Register

1
2

Events

April 2021
14

Is Your Enterprise Effective at Preventing Cyberattacks as your Employees Work from Home?

Understand and explore the different areas of the cybersecurity lifecycle during this 90 minute, peer-led roundtable, discussing different methods of optimization to achieve effective levels of defence at a reasonable cost.

View More

On-Line Privacy, Security and a Seamless Patient Experience

Join this private, closed door Virtual Roundtable where we will look at how to give patients the privacy and security they needed in a real-life healthcare portal.

View More

Is Your Enterprise Effective at Preventing Cyberattacks as your Employees Work from Home?

As more employees are now working from home, the attack surface is more complex and widely spread, making prevention even harder to achieve. In this virtual roundtable, we address the results and implications of the ground-breaking research The Economic Value of Prevention in the Cybersecurity Lifecycle. Conducted by the Ponemon Institute and sponsored by Deep Instinct, the report analyses the cost savings that can be taken in an efficient, zero-time prevention model.

View More

Succeeding with Operational Resiliency in a New Era

Join us for this roundtable where we will discuss how business recovery must expand to focus on how to build a resilient business – one that can adapt and withstand disruptive events that are sure to come and continue to not only survive but achieve financial and operational targets and continue to grow. We will also talk about how business resiliency approaches must be built upon an integrated risk management approach.

View More

Accelerate Digital Commerce By Preparing for EMV 3DS 2.x

Both Visa and Mastercard are preparing to end their support for EMV 3DS 1.0 in the coming months so ever more important for organisations to ensure readiness for EMV 3DS 2.x standards. The 2.x updated protocol of 3D Secure brings several improvements in a world of card-not-present e-commerce, including creating a secure and frictionless digital shopping experience for consumers, lowering fraud rates and risk of losses as well as increasing revenues for companies that deploy it.

View More

Tackling the Grey IT dilemma

People who manage mission-critical SaaS applications such as SAP or Salesforce often aren't IT. Take HR, for instance. HR leaders use applications to provision and deprovision users, provide payroll, connect to other internal apps, and more. With the push to remote work caused by the pandemic, other departments have also rushed to embrace the cloud's power and flexibility. But who's checking to ensure these connections are all secure? This challenge has brought on the rise of Grey IT – applications the company may be aware of but aren't governing.

View More

How can we use GRC as a business enabler?

Governance, risk, and compliance (GRC) are three related facets that aim to assure an organization reliably achieves objectives, addresses uncertainty and acts with integrity but how often are they used as a control mechanism rather than as a real opportunity for business improvement?

View More

Zero Trust: Good Idea, but what's next?

Join us for an intimate roundtable conversation around the strategic approach to address the increasing needs of a business and the multiple elements of their hybrid cloud and on-prem environments.

View More

DevSecOps at Scale for Digital Innovation

An executive lunch roundtable for business leaders, security & DevOps specialists with an interest in accelerating DevSecOps adoption. Join this private close-door Virtual Roundtable, led by peers including Ramsés Gallego, International Chief Technology Officer for MicroFocus; where we will discuss how to make DevSecOps work and bridging the gap between your application developers and security alongside much more.

View More

Customer IAM: From Myths to Mastery

Customer identity is a hidden danger lurking in every application. Done well, it just works. Done poorly it frustrates your users, gets complicated as you consider policies and regulations, and doesn’t effectively protect your customers or your organization. Unfortunately, the line between “done well” and “done poorly” is thin, hard to detect, and better described using hieroglyphics and 6-dimensional space.

View More

Switch from post-mortems to pre-mortems, respond to incident before they occur

Join us for this private, closed-door Virtual Roundtable where we will be having a deeper discussion around the operational effectiveness of security technologies and their assessment methods.

View More

Moving to the Cloud and the dangers of standing still

During this closed-door, peer-led session, we will tackle some of the challenges businesses face in 2021 and what they can do to overcome the main obstacles.

