Supply Chain Attacks: Defending Against Vendor Email Compromise
Envisioning a Passwordless World
Cybersecurity-Driven Digital Transformation
New Approaches to Asset Management in Cybersecurity
Envisioning a Passwordless World
Fraud Fighting 2022: How to Win the Battle Against Bots
Why Protecting Your Internet Attack Surface Matters More Than Ever
Fraud Fighting 2022: How to Win the Battle Against Bots
Supply Chain Attacks: Defending Against Vendor Email Compromise
DevSecOps: Uncovering the Hidden (and Costly) Risks
Ransomware: How to Reduce Your Likelihood of Being a Victim
From Endpoint to Cloud: Achieving Zero Trust for Enterprises
Better Understanding Cloud Security Risks Through ‘Context’
New Approaches to Asset Management in Cybersecurity
Increase Operational Efficiency by Modernizing Your Security Operations
New Approaches to Asset Management in Cybersecurity
Fraud Fighting 2022: How to Win the Battle Against Bots
Software Security: How to Prioritize, Measure and Convey It To the Board
Fraud Fighting 2022: How to Win the Battle Against Bots
New Approaches to Asset Management in Cybersecurity
Strategies to Defend Your Multi & Hybrid Cloud Infrastructure
Best Practices to Bridge the Security and DevOps Gap
Better Understanding Cloud Security Risks Through ‘Context’
Software Security: How to Prioritize, Measure and Convey It To the Board
Les meilleures pratiques pour combler le fossé entre sécurité et DevOps
New Approaches to Asset Management in Cybersecurity
Executive Protection for Digital Lives – What CIOs and CISOs Need to Consider Beyond the Office
Executive Protection for Digital Lives – What CIOs and CISOs Need to Consider Beyond the Office
Better Understanding Cloud Security Risks Through ‘Context’
Web Application Firewalls: Maximising Control and Visibility
Executive Protection for Digital Lives – What CIOs and CISOs Need to Consider Beyond the Office
Upcoming Roundtables
Virtual
Roundtable
Tuesday, December 7th, 2021
Jeremy Kirk
Mike Britton
Jeremy Kirk with Mike Britton
Virtual Roundtable
Supply Chain Attacks: Defending Against Vendor Email Compromise
Discussion topics will include:
Vendor email compromise (VEC) is a significant security threat to organizations. According to research from Abnormal Security, the percentage of companies who received a VEC attack increased 156% from July 2020 to June 2021, as threat actors increasingly see communications between vendors and customers as the weakest link.

It’s clear traditional email defenses were not designed to stop socially-engineered attacks. Without a new approach, high-profile attacks such as SolarWinds and Colonial Pipeline, will continue to cause severe financial losses and...
Virtual
Roundtable
Tuesday, December 7th, 2021
Dan Gunderman
Wolf Goerlich
Dan Gunderman with Wolf Goerlich
Virtual Roundtable
Envisioning a Passwordless World
Discussion topics will include:
For almost all organizations, passwords are a necessary part of day-to-day work, but security leaders and CISOs know that passwords are the weak link in any security chain. Passwords are easily hacked or compromised by attackers, and trying to ensure that workers and employees follow basic cyber hygiene, including resetting passwords on a regular basis, is a nearly impossible task.

Organizations need a fresh approach, one that combines the best of how multifactor authentication works with technologies such as biometrics,...
Virtual
Roundtable
Wednesday, December 8th, 2021
Suparna Goswami
Deepak Prasad
Suparna Goswami with Deepak Prasad
Virtual Roundtable
Cybersecurity-Driven Digital Transformation
Discussion topics will include:
With the acceleration of digital transformation, cybersecurity has risen to the forefront of concerns for enterprises around the world. On top of that, the velocity of threats is increasing and attackers are using new, sophisticated ways of infiltrating your production environment as well as your software supply chain. Digital Transformation migration to the cloud leads to new opportunities for security transformation, but how are enterprise taking a ‘shift left’ approach while moving applications to the cloud? Are detection tools more...
Virtual
Roundtable
Wednesday, December 8th, 2021
Anna Delaney
Chris Cochran
Anna Delaney with Chris Cochran
Virtual Roundtable
New Approaches to Asset Management in Cybersecurity
Discussion topics will include:
The proliferation of mobile and IoT devices adds a new, unprecedented degree of complexity that security teams are left scrambling to solve: How do you account for and secure these ephemeral devices when you often can’t even identify them in real-time?

Furthermore, traditional approaches to IT asset management have not scaled to the modern cloud deployment and leave us with limited visibility and gaps in our security coverage. A new approach is required.

