Events
Empowering Security: Unleashing the Potential of Positive Security Control Models
Can positive application control revolutionize your security strategy? Explore its impact, shift from known threats to comprehensive control, and the crucial need for prioritization in our battle against ransomware. Join us for this private, closed-door roundtable where we will be taking a deeper look at:
View MoreStreaming Data Products & the Road to Operational AI
How does data streaming enable operational AI - the technology taking the world by storm in 2023. Beyond the AI buzz, there is a need to explore how this powerful tool depends on your real-time data and streaming data products to unlock new possibilities for your business.
View MoreEmbedding the Attacker’s Perspective: An Inside Look Into How Hackers Prioritize Targets at Scale
Join IBM for an exciting session that dives into the world of offensive security. It’s clear that attackers and defenders often come to different conclusions around risk - even when looking at the same information - and environments change too frequently to rely on annual point-in-time penetration testing. In this session, we will pull back the curtain to show you how to discover exposures before attackers do.
View MoreInsider risk verified? You can't fight what you can't see
Seemingly, between geopolitical events and multiple other factors we're in perfect security storm territory. Organisations are downsizing, the cost of living is hitting the pockets of all but the chosen few, and social media tensions are, well, interesting to say the least. With all this chaos afoot, getting a strong hold on insider risk is vital, and for security teams, this is the time to shine brighter than ever.
View MoreEmpowering Security: Unleashing the Potential of Positive Security Control Models
Can positive application control revolutionize your security strategy? Explore its impact, shift from known threats to comprehensive control, and the crucial need for prioritization in our battle against ransomware. Join us for this private, closed-door roundtable where we will be taking a deeper look at:
View MoreBecoming Data-Fit: Is your organisation's data optimised for the age of GenAI?
Data-Fit companies win more often than 'Data-Drifters'. The speed of innovation for building 'data products' is increasingly driven by demand for creating new customer experiences, building intelligent automation into operations, and ensuring employee collaboration with data driven AI tools. The ability to harness any data on any platform and apply it to any AI use case quickly is becoming the key competitive differentiator. The challenge facing data experts today is effectively optimising their data for the age of GenAI.
View MoreManaging Threat – know your enemy, know your allies, know yourself!
We discuss the growing role of Threat Intelligence feeds, reports and information in proactive security strategies – how it’s gathered; how it’s curated; how relevant it is to your business and how you decide on which feeds, reports and actionable intelligence you need, and use, daily. We discuss what the future is for Threat intelligence services and its place in your cybersecurity strategy and for a wider range of businesses; the role for internal and external resource in managing this intelligence in the wider context of improving cybersecurity posture; and what the future cybersecurity provision may look like.
View MoreInsider risk verified? You can't fight what you can't see
Seemingly, between geopolitical events and multiple other factors we're in perfect security storm territory. Organisations are downsizing, the cost of living is hitting the pockets of all but the chosen few, and social media tensions are, well, interesting to say the least. With all this chaos afoot, getting a strong hold on insider risk is vital, and for security teams, this is the time to shine brighter than ever.
View MoreDeveloping a Quantum-Resilient Cryptography Strategy
Quantum computing is an existential threat to current security measures. Join this interactive session for expert perspectives on quantum computing timelines, a look at survey data examining what companies are doing today to prepare, and an overview of how you can get started today on strategies that will provide the agility and efficiency you need to navigate successfully through this industry change.
View MoreUnmasking Mobile Threats: How to Strengthen Defenses and Reduce Risk
In today's digital landscape, the ubiquitous nature of mobile devices has introduced value-creating opportunities in the way we work but also challenges the digital security of data, user identity, and devices.
View MoreEnhance Your Security Ecosystem with Cyber Resilience to Combat Ransomware How to build a proper cyber resilience strategy in the ongoing fight against ransomware
In today's landscape, there's an undeniable surge in cyber attacks. Attackers are becoming increasingly sophisticated, and the question isn't whether we'll be attacked, but when it will happen. This raises the crucial issue: How should organizations equip themselves to identify vulnerabilities and bounce back from a ransomware attack? We invite you to join experts from Cohesity and HPE as they delve into a comprehensive strategy for safeguarding against ransomware and recovery, while also sharing valuable preparedness best practices.
View MoreThe business value of a SAP Clean Core with Data Streaming
Many companies are engaging a transformation program for their SAP core ERP systems to S4/HANA. Innovations in the SAP ecosystem will be delivered cloud first. In order to become agile and cloud ready, SAP is touting a Clean Core implementation.
View MoreKnow your enemy: Understanding how hackers prioritise targets and using it against them
Offensive security is a fast-paced environment. Attackers are constantly upping their game and it is the job of security experts to stay ahead. However, even when looking at the same information, it’s clear that attackers and defenders often come to dramatically different conclusions around risk. Therefore, by better understanding the attacker’s perspective, security experts will be more able than ever to second guess their opponents and head them off before they get in.
View MoreNavigating the Challenges of Private Networks
Private networking, an industry set to reach USD 7.7 billion by 2027, is a compelling alternative to traditional WANs and in-building coverage solutions. Its rapid adoption is largely driven by security and network resiliency concerns, however, it is not without challenges, such as high deployment costs, network complexity, and the need for skilled personnel. Navigating the challenges of Private Networks requires comprehensive testing throughout the lifecycle from design to deployment and even then, spectrum leasing, private ownership, and asset integration need consideration.
View MoreHow can financial services organisations establish trust in a digital world?
During the meeting, we will focus on questions such as: - What is the importance of trust in financial services and how can it be measured? What has damaged trust in recent years and how can that trust be rebuilt?
View MoreTackling the Grey IT dilemma
People who manage mission-critical SaaS applications such as SAP or Salesforce often aren't IT. Take HR, for instance. HR leaders use applications to provision and deprovision users, provide payroll, connect to other internal apps, and more. With the push to remote work caused by the pandemic, other departments have also rushed to embrace the cloud's power and flexibility. But who's checking to ensure these connections are all secure? This challenge has brought on the rise of Grey IT – applications the company may be aware of but aren't governing.
View MoreZero Trust: Good Idea, but what's next?
Join us for an intimate roundtable conversation around the strategic approach to address the increasing needs of a business and the multiple elements of their hybrid cloud and on-prem environments.
View MoreDevSecOps at Scale for Digital Innovation
An executive lunch roundtable for business leaders, security & DevOps specialists with an interest in accelerating DevSecOps adoption. Join this private close-door Virtual Roundtable, led by peers including Ramsés Gallego, International Chief Technology Officer for MicroFocus; where we will discuss how to make DevSecOps work and bridging the gap between your application developers and security alongside much more.
View MoreCustomer IAM: From Myths to Mastery
Customer identity is a hidden danger lurking in every application. Done well, it just works. Done poorly it frustrates your users, gets complicated as you consider policies and regulations, and doesn’t effectively protect your customers or your organization. Unfortunately, the line between “done well” and “done poorly” is thin, hard to detect, and better described using hieroglyphics and 6-dimensional space.
View MoreWhy Managing Vendor Risk Is An Essential Part of Your Security Program
Join BitSight for an in-depth peer-led discussion on managing third-party vendor risk, discussing all the elements involved and how to improve them.
View MoreSecurity Debt? - Hindsight is 2020
Join us for an intimate roundtable conversation around changes we saw in 2020, how the security leaders and practitioners we spoke with adapted and maintained a positive attitude, and what’s to come in 2021.
View MoreThe Rise and Risk of SaaS Apps: How to Keep Your Organization Protected when migrating ERP & mission-critical applications to the cloud
Join us for this closed door, peer lead Virtual Roundtable where we will be discussing the core tenants in a business application resiliency plan, why cloud-asset mapping is a crucial first step and the common pitfalls in securing SaaS-based business applications.
View MoreComment exploiter au maximum le rendement du chiffre d’affaires grâce à l’expérience client ?
Au cours de notre évènement, nous discuterons l'accélération des programmes de transformation digitale cette année et la capacité à simplifier la gestion du revenu.
View MoreThe Rise and Risk of SaaS Apps: How to Keep Your Organization Protected when migrating ERP & mission-critical applications to the cloud
Join us for this closed door, peer lead Virtual Roundtable where we will be discussing the core tenants in a business application resiliency plan, why cloud-asset mapping is a crucial first step and the common pitfalls in securing SaaS-based business applications.
View MoreWhy Zero Trust Done Right is Least Trust
Join us for this private, closed-door virtual roundtable where we will be taking a deeper look at trust and authentication within the cybersecurity space.
View MoreSecurity at the speed of DevOps
Join us for this closed door, peer-lead, 90-minute Virtual Roundtable to discuss DevOps-driven software development approaches are pervasive among organizations embracing the cloud.
View More'Protecting your IT and IoT with Zero Trust Access'
Shadow IoT devices and traffic are quickly growing in organizations and posing many new threats and questions about how to best architect security to protect the enterprise.
View MoreCustomer IAM: From Myths to Mastery
In this session, we’ll explore some of the background, myths, and approaches to customer identity...
View MoreCloud Migrations: Dare Mighty Things
Part of any organisation’s success strategy is continuous monitoring for risks: A cloud migration, if successful, can set your company on the path to mighty things.
View MoreDriving Your Competitive Advantage with Cloud-First Identity and Access Management
We will discuss: How can security and IT teams provide employees with a seamless, yet secure, experience as they need to access both SaaS and on-premises applications? How can organisations leverage a cloud-first approach to better manage their applications as well as identity and access management (IAM)? What are the best ways for organisations to leverage newer technologies to help scale their infrastructure to meet customer needs?
View MoreRansomware: the extortionists have upped their game, are your defenders keeping up?
The last couple of years have forced many businesses to reinvigorate or kick start their digital transformations and cloud adoptions. New approaches and new solutions require new ways of working. The new ways do not appear to be keeping the attackers out but they can help us better prepare, respond, and recover if we fall victim.
View MoreRansomware: Getting to know the enemy
Every organization today is concerned about security and the inevitability of a ransomware attack. Experts predict that ransomware attacks will take place every 11 seconds by 2021 and with multi-generational data sprawl increasing your attack surface, recovering from a malicious attack is becoming increasingly difficult.
View MoreIgniting Continuous Business Transformation
Join us for this private, closed-door virtual roundtable where we will be taking a deeper look at how you can ignite continuous business transformation with cloud, data, scalability, automation, and analytics.
View MoreRansomware: Getting to know the enemy
Every organization today is concerned about security and the inevitability of a ransomware attack. Experts predict that ransomware attacks will take place every 11 seconds by 2021 and with multi-generational data sprawl increasing your attack surface, recovering from a malicious attack is becoming increasingly difficult.
View MoreCloud Migrations: Dare Mighty Things
Part of any organisation’s success strategy is continuous monitoring for risks: A cloud migration, if successful, can set your company on the path to mighty things. Yet, it too is risky. With continuous insight into the threats and where you stand vs your risk tolerance, you gain the confidence to push harder, make wiser decisions, and lead your transformation to unprecedented success.
View MoreOptimizing IT Compliance: Real-world Lessons in Embedding and Scaling an Effective Program
Join us at this closed-door, peer-led Virtual Roundtable for a candid discussion on optimizing IT compliance. Hear lessons learned from embedding and scaling an effective program and identify actions you can take to optimize your own program.
View MoreDriving Your Competitive Advantage with Cloud-First Identity and Access Management
Many organisations are operating their IT environment in a hybrid state. While the cloud has allowed organisations to realize new levels of efficiency and ROI by leveraging modern approaches such as SaaS, a certain number of apps will likely remain on-premises for the foreseeable future. How can security and IT teams provide employees with a seamless, yet secure, experience as they need to access both SaaS and on-premises applications? How can organisations leverage a cloud-first approach to better manage their applications as well as identity and access management (IAM)?
View MoreAre passwords leading us towards a security crisis?
Join us for a closed-door, peer-led virtual roundtable discussing the security of our digital IDs and whether passwords are leading us towards a security crisis.
View MoreIs identity the cornerstone of every good security model? How do you compare?
Together we will explore the shifts in the security landscape that led to the creation of “beyondcorp” and how organizations can utilize identity and access management as a critical building block for a successful Zero Trust implementation. By shifting access controls from the network perimeter to individual users, service accounts, apis and non-human identities, zero trust enables safe and secure work from virtually any location with a network connection.
View MoreHow do we stop attacks before they stop us?
Join us for this closed door, peer-led virtual roundtable discussing how to handle an incident in a calm, collected, and methodological manner so a small incident doesn’t turn into a major one or a major one does not progress further.
View MoreHow do we stop attacks before they stop us?
Join us for this closed door, peer-led virtual roundtable discussing how to handle an incident in a calm, collected, and methodological manner so a small incident doesn’t turn into a major one or a major one does not progress further.
View MoreRethinking Security as a business enabler
Join us for this closed door, peer-lead, 90-minute Virtual Roundtable to discuss the best practices to raise awareness and understanding of the cybersecurity challenge in organisations and how Covid changed the working environment.
View MoreCan you restore your critical business services as fast as your competitors can restore theirs?
In the last year and a half, digital transformation has become a top priority for business leaders everywhere. New tech, new skills and a new attack surface mean those leaders must prepare for the worst if they are to feel confident they can succeed in all that the Internet can throw at them. Faster response to service disruptions has become crucial in getting the best in customer, partner and shareholder relations.
View MoreIs Your Enterprise Effective at Preventing Cyberattacks as your Employees Work from Home?
Understand and explore the different areas of the cybersecurity lifecycle during this 90 minute, peer-led roundtable, discussing different methods of optimization to achieve effective levels of defence at a reasonable cost.
View MoreRethinking Security as a business enabler
Join us for this closed door, peer-lead, 90-minute Virtual Roundtable to discuss the best practices to raise awareness and understanding of the cybersecurity challenge in organisations and how Covid changed the working environment.
View MoreAutomatisez SAP pour de meilleures données et des processus plus rapides.
Au cours de notre évènement, nous discuterons les processus de création de données SAP et les défis.
View MoreCan you restore your critical business services as fast as your competitors can restore theirs?
In the last year and a half, digital transformation has become a top priority for business leaders everywhere. New tech, new skills and a new attack surface mean those leaders must prepare for the worst if they are to feel confident they can succeed in all that the Internet can throw at them. Faster response to service disruptions has become crucial in getting the best in customer, partner and shareholder relations.
View MoreChallenges with Remote Delivery and Remote Maturity Model
Join our virtual, private and peer-led roundtable, experts will weigh in the challenges of remote delivery, and the necessary best practices for operating successfully within a distributed workforce. Additionally, the panelists will discuss how organizations can hire and retain top talent and ultimately distinguish themselves from their competition by embracing a Remote Maturity model.
View MoreOptimizing IT Compliance: Real-world Lessons in Embedding and Scaling an Effective Program
Join us at this closed-door, peer-led Virtual Roundtable for a candid discussion on optimizing IT compliance. Hear lessons learned from embedding and scaling an effective program and identify actions you can take to optimize your own program.
View MoreThe Path to Zero Trust: A Security Paradigm Shift
As the traditional perimeter continues to blur, the more zero trust comes into focus. The seismic shift to remote working and shift to the cloud have also accelerated the demise of the traditional perimeter and is driving an increased focus on zero trust. Many organizations have begun to embrace zero trust frameworks and are building these into their security strategies. Understanding your barriers to zero trust will also help you forge the best path to optimally securing your environment, including upgrading from legacy applications and architectures to ones that support zero trust.
View MoreManaging fraud in a high challenge environment
Please join us for this private, closed-door virtual roundtable where we will be taking a deeper look at managing fraud in a high challenge environment
View MoreIs identity the cornerstone of every good security model? How do you compare?
Together we will explore the shifts in the security landscape that led to the creation of “beyondcorp” and how organizations can utilize identity and access management as a critical building block for a successful Zero Trust implementation.
View MoreHow do we stop attacks before they stop us?
Join us for this closed door, peer-led virtual roundtable discussing how to handle an incident in a calm, collected, and methodological manner so a small incident doesn’t turn into a major one or a major one does not progress further.
View MoreOptimizing IT Compliance: Real World Lessons in Building, Embedding and Scaling an Effective Program
Join us at this closed-door, peer-led Virtual Roundtable for a candid discussion on optimising IT compliance. Hear lessons learned from embedding and scaling an effective program and identify actions you can take to optimise your own program.
View MoreHow do we stop attacks before they stop us?
How do you choose the right cybersecurity solutions in a constantly changing cyber threat landscape? Learn from your cross-industry peers in this virtual roundtable discussion, focussing on stopping cyber-attacks before they damage the business.
View MoreModern DLP – Why Traditional Approaches Won’t Solve Your Insider Threat Problem
Join us and a specially selected group of your peers in an open discussion about how DLP can be introduced without the usual friction with the business and how contextual classification with granular controls can get an effective DLP solution operational quickly.
View MoreDriving Your Competitive Advantage with Cloud-First Identity and Access Management
Many organisations are operating their IT environment in a hybrid state. While the cloud has allowed organisations to realize new levels of efficiency and ROI by leveraging modern approaches such as SaaS, a certain number of apps will likely remain on-premises for the foreseeable future. How can security and IT teams provide employees with a seamless, yet secure, experience as they need to access both SaaS and on-premises applications? How can organisations leverage a cloud-first approach to better manage their applications as well as identity and access management (IAM)?
View MoreEmbracing the Cloud for “Innovation at Scale”
Join us and a select group of your peers for this private virtual roundtable where we will be taking a deeper look at how companies can accelerate their digital transformation by embracing the cloud in the right way.
View MoreHow can we use GRC as a business enabler?
Join us for this private, closed-door Virtual Roundtable where we will be taking a deeper look at governance, risk, and compliance and their use as a control mechanism vs an opportunity for business improvement.
View MoreBest practices for building customer 360 initiatives that earn customers for life
To succeed in today’s hypercompetitive business environment, it is essential to build lasting, meaningful customer relationships. But many companies struggle to understand who their customers are, what they want, and how to meet their needs. Join Talend and discover how build a healthy data environment that will make your customer 360 initiatives a success.
View MoreCan you restore your critical business services as fast as your competitors can restore theirs?
In the last year and a half, digital transformation has become a top priority for business leaders everywhere. New tech, new skills and a new attack surface mean those leaders must prepare for the worst if they are to feel confident they can succeed in all that the Internet can throw at them. Faster response to service disruptions has become crucial in getting the best in customer, partner and shareholder relations.
View MoreIs Your Enterprise Effective at Preventing Cyberattacks as your Employees Work from Home?
