Register

1
2

Events

July 2022
01

TLC Connect - Security Series

TLC Connect is a new series of highly focused and engaging networking events for the Technology Leaders Club community. This event will provide an intimate environment for likeminded executives and technology providers to network and work together to solve common challenges across their businesses. Join this event and network with other CISOs, VPs, Directors, and Heads of Security from our Technology Leaders Club community.

View More

How shipping leaders are taking advantage of new opportunities to manage risk, control costs and streamline efficiencies

Organizations are looking for new ways to combat rising costs, surging parcel volume and growing complexity. While you cannot control rate and fee increases, you can find new and surprising ways to save on operational costs. Learn how your peers are managing everything from sending and receiving to cash flow management, operational efficiency and more.

View More

Cyber resilience: How to prevent, protect and recover from Ransomware

Every 11 seconds a company is hit by ransomware. New threats, paired with data living in more places than ever before, requires businesses of all sizes to develop robust resilience strategies. Join us for this private, closed-door virtual roundtable where we will be taking a deeper look at cyber resilience.

View More

How do we stop attacks before they stop us?

The risk isn’t of “having a security incident” its about handling it in a calm, collected, and methodological manner so a small incident doesn’t turn into a major one. Or worst case, a major one is identified and mitigated in minutes, as opposed to days. This sort of reinforces the “there is no real ROI” argument, as a motivated threat actor will not give up just because they were stopped once.

View More

Transformez vos opérations commerciales en dynamisant les processus de génération de revenus

Comment des processus plus automatisés, intégrés et intelligents peuvent-ils vous assurer de maximiser les revenus dans chaque opportunité ?

View More

The Branch Of One - Delivering optimal digital experience to a hybrid workforce

Research shows that 35%-38% of organisations will continue to have more than half of their staff working remotely. This new reality has given birth to a new remote working concept "The Branch Of One". Businesses need to adapt their IT services from traditional corporate network to remotely manage user experience across an ecosystem of connectivity, infrastructure and applications.

View More

How shipping leaders are taking advantage of new opportunities to manage risk, control costs and streamline efficiencies

Organizations are looking for new ways to combat rising costs, surging parcel volume and growing complexity. While you cannot control rate and fee increases, you can find new and surprising ways to save on operational costs. Learn how your peers are managing everything from sending and receiving to cash flow management, operational efficiency and more.

View More

How do we stop attacks before they stop us?

The risk isn’t of “having a security incident” its about handling it in a calm, collected, and methodological manner so a small incident doesn’t turn into a major one. Or worst case, a major one is identified and mitigated in minutes, as opposed to days. This sort of reinforces the “there is no real ROI” argument, as a motivated threat actor will not give up just because they were stopped once.

View More

Key Considerations for Choosing the Right Email Security Platform

Email is both a necessary communication medium, and the most vulnerable area for an attack. Year after year, adversaries find success in abusing email to gain a foothold into an organization—deploying malware, leaking valuable data, or stealing millions of dollars. Does that mean email is doomed, and we should give up? Quite the opposite—instead, we should look to newer technologies and an integrated security strategy that provides a modernized approach to email defense.

View More

Leave no-one behind: how to unlock your entire digital ecosystem

When you have data entered once and then connected safely, securely and quickly everywhere - that is real smart “integration”. The reality is that integration is the perfect foundation for Integrated Experiences but it is not enough. Data readiness, user engagement, and the unified platform are critical to delivering an Integrated Experience. The winners are building a modern tapestry of integrated experiences.

View More

The realities of innovating in the cloud

In 2022 “Digital Transformation” means move to the cloud, some of us have been “doin’ it for years”, others are enjoying the acceleration brought about by the WFH revolution. Be agile, be resilient, be innovative. Join us at this private, behind closed doors round table discussion, where we bring you together with a careful selected group of your peers to talk about what works and what to avoid when setting out to innovate in the cloud.

View More

How To Futureproof Your Automotive IoT Security

IoT in the automotive sector is a rapidly evolving industry, from the connected vehicles themselves to the engines, telematics and the surrounding infrastructure and therefore the security threat landscape is also changing. Developments such as V2X and new regulations including WP29 all bring new demands on the security measures surrounding connected vehicles – during this roundtable we will look at the issues and trends facing the sector and how to prepare for them.

View More

Ransomware: the extortionists have upped their game, are your defenders keeping up?

The last couple of years have forced many businesses to reinvigorate or kick start their digital transformations and cloud adoptions. New approaches and new solutions require new ways of working. The new ways do not appear to be keeping the attackers out, but they can help us better prepare, respond, and recover if we fall victim.

View More

The Future of Data & AI | Monetizing the Data Explosion

Data has become the essential resource to every organization’s success. In fact, businesses that are able to effectively manage and commercialize their data will emerge as leaders in the post-pandemic world. Organizations need to ensure that they are using the right data for the intended business outcomes. But what happens when you are able to actually get control of all your data and package it up to monetize it?

View More

The Future of Data & AI

Data has become the critical resource for the success of any organization. Indeed, companies that can effectively manage and market their data will emerge as leaders in the post-pandemic world. Additionally, organizations need to ensure that they're using the right data to drive the business results they want, but what happens when you're able to take control of all the data and package it to monetize it?

View More

Gaining freedom from control

Our world has changed. The relationship between life and work has become irreversibly blurred. Today, digital information moves without boundaries or limits. It means that a corporate data breach one moment can disrupt an individual’s life the next. Of course, this new reality is driven by technology: devices, clouds, networks, applications. But it’s also driven by human nature. Just as the speed of change and innovation will only increase exponentially, the human need for freedom and mobility will only become more pressing.

View More

Preventing Fraud in a Card Not Present world

Digital payments transaction volumes continue to grow and, as a result, so do the losses that stem from fraud. Consumer appetite for card-not-present (CNP) transactions and payment options like Buy-Now-Pay-Later (BNPL) are growing stronger but risks abound and, according to Aite-Novarica Group, CNP fraud alone topped $15 billion this past year. As the adoption of digital payments continues to climb, cybercriminals are rapidly adapting their attack methodologies to avoid detection and maximize profits.

View More

TLC Connect - Data and Information Technology Series

TLC Connect is a new series of highly focused and engaging networking events for the Technology Leaders Club community. This event will provide an intimate environment for likeminded executives and technology providers to network and work together to solve common challenges across their businesses. Join this event and network with other CDOs, CIOs, CTOs, VPs, and Heads of Data, Technology and Analytics leaders.

View More

Leave no-one behind: how to unlock your entire digital ecosystem

When you have data entered once and then connected safely, securely and quickly everywhere - that is real smart “integration”. The reality is that integration is the perfect foundation for Integrated Experiences but it is not enough. Data readiness, user engagement, and the unified platform are critical to delivering an Integrated Experience. The winners are building a modern tapestry of integrated experiences.

View More

What Brands Get Wrong About Customer Authentication

Customer authentication is a critical component of almost every app that exists, because it serves as a product gateway impacting 100% of customers. It’s not easy to get right, and the stakes for getting it right are higher than ever: 46% of customers abandon a transaction because of authentication, and account takeover fraud increased by 292% in 2020.