Discussion topics will include:
How asset management...
Virtual
Roundtable
Wednesday, December 8th, 2021
Dan Gunderman
Wolf Goerlich
Dan Gunderman with Wolf Goerlich
Virtual Roundtable
Envisioning a Passwordless World
Discussion topics will include:
For almost all organizations, passwords are a necessary part of day-to-day work, but security leaders and CISOs know that passwords are the weak link in any security chain. Passwords are easily hacked or compromised by attackers, and trying to ensure that workers and employees follow basic cyber hygiene, including resetting passwords on a regular basis, is a nearly impossible task.

Organizations need a fresh approach, one that combines the best of how multifactor authentication works with technologies such as biometrics,...
Virtual
Roundtable
Wednesday, December 8th, 2021
Tom Field
Frank Walsh
Tom Field with Frank Walsh
Virtual Roundtable
Fraud Fighting 2022: How to Win the Battle Against Bots
Discussion topics will include:
As enterprises globally have shifted more of their operations online, cyber adversaries have doubled down on the use of bots to automate and increase the scale of their attacks.

According to recent research from Enterprise Strategy Group, nearly half (47%) of cybersecurity professionals have seen examples of credential stuffing or cracking attacks used for account takeover in just the past 6 months. And 46% are aware of attacks on online shopping cart systems and instances of automated inventory purchasing or...
Virtual
Roundtable
Thursday, December 9th, 2021
Anna Delaney
Shashi Prakash
Anna Delaney with Shashi Prakash
Virtual Roundtable
Why Protecting Your Internet Attack Surface Matters More Than Ever
Discussion topics will include:
As organizations continue to increase their presence online every year, their internet attack surface continues to grow while becoming ever more complex to protect. This not only includes fraudsters creating fake domains to impersonate legitimate websites, but also increases in typosquatting attacks, trademark infringement and vendor email compromise schemes, which are a growing area of concern for the FBI.

For CISOs and their teams, protecting against these types of attacks and fraud is an ever-growing concern, especially when much of...
Virtual
Roundtable
Thursday, December 9th, 2021
Tom Field
Frank Walsh
Tom Field with Frank Walsh
Virtual Roundtable
Fraud Fighting 2022: How to Win the Battle Against Bots
Discussion topics will include:
As enterprises globally have shifted more of their operations online, cyber adversaries have doubled down on the use of bots to automate and increase the scale of their attacks.

According to recent research from Enterprise Strategy Group, nearly half (47%) of cybersecurity professionals have seen examples of credential stuffing or cracking attacks used for account takeover in just the past 6 months. And 46% are aware of attacks on online shopping cart systems and instances of automated inventory purchasing or...
Virtual
Roundtable
Tuesday, December 14th, 2021
Anna Delaney
Mike Britton
Anna Delaney with Mike Britton
Virtual Roundtable
Supply Chain Attacks: Defending Against Vendor Email Compromise
Discussion topics will include:
Vendor email compromise (VEC) is a significant security threat to organizations. According to research from Abnormal Security, the percentage of companies who received a VEC attack increased 156% from July 2020 to June 2021, as threat actors increasingly see communications between vendors and customers as the weakest link.

It’s clear traditional email defenses were not designed to stop socially-engineered attacks. Without a new approach, high-profile attacks such as SolarWinds and Colonial Pipeline, will continue to cause severe financial losses and...
Virtual
Roundtable
Wednesday, December 15th, 2021
Anna Delaney
Steve Kinman
Anna Delaney with Steve Kinman
Virtual Roundtable
DevSecOps: Uncovering the Hidden (and Costly) Risks
Discussion topics will include:
Misconfigurations. Known unpatched vulnerabilities. Open source code. The great unknown that comes from cloud migration and cloud-native apps. These are among the application security risks facing enterprises of all sizes and sectors. And yet too many security leaders maintain an arm’s length distance away from DevSecOps, lacking visibility into the risks that could lead to breach.

At a time when even the White House is talking about increasing accountability for application security, security leaders must prioritize their understanding of DevSecOps...
Virtual
Roundtable
Wednesday, December 15th, 2021
Tom Field
Jacob Olcott
Tom Field with Jacob Olcott
Virtual Roundtable
Ransomware: How to Reduce Your Likelihood of Being a Victim
Discussion topics will include:
Colonial Pipeline. JBS meat processor. Scripps Health. The list of recent high-profile ransomware victims is long and growing. So are the costs to recover from these crimes.

But what if you could take preventive steps to reduce your likelihood of becoming a ransomware victim? BitSight recently analyzed hundreds of ransomware incidents to identify common security performance gaps and challenges that lead to successful ransomware incidents. One finding: Poor patching performance is a strong indicator of increased risk to ransomware. In...
Virtual
Roundtable
Tuesday, January 11th, 2022
Anna Delaney
Tom Davison
Anna Delaney with Tom Davison
Virtual Roundtable
From Endpoint to Cloud: Achieving Zero Trust for Enterprises
Discussion topics will include:
The global reliance on cloud-based infrastructure and services that are accessible from any device, has prompted security teams to rethink the way they protect their organizations. To support this new and agile way of working, security leaders need to be able to balance end-user privacy with security to protect users and corporate data from phishing, malware, and other threats. At the same time, too little freedom causes employee dissatisfaction, reduced agility and collaboration.