In this virtual roundtable, we address the results and implications of the ground-breaking research The Economic Value of Prevention in the Cybersecurity Lifecycle. Conducted by the Ponemon Institute and sponsored by Deep Instinct, the report analyses the cost savings that can be taken in an efficient, zero-time prevention model.
View MoreModern DLP – Why Traditional Approaches Won’t Solve Your Insider Threat Problem
Join us and a specially selected group of your peers in an open discussion about how DLP can be introduced without the usual friction with the business and how contextual classification with granular controls can get an effective DLP solution operational quickly.
View MoreAre passwords leading us towards a security crisis?
Join us for a closed-door, peer-led virtual roundtable discussing the security of our digital IDs and whether passwords are leading us towards a security crisis.
View MoreThe future is document workflows, will you be ready before your competitors?
During this private, peer-led virtual roundtable we will be discussing how you can work faster, more secure and improve both the customer and employee experience, all by automating workflows beyond eSignature.
View MoreHow do we stop attacks before they stop us?
How do you choose the right cybersecurity solutions in a constantly changing cyber threat landscape? Learn from your cross-industry peers in this virtual roundtable discussion, focussing on stopping cyber-attacks before they damage the business.
View MoreAre passwords leading us towards a security crisis?
The security of our digital IDs has never been more important: from cloud services that have kept businesses functioning through the rapid shift to remote working, to providing access to essential consumer services. This virtual roundtable will give you the opportunity to network with your peers as we discuss how to solve one of the biggest security challenges and how new approaches to secure authentication can unlock potential for business users and consumers in providing a safe, secure and seamless experience for accessing apps and services online.
View MoreAre passwords leading us towards a security crisis?
The security of our digital IDs has never been more important: from cloud services that have kept businesses functioning through the rapid shift to remote working, to providing access to essential consumer services. This virtual roundtable will give you the opportunity to network with your peers as we discuss how to solve one of the biggest security challenges and how new approaches to secure authentication can unlock potential for business users and consumers in providing a safe, secure and seamless experience for accessing apps and services online.
View MoreCustomer IAM: From Myths to Mastery
In this session, we’ll explore some of the background, myths, and approaches to customer identity...
View MoreCreating order out of chaos: Natural language as a strategic imperative
In this 90-minute virtual roundtable, we will bring together a select group of your peers to discuss some of the key issues data leaders face today.
View MoreLeave no-one behind: how to unlock your entire digital ecosystem
Join us for a private round table, with a specially selected group of your peers to discuss the 'Integrated Experience' and where we all stand.
View MoreThe Power of Data - The Critical Enabler of Faster Decision Making
In Retail, being at the forefront of having to adapt to changing customer behaviour and interactions, there is no time more critical than now to make better and faster decisions.
View MoreRansomware: Getting to know the enemy
Join us for this thought leadership discussion where we will come together to share best practices and to collectively understand our common enemy, Ransomware.
View MoreSteps to Delivering Relevant, Resilient, and Reliable Digital Services
Both your internal and external customers want intuitive, reliable, secure, and ideally, always available digital services that make their lives easier. To meet these demands, service delivery teams must continually innovate, releasing features quickly and frequently. Join us, as we discuss how to achieve digital service resiliency and deliver reliable customers experiences.
View MoreEmbracing the Cloud to Drive Innovation at Scale
The path for executives is not clear. Moving to the cloud indeed gives flexibility. But should an enterprise “lift and shift” legacy applications? Or re-architect them while moving? Are managed services the right choice – or is lock-in something to be concerned about? What are the fundamental cultural impacts that executives need to address? In short, how can companies accelerate their digital transformation by embracing the cloud in the right way?
View MoreHow do you secure the “Anywhere Workplace?”
Join us for this closed-door, peer-led Virtual Roundtable for a candid discussion with cybersecurity executives from a variety of industries to discuss how to provide secure connectivity for the anywhere workplace. Learn from others’ successes, avoid their previously encountered pitfalls, and share thoughts on protecting the work environments of 2021 and beyond.
View MoreThe Path to Zero Trust: A Security Paradigm Shift
Many organizations have begun to embrace zero trust frameworks and are building these into their security strategies. Understanding your barriers to zero trust will also help you forge the best path to optimally securing your environment, including upgrading from legacy applications and architectures to ones that support zero trust.
View MoreIdentity & Access Management as the Foundation of the Modern Enterprise
Join us for this private, closed door virtual roundtable where we will be taking a deeper look at: As part of the Zero Trust framework, how does Identity & Access Management serve as the final perimeter?
View MoreBuilding an Enterprise-wide Culture of Analytics
Join our exclusive virtual roundtable: get involved, discuss, and share best practices with other high-level executives on how your organizations can transform into data-driven businesses.
View MoreJump Ahead of the Competition with Passwordless Access for your Staff and Customers
Join us for a private roundtable with a specially selected group of your peers to discuss all of the necessities and challenges associated with Zero Trust. As we know, Love it or hate it, Zero Trust is here to stay.
View MoreRethinking Security as a business enabler
Join us for this closed door, peer-lead, 90-minute Virtual Roundtable to discuss the best practices to raise awareness and understanding of the cybersecurity challenge in organisations and how Covid changed the working environment.
View MoreJump Ahead of the Competition with Passwordless Access for your Staff and Customers
Join us for a private roundtable with a specially selected group of your peers to discuss all of the necessities and challenges associated with Zero Trust. As we know, Love it or hate it, Zero Trust is here to stay.
View MoreSimplify Customer Onboarding and Reduce Fraud with Identity Verification
Join us for a private roundtable with a specially selected group of your peers to discuss: The benefits of a cloud-based Identity verification service for customers How to balance security and convenience without unnecessary frictions
View MoreReduce Business Risk: Securing Privileged Access and Implementing Zero-Trust
Join our CISO roundtable as we discuss how to make Zero-Trust work for you. We will cover the techniques used to protect Privileged Accounts, how to make Cloud Transformations secure, and the key elements behind Identity Management.
View MoreAcclimating in times of Disruption. Enabling Transformation.
We will be discussing identification, authentication, and authorization best practices through Identity Governance Administration. This is a great chance to learn more about strengthening your IGA system and how companies can optimize those practices not just to meet compliance, but to prevent identity escalation threats.
View MoreIncreasing the success rates in drug discovery, current practice and next steps to delivering better druggable candidates
There is a strong drive to improve the productivity and efficiency of drug discovery. Jack Scannell’s paper highlighting the decline of R&D really brought this topic into sharp focus. Various industry thought leaders have suggested strategies such as “fast fail”, “ligand efficiency” “the pillars of success”, the “5R framework” etc” to address R&D productivity challenge. These are now positively impacting on success rates, but what are the next big drivers to take the probability of success rates further.
View MoreDriving Your Competitive Advantage with Cloud-First Identity and Access Management
Many organisations are operating their IT environment in a hybrid state. While the cloud has allowed organisations to realize new levels of efficiency and ROI by leveraging modern approaches such as SaaS, a certain number of apps will likely remain on-premises for the foreseeable future.
View MoreAPI First Approach for faster Cloud adoption
Enterprises need to design services that include legacy resources. They want the services to be cloud-native so they can treat them the same way all the rest of their digital systems are handled. Many also want to build the services quickly with an API First approach in mind but struggle since it takes time and different teams to expose legacy resources to cloud systems
View MoreHybrid-cloud - is it the future or just the next technology buzzword?
A hybrid cloud approach to data management for analytics seems like the answer but is it just another buzzword or is it something that enterprises can truly leverage to help their business drive more value from data? This exclusive roundtable is your opportunity to discuss and explore hybrid cloud architecture and the impact it has on people, technology and performance with your peers.
View MoreUsing Data Effectively in Contact Centres to: Identify Next Best Action, Reduce Churn, Increase First Call Resolution and Improve KPIs
Customer experience is the new battleground in driving customer loyalty and is a key channel for any brand. When we consider that the contact centre is one of the most frequently used channels for direct customer interactions, it makes sense that data should be connected and available in real time for our agents and centres to use. Join us as we walk through real examples that will inspire you.
View MoreStart Making Sense: Mining Unstructured Data as a Strategic Capability
In this 90-minute virtual roundtable, we will bring together a select group of your peers to discuss the latest developments in natural language understanding (NLU) and how these techniques are powering customer interactions, language intensive business processes and the mining of intelligence from lakes of knowledge.
View MoreRe-Architecting the Enterprise: The Role of Apache Kafka® and Real-Time Data.
The recent revolution in data infrastructure and application architecture has transformed the way all kinds of organisations, from the traditional to the digital native, work with data. But to truly take advantage of real-time data as the most strategic platform within your company, it must move from the domain of one-off engineering initiatives into a central nervous system for the enterprise. Transformation requires a thoughtful strategy that drives the re-architecting of the enterprise. By joining this one-off round table you will learn how market-leading companies are using real-time data to transform business practices and which use cases they are putting into practice.
View MoreSimplify Customer Onboarding and Reduce Fraud with Identity Verification
In today’s digital-first world, a customer’s first interactions with a brand increasingly occur when registering, opening an account or applying for a service online. If organisations don’t have confidence in their customer’s identity at that first interaction, they are at greater risk of fraudulent account creation and activity. With Identity Verification, organisations can strengthen security by ensuring they have the right level of assurance that customers are who they say they are from the very beginning.
View MoreRebalance your cyber security with a “prevention-first” strategy
It is said that the most efficient way to reduce insider risks is to prevent insider incidents. A prevention-first strategy must also prove effective at rapidly detecting and mitigating the effects of insider threats originating from both malicious and accidental insiders. In this roundtable, we will be discussing the challenges security professionals encounter detecting, preventing, and mitigating cybersecurity threats from individuals with authorised access to systems and data.
View MoreSecurity Debt, Running with Scissors
Security debt, defined by Dave Lewis, Global Advisory CISO, Duo Security at Cisco, as “the accumulation of the patches missed, the risks accepted, and the configurations misapplied,” is a serious and common problem for many organizations, especially with the move to cloud com putting and rise of IoT.
View MoreHybrid-cloud - is it the future or just the next technology buzzword?
A hybrid cloud approach to data management for analytics seems like the answer but is it just another buzzword or is it something that enterprises can truly leverage to help their business drive more value from data? This exclusive roundtable is your opportunity to discuss and explore hybrid cloud architecture and the impact it has on people, technology and performance with your peers.
View MoreWhere's the Sec in Mobile DevOps?
With mobile applications becoming an indispensable platform for organisations, but if left unchecked an easy attack surface for malicious actors, what can you be doing to stay out of the news headlines? Join us on this private, peer led discussion to look at how you can minimise the friction between development deadlines and security requirements with tighter controls from the beginning of the development phase.
View MoreHybrid-cloud - is it the future or just the next technology buzzword?
A hybrid cloud approach to data management for analytics seems like the answer but is it just another buzzword or is it something that enterprises can truly leverage to help their business drive more value from data? This exclusive roundtable is your opportunity to discuss and explore hybrid cloud architecture and the impact it has on people, technology and performance with your peers.
View MoreTLC Reconnect
TLC Reconnect is a new, in-person networking evening dedicated to the Technology Leaders Club community. Taking place at the luxurious Ned Hotel in London, the evening will host over 60 C-Suite and Director level IT, Security and Data executives looking to network and build new connections in the real world!
View MoreEmbracing the Cloud for
The success of a business can be measured by how quickly and reliably it deploys and updates internal and external applications. Customers demand agility and competitors quickly take advantage of stagnation.
View MoreCreating order out of chaos: Natural language as a strategic imperative
Language is central to how we all do business. It shapes processes and it impacts how we communicate with our customers. To get ahead of the competition, your business needs to be capable of understanding how to realize tangible value from language data available from its unstructured inputs. In this 90-minute virtual roundtable, we will bring together a select group of your peers to discuss some of the key issues data leaders face today.
View MoreOptimizing IT Compliance: Real-world Lessons in Embedding and Scaling an Effective Program
Are you frustrated with exhausting all your resources just to sustain your current IT compliance program? And is the outcome you’re achieving delivering the intended benefit to the wider organization? Join us at this closed-door, peer-led Virtual Roundtable for a candid discussion on optimizing IT compliance. Hear lessons learned from embedding and scaling an effective program and identify actions you can take to optimize your own program.
View MoreSecurity Debt, Running with Scissors
Security debt, defined by Dave Lewis, Global Advisory CISO, Duo Security at Cisco, as “the accumulation of the patches missed, the risks accepted, and the configurations misapplied,” is a serious and common problem for many organizations, especially with the move to cloud com putting and rise of IoT.
View MoreHow CIOs can gain data superpowers to manage data pipelines in the face of real time decisions support.
Real-time decision support is a success factor for all businesses impacted by the current global uncertainty as well as the rapid digital transformation of the market. How does this impact the responsibility of CIOs? Do they need to develop data superpowers? Are the existing models of data processes and pipeline adapted to the required speed to insight?
View MoreWhere's the Sec in Mobile DevOps?
Join us on this private, peer led discussion to look at how you can minimise the friction between development deadlines and security requirements with tighter controls from the beginning of the development phase. Together, we will examine the best practices in app security and hear from experienced professionals about how they addressed their own challenges.
View MoreAre passwords leading us towards a security crisis?
The security of our digital IDs has never been more important: from cloud services that have kept businesses functioning through the rapid shift to remote working, to providing access to essential consumer services. This virtual roundtable will give you the opportunity to network with your peers as we discuss how to solve one of the biggest security challenges and how new approaches to secure authentication can unlock potential for business users and consumers in providing a safe, secure and seamless experience for accessing apps and services online.
View MoreHow do we stop attacks before they stop us?
The risk isn’t of “having a security incident” its about handling it in a calm, collected, and methodological manner so a small incident doesn’t turn into a major one. Or worst case, a major one is identified and mitigated in minutes, as opposed to days. This sort of reinforces the “there is no real ROI” argument, as a motivated threat actor will not give up just because they were stopped once.
View MoreSecurity Debt, Running with Scissors
Security debt, defined by Dave Lewis, Global Advisory CISO, Duo Security at Cisco, as “the accumulation of the patches missed, the risks accepted, and the configurations misapplied,” is a serious and common problem for many organizations, especially with the move to cloud com putting and rise of IoT.
View MoreDigital Business: winning technology strategies for your industry
Technology is a key ingredient in driving and sustaining business success. It's a two-sided coin. On one side, it can be a game changer and a way to distinguish your services or offerings. On the other side, get it wrong and an unexpected mishap can be devastating. Join Broadcom and a select group of industry peers to discuss your digital business transformation strategies (people, processes and technology) and the evolving role of the mainframe.
View More2021 End-User Computing State of the Market
End-user computing (EUC) approaches continue to evolve as organizations look to support the needs of a dynamic and changing workplace. Hybrid- and multi-cloud have become a more important variable in the context of work-from-home. Platform flexibility remains important but lowering the bar on complexity has become a more important EUC focus.
View MoreHow can financial services organisations establish trust in a digital world?
During the meeting, we will focus on questions such as: - What is the importance of trust in financial services and how can it be measured? What has damaged trust in recent years and how can that trust be rebuilt?
View MoreThe challenges and the opportunities of the New Enterprise Reality
For many organizations today, successfully engaging with customers and empowering employees in digital environments is essential to business success. But everyone’s quality of experience within today’s digital world is dependent on a wealth of underlying complexities and dependencies.
View MoreSecurity Debt, Running with Scissors
Security debt, defined by Dave Lewis, Global Advisory CISO, Duo Security at Cisco, as “the accumulation of the patches missed, the risks accepted, and the configurations misapplied,” is a serious and common problem for many organizations, especially with the move to cloud com putting and rise of IoT.
View MoreRe-Architecting the Enterprise: The Role of Apache Kafka® and Real-Time Data.
Join us for this private, closed door virtual roundtable where we will be taking a deeper look at: - What business cases are driving the transformation of your business? - Would you like to deepen your knowledge of how of Apache ® Kafka is driving the re-architecting of the enterprise? - How can you further develop your vision for a re-architected enterprise?
View MoreReduce Business Risk: Securing Privileged Access and Implementing Zero-Trust
Join our CISO roundtable as we discuss how to make Zero-Trust work for you. We will cover the techniques used to protect Privileged Accounts, how to make Cloud Transformations secure, and the key elements behind Identity Management. Reduce business risk and maintain productivity by increasing your security posture.
View MoreOptimising the Human Element of Cybersecurity
Human error is the most common portal for cybersecurity breaches. So it stands to reason that human talent is the most valuable defence against attacks. How can organisations reduce risk by making humans the strongest link in the cyber defence line?
View MoreWhy You Should Embrace a Digital Workforce in 2022
Join Brian Atkinson, VP & General Manager of Five9 EMEA, in a virtual roundtable discussion, as he discusses best practices CX Leaders should consider to successfully integrate the productivity of human and virtual agents.
View MoreWhy you'll never get to Zero Trust with Weak Authentication
This virtual roundtable will give you the opportunity to network with your peers as we discuss how to solve one of the biggest security challenges and how new approaches to secure authentication can unlock potential for business users and consumers in providing a safe, secure and seamless experience for accessing apps and services online.
View MoreYour Role in Securing Cloud Applications
The rapid and continuous adoption of cloud applications makes them major targets of cyber criminals to gain illegitimate access to companies’ data and networks in what are called stepping-stone attacks. Join this private, closed-door session where we will discuss how to enhance your approach to cloud application security.
View MoreThe challenges of cloud adoption, can you become agile and maintain momentum whilst remaining secure?
The Flexera 2021 State of the Cloud Report reveals cloud computing trends and whilst it’s no surprise to see 80% of enterprise organisations choosing hybrid, as it gives them greater ability to adapt to change it does also add complexity. We will be focusing on the top 5 cloud adoption challenges identified in the Flexera report and explore with the audience the nature of these challenges, how they have impacted their organisations, and provide insights into how to overcome them
View MoreSteps to Delivering Relevant, Resilient, and Reliable Digital Services
Join us, as we discuss how to achieve digital service resiliency and deliver reliable customers experiences.
View MoreWhat Brands Get Wrong About Customer Authentication
Customer authentication is a critical component of almost every app that exists, because it serves as a product gateway impacting 100% of customers. It’s not easy to get right, and the stakes for getting it right are higher than ever: 46% of customers abandon a transaction because of authentication, and account takeover fraud increased by 292% in 2020.
