tuesday, june 13th, 2023

Generating Revenue via Digital Transformation: CISO Strategies for Success

09:30-12:30pm IDT | Tel Aviv, Israel

Event Overview

As organisations continue to pursue digital transformation, CISOs face multiple challenges. At a high level, they must be perceived not as security gatekeepers, but enablers of growth, able to shepherd rapid development and deployment of secure code in a way that boosts the bottom line.

This requires fostering top-notch application security and development team practices, while at the same time making the application security business case to senior management and delivering promised results.

Accordingly, what are best practices for CISOs to set and quantify practices that reduce costs while driving revenue growth via digital transformation? What are common application security roadblocks and tactics for addressing? How can software supply chains be dealt with securely? Which regulations are having an impact on these operations?

This invitation-only roundtable on Generating Revenue via Digital Transformation: CISO Strategies for Success will provide answers to these and other critical questions.

Guided by insights from Ori Bendet, Checkmarx’s, VP of Product Management, the roundtable will also draw on the experiences of the attendees, who will discuss best practices for managing digital transformation risks while ensuring it contributes to business growth.

DISCUSSION POINTS

  • Demonstrating the value that application security brings to the business
  • Strategies for balancing operational efficiency, risk management and total cost of ownership
  • Application security essentials in the digital transformation era

Moderator

Mathew Schwartz

Executive Editor

ISMG

Ori Bendet

VP of Product Management

Checkmarx

Speakers

Join Ori Bendet, VP of Product Management for event sponsor Checkmarx, to have the opportunity to discuss cybersecurity risk quantification with a handful of senior executives in an informal, virtual setting, from which you will emerge with new strategies and solutions you can immediately put to work.

This 90-minute session will be:

  • Chatham house rules
  • Peer driven
  • Pitch free

Watch brief video of the topic

Venue

Lili Kitchen Chef, Derech Ben Zvi 84, Tel Aviv

Derech Ben Zvi 84, Tel Aviv, 6th floor, loft 632

Underwritten by

Checkmarx is the leading application security provider, offering the industry’s most comprehensive cloud-native platform, Checkmarx OneTM. Our products and services enable enterprises to shift everywhere in order to secure every phase of development for every application while simultaneously balancing the dynamic needs of CISOs, security teams, and development teams. We are honored to serve more than 1,800 customers, including 60 percent of Fortune 100 organizations, and are committed to moving forward with an unwavering dedication to the safety and security of our customers and the applications that power our day-to-day lives. Checkmarx. Make Shift Happen.

Rules of Engagement

By taking part in this discussion you agree that:

  • These events follow Chatham House Rule. Nothing shared will be recorded or distributed anywhere online.
  • If for any reason you need to cancel your reservation, we ask you to let us know 48 hours prior to the event commencing so we can open your seat up to someone else.
  • These are interactive discussions, so we ask that all attendees participate in the discussion. If this is a virtual event, we ask all attendees to join via video.

Upcoming Events

February 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI

February 12, 2025

Have We Shifted Too Far Left? Engineering, InfoSec, and Customer Identity Ownership

February 20, 2025

MLOPs and the Role of Gen AI in Securing the Software Supply Chain

February 20, 2025

Managing Your Expanded Attack Surface Using Automation: The Security Promise

February 20, 2025

Securing the Modern Payment Rails

Upcoming Events

February 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI

February 12, 2025

Have We Shifted Too Far Left? Engineering, InfoSec, and Customer Identity Ownership

February 20, 2025

MLOPs and the Role of Gen AI in Securing the Software Supply Chain