View More

Leave no-one behind: how to unlock your entire digital ecosystem

When you have data entered once and then connected safely, securely and quickly everywhere - that is real smart “integration”. The reality is that integration is the perfect foundation for Integrated Experiences but it is not enough. Data readiness, user engagement, and the unified platform are critical to delivering an Integrated Experience. The winners are building a modern tapestry of integrated experiences.

View More

The Road to Modern Selling: How to Win Over Today’s B2B Buying Teams

B2B buyers have shifted how they buy. Old-school tactics like scripted sales pitches and cold calls just don’t cut it anymore. Today’s digital-first buyers are more informed than ever and are looking for a collaborative buying experience that puts them in the driver's seat. Transform your sales strategy to stop chasing after buyers and start making it easy for them to buy from you.

View More

Re-Architecting the Enterprise: The Role of Apache Kafka® and Data in Motion

The recent revolution in data infrastructure and application architecture has transformed the way all kinds of organisations, from the traditional to the digital native, work with data. But to truly take advantage of data in motion as the most strategic platform within your company, it must move from the domain of one-off engineering initiatives into a central nervous system for the enterprise. Transformation requires a thoughtful strategy that drives the re-architecting of the enterprise. By joining this one-of-a-kind round table you will learn how market-leading companies are using data in motion to transform business practices and which use cases they are putting into practice.

View More

Cyber resilience: How to prevent, protect and recover from Ransomware

Every 11 seconds a company is hit by ransomware. New threats, paired with data living in more places than ever before, requires businesses of all sizes to develop robust resilience strategies. Join us for this private, closed-door virtual roundtable where we will be taking a deeper look at cyber resilience.

View More

How has the world of hybrid work impacted your joiners, movers, leavers (JML)?

Join us and a small group of industry peers in a behind closed doors frank and open discussion of the highs and lows of JML automation, the policies and processes to reduce risk, reduce cost and stay compliant.

View More

Reducing Business Risk: Securing Privileged Access and Implementing a Zero Trust Strategy

Join our CISO roundtable as we discuss how to make Zero-Trust work for you. We will cover the techniques used to protect Privileged Accounts, how to make Cloud Transformations secure, and the key elements behind Identity Management. Reduce business risk and maintain productivity by increasing your security posture.

View More

An authentication authority for a centralized and trusted single source of identity

Digital transformation is accelerating in every industry as organizations of all sizes fight for market share. Yet many digital transformation initiatives fail to deliver the intended results. Why? Because most existing identity and access management (IAM) systems aren’t able to support the requirements of a digital-first enterprise.

View More

How To Achieve Best In Class Device Identity Security and Ensure SBoM Readiness

Whether it’s legacy devices or next gen machines, automating identity management throughout the device lifecycle is vital. Without it, you cannot have the device or data trust necessary for complete safety and security. We will discuss best practice ways to manage this, examine use cases in more detail, and look at what you need to do to comply with the upcoming Software Bill of Materials.

View More

Building Trusted Digital Experiences: What is shaping the future for your customers’ expectations?

Join us and a small group of industry peers in a behind closed doors frank and open discussion of how identity is the cornerstone of a trusted digital experience for your customers.

View More

Passwordless customer authentication: Reduce friction and increase security

With the explosion of consumers transacting online and accelerated digital transformation, companies are trying to keep up with modern experiences, infrastructure, and products to serve their digital user base. Businesses have adapted with millions moving to or accelerating investments in a digital model. But as more people move digital, what’s been the impact on the consumer?

View More

An authentication authority for a centralized and trusted single source of identity

Digital transformation is accelerating in every industry as organizations of all sizes fight for market share. Yet many digital transformation initiatives fail to deliver the intended results. Why? Because most existing identity and access management (IAM) systems aren’t able to support the requirements of a digital-first enterprise.

View More

CIAM: Increasing Online Security and Customer Experience with Identity

Join Ping Identity and Synetis for this virtual roundtable and learn how to manage the identity of millions of customers to accelerate your revenue and retain your customers.

View More

Modern DLP – Why Traditional Approaches Won’t Solve Your Insider Threat Problem

Join us and a specially selected group of your peers in an open discussion about how DLP can be introduced without the usual friction with the business and how contextual classification with granular controls can get an effective DLP solution operational quickly.

View More

The Road to Modern Selling: How to Win Over Today’s B2B Buying Teams

B2B buyers have shifted how they buy. Old-school tactics like scripted sales pitches and cold calls just don’t cut it anymore. Today’s digital-first buyers are more informed than ever and are looking for a collaborative buying experience that puts them in the driver's seat. Transform your sales strategy to stop chasing after buyers and start making it easy for them to buy from you.

View More

Insurance: Using text analytics and automation as a competitive advantage

Language is central to how we all do business. It shapes, processes and impacts how we communicate with our customers. This is particularly true for the insurance industry where more than 80% of data is unstructured. To stay ahead of the competition, and keep customers satisfied, your business needs to know how to get value from language data available in underwriting, risk management, claims, customer interactions, etc. In this 90-minute virtual roundtable, we will bring together a select group of your peers to discuss some of the key issues data leaders face today.

View More

Your Role in Securing Data in Cloud Applications

Join this private, closed-door session where we will discuss how to enhance your approach to securing data in cloud applications, using Salesforce as an example.

View More

How has the world of hybrid work impacted your joiners, movers, leavers (JML)?

Join us and a small group of industry peers in a behind closed doors frank and open discussion of the highs and lows of JML automation, the policies and processes to reduce risk, reduce cost and stay compliant.

View More

Merging Zero Trust and SASE

Organizations are feeling a shift in the world of networking and security as they rapidly adopt and embrace the cloud. Enterprises need efficiency, visibility and security without compromise. The secure access service edge, better known as SASE, and zero trust implementations can provide a more comprehensive security capability to truly support digital transformation.

View More

Your Role in Securing Data in Cloud Applications

The rapid and continuous adoption of cloud applications has been pivotal for digital transformation initiatives and enabling global workforces. Their importance to an organization, also makes cloud applications primary targets of cyber criminals to gain illegitimate access to companies’ data and networks. Join this private, closed-door session where we will discuss how to enhance your approach to securing data in cloud applications, using Salesforce as an example.

View More

Cyberattacks are on the rise, are you ready to recover maliciously compromised data?

Few traditional disaster recovery programs are designed for recovery from a data compromising cyberattack. Without focused discussions, detailed planning, backup solution enhancement, cyber recovery tests and exercises, and a comprehensive data recovery program; you are putting your business at unnecessary risk to IT service delivery.

View More

Investing in real-time data - how to better understand the benefits, costs, and risks

Join us on April 27th for this virtual roundtable in partnership with Dataminr, where we will discuss how access to early signals of high-impact events and emerging risks can benefit your people and assets and save your organisation time and money when it matters most.

View More

Leave no-one behind: how to unlock your entire digital ecosystem

When you have data entered once and then connected safely, securely and quickly everywhere - that is real smart “integration”. The reality is that integration is the perfect foundation for Integrated Experiences but it is not enough. Data readiness, user engagement, and the unified platform are critical to delivering an Integrated Experience. The winners are building a modern tapestry of integrated experiences.

View More

Is a future without passwords realistic and secure?