View MoreLet's talk SASE - lots of noise, now the reality
With the arrival of the Secure Access Service Edge (SASE), network and security professionals are now planning their migration toward this new architecture that adapts to the distributed nature of users and data. SASE promises to reduce complexity and cost; improve performance; increase accessibility; and enhance security. So the question now becomes: what is the best path to bring you all these benefits as you work towards implementing SASE
View MoreThe challenges of cloud adoption, can you become agile and maintain momentum whilst remaining secure?
The Flexera 2021 State of the Cloud Report reveals cloud computing trends and whilst it’s no surprise to see 80% of enterprise organisations choosing hybrid, as it gives them greater ability to adapt to change it does also add complexity. Whilst most organisations have a cloud/digital transformation strategy and plethora of choice the nuances and intricacies do create uncertainty, slow decision making resulting in delayed execution which can become a costly decision.
View MoreData Resiliency in the Cloud
With the explosion of data and the continued escalation of data risk loss and regulatory challenges, the pressure is on. In a world of change and uncertainty, how can we protect and manage data in the cloud? And crucially, how long would it take you to recover from a ransomware attack? Join us for this private, closed door virtual roundtable where we will be taking a deeper look at the security challenges facing businesses today.
View MoreBuilding an Enterprise-wide Culture of Analytics
Despite the growing significance of data and analytics for the DACH market, an alarmingly high percentage of companies have failed in building an enterprise-wide culture of analytics.
View MoreHybrid-cloud - is it the future or just the next technology buzzword?
A hybrid cloud approach to data management for analytics seems like the answer but is it just another buzzword or is it something that enterprises can truly leverage to help their business drive more value from data? This exclusive roundtable is your opportunity to discuss and explore hybrid cloud architecture and the impact it has on people, technology and performance with your peers.
View MoreCyber resilience: How to prevent, protect and recover from Ransomware
Every 11 seconds a company is hit by ransomware. New threats, paired with data living in more places than ever before, requires businesses of all sizes to develop robust resilience strategies. Join us for this private, closed-door virtual roundtable where we will be taking a deeper look at cyber resilience.
View MoreWhy you'll never get to Zero Trust with Weak Authentication
Username and password authentication is still one of the most widely used methods, yet they fail on both security and user experience. Remembering passwords is painful and solutions such as MFA and password vaults not only create extra friction for the user but are not as secure as they seem. Password compromises are the number one cause of hacking related breaches. When it comes to securing our digital IDs it is time for a rethink. This virtual roundtable will give you the opportunity to network with your peers as we discuss how to solve one of the biggest security challenges and how new approaches to secure authentication can unlock potential for business users and consumers in providing a safe, secure and seamless experience for accessing apps and services online.
View MoreHow do we stop attacks before they stop us?
The risk isn’t of “having a security incident” its about handling it in a calm, collected, and methodological manner so a small incident doesn’t turn into a major one. Or worst case, a major one is identified and mitigated in minutes, as opposed to days. This sort of reinforces the “there is no real ROI” argument, as a motivated threat actor will not give up just because they were stopped once.
View MoreOptimizing IT Compliance: Real-world Lessons in Embedding and Scaling an Effective Program
Are you frustrated with exhausting all your resources just to sustain your current IT compliance program? And is the outcome you’re achieving delivering the intended benefit to the wider organization? Join us at this closed-door, peer-led Virtual Roundtable for a candid discussion on optimizing IT compliance. Hear lessons learned from embedding and scaling an effective program and identify actions you can take to optimize your own program.
View MoreReduce Business Risk: Securing Privileged Access and Implementing Zero-Trust
Join our CISO roundtable as we discuss how to make Zero-Trust work for you. We will cover the techniques used to protect Privileged Accounts, how to make Cloud Transformations secure, and the key elements behind Identity Management. Reduce business risk and maintain productivity by increasing your security posture.
View MoreSteps to Delivering Relevant, Resilient, and Reliable Digital Services
Both your internal and external customers want intuitive, reliable, secure, and ideally, always available digital services that make their lives easier. To meet these demands, service delivery teams must continually innovate, releasing features quickly and frequently. So how do you increase your development velocity while maintaining a fully available, disruption-free infrastructure? This balancing act between innovation and uptime can create a performance gap that puts your customer experience and business at risk. Instead of chasing five nines level perfection, organizations need to make their digital services resilient so they can release with confidence, knowing they can bounce back quickly no matter the disruption. Join us, as we discuss how to achieve digital service resiliency and deliver reliable customers experiences.
View MoreDriving Your Competitive Advantage with Cloud-First Identity and Access Management
Many organisations are operating their IT environment in a hybrid state. While the cloud has allowed organisations to realize new levels of efficiency and ROI by leveraging modern approaches such as SaaS, a certain number of apps will likely remain on-premises for the foreseeable future. How can security and IT teams provide employees with a seamless, yet secure, experience as they need to access both SaaS and on-premises applications? How can organisations leverage a cloud-first approach to better manage their applications as well as identity and access management (IAM)? What are the best ways for organisations to leverage newer technologies to help scale their infrastructure to meet customer needs?
View MoreCreating value from unstructured language data: Building better products with NLP
The language within your data assets provides a significant competitive advantage for your company. Unfortunately, too often this data remains an untapped gold mine as organizations lack the resources to fully leverage their language data in a scalable and consistent format. Advances in AI and natural language processing provide the keys to unlocking this data, providing deeper knowledge and insight to create more differentiated data products and improve audience engagement. The challenge is often knowing where to start and how to employ AI strategies to achieve real value. In this 90-minute virtual roundtable, we will bring together a select group of peers to discuss some of the key issues big data providers face today.
View MoreThe 2022 Spin on Ransomware, where is it heading?
2021 was the most active year for ransomware on record — and it’s showing no sign of slowing going into 2022. Over the past few years, we've seen ransomware operators evolve from disorganised splinter groups and individuals to highly sophisticated operations. Ransomware attacks will only continue to evolve, and so, therefore, do our defence mechanisms.
View MoreReduce Business Risk: Securing Privileged Access and Implementing Zero Trust
Join our CISO roundtable as we discuss how to make Zero-Trust work for you. We will cover the techniques used to protect Privileged Accounts, how to make Cloud Transformations secure, and the key elements behind Identity Management. Reduce business risk and maintain productivity by increasing your security posture.
View MoreRansomware: the extortionists have upped their game, are your defenders keeping up?
The last couple of years have forced many businesses to reinvigorate or kick start their digital transformations and cloud adoptions. New approaches and new solutions require new ways of working. The new ways do not appear to be keeping the attackers out, but they can help us better prepare, respond, and recover if we fall victim.
View MoreDon’t underestimate the power of great CX – ensure agility, efficiency and compliance while putting the customer first
Recent studies have shown that the majority of companies believe they offer a superior customer experience (CX) to their competitors. In fact, only 8% of customers actually believe they receive superior CX from companies. Increased regulations, staffing challenges, and higher consumer expectations are all contributing factors in the need for better, data driven, customer experience. For many customer facing organisations, customer retention, improving customer experience, and digital transformation are the top three strategic priorities related to “customer first” communications. In order to provide superior digital interactions that will enhance engagement and drive revenue, a new approach is needed for customer communications teams and customer communications technology.
View MoreReduce Business Risk: Securing Privileged Access and Implementing Zero Trust
Join our CISO roundtable as we discuss how to make Zero-Trust work for you. We will cover the techniques used to protect Privileged Accounts, how to make Cloud Transformations secure, and the key elements behind Identity Management. Reduce business risk and maintain productivity by increasing your security posture.
View MoreMerging Zero Trust and SASE
Organizations are feeling a shift in the world of networking and security as they rapidly adopt and embrace the cloud. Enterprises need efficiency, visibility and security without compromise. The secure access service edge, better known as SASE, and zero trust implementations can provide a more comprehensive security capability to truly support digital transformation.
View MoreDon’t underestimate the power of great CX – ensure agility, efficiency and compliance while putting the customer first
Recent studies have shown that the majority of companies believe they offer a superior customer experience (CX) to their competitors. In fact, Only 8% of customers actually believe they receive superior CX from companies. Increased regulations, staffing challenges, and higher consumer expectations are all contributing factors in the need for better, data driven, customer experience. For many customer facing organisations, customer retention, improving customer experience, and digital transformation are the top three strategic priorities related to “customer first” communications. In order to provide superior digital interactions that will enhance engagement and drive revenue, a new approach is needed for customer communications teams and customer communications technology.
View MoreTLC TV Episode 5: Accelerating the Developer-First Security Movement
Let’s agree that DevOps is as much about practices, processes, mindset, and culture as it is about tools. And we still have a lot to learn and share, as a community. Join this next TLC TV Episode, as we bring Software Engineering teams and Security Leaders together to discuss how we accelerate the Developer-First Movement.
View MoreCustomer IAM: From Myths to Mastery
Customer identity is a hidden danger lurking in every application. Done well, it just works. Done poorly it frustrates your users, gets complicated as you consider policies and regulations, and doesn’t effectively protect your customers or your organization. Unfortunately, the line between “done well” and “done poorly” is thin, hard to detect, and better described using hieroglyphics and 6-dimensional space. Regardless of the complexity, we know that a seamless but secure customer experience makes happy customers who visit more often and do more with us each time. In this session, we’ll explore some of the background, myths, and approaches to customer identity.
View MoreMerging Zero Trust and SASE
Organizations are feeling a shift in the world of networking and security as they rapidly adopt and embrace the cloud. Enterprises need efficiency, visibility and security without compromise. The secure access service edge, better known as SASE, and zero trust implementations can provide a more comprehensive security capability to truly support digital transformation.
View MoreCyber resilience: How to prevent, protect and recover from Ransomware
Every 11 seconds a company is hit by ransomware. New threats, paired with data living in more places than ever before, requires businesses of all sizes to develop robust resilience strategies. Join us for this private, closed-door virtual roundtable where we will be taking a deeper look at cyber resilience.
View MoreWhat Brands Get Wrong About Customer Authentication
Customer authentication is a critical component of almost every app that exists, because it serves as a product gateway impacting 100% of customers. It’s not easy to get right, and the stakes for getting it right are higher than ever: 46% of customers abandon a transaction because of authentication, and account takeover fraud increased by 292% in 2020.
View MoreResilience and agility - it’s time your operating model had both
To thrive in an unpredictable post-pandemic global economy, businesses need to be smarter, faster and have more agility when it comes to their operations. They also need to be incredibly resilient, otherwise they won’t meet the demands of tomorrow’s customer. Data and visibility are at its core. This requires significant changes from the very top of an organisation.
View MoreHow the parcel surge impacts your business
The effects of protracted shipping delays and dramatic rate increases are being felt from the COO’s office to the shipping dock. Meet and discuss with your peers how macro shipping trends, general inflation, and labor pressures in both local and international trade have impacted business operations across industry. Now that the seasonal peak is behind us are you ready to rethink the shipping and mailing decisions we have to make?
View MorePasswordless customer authentication: Reduce friction and increase security
With the explosion of consumers transacting online and accelerated digital transformation, companies are trying to keep up with modern experiences, infrastructure, and products to serve their digital user base. Businesses have adapted with millions moving to or accelerating investments in a digital model. But as more people move digital, what’s been the impact on the consumer?
View MoreIs a future without passwords realistic and secure?
Passwordless authentication is no longer a dream of the distant future. Leaving passwords behind is an important step towards better user experience and security, but how can it be implemented in a secure way?
View MoreLeave no-one behind: how to unlock your entire digital ecosystem
When you have data entered once and then connected safely, securely and quickly everywhere - that is real smart “integration”. The reality is that integration is the perfect foundation for Integrated Experiences but it is not enough. Data readiness, user engagement, and the unified platform are critical to delivering an Integrated Experience. The winners are building a modern tapestry of integrated experiences.
View MoreInvesting in real-time data - how to better understand the benefits, costs, and risks
Join us on April 27th for this virtual roundtable in partnership with Dataminr, where we will discuss how access to early signals of high-impact events and emerging risks can benefit your people and assets and save your organisation time and money when it matters most.
View MoreCyberattacks are on the rise, are you ready to recover maliciously compromised data?
Few traditional disaster recovery programs are designed for recovery from a data compromising cyberattack. Without focused discussions, detailed planning, backup solution enhancement, cyber recovery tests and exercises, and a comprehensive data recovery program; you are putting your business at unnecessary risk to IT service delivery.
View MoreYour Role in Securing Data in Cloud Applications
The rapid and continuous adoption of cloud applications has been pivotal for digital transformation initiatives and enabling global workforces. Their importance to an organization, also makes cloud applications primary targets of cyber criminals to gain illegitimate access to companies’ data and networks. Join this private, closed-door session where we will discuss how to enhance your approach to securing data in cloud applications, using Salesforce as an example.
View MoreMerging Zero Trust and SASE
Organizations are feeling a shift in the world of networking and security as they rapidly adopt and embrace the cloud. Enterprises need efficiency, visibility and security without compromise. The secure access service edge, better known as SASE, and zero trust implementations can provide a more comprehensive security capability to truly support digital transformation.
View MoreHow has the world of hybrid work impacted your joiners, movers, leavers (JML)?
Join us and a small group of industry peers in a behind closed doors frank and open discussion of the highs and lows of JML automation, the policies and processes to reduce risk, reduce cost and stay compliant.
View MoreYour Role in Securing Data in Cloud Applications
Join this private, closed-door session where we will discuss how to enhance your approach to securing data in cloud applications, using Salesforce as an example.
View MoreInsurance: Using text analytics and automation as a competitive advantage
Language is central to how we all do business. It shapes, processes and impacts how we communicate with our customers. This is particularly true for the insurance industry where more than 80% of data is unstructured. To stay ahead of the competition, and keep customers satisfied, your business needs to know how to get value from language data available in underwriting, risk management, claims, customer interactions, etc. In this 90-minute virtual roundtable, we will bring together a select group of your peers to discuss some of the key issues data leaders face today.
View MoreThe Road to Modern Selling: How to Win Over Today’s B2B Buying Teams
B2B buyers have shifted how they buy. Old-school tactics like scripted sales pitches and cold calls just don’t cut it anymore. Today’s digital-first buyers are more informed than ever and are looking for a collaborative buying experience that puts them in the driver's seat. Transform your sales strategy to stop chasing after buyers and start making it easy for them to buy from you.
View MoreCIAM: Increasing Online Security and Customer Experience with Identity
Join Ping Identity and Synetis for this virtual roundtable and learn how to manage the identity of millions of customers to accelerate your revenue and retain your customers.
View MoreModern DLP – Why Traditional Approaches Won’t Solve Your Insider Threat Problem
Join us and a specially selected group of your peers in an open discussion about how DLP can be introduced without the usual friction with the business and how contextual classification with granular controls can get an effective DLP solution operational quickly.
View MoreAn authentication authority for a centralized and trusted single source of identity
Digital transformation is accelerating in every industry as organizations of all sizes fight for market share. Yet many digital transformation initiatives fail to deliver the intended results. Why? Because most existing identity and access management (IAM) systems aren’t able to support the requirements of a digital-first enterprise.
View MorePasswordless customer authentication: Reduce friction and increase security
With the explosion of consumers transacting online and accelerated digital transformation, companies are trying to keep up with modern experiences, infrastructure, and products to serve their digital user base. Businesses have adapted with millions moving to or accelerating investments in a digital model. But as more people move digital, what’s been the impact on the consumer?
View MoreHow To Achieve Best In Class Device Identity Security and Ensure SBoM Readiness
Whether it’s legacy devices or next gen machines, automating identity management throughout the device lifecycle is vital. Without it, you cannot have the device or data trust necessary for complete safety and security. We will discuss best practice ways to manage this, examine use cases in more detail, and look at what you need to do to comply with the upcoming Software Bill of Materials.
View MoreBuilding Trusted Digital Experiences: What is shaping the future for your customers’ expectations?
Join us and a small group of industry peers in a behind closed doors frank and open discussion of how identity is the cornerstone of a trusted digital experience for your customers.
View MoreAn authentication authority for a centralized and trusted single source of identity
Digital transformation is accelerating in every industry as organizations of all sizes fight for market share. Yet many digital transformation initiatives fail to deliver the intended results. Why? Because most existing identity and access management (IAM) systems aren’t able to support the requirements of a digital-first enterprise.
View MoreReducing Business Risk: Securing Privileged Access and Implementing a Zero Trust Strategy
Join our CISO roundtable as we discuss how to make Zero-Trust work for you. We will cover the techniques used to protect Privileged Accounts, how to make Cloud Transformations secure, and the key elements behind Identity Management. Reduce business risk and maintain productivity by increasing your security posture.
View MoreHow has the world of hybrid work impacted your joiners, movers, leavers (JML)?
Join us and a small group of industry peers in a behind closed doors frank and open discussion of the highs and lows of JML automation, the policies and processes to reduce risk, reduce cost and stay compliant.
View MoreCyber resilience: How to prevent, protect and recover from Ransomware
Every 11 seconds a company is hit by ransomware. New threats, paired with data living in more places than ever before, requires businesses of all sizes to develop robust resilience strategies. Join us for this private, closed-door virtual roundtable where we will be taking a deeper look at cyber resilience.
View MoreRe-Architecting the Enterprise: The Role of Apache Kafka® and Data in Motion
The recent revolution in data infrastructure and application architecture has transformed the way all kinds of organisations, from the traditional to the digital native, work with data. But to truly take advantage of data in motion as the most strategic platform within your company, it must move from the domain of one-off engineering initiatives into a central nervous system for the enterprise. Transformation requires a thoughtful strategy that drives the re-architecting of the enterprise. By joining this one-of-a-kind round table you will learn how market-leading companies are using data in motion to transform business practices and which use cases they are putting into practice.
View MoreThe Road to Modern Selling: How to Win Over Today’s B2B Buying Teams
B2B buyers have shifted how they buy. Old-school tactics like scripted sales pitches and cold calls just don’t cut it anymore. Today’s digital-first buyers are more informed than ever and are looking for a collaborative buying experience that puts them in the driver's seat. Transform your sales strategy to stop chasing after buyers and start making it easy for them to buy from you.
View MoreLeave no-one behind: how to unlock your entire digital ecosystem
When you have data entered once and then connected safely, securely and quickly everywhere - that is real smart “integration”. The reality is that integration is the perfect foundation for Integrated Experiences but it is not enough. Data readiness, user engagement, and the unified platform are critical to delivering an Integrated Experience. The winners are building a modern tapestry of integrated experiences.
