Register

1
2

Events

April 2021
17

Revenue Operations Transformation: how to maximize revenue yield through connected customer experiences

Join Ash Finnegan, digital transformation officer at Conga, as she discusses how your organisation can maximise its operational efficiency and boost overall performance by creating a fully connected, end-to-end customer experience

View More

Customer Identity and Access Management (IAM): From Myths to Mastery

In this session, we’ll explore some of the background, myths, and approaches to customer identity and access management

View More

How do you address increasingly advanced cyber threats with a small security team?

Join us for this closed door, peer-lead, 90-minute Virtual Roundtable to discuss companies with small security teams and limited cybersecurity budgets and the struggles to protect their organizations from today’s increasingly sophisticated cyber threats.

View More

Why Managing Vendor Risk Is An Essential Part of Your Security Program

Join BitSight for an in-depth peer-led discussion on managing third-party vendor risk, discussing all the elements involved and how to improve them.

View More

Secure Digital Transformation: A single privacy framework for risk reduction & value creation

The digital revolution is changing our customers’ lives. With social media, digital collaboration, online banking and shopping all make life easier, users have wholeheartedly adopted digital platforms and shared information about their interests, desires, and connections. The information now available in the digital universe is a goldmine for enterprises.

View More

Cloud migration: running the cyber security gauntlet

8% of sea turtle hatchlings scurrying to the sea succumb to predators and do not make it. CISOs will understand this challenge as they contemplate cloud migration. Data centre doors are closing and IT is galloping to the cloud because it offers security, lower cost and greater flexibility, but hybrid networks are hard to secure. How can businesses minimise this risk and how do MDR services need to evolve?

View More

Is Your Enterprise Effective at Preventing Cyberattacks as your Employees Work from Home?

As more employees are now working from home, the attack surface is more complex and widely spread, making prevention even harder to achieve.

View More

Security at the speed of DevOps

Join us for this closed door, peer-lead, 90-minute Virtual Roundtable to discuss DevOps-driven software development approaches are pervasive among organizations embracing the cloud.

View More

Protecting your IT and IoT with Zero Trust Access

Shadow IoT devices and traffic are quickly growing in organizations and posing many new threats and questions about how to best architect security to protect the enterprise

View More

How do we stop attacks before they stop us?

How do you choose the right cybersecurity solutions in a constantly changing cyber threat landscape? Learn from your cross-industry peers in this virtual roundtable discussion, focussing on stopping cyber-attacks before they damage the business.

View More

Cloud migration: Running the cyber security gauntlet

8% of sea turtle hatchlings scurrying to the sea succumb to predators and do not make it. CISOs will understand this challenge as they contemplate cloud migration. Data centre doors are closing and IT is galloping to the cloud because it offers security, lower cost and greater flexibility, but hybrid networks are hard to secure. How can businesses minimise this risk and how do MDR services need to evolve?

View More

Enhanced Customer Experience & Digital Transformation through Identity

Exceptional digital experiences are no longer a “nice to have” but a necessity to drive customer engagement and revenue. In response, businesses are rapidly shifting digital transformation efforts to focus on removing friction from the customer experience.

View More

The Growing Digital Divide: Don't Be Left Behind...

More than ever before, companies are scrambling to drive innovation and digital transformation, but it's become apparent that the digital divide is still growing. The pandemic exposed which companies were digitally savvy or in a good place to adapt to change, but what about those who weren't? Now they're scrambling even more to close that gap.

View More

Why Managing Vendor Risk Is An Essential Part of Your Security Program

Third-party vendors are often the weakest link in your organization’s security ecosystem since most security leaders do not have good visibility or oversight of their security controls. But as the recent breach of SolarWinds has made clear, managing third party risk is now an essential part of your overall cybersecurity strategy.

View More

How can we use GRC as a business enabler?

Governance, risk, and compliance (GRC) are three related facets that aim to assure an organization reliably achieves objectives, addresses uncertainty and acts with integrity but how often are they used as a control mechanism rather than as a real opportunity for business improvement?

View More

The Rise and Risk of SaaS Apps: How to Keep Your Organization Protected when migrating ERP & mission-critical applications to the cloud

Join us for this closed door, peer lead Virtual Roundtable where we will be discussing the core tenants in a business application resiliency plan, why cloud-asset mapping is a crucial first step and the common pitfalls in securing SaaS-based business applications.

View More

Securing a borderless enterprise

Today’s enterprise is truly borderless. The network perimeter is dissolving with digital transformations like SD-WAN, IoT, and hybrid cloud, complicating traditional security approaches.

View More

Tackling the Grey IT dilemma

People who manage mission-critical SaaS applications such as SAP or Salesforce often aren't IT. Take HR, for instance. HR leaders use applications to provision and deprovision users, provide payroll, connect to other internal apps, and more. With the push to remote work caused by the pandemic, other departments have also rushed to embrace the cloud's power and flexibility. But who's checking to ensure these connections are all secure? This challenge has brought on the rise of Grey IT – applications the company may be aware of but aren't governing.

View More

Is Your Enterprise Effective at Preventing Cyberattacks as your Employees Work from Home?

Understand and explore the different areas of the cybersecurity lifecycle during this 90 minute, peer-led roundtable, discussing different methods of optimization to achieve effective levels of defence at a reasonable cost.

View More

On-Line Privacy, Security and a Seamless Patient Experience

Join this private, closed door Virtual Roundtable where we will look at how to give patients the privacy and security they needed in a real-life healthcare portal.

