Wednesday, July 30th 2025

Securing Data Flow in the AI-Quantum Era

5:30 -8:00 PM PT | Portland, OR

Event Overview

Sensitive data movement poses risks, but outright restriction can hinder operations. Organizations need agile security frameworks today – to protect data in the AI era – and in the ever-nearing future for the advent of quantum computing.

How is your enterprise securing data flow today? What have been the failures and successes you’ve built upon? How is your enterprise thinking – is your enterprise even thinking – about the post-quantum era?

Register for this session to join subject matter experts and your peers to explore modern security platforms that enable secure data flow and prepare for post-quantum encryption.

Among the discussion topics:

  • How do you choose secure access methods for diverse use cases?
  • Ways to adapt security to risk, user behavior and AI interactions
  • Strategies to prepare for post-quantum encryption’s enterprise impact

Request to Attend

By submitting this form you agree to our Privacy & GDPR Statement.

If you have any trouble submitting this form, please send an email to roundtables@ismg-events.com for assistance.

*Please note that this is an invitation-only event and space is limited. All requests to attend will be reviewed by our event staff and approved based on professional qualifications and event capacity. Additionally, these events will not be recorded and the Chatham House Rule will apply.

Join our Events Community ISMG Connect

Continue the conversation with your industry peers

Share your Feedback

Complete a brief 5-minute survey here

Moderator

 

Tom Field

SVP Editorial

ISMG

 

Austin Woffington

SVP & Field CTO

Netskope

 

Dennen Monks

Field Tech Strategist

CrowdStrike

Speakers

This roundtable discussion brings together top security leaders to discuss Securing Data Flow in the AI-Quantum Era.

This session will be:

  • Chatham house rule
  • Peer driven
  • Pitch free

Subject matter expert

Venkat Lakshminarayanan

CTO in Residence

Zscaler

Venkat is a tech-savvy digital transformation leader with over 20 years of industry experience. His expertise includes building state-of-the-art infrastructure, customer support services, and product engineering for startups and Fortune 100 enterprises. He has held senior leadership positions at companies including ServiceNow, FireEye, KLA, and Blue Coat Systems.

Exclusive Sneak Peek: Get a Preview of this Roundtable

Venue

Jake's Grill

11 SW 10th Ave, Portland, OR 97205

Underwritten by

Netskope is a leader in cloud security. Using patented technology, Netskope’s cloud-scale security platform provides context-aware governance of all cloud usage in the enterprise in real time, whether accessed from the corporate network, remote, or from a mobile device.

CrowdStrike is a global cybersecurity leader that has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk—endpoints and cloud workloads, identity, and data. Trusted by organizations worldwide, CrowdStrike secures customers across various industries, including 300 of the Fortune 500, 543 of the Fortune 1000, and 43 of the 50 U.S. states.

Amazon Web Services (AWS) offers key infrastructure services to businesses in the form of web services, now known as cloud computing. Businesses can take advantage of Amazon’s expertise and economies of scale to access resources when their business needs them, delivering results faster and at a lower cost. With data center locations in the U.S., Europe, Brazil, Singapore, Australia and Japan, AWS provides a reliable, scalable and low-cost infrastructure platform in the cloud that powers thousands of businesses around the world.

Rules of Engagement

By taking part in this discussion you agree that:

  • These events follow Chatham House Rule. Nothing shared will be recorded or distributed anywhere online.
  • If for any reason you need to cancel your reservation, we ask you to let us know 48 hours prior to the event commencing so we can open your seat up to someone else.
  • These are interactive discussions, so we ask that all attendees participate in the discussion. If this is a virtual event, we ask all attendees to join via video.

Upcoming ISMG Events

June 18, 2025

Threat Exposure Management: How Do You Prioritize Vulnerabilities?

June 19, 2025

Building Next-Gen Applications with Severless: Accelerating Development for Data-Intensive Workloads

June 24, 2025

Agentic AI and the Access-Trust Gap

June 25, 2025

The Critical Role of the SOC in Modern Defense

August 19-20

Virtual Summit: Cybersecurity Implications of AI, Global

Upcoming ISMG Events

June 18, 2025

Threat Exposure Management: How Do You Prioritize Vulnerabilities?

June 19, 2025

Building Next-Gen Applications with Severless: Accelerating Development for Data-Intensive Workloads

June 24, 2025

Agentic AI and the Access-Trust Gap