Upload
hoangdiep
View
228
Download
2
Embed Size (px)
Citation preview
Gartner Security & Risk Management Summit 201810 – 11 September / London, UKgartner.com/eu/security
Save €325 by 13 July 2018
Early-bird discount
“I now have a clear insight into the ever changing and complex world of the threat landscape. This conference has given us great concepts to explore and
will help us develop a solid security road map.”
Security and Risk Leader, 2017 Attendee
Gartner Security & Risk Management Summit 2018#GartnerSEC2
Securing Digital Business: Adapt. Transform. Scale.
Understand new threats and challenges. Transform your cybersecurity, risk management and compliance strategies. Prepare for emerging technologies.Digital business is bringing new threats and vulnerabilities along with new opportunities. New risks are being created as real and virtual worlds collide and digital ecosystems expand. At Gartner Security & Risk Management Summit 2018, 10 – 11 September, in London, UK, you’ll learn how to:
• Enableasafer use of cloud solutions
• Buildaresilient infrastructure with better attack detection and remediation
• Understandthechanging threat landscape and how it impacts cyber security
• Findanddeveloptherequiredsecurity talent, and optimize the security organization
• Takeaproactiveapproachtorisk management and recovery planning to support business resilience
Join us for the comprehensive security and risk management update you need to enable successful digital business transformation.
•TheOutlookforSecurityTalent
•TheCloudComplianceConundrum
•FiveQuestionsonAIThatCISOsShouldAnswer
•LessonsLearnedintheEquifaxBreachandOtherIncidents
•SoYouWanttoReportonDigitalBusinessRisktotheBoard
•DigitalTransformationRequiresIntegratedRiskManagement
•GDPRtheDayAfter:3Mythsand6KeyCapabilitiesDiscussed
•BeyondDetection:6CoreSecurityPatternstoPreventHighlyEvasiveThreats
•LeveragingaSecurityChampionProgramtoDriveaMoreSecurity-AwareCulture
Some of the new content and sessions
for 2018
Gartner Predicts By 2021, at least one company will publicly acknowledge a $1 billion revenue impact from a business outage resulting from a malware/ransomware attack.
Visit gartner.com/eu/security for updates and to register! 3
A Security Trends and Technical Insights Program: Build Trust and Resilience with More Agile Security Get practical methods and longer-term strategies to build a more trusted and resilient environment for digital business, and to support a more-agile-than-ever IT organization. As new business practices change the threat landscape, security programs must evolve without neglecting legacy infrastructure. Learn how to support the new and improve the old.
• Cloudsecurity
• Endpointprotectionplatforms
• Preventinghighlyevasivethreats
• Understandingthethreatlandscape
• ImpactofAIonsecurityandriskmanagement
B RiskandBusinessResilienceProgram:ManageLocalandGlobalRisktoUnderpintheDigitalBusinessTransition Digitalrisksareexpandingasmoredatasourcesandtechnologiesarewovenintothefabricofthebusiness.Learnabouttherisksandcomplexitiesthatyoushouldexpectintransitioningtodigitalbusiness.Anticipatetheunexpectedandworktoestablishadisciplinedapproachofproactiveriskmanagementandrecovery planning to support business resilience.
• BeyondtheGDPR
•Managingcloudcompliance
• Integratedriskmanagement
• Riskassessmentfordigitalbusiness
• Developinganorganizationalresilience program
C ChiefInformationSecurityOfficer(CISO)Program:GovernSecurityandRiskthroughStrongLeadershipandSolidStrategy TheaccelerationtowarddigitalbusinesshaspresentedCISOswithnewchallenges.CISOsmustunderstandbusinessgoals,quicklyidentifyandassessassociatedrisks,andcommunicaterelevantriskstothebusinessinbusinessterms.JoinusfortheCISOprogramandbecomearecognizedbusinessleader,and superstar communicator, facilitator, and problem solver.
• Buildingsecurityawareness
• PreparingforIoTandBlockchain
• Understandingyourappetiteforrisk
• Addressingskilledstaffingshortages
• Developingaleadershipvisionforsecurityandriskmanagement
Created exclusively for CISOs, the Gartner CISO Circle brings together the world’s security and risk leaders to share in thought-leadingdiscussions.TheCISOCircleprovidesanenhancedexperience through exclusive cutting-edge research and networking opportunities. Participants will have the chance to form valuable peer connections, hone their leadership skills, and understand how to best advance business objectives with successful security innovation.
