Register

1
2

Events

January 2021
27

Has the transformation of remote workers meant it is time for an alternative to your VPN?

Applications are now running in cloud and users are accessing them from everywhere. This means that organizations no longer control the network, making it impossible to do network security, and disrupting 25 years of remote access technology. Transformation has created a need for a better approach to remote access.

View More

The Ecosystem is the Threat: Best Practices to Enable Mission Critical Cybersecurity

Scaling cybersecurity is important to protect your entire cybersecurity ecosystem. Integrating real-time threat intelligence to continuously improve security posture is essential in today's current climate as well as deploying automation to make better, faster decisions.

View More

Sharing best practices to quantify security performance

Security is seen as a necessary cost of doing business by many and a business enabler by the rest. However few are able to measure security performance and quantify security gains after investing in people processes or technology. Attend this session where we will describe a practical approach to measuring and tracking security performance in the face of threat evolutions. After all, if you cant measure it you can’t improve it.

View More

Security at the speed of DevOps

DevOps-driven software development approaches are pervasive among organizations embracing the cloud. Unlike traditional software development approaches, DevOps helps organizations shorten the time it takes to build and ship cloud applications. Introducing security early in the software development lifecycle, along with continuous monitoring in production environments, improves the overall security posture of cloud applications and reduces business risk.

View More

Death of the Firewall – does it have a purpose in 2021?

In the last decade, cloud usage has experienced tremendous growth and our network architectures have changed to suit. As the use of our internal networks has changed, do we still have legacy technologies that are actually providing no value?

View More

Securing a borderless enterprise

Today’s enterprise is truly borderless. The network perimeter is dissolving with digital transformations like SD-WAN, IoT, and hybrid cloud, complicating traditional security approaches. Securing evolving IT architectures is becoming one more challenge that short-staffed security teams are facing today. What’s needed is a foundational approach that is simple yet pervasive, cost-effective yet powerful and boosts the efficiency of security operations through automation.

View More

Why 2021 Could Take Ransomware to New Heights

Ransomware is almost always listed as the CISO’s top concern, and that’s reasonable given the incredible damage such an attack can create. Nevertheless, statistics suggest that ransomware is not the primary security threat and that cyber criminals are finding greater profits elsewhere. Across 2021, however, the concern is that the similarity in attack techniques, the expected evolution in ransomware techniques, the continuing adoption of cloud, and an increased collaboration between criminal groups, has the potential to accelerate the ransomware problem to new, and worrying, heights.

View More

Security Debt? - Hindsight is 2020

When the world shifted to working from home, companies saw on average a 71.9% increase in authentications due to remote access. Authentications to virtual private networks (VPN) and remote desktop protocol (RDP) swelled by 60%.*

View More

IT as Innovation Center

Most organizations still look at IT as a cost center. Even those organizations protesting otherwise often prove the point with automatic RFPs for all new solutions. Shifting the perception to IT as innovation center requires a proactive effort to both generate and capture ideas. It also requires a way to measure the value of innovation in a manner that resonates with the business while rewarding the individual contributors.

View More

What you can’t see will hurt you: Do you have all the information you need to protect your organisation?

The contemporary CISO has to make informed business decisions about risk while simultaneously balancing the board, regulators, customers, investors and more. Achieving this, requires collection, analysis, and tailoring of a mass of complex information so it is relevant for each stakeholder group. The myriad of sources makes this hard, which can ultimately compound bad decision-making. Those who are aware of this build their own tools or undertake lengthy and careful audits, both of which incur cost, take time and are not scalable. Gaining a solid understanding of the environment they manage may sound obvious but can very quickly become the bane of a CISOs existence. This discussion, sponsored by CCM vendor Panaseer, brings together a select group of senior security executives to enable a peer-led debate drawing on personal experiences to understand how to address this problem.

