Ransomware Mitigation: Developing a Defence in Depth Approach
State of Hybrid Work: Why Credential Management Still Matters
Modern Bank Heists: What You Need to Know About the Latest Fraud Trends – and the Fraudsters
Adoptando la Mentalidad del Atacante para Proteger el Futuro Híbrido de los Espacios de Trabajo
Marching Orders: Understanding and Meeting the Biden Administration’s New Cybersecurity Standards
Reducing Ransomware Through Micro-Segmentation
Sécuriser le «travail hybride» avec votre infrastructure actuelle
A New Game Plan to Combat Ransomware Attacks
Modernizing the SOC: How High-Velocity Enterprises Must Evolve to Meet Today’s Business and IT Needs
What to do About Patch Management Overload
From Endpoint to Cloud: Achieving Zero Trust for Enterprises
State of Hybrid Work: Why Credential Management Still Matters
Why Protecting Your Internet Attack Surface Matters More Than Ever
Financial Services: Securing Remote Access, From Endpoint to Cloud
Envisioning a Passwordless World
Throw Away the Key(logger): Strategies for Protecting Users from Malware
Gestione degli aggiornamenti per contrastare ransomware e minacce di nuova generazione
Disruptive Defense: How to Turn the Tables on Ransomware
Modernizing Your Security Operations
Increase Operational Efficiency by Modernizing Your Security Operations
State of Hybrid Work: Why Credential Management Still Matters
Cloud Security: Building Defense using ‘Zero Trust’
What to do About Patch Management Overload
Web Application Firewalls: Maximising Control and Visibility
Securing Critical Infrastructure: What it Means for Your Organization
Business Risk: Which Attacks Can Shut You Down?
Operationalizing the MITRE ATT&CK Framework
From Endpoint to Cloud: Achieving Zero Trust for Enterprises
Software Security: How to Prioritize, Measure and Convey It To the Board
Envisioning a Passwordless World
Comment sécuriser infrastructures IT et endpoints à l’heure de la mobilité ?
The Security Debt Crisis – How to Catch Up on Past Due Patches and Neglected Risk
Combating the Modern Ransomware Threat
Endpoint Cloud Security: How to Protect the Attacker’s Number One Target
Financial Services: The Roadmap to Zero Trust
Envisioning a Passwordless World
Upcoming Roundtables
Virtual
Roundtable
Tuesday, October 26th, 2021
Anna Delaney
Martin Lee
Anna Delaney with Martin Lee
Virtual Roundtable
Ransomware Mitigation: Developing a Defence in Depth Approach
Discussion topics will include:
Today’s antivirus solutions can identify and block many types of malware easily. But how confident are you that your endpoint protection is detecting more stealthy techniques, such as malicious content hiding inside a legitimate piece of software which is then distributed through the update mechanism? In order to keep up with the criminals, a new approach to endpoint security is required.

How can you deploy endpoint protection on every system, making sure that the detection is actually enabled? How can you build a multi-layered defense strategy to avoid relying solely on endpoint protection? How can your security teams better respond to incidents across multiple domains and keep attackers from accessing...
Virtual
Roundtable
Tuesday, October 26th, 2021
Dan Gunderman
Jerome Ferrara
Dan Gunderman with Jerome Ferrara
Virtual Roundtable
State of Hybrid Work: Why Credential Management Still Matters
Discussion topics will include:
With hybrid and remote work likely to continue well into 2022, CISOs and their teams are continuing to find the best ways to secure the credentials of employees who are accessing applications and devices from a variety of locations. At the same time, workers need ready access to the resources while lines of business managers seek out ways to reduce friction to allow for the most productivity.

Organizations need a holistic approach to credential and password management. In addition to creating a secure environment for employees who are logging in from home or from remote and sometimes corporate offices, this also allows CISOs to help IT and other parts of...
Virtual
Roundtable
Tuesday, October 26th, 2021
Tom Kellermann
Tom Field
Tom Kellermann with Tom Field
Virtual Roundtable
Modern Bank Heists: What You Need to Know About the Latest Fraud Trends – and the Fraudsters
Discussion topics will include:
We are only halfway through 2021, but it’s already clear that financial fraud threats are trending far beyond traditional account takeover. Large banking institutions are no longer the only place where e-criminals can steal money. Any company that uses any type of online banking system (virtually 100% of companies) can be hacked via new routes including payment card fraud and synthetic IDs.

With so many emerging angles cybercriminals are taking, how do you ensure you have an omni-channel strategy to cover them all?

Brokerage account takeover, supply chain attacks, destructive attacks and those that seek to manipulate time or time stamps are among the latest threats uncovered in the latest...
Virtual
Roundtable
Wednesday, October 27th, 2021
Deepak Daswani
María García Iñañez
Deepak Daswani with María García Iñañez
Virtual Roundtable
Adoptando la Mentalidad del Atacante para Proteger el Futuro Híbrido de los Espacios de Trabajo
Discussion topics will include:
El nuevo modelo de trabajo es ya una realidad establecida que ha abierto un sinfín de oportunidades tanto para profesionales como para ciberdelincuentes. Los atacantes ya no necesitan atacar directamente al objetivo, mediante vectores de ataque dirigidos a sistemas o individuos. Ahora pueden aprovechar también la cadena de suministro para extender ataques a otros lugares. Cada vez son más los ejemplos en ese sentido, como sucedió con el famoso incidente de Solarwinds.

En este nuevo escenario, es necesario aprender a pensar como los atacantes para evitar establecerse como la víctima.

¿Qué nuevas tácticas están empleando los delincuentes y cómo distribuyen los ataques para aprovechar el modelo híbrido? ¿Qué se pasa...
Virtual
Roundtable
Wednesday, October 27th, 2021
Tom Field
Matthew Goodwin
Tom Field with Matthew Goodwin
Virtual Roundtable
Marching Orders: Understanding and Meeting the Biden Administration’s New Cybersecurity Standards
Discussion topics will include:
First there was President Biden’s cybersecurity executive order. Then came his Industrial Control System Cybersecurity Initiative. And most recently we’ve seen a new package of supply chain and critical infrastructure security plans launched in conjunction with a White House summit, including the nation’s top technology, financial services and infrastructure leaders.

