Events
Security at the speed of DevOps
Join us for this closed door, peer-lead, 90-minute Virtual Roundtable to discuss DevOps-driven software development approaches are pervasive among organizations embracing the cloud.
View MoreDeath of the Firewall – does it have a purpose in 2021?
Join this private, 90-minute virtual roundtable where cybersecurity professionals share their views, insights and challenges surrounding the status of the firewall in 2021.
View MoreModern IAM: Making the Business and Security Case
Guided by insight from event sponsors Baber Amin, CTO at Ping Identity, and Cody Cook, Vice President – Technology and Partnerships, this event will draw upon the first-hand experience from the attendees, offering thoughts on how they have been able to address and manage the challenges of modern IAM.
View MoreProtecting Your Weakest Links
Join us for this peer lead, closed-door Virtual Roundtable where we will be discussing the weakest links facing the industry and how to strengthen them
View MoreHow well does your endpoint security strategy meet the mark?
Many CISO's are finding that the blind spots that aren't being addressed in their endpoint security strategy are limiting their effectiveness. Join us to learn more about these blind spots and to discuss with your peers the challenges you face and how to best address them.
View MoreSecurity Debt? - Hindsight is 2020
Join us for an intimate roundtable conversation around changes we saw in 2020, how the security leaders and practitioners we spoke with adapted and maintained a positive attitude, and what’s to come in 2021.
View MoreEnhanced Customer Experience & Digital Transformation through Identity
Join us for a private virtual roundtable session around the enhanced customer experience & Digital transformation through identity
View MoreEnhanced Customer Experience & Digital Transformation through Identity
Join us for a private, 90-minute, virtual roundtable session around the enhanced customer experience & digital transformation through identity.
View MoreProtecting Your Weakest Links
Join us for this peer lead, closed-door Virtual Roundtable where we will be discussing the weakest links facing the industry and how to strengthen them.
View MoreIs Your Enterprise Effective at Preventing Cyberattacks as your Employees Work from Home?
Understand and explore the different areas of the cybersecurity lifecycle during this 90 minute, peer-led roundtable, discussing different methods of optimization to achieve effective levels of defence at a reasonable cost.
View MoreHow do we stop attacks before they stop us?
During this expert-led roundtable, we will explore the constantly changing cyber threat landscape in order to find the needed solutions focussing on stopping cyber-attacks before they damage our enterprises.
View MoreEvolution or Revolution - How do you avoid “we’ve always done it this way”?
Join us for this closed door, peer lead Virtual Roundtable where we will be discussing what gets in the way of good decision making as well as taking a deeper look at the many factors that influence different types of security risk.
View MoreThe Modern SOC - Uniting MDR with Microsoft® Azure Sentinel and Defender XDR
Join us for an intimate peer-led roundtable conversation discussing the new approaches needed towards cybersecurity and how organizations are able to meet the demands of the next-gen cyber threats.
View MoreHow to stop an attack before it stops you?
Cette table ronde réunira un groupe de dirigeants du secteur de l’IT et de la cybersécurité de toute la France. Le thème central discuté sera autour de la sécurité : « Comment stopper les cyberattaques avant qu’elles nous vous arrêtent ?
View MoreThe Future of Customer Engagement
During this private, closed-door Virtual Roundtable we will be discussing, how digital engagement, software agility and cloud scalability can be the future of customer engagement.
View MoreWhat you can’t see will hurt you: Do you have all the information you need to protect your organisation?
This 90-minute roundtable discussion, sponsored by CCM vendor Panaseer, brings together a select group of senior security executives to enable a peer-led debate drawing on personal experiences to understand how to address this problem.
View MoreWhy Managing Vendor Risk Is An Essential Part of Your Security Program
Join BitSight for an in-depth peer-led discussion on managing third-party vendor risk, discussing all the elements involved and how to improve them.
View MoreDefining a Secure and Flexible Path to Data-Centric SASE
Join this private, closed door Virtual Roundtable where we will be discussing the challenges faced in digital transformation, the strategies you’ve embraced to overcome obstacles and how you define SASE nirvana.
View MoreSharing best practices to quantify security performance
During this session, we will describe a practical approach to measuring and tracking security performance in the face of threat evolutions. After all, if you can't measure it, you can’t improve it.
View MoreHow do we stop attacks before they stop us?
How do you choose the right cybersecurity solutions in a constantly changing cyber threat landscape? Learn from your cross-industry peers in this virtual roundtable discussion, focussing on stopping cyber-attacks before they damage the business.