View MoreWhat Brands Get Wrong About Customer Authentication
Customer authentication is a critical component of almost every app that exists, because it serves as a product gateway impacting 100% of customers. It’s not easy to get right, and the stakes for getting it right are higher than ever: 46% of customers abandon a transaction because of authentication, and account takeover fraud increased by 292% in 2020.
View MoreLeave no-one behind: how to unlock your entire digital ecosystem
When you have data entered once and then connected safely, securely and quickly everywhere - that is real smart “integration”. The reality is that integration is the perfect foundation for Integrated Experiences but it is not enough. Data readiness, user engagement, and the unified platform are critical to delivering an Integrated Experience. The winners are building a modern tapestry of integrated experiences.
View MoreTLC Connect - Data and Information Technology Series
TLC Connect is a new series of highly focused and engaging networking events for the Technology Leaders Club community. This event will provide an intimate environment for likeminded executives and technology providers to network and work together to solve common challenges across their businesses. Join this event and network with other CDOs, CIOs, CTOs, VPs, and Heads of Data, Technology and Analytics leaders.
View MorePreventing Fraud in a Card Not Present world
Digital payments transaction volumes continue to grow and, as a result, so do the losses that stem from fraud. Consumer appetite for card-not-present (CNP) transactions and payment options like Buy-Now-Pay-Later (BNPL) are growing stronger but risks abound and, according to Aite-Novarica Group, CNP fraud alone topped $15 billion this past year. As the adoption of digital payments continues to climb, cybercriminals are rapidly adapting their attack methodologies to avoid detection and maximize profits.
View MoreGaining freedom from control
Our world has changed. The relationship between life and work has become irreversibly blurred. Today, digital information moves without boundaries or limits. It means that a corporate data breach one moment can disrupt an individual’s life the next. Of course, this new reality is driven by technology: devices, clouds, networks, applications. But it’s also driven by human nature. Just as the speed of change and innovation will only increase exponentially, the human need for freedom and mobility will only become more pressing.
View MoreThe Future of Data & AI
Data has become the critical resource for the success of any organization. Indeed, companies that can effectively manage and market their data will emerge as leaders in the post-pandemic world. Additionally, organizations need to ensure that they're using the right data to drive the business results they want, but what happens when you're able to take control of all the data and package it to monetize it?
View MoreThe Future of Data & AI | Monetizing the Data Explosion
Data has become the essential resource to every organization’s success. In fact, businesses that are able to effectively manage and commercialize their data will emerge as leaders in the post-pandemic world. Organizations need to ensure that they are using the right data for the intended business outcomes. But what happens when you are able to actually get control of all your data and package it up to monetize it?
View MoreHow To Futureproof Your Automotive IoT Security
IoT in the automotive sector is a rapidly evolving industry, from the connected vehicles themselves to the engines, telematics and the surrounding infrastructure and therefore the security threat landscape is also changing. Developments such as V2X and new regulations including WP29 all bring new demands on the security measures surrounding connected vehicles – during this roundtable we will look at the issues and trends facing the sector and how to prepare for them.
View MoreRansomware: the extortionists have upped their game, are your defenders keeping up?
The last couple of years have forced many businesses to reinvigorate or kick start their digital transformations and cloud adoptions. New approaches and new solutions require new ways of working. The new ways do not appear to be keeping the attackers out, but they can help us better prepare, respond, and recover if we fall victim.
View MoreThe realities of innovating in the cloud
In 2022 “Digital Transformation” means move to the cloud, some of us have been “doin’ it for years”, others are enjoying the acceleration brought about by the WFH revolution. Be agile, be resilient, be innovative. Join us at this private, behind closed doors round table discussion, where we bring you together with a careful selected group of your peers to talk about what works and what to avoid when setting out to innovate in the cloud.
View MoreLeave no-one behind: how to unlock your entire digital ecosystem
When you have data entered once and then connected safely, securely and quickly everywhere - that is real smart “integration”. The reality is that integration is the perfect foundation for Integrated Experiences but it is not enough. Data readiness, user engagement, and the unified platform are critical to delivering an Integrated Experience. The winners are building a modern tapestry of integrated experiences.
View MoreTLC Connect - Security Series
TLC Connect is a new series of highly focused and engaging networking events for the Technology Leaders Club community. This event will provide an intimate environment for likeminded executives and technology providers to network and work together to solve common challenges across their businesses. Join this event and network with other CISOs, VPs, Directors, and Heads of Security from our Technology Leaders Club community.
View MoreHow shipping leaders are taking advantage of new opportunities to manage risk, control costs and streamline efficiencies
Organizations are looking for new ways to combat rising costs, surging parcel volume and growing complexity. While you cannot control rate and fee increases, you can find new and surprising ways to save on operational costs. Learn how your peers are managing everything from sending and receiving to cash flow management, operational efficiency and more.
View MoreHow do we stop attacks before they stop us?
The risk isn’t of “having a security incident” its about handling it in a calm, collected, and methodological manner so a small incident doesn’t turn into a major one. Or worst case, a major one is identified and mitigated in minutes, as opposed to days. This sort of reinforces the “there is no real ROI” argument, as a motivated threat actor will not give up just because they were stopped once.
View MoreCyber resilience: How to prevent, protect and recover from Ransomware
Every 11 seconds a company is hit by ransomware. New threats, paired with data living in more places than ever before, requires businesses of all sizes to develop robust resilience strategies. Join us for this private, closed-door virtual roundtable where we will be taking a deeper look at cyber resilience.
View MoreThe Branch Of One - Delivering optimal digital experience to a hybrid workforce
Research shows that 35%-38% of organisations will continue to have more than half of their staff working remotely. This new reality has given birth to a new remote working concept "The Branch Of One". Businesses need to adapt their IT services from traditional corporate network to remotely manage user experience across an ecosystem of connectivity, infrastructure and applications.
View MoreKey Considerations for Choosing the Right Email Security Platform
Email is both a necessary communication medium, and the most vulnerable area for an attack. Year after year, adversaries find success in abusing email to gain a foothold into an organization—deploying malware, leaking valuable data, or stealing millions of dollars. Does that mean email is doomed, and we should give up? Quite the opposite—instead, we should look to newer technologies and an integrated security strategy that provides a modernized approach to email defense.
View MoreHow do we stop attacks before they stop us?
The risk isn’t of “having a security incident” its about handling it in a calm, collected, and methodological manner so a small incident doesn’t turn into a major one. Or worst case, a major one is identified and mitigated in minutes, as opposed to days. This sort of reinforces the “there is no real ROI” argument, as a motivated threat actor will not give up just because they were stopped once.
View MoreHow shipping leaders are taking advantage of new opportunities to manage risk, control costs and streamline efficiencies
Organizations are looking for new ways to combat rising costs, surging parcel volume and growing complexity. While you cannot control rate and fee increases, you can find new and surprising ways to save on operational costs. Learn how your peers are managing everything from sending and receiving to cash flow management, operational efficiency and more.
View MoreCloud journey pitfalls and solutions
There are a number of common cloud strategy pitfalls organizations face that need to be addressed (or avoided) for successful cloud transformation efforts. We will discuss the common cloud strategy pitfalls faced by organisations and take you through some current Splunk customers use cases giving perspective on what pitfalls have been most challenging in their own cloud transformation and how they tackled each.
View MoreHow Data is Driving Next-Generation Customer Experiences
This dinner discussion will explore the latest innovations in Data Integrity, Customer Experience, and taking full advantage of the Cloud. Participants will share insights and ideas for leveraging cutting-edge technologies and strategies to improve business performance, enhance customer engagement, and streamline operations. Precisely will highlight real-world examples of successful innovation and provide practical advice for organizations seeking to stay ahead of the curve.
View MoreThreat Detection & Response Lessons Learned
Detecting and responding to threats is the primary objective of your security operations program - and the best way to improve threat detection and response while running your teams at peak efficiency is to learn from the experience of other security leaders.
View MoreCustomer IAM: From Myths to Mastery
Customer identity is a hidden danger lurking in every application. Done well, it just works. Done poorly it frustrates your users, gets complicated as you consider policies and regulations, and doesn’t effectively protect your customers or your organization. Unfortunately, the line between “done well” and “done poorly” is thin, hard to detect, and better described using hieroglyphics and 6-dimensional space. Regardless of the complexity, we know that a seamless but secure customer experience makes happy customers who visit more often and do more with us each time.
View MoreMitigating Digital Supply Chain Risk in the Extended Salesforce Environment
The digital supply chain offers unparalleled flexibility and freedom, enabling organizations to rapidly acquire new capabilities and seize opportunities. But it also comes at the cost of increased cyber risk exposure. Attacking third party connections such as Salesforce and its many integrations enables cyber criminals to bypass security defenses and potentially strike at the heart of an organization’s network.
View MoreHow leaders are taking advantage of new opportunities to manage risk, control costs and streamline efficiencies
Organizations are looking for new ways to combat rising costs, surging parcel volume and growing complexity. While you cannot control rate and fee increases, you can find new and surprising ways to save on operational costs. Learn how your peers are managing everything from sending and receiving to cash flow management, operational efficiency and more.
View MoreWhy your data security protection program failed... and how to fix it?
Data is the fuel that drives innovation and growth for your organization. For that reason, data protection programs should be critical pieces of security and business strategy, often they are not and that leads to ineffective programs. This inefficiency wastes time and money while contributing little to risk reduction.
View MoreWhat Brands Get Wrong About Customer Authentication
Customer authentication is a critical component of almost every app that exists, because it serves as a product gateway impacting 100% of customers. It’s not easy to get right, and the stakes for getting it right are higher than ever: 46% of customers abandon a transaction because of authentication, and account takeover fraud increased by 292% in 2020.
View MoreWhy your data security protection program failed... and how to fix it?
Data is the fuel that drives innovation and growth for your organization. For that reason, data protection programs should be critical pieces of security and business strategy, often they are not and that leads to ineffective programs. This inefficiency wastes time and money while contributing little to risk reduction.
View MoreProtecting your apps and APIs for a better customer experience
Your website, applications and APIs are the front door to your business. Offering a positive and secure digital experience is essential for customer retention, brand reputation and, ultimately, your bottom line.
View MoreTLC TV: Flying blind – using data to make the uncertain, certain
In the face of global economic downturn, organisations are understandably looking to scale back wherever possible. With the value of data often underestimated, data teams are finding their projects in the firing line, but now is the worst time to pull back on investments in data!
View MoreTransformez vos opérations commerciales en dynamisant les processus de génération de revenus
Comment des processus plus automatisés, intégrés et intelligents peuvent-ils vous assurer de maximiser les revenus dans chaque opportunité ?
View MoreRansomware: The Security Debt Collector
High-profile ransomware news stories grabbed headlines a few years ago, but faded in popularity through 2018 as other attacks like cryptojacking grew more profitable. Since the first months of 2020, ransomware attacks are on the rise and in the news again! Join this session with Global Advisory CISO Dave Lewis from Duo Security to catch up on the historical rise and fall (and rise…) of ransomware from floppy disks to RaaS (ransomware as a service), why it’s seen a resurgence in popularity along with recent data on the state of ransomware currently, and how you can improve your defenses against ransomware attacks.
View MoreReducing Business Risk: Securing Privileged Access and Implementing a Zero Trust Strategy
Join our CISO roundtable as we discuss how to make Zero-Trust work for you. We will cover the techniques used to protect Privileged Accounts, how to make Cloud Transformations secure, and the key elements behind Identity Management. Reduce business risk and maintain productivity by increasing your security posture.
View MoreData Monetization - The future of data leading organizations
From a cost center, to a value center, to now a revenue center, the data organization is changing focus to be a catalyst for new lines of business. What is the true potential for monetizing data and how important is access to other enterprises’ information for your transformation strategy?
View MoreMonétisation de la donnée : L'avenir des organisations pilotées par la data
Le marché mondial de la monétisation des données devrait atteindre 1 700 milliards de dollars d'ici 2028. Les entreprises qui tirent parti de cette opportunité sont en mesure d'assurer l'avenir de leur activité, d'obtenir de meilleurs résultats commerciaux et même de générer de nouveaux revenus nets.
View MoreRealising the promise of cloud for Telco organisations
As more telco companies embark on their digital transformations, their environments become more complex to manage, with a mix of on-premise, edge and multi-cloud. Telcos are navigating the challenges of delivering reliable and high-performing connectivity while operating and managing policies and security profiles of distributed infrastructure, applications, and data at the edge of the network.
View MoreThe Road to Modern Selling: How to Win Over Today’s B2B Buying Teams
B2B buyers have shifted how they buy. Old-school tactics like scripted sales pitches and cold calls just don’t cut it anymore. Today’s digital-first buyers are more informed than ever and are looking for a collaborative buying experience that puts them in the driver's seat. Transform your sales strategy to stop chasing after buyers and start making it easy for the to buy from you.
View MoreLet's talk SASE - lots of noise, now the reality
With the arrival of the Secure Access Service Edge (SASE), network and security professionals are now planning their migration toward this new architecture that adapts to the distributed nature of users and data. SASE promises to reduce complexity and cost; improve performance; increase accessibility; and enhance security. So the question now becomes: what is the best path to bring you all these benefits as you work towards implementing SASE?
View MoreCan data analytics actually drive transformation?
Data analytics in all its wonderful flavours is becoming a mainstay in every organisation's top-line strategy, but what impact do they actually have? Join us for this private, closed-door virtual roundtable where we'll discuss the aspirations and considerations behind the historical investments of time and resources into data analytic capabilities, and uncover some future-looking common principles and insights that can actually improve their impact.
View MoreAutomatically Increase Engagement, Solve Issues, and Identify Unmet Needs Within the Customer Journey
Unstructured data, such as emails, call transcripts, contracts, reports, and more, comprise more than 80% of the data stored by organizations. Locked within this data, which is not accessible by traditional business tools and processes, is the greatest potential to increase customer engagement. This is where your customers directly communicate their unmet needs. Imagine what is possible if you could extract those valuable insights from that data?
View MoreInformed Decisions for Securing Your Information Lifecycle
How well can you see, understand, and protect the data your business relies on to grow? Can you see it throughout the entire data lifecycle? How do you protect your business critical data without interfering with your business processes? Join us and a specially selected group of your peers in an open discussion about how you can better understand your data lifecycle allowing your DLP programs to be more supported and effective.
View MoreThe Fundamentals of a Successful Data Mesh
Everyone is talking about data mesh as the next big thing. So what’s the big deal? In this dinner, we discuss the conceptual model for thinking strategically about data mesh: What is it? When to consider it for your business? Over dinner, attendees will discuss best practices, the kinds of tools needed, and how to get your organisation started down a path toward a data mesh.
View MoreThe Fundamentals of a Successful Data Mesh
Everyone is talking about data mesh as the next big thing. So what’s the big deal? In this dinner, we discuss the conceptual model for thinking strategically about data mesh: What is it? When to consider it for your business? Over dinner, attendees will discuss best practices, the kinds of tools needed, and how to get your organisation started down a path toward a data mesh.
View MoreLa gestion des privilèges : plus que jamais la priorité #1 des CISOs
Nous savons que les cybers menaces évoluent constamment et les impacts associés aux attaques sont de plus en plus importants. Cependant, une chose ne change pas : les comptes à privilèges restent la cible numéro 1 des hackers. Il devient essentiel de mettre en place les bons mécanismes pour protéger ces comptes et gérer les privilèges dans l’infrastructure.
View MoreFine Tuning Your Data Loss Prevention and Compliance Program
Data is the fuel that drives innovation and growth for your organization. For that reason, Data Loss Prevention and Compliance programs should be critical pieces of security and business strategy. However, these programs often struggle to keep pace with the ever changing requirements of an organization, meaning that considerable time and money is spent without achieving the desired levels of risk reduction.
View MoreRansomware: the extortionists have upped their game, are your defenders keeping up?
The last couple of years have forced many businesses to reinvigorate or kick start their digital transformations and cloud adoptions. New approaches and new solutions require new ways of working. The new ways do not appear to be keeping the attackers out, but they can help us better prepare, respond, and recover if we fall victim.
View MoreKey Considerations for Choosing the Right Email Security Platform
Email is both a necessary communication medium, and the most vulnerable area for an attack. Year after year, adversaries find success in abusing email to gain a foothold into an organization—deploying malware, leaking valuable data, or stealing millions of dollars. Does that mean email is doomed, and we should give up? Quite the opposite—instead, we should look to newer technologies and an integrated security strategy that provides a modernized approach to email defense.
View MoreEscape From Legacy Middleware With iPaaS
Many enterprises now spend as much as 70% of their IT budgets maintaining old, brittle, hand-coded ESB integrations and outdated applications, rather than adopting new technologies that could transform their businesses. Companies that primarily use more advanced technologies, faster experimentation and prioritize innovation have a significantly higher chance of success than their outdated counterparts. Find out how organizations have successfully navigated their legacy challenges and limitations by modernizing their middleware and future proofing their company.
View MoreTo pay or not to pay? What to do when hit by ransomware
With more than 215 cyberattacks per month, every company is at significant risk of being affected by malware. Hacker groups have become well-organised entities and ransomware is by far their most popular attack method. So how can your company prepare for a potential ransomware attack and avoid the worst case outcome of an extortion incident? Join us in an executive round table with ReliaQuest and IBM where we will discuss how you can take the guesswork out of ransomware protection, best prepare your security operations team by increasing visibility, reducing complexity, and managing risk.
View MoreThreat Detection & Response Lessons Learned
Detecting and responding to threats is the primary objective of your security operations program - and the best way to improve threat detection and response while running your teams at peak efficiency is to learn from the experience of other security leaders.
View MoreThe CISO’s Guide to Crowdsourced Security
Crowdsourced security has its roots in the bug bounty movement, but today it brings unique value to numerous security techniques, including penetration testing and attack surface management. Crowdsourcing’s important role in proactive risk reduction is something every CISO should understand.
View MoreMalware 2021 to Present Day. Building a Preventative Cyber Program
Malware has been around for years however, there has been a massive increase in malware activity since 2020. Two key contributing factors are 1) global shift to WFH/remote work. 2) significantly wider attack surface. Additionally, we’ve experienced supply chain attacks forcing organizations to re-evaluate their partners, suppliers, and even their own SDLC. Furthermore, increased malware has contributed to ransomware attacks that now employ double and triple extortion techniques. This session will review the recent evolution of malware and how your organization can build a unified and complete cyber program focused on preventing current and future attacks.