The sum of all these administrative actions: a renewed focus on critical infrastructure defense, supply chain security, DevSecOps and the zero-trust security model. As these initiatives trickle down from federal government to state and local, then to the private enterprise that support them, how prepared is your organization to understand and meet the new demands? How do you avoid being...
Virtual
Roundtable
Wednesday, October 27th, 2021
Tom Field
Kelvin Franklin
Tom Field with Kelvin Franklin
Virtual Roundtable
Reducing Ransomware Through Micro-Segmentation
Discussion topics will include:
Ransomware is one of the greatest challenges facing CISOs and their security teams today. Not only are these attacks complicated to deal with due to the types of crypto-locking malware that cybercriminal gangs wield, but recovering from this type of attack can be an expensive process thanks to the damage these incidents can inflict on an organization’s infrastructure.

Organizations require a fresh approach to combating ransomware to limit the ability of attackers to move laterally through the infrastructure and find the “crown jewels” that can be held for ransom. One way is to deploy micro-segmentation within the network, which can limit these types of intrusion while providing additional insights and...
Virtual
Roundtable
Thursday, October 28th, 2021
Timothée Bardet
Jean-Sébastien Milliere
Timothée Bardet with Jean-Sébastien Milliere
Virtual Roundtable
Sécuriser le «travail hybride» avec votre infrastructure actuelle
Discussion topics will include:
L’année dernière ne restera pas seulement dans les mémoires comme l’année où les entreprises ont rapidement déplacé leurs applications en cloud et en SaaS pour assurer la continuité de leurs activités. Elle a également été marquée par une explosion d’événements de sécurité et de cyber incidents.

Alors que le mode de travail “à distance” est appelé à perdurer, comment assurer la sécurité de toutes les données et de tous les appareils de votre organisation, tout en tirant parti de votre infrastructure informatique ? Comment réagir rapidement à ce modèle de lieu de travail numérique distribué ? Comment le faire avec vos outils actuels ? Quelles sont les meilleures pratiques pour...
Virtual
Roundtable
Thursday, October 28th, 2021
Anna Delaney
Martyna Lubińska
Anna Delaney with Martyna Lubińska
Virtual Roundtable
A New Game Plan to Combat Ransomware Attacks
Discussion topics will include:
We are in the midst of a ransomware pandemic. The list of victims is long and only growing – City of Liège, Maastricht University, Kaseya, Colonial Pipeline, to name a few. Whilst traditional antivirus and endpoint detection and response tools, along with user education, are part of the solution, they’re not always enough to prevent ransomware from infecting and spreading within organizations’ networks.

So how do we avoid being the next victim? What is being overlooked in our current defenses? How are the attackers succeeding despite our defenses? It’s time for a new game plan.

Discussion topics will include:
Proactive strategies to avoid being the next ransomware victim
Techniques to...
Virtual
Roundtable
Thursday, October 28th, 2021
Tom Field
Partha Panda
Tom Field with Partha Panda
Virtual Roundtable
Modernizing the SOC: How High-Velocity Enterprises Must Evolve to Meet Today’s Business and IT Needs
Discussion topics will include:
Your company is a fast-moving disruptive force that’s changing your industry and leap frogging slow-moving incumbents. You recognize the value of speed and have embraced a cloud-first approach to your technology infrastructure.

But high-velocity companies need a modern security strategy that supports their aggressive ambitions, can scale with growth and doesn’t rely on an outdated security operations center or staffing it with a team of hard-to-find security experts.

Leap forward. Register for this executive roundtable to gain key insights about modernizing your security operations and to discuss with your peers.

Discussion topics will include:
Security and compliance challenges that high-velocity businesses need to address
Key elements of a modern SOC...
Virtual
Roundtable
Tuesday, November 2nd, 2021
Tony Morbin
Gwyndaf Davies
Tony Morbin with Gwyndaf Davies
Virtual Roundtable
What to do About Patch Management Overload
Discussion topics will include:
Newly discovered vulnerabilities continue to increase, with more than 18,000 published last year alone. Resources and limited time continue to be an issue amongst the Cyber Security Community, so what can be done to rectify this?

In particular, how do we align the most critical vulnerability data with the right patches to ensure we can, at least, get the top 10% addressed?

Discussion topics will include:
How you can integrate patch information and vulnerability data to improve your overall security posture
How to maintain compliance with industry and sector standards, including ISO 270001 and GDPR

Join ISMG’s Tony Morbin for a moderated discussion that will feature insight from Gwyndaf Davies,...
Virtual
Roundtable
Tuesday, November 2nd, 2021
Aaron Cockerill
Tom Field
Aaron Cockerill with Tom Field
Virtual Roundtable
From Endpoint to Cloud: Achieving Zero Trust for Enterprises
Discussion topics will include:
The global reliance on cloud-based infrastructure and services that are accessible from any device, has prompted security teams to rethink the way they protect their organizations. To support this new and agile way of working, security leaders need to be able to balance end-user privacy with security to protect users and corporate data from phishing, malware, and other threats. At the same time, too little freedom causes employee dissatisfaction, reduced agility and collaboration.

How can you enable employees to be productive anywhere without putting data at risk? How can you create a zero trust strategy by only permitting access to corporate resources from mobile devices with a permitted risk level?...
Virtual
Roundtable
Tuesday, November 2nd, 2021
Dan Gunderman
Jerome Ferrara
Dan Gunderman with Jerome Ferrara
Virtual Roundtable
State of Hybrid Work: Why Credential Management Still Matters
Discussion topics will include:
With hybrid and remote work likely to continue well into 2022, CISOs and their teams are continuing to find the best ways to secure the credentials of employees who are accessing applications and devices from a variety of locations. At the same time, workers need ready access to the resources while lines of business managers seek out ways to reduce friction to allow for the most productivity.

Organizations need a holistic approach to credential and password management. In addition to creating a secure environment for employees who are logging in from home or from remote and sometimes corporate offices, this also allows CISOs to help IT and other parts of...
Virtual
Roundtable
Wednesday, November 3rd, 2021
Anna Delaney
Shashi Prakash
Anna Delaney with Shashi Prakash
Virtual Roundtable
Why Protecting Your Internet Attack Surface Matters More Than Ever
Discussion topics will include:
As organizations continue to increase their presence online every year, their internet attack surface continues to grow while becoming ever more complex to protect. This not only includes fraudsters creating fake domains to impersonate legitimate websites, but also increases in typosquatting attacks, trademark infringement and vendor email compromise schemes, which are a growing area of concern for the FBI.