View More

Accelerate Digital Commerce By Preparing for EMV 3DS 2.x

Both Visa and Mastercard are preparing to end their support for EMV 3DS 1.0 in the coming months so ever more important for organisations to ensure readiness for EMV 3DS 2.x standards. The 2.x updated protocol of 3D Secure brings several improvements in a world of card-not-present e-commerce, including creating a secure and frictionless digital shopping experience for consumers, lowering fraud rates and risk of losses as well as increasing revenues for companies that deploy it.

View More

Defining a Secure and Flexible Path to Data-Centric SASE.

During this private, peer-led virtual roundtable we will discuss the challenges you face in digital transformation, the strategies you’ve embraced to overcome obstacles and how you define SASE nirvana.

View More

Security at the speed of DevOps

Join us for this closed door, peer-lead, 90-minute Virtual Roundtable to discuss DevOps-driven software development approaches are pervasive among organizations embracing the cloud.

View More

Why Disaster Recovery Plans often fail. How long can your company survive without its data?

To meet the unprecedented challenges brought on by the global pandemic, Data Environments have undergone rapid growth and change whilst remaining under pressure to be available 24/7. This rapid transformation is often exposing out-of-date and untested policies and procedures at a time when a fool proof disaster recovery plan has never been more critical.

View More

Zero Trust: Good Idea, but what's next?

The term “Zero Trust” is appearing more frequently within the security sector. The concept of “Zero Trust” was first described by John Kindervag in 2009. With security environments of IT professionals becoming more complex and users demanding more flexibility, trust isn’t easy to come by.

View More

Analytics strategy versus culture - Match made in heaven or a match made in hell?

Are all enterprise analytics implementations doomed to fail? If failure is no longer an option, what are you doing or going to do about it? Join us for this private, peer-led virtual roundtable to discuss the crucial steps to prevent failure.

View More

Reimagining Customer Experience: Realise Results and Deliver Business Value

Join this virtual roundtable to learn how the latest innovations in Cloud and AI technology are helping customer service professionals reimagine their customer experience to better serve their customers, improve the agent experience and realise business results

View More

How to maximize revenue yield through connected customer experiences

As the past 12 months have proven, commercial agility is key to a business’s survival and being able to transform how the organisation generates revenue has never been more important.

View More

Insider Threat Management - Why the pandemic has accelerated your insider risk profile

Join this private, peer-led virtual roundtable where we will be addressing insider threat and why it is becoming the primary attack path and tools and techniques that CISO's use to prioritise identify insider threat and improve insider threat capabilities.

View More

Why Managing Vendor Risk Is An Essential Part of Your Security Program

Join BitSight for an in-depth peer-led discussion on managing third-party vendor risk, discussing all the elements involved and how to improve them.

View More

Security Debt? - Hindsight is 2020

Join us for an intimate roundtable conversation around changes we saw in 2020, how the security leaders and practitioners we spoke with adapted and maintained a positive attitude, and what’s to come in 2021.

View More

Customer IAM: From Myths to Mastery

Customer identity is a hidden danger lurking in every application. Done well, it just works. Done poorly it frustrates your users, gets complicated as you consider policies and regulations, and doesn’t effectively protect your customers or your organization.

View More

The “Sec” in the DevSecOps journey - a CISO’s perspective

“Left Shifting” is upon us and CISOs and security functions are struggling to find relevancy is this brave new world. We will discuss the stay awake issues of CISOs in the agile/scrum/CI/CD DevOps environment, and what successes we have seen, and also some of areas of “insertion” that CISOs would like to be effective in this new world.

View More

How do we stop attacks before they stop us?

How do you choose the right cybersecurity solutions in a constantly changing cyber threat landscape? Learn from your cross-industry peers in this virtual roundtable discussion, focussing on stopping cyber-attacks before they damage the business.

View More

Resolve Issues Before Customers Complain

When something goes wrong in your digital services, mobilizing a rapid response across customer service and operations teams can be a challenge. What do your customers expect from you?

View More

Security at the speed of DevOps

DevOps-driven software development approaches are pervasive among organizations embracing the cloud. Unlike traditional software development approaches, DevOps helps organizations shorten the time it takes to build and ship cloud applications. Introducing security early in the software development lifecycle, along with continuous monitoring in production environments, improves the overall security posture of cloud applications and reduces business risk.