View More

The Ecosystem is the Threat: Best Practices to Enable Mission Critical Cybersecurity

Join us for this closed door, peer-lead, 90-minute Virtual Roundtable to discuss as share the best practices to enable mission-critical cybersecurity.

View More

Protecting your IT and IoT with Zero Trust Access

During this private, closed door Virtual Roundtable we will be discussing how shadow IoT devices and traffic are quickly growing in organizations, why they are posing many new threats and questions about how to best architect security to protect the enterprise.

View More

Is Your Enterprise Effective at Preventing Cyberattacks as your Employees Work from Home?

As more employees are now working from home, the attack surface is more complex and widely spread, making prevention even harder to achieve. In this virtual roundtable, we address the results and implications of the ground-breaking research The Economic Value of Prevention in the Cybersecurity Lifecycle. Conducted by the Ponemon Institute and sponsored by Deep Instinct, the report analyses the cost savings that can be taken in an efficient, zero-time prevention model.

View More

Succeeding with Operational Resiliency in a New Era

Join us for this roundtable where we will discuss how business recovery must expand to focus on how to build a resilient business – one that can adapt and withstand disruptive events that are sure to come and continue to not only survive but achieve financial and operational targets and continue to grow. We will also talk about how business resiliency approaches must be built upon an integrated risk management approach.

View More

Accelerate Digital Commerce By Preparing for EMV 3DS 2.x

Both Visa and Mastercard are preparing to end their support for EMV 3DS 1.0 in the coming months so ever more important for organisations to ensure readiness for EMV 3DS 2.x standards. The 2.x updated protocol of 3D Secure brings several improvements in a world of card-not-present e-commerce, including creating a secure and frictionless digital shopping experience for consumers, lowering fraud rates and risk of losses as well as increasing revenues for companies that deploy it.

View More

Analytics strategy versus culture - Match made in heaven or a match made in hell?

Are all enterprise analytics implementations doomed to fail? Time and time again we see a new BI strategy designed to unite the organisation break down when those managing data and analytics don't see eye to eye with those consuming it. However, in today's day and age, failure is no longer an option: it is imperative that an organisation's data and analytics strategy takes into consideration the needs of the whole business and all its users. But how? If failure is no longer an option, what are you doing or going to do about it?

View More

Tackling the Grey IT dilemma

People who manage mission-critical SaaS applications such as SAP or Salesforce often aren't IT. Take HR, for instance. HR leaders use applications to provision and deprovision users, provide payroll, connect to other internal apps, and more. With the push to remote work caused by the pandemic, other departments have also rushed to embrace the cloud's power and flexibility. But who's checking to ensure these connections are all secure? This challenge has brought on the rise of Grey IT – applications the company may be aware of but aren't governing.

View More

How can we use GRC as a business enabler?

Governance, risk, and compliance (GRC) are three related facets that aim to assure an organization reliably achieves objectives, addresses uncertainty and acts with integrity but how often are they used as a control mechanism rather than as a real opportunity for business improvement?

View More

Security Debt? - Hindsight is 2020

Join us for an intimate roundtable conversation around changes we saw in 2020, how the security leaders and practitioners we spoke with adapted and maintained a positive attitude, and what’s to come in 2021.

View More

Secure Digital Transformation: A single privacy framework for risk reduction & value creation

Join this private close-door Virtual Roundtable where we will discuss how the digital revolution is changing our customers’ lives, how the insight from this newly acquired data can drive modern corporations and how the digital transformation presents a significant vulnerability.

View More

Customer IAM: From Myths to Mastery

Customer identity is a hidden danger lurking in every application. Done well, it just works. Done poorly it frustrates your users, gets complicated as you consider policies and regulations, and doesn’t effectively protect your customers or your organization. Unfortunately, the line between “done well” and “done poorly” is thin, hard to detect, and better described using hieroglyphics and 6-dimensional space.

View More

Switch from post-mortems to pre-mortems, respond to incident before they occur

Join us for this private, closed-door Virtual Roundtable where we will be having a deeper discussion around the operational effectiveness of security technologies and their assessment methods.

View More

Moving to the Cloud and the dangers of standing still

During this closed-door, peer-led session, we will tackle some of the challenges businesses face in 2021 and what they can do to overcome the main obstacles.

View More

Accelerate Digital Commerce By Preparing for EMV 3DS 2.x

Both Visa and Mastercard are preparing to end their support for EMV 3DS 1.0 in the coming months so ever more important for organisations to ensure readiness for EMV 3DS 2.x standards. The 2.x updated protocol of 3D Secure brings several improvements in a world of card-not-present e-commerce, including creating a secure and frictionless digital shopping experience for consumers, lowering fraud rates and risk of losses as well as increasing revenues for companies that deploy it.

View More

Security at the speed of DevOps

Join us for this closed door, peer-lead, 90-minute Virtual Roundtable to discuss DevOps-driven software development approaches are pervasive among organizations embracing the cloud.

View More

Security Debt? - Hindsight is 2020

Join us for an intimate roundtable conversation around changes we saw in 2020, how the security leaders and practitioners we spoke with adapted and maintained a positive attitude, and what’s to come in 2021.

View More

Reimagining Customer Experience: Realise Results and Deliver Business Value

Join this virtual roundtable to learn how the latest innovations in Cloud and AI technology are helping customer service professionals reimagine their customer experience to better serve their customers, improve the agent experience and realise business results

View More

Subscribe to be the first to know about our launch and special events