For CISOs and their teams, protecting against these types of attacks and fraud is an ever-growing concern, especially when much of this malicious activity happens outside the firewall. How can security leaders tap into new technologies, such as automation, to help better protect the internet attack surface? What can organizations do...
Virtual
Roundtable
Thursday, November 4th, 2021
Anna Delaney
Tom Davison
Anna Delaney with Tom Davison
Virtual Roundtable
Financial Services: Securing Remote Access, From Endpoint to Cloud
Discussion topics will include:
As more users in the Financial Services sector access cloud services and infrastructure from mobile devices, cybercriminals deliberately target phones, tablets and Chromebooks to increase their odds of finding a vulnerable entry point. A single successful phishing or mobile ransomware attack can give attackers access to data across your entire backend infrastructure.

Security professionals need a way to securely enable cloud access while maintaining visibility, control, and protecting corporate data. However, as the SolarWinds supply chain attacks recently illustrated, relying on native controls for cloud security and data protection is no longer enough. A new approach is needed.

Discussion topics will include:
How to secure remote access for any asset;...
Virtual
Roundtable
Thursday, November 4th, 2021
Dan Gunderman
Wolf Goerlich
Dan Gunderman with Wolf Goerlich
Virtual Roundtable
Envisioning a Passwordless World
Discussion topics will include:
For almost all organizations, passwords are a necessary part of day-to-day work, but security leaders and CISOs know that passwords are the weak link in any security chain. Passwords are easily hacked or compromised by attackers, and trying to ensure that workers and employees follow basic cyber hygiene, including resetting passwords on a regular basis, is a nearly impossible task.

Organizations need a fresh approach, one that combines the best of how multifactor authentication works with technologies such as biometrics, to create a world where passwords are no longer needed. This not only ensures better security but also eliminates usability issues. It ensures that employees can complete work and access...
Virtual
Roundtable
Tuesday, November 9th, 2021
Anna Delaney
Chip Witt
Anna Delaney with Chip Witt
Virtual Roundtable
Throw Away the Key(logger): Strategies for Protecting Users from Malware
Discussion topics will include:
Despite your team’s best efforts to protect corporate systems from malware, users tend to click before thinking. At work, corporate security software may catch wind of an illegitimate download before it causes much damage. On personal devices, however, your employees have fewer layers of protection – and the same goes for consumers using your services.

Botnets can provide criminals with a complete picture of your users’ online activity, making it easy for them to impersonate victims and take over even well-protected accounts. An infection on an employee’s personal system can provide a stepping stone to sensitive corporate data or a pathway for delivering ransomware, while an infected consumer opens the...
Virtual
Roundtable
Tuesday, November 9th, 2021
Riccardo Meggiato
Alessandro Dinia
Riccardo Meggiato with Alessandro Dinia
Virtual Roundtable
Gestione degli aggiornamenti per contrastare ransomware e minacce di nuova generazione
Discussion topics will include:
Continua ad aumentare il numero di nuove vulnerabilità scoperte, con oltre 18000 rese pubbliche solo lo scorso anno. Del resto, poche risorse e tempo limitato continuano a essere un problema, nella comunità della cybersecurity: cosa fare per risolverlo?

In particolare, come possiamo allineare i dati che abbiamo sulle vulnerabilità più critiche con le patch necessarie, per correggere almeno il 10% delle più pericolose?

Iscrivetevi a questo evento dedicato agli esperti del settore, che offre approfondimenti su come integrare informazioni sulle patch e sulle vulnerabilità per migliorare il livello di sicurezza delle vostre aziende. Nel corso dell’evento, parleremo insieme anche di come gestire le compliance con gli standard e gli obblighi...
Virtual
Roundtable
Tuesday, November 9th, 2021
Tom Field
Kurt Roemer
Tom Field with Kurt Roemer
Virtual Roundtable
Disruptive Defense: How to Turn the Tables on Ransomware
Discussion topics will include:
The Kaseya VSA ransomware incident that impacted scores of MSPs and hundreds of enterprises globally is just the latest example: The world is being held hostage by ransomware adversaries who grow only bigger and bolder with each new success.

While essential practices somewhat stem the tide, resilience to ransomware requires much more than the latest patch or update. Disruptive innovation – past, present and future – is the theme of this discussion, where we will explore novel ransomware mitigations.

Discussion topics will include:
From readiness to response – how to build your ransomware mitigation framework;
Opportunities for automating resiliency and operational priorities
How thought leaders and change agents are preparing...
In-Person
Roundtable
Tuesday, November 9th, 2021
Tom Field
Greg Martin
Tom Field with Greg Martin
In-Person Roundtable
Modernizing Your Security Operations
Discussion topics will include:
“Modernization” is one of today’s popular buzzwords. But when it comes to reviewing legacy technology that may be increasing your security operations complexity and hampering your visibility – modernization becomes a critical business risk priority. The operative question is “How?”

Discussion topics will include:
What most needs to be modernized;
How legacy technology impacts complexity and visibility;
How cloud-based solutions such as SOAR can drive new approaches to security ops.

Join ISMG’s Tom Field for a moderated discussion that will feature insight from Greg Martin, VP and GM of Security Business Unit, with Sumo Logic.
Virtual
Roundtable
Wednesday, November 10th, 2021
Tom Field
Christopher Trollo
Tom Field with Christopher Trollo
Virtual Roundtable
Increase Operational Efficiency by Modernizing Your Security Operations
Discussion topics will include:
Too many endpoints. Too much data. Too little context for alerts about potential threats from insiders, criminals, and nation-states. These were all issues pre-COVID. And the pandemic-fueled accelerated transformation has only magnified them.

What are you doing today to streamline and modernize the efficiency of your security operations? How have your plans evolved throughout the pandemic, and what specifically do you intend to do in 2022? How will you address risk, the dearth of talent, and the ever evolving threat landscape?

Register for this executive roundtable to gain insights about modernizing operational efficiency.

Discussion topics will include:

The biggest drivers for change.

What operational efficiency means and how it translates...
Virtual
Roundtable
Wednesday, November 10th, 2021
Dan Gunderman
Jerome Ferrara
Dan Gunderman with Jerome Ferrara
Virtual Roundtable
State of Hybrid Work: Why Credential Management Still Matters
Discussion topics will include:
With hybrid and remote work likely to continue well into 2022, CISOs and their teams are continuing to find the best ways to secure the credentials of employees who are accessing applications and devices from a variety of locations. At the same time, workers need ready access to the resources while lines of business managers seek out ways to reduce friction to allow for the most productivity.