View MoreThe realities of innovating in the cloud
In 2022 “Digital Transformation” means move to the cloud, some of us have been “doin’ it for years”, others are enjoying the acceleration brought about by the WFH revolution. Be agile, be resilient, be innovative. Join us at this private, behind closed doors round table discussion, where we bring you together with a careful selected group of your peers to talk about what works and what to avoid when setting out to innovate in the cloud.
View MoreThe path to the cloud is different for every company
The path to the cloud is different for every company. Most of the time, the same questions come up. Together with the Director Global Infrastructure & Cloud from one of our customers, we discuss these and other questions around your cloud journey. Stay flexible in what you do and enjoy the 'Freedom of Choice'!
View MoreData Protection for the Information Economy: The Data Awareness Challenge
Data protection is increasingly recognised as fundamental to trade, security and privacy in our modern information economy. Data protection legislation has been passed in almost 80% of countries, all mandating the same universal principles of data protection – of justifiable or legitimate need, of integrity and of security. Fundamental to meeting any data protection legislation is to know your data: What you have, why you have it, how you got it, what you do with it, and where you keep it.
View MoreHow to run a successful IAM project
Many security and risk management leaders today struggle with not only identifying, but executing on projects that provide the most bang for buck for the organization. Join Owen John, Head of Cyber Architecture at Imperial Brands and Rod Simmons, VP of Product Strategy at Omada for an engaging session on shared best practices on how to position IAM projects internally, gain organizational buy-in, and set the tone for success.
View MoreInformed Decisions for Securing Your Information Lifecycle
How well can you see, understand, and protect the data your business relies on to grow? Can you see it throughout the entire data lifecycle? How do you protect your business critical data without interfering with your business processes? Join us and a specially selected group of your peers in an open discussion about how you can better understand your data lifecycle allowing your DLP programs to be more supported and effective.
View MoreThreat Detection & Response Lessons Learned
Detecting and responding to threats is the primary objective of your security operations program - and the best way to improve threat detection and response while running your teams at peak efficiency is to learn from the experience of other security leaders.
View MoreHow to Keep Your Customers Out of Collections
Collections operations are changing. Rising costs are causing financial stress for consumers today. Research shows that over half of consumers globally are struggling with inflation due to the energy crisis and global challenges. For financial institutions this means strategies need to be put in place to combat rising impairment costs and poor customer experience due to less-than-optimal pre and early collections strategies.
View MoreSecurity Operations Collaboration – Working with a 24*7 MSSP in a modern collaborative way using Microsoft Teams to share knowledge and retain SOC staff
The missing piece of XDR is reducing the likelihood of a major cyber incident by focusing on continuous prevention. Working with a collaborative MSSP is “the future of security operations”, we will be discussing how to build a true partnership.
View MoreDriving Differentiated Value in the Future of Sales and Marketing
There was a time in the not-so-distant past when a round of golf or a steak dinner was enough for a skilled sales rep to seal the deal. Nowadays, not so much. The buying journey is transforming. Today’s B2B buying teams are bigger, have higher expectations, and are less available. So when a seller finally gets in front of a buyer, it’s showtime.
View MoreIncrease ROI with Automation Using a Digital Operations Platform
As technology becomes more SaaS-based and organizations deploy applications in multiple clouds, there are requirements for more visibility into the cloud environment and better incident response and resolution automation capabilities. IT leaders need to be able to see schedules, assign resources, and manage the assorted tasks needed to remedy the incident quickly and efficiently to reduce costs.
View MoreHow can the public sector tap into the data dividend?
Bridging the data divide and accelerating a data and analytics transformation in public sector services across the world has never been more critical. However, placing data at the heart of public services has faced setbacks given the seismic operational challenge. Despite this, some countries are taking great strides - from leveraging data to tackle climate change to improving health services for citizens - and can offer valuable lessons.
View MoreCloud Agnostic Application Security – Innovative Single Window View to manage Applications across Heterogenous Environments
Cloud Computing & resulting multi-cloud environments creates security silos, in turn, increasing vulnerabilities. Secure applications in these heterogenous environment with an innovative, comprehensive & unified approach without compromising on Application availability and accessibility.
View MoreThreat Detection & Response Lessons Learned
Detecting and responding to threats is the primary objective of your security operations program - and the best way to improve threat detection and response while running your teams at peak efficiency is to learn from the experience of other security leaders.
View MoreThe “cost of a hack” or “cost of ransomware” is obviously devastating, but what about the cost of risk?
The underlying business challenge has always been finding an efficient way to discover an attacker’s path of least resistance through your network to your most critical assets. In other words identifying what’s at risk and why. We believe money alone spent on vulnerability management doesn’t address the half dozen soft spots in your external facing network that attackers can use to infiltrate an organisation.
View MoreRansomware: The Security Debt Collector
High-profile ransomware news stories grabbed headlines a few years ago, but faded in popularity through 2018 as other attacks like cryptojacking grew more profitable. Since the first months of 2020, ransomware attacks are on the rise and in the news again! Join this session with Global Advisory CISO Dave Lewis from Duo Security to catch up on the historical rise and fall (and rise…) of ransomware from floppy disks to RaaS (ransomware as a service), why it’s seen a resurgence in popularity along with recent data on the state of ransomware currently, and how you can improve your defenses against ransomware attacks.
View MoreEnemy at the gates - The Vulnerability Management Maturity Model!
With the increased threat to commercial and reputational risk, enterprises are required to be more agile, accurate, prioritized and metrics driven. How is vulnerability management and penetration testing evolving to address this need? How are they converging into a single source of visibility & truth? What does good vulnerability management look like? and how has this domain evolved today?
View MoreAchieve Freedom of Control for your Digital Transformation
Our world has changed. The relationship between life and work has become irreversibly blurred. Today, digital information moves without boundaries or limits. It means that a corporate data breach one moment can disrupt an individual’s life the next. Of course, this new reality is driven by technology: devices, clouds, networks, applications. But it’s also driven by human nature. A deep desire to live our lives the way we want to. The freedom to connect anywhere, work anywhere, shop anywhere from any device — never having to worry about privacy or security. Just as the speed of change and innovation will only increase exponentially, the human need for freedom and mobility will only become more pressing.
View MoreThreat Detection & Response Lessons Learned
Detecting and responding to threats is the primary objective of your security operations program - and the best way to improve threat detection and response while running your teams at peak efficiency is to learn from the experience of other security leaders.
View MoreNow your IT and OT have converged, do they have a new cyber risk from each other?
We’ll explore the paradox of bringing Operational Technology (OT) onto Information Technology (IT) networks. By doing so, British industry stands to benefit massively in terms of efficiency, availability etc, but during the dinner we’ll discuss some of the challenges that both networks can have on each other, as an entry point, as an uncontrolled/unknown supply chain risk, and even when you have different goals (security vs availability/safety). But how can your business stop the controls and mitigations becoming contributory to the problem you set out to solve in the first place?
View MoreInsurance is moving fast – can your organisation keep up and remain competitive?
Today’s insurance consumers have high expectations. They want a seamless, personalised buying experience and fast, accurate, 24/7 service. But paper, fraud and inefficiencies get in the way of that superior customer experience. Kofax hyperautomation cuts through the obstacles to slash processing times, boost touchless operations, and unlock data faster.
View MoreHow has the world of hybrid work impacted your joiners, movers, leavers (JML)?
As organisations continue to settle into long-term hybrid working models that take their colleagues outside the traditional network perimeter, securely enabling their workforce to have access to the right applications at the right time has become a top priority for IT leaders. Just looking in the news shows us some of the new ways of working are extending our attack surface rather than reducing it. Join us and a small group of industry peers in a behind closed doors frank and open discussion of the highs and lows of JML automation, the policies and processes to reduce risk, reduce cost and stay compliant.
View MoreFrom Laggard to Leader: How to Drive Security Maturity Forward with Limited Resources
UK organisations are facing an unprecedented threat landscape, and just one in five cybersecurity practitioners feel that their team is effective at stopping a cyberattack. But many large and global organisations already have the resources to protect, detect, and respond to major threats. The building blocks of a successful cybersecurity strategy are there; the question is, how are the market leaders moulding these resources to better protect their organisation – and how can you do the same?
View MoreThe “cost of a hack” or “cost of ransomware” is obviously devastating, but what about the cost of risk?
The underlying business challenge has always been finding an efficient way to discover an attacker’s path of least resistance through your network to your most critical assets. In other words identifying what’s at risk and why. We believe money alone spent on vulnerability management doesn’t address the half dozen soft spots in your external facing network that attackers can use to infiltrate an organisation.
View MoreHow marketing leaders are driving digital engagement with personalised loyalty and promotions programmes
The acceleration of digital engagement in the post-pandemic environment presents a considerable opportunity for retailers. Tim Mason, former CMO and Deputy CEO of Tesco will share how businesses can create value and earn the loyalty of their customers by delivering true one-to-one marketing across all channels and why this is so relevant in the face of the current cost of living crisis.
View MoreThreat Detection & Response Lessons Learned
Detecting and responding to threats is the primary objective of your security operations program - and the best way to improve threat detection and response while running your teams at peak efficiency is to learn from the experience of other security leaders.
View MoreIf it isn’t actionable, does it even matter??
With an ever-growing attack surface, security teams are being bombarded by skyrocketing numbers of alerts and false positives, making automation in security operations more critical today than it has ever been. The success of your security operations automation strategy depends on your security information and event management (SIEM) and security orchestration automation and response (SOAR) capabilities. Your SIEM and SOAR must have all of the necessary data so that threats can be prioritised and rapidly resolved but establishing a centralised source of enterprise visibility is no small order.
View MoreAutomated Intelligence-Driven Detection and Defence
There is a growing interest in a threat-informed and automated way to detect and defend against external threats to organizations. This ties in with an increasing focus on reducing the Mean-Time-To-Detection (MTTD) and Mean-Time-To-Respond (MTTR) through automation and integrations to bring together silos of technologies and people. We will discuss what we know about the cybersecurity landscape, how it can be used efficiently to inform and drive detection and defence, and how its value can be measured.
View MoreImproving Cyber Resilience By Focussing On The Threat Vectors Behind the Headlines
Join this session where we will discuss the developing threat landscape – and how we can adjust our control strategies to prevent incidents, build resilience and enable our enterprises to flourish irrespective of the next disruptive wave crashing down around us.
View MoreGrowing your team: finding the right people, not just the right qualifications
With an average of 66 days to fill a tech role, organisations around the world are struggling to fill mounting vacancies and the tech industry is feeling the pinch of the supposed 'skills gap. 'With 91% of employers reporting their intent to hire in 2021, organisations around the world are struggling to fill mounting vacancies and the tech industry is feeling the pinch of the supposed 'skills gap. 'The ‘skills gap’ is a challenge being manufactured and perpetuated by the industry itself. Businesses are setting themselves up to fail with unrealistic expectations and skill demands of their new hires; now is the time for businesses to take a step back, re-evaluate their hiring processes, and prioritise looking for the right people, instead of the right qualifications.
View MoreThe importance of value stream management in your business!
Value Stream Management has existed as a discipline for over a century, but popularised by the Toyota Production System for use in Supply Chain and Manufacturing. It is only since 2018 that the technology sector has begun to realise its potential benefits for the industry and digital businesses as a whole. 2021 saw the creation of the Value Stream Management Consortium and their first ever State of Value Stream Management Report and this has led to questions for those seeking the benefits of VSM.
View MoreAutomated Intelligence-Driven Detection and Defence
There is a growing interest in a threat-informed and automated way to detect and defend against external threats to organizations. This ties in with an increasing focus on reducing the Mean-Time-To-Detection (MTTD) and Mean-Time-To-Respond (MTTR) through automation and integrations to bring together silos of technologies and people. We will discuss what we know about the cybersecurity landscape, how it can be used efficiently to inform and drive detection and defence, and how its value can be measured.
View MoreConsumer perspectives on data privacy and implications for business growth
The consumer has emerged as a motivating force in data privacy. People’s heightened awareness of their data privacy and expectations of responsible data practices will shape privacy programs more than regulations. What can we learn by listening to the people behind the data? In this session, we’ll share and discuss the latest research on consumer perspectives on data privacy and businesses’ data practices, and impact to the bottom line. We’ll discuss the total cost of ownership for privacy in the organization, sharing a framework for building a privacy program that builds trust with consumers and drives business growth, in addition to managing compliance and reputational risk.
View More3 reasons why companies are wasting resources on their security approach
Most Enterprise organizations are having a hard time discovering all their assets and prioritizing vulnerabilities and misconfigurations. Companies even have bigger issues fixing them, seeing their exposure to threats, report and track their risk trend over time.
View MorePredictions 2023: How to build resilience in turbulent times?
The certainty of uncertainty — it’s changing the reality of what it means for organizations to operate today. Economic instability. Deglobalisation. The talent crisis. As the world deals with continued turbulence and new surprises in 2023, what do leaders need to know to take decisive action and increase resilience in their organization?
View MoreThe “cost of a hack” or “cost of ransomware” is obviously devastating, but what about the cost of risk?
The underlying business challenge has always been finding an efficient way to discover an attacker’s path of least resistance through your network to your most critical assets. In other words identifying what’s at risk and why. We believe money alone spent on vulnerability management doesn’t address the half dozen soft spots in your external facing network that attackers can use to infiltrate an organisation.
View MoreAutomated Intelligence-Driven Detection and Defence
There is a growing interest in a threat-informed and automated way to detect and defend against external threats to organizations. This ties in with an increasing focus on reducing the Mean-Time-To-Detection (MTTD) and Mean-Time-To-Respond (MTTR) through automation and integrations to bring together silos of technologies and people. We will discuss what we know about the cybersecurity landscape, how it can be used efficiently to inform and drive detection and defence, and how its value can be measured.
View More3 reasons why companies are wasting resources on their security approach
Most Enterprise organizations are having a hard time discovering all their assets and prioritizing vulnerabilities and misconfigurations. Companies even have bigger issues fixing them, seeing their exposure to threats, report and track their risk trend over time
View MoreAutomated Intelligence-Driven Detection and Defence
There is a growing interest in a threat-informed and automated way to detect and defend against external threats to organizations. This ties in with an increasing focus on reducing the Mean-Time-To-Detection (MTTD) and Mean-Time-To-Respond (MTTR) through automation and integrations to bring together silos of technologies and people. We will discuss what we know about the cybersecurity landscape, how it can be used efficiently to inform and drive detection and defence, and how its value can be measured.
View MoreThe “cost of a hack” or “cost of ransomware” is obviously devastating, but what about the cost of risk?
The underlying business challenge has always been finding an efficient way to discover an attacker’s path of least resistance through your network to your most critical assets. In other words identifying what’s at risk and why. We believe money alone spent on vulnerability management doesn’t address the half dozen soft spots in your external facing network that attackers can use to infiltrate an organisation.
View MoreTurning Cyber Security into a Competitive Advantage
Investing in cyber security to keep ahead of your competition, leveraging new technologies to increase operational efficiency and mitigate risks, keeping your customers and their information safe. Join our virtual discussion with a small group of fellow cyber security leaders from the retail, e-commerce, hospitality and leisure sectors (consumer markets) on Wednesday 22 February 2023.
View More2023: The Year to Supercharge your Sustainable Digital Transformation
With many businesses and nations committed to net-zero by 2030, time is running out to prove progress towards these goals. With only one technology refresh cycle realistically feasible before 2030, the decisions IT leaders make this year will be crucial to their organisation’s success. But against a backdrop of geopolitical uncertainty, economic turbulence and fast-paced digital transformation projects, some technology leaders are coming into conflict with their organisation’s sustainability goals. Impending regulations and legislation mean that everything from network strategy to third party partner selection could impact sustainability goals; the challenge facing IT leaders now is delivering both digital transformation and sustainability objectives simultaneously.
View MoreThreat Intelligence – know your enemy, know yourself!
We discuss the growing role of Threat Intelligence information in proactive security strategies – how it’s gathered; how it’s curated; how relevant it is to your business and how you decide on which feeds, reports and actionable intelligence you need, and use, on a daily basis. We also discuss what the future is for Threat intelligence services and its place in your cybersecurity strategy and for a wider range of businesses.
View MoreEmbracing the future with connected and smart digital tech!
With economic headwinds and a looming fear of recession, enterprises are also looking to technology and data to transform themselves, make better decisions, reduce costs, boost productivity, invent or reinvent offerings and deliver innovative solutions. The overall objective: become a more nimble, lean, customer centric and resilient enterprise. Join us to learn how organizations are acing this goal and gearing up for the future.
View MoreDeploying, securing and connecting apps across hybrid clouds
There's no question that cloud environments can offer many benefits, such as scalability and lower costs. However, going 100% into one cloud isn't always feasible. As a result, many companies now operate complex hybrid environments, with applications hosted in on-premise data centres, public and private clouds, and on the edge. Join this discussion to see how peers across multiple industries are addressing their application management challenges in the multi-cloud. We will discuss how organisations are managing the challenges of securely deploying and connecting their apps in hybrid, multi-cloud and edge environments.
View MoreControlling the Chaos: How to Manage a Digital Transformation in Uncertain Times
The last few years have been characterised by unprecedented levels of disruption which show no signs of abating. As we enter 2023, IT teams are under more pressure than ever to enable digital and business innovation that is flexible, agile, secure, and resilient: core to cloud to edge. At the same time, IT is being challenged to improve efficiency, reduce cost, and deliver on sustainability goals. If this wasn’t already a lot to ask, IT teams also have to navigate a landscape of uncertainty from global supply chain issues, economic downturn hitting budgets, technical debts built up as a result of the COVID-19 pandemic – the list goes on.
View MoreExploring the Need for Cloud Email Security
Organisations worldwide have moved to cloud email and realized the benefits of increased productivity, collaboration, and extensibility. But attackers are abusing the open, connected nature of the cloud to carry out new cyber attacks—using social engineering tactics to trick users into inputting credentials, sending money, and providing access to confidential information. Making matters worse, attackers are also finding new ways to directly access the email environment, using third-party integrations and MFA bypass techniques to complete their scams. Join this session with Abnormal Security as we discuss why email is still the most important channel to protect, what types of attacks you can expect in the coming year, and how cloud email security platforms can keep your organization safe.
View MoreDeploying, securing and connecting apps across hybrid clouds
There's no question that cloud environments can offer many benefits, such as scalability and lower costs. However, going 100% into one cloud isn't always feasible. As a result, many companies now operate complex hybrid environments, with applications hosted in on-premise data centres, public and private clouds, and on the edge. Join this discussion to see how peers across multiple industries are addressing their application management challenges in the multi-cloud. We will discuss how organisations are managing the challenges of securely deploying and connecting their apps in hybrid, multi-cloud and edge environments.
