/41888\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media\/41907"}],"wp:attachment":[{"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/media?parent=41888"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/categories?post=41888"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.syteca.com\/en\/wp-json\/wp\/v2\/tags?post=41888"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}