How can you enable employees to be...
Virtual
Roundtable
Wednesday, January 12th, 2022
Dan Gunderman
Patrick Pushor
Dan Gunderman with Patrick Pushor
Virtual Roundtable
Better Understanding Cloud Security Risks Through ‘Context’
Discussion topics will include:
In just a few years, cloud conversations have gone from theoretical to critical. And with migrations to the cloud ongoing, many enterprises have had to rethink their security approach. In these environments, some practitioners are charged with expending resources to mitigate “high-severity” CVEs – regardless of how a vulnerability may interact with that IT environment. This risk may pale in comparison, for example, to a malware occurrence at the edge that goes unchecked.

A potential lack of visibility into apps,...
Virtual
Roundtable
Thursday, January 13th, 2022
Anna Delaney
Chris Cochran
Anna Delaney with Chris Cochran
Virtual Roundtable
New Approaches to Asset Management in Cybersecurity
Discussion topics will include:
The proliferation of mobile and IoT devices adds a new, unprecedented degree of complexity that security teams are left scrambling to solve: How do you account for and secure these ephemeral devices when you often can’t even identify them in real-time?

Furthermore, traditional approaches to IT asset management have not scaled to the modern cloud deployment and leave us with limited visibility and gaps in our security coverage. A new approach is required.

Discussion topics will include:
How asset management...
Virtual
Roundtable
Tuesday, January 18th, 2022
Tom Field
Christopher Trollo
Tom Field with Christopher Trollo
Virtual Roundtable
Increase Operational Efficiency by Modernizing Your Security Operations
Discussion topics will include:
Too many endpoints. Too much data. Too little context for alerts about potential threats from insiders, criminals, and nation-states. These were all issues pre-COVID. And the pandemic-fueled accelerated transformation has only magnified them.

What are you doing today to streamline and modernize the efficiency of your security operations? How have your plans evolved throughout the pandemic, and what specifically do you intend to do in 2022? How will you address risk, the dearth of talent, and the ever evolving threat...
Virtual
Roundtable
Wednesday, January 19th, 2022
Anna Delaney
Chris Cochran
Anna Delaney with Chris Cochran
Virtual Roundtable
New Approaches to Asset Management in Cybersecurity
Discussion topics will include:
The proliferation of mobile and IoT devices adds a new, unprecedented degree of complexity that security teams are left scrambling to solve: How do you account for and secure these ephemeral devices when you often can’t even identify them in real-time?

Furthermore, traditional approaches to IT asset management have not scaled to the modern cloud deployment and leave us with limited visibility and gaps in our security coverage. A new approach is required.

Discussion topics will include:
How asset management...
Virtual
Roundtable
Wednesday, January 19th, 2022
Tom Field
Frank Walsh
Tom Field with Frank Walsh
Virtual Roundtable
Fraud Fighting 2022: How to Win the Battle Against Bots
Discussion topics will include:
As enterprises globally have shifted more of their operations online, cyber adversaries have doubled down on the use of bots to automate and increase the scale of their attacks.

According to recent research from Enterprise Strategy Group, nearly half (47%) of cybersecurity professionals have seen examples of credential stuffing or cracking attacks used for account takeover in just the past 6 months. And 46% are aware of attacks on online shopping cart systems and instances of automated inventory purchasing or...
Virtual
Roundtable
Tuesday, January 25th, 2022
Tom Field
Chris Wysopal
Tom Field with Chris Wysopal
Virtual Roundtable
Software Security: How to Prioritize, Measure and Convey It To the Board
Discussion topics will include:
Amidst the shifting threat landscape, cloud migration and ongoing digital transformation, software security is often low or even last on the list of priorities for security leaders to address.

Yet, with the recent executive order on cybersecurity, and as headlines continue to feature high-profile breaches, board members at organizations across all industries are taking notice. Even though there are often designated technical experts on boards, there is now an increased awareness around cybersecurity – especially software security – even among...
Virtual
Roundtable
Thursday, January 27th, 2022
Tom Field
Frank Walsh
Tom Field with Frank Walsh
Virtual Roundtable
Fraud Fighting 2022: How to Win the Battle Against Bots
Discussion topics will include:
As enterprises globally have shifted more of their operations online, cyber adversaries have doubled down on the use of bots to automate and increase the scale of their attacks.

