Register

1
2

Events

March 2021
05

Security at the speed of DevOps

Join us for this closed door, peer-lead, 90-minute Virtual Roundtable to discuss DevOps-driven software development approaches are pervasive among organizations embracing the cloud.

View More

Death of the Firewall – does it have a purpose in 2021?

Join this private, 90-minute virtual roundtable where cybersecurity professionals share their views, insights and challenges surrounding the status of the firewall in 2021.

View More

Modern IAM: Making the Business and Security Case

Guided by insight from event sponsors Baber Amin, CTO at Ping Identity, and Cody Cook, Vice President – Technology and Partnerships, this event will draw upon the first-hand experience from the attendees, offering thoughts on how they have been able to address and manage the challenges of modern IAM.

View More

Protecting Your Weakest Links

Join us for this peer lead, closed-door Virtual Roundtable where we will be discussing the weakest links facing the industry and how to strengthen them

View More

How well does your endpoint security strategy meet the mark?

Many CISO's are finding that the blind spots that aren't being addressed in their endpoint security strategy are limiting their effectiveness. Join us to learn more about these blind spots and to discuss with your peers the challenges you face and how to best address them.

View More

Security Debt? - Hindsight is 2020

Join us for an intimate roundtable conversation around changes we saw in 2020, how the security leaders and practitioners we spoke with adapted and maintained a positive attitude, and what’s to come in 2021.

View More

Enhanced Customer Experience & Digital Transformation through Identity

Join us for a private virtual roundtable session around the enhanced customer experience & Digital transformation through identity

View More

Enhanced Customer Experience & Digital Transformation through Identity

Join us for a private, 90-minute, virtual roundtable session around the enhanced customer experience & digital transformation through identity.

View More

Protecting Your Weakest Links

Join us for this peer lead, closed-door Virtual Roundtable where we will be discussing the weakest links facing the industry and how to strengthen them.

View More

Is Your Enterprise Effective at Preventing Cyberattacks as your Employees Work from Home?

Understand and explore the different areas of the cybersecurity lifecycle during this 90 minute, peer-led roundtable, discussing different methods of optimization to achieve effective levels of defence at a reasonable cost.

View More

How do we stop attacks before they stop us?

During this expert-led roundtable, we will explore the constantly changing cyber threat landscape in order to find the needed solutions focussing on stopping cyber-attacks before they damage our enterprises.

View More

Evolution or Revolution - How do you avoid “we’ve always done it this way”?

Join us for this closed door, peer lead Virtual Roundtable where we will be discussing what gets in the way of good decision making as well as taking a deeper look at the many factors that influence different types of security risk.

View More

The Modern SOC - Uniting MDR with Microsoft® Azure Sentinel and Defender XDR

Join us for an intimate peer-led roundtable conversation discussing the new approaches needed towards cybersecurity and how organizations are able to meet the demands of the next-gen cyber threats.

View More

How to stop an attack before it stops you?

Cette table ronde réunira un groupe de dirigeants du secteur de l’IT et de la cybersécurité de toute la France. Le thème central discuté sera autour de la sécurité : « Comment stopper les cyberattaques avant qu’elles nous vous arrêtent ?

View More

The Future of Customer Engagement

During this private, closed-door Virtual Roundtable we will be discussing, how digital engagement, software agility and cloud scalability can be the future of customer engagement.

View More

What you can’t see will hurt you: Do you have all the information you need to protect your organisation?

This 90-minute roundtable discussion, sponsored by CCM vendor Panaseer, brings together a select group of senior security executives to enable a peer-led debate drawing on personal experiences to understand how to address this problem.

View More

Why Managing Vendor Risk Is An Essential Part of Your Security Program

Join BitSight for an in-depth peer-led discussion on managing third-party vendor risk, discussing all the elements involved and how to improve them.

View More

Defining a Secure and Flexible Path to Data-Centric SASE

Join this private, closed door Virtual Roundtable where we will be discussing the challenges faced in digital transformation, the strategies you’ve embraced to overcome obstacles and how you define SASE nirvana.

View More

Sharing best practices to quantify security performance

During this session, we will describe a practical approach to measuring and tracking security performance in the face of threat evolutions. After all, if you can't measure it, you can’t improve it.

View More

How do we stop attacks before they stop us?

How do you choose the right cybersecurity solutions in a constantly changing cyber threat landscape? Learn from your cross-industry peers in this virtual roundtable discussion, focussing on stopping cyber-attacks before they damage the business.

