Register

1
2

Events

January 2021
22

Modernize Your SOC to Maximize Your Output

Security teams are faced with the challenges of managing overhead and poor threat detection from their legacy SIEM deployments, while keeping up with rising costs. Security analysts need a modern incident investigation and threat hunting experience that harnesses advanced threat detection and allows them to complete tasks at Google search speed - even as your network’s data grows to petabyte scale.

View More

Death of the Firewall – does it have a purpose in 2021?

In the last decade, cloud usage has experienced tremendous growth and our network architectures have changed to suit. As the use of our internal networks has changed, do we still have legacy technologies that are actually providing no value?

View More

Zero-Trust Approach for the Healthcare Workforce

Healthcare records remain one of the "holy grail" personally identifiable information (PII) data types for cyber-criminals. With patient data being more valuable to attackers than ever, alongside stricter HIPAA and HITECH compliance requirements and an ever-growing device inventory to manage, IT teams' modernization projects must account for these risks in their planning. To efficiently mitigate the risks being faced, healthcare organizations need to adopt a 'zero-trust' security approach and start viewing every threat surface, access point, identity and login attempt as the new security perimeter.

View More

Data Protection in the Cloud:evolving a data protection strategy that supports the digital journey of your customers and your employees

By 2021, Gartner has estimated there will be a ransomware attack every 11 seconds with many businesses falling victim. With the explosion of data, 60% of workloads being hosted / born in the cloud by 2022, and the continued escalation of data risk loss and regulatory challenges, the pressure is on to deliver a successful digital transformation strategy. With a year of change and uncertainty, employee and customer requirements have accelerated how we protect and manage data in the cloud. How IT can adapt to the challenges businesses face around infrastructure and complexity whilst increasing cyber resilience and maintaining compliance, is more important than ever.

View More

Driving Your Competitive Advantage with Cloud-First Identity and Access Management

Many organizations are operating their IT environment in a hybrid state. While the cloud has allowed organizations to realize new levels of efficiency and ROI by leveraging modern approaches such as SaaS, a certain number of apps will likely remain on-premises for the foreseeable future. How can security and IT teams provide employees with a seamless, yet secure, experience as they need to access both SaaS and on-premises applications? How can organizations leverage a cloud-first approach to better manage their applications as well as identity and access management (IAM)? What are the best ways for organizations to leverage newer technologies to help scale their infrastructure to meet customer needs?

View More

Has the transformation of remote workers meant it is time for an alternative to your VPN?

Applications are now running in cloud and users are accessing them from everywhere. This means that organizations no longer control the network, making it impossible to do network security, and disrupting 25 years of remote access technology. Transformation has created a need for a better approach to remote access.

View More

The Ecosystem is the Threat: Best Practices to Enable Mission Critical Cybersecurity

Scaling cybersecurity is important to protect your entire cybersecurity ecosystem. Integrating real-time threat intelligence to continuously improve security posture is essential in today's current climate as well as deploying automation to make better, faster decisions.

View More

Death of the Firewall – does it have a purpose in 2021?

In the last decade, cloud usage has experienced tremendous growth and our network architectures have changed to suit. As the use of our internal networks has changed, do we still have legacy technologies that are actually providing no value?

View More

Securing a borderless enterprise

Today’s enterprise is truly borderless. The network perimeter is dissolving with digital transformations like SD-WAN, IoT, and hybrid cloud, complicating traditional security approaches. Securing evolving IT architectures is becoming one more challenge that short-staffed security teams are facing today. What’s needed is a foundational approach that is simple yet pervasive, cost-effective yet powerful and boosts the efficiency of security operations through automation.

View More

Why 2021 Could Take Ransomware to New Heights

Ransomware is almost always listed as the CISO’s top concern, and that’s reasonable given the incredible damage such an attack can create. Nevertheless, statistics suggest that ransomware is not the primary security threat and that cyber criminals are finding greater profits elsewhere. Across 2021, however, the concern is that the similarity in attack techniques, the expected evolution in ransomware techniques, the continuing adoption of cloud, and an increased collaboration between criminal groups, has the potential to accelerate the ransomware problem to new, and worrying, heights.

View More

Security Debt? - Hindsight is 2020

When the world shifted to working from home, companies saw on average a 71.9% increase in authentications due to remote access. Authentications to virtual private networks (VPN) and remote desktop protocol (RDP) swelled by 60%.*

View More

IT as Innovation Center

Most organizations still look at IT as a cost center. Even those organizations protesting otherwise often prove the point with automatic RFPs for all new solutions. Shifting the perception to IT as innovation center requires a proactive effort to both generate and capture ideas. It also requires a way to measure the value of innovation in a manner that resonates with the business while rewarding the individual contributors.

View More

What you can’t see will hurt you: Do you have all the information you need to protect your organisation?