Passwordless authentication is no longer a dream of the distant future. Leaving passwords behind is an important step towards better user experience and security, but how can it be implemented in a secure way?

View More

How the parcel surge impacts your business

The effects of protracted shipping delays and dramatic rate increases are being felt from the COO’s office to the shipping dock. Meet and discuss with your peers how macro shipping trends, general inflation, and labor pressures in both local and international trade have impacted business operations across industry. Now that the seasonal peak is behind us are you ready to rethink the shipping and mailing decisions we have to make?

View More

Passwordless customer authentication: Reduce friction and increase security

With the explosion of consumers transacting online and accelerated digital transformation, companies are trying to keep up with modern experiences, infrastructure, and products to serve their digital user base. Businesses have adapted with millions moving to or accelerating investments in a digital model. But as more people move digital, what’s been the impact on the consumer?

View More

What Brands Get Wrong About Customer Authentication

Customer authentication is a critical component of almost every app that exists, because it serves as a product gateway impacting 100% of customers. It’s not easy to get right, and the stakes for getting it right are higher than ever: 46% of customers abandon a transaction because of authentication, and account takeover fraud increased by 292% in 2020.

View More

Resilience and agility - it’s time your operating model had both

To thrive in an unpredictable post-pandemic global economy, businesses need to be smarter, faster and have more agility when it comes to their operations. They also need to be incredibly resilient, otherwise they won’t meet the demands of tomorrow’s customer. Data and visibility are at its core. This requires significant changes from the very top of an organisation.

View More

Merging Zero Trust and SASE

Organizations are feeling a shift in the world of networking and security as they rapidly adopt and embrace the cloud. Enterprises need efficiency, visibility and security without compromise. The secure access service edge, better known as SASE, and zero trust implementations can provide a more comprehensive security capability to truly support digital transformation.

View More

Cyber resilience: How to prevent, protect and recover from Ransomware

Every 11 seconds a company is hit by ransomware. New threats, paired with data living in more places than ever before, requires businesses of all sizes to develop robust resilience strategies. Join us for this private, closed-door virtual roundtable where we will be taking a deeper look at cyber resilience.

View More

Customer IAM: From Myths to Mastery

Customer identity is a hidden danger lurking in every application. Done well, it just works. Done poorly it frustrates your users, gets complicated as you consider policies and regulations, and doesn’t effectively protect your customers or your organization. Unfortunately, the line between “done well” and “done poorly” is thin, hard to detect, and better described using hieroglyphics and 6-dimensional space. Regardless of the complexity, we know that a seamless but secure customer experience makes happy customers who visit more often and do more with us each time. In this session, we’ll explore some of the background, myths, and approaches to customer identity.

View More

TLC TV Episode 5: Accelerating the Developer-First Security Movement

Let’s agree that DevOps is as much about practices, processes, mindset, and culture as it is about tools. And we still have a lot to learn and share, as a community. Join this next TLC TV Episode, as we bring Software Engineering teams and Security Leaders together to discuss how we accelerate the Developer-First Movement.

View More

Merging Zero Trust and SASE

Organizations are feeling a shift in the world of networking and security as they rapidly adopt and embrace the cloud. Enterprises need efficiency, visibility and security without compromise. The secure access service edge, better known as SASE, and zero trust implementations can provide a more comprehensive security capability to truly support digital transformation.

View More

Don’t underestimate the power of great CX – ensure agility, efficiency and compliance while putting the customer first

Recent studies have shown that the majority of companies believe they offer a superior customer experience (CX) to their competitors. In fact, Only 8% of customers actually believe they receive superior CX from companies. Increased regulations, staffing challenges, and higher consumer expectations are all contributing factors in the need for better, data driven, customer experience. For many customer facing organisations, customer retention, improving customer experience, and digital transformation are the top three strategic priorities related to “customer first” communications. In order to provide superior digital interactions that will enhance engagement and drive revenue, a new approach is needed for customer communications teams and customer communications technology.

View More

Don’t underestimate the power of great CX – ensure agility, efficiency and compliance while putting the customer first

Recent studies have shown that the majority of companies believe they offer a superior customer experience (CX) to their competitors. In fact, only 8% of customers actually believe they receive superior CX from companies. Increased regulations, staffing challenges, and higher consumer expectations are all contributing factors in the need for better, data driven, customer experience. For many customer facing organisations, customer retention, improving customer experience, and digital transformation are the top three strategic priorities related to “customer first” communications. In order to provide superior digital interactions that will enhance engagement and drive revenue, a new approach is needed for customer communications teams and customer communications technology.

View More

Reduce Business Risk: Securing Privileged Access and Implementing Zero Trust

Join our CISO roundtable as we discuss how to make Zero-Trust work for you. We will cover the techniques used to protect Privileged Accounts, how to make Cloud Transformations secure, and the key elements behind Identity Management. Reduce business risk and maintain productivity by increasing your security posture.

View More

Ransomware: the extortionists have upped their game, are your defenders keeping up?

The last couple of years have forced many businesses to reinvigorate or kick start their digital transformations and cloud adoptions. New approaches and new solutions require new ways of working. The new ways do not appear to be keeping the attackers out, but they can help us better prepare, respond, and recover if we fall victim.

View More

Reduce Business Risk: Securing Privileged Access and Implementing Zero Trust

Join our CISO roundtable as we discuss how to make Zero-Trust work for you. We will cover the techniques used to protect Privileged Accounts, how to make Cloud Transformations secure, and the key elements behind Identity Management. Reduce business risk and maintain productivity by increasing your security posture.

View More

The 2022 Spin on Ransomware, where is it heading?

2021 was the most active year for ransomware on record — and it’s showing no sign of slowing going into 2022. Over the past few years, we've seen ransomware operators evolve from disorganised splinter groups and individuals to highly sophisticated operations. Ransomware attacks will only continue to evolve, and so, therefore, do our defence mechanisms.

View More

Creating value from unstructured language data: Building better products with NLP

The language within your data assets provides a significant competitive advantage for your company. Unfortunately, too often this data remains an untapped gold mine as organizations lack the resources to fully leverage their language data in a scalable and consistent format. Advances in AI and natural language processing provide the keys to unlocking this data, providing deeper knowledge and insight to create more differentiated data products and improve audience engagement. The challenge is often knowing where to start and how to employ AI strategies to achieve real value. In this 90-minute virtual roundtable, we will bring together a select group of peers to discuss some of the key issues big data providers face today.

View More

Driving Your Competitive Advantage with Cloud-First Identity and Access Management

Many organisations are operating their IT environment in a hybrid state. While the cloud has allowed organisations to realize new levels of efficiency and ROI by leveraging modern approaches such as SaaS, a certain number of apps will likely remain on-premises for the foreseeable future. How can security and IT teams provide employees with a seamless, yet secure, experience as they need to access both SaaS and on-premises applications? How can organisations leverage a cloud-first approach to better manage their applications as well as identity and access management (IAM)? What are the best ways for organisations to leverage newer technologies to help scale their infrastructure to meet customer needs?