View MoreSystems of Experience - The role of the CIO in shaping the future of work
During this roundtable, we will focus on the role of the CIO amidst this shifting tide and discuss what it takes to create a digital culture to support the future of work.
View MoreWorking Towards a Passwordless Future
Join us for this private, closed-door Virtual Roundtable where we will be sharing thoughts and best practices on adopting passwordless solutions. We will seek perspectives on what practical steps organizations can implement today as well as common obstacles they may encounter along the way.
View MoreCustomer Identity and Access Management (IAM): From Myths to Mastery
In this session, we’ll explore some of the background, myths, and approaches to customer identity and access management
View MoreRansomware: it’s not if … but when
Join this interactive roundtable to discuss, debate and learn how you can confidently ensure protection from devastating ransomware attacks, and drive your recovery costs to zero.
View MoreWorking Towards a Passwordless Future
Join us for this private, closed-door Virtual Roundtable where we will be sharing thoughts and best practices on adopting passwordless solutions. We will seek perspectives on what practical steps organizations can implement today as well as common obstacles they may encounter along the way.
View MoreExpanding Internationally with Cloud Communications
Join us for this closed-door, peer-led Virtual Roundtable where professionals from across the IT landscape will be discussing how to navigate the often murky waters of international regulation and build centralized global coverage that matches the quality of legacy carriers without sacrificing the benefits of the cloud?
View MoreSecurity at the speed of DevOps
Join us for this closed door, peer-lead, 90-minute Virtual Roundtable to discuss DevOps-driven software development approaches are pervasive among organizations embracing the cloud.
View MoreIs Your Enterprise Effective at Preventing Cyberattacks as your Employees Work from Home?
As more employees are now working from home, the attack surface is more complex and widely spread, making prevention even harder to achieve.
View MoreHow do we stop attacks before they stop us?
How do you choose the right cybersecurity solutions in a constantly changing cyber threat landscape? Learn from your cross-industry peers in this virtual roundtable discussion, focussing on stopping cyber-attacks before they damage the business.
View MoreHow do you address increasingly advanced cyber threats with a small security team?
Join us for this closed door, peer-lead, 90-minute Virtual Roundtable to discuss companies with small security teams and limited cybersecurity budgets and the struggles to protect their organizations from today’s increasingly sophisticated cyber threats.
View MoreSharing best practices to quantify security performance
During this session, we will describe a practical approach to measuring and tracking security performance in the face of threat evolutions. After all, if you can't measure it, you can’t improve it.
View MoreAnalytics strategy versus culture - Match made in heaven or a match made in hell?
Are all enterprise analytics implementations doomed to fail? Time and time again we see a new BI strategy designed to unite the organisation break down when those managing data and analytics don't see eye to eye with those consuming it. However, in today's day and age, failure is no longer an option: it is imperative that an organisation's data and analytics strategy takes into consideration the needs of the whole business and all its users. But how? If failure is no longer an option, what are you doing or going to do about it?
View MoreCustomer Identity and Access Management (IAM): From Myths to Mastery
In this session, we’ll explore some of the background, myths, and approaches to customer identity and access management
View MoreHow do you address increasingly advanced cyber threats with a small security team?
Join us for this closed door, peer-lead, 90-minute Virtual Roundtable to discuss companies with small security teams and limited cybersecurity budgets and the struggles to protect their organizations from today’s increasingly sophisticated cyber threats.
View MoreWhy Managing Vendor Risk Is An Essential Part of Your Security Program
Join BitSight for an in-depth peer-led discussion on managing third-party vendor risk, discussing all the elements involved and how to improve them.
View MoreSecure Digital Transformation: A single privacy framework for risk reduction & value creation
The digital revolution is changing our customers’ lives. With social media, digital collaboration, online banking and shopping all make life easier, users have wholeheartedly adopted digital platforms and shared information about their interests, desires, and connections.
View MoreCloud migration: Running the cyber security gauntlet
8% of sea turtle hatchlings scurrying to the sea succumb to predators and do not make it. CISOs will understand this challenge as they contemplate cloud migration. Data centre doors are closing and IT is galloping to the cloud because it offers security, lower cost and greater flexibility, but hybrid networks are hard to secure. How can businesses minimise this risk and how do MDR services need to evolve?
View MoreHow do we stop attacks before they stop us?
How do you choose the right cybersecurity solutions in a constantly changing cyber threat landscape? Learn from your cross-industry peers in this virtual roundtable discussion, focussing on stopping cyber-attacks before they damage the business.
View More