The contemporary CISO has to make informed business decisions about risk while simultaneously balancing the board, regulators, customers, investors and more. Achieving this, requires collection, analysis, and tailoring of a mass of complex information so it is relevant for each stakeholder group. The myriad of sources makes this hard, which can ultimately compound bad decision-making. Those who are aware of this build their own tools or undertake lengthy and careful audits, both of which incur cost, take time and are not scalable. Gaining a solid understanding of the environment they manage may sound obvious but can very quickly become the bane of a CISOs existence. This discussion, sponsored by CCM vendor Panaseer, brings together a select group of senior security executives to enable a peer-led debate drawing on personal experiences to understand how to address this problem.

View More

Revenue Operations Transformation: how to maximize revenue yield through connected customer experiences

Join Ash Finnegan, digital transformation officer at Conga, as she discusses how your organisation can maximise its operational efficiency and boost overall performance by creating a fully connected, end-to-end customer experience

View More

Delivering a real time 360 trusted customer experience

Digital is Data and Data is the lifeblood of your customer experience. The challenge doesn’t stop at collecting, connecting and turning data into insights through data warehouses or data lakes. It also requires delivering insights into apps and services accessible to your customers at the speed of demand. This is particularly true for data about your most precious assets: your customers. Delivering a real time 360 trusted customer experience is critical for today’s organizations which are looking to leverage on customer data to create more business value for both internal and external stakeholders alike. Understand and exchange learnings with executives on how the 360 customer journey can be delivered smoothly while harnessing the power of customer data in this roundtable session with Talend.

View More

Delivering a real time 360 trusted customer experience

Digital is Data and Data is the lifeblood of your customer experience. The challenge doesn’t stop at collecting, connecting and turning data into insights through data warehouses or data lakes. It also requires delivering insights into apps and services accessible to your customers at the speed of demand. This is particularly true for data about your most precious assets: your customers. Delivering a real time 360 trusted customer experience is critical for today’s organizations which are looking to leverage on customer data to create more business value for both internal and external stakeholders alike. Understand and exchange learnings with executives on how the 360 customer journey can be delivered smoothly while harnessing the power of customer data in this roundtable session with Talend.

View More

Customer Identity and Access Management (IAM): From Myths to Mastery

Customer identity is a hidden danger lurking in every application. Done well, it just works. Done poorly it frustrates your users, gets complicated as you consider policies and regulations, and doesn’t effectively protect your customers or your organization. Unfortunately, the line between “done well” and “done poorly” is thin, hard to detect, and better described using hieroglyphics and 6-dimensional space. Regardless of the complexity, we know that a seamless but secure customer experience makes happy customers who visit more often and do more with us each time. In this session, we’ll explore some of the background, myths, and approaches to customer identity.

View More

Death of the Firewall – does it have a purpose in 2021?

In the last decade, cloud usage has experienced tremendous growth and our network architectures have changed to suit. As the use of our internal networks has changed, do we still have legacy technologies that are actually providing no value?

View More

Modern IAM: Making the Business and Security Case

Too many enterprises remain chained to outdated and vulnerable identity and access management technologies –legacy systems that rely on passwords, eat budgets and kill productivity. But as organizations evolve in their digital transformation, they now need modern systems that can manage access and identity at scale with users and customers who need access to applications and resources that are on-premise, in the cloud and mobile. Single sign-on, multifactor authentication, zero trust security – these are all part of the modern IAM suite, and they can deliver solid business benefits that include enhanced productivity, lower cost of ownership and a superior user experience. But what is the roadmap for this modern IAM journey? How can enterprises integrate their existing IAM infrastructure with new components that truly decrease cost and complexity, while at the same time improving the user experience and security? If you’re looking for new answers to these questions, then welcome to this exclusive executive roundtable on Modern IAM: Making the Business – and Security – Case. Guided by insight from event sponsors Baber Amin, CTO at Ping Identity, and Cody Cook, Vice President – Technology and Partnerships, this event will draw upon first-hand experience from the attendees, offering thoughts on how they have been able to address and manage the challenges of modern IAM.

View More

How well does your endpoint security strategy meet the mark?

Synopsis With threats continuing to evolve, it’s no wonder organizations continue to see advanced targeted attacks even with a full stack of endpoint protection platform and endpoint detection and response solutions operating 24 X 7. Consider this: Many CISOs today are finding that the effectiveness of their current security strategy is limited. Why? There are blind spots most endpoint security technologies are not addressing. These gaps leave security leaders and their companies exposed to evolving ransomware and other attacks. Join us on xyz date to learn more about these blind spots and to discuss with your peers the challenges you face and how to best address them.

View More

Systems of Experience - The role of the CIO in shaping the future of work

The role of the CIO has been on a steady rise for the past several years. As companies continue to evolved and the way people work continues to change, the demands from today’s global, mobile and distributed workforce are also rapidly evolving. We’re at a point in time where the CIO, who’s role was once limited to ensuring that IT systems were working smoothly, is now front and centre to defining the digital culture of an organisation with a mega-trend at play that I like to call, ‘Systems of Experience.’

View More

Subscribe to be the first to know about our launch and special events