* Application to participate is required. Apply at gartner.com/eu/security
• Reportingrisktotheboard
• Lessonslearnedfromhighprofilebreaches
• Communicatingthevalueofsecurityandriskmanagementinitiatives
HottopicsAgenda Tracks
CISO Circle*
“MyfirstGartnersummitandI’dstronglyrecommend it to anyone. Networking and discussing topics in workshops as wellascoffeebreakswereallusefulinsharing experiences.” Head of Security, Dyson
Forthemostuptoda
te
informationaboutour
agenda,
speakers and sessions please
visitourwebsite
gartner.com/eu/security
Gartner Security & Risk Management Summit 2018#GartnerSEC4
Programs at a Glance
Please visit gartner.com/eu/security for full agenda details.
Security Trends and Capabilities Risk and Resilience CISO Track
The State of Cloud Security Jay Heiser
State of Risk Management John Wheeler
Leadership Vision for Security and Risk Management Tom Scholtz
Rethinking Isolation and Hardening as a Foundational Security Strategy Neil MacDonald
Getting Value from Penetration Tests and Red Teams Augusto Barros
Monitor User Activity With Data or Prepare for a Breach Brian Lowans
Why You Must Consider Data Privacy When Building Your IoT Initiative David Anthony Mahdi
Leveraging a Security Champion Program to Drive a More Security-Aware Culture Jeffrey Wheatman
State of the Threat Landscape Pete Shoard
The Evolution of SIEM Technology Toby Bussa
Living with GDPR in a Mobile World Rob Smith
The Cloud Compliance Conundrum Jay Heiser
Top Trends in Security Peter Firstbrook
Seven Principles of a CARTA Approach and Implications for Your Security Organization Neil McDonald
How to Be a Cloud Security Guru Steve Riley
Alexa, Investigate This Incident Agusto Barros
Five Questions on AI That CISOs Should Answer Jeremy D’Hoinne
GDPR the Day After: 3 Myths and 6 Key Capabilities Discussed Nader Henein
Pragmatic Steps for a Successful Security Strategy Rob McMillan
The Outlook for Security Talent Sam Olyae
Office 365 Security: All the Acronyms and Third-Party Solutions Explained Patrick Hevesi
How to Hunt for Security Threats Anton Chuvakin
The Walking Dead: Lay Passwords to Rest Ant Allan
State of Organizational Resilience Roberta Witty and David Gregory
Security Architecture for Digital Business — Best Practices Tom Scholtz
Top 10 Security Projects for Security and Risk Management Organizations Neil MacDonald
Security Strategies and Architecture for Hybrid Data Center Infrastructures Neil McDonald
Beyond Detection: 5 Core Security Patterns to Prevent Highly Evasive Threats Mario de Boer
Forget Next-Gen: Let’s Talk About Endpoint Protection Ian McShane
How Integrated Risk Management Fits Into a Business Risk Solution Stack John Wheeler
What Your Board Wants to Know Rob McMillan
Seven Reasons More CEOs Will Be Fired Over Cybersecurity Breaches and How to Ensure Yours Is Not Next Paul Proctor
CASB = (UEBA + DLP + AAC + TI + TP + SIEM) for SaaS and IaaS Patrick Hevesi
How Midsize Enterprises Can Improve Their Detection and Response Capabilities Toby Bussa
Define Your Mobile Application Security Strategy Dionisio Zumerle
Selecting a Risk Assessment Process for Digital Business Needs Earl Perkins
Know Your Risk Appetite or Fail at Risk Management!Jeffrey Wheatman
What CISOs Need to Know About Blockchain David Anthony Mahdi
Magic Quadrant for Cloud Access Security Brokers Steve Riley
How to Use the New Threat Simulation Tools Anton Chuvakin
The Emergence of Digital Risk Management Elizabeth Kim
The CIO Agenda: A Security Outlook Rob McMillan
Don't Make These 5 Security Policy Writing Mistakes Sam Olyaei
Agenda as of 21 May 2018 and subject to change.
