Register

1
2

Events

June 2021
25
M
T
W
T
F
S
S

Can you restore your critical business services as fast as your competitors can restore theirs?

In the last year and a half, digital transformation has become a top priority for business leaders everywhere. New tech, new skills and a new attack surface mean those leaders must prepare for the worst if they are to feel confident they can succeed in all that the Internet can throw at them. Faster response to service disruptions has become crucial in getting the best in customer, partner and shareholder relations.

View More

Automatisez SAP pour de meilleures données et des processus plus rapides.

Au cours de notre évènement, nous discuterons les processus de création de données SAP et les défis.

View More

Rethinking Security as a business enabler

Join us for this closed door, peer-lead, 90-minute Virtual Roundtable to discuss the best practices to raise awareness and understanding of the cybersecurity challenge in organisations and how Covid changed the working environment.

View More

Optimizing IT Compliance: Real-world Lessons in Embedding and Scaling an Effective Program

Join us at this closed-door, peer-led Virtual Roundtable for a candid discussion on optimizing IT compliance. Hear lessons learned from embedding and scaling an effective program and identify actions you can take to optimize your own program.

View More

Challenges with Remote Delivery and Remote Maturity Model

Join our virtual, private and peer-led roundtable, experts will weigh in the challenges of remote delivery, and the necessary best practices for operating successfully within a distributed workforce. Additionally, the panelists will discuss how organizations can hire and retain top talent and ultimately distinguish themselves from their competition by embracing a Remote Maturity model.

View More

Managing fraud in a high challenge environment

Please join us for this private, closed-door virtual roundtable where we will be taking a deeper look at managing fraud in a high challenge environment

View More

The Path to Zero Trust: A Security Paradigm Shift

As the traditional perimeter continues to blur, the more zero trust comes into focus. The seismic shift to remote working and shift to the cloud have also accelerated the demise of the traditional perimeter and is driving an increased focus on zero trust. Many organizations have begun to embrace zero trust frameworks and are building these into their security strategies. Understanding your barriers to zero trust will also help you forge the best path to optimally securing your environment, including upgrading from legacy applications and architectures to ones that support zero trust.

View More

How do we stop attacks before they stop us?

Join us for this closed door, peer-led virtual roundtable discussing how to handle an incident in a calm, collected, and methodological manner so a small incident doesn’t turn into a major one or a major one does not progress further.

View More

Is identity the cornerstone of every good security model? How do you compare?

Together we will explore the shifts in the security landscape that led to the creation of “beyondcorp” and how organizations can utilize identity and access management as a critical building block for a successful Zero Trust implementation.

View More

Optimizing IT Compliance: Real World Lessons in Building, Embedding and Scaling an Effective Program

Join us at this closed-door, peer-led Virtual Roundtable for a candid discussion on optimising IT compliance. Hear lessons learned from embedding and scaling an effective program and identify actions you can take to optimise your own program.

View More

How do we stop attacks before they stop us?

How do you choose the right cybersecurity solutions in a constantly changing cyber threat landscape? Learn from your cross-industry peers in this virtual roundtable discussion, focussing on stopping cyber-attacks before they damage the business.

View More

Modern DLP – Why Traditional Approaches Won’t Solve Your Insider Threat Problem

Join us and a specially selected group of your peers in an open discussion about how DLP can be introduced without the usual friction with the business and how contextual classification with granular controls can get an effective DLP solution operational quickly.

View More

Driving Your Competitive Advantage with Cloud-First Identity and Access Management

Many organisations are operating their IT environment in a hybrid state. While the cloud has allowed organisations to realize new levels of efficiency and ROI by leveraging modern approaches such as SaaS, a certain number of apps will likely remain on-premises for the foreseeable future. How can security and IT teams provide employees with a seamless, yet secure, experience as they need to access both SaaS and on-premises applications? How can organisations leverage a cloud-first approach to better manage their applications as well as identity and access management (IAM)?

View More

How can we use GRC as a business enabler?

Join us for this private, closed-door Virtual Roundtable where we will be taking a deeper look at governance, risk, and compliance and their use as a control mechanism vs an opportunity for business improvement.

View More

Embracing the Cloud for “Innovation at Scale”

Join us and a select group of your peers for this private virtual roundtable where we will be taking a deeper look at how companies can accelerate their digital transformation by embracing the cloud in the right way.

View More

Best practices for building customer 360 initiatives that earn customers for life

To succeed in today’s hypercompetitive business environment, it is essential to build lasting, meaningful customer relationships. But many companies struggle to understand who their customers are, what they want, and how to meet their needs. Join Talend and discover how build a healthy data environment that will make your customer 360 initiatives a success.

View More

Can you restore your critical business services as fast as your competitors can restore theirs?

In the last year and a half, digital transformation has become a top priority for business leaders everywhere. New tech, new skills and a new attack surface mean those leaders must prepare for the worst if they are to feel confident they can succeed in all that the Internet can throw at them. Faster response to service disruptions has become crucial in getting the best in customer, partner and shareholder relations.