View More

Steps to Delivering Relevant, Resilient, and Reliable Digital Services

Both your internal and external customers want intuitive, reliable, secure, and ideally, always available digital services that make their lives easier. To meet these demands, service delivery teams must continually innovate, releasing features quickly and frequently. So how do you increase your development velocity while maintaining a fully available, disruption-free infrastructure? This balancing act between innovation and uptime can create a performance gap that puts your customer experience and business at risk. Instead of chasing five nines level perfection, organizations need to make their digital services resilient so they can release with confidence, knowing they can bounce back quickly no matter the disruption. Join us, as we discuss how to achieve digital service resiliency and deliver reliable customers experiences.

View More

Reduce Business Risk: Securing Privileged Access and Implementing Zero-Trust

Join our CISO roundtable as we discuss how to make Zero-Trust work for you. We will cover the techniques used to protect Privileged Accounts, how to make Cloud Transformations secure, and the key elements behind Identity Management. Reduce business risk and maintain productivity by increasing your security posture.

View More

Optimizing IT Compliance: Real-world Lessons in Embedding and Scaling an Effective Program

Are you frustrated with exhausting all your resources just to sustain your current IT compliance program? And is the outcome you’re achieving delivering the intended benefit to the wider organization? Join us at this closed-door, peer-led Virtual Roundtable for a candid discussion on optimizing IT compliance. Hear lessons learned from embedding and scaling an effective program and identify actions you can take to optimize your own program.

View More

Cyber resilience: How to prevent, protect and recover from Ransomware

Every 11 seconds a company is hit by ransomware. New threats, paired with data living in more places than ever before, requires businesses of all sizes to develop robust resilience strategies. Join us for this private, closed-door virtual roundtable where we will be taking a deeper look at cyber resilience.

View More

Why you'll never get to Zero Trust with Weak Authentication

Username and password authentication is still one of the most widely used methods, yet they fail on both security and user experience. Remembering passwords is painful and solutions such as MFA and password vaults not only create extra friction for the user but are not as secure as they seem. Password compromises are the number one cause of hacking related breaches. When it comes to securing our digital IDs it is time for a rethink. This virtual roundtable will give you the opportunity to network with your peers as we discuss how to solve one of the biggest security challenges and how new approaches to secure authentication can unlock potential for business users and consumers in providing a safe, secure and seamless experience for accessing apps and services online.

View More

How do we stop attacks before they stop us?

The risk isn’t of “having a security incident” its about handling it in a calm, collected, and methodological manner so a small incident doesn’t turn into a major one. Or worst case, a major one is identified and mitigated in minutes, as opposed to days. This sort of reinforces the “there is no real ROI” argument, as a motivated threat actor will not give up just because they were stopped once.

View More

Hybrid-cloud - is it the future or just the next technology buzzword?

A hybrid cloud approach to data management for analytics seems like the answer but is it just another buzzword or is it something that enterprises can truly leverage to help their business drive more value from data? This exclusive roundtable is your opportunity to discuss and explore hybrid cloud architecture and the impact it has on people, technology and performance with your peers.

View More

Data Resiliency in the Cloud

With the explosion of data and the continued escalation of data risk loss and regulatory challenges, the pressure is on. In a world of change and uncertainty, how can we protect and manage data in the cloud? And crucially, how long would it take you to recover from a ransomware attack? Join us for this private, closed door virtual roundtable where we will be taking a deeper look at the security challenges facing businesses today.

View More

Building an Enterprise-wide Culture of Analytics

Despite the growing significance of data and analytics for the DACH market, an alarmingly high percentage of companies have failed in building an enterprise-wide culture of analytics.

View More

The challenges of cloud adoption, can you become agile and maintain momentum whilst remaining secure?

The Flexera 2021 State of the Cloud Report reveals cloud computing trends and whilst it’s no surprise to see 80% of enterprise organisations choosing hybrid, as it gives them greater ability to adapt to change it does also add complexity. Whilst most organisations have a cloud/digital transformation strategy and plethora of choice the nuances and intricacies do create uncertainty, slow decision making resulting in delayed execution which can become a costly decision.

View More

Let's talk SASE - lots of noise, now the reality

With the arrival of the Secure Access Service Edge (SASE), network and security professionals are now planning their migration toward this new architecture that adapts to the distributed nature of users and data. SASE promises to reduce complexity and cost; improve performance; increase accessibility; and enhance security. So the question now becomes: what is the best path to bring you all these benefits as you work towards implementing SASE

View More

Steps to Delivering Relevant, Resilient, and Reliable Digital Services

Join us, as we discuss how to achieve digital service resiliency and deliver reliable customers experiences.

View More

What Brands Get Wrong About Customer Authentication

Customer authentication is a critical component of almost every app that exists, because it serves as a product gateway impacting 100% of customers. It’s not easy to get right, and the stakes for getting it right are higher than ever: 46% of customers abandon a transaction because of authentication, and account takeover fraud increased by 292% in 2020.

View More

The challenges of cloud adoption, can you become agile and maintain momentum whilst remaining secure?

The Flexera 2021 State of the Cloud Report reveals cloud computing trends and whilst it’s no surprise to see 80% of enterprise organisations choosing hybrid, as it gives them greater ability to adapt to change it does also add complexity. We will be focusing on the top 5 cloud adoption challenges identified in the Flexera report and explore with the audience the nature of these challenges, how they have impacted their organisations, and provide insights into how to overcome them

View More

Your Role in Securing Cloud Applications

The rapid and continuous adoption of cloud applications makes them major targets of cyber criminals to gain illegitimate access to companies’ data and networks in what are called stepping-stone attacks. Join this private, closed-door session where we will discuss how to enhance your approach to cloud application security.

View More

Why you'll never get to Zero Trust with Weak Authentication

This virtual roundtable will give you the opportunity to network with your peers as we discuss how to solve one of the biggest security challenges and how new approaches to secure authentication can unlock potential for business users and consumers in providing a safe, secure and seamless experience for accessing apps and services online.

View More

Why You Should Embrace a Digital Workforce in 2022

Join Brian Atkinson, VP & General Manager of Five9 EMEA, in a virtual roundtable discussion, as he discusses best practices CX Leaders should consider to successfully integrate the productivity of human and virtual agents.

View More

Reduce Business Risk: Securing Privileged Access and Implementing Zero-Trust

Join our CISO roundtable as we discuss how to make Zero-Trust work for you. We will cover the techniques used to protect Privileged Accounts, how to make Cloud Transformations secure, and the key elements behind Identity Management. Reduce business risk and maintain productivity by increasing your security posture.

View More

Optimising the Human Element of Cybersecurity

Human error is the most common portal for cybersecurity breaches. So it stands to reason that human talent is the most valuable defence against attacks. How can organisations reduce risk by making humans the strongest link in the cyber defence line?

View More

Re-Architecting the Enterprise: The Role of Apache Kafka® and Real-Time Data.

Join us for this private, closed door virtual roundtable where we will be taking a deeper look at: - What business cases are driving the transformation of your business? - Would you like to deepen your knowledge of how of Apache ® Kafka is driving the re-architecting of the enterprise? - How can you further develop your vision for a re-architected enterprise?

View More

Security Debt, Running with Scissors

Security debt, defined by Dave Lewis, Global Advisory CISO, Duo Security at Cisco, as “the accumulation of the patches missed, the risks accepted, and the configurations misapplied,” is a serious and common problem for many organizations, especially with the move to cloud com putting and rise of IoT.