According to recent research from Enterprise Strategy Group, nearly half (47%) of cybersecurity professionals have seen examples of credential stuffing or cracking attacks used for account takeover in just the past 6 months. And 46% are aware of attacks on online shopping cart systems and instances of automated inventory purchasing or...
Virtual
Roundtable
Tuesday, February 1st, 2022
Chris Cochran
Tom Field
Chris Cochran with Tom Field
Virtual Roundtable
New Approaches to Asset Management in Cybersecurity
Discussion topics will include:
The proliferation of mobile and IoT devices adds a new, unprecedented degree of complexity that security teams are left scrambling to solve: How do you account for and secure these ephemeral devices when you often can’t even identify them in real-time?

Furthermore, traditional approaches to IT asset management have not scaled to the modern cloud deployment and leave us with limited visibility and gaps in our security coverage. A new approach is required.

Discussion topics will include:
How asset management...
Virtual
Roundtable
Thursday, February 3rd, 2022
Mathew Schwartz
Kristina Elestedt-Jansson
Mathew Schwartz with Kristina Elestedt-Jansson
Virtual Roundtable
Strategies to Defend Your Multi & Hybrid Cloud Infrastructure
Discussion topics will include:
The ongoing need for digital transformation continues to drive more organizations into the cloud, bringing their apps and data with them. But managing the underlying infrastructure, working with different hyperscalers – large cloud and networking providers – as well as overseeing multiple private clouds, public clouds and edge environments remains a complex undertaking. One insecure API or server misconfiguration, and organizations risk being hit by criminal hackers and suffering long-term financial or reputational damage.

Join us for a limited seat,...
Virtual
Roundtable
Thursday, February 3rd, 2022
Anna Delaney
John Smith
Anna Delaney with John Smith
Virtual Roundtable
Best Practices to Bridge the Security and DevOps Gap
Discussion topics will include:
The rise of agile practices and DevOps has revolutionized software development. As a result, innovation is moving incredibly quickly - at a pace security teams cannot match. As more organizations shift testing processes "left", security teams often lack visibility into/at the development stage, making it easier for gaps to be missed. False positives, backlogs, lack of clear prioritization and misalignment within teams create friction between what are frequently siloed departments.

How can we break down those siloes between the people...
Virtual
Roundtable
Thursday, February 3rd, 2022
Dan Gunderman
Patrick Pushor
Dan Gunderman with Patrick Pushor
Virtual Roundtable
Better Understanding Cloud Security Risks Through ‘Context’
Discussion topics will include:
In just a few years, cloud conversations have gone from theoretical to critical. And with migrations to the cloud ongoing, many enterprises have had to rethink their security approach. In these environments, some practitioners are charged with expending resources to mitigate “high-severity” CVEs – regardless of how a vulnerability may interact with that IT environment. This risk may pale in comparison, for example, to a malware occurrence at the edge that goes unchecked.

A potential lack of visibility into apps,...
Virtual
Roundtable
Tuesday, February 8th, 2022
Tom Field
Chris Wysopal
Tom Field with Chris Wysopal
Virtual Roundtable
Software Security: How to Prioritize, Measure and Convey It To the Board
Discussion topics will include:
Amidst the shifting threat landscape, cloud migration and ongoing digital transformation, software security is often low or even last on the list of priorities for security leaders to address.

Yet, with the recent executive order on cybersecurity, and as headlines continue to feature high-profile breaches, board members at organizations across all industries are taking notice. Even though there are often designated technical experts on boards, there is now an increased awareness around cybersecurity – especially software security – even among...
Virtual
Roundtable
Wednesday, February 9th, 2022
Timothee Bardet
Nabil Bousselham
Timothee Bardet with Nabil Bousselham
Virtual Roundtable
Les meilleures pratiques pour combler le fossé entre sécurité et DevOps
Discussion topics will include:
L'essor des pratiques agiles et DevOps a révolutionné le développement des logiciels. En conséquence, l'innovation est presque trop rapide et les équipes de sécurité ne peuvent pas suivre. De plus en plus d'organisations adoptent des processus de développement pilotés par les tests, mais les équipes de sécurité manquent souvent de visibilité sur la phase de développement, ce qui aurait pu faciliter l'identification des lacunes. Les faux positifs, les dettes techniques, l'absence de priorités claires et le manque d’alignement au sein...
Virtual
Roundtable
Wednesday, February 16th, 2022
Chris Cochran
Tom Field
Chris Cochran with Tom Field
Virtual Roundtable
New Approaches to Asset Management in Cybersecurity
Discussion topics will include:
The proliferation of mobile and IoT devices adds a new, unprecedented degree of complexity that security teams are left scrambling to solve: How do you account for and secure these ephemeral devices when you often can’t even identify them in real-time?

Furthermore, traditional approaches to IT asset management have not scaled to the modern cloud deployment and leave us with limited visibility and gaps in our security coverage. A new approach is required.

