Tuesday, April 15th 2025

Unlock the Power of Cyber Threat Intelligence

4:00 PM - 5:30 PM ET | Virtual

Event Overview

Modern security programs need to do more than keep up – they need to anticipate. That’s where Cyber Threat Intelligence comes in.

Cyber threat intelligence (CTI) refers to the collection, analysis and dissemination of actionable information about potential or existing cyber threats that target an organization’s digital assets. CTI provides insights into the tactics, techniques, and procedures of threat actors, allowing organizations to make proactive, informed decisions about their security posture and resource allocation.

Ultimately, CTI enables security teams to make smarter, faster decisions. But how do you integrate CTI into your security program in a way that delivers real results? Register for this exclusive roundtable discussion, where you’ll join peers and subject matter experts to tackle key questions, including:

  • Why CTI matters: How intelligence turns the unknown into measurable risk.
  • Practical applications: Ways security teams can use CTI to address today’s most pressing threats.
  • Strategic integration: How CTI can drive long-term impact on your security strategy.

Request to Attend

By submitting this form you agree to our Privacy & GDPR Statement.

If you have any trouble submitting this form, please send an email to roundtables@ismg-events.com for assistance.

*Please note that this is an invitation-only event and space is limited. All requests to attend will be reviewed by our event staff and approved based on professional qualifications and event capacity. Additionally, these events will not be recorded and the Chatham House Rule will apply.

Join our Events Community ISMG Connect

Continue the conversation with your industry peers

Share your Feedback

Complete a brief 5-minute survey here

Moderator

 

Sean D. Mack

Consulting Editor, CISO,

CyberEdBoard

ISMG

 

Stephen Boyer

Co-Founder and CIO

Bitsight

Speakers

Join ISMG for a moderated discussion that will feature insight from Stephen Boyer the Co-founder and CIO at Bitsight. This 90-minute virtual session will be:

This session will be:

  • Chatham house rule
  • Peer driven
  • Pitch free

Subject matter expert

Stephen Boyer

CIO and Co-Founder

BitSight

Stephen Boyer is a technology entrepreneur and executive. He is responsible for ensuring an aligned
vision between industry challenges and platform offerings, enabling organizations to create trust in the
digital economy. Boyer is a frequent speaker for security, risk and insurance topics. Prior to co-founding
BitSight in 2011, he was the president and co-founder of Saperix, a company spun out of the MIT Lincoln
Laboratory focused on vulnerability and network topology risk analysis. At MIT he led research and
development programs solving large-scale national cybersecurity problems.

Exclusive Sneak Peek: Get a Preview of this Roundtable

Underwritten by

Bitsight is the leader in trusted, cyber risk intelligence, helping security and governance teams make informed decisions with the industry’s most extensive external data and analytics. Bitsight delivers real-time visibility into cyber risk exposure, enabling teams to detect threats, prioritize actions, and mitigate risk across their extended attack surface.

Powered by an unparalleled cyber dataset and intelligence-driven workflows, the Bitsight platform reveals security gaps across infrastructure, cloud environments, identities, and third- and fourth-party ecosystems. From operational teams to the boardroom, Bitsight provides the intelligence backbone that transforms how organizations understand and manage cyber risk.

Rules of Engagement

By taking part in this discussion you agree that:

  • These events follow Chatham House Rule. Nothing shared will be recorded or distributed anywhere online.
  • If for any reason you need to cancel your reservation, we ask you to let us know 48 hours prior to the event commencing so we can open your seat up to someone else.
  • These are interactive discussions, so we ask that all attendees participate in the discussion. If this is a virtual event, we ask all attendees to join via video.

Upcoming ISMG Events

June 5, 2025

AI-Driven Advantage: Streamlined Operations, Loyal Customers

June 10, 2025

Hybrid Identity Under Siege: Defending AD & Cloud-Based Identity

June 12, 2025

AI Security Imperatives: Protecting Your Enterprise in the Age of GenAI

June 18, 2025

Threat Exposure Management: How Do You Prioritize Vulnerabilities?

June 19, 2025

Building Next-Gen Applications with Serverless: Accelerating Development for Data-Intensive Workloads

Upcoming ISMG Events

June 5, 2025

AI-Driven Advantage: Streamlined Operations, Loyal Customers

June 10, 2025

Hybrid Identity Under Siege: Defending AD & Cloud-Based Identity

June 12, 2025

AI Security Imperatives: Protecting Your Enterprise in the Age of GenAI