Register

1
2

Events

August 2021
01

Future-Proofing IT Compliance: Real World Lessons in Building, Embedding and Scaling an Effective Program

Join us at this closed-door, peer-led Virtual Roundtable for a candid discussion on optimising IT compliance. Hear lessons learned from embedding and scaling an effective program and identify actions you can take to optimise your own program.

View More

The “Sec” in the DevSecOps journey - a CISO’s perspective

We will discuss the stay awake issues of CISOs in the agile/scrum/CI/CD DevOps environment, and what successes we have seen, and also some of areas of “insertion” that CISOs would like to be effective in this new world.

View More

Is your Ecosystem your biggest threat?

Join us for this 90 minute, peer moderated virtual round table where we will be exploring ways to deploying automation to make better, faster decisions that can deliver a competitive advantage in tough marketplace.

View More

Security Debt? - Hindsight is 2020

Join us for an intimate roundtable conversation around changes we saw in 2020, how the security leaders and practitioners we spoke with adapted and maintained a positive attitude, and what’s to come in 2021.

View More

Zero Trust Network Access for the Hybrid Workforce

Attend this private, peer-led virtual roundtable to learn how a fully adaptive ZTNA solution can allow your network access strategy to adapt with the times and secure your modern workforce.

View More

Customer IAM: From Myths to Mastery

Join us at this closed-door, peer-led Virtual Roundtable for a candid discussion about the background, myths, and approaches to customer identity.

View More

Optimizing IT Compliance: Real-world Lessons in Embedding and Scaling an Effective Program

Join us at this closed-door, peer-led Virtual Roundtable for a candid discussion on optimizing IT compliance. Hear lessons learned from embedding and scaling an effective program and identify actions you can take to optimize your own program.

View More

Security at the Speed of DevOps

Join us for this closed door, peer-lead, 90-minute Virtual Roundtable to discuss DevOps-driven software development approaches are pervasive among organizations embracing the cloud.

View More

Customer IAM: From Myths to Mastery

Join us at this closed-door, peer-led Virtual Roundtable for a candid discussion about the background, myths, and approaches to customer identity.

View More

Driving Your Competitive Advantage with Cloud-First Identity and Access Management

Join us for this private, peer-led discussion focusing on the methods of providing a seamless, yet secure, experience for their employees as they need to access both SaaS and on-premises applications

View More

TLC TV Episode 3: Reimagining the Customer Experience

TLC TV is a brand-new entertainment platform brought to you by the Technology Leaders Club. This chat-show style format will feature 60-minutes of live chat and topical debates with leading technology experts, innovators as well as world class stand up comedians.

View More

Sharing Insights Operating Global Dev Teams: Regional Insights

Join us for this private, peer-led discussion, sharing insights about operating a global development team and the practicality of operating over several different regions.

View More

Keeping the criminals out of your ecommerce payments

Please join us for an exclusive interactive virtual roundtable event that will draw from the experiences of the attendees, offering a better understanding of ecommerce, fraud & risk management and 3D-Secure optimization and how organizations can leverage this updated standard within their anti-fraud operations.

View More

How do we stop attacks before they stop us?

Join us for this closed door, peer-led virtual roundtable discussing how to handle an incident in a calm, collected, and methodological manner so a small incident doesn’t turn into a major one or a major one does not progress further.

View More

Creating a culture of safe data sharing to accelerate insights

Join the debate and the ideas exchange with your peers, brought together to discuss the hot topic of how to create a culture of safe data sharing.

View More

The Rise of DDoS Ransom Attacks

Join Thomas Seifert, CFO of Cloudflare, for an interactive 90 minute virtual roundtable covering how organizations can take steps to prepare for and overcome these threats to ensure business continuity.

View More

Security Debt? - Hindsight is 2020

Join us for an intimate roundtable conversation around changes we saw in 2020, how the security leaders and practitioners we spoke with adapted and maintained a positive attitude, and what’s to come in 2021.

View More

How do we stop attacks before they stop us?

Join us for a peer-led, closed-door virtual roundtable discussing the handling of cyber attacks.