View More

The challenges and the opportunities of the New Enterprise Reality

For many organizations today, successfully engaging with customers and empowering employees in digital environments is essential to business success. But everyone’s quality of experience within today’s digital world is dependent on a wealth of underlying complexities and dependencies.

View More

How can financial services organisations establish trust in a digital world?

During the meeting, we will focus on questions such as: - What is the importance of trust in financial services and how can it be measured? What has damaged trust in recent years and how can that trust be rebuilt?

View More

2021 End-User Computing State of the Market

End-user computing (EUC) approaches continue to evolve as organizations look to support the needs of a dynamic and changing workplace. Hybrid- and multi-cloud have become a more important variable in the context of work-from-home. Platform flexibility remains important but lowering the bar on complexity has become a more important EUC focus.

View More

Digital Business: winning technology strategies for your industry

Technology is a key ingredient in driving and sustaining business success. It's a two-sided coin. On one side, it can be a game changer and a way to distinguish your services or offerings. On the other side, get it wrong and an unexpected mishap can be devastating. Join Broadcom and a select group of industry peers to discuss your digital business transformation strategies (people, processes and technology) and the evolving role of the mainframe.

View More

Security Debt, Running with Scissors

Security debt, defined by Dave Lewis, Global Advisory CISO, Duo Security at Cisco, as “the accumulation of the patches missed, the risks accepted, and the configurations misapplied,” is a serious and common problem for many organizations, especially with the move to cloud com putting and rise of IoT.

View More

How do we stop attacks before they stop us?

The risk isn’t of “having a security incident” its about handling it in a calm, collected, and methodological manner so a small incident doesn’t turn into a major one. Or worst case, a major one is identified and mitigated in minutes, as opposed to days. This sort of reinforces the “there is no real ROI” argument, as a motivated threat actor will not give up just because they were stopped once.

View More

Where's the Sec in Mobile DevOps?

Join us on this private, peer led discussion to look at how you can minimise the friction between development deadlines and security requirements with tighter controls from the beginning of the development phase. Together, we will examine the best practices in app security and hear from experienced professionals about how they addressed their own challenges.

View More

Are passwords leading us towards a security crisis?

The security of our digital IDs has never been more important: from cloud services that have kept businesses functioning through the rapid shift to remote working, to providing access to essential consumer services. This virtual roundtable will give you the opportunity to network with your peers as we discuss how to solve one of the biggest security challenges and how new approaches to secure authentication can unlock potential for business users and consumers in providing a safe, secure and seamless experience for accessing apps and services online.

View More

Optimizing IT Compliance: Real-world Lessons in Embedding and Scaling an Effective Program

Are you frustrated with exhausting all your resources just to sustain your current IT compliance program? And is the outcome you’re achieving delivering the intended benefit to the wider organization? Join us at this closed-door, peer-led Virtual Roundtable for a candid discussion on optimizing IT compliance. Hear lessons learned from embedding and scaling an effective program and identify actions you can take to optimize your own program.

View More

Security Debt, Running with Scissors

Security debt, defined by Dave Lewis, Global Advisory CISO, Duo Security at Cisco, as “the accumulation of the patches missed, the risks accepted, and the configurations misapplied,” is a serious and common problem for many organizations, especially with the move to cloud com putting and rise of IoT.

View More

How CIOs can gain data superpowers to manage data pipelines in the face of real time decisions support.

Real-time decision support is a success factor for all businesses impacted by the current global uncertainty as well as the rapid digital transformation of the market. How does this impact the responsibility of CIOs? Do they need to develop data superpowers? Are the existing models of data processes and pipeline adapted to the required speed to insight?

View More

Embracing the Cloud for

The success of a business can be measured by how quickly and reliably it deploys and updates internal and external applications. Customers demand agility and competitors quickly take advantage of stagnation.

View More

Creating order out of chaos: Natural language as a strategic imperative

Language is central to how we all do business. It shapes processes and it impacts how we communicate with our customers. To get ahead of the competition, your business needs to be capable of understanding how to realize tangible value from language data available from its unstructured inputs. In this 90-minute virtual roundtable, we will bring together a select group of your peers to discuss some of the key issues data leaders face today.

View More

TLC Reconnect

TLC Reconnect is a new, in-person networking evening dedicated to the Technology Leaders Club community. Taking place at the luxurious Ned Hotel in London, the evening will host over 60 C-Suite and Director level IT, Security and Data executives looking to network and build new connections in the real world!

View More

Hybrid-cloud - is it the future or just the next technology buzzword?

A hybrid cloud approach to data management for analytics seems like the answer but is it just another buzzword or is it something that enterprises can truly leverage to help their business drive more value from data? This exclusive roundtable is your opportunity to discuss and explore hybrid cloud architecture and the impact it has on people, technology and performance with your peers.

View More

Rebalance your cyber security with a “prevention-first” strategy

It is said that the most efficient way to reduce insider risks is to prevent insider incidents. A prevention-first strategy must also prove effective at rapidly detecting and mitigating the effects of insider threats originating from both malicious and accidental insiders. In this roundtable, we will be discussing the challenges security professionals encounter detecting, preventing, and mitigating cybersecurity threats from individuals with authorised access to systems and data.

View More

Security Debt, Running with Scissors

Security debt, defined by Dave Lewis, Global Advisory CISO, Duo Security at Cisco, as “the accumulation of the patches missed, the risks accepted, and the configurations misapplied,” is a serious and common problem for many organizations, especially with the move to cloud com putting and rise of IoT.

View More

Hybrid-cloud - is it the future or just the next technology buzzword?

A hybrid cloud approach to data management for analytics seems like the answer but is it just another buzzword or is it something that enterprises can truly leverage to help their business drive more value from data? This exclusive roundtable is your opportunity to discuss and explore hybrid cloud architecture and the impact it has on people, technology and performance with your peers.

View More

Where's the Sec in Mobile DevOps?

With mobile applications becoming an indispensable platform for organisations, but if left unchecked an easy attack surface for malicious actors, what can you be doing to stay out of the news headlines? Join us on this private, peer led discussion to look at how you can minimise the friction between development deadlines and security requirements with tighter controls from the beginning of the development phase.

View More

Simplify Customer Onboarding and Reduce Fraud with Identity Verification

In today’s digital-first world, a customer’s first interactions with a brand increasingly occur when registering, opening an account or applying for a service online. If organisations don’t have confidence in their customer’s identity at that first interaction, they are at greater risk of fraudulent account creation and activity. With Identity Verification, organisations can strengthen security by ensuring they have the right level of assurance that customers are who they say they are from the very beginning.

View More

Start Making Sense: Mining Unstructured Data as a Strategic Capability

In this 90-minute virtual roundtable, we will bring together a select group of your peers to discuss the latest developments in natural language understanding (NLU) and how these techniques are powering customer interactions, language intensive business processes and the mining of intelligence from lakes of knowledge.

View More

Re-Architecting the Enterprise: The Role of Apache Kafka® and Real-Time Data.

The recent revolution in data infrastructure and application architecture has transformed the way all kinds of organisations, from the traditional to the digital native, work with data. But to truly take advantage of real-time data as the most strategic platform within your company, it must move from the domain of one-off engineering initiatives into a central nervous system for the enterprise. Transformation requires a thoughtful strategy that drives the re-architecting of the enterprise. By joining this one-off round table you will learn how market-leading companies are using real-time data to transform business practices and which use cases they are putting into practice.