View More

Revenue Operations Transformation: how to maximize revenue yield through connected customer experiences

Join Ash Finnegan, digital transformation officer at Conga, as she discusses how your organisation can maximise its operational efficiency and boost overall performance by creating a fully connected, end-to-end customer experience

View More

Delivering a real time 360 trusted customer experience

Digital is Data and Data is the lifeblood of your customer experience. The challenge doesn’t stop at collecting, connecting and turning data into insights through data warehouses or data lakes. It also requires delivering insights into apps and services accessible to your customers at the speed of demand. This is particularly true for data about your most precious assets: your customers. Delivering a real time 360 trusted customer experience is critical for today’s organizations which are looking to leverage on customer data to create more business value for both internal and external stakeholders alike. Understand and exchange learnings with executives on how the 360 customer journey can be delivered smoothly while harnessing the power of customer data in this roundtable session with Talend.

View More

Delivering a real time 360 trusted customer experience

Digital is Data and Data is the lifeblood of your customer experience. The challenge doesn’t stop at collecting, connecting and turning data into insights through data warehouses or data lakes. It also requires delivering insights into apps and services accessible to your customers at the speed of demand. This is particularly true for data about your most precious assets: your customers. Delivering a real time 360 trusted customer experience is critical for today’s organizations which are looking to leverage on customer data to create more business value for both internal and external stakeholders alike. Understand and exchange learnings with executives on how the 360 customer journey can be delivered smoothly while harnessing the power of customer data in this roundtable session with Talend.

View More

Customer Identity and Access Management (IAM): From Myths to Mastery

Customer identity is a hidden danger lurking in every application. Done well, it just works. Done poorly it frustrates your users, gets complicated as you consider policies and regulations, and doesn’t effectively protect your customers or your organization. Unfortunately, the line between “done well” and “done poorly” is thin, hard to detect, and better described using hieroglyphics and 6-dimensional space. Regardless of the complexity, we know that a seamless but secure customer experience makes happy customers who visit more often and do more with us each time. In this session, we’ll explore some of the background, myths, and approaches to customer identity.

View More

Death of the Firewall – does it have a purpose in 2021?

In the last decade, cloud usage has experienced tremendous growth and our network architectures have changed to suit. As the use of our internal networks has changed, do we still have legacy technologies that are actually providing no value?

View More

Modern IAM: Making the Business and Security Case

Too many enterprises remain chained to outdated and vulnerable identity and access management technologies –legacy systems that rely on passwords, eat budgets and kill productivity. But as organizations evolve in their digital transformation, they now need modern systems that can manage access and identity at scale with users and customers who need access to applications and resources that are on-premise, in the cloud and mobile. Single sign-on, multifactor authentication, zero trust security – these are all part of the modern IAM suite, and they can deliver solid business benefits that include enhanced productivity, lower cost of ownership and a superior user experience. But what is the roadmap for this modern IAM journey? How can enterprises integrate their existing IAM infrastructure with new components that truly decrease cost and complexity, while at the same time improving the user experience and security? If you’re looking for new answers to these questions, then welcome to this exclusive executive roundtable on Modern IAM: Making the Business – and Security – Case. Guided by insight from event sponsors Baber Amin, CTO at Ping Identity, and Cody Cook, Vice President – Technology and Partnerships, this event will draw upon first-hand experience from the attendees, offering thoughts on how they have been able to address and manage the challenges of modern IAM.

View More

How well does your endpoint security strategy meet the mark?

Synopsis With threats continuing to evolve, it’s no wonder organizations continue to see advanced targeted attacks even with a full stack of endpoint protection platform and endpoint detection and response solutions operating 24 X 7. Consider this: Many CISOs today are finding that the effectiveness of their current security strategy is limited. Why? There are blind spots most endpoint security technologies are not addressing. These gaps leave security leaders and their companies exposed to evolving ransomware and other attacks. Join us on xyz date to learn more about these blind spots and to discuss with your peers the challenges you face and how to best address them.

View More

Systems of Experience - The role of the CIO in shaping the future of work

The role of the CIO has been on a steady rise for the past several years. As companies continue to evolved and the way people work continues to change, the demands from today’s global, mobile and distributed workforce are also rapidly evolving. We’re at a point in time where the CIO, who’s role was once limited to ensuring that IT systems were working smoothly, is now front and centre to defining the digital culture of an organisation with a mega-trend at play that I like to call, ‘Systems of Experience.’

View More

Subscribe to be the first to know about our launch and special events