View MoreOne cyberattack is enough to lose brand trust – are you prepared?
It takes years to build a brand. A cyberattack that exposes customer data or even simply paints the company in a negative light can cause catastrophic loss of trust in an instant. This leads to a direct impact to a brand’s financial success and reputation.
View MoreReduce Business Risk: Securing Privileged Access and Implementing Zero-Trust
Join our CISO roundtable as we discuss how to make Zero-Trust work for you. We will cover the techniques used to protect Privileged Accounts, how to make Cloud Transformations secure, and the key elements behind Identity Management. Reduce business risk and maintain productivity by increasing your security posture.
View MoreTLC Reconnect 2023
Join us at TLC Reconnect on 8th March, for an evening of dinner, networking and entertainment with 120 senior executives from the UK Technology Leaders Club community.
View MoreThe Productivity Paradox : The Art of Doing More with Less
Staff productivity is perhaps more important than ever before in the Financial Services sector. Increasing wages, operating costs, energy costs, rising compliance and regulation are all putting pressure on budgets at a time when businesses need to grow top line revenues and protect the bottom line. Meet with industry peers and intelligent automation experts, Kofax, to exchange stories about your successes and challenges.
View MoreAutomated Intelligence-Driven Detection and Defence
There is a growing interest in a threat-informed and automated way to detect and defend against external threats to organizations. This ties in with an increasing focus on reducing the Mean-Time-To-Detection (MTTD) and Mean-Time-To-Respond (MTTR) through automation and integrations to bring together silos of technologies and people. We will discuss what we know about the cybersecurity landscape, how it can be used efficiently to inform and drive detection and defence, and how its value can be measured.
View MoreDevSecOps secures the development lifecycle in its entirety, but it is important that we implement a balanced strategy to ensure we don't leave gaps in our control coverage.
The software development lifecycle contains many vulnerability inflection points where security controls should be introduced, but it is important to achieve a balanced risk profile. Gaining insight into the development lifecycle provides operational intelligence and the opportunity to create product faster and in a more secure manner. Join us to hear from Snyk and Sysdig with guest speaker Leo Cunningham (Flo Health, CISO) as we explore the challenges and benefits of gaining complete security visibility, from the creation of code to the curating of containers.
View MoreLets talk SASE - lots of noise, now the reality
With the arrival of the Secure Access Service Edge (SASE), network and security professionals are now planning their migration towards this new architecture that adapts to the distributed nature of users and data. SASE promises to reduce complexity and cost; improve performance; increase accessibility; and enhance security. So the question now becomes: what is the best path to bring you all these benefits as you work towards implementing SASE?
View MoreHow to Achieve Sustainable Digital Transformation in Uncertain Times
The last few years have been characterised by unprecedented levels of disruption which show no signs of abating. As we enter 2023, IT teams are under more pressure than ever to enable digital and business innovation that is flexible, agile, secure, and resilient: core to cloud to edge. At the same time, IT is being challenged to improve efficiency, reduce cost, and deliver on sustainability goals. If this wasn’t already a lot to ask, IT teams also have to navigate a landscape of uncertainty from global supply chain issues, economic downturn hitting budgets, technical debts built up as a result of the COVID-19 pandemic and impending regulation and legislation surrounding net zero emissions goals. The challenge facing IT leaders is how to deliver digital transformation and sustainability objectives simultaneously against a macroeconomic backdrop that is gloomy at best.
View MorePut 2023’s Cybersecurity Trends into Action at Your Organisation
In 2022, many organisations began to view IT Security spending as a wise investment rather than an optional budgetary line-item. But, as the global economy changes, can we expect that trend to carry through into 2023?
View MoreTransform Your Security Operations to Defend Against Today’s Threats
As organizations increasingly digitize their operations, there is a growing interest in understanding the emerging exposure to risk and enabling a more efficient and effective approach to protecting security operations. This roundtable will explore how organizations transform their security operations with automation while continuously assessing their risk through integrating attacker insights and intelligence to increase their threat visibility and proactively defend against threats.
View MoreThreat Intelligence – know your enemy, know yourself!
We discuss the growing role of Threat Intelligence information in proactive security strategies – how it’s gathered; how it’s curated; how relevant it is to your business and how you decide on which feeds, reports and actionable intelligence you need, and use, on a daily basis. We also discuss what the future is for Threat intelligence services and its place in your cybersecurity strategy and for a wider range of businesses.
View MoreNavigating a New Era of Risk in Financial Services
The more financial services organisations invest in digital infrastructure to support hybrid working and new customer experiences, the more they expose themselves to cyber risk. According to our research, half admit that their corporate attack surface is spiralling out of control, as IT-boardroom friction persists.
View MoreRadware 360 Application Protection. Secure your Apps. Regain control. Enable your business.
Radware is a global leader of cybersecurity and application delivery solutions for physical, cloud and software-defined data centers. Its award-winning solutions portfolio secures the digital experience by providing infrastructure, application and corporate IT protection and availability services to enterprises globally.
View MoreTransform Your Security Operations to Defend Against Today’s Threats
As organizations increasingly digitize their operations, there is a growing interest in understanding the emerging exposure to risk and enabling a more efficient and effective approach to protecting security operations. This roundtable will explore how organizations transform their security operations with automation while continuously assessing their risk through integrating attacker insights and intelligence to increase their threat visibility and proactively defend against threats.
View MoreAre your users your biggest threat or your greatest asset for information security?
This session will investigate whether your users are helping, or hindering, your efforts to improve information security within your organisation. We will consider the effective approaches you have seen help your users to identify sensitive data, and understand how to protect it, within the flow of day-to-day work, while moving on to discuss the successful, and not so successful, ways you can improve.
View MoreTransform Your Security Operations to Defend Against the Expanding Digital Threats
As organizations increasingly digitize their operations, there is a growing interest in understanding the emerging exposure to risk and enabling a more efficient and effective approach to protecting security operations. Digitization moves fast, enabling businesses to expand and create new opportunities for growth. With that comes opportunities for attackers who move equally as fast to exploit and monetize your growing attack surface. This roundtable will explore how organizations transform their security operations and keep pace with automation while continuously assessing their risk through integrating attacker insights and intelligence to increase their threat visibility and proactively defend against threats.
View MoreEmbedding the Attacker’s Perspective: An Inside Look Into How Hackers Prioritize Targets at Scale
Join us for an exciting session that dives into the fast-paced world of offensive security. It’s clear that attackers and defenders often come to dramatically different conclusions around risk - even when looking at the same information. In this session, veteran red teamer, Evan Anderson will pull back the curtain to show you how to discover exposures before attackers do.
View MoreOptimising your data analytics outcomes by simultaneously delivering on existing and new imperatives.
The Quick Wins & Strategic Gains of Modernising Your Data Stack. What can a savvy CDAO and team do with the investments already made?
View MoreWhy invest in 5G - What are the compelling use cases emerging for 5G?
5G is not a “build it and they will come” proposition. Every day, this ecosystem goes to work determined to prove the value of what can be delivered to consumers and enterprises. For all the progress the industry has made, 5G remains in its infancy with plenty of roadway ahead. Less than 35% of service providers have deployed any flavour of 5G. Less than 5% have deployed on a true 5G core network.
View MoreOptimising your data analytics outcomes by simultaneously delivering on existing and new imperatives.
The Quick Wins & Strategic Gains of Modernising Your Data Stack. What can a savvy CDAO and team do with the investments already made?
View MoreIoT: Powering businesses into the Future
Thanks to the ever-growing Internet of Things, soon everything will be connected. Whether it’s improving operational efficiency or supercharging the customer experience, IoT has massive potential to fuel business growth, drive innovation, and improve people’s lives. That said, connecting IoT devices often goes hand in hand with greater complexity, and choosing the right technology and partners is a minefield.
View MoreEmbedding the Attacker’s Perspective: An Inside Look Into How Hackers Prioritize Targets at Scale
Join us for an exciting session that dives into the fast-paced world of offensive security. It’s clear that attackers and defenders often come to dramatically different conclusions around risk - even when looking at the same information. In this session, veteran red teamer, Evan Anderson will pull back the curtain to show you how to discover exposures before attackers do.
View MoreScaling Up From Cyber Security to Cyber Resiliency
When an organisation falls victim to a cyber-attack, the security industry is often all too quick to point the finger and speculate over what went wrong. But amidst all the whataboutery, it’s easy to forget that any organisation could be the next on the chopping block. By listening to the lessons learned from enterprise victims of ransomware and wiper attacks across the globe, organisations might be able to spare themselves the same fate. In this session we’ll discuss why legacy approaches to cyber security have failed to prevent crippling ransomware impacts, and look forward to how organisations can truly deliver cyber resilience.
View MoreThe Evolution of Cyber Insurance - How to Reduce Risk and Premiums
Compromised Privileged Accounts are a factor of 80% of cyber breaches, Cyber Insurers are increasingly mandating the protection of these valuable assets. Are you considering how to meet the demands of your cyber insurer and increase security around privileged access?
View MoreThreat Intelligence – know your enemy, know yourself!
We discuss the growing role of Threat Intelligence information in proactive security strategies – how it’s gathered; how it’s curated; how relevant it is to your business and how you decide on which feeds, reports and actionable intelligence you need, and use, on a daily basis. We also discuss what the future is for Threat intelligence services and its place in your cybersecurity strategy and for a wider range of businesses.
View MoreOptimising your data analytics outcomes by simultaneously delivering on existing and new imperatives.
The Quick Wins & Strategic Gains of Modernising Your Data Stack. What can a savvy CDAO and team do with the investments already made?
View MoreScaling Up From Cyber Security to Cyber Resiliency
When an organisation falls victim to a cyber-attack, the security industry is often all too quick to point the finger and speculate over what went wrong. But amidst all the whataboutery, it’s easy to forget that any organisation could be the next on the chopping block. By listening to the lessons learned from enterprise victims of ransomware and wiper attacks across the globe, organisations might be able to spare themselves the same fate. In this session we’ll discuss why legacy approaches to cyber security have failed to prevent crippling ransomware impacts, and look forward to how organisations can truly deliver cyber resilience.
View MoreDiscussion: Scaling Up From Cyber Security to Cyber Resiliency
When an organisation falls victim to a cyber-attack, the security industry is often all too quick to point the finger and speculate over what went wrong. But amidst all the whataboutery, it’s easy to forget that any organisation could be the next on the chopping block. By listening to the lessons learned from enterprise victims of ransomware and wiper attacks across the globe, organisations might be able to spare themselves the same fate. In this session we’ll discuss why legacy approaches to cyber security have failed to prevent crippling ransomware impacts, and look forward to how organisations can truly deliver cyber resilience.
View MoreOptimising your data analytics outcomes by simultaneously delivering on existing and new imperatives.
The Quick Wins & Strategic Gains of Modernising Your Data Stack. What can a savvy CDAO and team do with the investments already made?
View MoreScaling Up From Cyber Security to Cyber Resiliency
When an organisation falls victim to a cyber-attack, the security industry is often all too quick to point the finger and speculate over what went wrong. But amidst all the whataboutery, it’s easy to forget that any organisation could be the next on the chopping block.
View MoreOptimising your data analytics outcomes by simultaneously delivering on existing and new imperatives.
The Quick Wins & Strategic Gains of Modernising Your Data Stack. What can a savvy CDAO and team do with the investments already made?
View MoreMarrying your Digital Transformation with a Zero Trust Framework
When creating a Zero Trust strategy for your organisation, it can be a challenge to know where to start. During this roundtable, we will walk through how different customers have worked out a roadmap towards adopting Zero Trust policies across their infrastructure and users and explain why you should be talking about Zero Trust and SASE at the same time you go through your digital transformation journey.
View MoreOutrunning the Grizzly - Reducing Your Attack Surface
How fast do you have to run to outrun a grizzly? Only faster than someone else! Attack surface is much the same argument.
View MoreGNSS/GPS and the Automotive Sector – What does the future hold?
There's a long way to go before autonomous driving becomes the norm, and key to this change will be the accuracy and integrity of positioning and navigation data. During this roundtable we will share insights and experiences on how advances in GNSS technology are shaping the future of automotive technology.
View MoreThe guilty secrets of MXDR providers are coming to light and we’ll help you avoid the pitfalls of so-called promised AI and machine learning
In 2022, North America suffered from the most Ransomware attacks globally. February saw a 45% increase from January in ransomware attacks, with North America targeted by 47% of those in February. How do you choose a consistent and quality MXDR provider to help mitigate against such a growing threat?
View MoreMarrying your Digital Transformation with a Zero Trust Framework
When creating a Zero Trust strategy for your organisation, it can be a challenge to know where to start. During this roundtable, we will walk through how different customers have worked out a roadmap towards adopting Zero Trust policies across their infrastructure and users and explain why you should be talking about Zero Trust and SASE at the same time you go through your digital transformation journey.
View MoreSucceeding with Context-Aware, Real-Time Fraud Detection
When it comes to fraudulent activity, knowing your customer, your organisation’s knowledge gaps, and where bad actors are likely to attack is critical. But in reality, it's not that easy.
View MoreHow Data is Driving Next-Generation Customer Experiences
This dinner discussion will explore the latest innovations in Data Integrity, Customer Experience, and taking full advantage of the Cloud.
View MoreOptimising your data analytics outcomes by simultaneously delivering on existing and new imperatives (3)
The Quick Wins & Strategic Gains of Modernising Your Data Stack. What can a savvy CDAO and team do with the investments already made?
View MoreOptimising your data analytics outcomes by simultaneously delivering on existing and new imperatives (4)
The Quick Wins & Strategic Gains of Modernising Your Data Stack. What can a savvy CDAO and team do with the investments already made?
View MoreThe Modern CISO’s Toolbox: Collaboration, Automation, and Prevention
The job of the modern CISO is not an easy one. Security environments proliferate into the cloud and beyond, new ways of working bring new challenges, and attackers are constantly evolving and prodding for vulnerabilities. But this isn’t to say that a modern CISO doesn’t have any tricks of their own.
View MoreThreat Intelligence – know your enemy, know yourself!
This roundtable will discuss the growing role of Threat Intelligence information in proactive security strategies – how it’s gathered; how it’s curated; how relevant it is to your business and how you decide on which feeds, reports and actionable intelligence you need, and use, on a daily basis.
View MoreOptimising your data analytics outcomes by simultaneously delivering on existing and new imperatives.
The Quick Wins & Strategic Gains of Modernising Your Data Stack. What can a savvy CDAO and team do with the investments already made?
View MoreHow Data is Driving Next-Generation Customer Experiences
This dinner discussion will explore the latest innovations in Data Integrity, Customer Experience, and taking full advantage of the Cloud.
View MoreThe challenges of Data Migration to the Cloud and the importance of assessing what data needs to be migrated, where it's held and how it's governed.
Most organisations that are undergoing a ‘digital transformation’ are involved in some re-platforming or migration to the cloud. However they nearly always forget that digital transformation is only successful is it walks hand-in-hand with a data transformation.
View MoreUnderstanding how Innovative Technology Trends are Critical to Successful Business Outcomes
Join Williams Racing CIO, Doug Goodridge, and invited guests as we discuss the critical role constant innovation plays in building a business that's future-proof. Artificial Intelligence and Machine Learning are underlying technologies increasingly found within our most commonly-deployed enterprise software applications - take this opportunity to learn how Williams Racing and Broadcom help to drive innovation throughout their organisations and offerings.
View MoreScaling Up From Cyber Security to Cyber Resiliency
When an organisation falls victim to a cyber-attack, the security industry is often all too quick to point the finger and speculate over what went wrong. But amidst all the whataboutery, it’s easy to forget that any organisation could be the next on the chopping block. By listening to the lessons learned from enterprise victims of ransomware and wiper attacks across the globe, organisations might be able to spare themselves the same fate. In this session we’ll discuss why legacy approaches to cyber security have failed to prevent crippling ransomware impacts, and look forward to how organisations can truly deliver cyber resilience.
View MoreNavigating the threat landscape in financial services & insurance
With the continued transformation of how we work and how we make ourselves available and visible to customers, comes the continued expansion of how we expose ourselves to new attack paths for those that want to digitally assault us. According to our research, half those surveyed feel that their corporate attack surface is spiralling out of control, further complicated by what the boardroom expects IT to deliver.
View MoreThe Evolution of Cyber Insurance and the need for Privileged Access Management to reduce risk
The cyber insurance industry is evolving fast to help your business mitigate risk. Cyber insurance offers a safety net for businesses threatened by the rapid growth of insider cybercrime and external cyber threats, particularly ransomware. While cyber insurance has been a reliable safety net for years – driven by accelerating insider cybercrime and exploding ransomware attacks – things are changing fast. It’s important to understand the dynamics of the rapidly changing market and consider how well your security controls will stand up to an insurance company’s review.
View MoreSucceeding with Context-Aware, Real-Time Fraud Detection
When it comes to fraudulent activity, knowing your customer, your organization’s knowledge gaps, and where bad actors are likely to attack is critical. But in reality, fraud solution teams have challenges pulling all the required data elements together to create context and insights early enough in the life cycle of their data to combat fraud effectively. Attending this dinner will allow you to discuss the need for and value of a context-aware, real-time fraud detection solution.
View MoreIdentity Orchestration for Enhanced Security and Experience
The Identity and Access Management landscape for customers and employees is continuously evolving. By staying ahead of market trends, Ping Identity and iC Consult assist organizations in building better, seamless, and secure digital experiences across various industries. Join Ping Identity and iC Consult for an in-person dinner in Stuttgart on June 15. Discover the advantages of Identity Orchestration in effortlessly deploying and implementing IAM and CIAM solutions. This engaging dinner will also feature discussions on several real-world customer use cases.
View MoreReframing DevSecOps Governance - Achieving your Security and Compliance needs by Aligning Teams Across the Value Stream
Governance at scale is a hard problem in any organization. With legislative, regulatory and availability pressures impacting how well we govern the Software Development Life Cycle (SDLC), the public and private sector needs to reframe governance as an enabler and not a source of tension and friction. In this session, we will examine factors that impact our ability to adequately govern our SDLC, and outline frameworks that allow governance to drive a more secure software supply chain.