View More

Identity in the modern age – how to be successful with your Cloud Strategy

The reason for more and more companies to adopt a cloud-first strategy is not merely to run applications on other people’s computers but to realize tangible advantages in agility, cost reduction and security. Stakeholders from users to program sponsors expect you to run those services with the same availability and scalability they are used to in their private life, from gaming to social networks. You will not meet these expectations with a simple “lift and shift” cloud strategy and let us bring you together to find out why

View More

Igniting Continuous Business Transformation

Join us for a private, peer-led virtual roundtable where we will be discussing how you can ignite continuous business transformation with cloud, data, automation, and analytics at scale.

View More

Managing fraud in a high challenge environment

Please join us for this private, closed-door virtual roundtable where we will be taking a deeper look at managing fraud in a high challenge environment

View More

Rethinking Application Security in the API-First Era

Join this closed-door, peer-led virtual roundtable to discuss how to rethink our application security strategies so that they can be integrated across the entire API lifecycle.

View More

How do we stop attacks before they stop us?

How do you choose the right cybersecurity solutions in a constantly changing cyber threat landscape? Learn from your cross-industry peers in this virtual roundtable discussion, focussing on stopping cyber-attacks before they damage the business.

View More

Creating a Seamless and Optimal Customer Journey via Omni Channel Data-Driven Marketing Strategy

We warmly invite you to a 90-minute virtual roundtable in an informal setting, as we dive deeper into key questions and issues specific to the telecommunications industry...

View More

Driving Your Competitive Advantage with Cloud-First Identity and Access Management

We will discuss: How can security and IT teams provide employees with a seamless, yet secure, experience as they need to access both SaaS and on-premises applications? How can organisations leverage a cloud-first approach to better manage their applications as well as identity and access management (IAM)? What are the best ways for organisations to leverage newer technologies to help scale their infrastructure to meet customer needs?

View More

Ransomware: the extortionists have upped their game, are your defenders keeping up?

The last couple of years have forced many businesses to reinvigorate or kick start their digital transformations and cloud adoptions. New approaches and new solutions require new ways of working. The new ways do not appear to be keeping the attackers out but they can help us better prepare, respond, and recover if we fall victim.

View More

Ransomware: Getting to know the enemy

Every organization today is concerned about security and the inevitability of a ransomware attack. Experts predict that ransomware attacks will take place every 11 seconds by 2021 and with multi-generational data sprawl increasing your attack surface, recovering from a malicious attack is becoming increasingly difficult.

View More

Ransomware: Getting to know the enemy

Every organization today is concerned about security and the inevitability of a ransomware attack. Experts predict that ransomware attacks will take place every 11 seconds by 2021 and with multi-generational data sprawl increasing your attack surface, recovering from a malicious attack is becoming increasingly difficult.

View More

Cloud Migrations: Dare Mighty Things

Part of any organisation’s success strategy is continuous monitoring for risks: A cloud migration, if successful, can set your company on the path to mighty things. Yet, it too is risky. With continuous insight into the threats and where you stand vs your risk tolerance, you gain the confidence to push harder, make wiser decisions, and lead your transformation to unprecedented success.

View More

Driving Your Competitive Advantage with Cloud-First Identity and Access Management

Many organisations are operating their IT environment in a hybrid state. While the cloud has allowed organisations to realize new levels of efficiency and ROI by leveraging modern approaches such as SaaS, a certain number of apps will likely remain on-premises for the foreseeable future. How can security and IT teams provide employees with a seamless, yet secure, experience as they need to access both SaaS and on-premises applications? How can organisations leverage a cloud-first approach to better manage their applications as well as identity and access management (IAM)?

View More

Is identity the cornerstone of every good security model? How do you compare?

Together we will explore the shifts in the security landscape that led to the creation of “beyondcorp” and how organizations can utilize identity and access management as a critical building block for a successful Zero Trust implementation. By shifting access controls from the network perimeter to individual users, service accounts, apis and non-human identities, zero trust enables safe and secure work from virtually any location with a network connection.

View More

Subscribe to be the first to know about our launch and special events