View More

Cloud Migrations: Dare Mighty Things

Part of any organisation’s success strategy is continuous monitoring for risks: A cloud migration, if successful, can set your company on the path to mighty things.

View More

Balancing business and tech: How to optimize costs whilst funding digital transformation

Join Thomas Seifert, CFO of Cloudflare, for an interactive virtual roundtable event on how senior executives can optimize costs while also continuing to fund investments in digital transformation for their businesses.

View More

Creating a Seamless and Optimal Customer Journey via Omni Channel Data-Driven Marketing Strategy

We warmly invite you to a 90-minute virtual roundtable in an informal setting, as we dive deeper into key questions and issues specific to the telecommunications industry...

View More

Identity as the New Perimeter

In today’s increasingly digital world, safeguarding critical infrastructure starts with strong identity security. Learn how you can give your business unmatched visibility and intelligence while automating and accelerating the management of all user identity's entitlements systems, data, and cloud services. Indeed, improved business processes rely upon effective identity governance.

View More

Driving Your Competitive Advantage with Cloud-First Identity and Access Management

Many organizations are operating their IT environment in a hybrid state. While the cloud has allowed organizations to realize new levels of efficiency and ROI by leveraging modern approaches such as SaaS, a certain number of apps will likely remain on-premises for the foreseeable future.

View More

Sharing best practices to quantify security performance

Security is seen as a necessary cost of doing business by many and a business enabler by the rest. However few are able to measure security performance and quantify security gains after investing in people processes or technology. Attend this session where we will describe a practical approach to measuring and tracking security performance in the face of threat evolutions. After all, if you cant measure it you can’t improve it.

View More

Security Debt? - Hindsight is 2020

Join us for an intimate roundtable conversation around changes we saw in 2020, how the security leaders and practitioners we spoke with adapted and maintained a positive attitude, and what’s to come in 2021.

View More

Analytics strategy versus culture - Match made in heaven or a match made in hell?

Are all enterprise analytics implementations doomed to fail? If failure is no longer an option, what are you doing or going to do about it? Join us for this private, peer-led virtual roundtable to discuss the crucial steps to prevent failure.

View More

Why Managing Vendor Risk Is An Essential Part of Your Security Program

Join BitSight for an in-depth peer-led discussion on managing third-party vendor risk, discussing all the elements involved and how to improve them.

View More

Optimising IT Compliance: Real-world Lessons in Embedding and Scaling an Effective Program

Join us at this closed-door, peer-led Virtual Roundtable for a candid discussion on optimising IT compliance. Hear lessons learned from embedding and scaling an effective program and identify actions you can take to optimise your own program.

View More

Security Debt? - Hindsight is 2020

Join us for an intimate roundtable conversation around changes we saw in 2020, how the security leaders and practitioners we spoke with adapted and maintained a positive attitude, and what’s to come in 2021.

View More

The Rise and Risk of SaaS Apps: How to Keep Your Organization Protected when migrating ERP & mission-critical applications to the cloud

Join us for this closed door, peer lead Virtual Roundtable where we will be discussing the core tenants in a business application resiliency plan, why cloud-asset mapping is a crucial first step and the common pitfalls in securing SaaS-based business applications.

View More

Comment exploiter au maximum le rendement du chiffre d’affaires grâce à l’expérience client ?

Au cours de notre évènement, nous discuterons l'accélération des programmes de transformation digitale cette année et la capacité à simplifier la gestion du revenu.

View More

The Rise and Risk of SaaS Apps: How to Keep Your Organization Protected when migrating ERP & mission-critical applications to the cloud

Join us for this closed door, peer lead Virtual Roundtable where we will be discussing the core tenants in a business application resiliency plan, why cloud-asset mapping is a crucial first step and the common pitfalls in securing SaaS-based business applications.

View More

Why Zero Trust Done Right is Least Trust

Join us for this private, closed-door virtual roundtable where we will be taking a deeper look at trust and authentication within the cybersecurity space.

View More

Security at the speed of DevOps

Join us for this closed door, peer-lead, 90-minute Virtual Roundtable to discuss DevOps-driven software development approaches are pervasive among organizations embracing the cloud.

View More

Subscribe to be the first to know about our launch and special events