View MoreFuture of Banking - Identifying new growth opportunities through APIs
Open technologies present both opportunities and challenges for financial institutions. The increasing complexities in regulations and collaboration with FinTech’s and 3rd party partners may lead to security and data privacy concerns, as well as technical challenges to developing standardized APIs and providing data-sharing protocols. However, the potential benefits of digital growth and building new business models far outweigh these challenges. Embracing new growth paths with APIs is crucial for banks to remain competitive in today's financial landscape and these issues can no longer be a roadblock. Financial institutions can remain competitive by offering personalized experiences and embracing open technologies and adopting API’s model of business, which is reshaping the industry.
View MoreSASE Architecture: The Future of Privileged Access and Zero Trust
Ever since hitting the scene, Secure Access Service Edge (SASE) has quickly developed a reputation for being the next big thing in cyber security. By leveraging SASE architecture, enterprises are able to implement Zero Trust principles throughout their network more easily than ever. SASE promises to reduce complexity and cost while improving performance and enhancing security, but no solution comes without challenges.
View MoreIs Your Business Prepared for a Kubernetes Disaster? Avoid Downtime and Data Loss with Insights from Industry Leaders
Unforeseen disasters can happen at any moment, leaving your Kubernetes infrastructure vulnerable to data loss and downtime. Join our event to hear from industry experts on the business impact of inadequate Kubernetes backup, and explore strategies to protect your organization against data loss and downtime.
View MoreEmbedding the Attacker’s Perspective: An Inside Look Into How Hackers Prioritize Targets at Scale
Join us for an exciting session that dives into the fast-paced world of offensive security. It’s clear that attackers and defenders often come to dramatically different conclusions around risk - even when looking at the same information. In this session, we will pull back the curtain to show you how to discover exposures before attackers do.
View MoreCyber Resilience. Sustainability. Even on a budget. Bottom-line: Future-proofing your organisation is a team sport
Technology leaders face increasing responsibilities to lead digital transformation, including keeping their companies cyber resilient, all data safe and secure. Whilst implementing strategies to reduce their carbon footprint and minimizing the environmental impact of their existing and new infrastructure and technology.
View MoreMarrying your Digital Transformation with a Zero Trust Framework
Creating a Zero Trust strategy for your organization can be a challenge to know where to start. During this roundtable, we will walk through how different customers have worked out a roadmap towards adopting zero trust policies across their infrastructure and users and explain why you should be talking about Zero Trust and SASE at the same time you go through your digital transformation journey.
View MoreFrom Ransomware Horror to Cloud Data Savior: How One Company Found Redemption Through Cloud Migration
Ransomware attacks are one of the fastest-growing cyber threats in recent history, predicting attacks to businesses and consumers every 2 seconds by 2031. Learn from a real-life example how you can mitigate risk by considering modern cloud solutions to not only prevent attacks but also enabling you to recover quickly in cases of disaster.
View MoreSecurity for Manufacturing Organizations- Protecting the crown jewels
In addition to the core ERP functionality provided by SAP, manufacturing companies rely on SAP to execute manufacturing processes, analyze manufacturing and business data, and integrate systems with a cost-effective, high-quality, and resource-efficient method based on Industry 4.0. Join this session to understand the latest threats to the Manufacturing Industry and to take back actionable tips to operate secure and resilient SAP Applications.
View MoreThreat Intelligence – know your enemy, know yourself!
We discuss the growing role of Threat Intelligence information in proactive security strategies – how it’s gathered; how it’s curated; how relevant it is to your business and how you decide on which feeds, reports and actionable intelligence you need, and use, on a daily basis. We also discuss what the future is for Threat intelligence services and its place in your cybersecurity strategy and for a wider range of businesses.
View MoreChallenging the sales and marketing status quo
There’s comfort in the status quo, it’s familiar, predictable and easy. But what got you here, won’t get you where you want to go. Sales and marketing strategies and solutions must evolve, or risk the cost of inaction—a web of challenges and missed opportunities. Companies that effectively challenge the status quo will drive growth and greater ROI.
View MoreKnow your enemy: Understanding how hackers prioritise targets and using it against them
Offensive security is a fast-paced environment. Attackers are constantly upping their game and it is the job of security experts to stay ahead. However, even when looking at the same information, it’s clear that attackers and defenders often come to dramatically different conclusions around risk. Therefore, by better understanding the attacker’s perspective, security experts will be more able than ever to second guess their opponents and head them off before they get in.
View MoreFrom Ransomware Horror to Cloud Data Savior: How One Company Found Redemption Through Cloud Migration
Ransomware attacks are one of the fastest-growing cyber threats in recent history, predicting attacks to businesses and consumers every 2 seconds by 2031. Learn from a real-life example how you can mitigate risk by considering modern cloud solutions to not only prevent attacks but also enabling you to recover quickly in cases of disaster.
View MoreThe unseen industry cyber security innovations, research themes, and pragmatic advice
We’re supporting the UK’s Tech, Media and Telecoms (TMT) sectors to achieve 'best in class' cyber resilience; managing increasing risks to your intellectual property and confidential data. The rapid integration of new technologies and advances in areas such as AI and quantum computing means that CISOs need more information and guidance than ever to manage their organisational risks. During our executive round table dinner, you’ll meet and discuss with peers about how they’re managing risk in the ever-evolving technology and threat landscapes.
View MoreIdentity Centric Security with Email: Reduce Risk and Improve Organisational Control
It’s a common misconception that email-borne attacks originate only from external entities, which is not always the case! Attackers are typically looking to expand to include supply chain partners or exfiltrate sensitive data to amplify the attack. Identity centric security is becoming even more critical when trying to combat these attacks. Mimecast and Okta have partnered to provide an integrated solution to improve detections, mitigate and stop insider threats.
View MoreRansomware: the extortionists have upped their game, are your defenders keeping up?
Cyberattacks are more impactful and frequent, even with the right security technology in place. Organisations have been forced to kick start their digital transformations and cloud adoptions to keep the attackers out. But the big question is: are you equipped against ransomware attacks and what’s the best recovery formula to adopt based on your organisation size and needs?
View MoreMastering Cloud Security: Sharing responsibility in the face of growing 3rd party risks
Transitioning to cloud infrastructures offers numerous benefits, including flexibility, agility, and scalability. However, these cloud platforms also present unique risks and challenges that require careful consideration. As businesses increasingly rely on third-party cloud partners like AWS and Azure, it becomes crucial to address the evolving risk landscapes and ensure collaborative responsibility for cloud security.
View MoreKnow your enemy: Understanding how hackers prioritise targets and using it against them
Offensive security is a fast-paced environment. Attackers are constantly upping their game and it is the job of security experts to stay ahead. However, even when looking at the same information, it’s clear that attackers and defenders often come to dramatically different conclusions around risk. Therefore, by better understanding the attacker’s perspective, security experts will be more able than ever to second guess their opponents and head them off before they get in.
View MoreTop Business Priorities Intelligent Automation Can Address Right Now
A lot of businesses have started using automation technology to unburden their workforce of repetitive tasks – about 60% in the UK, according to our research. Yet the extent to which the technology can address some of today’s biggest business challenges is still vastly underappreciated. Whether it’s tackling rising costs, overcoming a skilled labour shortage, meeting sustainability goals or maximising the value of employees’ time and talents, intelligent automation – the combination of AI and automation technologies – has a vital role to play.
View MoreSustainable. Secure. Affordable - Your data centre of the future
Driving decarbonisation in your data centre can unlock economic opportunity. Additionally ensuring your data is secure and resilient against cyber threats. Sustainability isn’t a buzz word but a real requirement. Forward thinking organisations should have a decarbonisation strategy ensuring they are future-proof, as well as compliant to future regulations.
View MoreScaling Up From Cyber Security to Cyber Resiliency
When an organisation falls victim to a cyber-attack, the security industry is often all too quick to point the finger and speculate over what went wrong. But amidst all the whataboutery, it’s easy to forget that any organisation could be the next on the chopping block. By listening to the lessons learned from enterprise victims of ransomware and wiper attacks across the globe, organisations might be able to spare themselves the same fate. In this session we’ll discuss why legacy approaches to cyber security have failed to prevent crippling ransomware impacts, and look forward to how organisations can truly deliver cyber resilience.
View MoreVisibilities role in protecting and maintaining compliance across critical infrastructure in the era of converged IT, OT and IoT
Achieving a state of continuous visibility across all managed and un-managed devices, applications and users, spanning all networks, IT, OT or IoT, is no easy feat. But when it comes to protecting critical infrastructure, visibility gaps have far greater consequences, from non-compliance, to breaches and operational downtime. This virtual roundtable will discuss visibilities role in protecting and maintaining compliance across critical infrastructure in the era of converged IT, OT and IoT.
View MoreSecuring Applications from Code to Cloud
In the modern landscape of increasing cyber threats and data breaches, our increasing reliance on apps and digital services has made the security of applications more vital than ever. Further complicating matters are the ever-growing cloud environments most organisations operate in today. As a result, organisations face multifaceted challenges when securing applications across their entire lifecycle. Whether you are establishing DevSecOps and secure coding practices or trying to stay on top of emerging security threats and tools, the road from code development to deployment on the cloud is more difficult than ever.
View MoreThe Journey Towards Security Through Identity
With business needs outpacing security, and new and greater risks continuously arising, the task of securing your organization against threats has never been more challenging. While there is no one clear path to success, one thing is clear - Identity is the control plane of the modern organization and is a central component to establishing a strong security posture.
View MoreEmbedding the Attacker’s Perspective: An Inside Look Into How Hackers Prioritize Targets at Scale
Join us for an exciting session that dives into the fast-paced world of offensive security. It’s clear that attackers and defenders often come to dramatically different conclusions around risk - even when looking at the same information. In this session, veteran red teamer, Evan Anderson will pull back the curtain to show you how to discover exposures before attackers do.
View MoreHow Next-Gen Customer Communications is shaping CX in Financial Services
This dinner discussion will explore the latest innovations in Data Integrity, Customer Experience, and taking full advantage of the Cloud. Participants will share insights and ideas for leveraging cutting-edge technologies and strategies to improve business performance, enhance customer engagement, and streamline operations. Precisely will highlight real-world examples of successful innovation and provide practical advice for organizations seeking to stay ahead of the curve.
View MoreThe ROI of CX Transformation
The case for investing in CX is irrefutable – not only from the perspective of revenue growth & cost optimisation, but also long-term competitive advantage. What is harder to define is how and where that investment should be made, and what outcomes justify it. Organisations are struggling against hurdles that impede the flexibility, cost effectiveness, and control they’re looking to harness. With the buyer’s journey being more non-linear than ever – how can your company streamline and personalise it for your customers?
View MoreEmbedding the Attacker’s Perspective: An Inside Look Into How Hackers Prioritize Targets at Scale
Join us for an exciting session that dives into the fast-paced world of offensive security. It’s clear that attackers and defenders often come to dramatically different conclusions around risk - even when looking at the same information. In this session, veteran red teamer, Evan Anderson will pull back the curtain to show you how to discover exposures before attackers do.
View MoreThe year is 2023, the big question is: What is missing from your cyber resiliency plan?
Have you ever wondered what gaps or blind spots might be weakening your cyber recovery plans? Are there things you haven’t factored in when it comes to cyber resiliency? Ransomware is a constant threat that isn’t going to end any time soon, is it on your radar? does it keep you awake at night? So, how do we stay prepared in the best and most relevant way?
View MoreXDR: Is Seeing Really Securing?
The rapid evolution of cyber threats and the increasing sophistication of attacks have made it imperative for organisations to proactively work to stay ahead of emerging threats. But with networks stretching out into the cloud and beyond, monitoring your attack surface is quickly becoming 0 sum game, and as the old saying goes, “you can’t secure what you aren’t aware of”. Extended detection & response offers a new approach of holistic protection, but is seeing really securing?
View MoreHybrid Cloud. Sustainability. Cyber Resilience. Achievable - even on a budget. Bottom-line: Future-proofing your organisation is a team sport.
Cloud is not the destination but is seen as the future operating model for data centres. Hence hybrid-cloud is seen as the infrastructure to a nimble data centre and cloud-native as the application modernisation. Both are complex new realities for organisations. While multiple cloud and cloud native applications ensure choice and flexibility, they also create operational complexity.
View MoreLook to the login box to increase CX and consumer loyalty
We all know how frustrating passwords can be—remembering them, recovering them, not to mention meeting complex requirements. Now imagine how your customers feel when encountering these same pain points on your apps. It’s time for a more modern approach to identity, starting with the login box. By making this a more secure and delightful user experience, you’ll attract more customers and inspire lasting brand loyalty.
View MoreIn the Spirit of Security: Digital Risk in Modern Software and Infrastructure
In today's interconnected world, where businesses depend on digital technologies, every business is a software business, relying heavily on software libraries. Challenges are hard for CISO’s to have an overview of the risk of their environment and which supplier is connected where.
View MoreMarrying your Digital Transformation with a Zero Trust Framework
Creating a Zero Trust strategy for your organization can be a challenge to know where to start. During this roundtable, we will walk through how different customers have worked out a roadmap towards adopting zero trust policies across their infrastructure and users and explain why you should be talking about Zero Trust and SASE at the same time you go through your digital transformation journey.
View MoreHybrid Cloud. Sustainability. Cyber Resilience. Achievable - even on a budget. Bottom-line: Future-proofing your organisation is a team sport.
Cloud is not the destination but is seen as the future operating model for data centres. Hence hybrid-cloud is seen as the infrastructure to a nimble data centre and cloud-native as the application modernisation. Both are complex new realities for organisations. While multiple cloud and cloud native applications ensure choice and flexibility, they also create operational complexity.
View MoreEmbedding the Attacker’s Perspective: An Inside Look Into How Hackers Prioritize Targets at Scale
Join us for an exciting session that dives into the fast-paced world of offensive security. It’s clear that attackers and defenders often come to dramatically different conclusions around risk - even when looking at the same information. In this session, veteran red teamer, Evan Anderson will pull back the curtain to show you how to discover exposures before attackers do.
View MoreCyber Readiness, cracking the code with visibility
In today's era of escalating cyber assaults, organisations require efficient strategies to outpace threats and establish a proactive security stance. But to keep safe, visibility is key. Understanding our vulnerabilities from an attacker's perspective is crucial for self-defence. Armed with this awareness, you can ensure readiness to respond to new and unexpected attacks.
View MoreTurning visibility into action: identifying and responding quicker to operational and cyber risks within your OT environment
Achieving continuous visibility across heterogeneous networks, as well as managed and unmanaged devices, is critical in detecting today’s threats and responding to risks targeting OT, ICS and SCADA environments. This roundtable will discuss visibility's vital role in understanding risks, but also the critical requirement to take action to mitigate them and establishing automation and orchestration policies to reduce noise and manual effort on tedious tasks.
View MoreDriving Decarbonization in Your Data Centre To Unlock Economic Opportunity
The exponential growth of global data creation presents both opportunities and challenges for businesses worldwide. According to Statista, data creation more than doubled from 41 to 97 zettabytes between 2019 and 2022, with a forecast to nearly double again by 2026. A recent global research study by Hitachi Vantara highlighted sustainability as a major priority for businesses, revealing that although many claim to have sustainable plans in place, the reality is more complex, particularly concerning the impact of data centres.
View MoreFrom Vulnerability to Victory: Mastering Next-Gen Tactics to Thwart Software Supply Chain Attacks
According to Gartner, 45% of organizations worldwide will experience attacks on their software supply chains by 2025. With software supply chain attacks on the rise, organizations are struggling to detect, let alone prevent, these attacks. Breaches, compromises, or vulnerabilities anywhere in the supply chain can lead to severe consequences ranging from regulatory fines and lawsuits to potential impact on your market share and brand reputation. No one is immune to these mounting threats – so how do we move from vulnerability to victory?
View MoreSASE: Is this the next big thing?
As organisations seek to adapt and thrive in an increasingly digital landscape, the concept of SASE has emerged as a potential game-changer. However, amidst the buzz and excitement, it's essential to delve deeper and critically examine whether SASE truly lives up to its hype as the next big thing and whether or not it holds the key to revolutionising network architecture and cyber security.
View MoreGlobal IoT: It all starts with the device
Thanks to the ever-growing Internet of Things, soon everything will be connected. Whether it’s improving operational efficiency or supercharging the customer experience, IoT has massive potential to fuel business growth, drive innovation, and improve people’s lives. That said, connecting IoT devices often goes hand in hand with greater complexity, and choosing the right technology and partners is a minefield.
View MoreRe-Architecting the Enterprise: The Role of Apache Kafka® and Data in Motion
The recent revolution in data infrastructure and application architecture has transformed how organisations, from the traditional to the digital native, work with data. But to truly take advantage of data in motion as the most strategic platform within your company, it must move from the domain of one-off engineering initiatives into a central nervous system for the enterprise.
View MoreThreat Intelligence – know your enemy, know yourself!
We discuss the growing role of Threat Intelligence information in proactive security strategies – how it’s gathered; how it’s curated; how relevant it is to your business and how you decide on which feeds, reports and actionable intelligence you need, and use, on a daily basis. We also discuss what the future is for Threat intelligence services and its place in your cybersecurity strategy and for a wider range of businesses.
View MoreSASE: Is this the next big thing?
As organisations seek to adapt and thrive in an increasingly digital landscape, the concept of SASE has emerged as a potential game-changer. However, amidst the buzz and excitement, it's essential to delve deeper and critically examine whether SASE truly lives up to its hype as the next big thing and whether or not it holds the key to revolutionising network architecture and cyber security.
View MoreSASE: Is this the next big thing?
As organisations seek to adapt and thrive in an increasingly digital landscape, the concept of SASE has emerged as a potential game-changer. However, amidst the buzz and excitement, it's essential to delve deeper and critically examine whether SASE truly lives up to its hype as the next big thing and whether or not it holds the key to revolutionising network architecture and cyber security.
View MoreThe guilty secrets of MSSPs
Whether you outsource your security monitoring solution or run your SOC in house, how do you actually know if your cybersecurity detection, alert, and response is good enough? With North America continuing to be the most targeted region by ransomware attacks (51% victims operating within that region), how can you be sure that your current security monitoring solution is able to mitigate such a growing threat?
View MoreNavigating NIS2: Preparing for Compliance and Success
With the second implementation of the Network and Information Security Directive (NIS2) looming on the horizon, organisations are faced with the task of adapting and complying with the evolving cyber security landscape. Where should organisations start when preparing for NIS2 compliance? Understanding the regulatory framework and its challenges will be the first step towards a successful strategy that can lead your organisation to success and being NIS2 compliant with time to spare.