Organizations need a holistic approach to credential and password management. In addition to creating a secure environment for employees who are logging in from home or from remote and sometimes corporate offices, this also allows CISOs to help IT and other parts of...
Virtual
Roundtable
Thursday, November 11th, 2021
Suparna Goswami
David Fairman
Suparna Goswami with David Fairman
Virtual Roundtable
Cloud Security: Building Defense using ‘Zero Trust’
Discussion topics will include:
Enterprises are increasingly relying on cloud-based infrastructure and services that are accessible from anywhere. With data no longer in an environment that can be controlled, security teams have been forced to rethink the way they protect their enterprises and their data.

Although there’s been a lot of discussion about zero trust strategies, not every organization has had the time or resource to fully explore what the model means for their security. At the same time, security leaders must grapple with not only how to best secure new cloud-based applications, but also how to best secure legacy systems.

How can your security team quickly verify a user’s identity and assign the...
Virtual
Roundtable
Thursday, November 11th, 2021
Anna Delaney
Gwyndaf Davies
Anna Delaney with Gwyndaf Davies
Virtual Roundtable
What to do About Patch Management Overload
Discussion topics will include:
Newly discovered vulnerabilities continue to increase, with more than 18,000 published last year alone. Resources and limited time continue to be an issue amongst the Cyber Security Community, so what can be done to rectify this?

In particular, how do we align the most critical vulnerability data with the right patches to ensure we can, at least, get the top 10% addressed?

Register for this Executive Discussion offering insights into how you can integrate patch information and vulnerability data to improve your overall security posture. We’ll also address how to maintain compliance with industry and sector standards, including ISO 270001 and GDPR.

Join ISMG’s Anna Delaney for a moderated discussion...
Virtual
Roundtable
Tuesday, November 16th, 2021
Anna Delaney
Jay Coley
Anna Delaney with Jay Coley
Virtual Roundtable
Web Application Firewalls: Maximising Control and Visibility
Discussion topics will include:
As organizations have shifted to online-focused business operations, expectations for the security of websites and apps are at an all-time high. Attackers, however, are constantly finding new vulnerabilities and attack vectors. Organizations deploy Web Application Firewalls to detect malicious web traffic aimed at their production apps and APIs.

Can you understand the intent of the attacks? Do you have real-time visibility and control? How can you reduce the noise of security products to focus on the most critical alerts?

Discussion topics will include:
How attacks against are applications evolving
Techniques to reduce false positive security alerts
Best practices to attain real-time visibility and control

Join ISMG's Anna Delaney for a...
Virtual
Roundtable
Tuesday, November 16th, 2021
Tom Field
Mary Yang
Tom Field with Mary Yang
Virtual Roundtable
Securing Critical Infrastructure: What it Means for Your Organization
Discussion topics will include:
From SolarWinds to nation-state actors targeting vulnerable Exchange email servers to the ransomware attacks against Colonial Pipeline, the security of critical infrastructure has been at the forefront of nearly every cybersecurity conversation since the beginning of the year.

President Biden’s executive order also added to the discussion as the federal government is now poised to revamp its security posture to meet these new challenges.

But what do these changes mean for other private sector organizations? How will potential legislation such as breach notification bills that are before Congress affect the way organizations report incidents to the federal government? And how will public-private partnerships work as the White House demands executive...
Virtual
Roundtable
Tuesday, November 16th, 2021
Tom Field
David Balcar
Tom Field with David Balcar
Virtual Roundtable
Business Risk: Which Attacks Can Shut You Down?
Discussion topics will include:
When it comes to cybersecurity in the manufacturing sector, there are generalized threats – phishing, account takeover, insider risk – that can be a nuisance, incur costs or even inflict reputational damage.

But then there are the serious threats – ransomware, supply-chain attacks, product or production tampering – that actually can shut down your business. The key is to be able to distinguish between the different categories of threats and focus most on the ones that can do the worst harm.

Which are today’s most critical threats to the manufacturing sector? Where are organizations most vulnerable in terms of IT and OT? Do you know – and are you prepared...
Virtual
Roundtable
Wednesday, November 17th, 2021
Tom Field
Ben Smith
Tom Field with Ben Smith
Virtual Roundtable
Operationalizing the MITRE ATT&CK Framework
Discussion topics will include:
Too many enterprises today are in a reactive, firefighting mode when it comes to incident response. The MITRE ATT&CK framework is gaining popularity as a structured way to approach vulnerabilities, threats and remediation. Yet a recent study showed that even though 82% of cybersecurity professionals are familiar with the MITRE ATT&CK framework, only 8% said they used it regularly. The challenge: How to operationalize the framework.

Register for this executive roundtable to gain key insights about putting MITRE ATT&CK to work and to discuss with your peers.

Discussion topics will include:

How to use the framework for remediation planning;

How threat intelligence, asset management and more complement the framework;

Why...
VIrtual
Roundtable
Wednesday, November 17th, 2021
Tom Field
Aaron Cockerill
Tom Field with Aaron Cockerill
VIrtual Roundtable
From Endpoint to Cloud: Achieving Zero Trust for Enterprises
Discussion topics will include:
The global reliance on cloud-based infrastructure and services that are accessible from any device, has prompted security teams to rethink the way they protect their organizations. To support this new and agile way of working, security leaders need to be able to balance end-user privacy with security to protect users and corporate data from phishing, malware, and other threats. At the same time, too little freedom causes employee dissatisfaction, reduced agility and collaboration.

How can you enable employees to be productive anywhere without putting data at risk? How can you create a zero trust strategy by only permitting access to corporate resources from mobile devices with a permitted risk level?...
Virtual
Roundtable
Wednesday, November 17th, 2021
Tom Field
Chris Wysopal
Tom Field with Chris Wysopal
Virtual Roundtable
Software Security: How to Prioritize, Measure and Convey It To the Board
Discussion topics will include:
Amidst the shifting threat landscape, cloud migration and ongoing digital transformation, software security is often low or even last on the list of priorities for security leaders to address.

Yet, with the recent executive order on cybersecurity, and as headlines continue to feature high-profile breaches, board members at organizations across all industries are taking notice. Even though there are often designated technical experts on boards, there is now an increased awareness around cybersecurity – especially software security – even among the traditionally business-oriented members.