Discussion topics will include:
How asset management...
TBD
In-Person
Roundtable
Wednesday, February 23rd, 2022
TBD
Tom Field
Chris Pierson
Tom Field with Chris Pierson
In-Person Roundtable
Executive Protection for Digital Lives – What CIOs and CISOs Need to Consider Beyond the Office
Discussion topics will include:
Senior leaders’ unified digital life mingling personal and professional data and devices has become the soft underbelly of corporate cybersecurity. Therefore, CEOs and their CISOs need to extend the defense perimeter and protect the entire digital lives of all executives and key personnel. Some statistics:

- 27% of executives have malware on their personal devices
- 20% of executives’ homes are digitally compromised
- 69% of executive’s personal passwords are on the Dark Web
- 75% have improper privacy and...
TBD
In-Person
Roundtable
Wednesday, March 2nd, 2022
TBD
Tom Field
Chris Pierson
Tom Field with Chris Pierson
In-Person Roundtable
Executive Protection for Digital Lives – What CIOs and CISOs Need to Consider Beyond the Office
Discussion topics will include:
Senior leaders’ unified digital life mingling personal and professional data and devices has become the soft underbelly of corporate cybersecurity. Therefore, CEOs and their CISOs need to extend the defense perimeter and protect the entire digital lives of all executives and key personnel. Some statistics:

- 27% of executives have malware on their personal devices
- 20% of executives’ homes are digitally compromised
- 69% of executive’s personal passwords are on the Dark Web
- 75% have improper privacy and...
Virtual
Roundtable
Wednesday, March 16th, 2022
Dan Gunderman
Patrick Pushor
Dan Gunderman with Patrick Pushor
Virtual Roundtable
Better Understanding Cloud Security Risks Through ‘Context’
Discussion topics will include:
In just a few years, cloud conversations have gone from theoretical to critical. And with migrations to the cloud ongoing, many enterprises have had to rethink their security approach. In these environments, some practitioners are charged with expending resources to mitigate “high-severity” CVEs – regardless of how a vulnerability may interact with that IT environment. This risk may pale in comparison, for example, to a malware occurrence at the edge that goes unchecked.

A potential lack of visibility into apps,...
TBD
In-Person
Roundtable
Thursday, March 17th, 2022
TBD
Anna Delaney
Jay Coley
Anna Delaney with Jay Coley
In-Person Roundtable
Web Application Firewalls: Maximising Control and Visibility
Discussion topics will include:
As organizations have shifted to online-focused business operations, expectations for the security of websites and apps are at an all-time high. Attackers, however, are constantly finding new vulnerabilities and attack vectors. Organizations deploy Web Application Firewalls to detect malicious web traffic aimed at their production apps and APIs.

Can you understand the intent of the attacks? Do you have real-time visibility and control? How can you reduce the noise of security products to focus on the most critical alerts?

Discussion...
TBD
In-Person
Roundtable
Thursday, March 31st, 2022
TBD
Tom Field
Chris Pierson
Tom Field with Chris Pierson
In-Person Roundtable
Executive Protection for Digital Lives – What CIOs and CISOs Need to Consider Beyond the Office
Discussion topics will include:
Senior leaders’ unified digital life mingling personal and professional data and devices has become the soft underbelly of corporate cybersecurity. Therefore, CEOs and their CISOs need to extend the defense perimeter and protect the entire digital lives of all executives and key personnel. Some statistics:

- 27% of executives have malware on their personal devices
- 20% of executives’ homes are digitally compromised
- 69% of executive’s personal passwords are on the Dark Web
- 75% have improper privacy and...
Past Roundtables
Virtual
Roundtable
Thursday, December 2nd, 2021
Dan Gunderman
Helen Patton
Dan Gunderman with Helen Patton
Virtual Roundtable
How Government Agencies Can Start Adopting ‘Zero Trust’ Right Now
Discussion topics will include:
In May, President Joe Biden signed an executive order compelling U.S. government departments and agencies to adopt several new cybersecurity practices, including deploying “zero trust” architectures designed to mitigate threats such as supply chain and ransomware attacks that have become an area of concern.

And while federal agencies are now compelled to deploy zero trust, how they get there within the tight timelines detailed in the executive order is less specific. It will require new thinking about how to deploy...
Virtual
Roundtable
Thursday, December 2nd, 2021
Tom Field
Dan Fabbri
Tom Field with Dan Fabbri
Virtual Roundtable
Designing the Next Generation of Zero Trust
Discussion topics will include:
Zero Trust: It has become one of the biggest – and most misunderstood – buzzwords in cybersecurity. The model encourages the implementation of strong controls, methods and protocols surrounding access to critical systems and data.

