Register

1
2

We will focus on disruptive technologies and innovative solutions to some of the biggest problems in IT, Data and Security.

The Technology Leaders Club will be the best source of news, peer-on-peer learning, technology reviews, networking events, exclusive content and our "60-second leaders interviews"

When a CISO's time is valuable, one must choose which events to attend - Technology Leaders Club events are always topical and a valuable learning experience
Mark Nicholls, CISO, Chime

Events

View All

Threat Detection & Response Lessons Learned

Detecting and responding to threats is the primary objective of your security operations program - and the best way to improve threat detection and response while running your teams at peak efficiency is to learn from the experience of other security leaders.

View More

Customer IAM: From Myths to Mastery

Customer identity is a hidden danger lurking in every application. Done well, it just works. Done poorly it frustrates your users, gets complicated as you consider policies and regulations, and doesn’t effectively protect your customers or your organization. Unfortunately, the line between “done well” and “done poorly” is thin, hard to detect, and better described using hieroglyphics and 6-dimensional space. Regardless of the complexity, we know that a seamless but secure customer experience makes happy customers who visit more often and do more with us each time.

View More

How leaders are taking advantage of new opportunities to manage risk, control costs and streamline efficiencies

Organizations are looking for new ways to combat rising costs, surging parcel volume and growing complexity. While you cannot control rate and fee increases, you can find new and surprising ways to save on operational costs. Learn how your peers are managing everything from sending and receiving to cash flow management, operational efficiency and more.

View More

Mitigating Digital Supply Chain Risk in the Extended Salesforce Environment

The digital supply chain offers unparalleled flexibility and freedom, enabling organizations to rapidly acquire new capabilities and seize opportunities. But it also comes at the cost of increased cyber risk exposure. Attacking third party connections such as Salesforce and its many integrations enables cyber criminals to bypass security defenses and potentially strike at the heart of an organization’s network.

View More

White Papers

View All

An authentication authority for a centralised and trusted single source of identity

View More

Modern DLP – Why Traditional Approaches Won’t Solve Your Insider Threat Problem | Part 2

View More

How the Parcel Surge Impacts Your Business

View More

Cyberattacks are on the rise, are you ready to recover maliciously compromised data?

View More

Recent Interviews

View All

Register

Become part of the Technology Leaders Club receive exclusive content and invitations to the latest gatherings.

Click here to Register