So, it’s important to prioritize software security and to tailor messages to the business functions so that they too can understand the organization’s risk posture. But...
Virtual
Roundtable
Thursday, November 18th, 2021
Anna Delaney
Richard Archdecon
Anna Delaney with Richard Archdecon
Virtual Roundtable
Envisioning a Passwordless World
Discussion topics will include:
For almost all organizations, passwords are a necessary part of day-to-day work, but security leaders and CISOs know that passwords are the weak link in any security chain. Passwords are easily hacked or compromised by attackers, and trying to ensure that workers and employees follow basic cyber hygiene, including resetting passwords on a regular basis, is a nearly impossible task.

Organizations need a fresh approach, one that combines the best of how multifactor authentication works with technologies such as biometrics, to create a world where passwords are no longer needed. This not only ensures better security but also eliminates usability issues. It ensures that employees can complete work and access...
Virtual
Roundtable
Thursday, November 18th, 2021
Timothée Bardet
Roger Sels
Timothée Bardet with Roger Sels
Virtual Roundtable
Comment sécuriser infrastructures IT et endpoints à l’heure de la mobilité ?
Discussion topics will include:
Cette année a été marquée par une explosion d’événements de sécurité et de cyber incidents majeurs, ainsi qu’une généralisation forcée la mobilité. Cela pose des questions et défis quotidiens pour les dirigeants IT. Non seulement les équipes de sécurité ont besoin de toujours plus de visibilité sur des endpoints et des réseaux en nombre et en complexité croissants, mais elles doivent également mieux analyser, prioriser et s’adapter aux menaces changeantes. En effet avec une augmentation de la surface d’attaque, l’explosion de nouveaux appareils et de tierce-parties et un mélange d’infrastructures sur site en cloud, comment se défendre contre les menaces d’aujourd’hui et soutenir ce nouveau mode de travail ?

A...
Virtual
Roundtable
Thursday, November 18th, 2021
Dan Gunderman
Dave Lewis
Dan Gunderman with Dave Lewis
Virtual Roundtable
The Security Debt Crisis – How to Catch Up on Past Due Patches and Neglected Risk
Discussion topics will include:
There is a common theme for many of the mega breaches of recent years – a neglect of basic cybersecurity hygiene that has resulted in a backlog of unpatched apps, misapplied configurations and overlooked tasks. This debt compounds over time and, as with financial debt can snowball to reach a point, where it becomes insurmountable. As organizations increasingly become cloud first, the risk profile from security debt further increases.

So, what can be done to claw back control of security debt? How can organizations build a culture where security debt isn’t allowed to be neglected or passed on to others? How can systematic and repeatable processes alleviate the problem? And,...
Virtual
Roundtable
Thursday, November 18th, 2021
Tom Field
MK Palmore
Tom Field with MK Palmore
Virtual Roundtable
Combating the Modern Ransomware Threat
Discussion topics will include:
With threats growing in volume and sophistication, today’s ransomware attacks easily outpace many organizations’ defensive capabilities. Globally, enterprises of all sizes and sectors are being compromised and held hostage by ransomware, with many being forced to pay millions in ransom because they’re ill-equipped to combat their adversaries.

This trend intersects with the continued rise of digital business and represents a new magnitude of risk. It’s imperative, then, to understand your adversaries and re-examine your security posture so that you may achieve a target state of ransomware readiness.

Register for this executive roundtable to gain key insights about modernizing your ransomware defenses and to discuss with your peers.

Discussion topics will...
VIrtual
Roundtable
Tuesday, November 23rd, 2021
Anna Delaney
Martyna Lubińska
Anna Delaney with Martyna Lubińska
VIrtual Roundtable
Endpoint Cloud Security: How to Protect the Attacker’s Number One Target
Discussion topics will include:
Endpoints, even now, remain attackers’ number-one target because they’re the location of many organizations’ weakest link: the spot where employees access essential data.

Even as organizations pursue digital transformation projects and embrace the cloud, the pandemic, and that which follows, will continue to underscore this vulnerability. Today’s threats have morphed into more extravagant versions of themselves, applying increased pressure on improperly secured endpoints.

How can organizations best prevent, detect and respond to the full array of attacks targeting endpoints and do so across email, identity, network and cloud environments? What are best practices for ensuring security policies get consistently applied across the entire enterprise, even for endpoints they don’t own?...
Virtual
Roundtable
Wednesday, November 24th, 2021
Anna Delaney
Brett Raybould
Anna Delaney with Brett Raybould
Virtual Roundtable
Financial Services: The Roadmap to Zero Trust
Discussion topics will include:
For almost all organizations, passwords are a necessary part of day-to-day work, but security leaders and CISOs know that passwords are The cybersecurity landscape looks very different to how it did at the start of 2020 for all verticals, but especially for Financial Services. Hybrid workers are now the norm and the increased use of SaaS applications and collaboration tools has placed the regulators on red alert. The change has forged a new perimeter: identity, whether human or non-human. The risk now is from any endpoint, anywhere in the world, which could potentially gain access to your systems – whether on premise or in the cloud.

How can a Zero...
Virtual
Roundtable
Wednesday, November 24th, 2021
Anna Delaney
Richard Archdecon
Anna Delaney with Richard Archdecon
Virtual Roundtable
Envisioning a Passwordless World
Discussion topics will include:
For almost all organizations, passwords are a necessary part of day-to-day work, but security leaders and CISOs know that passwords are the weak link in any security chain. Passwords are easily hacked or compromised by attackers, and trying to ensure that workers and employees follow basic cyber hygiene, including resetting passwords on a regular basis, is a nearly impossible task.

Organizations need a fresh approach, one that combines the best of how multifactor authentication works with technologies such as biometrics, to create a world where passwords are no longer needed. This not only ensures better security but also eliminates usability issues. It ensures that employees can complete work and access...
Past Roundtables
Virtual
Roundtable
Tuesday, September 28th, 2021
Tom Field
Jeremy Snyder
Tom Field with Jeremy Snyder
Virtual Roundtable
ISMG Executive Roundtable Discussion: Nordics
Discussion topics will include:
Whether by circumstance or design, your enterprise has shifted some infrastructure and/or services to the cloud, and you’re planning even more migration in 2022. It takes a different mindset and skills to secure cloud environments vs. on-premise. But how do you develop a working roadmap for secure cloud migration? How do you know where you’re beginning and where you should go next?

