Register

1
2

We will focus on disruptive technologies and innovative solutions to some of the biggest problems in IT, Data and Security.

The Technology Leaders Club will be the best source of news, peer-on-peer learning, technology reviews, networking events, exclusive content and our "60-second leaders interviews"

GDPR isn't just about compliance but gives us an opportunity to create new business models and new markets
Tim Grieveson, UK CISO Summit advisory board council

Events

View All

Transform Your Security Operations to Defend Against Today’s Threats

As organizations increasingly digitize their operations, there is a growing interest in understanding the emerging exposure to risk and enabling a more efficient and effective approach to protecting security operations. This roundtable will explore how organizations transform their security operations with automation while continuously assessing their risk through integrating attacker insights and intelligence to increase their threat visibility and proactively defend against threats.

View More

Transform Your Security Operations to Defend Against the Expanding Digital Threats

As organizations increasingly digitize their operations, there is a growing interest in understanding the emerging exposure to risk and enabling a more efficient and effective approach to protecting security operations. Digitization moves fast, enabling businesses to expand and create new opportunities for growth. With that comes opportunities for attackers who move equally as fast to exploit and monetize your growing attack surface. This roundtable will explore how organizations transform their security operations and keep pace with automation while continuously assessing their risk through integrating attacker insights and intelligence to increase their threat visibility and proactively defend against threats.

View More

Are your users your biggest threat or your greatest asset for information security?

This session will investigate whether your users are helping, or hindering, your efforts to improve information security within your organisation. We will consider the effective approaches you have seen help your users to identify sensitive data, and understand how to protect it, within the flow of day-to-day work, while moving on to discuss the successful, and not so successful, ways you can improve.

View More

Embedding the Attacker’s Perspective: An Inside Look Into How Hackers Prioritize Targets at Scale

Join us for an exciting session that dives into the fast-paced world of offensive security. It’s clear that attackers and defenders often come to dramatically different conclusions around risk - even when looking at the same information. In this session, veteran red teamer, Evan Anderson will pull back the curtain to show you how to discover exposures before attackers do.

View More

White Papers

View All

Deploying, securing, and connecting apps across hybrid clouds

View More

If it isn’t actionable, does it even matter?

View More

Ransomware: Are Your Defenders Keeping Up With The Extortionists?

View More

Choosing the Right Email Security Platform

View More

Recent Interviews

View All

Register

Become part of the Technology Leaders Club receive exclusive content and invitations to the latest gatherings.

Click here to Register