View More

API First Approach for faster Cloud adoption

Enterprises need to design services that include legacy resources. They want the services to be cloud-native so they can treat them the same way all the rest of their digital systems are handled. Many also want to build the services quickly with an API First approach in mind but struggle since it takes time and different teams to expose legacy resources to cloud systems

View More

Hybrid-cloud - is it the future or just the next technology buzzword?

A hybrid cloud approach to data management for analytics seems like the answer but is it just another buzzword or is it something that enterprises can truly leverage to help their business drive more value from data? This exclusive roundtable is your opportunity to discuss and explore hybrid cloud architecture and the impact it has on people, technology and performance with your peers.

View More

Using Data Effectively in Contact Centres to: Identify Next Best Action, Reduce Churn, Increase First Call Resolution and Improve KPIs

Customer experience is the new battleground in driving customer loyalty and is a key channel for any brand. When we consider that the contact centre is one of the most frequently used channels for direct customer interactions, it makes sense that data should be connected and available in real time for our agents and centres to use. Join us as we walk through real examples that will inspire you.

View More

Acclimating in times of Disruption. Enabling Transformation.

We will be discussing identification, authentication, and authorization best practices through Identity Governance Administration. This is a great chance to learn more about strengthening your IGA system and how companies can optimize those practices not just to meet compliance, but to prevent identity escalation threats.

View More

Increasing the success rates in drug discovery, current practice and next steps to delivering better druggable candidates

There is a strong drive to improve the productivity and efficiency of drug discovery. Jack Scannell’s paper highlighting the decline of R&D really brought this topic into sharp focus. Various industry thought leaders have suggested strategies such as “fast fail”, “ligand efficiency” “the pillars of success”, the “5R framework” etc” to address R&D productivity challenge. These are now positively impacting on success rates, but what are the next big drivers to take the probability of success rates further.

View More

Driving Your Competitive Advantage with Cloud-First Identity and Access Management

Many organisations are operating their IT environment in a hybrid state. While the cloud has allowed organisations to realize new levels of efficiency and ROI by leveraging modern approaches such as SaaS, a certain number of apps will likely remain on-premises for the foreseeable future.

View More

Reduce Business Risk: Securing Privileged Access and Implementing Zero-Trust

Join our CISO roundtable as we discuss how to make Zero-Trust work for you. We will cover the techniques used to protect Privileged Accounts, how to make Cloud Transformations secure, and the key elements behind Identity Management.

View More

Simplify Customer Onboarding and Reduce Fraud with Identity Verification

Join us for a private roundtable with a specially selected group of your peers to discuss: The benefits of a cloud-based Identity verification service for customers How to balance security and convenience without unnecessary frictions

View More

Jump Ahead of the Competition with Passwordless Access for your Staff and Customers

Join us for a private roundtable with a specially selected group of your peers to discuss all of the necessities and challenges associated with Zero Trust. As we know, Love it or hate it, Zero Trust is here to stay.

View More

Jump Ahead of the Competition with Passwordless Access for your Staff and Customers

Join us for a private roundtable with a specially selected group of your peers to discuss all of the necessities and challenges associated with Zero Trust. As we know, Love it or hate it, Zero Trust is here to stay.

View More

Rethinking Security as a business enabler

Join us for this closed door, peer-lead, 90-minute Virtual Roundtable to discuss the best practices to raise awareness and understanding of the cybersecurity challenge in organisations and how Covid changed the working environment.

View More

Identity & Access Management as the Foundation of the Modern Enterprise

Join us for this private, closed door virtual roundtable where we will be taking a deeper look at: As part of the Zero Trust framework, how does Identity & Access Management serve as the final perimeter?

View More

Building an Enterprise-wide Culture of Analytics

Join our exclusive virtual roundtable: get involved, discuss, and share best practices with other high-level executives on how your organizations can transform into data-driven businesses.

View More

Embracing the Cloud to Drive Innovation at Scale

The path for executives is not clear. Moving to the cloud indeed gives flexibility. But should an enterprise “lift and shift” legacy applications? Or re-architect them while moving? Are managed services the right choice – or is lock-in something to be concerned about? What are the fundamental cultural impacts that executives need to address? In short, how can companies accelerate their digital transformation by embracing the cloud in the right way?

View More

How do you secure the “Anywhere Workplace?”

Join us for this closed-door, peer-led Virtual Roundtable for a candid discussion with cybersecurity executives from a variety of industries to discuss how to provide secure connectivity for the anywhere workplace. Learn from others’ successes, avoid their previously encountered pitfalls, and share thoughts on protecting the work environments of 2021 and beyond.

View More

The Path to Zero Trust: A Security Paradigm Shift

Many organizations have begun to embrace zero trust frameworks and are building these into their security strategies. Understanding your barriers to zero trust will also help you forge the best path to optimally securing your environment, including upgrading from legacy applications and architectures to ones that support zero trust.

View More

Steps to Delivering Relevant, Resilient, and Reliable Digital Services

Both your internal and external customers want intuitive, reliable, secure, and ideally, always available digital services that make their lives easier. To meet these demands, service delivery teams must continually innovate, releasing features quickly and frequently. Join us, as we discuss how to achieve digital service resiliency and deliver reliable customers experiences.

View More

The Power of Data - The Critical Enabler of Faster Decision Making

In Retail, being at the forefront of having to adapt to changing customer behaviour and interactions, there is no time more critical than now to make better and faster decisions.

View More

Ransomware: Getting to know the enemy

Join us for this thought leadership discussion where we will come together to share best practices and to collectively understand our common enemy, Ransomware.

View More

Customer IAM: From Myths to Mastery

In this session, we’ll explore some of the background, myths, and approaches to customer identity...

View More

Creating order out of chaos: Natural language as a strategic imperative

In this 90-minute virtual roundtable, we will bring together a select group of your peers to discuss some of the key issues data leaders face today.

View More

Leave no-one behind: how to unlock your entire digital ecosystem

Join us for a private round table, with a specially selected group of your peers to discuss the 'Integrated Experience' and where we all stand.

View More

Are passwords leading us towards a security crisis?

The security of our digital IDs has never been more important: from cloud services that have kept businesses functioning through the rapid shift to remote working, to providing access to essential consumer services. This virtual roundtable will give you the opportunity to network with your peers as we discuss how to solve one of the biggest security challenges and how new approaches to secure authentication can unlock potential for business users and consumers in providing a safe, secure and seamless experience for accessing apps and services online.

View More

Are passwords leading us towards a security crisis?

The security of our digital IDs has never been more important: from cloud services that have kept businesses functioning through the rapid shift to remote working, to providing access to essential consumer services. This virtual roundtable will give you the opportunity to network with your peers as we discuss how to solve one of the biggest security challenges and how new approaches to secure authentication can unlock potential for business users and consumers in providing a safe, secure and seamless experience for accessing apps and services online.

View More

How do we stop attacks before they stop us?

How do you choose the right cybersecurity solutions in a constantly changing cyber threat landscape? Learn from your cross-industry peers in this virtual roundtable discussion, focussing on stopping cyber-attacks before they damage the business.