Register for this executive roundtable to gain key insights about secure cloud migration and to discuss with your peers:
What is the appropriate roadmap for your enterprise?
How do you plot your course and milestones?
What – if anything – is holding you back from 100% commitment to...
Virtual
Roundtable
Tuesday, September 28th, 2021
Tom Field
Jeremy Snyder
Tom Field with Jeremy Snyder
Virtual Roundtable
ISMG Virtual Roundtable Discussion: UKI
Discussion topics will include:
The hybrid way of working is an established reality and one which has opened up a host of opportunities for criminals. Attackers no longer need to execute direct attacks, using attack vectors targeted straight at systems or at individuals. They can now take advantage of the supply chain in order to spread out the attacks elsewhere. In this new reality, you have to think like the attacker to avoid being the next victim.

What new tactics are criminals employing and how are they distributing attacks to take advantage of the hybrid model? What is being overlooked in our current defences? How are the attackers succeeding despite our defences?

Register for...
Virtual
Roundtable
Wednesday, September 29th, 2021
Timothee Bardet
Jean-Sébastien Milliere
Timothee Bardet with Jean-Sébastien Milliere
Virtual Roundtable
Table Ronde Virtuelle France d'ISMG
Discussion topics will include:
L’année dernière ne restera pas seulement dans les mémoires comme l’année où les entreprises ont rapidement déplacé leurs applications en cloud et en SaaS pour assurer la continuité de leurs activités. Elle a également été marquée par une explosion d’événements de sécurité et de cyber incidents.

Alors que le mode de travail “à distance” est appelé à perdurer, comment assurer la sécurité de toutes les données et de tous les appareils de votre organisation, tout en tirant parti de votre infrastructure informatique ? Comment réagir rapidement à ce modèle de lieu de travail numérique distribué ? Comment le faire avec vos outils actuels ? Quelles sont les meilleures pratiques pour...
Virtual
Roundtable
Wednesday, September 29th, 2021
Tom Field
Rick McElroy
Tom Field with Rick McElroy
Virtual Roundtable
ISMG Virtual Roundtable Discussion: US Healthcare
Discussion topics will include:
There has never been such a year for healthcare. Since the advent of the COVID-19 pandemic, healthcare entities globally have embraced cloud platforms and digital technologies to deliver telehealth products years ahead of schedule. “Healthcare from anywhere” is the new norm. The patient experience is the new competitive differentiator. And healthcare – more than ever before – is square in the adversaries’ crosshairs.

How has the healthcare attack surface shifted in the past year? What have cybersecurity leaders learned about protecting patient data on any app, network or device? What supply chain lessons must be learned from the SolarWinds breach? How are healthcare entities in 2021 bolstering their defenses to...
Virtual
Roundtable
Wednesday, September 29th, 2021
Aaron Cockerill
Scott Ferguson
Aaron Cockerill with Scott Ferguson
Virtual Roundtable
ISMG Virtual Roundtable Discussion: Northeast US
Discussion topics will include:
The global reliance on cloud-based infrastructure and services that are accessible from any device, has prompted security teams to rethink the way they protect their organizations. To support this new and agile way of working, security leaders need to be able to balance end-user privacy with security to protect users and corporate data from phishing, malware, and other threats. At the same time, too little freedom causes employee dissatisfaction, reduced agility and collaboration.

How can you enable employees to be productive anywhere without putting data at risk? How can you create a zero trust strategy by only permitting access to corporate resources from mobile devices with a permitted risk level?...
Virtual
Roundtable
Thursday, September 30th, 2021
Anna Delaney
Richard Archdecon
Anna Delaney with Richard Archdecon
Virtual Roundtable
ISMG Virtual Roundtable Discussion: EMEA
Discussion topics will include:
There is a common theme for many of the mega breaches of recent years – a neglect of basic cybersecurity hygiene that has resulted in a backlog of unpatched apps, misapplied configurations and overlooked tasks. This debt compounds over time and, as with financial debt can snowball to reach a point, where it becomes insurmountable. As organizations become increasingly cloud first, the risk profile from security debt further increases.

So, what can be done to claw back control of security debt? How can organizations build a culture where security debt isn’t allowed to be neglected or passed on to others? How can systematic and repeatable processes alleviate the problem? And,...
Virtual
Roundtable
Thursday, September 30th, 2021
Scott Ferguson
Wayne Lewandowski
Scott Ferguson with Wayne Lewandowski
Virtual Roundtable
ISMG Virtual Roundtable Discussion: S. Central US
Discussion topics will include:
For many organizations, digital transformation starts with adopting a cloud infrastructure or IaaS platform to support moving many of the basics a modern enterprise needs – such as compute, storage and networking – away from the data center. This helps save time and resources and allows an organization to focus on innovation.

Now, organizations are looking to invest more in other cloud-based services, such as SaaS applications to support hybrid work or various PaaS offerings that cloud service providers have in addition to their IaaS platforms. But the security of the data entrusted to various IaaS, PaaS and SaaS platforms is a concern, especially when organizations try to use the...
Virtual
Roundtable
Thursday, September 30th, 2021
Aaron Cockerill
Tom Field
Aaron Cockerill with Tom Field
Virtual Roundtable
ISMG Virtual Roundtable Discussion: PacNW
Discussion topics will include:
The global reliance on cloud-based infrastructure and services that are accessible from any device, has prompted security teams to rethink the way they protect their organizations. To support this new and agile way of working, security leaders need to be able to balance end-user privacy with security to protect users and corporate data from phishing, malware, and other threats. At the same time, too little freedom causes employee dissatisfaction, reduced agility and collaboration.

How can you enable employees to be productive anywhere without putting data at risk? How can you create a zero trust strategy by only permitting access to corporate resources from mobile devices with a permitted risk level?...
Virtual
Roundtable
Tuesday, October 5th, 2021
Anna Delaney
Nuno Almeida Silva
Anna Delaney with Nuno Almeida Silva
Virtual Roundtable
ISMG Virtual Roundtable Discussion: EMEA Finance
Discussion topics will include:
The Digital Operational Resilience Act (DORA) will soon become reality in the European Union. This new EU Regulation will create a comprehensive and cross-sectional digital operational resilience framework across the EU-27 and its rules will apply for all regulated financial institutions. Compliance also includes the UK, despite Brexit.