View MoreCyber-certainty through Visibility
In order to create an effective cyber security strategy that can outpace threats, it is essential to have visibility of your entire IT environment. Without true visibility, you may not be aware of vulnerabilities that could be exploited by attackers. Armed with this information, you can stay safe and ensure you are ready for any new and unexpected cyber threats.
View MoreThe current state of play for generative and conversational AI – is it a divisive tool or an exciting one?
Generative and Conversational AI are defining the future of everyday experiences, forging stronger connections between companies and customers and propelling engagement towards a more innovative and customer-centric future. By leveraging the distinctive power of both technologies, companies can create intelligent virtual assistants that provide extraordinary experiences, around-the-clock while driving customer loyalty, satisfaction and cost savings to new heights.
View MoreThe Rise of Data Governance: Building a Strong Foundation and Empowering Organisations
Now more than ever, organisations are recognising the importance of proactively governing and managing their data assets. Effective data governance not only enables companies to comprehend and make quicker decisions, but also enhances the overall confidence in their data-driven operations. However, embracing data governance is not without its challenges and organisations must proactively address these hurdles to build a robust data governance strategy that ensures data quality, security, and compliance while enabling data-driven decision-making.
View MoreGlobal IoT connectivity: It all starts with the device
With 80% of IoT projects failing due to device-related challenges, the focus has shifted to designing connectivity into the device at the start to avoid problems later on in the project. Therefore offering the potential to revolutionise device management and connectivity in the IoT ecosystem.
View MoreThe challenges of Data Migration to the Cloud and the importance of assessing what data needs to be migrated, where it's held and how it's governed
Most organisations that are undergoing a ‘digital transformation’ are involved in some re-platforming or migration to the cloud. However they nearly always forget that digital transformation is only successful is it walks hand-in-hand with a data transformation.
View MoreHarnessing AI to Accelerate Innovation
After several tumultuous years, business leaders are looking to their IT teams to protect their organization from threats, facilitate geographic and financial growth, and ensure innovation accelerates at pace. The pressure on tech teams to enable future-proofed business strategies has never been greater. IT is now firmly on the board-level agenda. Yet, with corporate budgets under pressure amidst continued economic uncertainty, the need to deliver real return on investment in new technologies and digital strategies is paramount.
View MoreNow that your IT and OT have converged; what cyber risks are you faced with?
Digital transformation through the convergence of operational technology (OT) and information technology (IT) has created smarter, highly computerised environments that enhance productivity but leave organisations vulnerable to attacks. During our dinner we’ll discuss some of the challenges presented by this paradigm shift including supply chain risk, maintainability, safety, reliability, availability, compliance and skill shortages.
View MoreRansomware Recovery - Be Prepared, not scared.
In a world where cyber and ransomware attacks are at an all time high and increasingly sophisticated, it's becoming ever more apparent that it's more a matter of if, not when an organisation will face such a threat. ... and if that organisation is yours, do you know how long it will take you to recover your data? Weeks? Days? Or minutes?
View MoreIdentity Orchestration for Enhanced Security and Experience
The Identity and Access Management landscape for customers and employees is continuously evolving. By staying ahead of market trends, Ping Identity and iC Consult assist organizations in building better, seamless, and secure digital experiences across various industries. Join Ping Identity and iC Consult for an in-person dinner in Frankfurt on October 12th, to discover the advantages of Identity Orchestration in effortlessly deploying and implementing IAM and CIAM solutions. This engaging dinner will also feature discussions on several real-world customer use cases.
View MoreRe-Architecting the Enterprise: The Role of Apache Kafka® and Data in Motion
The recent revolution in data infrastructure and application architecture has transformed how organisations, from the traditional to the digital native, work with data. But to truly take advantage of data in motion as the most strategic platform within your company, it must move from the domain of one-off engineering initiatives into a central nervous system for the enterprise.
View MoreCyber Risk is a Business Risk - Navigating Uncertainties and Mindset Shifts
In today's digital age, the growing interconnectivity of businesses and the increasing sophistication of cyber threats have elevated cyber security to a critical business component. It is security’s responsibility to strike the delicate balance between ensuring robust security and fostering agility and innovation. All of this leads to the inescapable conclusion that any cyber risk is a business risk. With organisations facing an ever-evolving threat landscape, understanding security’s role within the business strategy is now paramount.
View MoreManaging Threat – know your enemy, know your allies, know yourself!
We discuss the growing role of Threat Intelligence feeds, reports and information in proactive security strategies – how it’s gathered; how it’s curated; how relevant it is to your business and how you decide on which feeds, reports and actionable intelligence you need, and use, daily. We discuss what the future is for Threat intelligence services and its place in your cybersecurity strategy and for a wider range of businesses; the role for internal and external resource in managing this intelligence in the wider context of improving cybersecurity posture; and what the future cybersecurity provision may look like. Internal, external or hybrid?
View MoreSustainable. Secure. Affordable - Your data centre of the future
Driving decarbonisation in your data centre can unlock economic opportunity. Additionally ensuring your data is secure and resilient against cyber threats. Sustainability isn’t a buzz word but a real requirement. Forward thinking organisations should have a decarbonisation strategy ensuring they are future-proof, as well as compliant to future regulations.
View MoreWhat comes first: Enterprise architecture or Digital Transformation?
Digital Disruption continues to impact the banking, insurance, and manufacturing industries. To be successful, businesses need to deliver personalized and connected customer experiences across multiple touchpoints. In this roundtable, we’ll discuss the challenges of Enterprise Architecture and the barriers to agile digital disruption and change.
View MoreThe Evolution of Automation and DevOps in Testing: How it can impact your business
With the rapid rise of digital transformation disrupting business models to deliver better customer experience, Automation and DevOps are becoming almost mandatory to facilitate meeting this challenge.
View MoreEvolution of email security - Understanding and mitigating human risk through adaptive security
Every organization has one thing in common: email remains their riskiest channel in 2023. They’re vulnerable to advanced phishing attacks that have been evolved to bypass existing defenses, and to human error and data exfiltration. As advanced, persistent threats continue to evolve, we recognize that people are the biggest risk to organizations’ security and are most exposed when using email.
View MoreEmbedding the Attacker’s Perspective: An Inside Look Into How Hackers Prioritize Targets at Scale
Join us for an exciting session that dives into the fast-paced world of offensive security. It’s clear that attackers and defenders often come to dramatically different conclusions around risk - even when looking at the same information. In this session, veteran red teamer, Evan Anderson will pull back the curtain to show you how to discover exposures before attackers do.
View MoreNavigating NIS2: Preparing for Compliance and Success
With the second implementation of the Network and Information Security Directive (NIS2) looming on the horizon, organisations are faced with the task of adapting and complying with the evolving cyber security landscape. Where should organisations start when preparing for NIS2 compliance? Understanding the regulatory framework and its challenges will be the first step towards a successful strategy that can lead your organisation to success and being NIS2 compliant with time to spare.
View MoreThe current state of play for generative and conversational AI – is it a divisive tool or an exciting one?
Generative and Conversational AI are defining the future of everyday experiences, forging stronger connections between companies and customers and propelling engagement towards a more innovative and customer-centric future. By leveraging the distinctive power of both technologies, companies can create intelligent virtual assistants that provide extraordinary experiences, around-the-clock while driving customer loyalty, satisfaction and cost savings to new heights.
View MoreReduce Costs. Simplify IT Ops. Improve Data Security. Cloud optimisation for Healthcare organisations
Trust leaders are facing growing challenges from data breaches, and how these are impacting backlogs, workloads and reducing efficiency. Digital transformation is at the forefront of empowering healthcare trusts to optimize, simplify and deliver to meet and exceed targets.
View MoreHandling Disruptions in an Innovative World
In the modern world of organizations dependent on IT services to operate effectively, organizations are challenged with trying to innovate and improve those systems while also keeping them available and useful. When that goes wrong, organizations have to come together to handle these disruptions quickly and effectively. What does this look like today and in the future?
View MoreOptimizing Hybrid Cloud: Maximizing Returns and Managing Costs
In today's fast-paced tech landscape, hybrid cloud infrastructure is essential for competitive organisations. While it offers significant advantages, navigating its complexities and cost implications can be challenging. The COVID-19 pandemic accelerated cloud adoption for remote work and scalability, but rising inflation is now driving a renewed focus on cost control through cloud consolidation.
View MoreMove Beyond SIEM - How to reduce risk, complexity and cost for your SOC
Is SIEM obsolete? SIEM customers are dealing with data volumes and costs that have become unmanageable, whilst incident investigation and triage processes are lengthy and cumbersome. While organizations still rely on SIEM, analysts are drowning in false positives and noisy alerts. It’s time to move on.
View MoreIn the Spirit of Security: Digital Risk in Modern Software and Infrastructure
In today's interconnected world, where businesses depend on digital technologies, every business is a software business, relying heavily on software libraries. It is hard for CISOs to have an overview of the risk of their environment and who is connected where and why.
View MoreTLC Connect: CISO Series
Whether you are prioritising Zero Trust, augmenting security with AI, or simply trying to stay ahead of the latest threats, it’s no secret that modern technology is going to play a pivotal role in the evolution of modern business. But with so much technology at our fingertips, the challenge now is understanding where to go from here. Join us later this year for TLC Connect: CISO series, where we will be bringing our community together for a highly focused, day long summit where we will be evaluating our security landscape, tackling its challenges, and charting a course towards to the future.
View MoreTLC Connect: CDO Series
Whether you are establishing visibility of your data, deploying advanced AI and machine learning tools, or simply trying to be more data driven, it’s no secret that modern technology is going to play a pivotal role in the evolution of modern business. But with so much technology at our fingertips, the challenge now is understanding where to go from here. Join us later this year for TLC Connect: CDO series, where we will be bringing our community together for a highly focused, day long summit where we will be evaluating our data landscape, tackling its challenges, and charting a course towards to the future.
View MoreOptimizing your data analytics outcomes by simultaneously delivering on existing and new imperatives.
The Quick Wins & Strategic Gains of Optimising Your Data Stack. Join us for this private, closed-door breakfast meeting where we will be taking a deeper look at: - Integrating your data wherever it lives, on-prem, hybrid, cloud or data mesh deployments. - Freeing up staff for value-add activities, and still reduce errors while accelerating data processing - Keeping data secure and compliant
View MoreReduce Costs. Simplify IT Ops. Improve Data Security. Cloud optimisation for Healthcare organisations
Trust leaders are facing growing challenges from data breaches, and how these are impacting backlogs, workloads and reducing efficiency. Digital transformation is at the forefront of empowering healthcare trusts to optimize, simplify and deliver to meet and exceed targets. Discover the power of cloud and how it’s playing a critical role in improving service delivery & digital transformation across the healthcare industry.
View MoreManaging Threat – know your enemy, know your allies, know yourself!
We discuss the growing role of Threat Intelligence feeds, reports and information in proactive security strategies – how it’s gathered; how it’s curated; how relevant it is to your business and how you decide on which feeds, reports and actionable intelligence you need, and use, daily. We discuss what the future is for Threat intelligence services and its place in your cybersecurity strategy and for a wider range of businesses; the role for internal and external resource in managing this intelligence in the wider context of improving cybersecurity posture; and what the future cybersecurity provision may look like. Internal, external or hybrid?
View MoreThe sales enablement imperative for marketing and sales
For decades buyers have had information readily accessible to them on the internet—but the rise of generative AI has made understanding the information easier. Now sellers must help buyers make sense of information in the context of specific challenges. Yet sales and marketing teams haven’t evolved to operationalize knowledge needed to build trust, add value, and close sales. Revenue teams that are able to effectively adapt to buyers expectations will unleash profitable growth.
View MoreSustainable. Secure. Affordable - Your data centre of the future
Driving decarbonisation in your data centre can unlock economic opportunity. Additionally ensuring your data is secure and resilient against cyber threats. Sustainability isn’t a buzz word but a real requirement. Forward thinking organisations should have a decarbonisation strategy ensuring they are future-proof, as well as compliant to future regulations.
View MoreSupercharge Your Loyalty Program. Deliver Value. Spark Passion. Build lifelong relationships.
If you want to ensure customers choose your brand every time they want or need something you offer, one of the best tools at your disposal is a loyalty program. Although every customer loyalty program looks a little different, the overarching goal is to keep customers engaged and delighted with your brand.
View MoreEvolution of email security - Understanding and mitigating human risk through adaptive security
Every organization has one thing in common: email remains their riskiest channel in 2023. They’re vulnerable to advanced phishing attacks that have been evolved to bypass existing defenses, and to human error and data exfiltration. As advanced, persistent threats continue to evolve, we recognize that people are the biggest risk to organizations’ security and are most exposed when using email.
View MoreCybersecurity Risks of AI in Financial Services
The rapid integration of AI technologies within the financial sector has revolutionised operations; enabling advanced data analytics, improved risk assessment and customer service. It has also introduced new and evolving cybersecurity challenges. Understanding these new threats is key to ensure financial services can continue to innovate while maintaining system assurance.
View MoreDriving efficiencies and optimization to meet stronger security and sustainability initiatives in IT.
From financial services to manufacturing, and retail or legal, organisations in every industry are facing evolving challenges. Ensuring sustainable practices and robust cybersecurity measures are not only crucial for the sector's growth but are also integral to maintaining trust among stakeholders and customers.
View MoreNavigating NIS2: Preparing for Compliance and Success
With the second implementation of the Network and Information Security Directive (NIS2) looming on the horizon, organisations are faced with the task of adapting and complying with the evolving cyber security landscape. Where should organisations start when preparing for NIS2 compliance? Understanding the regulatory framework and its challenges will be the first step towards a successful strategy that can lead your organisation to success and being NIS2 compliant with time to spare.
View MoreHow Net-Gen Customer Communications is shaping CX
This dinner discussion will explore the latest innovations in Data Integrity, Customer Experience, and taking full advantage of the Cloud. Participants will share insights and ideas for leveraging cutting-edge technologies and strategies to improve business performance, enhance customer engagement, and streamline operations. Precisely will highlight real-world examples of successful innovation and provide practical advice for organizations seeking to stay ahead of the curve.
View MoreInnovating Security – Staying head of the adversary in a rapidly evolving landscape
Modern adversaries have fundamentally evolved their tactics in just the last year, requiring a new approach to defending your enterprise. As digital transformation continues to accelerate, attackers are turning their eyes to breaching vulnerable cloud workloads, with a 288% rise over the last year. Despite advancements in cybersecurity, stealing valid credentials remains an effective way to “walk in the front door".
View MoreOptimizing Hybrid Cloud: Maximizing Returns and Managing Costs
In today's fast-paced tech landscape, hybrid cloud infrastructure is essential for competitive organisations. While it offers significant advantages, navigating its complexities and cost implications can be challenging. The COVID-19 pandemic accelerated cloud adoption for remote work and scalability, but rising inflation is now driving a renewed focus on cost control through cloud consolidation.
View MoreBeyond the Cloud Hype: Balancing On-Premise and Cloud Solutions for Optimal Data Management
The cloud migration trend has seen a shift, with many businesses returning to on-premise solutions. Join us to explore a balanced approach to data management, leveraging both cloud and on-premise infrastructures.
View MoreDeliver Value and Security through Zero Trust
While Zero Trust has become an industry slogan among security advocates, it also has been diluted by being associated with specific solutions and technologies. Let’s move beyond the buzzword and the diatribe of repeated messages that fall short in providing a clear and concise path forward. For security practitioners who strongly advocate for Zero Trust, we are going to provide practical and actionable steps on your journey to implementing Zero Trust practices within your environment and realising value for your organization.
View MoreRansomware Recovery - Be Prepared, not scared.
In a world where cyber and ransomware attacks are at an all time high and increasingly sophisticated, it's becoming ever more apparent that it's more a matter of if, not when an organisation will face such a threat. ... and if that organisation is yours, do you know how long it will take you to recover your data? Weeks? Days? Or minutes?
View MoreMarrying your Digital Transformation with a Zero Trust Framework
Creating a Zero Trust strategy for your organization can be a challenge to know where to start. During this roundtable, we will walk through how different customers have worked out a roadmap towards adopting zero trust policies across their infrastructure and users and explain why you should be talking about Zero Trust and SASE at the same time you go through your digital transformation journey.
View MoreData Democratization: The Key to a More Intelligent, AI driven Enterprise
In today's data-focused world, staying competitive requires organisations to embrace data democratisation - granting all members access to data irrespective of their roles or technical know-how to power informed decisions, process enhancement, and innovation. This remains true for our new landscape of AI-powered businesses as well. Data democratisation is crucial for facilitating widespread data availability to create impactful AI models that can automate tasks, predict customer actions, and enhance product development. However, an AI model's effectiveness hinges on its training data and without shared data access, an organisation's AI capabilities remain restricted. Ultimately, it will be those that embrace democratisation that are best positioned for success in the AI era
View MoreRansomware Recovery - Be Prepared, not scared.
In a world where cyber and ransomware attacks are at an all time high and increasingly sophisticated, it's becoming ever more apparent that it's more a matter of if, not when an organisation will face such a threat. ... and if that organisation is yours, do you know how long it will take you to recover your data? Weeks? Days? Or minutes?
View MoreMarrying your Digital Transformation with a Zero Trust Framework
Creating a Zero Trust strategy for your organization can be a challenge to know where to start. During this roundtable, we will walk through how different customers have worked out a roadmap towards adopting zero trust policies across their infrastructure and users and explain why you should be talking about Zero Trust and SASE at the same time you go through your digital transformation journey.
View MoreThe Rise of Data Governance: Building a Strong Foundation and Empowering Organisations
Now more than ever, organisations are recognising the importance of proactively governing and managing their data assets. Effective data governance not only enables companies to comprehend and make quicker decisions, but also enhances the overall confidence in their data-driven operations. However, embracing data governance is not without its challenges and organisations must proactively address these hurdles to build a robust data governance strategy that ensures data quality, security, and compliance while enabling data-driven decision-making.
View MoreHow to Improve Product Discovery with AI Search and Generative Experiences
Join us for a deep dive into the current Commerce landscape and thought-provoking dialogue with peer practitioners. We'll navigate the hype, spotlight real-world opportunities, and explore how to boost revenue and profitability through AI Search and Generative experiences.
View MoreThe current state of play for generative and conversational AI – is it a divisive tool or an exciting one?
Generative and Conversational AI are defining the future of everyday experiences, forging stronger connections between companies and customers and propelling engagement towards a more innovative and customer-centric future. By leveraging the distinctive power of both technologies, companies can create intelligent virtual assistants that provide extraordinary experiences, around-the-clock while driving customer loyalty, satisfaction and cost savings to new heights.
View More