Yet, while Zero Trust is a popular way to enhance cybersecurity controls in the COVID era, it has its challenges and limitations. If the access granted through Zero Trust is not reviewed periodically, it could potentially lead to the creation of an “access creep” or...
Virtual
Roundtable
Thursday, December 2nd, 2021
Mathew Schwartz
Rachel Cook
Mathew Schwartz with Rachel Cook
Virtual Roundtable
Strategies to Defend Your Multi & Hybrid Cloud Infrastructure
Discussion topics will include:
The ongoing need for digital transformation continues to drive more organizations into the cloud, bringing their apps and data with them. But managing the underlying infrastructure, working with different hyperscalers – large cloud and networking providers – as well as overseeing multiple private clouds, public clouds and edge environments remains a complex undertaking. One insecure API or server misconfiguration, and organizations risk being hit by criminal hackers and suffering long-term financial or reputational damage.

Join us for a limited seat,...
Virtual
Roundtable
Thursday, December 2nd, 2021
Anna Delaney
Martin Lee
Anna Delaney with Martin Lee
Virtual Roundtable
A New Approach to Endpoint Security
Discussion topics will include:
Today’s antivirus solutions can identify and block many types of malware easily. But how confident are you that your endpoint protection is detecting more stealthy techniques, such as malicious content hiding inside a legitimate piece of software which is then distributed through the update mechanism? In order to keep up with the criminals, a new approach to endpoint security is required.

How can you deploy endpoint protection on every system, making sure that the detection is actually enabled? How can...
Virtual
Roundtable
Wednesday, December 1st, 2021
Tom Field
Partha Panda
Tom Field with Partha Panda
Virtual Roundtable
Modernizing the SOC: How High-Velocity Enterprises Must Evolve to Meet Today’s Business and IT Needs
Discussion topics will include:
Your company is a fast-moving disruptive force that’s changing your industry and leap frogging slow-moving incumbents. You recognize the value of speed and have embraced a cloud-first approach to your technology infrastructure.

But high-velocity companies need a modern security strategy that supports their aggressive ambitions, can scale with growth and doesn’t rely on an outdated security operations center or staffing it with a team of hard-to-find security experts.

Leap forward. Register for this executive roundtable to gain key insights about...
Virtual
Roundtable
Tuesday, November 30th, 2021
Deepak Daswani
María García Iñañez
Deepak Daswani with María García Iñañez
Virtual Roundtable
Pasos clave para la aplicación de Secure Access Service Edge (SASE)
Discussion topics will include:
Hoy en día, el mayor reto para los CISOs es asegurar todos los espacios de trabajo, ya sea una oficina en casa, una oficina tradicional, una sucursal ERP o una combinación de las tres. Entonces, ¿cómo proporcionar una "seguridad coherente" para cada espacio de trabajo? Ante la necesidad de simplificar unas soluciones de seguridad cada vez más complejas, las empresas están adoptando Secure Access Service Edge (SASE).

En este nuevo escenario, es necesario responder a múltiples preguntas que surgen de...
Virtual
Roundtable
Tuesday, November 30th, 2021
Suparna Goswami
Deepak Prasad
Suparna Goswami with Deepak Prasad
Virtual Roundtable
Putting Identity a Core to Your Zero Trust Journey
Discussion topics will include:
While all industries have undergone drastic change in the way they are operating in a hybrid model, the impact on regulated industries including the financial industry has been particularly high. The change has forged a new perimeter: identity, whether human or non-human. The risk now is from any endpoint, anywhere in the world, which could potentially gain access to your systems – whether on premise or in the cloud.

How can CISOs adapt and enable business agility without compromising security?...
Virtual
Roundtable
Wednesday, November 24th, 2021
Richard Archdecon
Georg Holzach
Richard Archdecon with Georg Holzach
Virtual Roundtable
Envisioning a Passwordless World
Discussion topics will include:
For almost all organizations, passwords are a necessary part of day-to-day work, but security leaders and CISOs know that passwords are the weak link in any security chain. Passwords are easily hacked or compromised by attackers, and trying to ensure that workers and employees follow basic cyber hygiene, including resetting passwords on a regular basis, is a nearly impossible task.

Organizations need a fresh approach, one that combines the best of how multifactor authentication works with technologies such as biometrics,...
Virtual
Roundtable
Wednesday, November 24th, 2021
Suparna Goswami
Sandeep Patil
Suparna Goswami with Sandeep Patil
Virtual Roundtable
Future-Proofing Security Operations: Innovations and Best Practice for Your Enterprise
Discussion topics will include:
Too many endpoints. Too much data and little context. While these were issues before the pandemic, post pandemic, these issues have further magnified. While cloud migration has been essential, it generates more data, making it all the more essential to make sense of these data. What has been the impact of these rapid business changes on security? Is there also an opportunity to completely modernize security operations?