Banks, fintech companies, insurance firms, and fund and wealth management companies will most likely be subject to deeper scrutiny and change in their processes. This will involve taking their cyber risk strategies to the next level by implementing effective third-party risk management programs, among other applicable policies foreseen with DORA.

Register for this executive roundtable for new insights and discussion about:
How...
Virtual
Roundtable
Tuesday, October 5th, 2021
Tom Field
Dawn Cappelli
Tom Field with Dawn Cappelli
Virtual Roundtable
ISMG Virtual Roundtable Discussion: US Infrastructure
Discussion topics will include:
First there was President Biden’s cybersecurity executive order. Then came his Industrial Control System Cybersecurity Initiative. And most recently we’ve seen a new package of supply chain and critical infrastructure security plans launched in conjunction with a White House summit including the nation’s top technology, financial services and infrastructure leaders.

The sum of all these administrative actions: a renewed focus on critical infrastructure defense, supply chain security, DevSecOps and the zero-trust security model. As these initiatives trickle down from federal government to state and local, then to the private enterprise that support them, how prepared is your organization to understand and meet the new demands?

Register for this executive roundtable...
Virtual
Roundtable
Wednesday, October 6th, 2021
Tom Field
Chris Pierson
Tom Field with Chris Pierson
Virtual Roundtable
ISMG Virtual Roundtable Discussion: US Finance
Discussion topics will include:
Senior leaders’ unified digital life mingling personal and professional data and devices has become the soft underbelly of corporate cybersecurity. Therefore, CEOs and their CISOs need to extend the defense perimeter and protect the entire digital lives of all executives and key personnel. Some statistics:

27% of executives have malware on their personal devices
20% of executives’ homes are digitally compromised
69% of executive’s personal passwords are on the Dark Web
75% have improper privacy and security settings on their devices, thereby leaking critical information

What are the compelling threats against the executive team outside the corporate perimeter? How can CISOs extend the cloak of corporate security to the home?...
Virtual
Roundtable
Thursday, October 7th, 2021
Aaron Cockerill
Scott Ferguson
Aaron Cockerill with Scott Ferguson
Virtual Roundtable
Throw Away the Key(logger): Strategies for Protecting Users from Malware
Discussion topics will include:
Despite your team’s best efforts to protect corporate systems from malware, users tend to click before thinking. At work, corporate security software may catch wind of an illegitimate download before it causes much damage. On personal devices, however, your employees have fewer layers of protection – and the same goes for consumers using your services.

Botnets can provide criminals with a complete picture of your users’ online activity, making it easy for them to impersonate victims and take over even well-protected accounts. An infection on an employee’s personal system can provide a stepping stone to sensitive corporate data or a pathway for delivering ransomware, while an infected consumer opens the...
Virtual
Roundtable
Tuesday, October 12th, 2021
Anna Delaney
Martyna Lubińska
Anna Delaney with Martyna Lubińska
Virtual Roundtable
Adopting the Attacker's Mindset to Protect The Hybrid Workforce
Discussion topics will include:
Our new hybrid workforce is an established reality and attackers no longer need to execute direct attacks, instead, they can now leverage the supply chain in order to accelerate and distribute.

What new tactics are criminals employing and how are they distributing attacks to take advantage of the hybrid model? What is being overlooked in our current defences? How are the attackers succeeding despite our defences?

Register for this executive roundtable for new insights and discussion about:
Defence strategies that actually work to protect the hybrid workforce
Ways to achieve greater threat coverage and visibility of attacks
Why adopting the attacker’s mindset can better prepare for engagement.

Join ISMG’s Anna...
Virtual
Roundtable
Tuesday, October 12th, 2021
Tom Field
Victor Danevich
Tom Field with Victor Danevich
Virtual Roundtable
Defining and Securing Your 'Protect Surface'
Discussion topics will include:
The ‘Protect Surface’, coined by John Kindervag, is elemental to executing a Zero Trust strategy – the idea is that instead of trying to protect the entire attack surface which now extends throughout the Internet, identify your key assets and make sure they are segmented within a small protected area with strong authentication access rules and controls, such as:
Segmentation Gateway as a Next-Gen Firewall
Access Enforcement at the Gateway
Applying Multi-Factor Authentication

The enemy of securing the Protect Surface? Complexity – the sheer number of overlapping tools in your stack, and the new ‘work from anywhere’ environment that introduces new vendors, new products … and new risks.

Please join...
Virtual
Roundtable
Thursday, October 14th, 2021
Anna Delaney
Chris Finan
Anna Delaney with Chris Finan
Virtual Roundtable
MDR: Cybersecurity Essentials to Beat Ransomware
Discussion topics will include:
Ransomware cybercriminals are becoming increasingly sophisticated and organized, using techniques such as double and triple extortion, targeting vital infrastructure and teaming up with affiliate groups.

With the diversity and complexity of threats on the rise too, security teams find themselves drowning in data and overwhelmed by the immense volume of alerts, many of them false positives. How can organizations cut through the noise and accelerate incident detection and response times?

Register for this executive roundtable for new insights and discussion about:
Techniques to detect compromises before ransomware is detonated
Recommendations to achieve greater threat coverage and visibility into attacks
How thought leaders and change agents are preparing for the future...
Virtual
Roundtable
Thursday, October 14th, 2021
Tom Field
Chip Witt
Tom Field with Chip Witt
Virtual Roundtable
Throw Away the Key(logger): Strategies for Protecting Users from Malware
Discussion topics will include:
Despite your team’s best efforts to protect corporate systems from malware, users tend to click before thinking. At work, corporate security software may catch wind of an illegitimate download before it causes much damage. On personal devices, however, your employees have fewer layers of protection – and the same goes for consumers using your services.

Botnets can provide criminals with a complete picture of your users’ online activity, making it easy for them to impersonate victims and take over even well-protected accounts. An infection on an employee’s personal system can provide a stepping stone to sensitive corporate data or a pathway for delivering ransomware, while an infected consumer opens the...
Virtual
Roundtable
Tuesday, October 19th, 2021
Anna Delaney
Shashi Prakash
Anna Delaney with Shashi Prakash
Virtual Roundtable
Why Protecting Your Internet Attack Surface Matters More Than Ever
Discussion topics will include:
As organizations continue to increase their presence online every year, their internet attack surface continues to grow while becoming ever more complex to protect. This not only includes fraudsters creating fake domains to impersonate legitimate websites, but also increases in typosquatting attacks, trademark infringement and vendor email compromise schemes, which are a growing area of concern for the FBI.