View More

Systems of Experience - The role of the CIO in shaping the future of work

During this roundtable, we will focus on the role of the CIO amidst this shifting tide and discuss what it takes to create a digital culture to support the future of work.

View More

Working Towards a Passwordless Future

Join us for this private, closed-door Virtual Roundtable where we will be sharing thoughts and best practices on adopting passwordless solutions. We will seek perspectives on what practical steps organizations can implement today as well as common obstacles they may encounter along the way.

View More

Customer Identity and Access Management (IAM): From Myths to Mastery

In this session, we’ll explore some of the background, myths, and approaches to customer identity and access management

View More

Ransomware: it’s not if … but when

Join this interactive roundtable to discuss, debate and learn how you can confidently ensure protection from devastating ransomware attacks, and drive your recovery costs to zero.

View More

Working Towards a Passwordless Future

Join us for this private, closed-door Virtual Roundtable where we will be sharing thoughts and best practices on adopting passwordless solutions. We will seek perspectives on what practical steps organizations can implement today as well as common obstacles they may encounter along the way.

View More

Expanding Internationally with Cloud Communications

Join us for this closed-door, peer-led Virtual Roundtable where professionals from across the IT landscape will be discussing how to navigate the often murky waters of international regulation and build centralized global coverage that matches the quality of legacy carriers without sacrificing the benefits of the cloud?

View More

Security at the speed of DevOps

Join us for this closed door, peer-lead, 90-minute Virtual Roundtable to discuss DevOps-driven software development approaches are pervasive among organizations embracing the cloud.

View More

Is Your Enterprise Effective at Preventing Cyberattacks as your Employees Work from Home?

As more employees are now working from home, the attack surface is more complex and widely spread, making prevention even harder to achieve.

View More

How do we stop attacks before they stop us?

How do you choose the right cybersecurity solutions in a constantly changing cyber threat landscape? Learn from your cross-industry peers in this virtual roundtable discussion, focussing on stopping cyber-attacks before they damage the business.

View More

How do you address increasingly advanced cyber threats with a small security team?

Join us for this closed door, peer-lead, 90-minute Virtual Roundtable to discuss companies with small security teams and limited cybersecurity budgets and the struggles to protect their organizations from today’s increasingly sophisticated cyber threats.

View More

Sharing best practices to quantify security performance

During this session, we will describe a practical approach to measuring and tracking security performance in the face of threat evolutions. After all, if you can't measure it, you can’t improve it.

View More

Analytics strategy versus culture - Match made in heaven or a match made in hell?

Are all enterprise analytics implementations doomed to fail? Time and time again we see a new BI strategy designed to unite the organisation break down when those managing data and analytics don't see eye to eye with those consuming it. However, in today's day and age, failure is no longer an option: it is imperative that an organisation's data and analytics strategy takes into consideration the needs of the whole business and all its users. But how? If failure is no longer an option, what are you doing or going to do about it?

View More

Customer Identity and Access Management (IAM): From Myths to Mastery

In this session, we’ll explore some of the background, myths, and approaches to customer identity and access management

View More

How do you address increasingly advanced cyber threats with a small security team?

Join us for this closed door, peer-lead, 90-minute Virtual Roundtable to discuss companies with small security teams and limited cybersecurity budgets and the struggles to protect their organizations from today’s increasingly sophisticated cyber threats.

View More

Why Managing Vendor Risk Is An Essential Part of Your Security Program

Join BitSight for an in-depth peer-led discussion on managing third-party vendor risk, discussing all the elements involved and how to improve them.

View More

Secure Digital Transformation: A single privacy framework for risk reduction & value creation

The digital revolution is changing our customers’ lives. With social media, digital collaboration, online banking and shopping all make life easier, users have wholeheartedly adopted digital platforms and shared information about their interests, desires, and connections.

View More

Cloud migration: Running the cyber security gauntlet

8% of sea turtle hatchlings scurrying to the sea succumb to predators and do not make it. CISOs will understand this challenge as they contemplate cloud migration. Data centre doors are closing and IT is galloping to the cloud because it offers security, lower cost and greater flexibility, but hybrid networks are hard to secure. How can businesses minimise this risk and how do MDR services need to evolve?

View More

How do we stop attacks before they stop us?

How do you choose the right cybersecurity solutions in a constantly changing cyber threat landscape? Learn from your cross-industry peers in this virtual roundtable discussion, focussing on stopping cyber-attacks before they damage the business.

View More

Subscribe to be the first to know about our launch and special events