Whenattendingthisevent,pleaserefertotheGartnerEventsmobile app for the most up-to-date session and location information
Plan your experience
Who Should Attend • ChiefInformationSecurityOfficers(CISOs)
• ChiefRiskOfficers,ChiefPrivacyOfficers
• SecurityLeadersandArchitects
• BusinessContinuityandDisaster RecoveryLeaders
5
Expert Advice
AsktheAnalystsessions* Attendeeshavetheopportunityto“asktheanalyst”questionsonhottopicsin these small group, interactive Q&A sessions.
Analystone-on-onemeetings* Onecomplimentary30minutemeetingwith Gartner analyst of your choice help youdrillintoyourspecificchallengesandquestions.
Workshops* Small-scaleandinteractive;drilldownonspecifictopicswithahow-tofocus.
* Space is limited and open to end-users only. Preregistration is required.
Peer Perspectives
Meet ups Interactive and self-facilitated small group discussions for end-user attendees to build relationships and gainnewperspectives.JoinaMeetuptoseekpeeradvice,aswellasshareyour own.
CISOCircle** CreatedexclusivelyforCISOs,theGartnerCISOCirclebringstogethertheworld’ssecurityandriskleaderstoshare in thought-leading discussions. TheCISOCircleprovidesanenhancedexperiencethroughexclusivecutting-edgeresearchandnetworkingopportunities.Participantswillhavethe chance to form valuable peer connections,honetheirleadershipskills,and understand how to best advance business objectives with successful security innovation.
End-usercasestudies Learn about recent implementations firsthand,withanopportunityforQ&AswiththeITandbusinessexecutivesleading the initiative.
** Application to participate and prequalification required.
KeynotesGartnerOpeningKeynote:ScalingTrustandResilience—CuttheNoiseandEnableAction Constantchangeinthethreatlandscapeandcompliancerequirementspresentdailychallengesthatcanfeeloverwhelming.Scalingsecuritywhenfacingafast-pacedITinnovationlandscapeinvolveschoices,oftenattheexpenseofbuildingtrustandresilience.Threekeyquestionsdrivestrongdecisionmaking:What’s important, what’s dangerous and what’s real? This session presents scenarios to demonstrate that ruthless prioritization in the answers helps us cut through the noise and enablesactionthatchangesouroutlookfromoverwhelmedto empowered.
Patrick Hevesi Research Director
Ian McShane Research Director
Steve Riley Research Director
OpeningGuestKeynote:LessonsfromHackersontheFutureofCyberSecurity Cybersecurityisnolongeronlyaboutprotectingsecrets.It’saboutourwayoflife:fromautonomouscars,towebcamsandmedical devices, to the manipulation of political campaigns and globalmarkets.Inthiskeynote,cybersecurityexpertKerenElezariwillshedlightonemergingsecuritythreatsandinspireyoutotakeactionwithpracticalideasonhowtomakeadifferenceinyourorganization – and what you can learn from, and how you can workwith,friendlyhackers.Kerenwilldiscussthefutureworkforceand business challenges in this space and how to foster more diversity in cyber security.
Keren Elezari Acclaimed security researcher, author and strategic analyst
ClosingGuestKeynote:DecisionMakingUnderPressure
Pierluigi Collina The World’s Greatest Football Referee
Visit gartner.com/eu/security for updates and to register!
Gartner Security & Risk Management Summit 2018#GartnerSEC6
Solution ShowcaseDevelop a “shortlist” of technology providers who can meet your particular needs. Weofferyouexclusiveaccesstosomeoftheworld’sleadingtechnologyandservicesolutionproviders.