View More

Are passwords leading us towards a security crisis?

Join us for a closed-door, peer-led virtual roundtable discussing the security of our digital IDs and whether passwords are leading us towards a security crisis.

View More

The future is document workflows, will you be ready before your competitors?

During this private, peer-led virtual roundtable we will be discussing how you can work faster, more secure and improve both the customer and employee experience, all by automating workflows beyond eSignature.

View More

Modern DLP – Why Traditional Approaches Won’t Solve Your Insider Threat Problem

Join us and a specially selected group of your peers in an open discussion about how DLP can be introduced without the usual friction with the business and how contextual classification with granular controls can get an effective DLP solution operational quickly.

View More

Is Your Enterprise Effective at Preventing Cyberattacks as your Employees Work from Home?

In this virtual roundtable, we address the results and implications of the ground-breaking research The Economic Value of Prevention in the Cybersecurity Lifecycle. Conducted by the Ponemon Institute and sponsored by Deep Instinct, the report analyses the cost savings that can be taken in an efficient, zero-time prevention model.

View More

Can you restore your critical business services as fast as your competitors can restore theirs?

In the last year and a half, digital transformation has become a top priority for business leaders everywhere. New tech, new skills and a new attack surface mean those leaders must prepare for the worst if they are to feel confident they can succeed in all that the Internet can throw at them. Faster response to service disruptions has become crucial in getting the best in customer, partner and shareholder relations.

View More

Best practices for building customer 360 initiatives that earn customers for life

To succeed in today’s hypercompetitive business environment, it is essential to build lasting, meaningful customer relationships. But many companies struggle to understand who their customers are, what they want, and how to meet their needs. Join Talend and discover how build a healthy data environment that will make your customer 360 initiatives a success.

View More

Embracing the Cloud for “Innovation at Scale”

Join us and a select group of your peers for this private virtual roundtable where we will be taking a deeper look at how companies can accelerate their digital transformation by embracing the cloud in the right way.

View More

How can we use GRC as a business enabler?

Join us for this private, closed-door Virtual Roundtable where we will be taking a deeper look at governance, risk, and compliance and their use as a control mechanism vs an opportunity for business improvement.

View More

Driving Your Competitive Advantage with Cloud-First Identity and Access Management

Many organisations are operating their IT environment in a hybrid state. While the cloud has allowed organisations to realize new levels of efficiency and ROI by leveraging modern approaches such as SaaS, a certain number of apps will likely remain on-premises for the foreseeable future. How can security and IT teams provide employees with a seamless, yet secure, experience as they need to access both SaaS and on-premises applications? How can organisations leverage a cloud-first approach to better manage their applications as well as identity and access management (IAM)?

View More

Modern DLP – Why Traditional Approaches Won’t Solve Your Insider Threat Problem

Join us and a specially selected group of your peers in an open discussion about how DLP can be introduced without the usual friction with the business and how contextual classification with granular controls can get an effective DLP solution operational quickly.

View More

How do we stop attacks before they stop us?

How do you choose the right cybersecurity solutions in a constantly changing cyber threat landscape? Learn from your cross-industry peers in this virtual roundtable discussion, focussing on stopping cyber-attacks before they damage the business.

View More

Optimizing IT Compliance: Real World Lessons in Building, Embedding and Scaling an Effective Program

Join us at this closed-door, peer-led Virtual Roundtable for a candid discussion on optimising IT compliance. Hear lessons learned from embedding and scaling an effective program and identify actions you can take to optimise your own program.

View More

Is identity the cornerstone of every good security model? How do you compare?

Together we will explore the shifts in the security landscape that led to the creation of “beyondcorp” and how organizations can utilize identity and access management as a critical building block for a successful Zero Trust implementation.

View More

How do we stop attacks before they stop us?

Join us for this closed door, peer-led virtual roundtable discussing how to handle an incident in a calm, collected, and methodological manner so a small incident doesn’t turn into a major one or a major one does not progress further.

View More

The Path to Zero Trust: A Security Paradigm Shift

As the traditional perimeter continues to blur, the more zero trust comes into focus. The seismic shift to remote working and shift to the cloud have also accelerated the demise of the traditional perimeter and is driving an increased focus on zero trust. Many organizations have begun to embrace zero trust frameworks and are building these into their security strategies. Understanding your barriers to zero trust will also help you forge the best path to optimally securing your environment, including upgrading from legacy applications and architectures to ones that support zero trust.

View More

Managing fraud in a high challenge environment

Please join us for this private, closed-door virtual roundtable where we will be taking a deeper look at managing fraud in a high challenge environment

View More

Challenges with Remote Delivery and Remote Maturity Model

Join our virtual, private and peer-led roundtable, experts will weigh in the challenges of remote delivery, and the necessary best practices for operating successfully within a distributed workforce. Additionally, the panelists will discuss how organizations can hire and retain top talent and ultimately distinguish themselves from their competition by embracing a Remote Maturity model.

View More

Optimizing IT Compliance: Real-world Lessons in Embedding and Scaling an Effective Program

Join us at this closed-door, peer-led Virtual Roundtable for a candid discussion on optimizing IT compliance. Hear lessons learned from embedding and scaling an effective program and identify actions you can take to optimize your own program.

View More

Rethinking Security as a business enabler

Join us for this closed door, peer-lead, 90-minute Virtual Roundtable to discuss the best practices to raise awareness and understanding of the cybersecurity challenge in organisations and how Covid changed the working environment.

View More

Automatisez SAP pour de meilleures données et des processus plus rapides.

Au cours de notre évènement, nous discuterons les processus de création de données SAP et les défis.

View More

Can you restore your critical business services as fast as your competitors can restore theirs?

In the last year and a half, digital transformation has become a top priority for business leaders everywhere. New tech, new skills and a new attack surface mean those leaders must prepare for the worst if they are to feel confident they can succeed in all that the Internet can throw at them. Faster response to service disruptions has become crucial in getting the best in customer, partner and shareholder relations.

View More

Can you restore your critical business services as fast as your competitors can restore theirs?

In the last year and a half, digital transformation has become a top priority for business leaders everywhere. New tech, new skills and a new attack surface mean those leaders must prepare for the worst if they are to feel confident they can succeed in all that the Internet can throw at them. Faster response to service disruptions has become crucial in getting the best in customer, partner and shareholder relations.

View More

Is Your Enterprise Effective at Preventing Cyberattacks as your Employees Work from Home?

Understand and explore the different areas of the cybersecurity lifecycle during this 90 minute, peer-led roundtable, discussing different methods of optimization to achieve effective levels of defence at a reasonable cost.

View More

Rethinking Security as a business enabler

Join us for this closed door, peer-lead, 90-minute Virtual Roundtable to discuss the best practices to raise awareness and understanding of the cybersecurity challenge in organisations and how Covid changed the working environment.

View More

How do we stop attacks before they stop us?

Join us for this closed door, peer-led virtual roundtable discussing how to handle an incident in a calm, collected, and methodological manner so a small incident doesn’t turn into a major one or a major one does not progress further.

View More

How do we stop attacks before they stop us?