What are you doing today to streamline and modernize the efficiency of your...
Virtual
Roundtable
Thursday, November 18th, 2021
Dan Gunderman
Dave Lewis
Dan Gunderman with Dave Lewis
Virtual Roundtable
The Security Debt Crisis – How to Catch Up on Past Due Patches and Neglected Risk
Discussion topics will include:
There is a common theme for many of the mega breaches of recent years – a neglect of basic cybersecurity hygiene that has resulted in a backlog of unpatched apps, misapplied configurations and overlooked tasks. This debt compounds over time and, as with financial debt can snowball to reach a point, where it becomes insurmountable. As organizations increasingly become cloud first, the risk profile from security debt further increases.

So, what can be done to claw back control of security...
Virtual
Roundtable
Thursday, November 18th, 2021
Tom Field
MK Palmore
Tom Field with MK Palmore
Virtual Roundtable
Combating the Modern Ransomware Threat
Discussion topics will include:
With threats growing in volume and sophistication, today’s ransomware attacks easily outpace many organizations’ defensive capabilities. Globally, enterprises of all sizes and sectors are being compromised and held hostage by ransomware, with many being forced to pay millions in ransom because they’re ill-equipped to combat their adversaries.

This trend intersects with the continued rise of digital business and represents a new magnitude of risk. It’s imperative, then, to understand your adversaries and re-examine your security posture so that you may...
Virtual
Roundtable
Thursday, November 18th, 2021
Timothée Bardet
Roger Sels
Timothée Bardet with Roger Sels
Virtual Roundtable
Comment sécuriser infrastructures IT et endpoints à l’heure de la mobilité ?
Discussion topics will include:
Cette année a été marquée par une explosion d’événements de sécurité et de cyber incidents majeurs, ainsi qu’une généralisation forcée la mobilité. Cela pose des questions et défis quotidiens pour les dirigeants IT. Non seulement les équipes de sécurité ont besoin de toujours plus de visibilité sur des endpoints et des réseaux en nombre et en complexité croissants, mais elles doivent également mieux analyser, prioriser et s’adapter aux menaces changeantes. En effet avec une augmentation de la surface d’attaque, l’explosion...
Virtual
Roundtable
Thursday, November 18th, 2021
Anna Delaney
Richard Archdecon
Anna Delaney with Richard Archdecon
Virtual Roundtable
Envisioning a Passwordless World
Discussion topics will include:
For almost all organizations, passwords are a necessary part of day-to-day work, but security leaders and CISOs know that passwords are the weak link in any security chain. Passwords are easily hacked or compromised by attackers, and trying to ensure that workers and employees follow basic cyber hygiene, including resetting passwords on a regular basis, is a nearly impossible task.

Organizations need a fresh approach, one that combines the best of how multifactor authentication works with technologies such as biometrics,...
Virtual
Roundtable
Wednesday, November 17th, 2021
Chris Wysopal
Jeremy Kirk
Chris Wysopal with Jeremy Kirk
Virtual Roundtable
Software Security: How to Prioritize, Measure and Convey It To the Board
Discussion topics will include:
Amidst the shifting threat landscape, cloud migration and ongoing digital transformation, software security is often low or even last on the list of priorities for security leaders to address.

Yet, with the recent executive order on cybersecurity, and as headlines continue to feature high-profile breaches, board members at organizations across all industries are taking notice. Even though there are often designated technical experts on boards, there is now an increased awareness around cybersecurity – especially software security – even among...
Virtual
Roundtable
Wednesday, November 17th, 2021
Tom Field
Ben Smith
Tom Field with Ben Smith
Virtual Roundtable
Operationalizing the MITRE ATT&CK Framework
Discussion topics will include:
Too many enterprises today are in a reactive, firefighting mode when it comes to incident response. The MITRE ATT&CK framework is gaining popularity as a structured way to approach vulnerabilities, threats and remediation. Yet a recent study showed that even though 82% of cybersecurity professionals are familiar with the MITRE ATT&CK framework, only 8% said they used it regularly. The challenge: How to operationalize the framework.

Register for this executive roundtable to gain key insights about putting MITRE ATT&CK to...
Virtual
Roundtable
Tuesday, November 16th, 2021
Mary Yang
Dan Gunderman
Mary Yang with Dan Gunderman
Virtual Roundtable
Securing Critical Infrastructure: What it Means for Your Organization
Discussion topics will include:
From SolarWinds to nation-state actors targeting vulnerable Exchange email servers to the ransomware attacks against Colonial Pipeline, the security of critical infrastructure has been at the forefront of nearly every cybersecurity conversation since the beginning of the year.

President Biden’s executive order also added to the discussion as the federal government is now poised to revamp its security posture to meet these new challenges.