Darktrace is the world’s leading AI company for cyber security. Created by mathematicians, the Enterprise Immune System uses machine learning and AI algorithms to detect and respond to cyber-threats across diverse digital environments, including cloud and virtualized networks, IoT and industrial control systems. The technology is self-learning and requires no set-up, identifying threats in real time, including zero-days, insiders and stealthy, silent attackers. Darktrace is headquartered in San Francisco and Cambridge, UK, and has 30 offices worldwide.www.darktrace.com
Forcepoint is the global human-centric cybersecurity company transforming the digital enterprise by continuously adapting security response to the dynamic risk posed by individual users and machines. The Forcepoint Human Point system delivers Risk-Adaptive Protection to continuously ensure trusted use of data and systems. Based in Austin, Texas, Forcepoint protects the human point for thousands of enterprise and government customers in more than 150 countries. www.forcepoint.com
Google Cloud’s platform is designed, built, and operated with security at its core. Companies come to Google Cloud to transform their businesses and achieve goals they never thought possible. Our comprehensive portfolio – from infrastructure to apps to devices – helps enterprises innovate faster, scale smarter, stay secure, and do more with data than ever before.https://cloud.google.com/
As the world’s largest and most trusted cloud delivery platform, Akamai makes it easier for its customers to provide the best and most secure digital experiences on any device, anytime, anywhere. Akamai’s massively distributed platform is unparalleled in scale, giving customers superior performance and threat protection.www.akamai.com
For three decades, F-Secure has driven innovations in cyber security, defending tens of thousands of companies and millions of people. With unsurpassed experience in endpoint protection as well as detection and response, F-Secure shields enterprises and consumers against everything from advanced cyber attacks and data breaches to widespread ransomware infections.www.f-secure.com/en/web/business_global/home
ServiceNow Security Operations is an Enterprise Security Response engine offering incident & vulnerability response, configuration compliance, and threat intelligence. It uses intelligent workflows, automation and orchestration, connected deeply with IT. ServiceNow GRC transforms inefficient processes into a unified GRC program. Through continuous monitoring, prioritization and automation you can identify and respond to business risks in real time. www.servicenow.com
VMware software powers the world’s complex digital infrastructure. The company’s compute, cloud, mobility, networking and security offerings provide a dynamic, efficient digital foundation to over 500,000 customers globally, aided by an ecosystem of 75,000 partners. Headquartered in Palo Alto, California, this year VMware celebrates twenty years of breakthrough innovation. www.vmware.com
HCL’s Cybersecurity & GRC is a dedicated line of business under HCL Technologies. We leverage 20+ years of experience to design and implement industry-tailored solutions to manage cybersecurity & risk for our customers. Our solutions address the overall ecosystem covering end-customers, as well as business partners.www.hcltech.com
Splunk Inc. (NASDAQ: SPLK) turns machine data into answers. Organizations use market-leading Splunk solutions with machine learning to solve their toughest IT, Internet of Things and security challenges. Join millions of passionate users and discover your “aha” moment with Splunk today: www.splunk.com. www.splunk.com
Netskope is the leader in cloud security. We help the world’s largest organizations take advantage of cloud and web without sacrificing security. Our patented Cloud XD technology targets and controls activities across any cloud service or website and customers get 360-degree data and threat protection that works everywhere. We call this smart cloud security.www.netskope.com
The Trustonic Application Protection solution helps enterprises to secure their apps, code, keys and data with best- available on-device protection. Automatically using hardware-backed protection on over 1.5bn devices, or software-based protection on the others. Trustonic embeds hardware-backed security into Android handsets from 9 of the top 10 device manufacturers. www.trustonic.com
OneTrust is a global leader in privacy management software used by more than 1,500 organizations to comply with data privacy regulations, including the EU GDPR. Our integrated platform includes readiness assessments, PIA/DPIA and data mapping automation, EU cookie compliance, subject rights and consent management, incident reporting, and vendor risk management.www.onetrust.com
Trustwave helps businesses fight cybercrime, protect data and reduce security risk. With cloud and managed security services, integrated technologies and a team of security experts, ethical hackers and researchers, Trustwave enables businesses to transform the way they manage their information security and compliance programs. More than three million businesses are enrolled in the Trustwave TrustKeeper® cloud platform, through which Trustwave delivers automated, efficient and cost-effective threat, vulnerability and compliance management. Trustwave is headquartered in Chicago, with customers in 96 countries.www.trustwave.com
Carbon Black is a leading provider of next-generation endpoint security, helping stop the most sophisticated cyber threats through big data and analytics in the cloud. The company serves more than 3,700 customers globally, including 30 of the Fortune 100. Learn more at www.carbonblack.com or Twitter (@CarbonBlack_Inc).www.carbonblack.com
Cybereason gives your company the upper hand by taking an entirely new approach to cybersecurity. The world’s most powerful cybersecurity analytics platform analyzes more data, more deeply, than anyone else to give unprecedented threat visibility. The platform delivers EDR, next-gen antivirus, anti-ransomware, fileless malware protection all powered by an automated AI hunting engine.www.cybereason.com
ESET provides multi-layered IT security solutions to enterprises worldwide. We have been pioneering digital protection since 1987, and protect more than 100 million users globally.www.eset.com/int
Premier
Platinum
Gartner Predicts: By 2020, national authorities in the U.K. and U.S. will have established databases and policies for mandatory capture of information related to breaches.
