Unlock the power of your firm’s unstructured data with AI

Private Dinner London London, United Kingdom

Digital experiences are constantly evolving in the Financial Services industry. Client expectations are changing, and personalised experiences, self-service options, and automated responses are becoming the norm. Speed, seamless engagement, and risk reduction are top priorities. In Mergers and Acquisitions (M&A), Pitchbooks, Virtual Data Rooms (VDRs) and client onboarding, AI is revolutionising how financial services businesses […]

Unlock the power of your firm’s unstructured data with AI

Private Dinner London London, United Kingdom

Digital experiences are constantly evolving in the Financial Services industry. Client expectations are changing, and personalised experiences, self-service options, and automated responses are becoming the norm. Speed, seamless engagement, and risk reduction are top priorities. In Mergers and Acquisitions (M&A), Pitchbooks, Virtual Data Rooms (VDRs) and client onboarding, AI is revolutionising how financial services businesses […]

Navigating the Evolution of IT: The Critical Role of Observability Today and Path Towards its Future State

Private Dinner London London, United Kingdom

The rapid pace of technological change has introduced unprecedented complexity and risk for organizations. From uncontrolled cloud expenses to complex software architectures, rapid innovation, emerging security threats, and high expectations around generative AI, the challenges can be overwhelming. How can organizations effectively manage these complexities and risks while evolving their IT landscape to capitalize on […]

Scaling Security Awareness: Insights from KPMG’s Journey in a Changing Corporate Landscape

Private Dinner Utrecht Utrecht, Netherlands

At our private dinner, attendees can look forward to an engaging evening with Teun, Information Security Officer at KPMG, who will share how he experienced the transition from a small organization to a large corporate environment. We will discuss the challenges and impact of scaling security awareness programs, offering insights into how approaches and perceptions […]

Code, Cloud, Prioritization, and Reachability Analysis: How to Bring It All Together

Private Dinner London London, United Kingdom

AI is reshaping the landscape of vulnerability exploitation, making it essential for organizations to rethink their approach to security in cloud environments, codebases, and containerized applications. This session will explore the profound impact AI has on identifying and exploiting vulnerabilities and how human psychology influences the prioritization of these risks. Understanding which vulnerabilities to address […]

AI in Cybersecurity: Enhancing, Not Replacing, Human Expertise

Private Dinner Utrecht Utrecht, Netherlands

Join us for an insightful dinner event exploring the role of AI in cybersecurity. Throughout the evening, we'll examine AI's potential to enhance cybersecurity measures while emphasizing that it complements, […]

Your Organisation’s Identity Threat Iceberg

Private Dinner London London, United Kingdom

While employee identities are often seen as the primary target for cyber attacks, recent high-profile breaches tell a different story. The greatest risks often lie in the shadows - with the service accounts and non-human identities that operate outside your security team's visibility. Join us to discuss: 1. The hidden vulnerabilities: Why are service accounts […]

TLC Marketeers Meetup

Private Dinner London London, United Kingdom

Announcing the first of our new series of meetups for Marketing leaders. This first meetup will be looking at "What are your top 3 challenges as a Marketing leader at […]

Ransomware Recovery – Be Prepared, Not Scared

Private Dinner Copenhagen Copenhagen, Denmark

Join Commvault and Hitachi Vantara industry experts as they host IT leaders from around EMEA to discuss this challenge and the powerful recovery approach revolutionising IT strategy. From accelerated change management, pentesting, security control validations, and recovery of the whole application stack (data, compute, network, and application) from immutable sources into a production-grade store. 1. […]