Join us for this closed door, peer-led virtual roundtable discussing how to handle an incident in a calm, collected, and methodological manner so a small incident doesn’t turn into a major one or a major one does not progress further.

View More

Are passwords leading us towards a security crisis?

Join us for a closed-door, peer-led virtual roundtable discussing the security of our digital IDs and whether passwords are leading us towards a security crisis.

View More

Is identity the cornerstone of every good security model? How do you compare?

Together we will explore the shifts in the security landscape that led to the creation of “beyondcorp” and how organizations can utilize identity and access management as a critical building block for a successful Zero Trust implementation. By shifting access controls from the network perimeter to individual users, service accounts, apis and non-human identities, zero trust enables safe and secure work from virtually any location with a network connection.

View More

Driving Your Competitive Advantage with Cloud-First Identity and Access Management

Many organisations are operating their IT environment in a hybrid state. While the cloud has allowed organisations to realize new levels of efficiency and ROI by leveraging modern approaches such as SaaS, a certain number of apps will likely remain on-premises for the foreseeable future. How can security and IT teams provide employees with a seamless, yet secure, experience as they need to access both SaaS and on-premises applications? How can organisations leverage a cloud-first approach to better manage their applications as well as identity and access management (IAM)?

View More

Cloud Migrations: Dare Mighty Things

Part of any organisation’s success strategy is continuous monitoring for risks: A cloud migration, if successful, can set your company on the path to mighty things. Yet, it too is risky. With continuous insight into the threats and where you stand vs your risk tolerance, you gain the confidence to push harder, make wiser decisions, and lead your transformation to unprecedented success.

View More

Optimizing IT Compliance: Real-world Lessons in Embedding and Scaling an Effective Program

Join us at this closed-door, peer-led Virtual Roundtable for a candid discussion on optimizing IT compliance. Hear lessons learned from embedding and scaling an effective program and identify actions you can take to optimize your own program.

View More

Igniting Continuous Business Transformation

Join us for this private, closed-door virtual roundtable where we will be taking a deeper look at how you can ignite continuous business transformation with cloud, data, scalability, automation, and analytics.

View More

Ransomware: Getting to know the enemy

Every organization today is concerned about security and the inevitability of a ransomware attack. Experts predict that ransomware attacks will take place every 11 seconds by 2021 and with multi-generational data sprawl increasing your attack surface, recovering from a malicious attack is becoming increasingly difficult.

View More

Ransomware: Getting to know the enemy

Every organization today is concerned about security and the inevitability of a ransomware attack. Experts predict that ransomware attacks will take place every 11 seconds by 2021 and with multi-generational data sprawl increasing your attack surface, recovering from a malicious attack is becoming increasingly difficult.

View More

Ransomware: the extortionists have upped their game, are your defenders keeping up?

The last couple of years have forced many businesses to reinvigorate or kick start their digital transformations and cloud adoptions. New approaches and new solutions require new ways of working. The new ways do not appear to be keeping the attackers out but they can help us better prepare, respond, and recover if we fall victim.

View More

Driving Your Competitive Advantage with Cloud-First Identity and Access Management

We will discuss: How can security and IT teams provide employees with a seamless, yet secure, experience as they need to access both SaaS and on-premises applications? How can organisations leverage a cloud-first approach to better manage their applications as well as identity and access management (IAM)? What are the best ways for organisations to leverage newer technologies to help scale their infrastructure to meet customer needs?

View More

Customer IAM: From Myths to Mastery

In this session, we’ll explore some of the background, myths, and approaches to customer identity...

View More

Cloud Migrations: Dare Mighty Things

Part of any organisation’s success strategy is continuous monitoring for risks: A cloud migration, if successful, can set your company on the path to mighty things.

View More

'Protecting your IT and IoT with Zero Trust Access'

Shadow IoT devices and traffic are quickly growing in organizations and posing many new threats and questions about how to best architect security to protect the enterprise.

View More

Security at the speed of DevOps

Join us for this closed door, peer-lead, 90-minute Virtual Roundtable to discuss DevOps-driven software development approaches are pervasive among organizations embracing the cloud.

View More

Why Zero Trust Done Right is Least Trust

Join us for this private, closed-door virtual roundtable where we will be taking a deeper look at trust and authentication within the cybersecurity space.

View More

The Rise and Risk of SaaS Apps: How to Keep Your Organization Protected when migrating ERP & mission-critical applications to the cloud

Join us for this closed door, peer lead Virtual Roundtable where we will be discussing the core tenants in a business application resiliency plan, why cloud-asset mapping is a crucial first step and the common pitfalls in securing SaaS-based business applications.

View More

Comment exploiter au maximum le rendement du chiffre d’affaires grâce à l’expérience client ?

Au cours de notre évènement, nous discuterons l'accélération des programmes de transformation digitale cette année et la capacité à simplifier la gestion du revenu.

View More

The Rise and Risk of SaaS Apps: How to Keep Your Organization Protected when migrating ERP & mission-critical applications to the cloud

Join us for this closed door, peer lead Virtual Roundtable where we will be discussing the core tenants in a business application resiliency plan, why cloud-asset mapping is a crucial first step and the common pitfalls in securing SaaS-based business applications.

View More

Security Debt? - Hindsight is 2020

Join us for an intimate roundtable conversation around changes we saw in 2020, how the security leaders and practitioners we spoke with adapted and maintained a positive attitude, and what’s to come in 2021.

View More

Why Managing Vendor Risk Is An Essential Part of Your Security Program

Join BitSight for an in-depth peer-led discussion on managing third-party vendor risk, discussing all the elements involved and how to improve them.

View More

Customer IAM: From Myths to Mastery

Customer identity is a hidden danger lurking in every application. Done well, it just works. Done poorly it frustrates your users, gets complicated as you consider policies and regulations, and doesn’t effectively protect your customers or your organization. Unfortunately, the line between “done well” and “done poorly” is thin, hard to detect, and better described using hieroglyphics and 6-dimensional space.

View More

DevSecOps at Scale for Digital Innovation

An executive lunch roundtable for business leaders, security & DevOps specialists with an interest in accelerating DevSecOps adoption. Join this private close-door Virtual Roundtable, led by peers including Ramsés Gallego, International Chief Technology Officer for MicroFocus; where we will discuss how to make DevSecOps work and bridging the gap between your application developers and security alongside much more.

View More

Zero Trust: Good Idea, but what's next?

Join us for an intimate roundtable conversation around the strategic approach to address the increasing needs of a business and the multiple elements of their hybrid cloud and on-prem environments.

View More

Tackling the Grey IT dilemma

People who manage mission-critical SaaS applications such as SAP or Salesforce often aren't IT. Take HR, for instance. HR leaders use applications to provision and deprovision users, provide payroll, connect to other internal apps, and more. With the push to remote work caused by the pandemic, other departments have also rushed to embrace the cloud's power and flexibility. But who's checking to ensure these connections are all secure? This challenge has brought on the rise of Grey IT – applications the company may be aware of but aren't governing.

View More

How can financial services organisations establish trust in a digital world?

During the meeting, we will focus on questions such as: - What is the importance of trust in financial services and how can it be measured? What has damaged trust in recent years and how can that trust be rebuilt?

View More

Subscribe to be the first to know about our launch and special events