View More

Is Your Enterprise Effective at Preventing Cyberattacks as your Employees Work from Home?

In this virtual roundtable, we address the results and implications of the ground-breaking research The Economic Value of Prevention in the Cybersecurity Lifecycle. Conducted by the Ponemon Institute and sponsored by Deep Instinct, the report analyses the cost savings that can be taken in an efficient, zero-time prevention model.

View More

Modern DLP – Why Traditional Approaches Won’t Solve Your Insider Threat Problem

Join us and a specially selected group of your peers in an open discussion about how DLP can be introduced without the usual friction with the business and how contextual classification with granular controls can get an effective DLP solution operational quickly.

View More

The future is document workflows, will you be ready before your competitors?

During this private, peer-led virtual roundtable we will be discussing how you can work faster, more secure and improve both the customer and employee experience, all by automating workflows beyond eSignature.

View More

Are passwords leading us towards a security crisis?

Join us for a closed-door, peer-led virtual roundtable discussing the security of our digital IDs and whether passwords are leading us towards a security crisis.

View More

How do we stop attacks before they stop us?

How do you choose the right cybersecurity solutions in a constantly changing cyber threat landscape? Learn from your cross-industry peers in this virtual roundtable discussion, focussing on stopping cyber-attacks before they damage the business.

View More

Are passwords leading us towards a security crisis?

The security of our digital IDs has never been more important: from cloud services that have kept businesses functioning through the rapid shift to remote working, to providing access to essential consumer services. This virtual roundtable will give you the opportunity to network with your peers as we discuss how to solve one of the biggest security challenges and how new approaches to secure authentication can unlock potential for business users and consumers in providing a safe, secure and seamless experience for accessing apps and services online.

View More

Are passwords leading us towards a security crisis?

The security of our digital IDs has never been more important: from cloud services that have kept businesses functioning through the rapid shift to remote working, to providing access to essential consumer services. This virtual roundtable will give you the opportunity to network with your peers as we discuss how to solve one of the biggest security challenges and how new approaches to secure authentication can unlock potential for business users and consumers in providing a safe, secure and seamless experience for accessing apps and services online.

View More

Leave no-one behind: how to unlock your entire digital ecosystem

Join us for a private round table, with a specially selected group of your peers to discuss the 'Integrated Experience' and where we all stand.

View More

Creating order out of chaos: Natural language as a strategic imperative

In this 90-minute virtual roundtable, we will bring together a select group of your peers to discuss some of the key issues data leaders face today.

View More

Customer IAM: From Myths to Mastery

In this session, we’ll explore some of the background, myths, and approaches to customer identity...

View More

Ransomware: Getting to know the enemy

Join us for this thought leadership discussion where we will come together to share best practices and to collectively understand our common enemy, Ransomware.

View More

The Power of Data - The Critical Enabler of Faster Decision Making

In Retail, being at the forefront of having to adapt to changing customer behaviour and interactions, there is no time more critical than now to make better and faster decisions.

View More

Steps to Delivering Relevant, Resilient, and Reliable Digital Services

Both your internal and external customers want intuitive, reliable, secure, and ideally, always available digital services that make their lives easier. To meet these demands, service delivery teams must continually innovate, releasing features quickly and frequently. Join us, as we discuss how to achieve digital service resiliency and deliver reliable customers experiences.

View More

The Path to Zero Trust: A Security Paradigm Shift

Many organizations have begun to embrace zero trust frameworks and are building these into their security strategies. Understanding your barriers to zero trust will also help you forge the best path to optimally securing your environment, including upgrading from legacy applications and architectures to ones that support zero trust.

View More

How do you secure the “Anywhere Workplace?”

Join us for this closed-door, peer-led Virtual Roundtable for a candid discussion with cybersecurity executives from a variety of industries to discuss how to provide secure connectivity for the anywhere workplace. Learn from others’ successes, avoid their previously encountered pitfalls, and share thoughts on protecting the work environments of 2021 and beyond.

View More

Building an Enterprise-wide Culture of Analytics

Join our exclusive virtual roundtable: get involved, discuss, and share best practices with other high-level executives on how your organizations can transform into data-driven businesses.

View More

Identity & Access Management as the Foundation of the Modern Enterprise

Join us for this private, closed door virtual roundtable where we will be taking a deeper look at: As part of the Zero Trust framework, how does Identity & Access Management serve as the final perimeter?

View More

Rethinking Security as a business enabler

Join us for this closed door, peer-lead, 90-minute Virtual Roundtable to discuss the best practices to raise awareness and understanding of the cybersecurity challenge in organisations and how Covid changed the working environment.

View More

Jump Ahead of the Competition with Passwordless Access for your Staff and Customers

Join us for a private roundtable with a specially selected group of your peers to discuss all of the necessities and challenges associated with Zero Trust. As we know, Love it or hate it, Zero Trust is here to stay.

View More

Jump Ahead of the Competition with Passwordless Access for your Staff and Customers

Join us for a private roundtable with a specially selected group of your peers to discuss all of the necessities and challenges associated with Zero Trust. As we know, Love it or hate it, Zero Trust is here to stay.