For CISOs and their teams, protecting against these types of attacks and fraud is an ever-growing concern, especially when much of this malicious activity happens outside the firewall. How can security leaders tap into new technologies, such as automation, to help better protect the internet attack surface? What can organizations do...
Vic & Anthony's Steakhouse
In-Person
Roundtable
Tuesday, October 19th, 2021
Vic & Anthony's Steakhouse
Tom Field
John Nowotny
Tom Field with John Nowotny
In-Person Roundtable
Why Security Programs Fail and What Can Be Done to Improve Cybersecurity
Discussion topics will include:
Each year, organizations spend billions on their security operations centers or security programs and sustain data breaches despite the investments they’ve made.

One study found that during the first three quarters of 2020, the total number of reported data breaches for the year was already approaching 3,000 and 36 billion records had been exposed.

These numbers show the failure of security programs to keep up with the threats that organizations are facing – and this will remain so as long as security programs continue to be built on the same outdated model. A fresh approach that focuses on outcomes and use cases is needed to make security programs more cyber...
Virtual
Roundtable
Wednesday, October 20th, 2021
Anna Delaney
Richard Archdecon
Anna Delaney with Richard Archdecon
Virtual Roundtable
The Security Debt Crisis – How to Catch Up on Past Due Patches and Neglected Risk
Discussion topics will include:
There is a common theme for many of the mega breaches of recent years – a neglect of basic cybersecurity hygiene that has resulted in a backlog of unpatched apps, misapplied configurations and overlooked tasks. This debt compounds over time and, as with financial debt can snowball to reach a point, where it becomes insurmountable. As organizations become increasingly cloud first, the risk profile from security debt further increases.

So, what can be done to claw back control of security debt? How can organizations build a culture where security debt isn’t allowed to be neglected or passed on to others? How can systematic and repeatable processes alleviate the problem? And,...
Virtual
Roundtable
Wednesday, October 20th, 2021
Anna Delaney
Tom Davison
Anna Delaney with Tom Davison
Virtual Roundtable
How to Secure Remote Access: From Endpoint to Cloud
Discussion topics will include:
Cloud applications such as Office 365, Salesforce.com, ServiceNow, SAP, and others have become vital for any organization to operate and remain productive.

Compound this with managing corporate and mobile devices in a world where the network perimeter is being eroded and you have a real challenge on your hands.

Security professionals need a way to securely enable cloud access while maintaining visibility, control, and protecting corporate data. However, as the SolarWinds supply chain attacks recently illustrated, relying on native controls for cloud security and data protection is no longer enough. A new approach is needed.

Discussion topics will include:
How to secure remote access for any asset; whether on premise,...
Virtual
Roundtable
Wednesday, October 20th, 2021
Dan Gunderman
Wolf Goerlich
Dan Gunderman with Wolf Goerlich
Virtual Roundtable
Envisioning a Passwordless World
Discussion topics will include:
For almost all organizations, passwords are a necessary part of day-to-day work, but security leaders and CISOs know that passwords are the weak link in any security chain. Passwords are easily hacked or compromised by attackers, and trying to ensure that workers and employees follow basic cyber hygiene, including resetting passwords on a regular basis, is a nearly impossible task.

Organizations need a fresh approach, one that combines the best of how multifactor authentication works with technologies such as biometrics, to create a world where passwords are no longer needed. This not only ensures better security but also eliminates usability issues. It ensures that employees can complete work and access...
Virtual
Roundtable
Wednesday, October 20th, 2021
Martyna Lubińska
Tom Field
Martyna Lubińska with Tom Field
Virtual Roundtable
Marching Orders: Understanding and Meeting the Biden Administration’s New Cybersecurity Standards
Discussion topics will include:
First there was President Biden’s cybersecurity executive order. Then came his Industrial Control System Cybersecurity Initiative. And most recently we’ve seen a new package of supply chain and critical infrastructure security plans launched in conjunction with a White House summit, including the nation’s top technology, financial services and infrastructure leaders.

The sum of all these administrative actions: a renewed focus on critical infrastructure defense, supply chain security, DevSecOps and the zero-trust security model. As these initiatives trickle down from federal government to state and local, then to the private enterprise that support them, how prepared is your organization to understand and meet the new demands? How do you avoid being...
Virtual
Roundtable
Thursday, October 21st, 2021
Ivan Lai
Geetha Nandikotkur
Ivan Lai with Geetha Nandikotkur
Virtual Roundtable
Establishing a Risk-Based Approach to Authenticate and Authorize Identities
Discussion topics will include:
With Identity as the new perimeter and the distributed workforce using multiple devices during the pandemic, enterprises aspire to a well-orchestrated technology and tool that could offer well-defined authentication and authorization to secure user identities.

As a CISO, have you witnessed increased operational risks and security challenges in supporting your remote workforce? Are you able to provide the right user access, authentication, and control to the users accessing through multiple devices? Are you able to assess and adjust risk parameters and contextualize policies based on user identities?

This exclusive virtual executive roundtable on “Establishing a Risk-based Approach to Authenticate and Authorize Identities” will provide answers to these and other critical...
Virtual
Roundtable
Thursday, October 21st, 2021
Timothée Bardet
Jean-Sébastien Milliere
Timothée Bardet with Jean-Sébastien Milliere
Virtual Roundtable
Quelles étapes clés pour mettre en place un SASE ?
Discussion topics will include:
Aujourd’hui, le plus grand défi pour les RSSI est de sécuriser tous les effectifs, qu’il s’agisse d’un bureau à domicile, d’une succursale traditionnelle, d’une succursale au sein d’un ERP ou d’une combinaison des trois. Comment dès lors fournir une “sécurité cohérente” pour chaque espace de travail ? Face à la nécessité de simplifier des solutions de sécurité de plus en plus complexes, les entreprises adoptent le service d’accès sécurisé Edge, ou SASE.

Quels sont les principaux facteurs qui empêchent les entreprises de mettre en œuvre correctement une solution SASE ? Quelles sont les exigences nécessaires pour dépasser la seule “vision” du SASE ? Et quelle est la meilleure façon de...

Information Security Media Group Brands

ISMG’s 30 global media properties provide security professionals with industry and geo-specific news, research and educational events.