NTT Security is the specialized security company and the center of excellence in security for NTT Group. With embedded security we enable NTT Group companies (Dimension Data, NTT Communications and NTT DATA) to deliver resilient business solutions for clients’ digital transformation needs. NTT Security has 10 SOCs, seven R&D centers, over 1,500 security experts and handles hundreds of thousands of security incidents annually across six continents. NTT Security ensures that resources are used effectively by delivering the right mix of Managed Security Services, Security Consulting Services and Security Technology for NTT Group companies – making best use of local resources and leveraging our global capabilities. NTT Security is part of the NTT Group (Nippon Telegraph and Telephone Corporation), one of the largest ICT companies in the world. www.nttsecurity.com
Visit gartner.com/eu/security for updates and to register! 7
Sponsorship opportunitiesForfurtherinformationaboutsponsoringthisevent: Telephone:+44 1784 267456 / Email:[email protected]
Exhibitor list as of 21 May 2018 and subject to change
SecurityScorecard is an ecosystem risk management solution that enables security professionals to instantly rate and understand the security risk of any company. The platform identifies vulnerabilities, active exploits, and advanced threats in your vendor and partner ecosystem as well as your own IT infrastructure.https://securityscorecard.com/
Symantec Corporation (NASDAQ: SYMC), the world’s leading cyber security company, helps businesses, governments and people secure their most important data wherever it lives. Organizations across the world look to Symantec for strategic, integrated solutions to defend against sophisticated attacks across endpoints, cloud and infrastructure. Symantec operates one of the world’s largest civilian cyber intelligence networks, allowing it to see and protect against the most advanced threats. For additional information, please visit www.symantec.com or connect with us on Facebook, Twitter, and LinkedIn. www.symantec.com
Trend Micro Incorporated, a global leader in cybersecurity solutions, helps to make the world safe for exchanging digital information. Our innovative solutions for consumers, businesses, and governments provide layered security for data centers, cloud environments, networks, and endpoints. With over 5,000 employees in over 50 countries and the world’s most advanced global threat intelligence, Trend Micro enables organizations to secure their journey to the cloud.www.trendmicro.com
Vectra® is transforming cybersecurity with AI. Its Cognito™ platform automates cyberattack detection and response from data centre and cloud workloads to user and IoT devices. Cognito performs real-time attack hunting by analysing rich metadata from network traffic, relevant logs and cloud events to detect attacker behaviours. Cognito correlates threats, prioritises hosts based on risk and provides rich context to empower response with existing endpoint, NAC and firewall security, reducing security operations workload by 32X.www.vectra.ai
Discovery, mapping and remediation of data privacy risk in unstructured data, at scale, for GDPR and other regulatory compliance and in response to data breach. www.activenavigation.com
KnowBe4 is the world’s largest integrated platform for security awareness training and simulated phishing. Creating a human firewall as an effective last line of defense. www.KnowBe4.com
CrowdStrike cloud-delivered next-generation endpoint protection, managed hunting and cyber intelligence services offer protection and visibility into threats you had no idea were there.www.crowdstrike.com
SAI Global helps organizations proactively manage risk to create trust and achieve business excellence, growth, and sustainability. Our integrated risk management solutions operate across the entire risk lifecycle allowing businesses to focus elsewhere.www.saiglobal.com
Wombat Security provides information security awareness and training software to help organizations teach their employees secure behavior. www.wombatsecurity.com
Avecto is a leader in Privilege Elevation and Delegation Management and has enabled over 8 million users across many of the world’s biggest brands to successfully work without admin rights and achieve the balance between overlocked and underlocked environments. www.avecto.com
Unified simplicity in a complex world. Unified SIEM solution for cybersecurity, compliance and IT operations in one simple deployment.www.logpoint.com
Flexera enables prioritization and optimization of processes for managing software vulnerabilities to mitigate exposures, before the likelihood of exploitation increases. Flexera protects businesses by closing the risk window. www.flexera.com