View More

Simplify Customer Onboarding and Reduce Fraud with Identity Verification

Join us for a private roundtable with a specially selected group of your peers to discuss: The benefits of a cloud-based Identity verification service for customers How to balance security and convenience without unnecessary frictions

View More

Reduce Business Risk: Securing Privileged Access and Implementing Zero-Trust

Join our CISO roundtable as we discuss how to make Zero-Trust work for you. We will cover the techniques used to protect Privileged Accounts, how to make Cloud Transformations secure, and the key elements behind Identity Management.

View More

Driving Your Competitive Advantage with Cloud-First Identity and Access Management

Many organisations are operating their IT environment in a hybrid state. While the cloud has allowed organisations to realize new levels of efficiency and ROI by leveraging modern approaches such as SaaS, a certain number of apps will likely remain on-premises for the foreseeable future.

View More

Increasing the success rates in drug discovery, current practice and next steps to delivering better druggable candidates

There is a strong drive to improve the productivity and efficiency of drug discovery. Jack Scannell’s paper highlighting the decline of R&D really brought this topic into sharp focus. Various industry thought leaders have suggested strategies such as “fast fail”, “ligand efficiency” “the pillars of success”, the “5R framework” etc” to address R&D productivity challenge. These are now positively impacting on success rates, but what are the next big drivers to take the probability of success rates further.

View More

Acclimating in times of Disruption. Enabling Transformation.

We will be discussing identification, authentication, and authorization best practices through Identity Governance Administration. This is a great chance to learn more about strengthening your IGA system and how companies can optimize those practices not just to meet compliance, but to prevent identity escalation threats.

View More

Using Data Effectively in Contact Centres to: Identify Next Best Action, Reduce Churn, Increase First Call Resolution and Improve KPIs

Customer experience is the new battleground in driving customer loyalty and is a key channel for any brand. When we consider that the contact centre is one of the most frequently used channels for direct customer interactions, it makes sense that data should be connected and available in real time for our agents and centres to use. Join us as we walk through real examples that will inspire you.

View More

Hybrid-cloud - is it the future or just the next technology buzzword?

A hybrid cloud approach to data management for analytics seems like the answer but is it just another buzzword or is it something that enterprises can truly leverage to help their business drive more value from data? This exclusive roundtable is your opportunity to discuss and explore hybrid cloud architecture and the impact it has on people, technology and performance with your peers.

View More

API First Approach for faster Cloud adoption

Enterprises need to design services that include legacy resources. They want the services to be cloud-native so they can treat them the same way all the rest of their digital systems are handled. Many also want to build the services quickly with an API First approach in mind but struggle since it takes time and different teams to expose legacy resources to cloud systems

View More

Re-Architecting the Enterprise: The Role of Apache Kafka® and Real-Time Data.

The recent revolution in data infrastructure and application architecture has transformed the way all kinds of organisations, from the traditional to the digital native, work with data. But to truly take advantage of real-time data as the most strategic platform within your company, it must move from the domain of one-off engineering initiatives into a central nervous system for the enterprise. Transformation requires a thoughtful strategy that drives the re-architecting of the enterprise. By joining this one-off round table you will learn how market-leading companies are using real-time data to transform business practices and which use cases they are putting into practice.

View More

Start Making Sense: Mining Unstructured Data as a Strategic Capability

In this 90-minute virtual roundtable, we will bring together a select group of your peers to discuss the latest developments in natural language understanding (NLU) and how these techniques are powering customer interactions, language intensive business processes and the mining of intelligence from lakes of knowledge.

View More

Simplify Customer Onboarding and Reduce Fraud with Identity Verification

In today’s digital-first world, a customer’s first interactions with a brand increasingly occur when registering, opening an account or applying for a service online. If organisations don’t have confidence in their customer’s identity at that first interaction, they are at greater risk of fraudulent account creation and activity. With Identity Verification, organisations can strengthen security by ensuring they have the right level of assurance that customers are who they say they are from the very beginning.

View More

Where's the Sec in Mobile DevOps?

With mobile applications becoming an indispensable platform for organisations, but if left unchecked an easy attack surface for malicious actors, what can you be doing to stay out of the news headlines? Join us on this private, peer led discussion to look at how you can minimise the friction between development deadlines and security requirements with tighter controls from the beginning of the development phase.

View More

Hybrid-cloud - is it the future or just the next technology buzzword?

A hybrid cloud approach to data management for analytics seems like the answer but is it just another buzzword or is it something that enterprises can truly leverage to help their business drive more value from data? This exclusive roundtable is your opportunity to discuss and explore hybrid cloud architecture and the impact it has on people, technology and performance with your peers.

View More

TLC Reconnect

TLC Reconnect is a new, in-person networking evening dedicated to the Technology Leaders Club community. Taking place at the luxurious Ned Hotel in London, the evening will host over 60 C-Suite and Director level IT, Security and Data executives looking to network and build new connections in the real world!

View More

Subscribe to be the first to know about our launch and special events