Register

1
2

Events

July 2021
23

Driving Your Competitive Advantage with Cloud-First Identity and Access Management

We will discuss: How can security and IT teams provide employees with a seamless, yet secure, experience as they need to access both SaaS and on-premises applications? How can organisations leverage a cloud-first approach to better manage their applications as well as identity and access management (IAM)? What are the best ways for organisations to leverage newer technologies to help scale their infrastructure to meet customer needs?

View More

Ransomware: the extortionists have upped their game, are your defenders keeping up?

The last couple of years have forced many businesses to reinvigorate or kick start their digital transformations and cloud adoptions. New approaches and new solutions require new ways of working. The new ways do not appear to be keeping the attackers out but they can help us better prepare, respond, and recover if we fall victim.

View More

Ransomware: Getting to know the enemy

Every organization today is concerned about security and the inevitability of a ransomware attack. Experts predict that ransomware attacks will take place every 11 seconds by 2021 and with multi-generational data sprawl increasing your attack surface, recovering from a malicious attack is becoming increasingly difficult.

View More

Ransomware: Getting to know the enemy

Every organization today is concerned about security and the inevitability of a ransomware attack. Experts predict that ransomware attacks will take place every 11 seconds by 2021 and with multi-generational data sprawl increasing your attack surface, recovering from a malicious attack is becoming increasingly difficult.

View More

Igniting Continuous Business Transformation

Join us for this private, closed-door virtual roundtable where we will be taking a deeper look at how you can ignite continuous business transformation with cloud, data, scalability, automation, and analytics.

View More

Optimizing IT Compliance: Real-world Lessons in Embedding and Scaling an Effective Program

Join us at this closed-door, peer-led Virtual Roundtable for a candid discussion on optimizing IT compliance. Hear lessons learned from embedding and scaling an effective program and identify actions you can take to optimize your own program.

View More

Cloud Migrations: Dare Mighty Things

Part of any organisation’s success strategy is continuous monitoring for risks: A cloud migration, if successful, can set your company on the path to mighty things. Yet, it too is risky. With continuous insight into the threats and where you stand vs your risk tolerance, you gain the confidence to push harder, make wiser decisions, and lead your transformation to unprecedented success.

View More

Driving Your Competitive Advantage with Cloud-First Identity and Access Management

Many organisations are operating their IT environment in a hybrid state. While the cloud has allowed organisations to realize new levels of efficiency and ROI by leveraging modern approaches such as SaaS, a certain number of apps will likely remain on-premises for the foreseeable future. How can security and IT teams provide employees with a seamless, yet secure, experience as they need to access both SaaS and on-premises applications? How can organisations leverage a cloud-first approach to better manage their applications as well as identity and access management (IAM)?

View More

Is identity the cornerstone of every good security model? How do you compare?

Together we will explore the shifts in the security landscape that led to the creation of “beyondcorp” and how organizations can utilize identity and access management as a critical building block for a successful Zero Trust implementation. By shifting access controls from the network perimeter to individual users, service accounts, apis and non-human identities, zero trust enables safe and secure work from virtually any location with a network connection.

View More

Are passwords leading us towards a security crisis?

Join us for a closed-door, peer-led virtual roundtable discussing the security of our digital IDs and whether passwords are leading us towards a security crisis.

View More

How do we stop attacks before they stop us?

Join us for this closed door, peer-led virtual roundtable discussing how to handle an incident in a calm, collected, and methodological manner so a small incident doesn’t turn into a major one or a major one does not progress further.

View More

How do we stop attacks before they stop us?

Join us for this closed door, peer-led virtual roundtable discussing how to handle an incident in a calm, collected, and methodological manner so a small incident doesn’t turn into a major one or a major one does not progress further.

View More

Rethinking Security as a business enabler

Join us for this closed door, peer-lead, 90-minute Virtual Roundtable to discuss the best practices to raise awareness and understanding of the cybersecurity challenge in organisations and how Covid changed the working environment.

View More

Rethinking Security as a business enabler

Join us for this closed door, peer-lead, 90-minute Virtual Roundtable to discuss the best practices to raise awareness and understanding of the cybersecurity challenge in organisations and how Covid changed the working environment.

View More

Is Your Enterprise Effective at Preventing Cyberattacks as your Employees Work from Home?

Understand and explore the different areas of the cybersecurity lifecycle during this 90 minute, peer-led roundtable, discussing different methods of optimization to achieve effective levels of defence at a reasonable cost.

View More

Can you restore your critical business services as fast as your competitors can restore theirs?

In the last year and a half, digital transformation has become a top priority for business leaders everywhere. New tech, new skills and a new attack surface mean those leaders must prepare for the worst if they are to feel confident they can succeed in all that the Internet can throw at them. Faster response to service disruptions has become crucial in getting the best in customer, partner and shareholder relations.

View More

Can you restore your critical business services as fast as your competitors can restore theirs?