Saviynt is a leading provider of Identity Governance & Administration (IGA) and Cloud Security solutions. Saviynt enables enterprises to secure applications, data and infrastructure in a single platform for Cloud and Enterprise applications. www.saviynt.com
Yubico sets new global standards for simple and secure access to computers, servers, and internet accounts. www.yubico.com
Bitglass the Next-Gen CASB company is based in Silicon Valley. The company’s solutions deliver zero-day, agentless, data and threat protection for any app, any device, anywhere. Bitglass is backed by Tier 1 investors and was founded in 2013 by industry veterans with a track record of innovation.www.bitglass.com
McAfee is the device-to-cloud cybersecurity company. Inspired by the power of working together, McAfee creates business and consumer solutions that make our world a safer place.www.mcafee.com
Gigamon is the company driving the convergence of networking and security. We provide a new way of approaching security – of making threats visible, deploying resources faster and maximizing the performance of your network and your security tools. www.gigamon.com
SureCloud provides Governance, Risk & Compliance (GRC) applications and Cybersecurity services that give our customers certainty – of risk management/compliance, of cybersecurity, of having answers today and tomorrow. www.surecloud.com
comforte is a leading provider of data tokenization & encryption and enables organizations around the world to keep their sensitive data secure and protected. www.comforte.com
The leading Insider Threat Management solution with 1,700+ global customers across all major verticals, ObserveIT is the only solution that empowers security teams to detect insider threats, streamline investigations, and prevent data exfiltration. observeIT.com
Integrity delivers worldwide innovative Persistent PenTesting and Governance, Risk and Compliance Solutions to enable clients to limit cyber risk exposure through cost-effective prevention.www.integrity.pt
Varonis is a pioneer in data security and analytics, specializing in software for data security, governance, compliance, classification, and threat analytics. www.varonis.com
Premier
Platinum Silver
Summit venue
InterContinentalLondon—TheO2 London,UK.
Phone:+442037405411
©2018Gartner,Inc.and/oritsaffiliates.Allrightsreserved.GartnerisaregisteredtrademarkofGartner,Inc.oritsaffiliates.Formoreinformation,[email protected].
Terms and conditions To view our Gartner events terms and conditions, visit gartner.com/eu/security
Gartner Security & Risk Management Summit 201810–11September / London,U.K. / gartner.com/eu/security
Pricing & RegistrationEarly-bird discount Early-birdprice:€2,375+U.K.VAT
Save€325whenyouregisterby13July
Standardprice:€2,700+U.K.VAT
Publicsectorprice:€2,125+U.K.VAT
3 ways to register Web: gartner.com/eu/security
Email: [email protected]
Phone: +442038685238
Gartner clients AGartnerticketcoversbothdaysoftheSummit.ContactyourAccountManageror email [email protected].
Bring your team!Maximizelearningbyparticipatingtogetherinrelevantsessionsorsplittinguptocovermoreground,sharingyoursessiontake-awayslater.
SummitTeamDiscountOffers:
•4forthepriceof3
•7forthepriceof5
•10forthepriceof7
Formoreinformation,emailGartnerGlobalEvents@gartner.comorcontactyourGartnerAccountManager.
Gartner Predicts By 2022, cybersecurity ratings will
become as important as credit ratings when assessing the risk of
business relationships
Joinanexclusivenetwork–Register now and join!
TheCISOCircleprovideschiefinformation security officers (CISOs) and
other senior-level executives attending the Summit an enhanced experience through exclusive sessions. Participants have the chance to form valuable peer connections, hone their leadership skills and understand how to best advance businessobjectiveswithsuccessfulITinnovation.
CISO Circle highlights
• CISO-onlysessions
• Exclusivenetworkinglunch
• Prioritybookingfor1on1sandlimitedattendancesessions
Discussion topics include: • Lessonslearnedfromhighprofilebreaches
• ReportingonDigitalBusinessRisktotheBoard
• Howtobettercommunicatethevalueofyoursecurityandriskmanagementinitiatives
•WritingITRiskandCybersecurityServiceDescriptionsWithBusiness-CentricValueStatements
Join the CISO CircleTojointheCISOCircle,simplysubmityourapplicationwhenyouregistertoattendtheGartnerSecurity&RiskManagementSummit.Membershipislimited,sobesuretosecureyourplace as soon as possible.
(Exclusive to end-user organizations only. Vendors of IT security products and services cannot attend).
CISO Circle*