Register

1
2

We will focus on disruptive technologies and innovative solutions to some of the biggest problems in IT, Data and Security.

The Technology Leaders Club will be the best source of news, peer-on-peer learning, technology reviews, networking events, exclusive content and our "60-second leaders interviews"

When a CISO's time is valuable, one must choose which events to attend - Technology Leaders Club events are always topical and a valuable learning experience
Mark Nicholls, CISO, Chime

Events

View All

Insider risk verified? You can't fight what you can't see

Seemingly, between geopolitical events and multiple other factors we're in perfect security storm territory. Organisations are downsizing, the cost of living is hitting the pockets of all but the chosen few, and social media tensions are, well, interesting to say the least. With all this chaos afoot, getting a strong hold on insider risk is vital, and for security teams, this is the time to shine brighter than ever.

View More

Streaming Data Products & the Road to Operational AI

How does data streaming enable operational AI - the technology taking the world by storm in 2023. Beyond the AI buzz, there is a need to explore how this powerful tool depends on your real-time data and streaming data products to unlock new possibilities for your business.

View More

Embedding the Attacker’s Perspective: An Inside Look Into How Hackers Prioritize Targets at Scale

Join IBM for an exciting session that dives into the world of offensive security. It’s clear that attackers and defenders often come to different conclusions around risk - even when looking at the same information - and environments change too frequently to rely on annual point-in-time penetration testing. In this session, we will pull back the curtain to show you how to discover exposures before attackers do.

View More

Empowering Security: Unleashing the Potential of Positive Security Control Models

Can positive application control revolutionize your security strategy? Explore its impact, shift from known threats to comprehensive control, and the crucial need for prioritization in our battle against ransomware. Join us for this private, closed-door roundtable where we will be taking a deeper look at:

View More

White Papers

View All

Whitepaper | From Vulnerability to Victory: Mastering Next-Gen Tactics to Thwart Software Supply Chain Attacks

View More

Whitepaper | Extortionists are upping their game, are you keeping up?

View More

eBook | Scaling Up from Cyber Security to Cyber Resiliency

View More

eBook | Threat Intelligence - Know Your Enemy, Know Yourself

View More

Recent Interviews

View All

Register

Become part of the Technology Leaders Club receive exclusive content and invitations to the latest gatherings.

Click here to Register