Thursday, March 14th, 2024

Reclaim Control over Your Enterprise's Secrets

4:00pm – 5:30pm CT | Virtual

Event Overview

The secure management of secrets—passwords, tokens, API keys, and other sensitive credentials—is paramount for safeguarding critical infrastructure and data. For organizations across Finance, FinTech, Healthcare, HealthTech, Entertainment, Online Gaming, and Travel/Hospitality, the challenge isn’t just about protecting these secrets from external threats, but also about ensuring they are managed efficiently and in compliance with evolving regulations. This executive roundtable will delve into the strategic importance of secrets management, exploring approaches to minimize risks, enhance operational security, and drive compliance in a strict regulatory environment. 

DISCUSSION POINTS

  • Best practices for automating and securing secrets management across diverse IT environments.
  • Strategies for integrating secrets management solutions with existing cybersecurity frameworks to bolster defense mechanisms.
  • The role of secrets management in achieving compliance with industry-specific regulations and standards.
  • Real-world case studies demonstrating the impact of effective secrets management on reducing security breaches and enhancing operational efficiency.

Join our Events Community ISMG Connect

Continue the conversation with your industry peers

Share your Feedback

Complete a brief 5-minute survey here

Moderator

james deluccia

James Deluccia 

Product Security Chief

Honeywell

Speakers

 Invitation-only roundtable aims to equip leaders with the knowledge necessary to implement secrets management strategies, ensuring their organizations remain resilient against both current and emerging cybersecurity threats and regulatory pressures.

This session will be:

  • Chatham house rules
  • Peer driven
  • Pitch free

Exclusive Sneak Peek: Get a Preview of this Roundtable

Underwritten by

Entro is a revolutionary cyber holistic security platform that offers end-to-end protection for secrets and programmatic access to cloud services and data. With Entro, CISOs and cyber security professionals enjoy comprehensive oversight, ensuring uncompromised protection for their organizations.

Rules of Engagement

By taking part in this discussion you agree that:

  • These events follow Chatham House Rule. Nothing shared will be recorded or distributed anywhere online.
  • If for any reason you need to cancel your reservation, we ask you to let us know 48 hours prior to the event commencing so we can open your seat up to someone else.
  • These are interactive discussions, so we ask that all attendees participate in the discussion. If this is a virtual event, we ask all attendees to join via video.

Upcoming ISMG Events

June 12, 2025

AI Security Imperatives: Protecting Your Enterprise in the Age of GenAI

June 18, 2025

Threat Exposure Management: How Do You Prioritize Vulnerabilities?

June 19, 2025

Building Next-Gen Applications with Severless: Accelerating Development for Data-Intensive Workloads

June 24, 2025

Agentic AI and the Access-Trust Gap

June 25, 2025

The Critical Role of the SOC in Modern Defense

Upcoming ISMG Events

June 12, 2025

AI Security Imperatives: Protecting Your Enterprise in the Age of GenAI

June 18, 2025

Threat Exposure Management: How Do You Prioritize Vulnerabilities?

June 19, 2025

Building Next-Gen Applications with Severless: Accelerating Development for Data-Intensive Workloads