In the last year and a half, digital transformation has become a top priority for business leaders everywhere. New tech, new skills and a new attack surface mean those leaders must prepare for the worst if they are to feel confident they can succeed in all that the Internet can throw at them. Faster response to service disruptions has become crucial in getting the best in customer, partner and shareholder relations.

View More

Automatisez SAP pour de meilleures données et des processus plus rapides.

Au cours de notre évènement, nous discuterons les processus de création de données SAP et les défis.

View More

Rethinking Security as a business enabler

Join us for this closed door, peer-lead, 90-minute Virtual Roundtable to discuss the best practices to raise awareness and understanding of the cybersecurity challenge in organisations and how Covid changed the working environment.

View More

Optimizing IT Compliance: Real-world Lessons in Embedding and Scaling an Effective Program

Join us at this closed-door, peer-led Virtual Roundtable for a candid discussion on optimizing IT compliance. Hear lessons learned from embedding and scaling an effective program and identify actions you can take to optimize your own program.

View More

Challenges with Remote Delivery and Remote Maturity Model

Join our virtual, private and peer-led roundtable, experts will weigh in the challenges of remote delivery, and the necessary best practices for operating successfully within a distributed workforce. Additionally, the panelists will discuss how organizations can hire and retain top talent and ultimately distinguish themselves from their competition by embracing a Remote Maturity model.

View More

Managing fraud in a high challenge environment

Please join us for this private, closed-door virtual roundtable where we will be taking a deeper look at managing fraud in a high challenge environment

View More

The Path to Zero Trust: A Security Paradigm Shift

As the traditional perimeter continues to blur, the more zero trust comes into focus. The seismic shift to remote working and shift to the cloud have also accelerated the demise of the traditional perimeter and is driving an increased focus on zero trust. Many organizations have begun to embrace zero trust frameworks and are building these into their security strategies. Understanding your barriers to zero trust will also help you forge the best path to optimally securing your environment, including upgrading from legacy applications and architectures to ones that support zero trust.

View More

How do we stop attacks before they stop us?

Join us for this closed door, peer-led virtual roundtable discussing how to handle an incident in a calm, collected, and methodological manner so a small incident doesn’t turn into a major one or a major one does not progress further.

View More

Optimizing IT Compliance: Real World Lessons in Building, Embedding and Scaling an Effective Program

Join us at this closed-door, peer-led Virtual Roundtable for a candid discussion on optimising IT compliance. Hear lessons learned from embedding and scaling an effective program and identify actions you can take to optimise your own program.

View More

How do we stop attacks before they stop us?

How do you choose the right cybersecurity solutions in a constantly changing cyber threat landscape? Learn from your cross-industry peers in this virtual roundtable discussion, focussing on stopping cyber-attacks before they damage the business.

View More

How can we use GRC as a business enabler?

Join us for this private, closed-door Virtual Roundtable where we will be taking a deeper look at governance, risk, and compliance and their use as a control mechanism vs an opportunity for business improvement.

View More

Embracing the Cloud for “Innovation at Scale”

Join us and a select group of your peers for this private virtual roundtable where we will be taking a deeper look at how companies can accelerate their digital transformation by embracing the cloud in the right way.

View More

The future is document workflows, will you be ready before your competitors?

During this private, peer-led virtual roundtable we will be discussing how you can work faster, more secure and improve both the customer and employee experience, all by automating workflows beyond eSignature.

View More

Are passwords leading us towards a security crisis?

Join us for a closed-door, peer-led virtual roundtable discussing the security of our digital IDs and whether passwords are leading us towards a security crisis.

View More

Jump Ahead of the Competition with Passwordless Access for your Staff and Customers

Join us for a private roundtable with a specially selected group of your peers to discuss all of the necessities and challenges associated with Zero Trust. As we know, Love it or hate it, Zero Trust is here to stay.

View More

How do we stop attacks before they stop us?

How do you choose the right cybersecurity solutions in a constantly changing cyber threat landscape? Learn from your cross-industry peers in this virtual roundtable discussion, focussing on stopping cyber-attacks before they damage the business.

View More

Leave no-one behind: how to unlock your entire digital ecosystem

Join us for a private round table, with a specially selected group of your peers to discuss the 'Integrated Experience' and where we all stand.

View More

Creating order out of chaos: Natural language as a strategic imperative

In this 90-minute virtual roundtable, we will bring together a select group of your peers to discuss some of the key issues data leaders face today.

View More

Jump Ahead of the Competition with Passwordless Access for your Staff and Customers

Join us for a private roundtable with a specially selected group of your peers to discuss all of the necessities and challenges associated with Zero Trust. As we know, Love it or hate it, Zero Trust is here to stay.

View More

TLC Reconnect

TLC Reconnect is a new, in-person networking evening dedicated to the Technology Leaders Club community. Taking place at the luxurious Ned Hotel in London, the evening will host over 60 C-Suite and Director level IT, Security and Data executives looking to network and build new connections in the real world!

View More

Subscribe to be the first to know about our launch and special events