But what do these changes mean for other private sector organizations? How will potential legislation such...
Virtual
Roundtable
Tuesday, November 16th, 2021
Tom Field
David Balcar
Tom Field with David Balcar
Virtual Roundtable
Business Risk: Which Attacks Can Shut You Down?
Discussion topics will include:
When it comes to cybersecurity in the manufacturing sector, there are generalized threats – phishing, account takeover, insider risk – that can be a nuisance, incur costs or even inflict reputational damage.

But then there are the serious threats – ransomware, supply-chain attacks, product or production tampering – that actually can shut down your business. The key is to be able to distinguish between the different categories of threats and focus most on the ones that can do the worst...
Virtual
Roundtable
Thursday, November 11th, 2021
Suparna Goswami
David Fairman
Suparna Goswami with David Fairman
Virtual Roundtable
Cloud Security: Building Defense using ‘Zero Trust’
Discussion topics will include:
Enterprises are increasingly relying on cloud-based infrastructure and services that are accessible from anywhere. With data no longer in an environment that can be controlled, security teams have been forced to rethink the way they protect their enterprises and their data.

Although there’s been a lot of discussion about zero trust strategies, not every organization has had the time or resource to fully explore what the model means for their security. At the same time, security leaders must grapple with...
Virtual
Roundtable
Wednesday, November 10th, 2021
Dan Gunderman
Jerome Ferrara
Dan Gunderman with Jerome Ferrara
Virtual Roundtable
State of Hybrid Work: Why Credential Management Still Matters
Discussion topics will include:
With hybrid and remote work likely to continue well into 2022, CISOs and their teams are continuing to find the best ways to secure the credentials of employees who are accessing applications and devices from a variety of locations. At the same time, workers need ready access to the resources while lines of business managers seek out ways to reduce friction to allow for the most productivity.

Organizations need a holistic approach to credential and password management. In addition to...
Virtual
Roundtable
Tuesday, November 9th, 2021
Tom Field
Kurt Roemer
Tom Field with Kurt Roemer
Virtual Roundtable
Disruptive Defense: How to Turn the Tables on Ransomware
Discussion topics will include:
The Kaseya VSA ransomware incident that impacted scores of MSPs and hundreds of enterprises globally is just the latest example: The world is being held hostage by ransomware adversaries who grow only bigger and bolder with each new success.

While essential practices somewhat stem the tide, resilience to ransomware requires much more than the latest patch or update. Disruptive innovation – past, present and future – is the theme of this discussion, where we will explore novel ransomware mitigations.

Discussion...
Virtual
Roundtable
Tuesday, November 9th, 2021
Riccardo Meggiato
Alessandro Dinia
Riccardo Meggiato with Alessandro Dinia
Virtual Roundtable
Gestione degli aggiornamenti per contrastare ransomware e minacce di nuova generazione
Discussion topics will include:
Continua ad aumentare il numero di nuove vulnerabilità scoperte, con oltre 18000 rese pubbliche solo lo scorso anno. Del resto, poche risorse e tempo limitato continuano a essere un problema, nella comunità della cybersecurity: cosa fare per risolverlo?

In particolare, come possiamo allineare i dati che abbiamo sulle vulnerabilità più critiche con le patch necessarie, per correggere almeno il 10% delle più pericolose?

Iscrivetevi a questo evento dedicato agli esperti del settore, che offre approfondimenti su come integrare informazioni sulle...
Virtual
Roundtable
Tuesday, November 9th, 2021
Anna Delaney
Chip Witt
Anna Delaney with Chip Witt
Virtual Roundtable
Throw Away the Key(logger): Strategies for Protecting Users from Malware
Discussion topics will include:
Despite your team’s best efforts to protect corporate systems from malware, users tend to click before thinking. At work, corporate security software may catch wind of an illegitimate download before it causes much damage. On personal devices, however, your employees have fewer layers of protection – and the same goes for consumers using your services.

Botnets can provide criminals with a complete picture of your users’ online activity, making it easy for them to impersonate victims and take over even...
Ruth's Chris Steak House
In-Person
Roundtable
Thursday, November 4th, 2021
Ruth's Chris Steak House
Tom Field
Chris Pierson
Tom Field with Chris Pierson
In-Person Roundtable
Executive Protection for Digital Lives – What CIOs and CISOs Need to Consider Beyond the Office
Discussion topics will include:
Senior leaders’ unified digital life mingling personal and professional data and devices has become the soft underbelly of corporate cybersecurity. Therefore, CEOs and their CISOs need to extend the defense perimeter and protect the entire digital lives of all executives and key personnel. Some statistics:

- 27% of executives have malware on their personal devices
- 20% of executives’ homes are digitally compromised
- 69% of executive’s personal passwords are on the Dark Web
- 75% have improper privacy and...
Virtual
Roundtable
Thursday, November 4th, 2021
Dan Gunderman
Dave Lewis
Dan Gunderman with Dave Lewis
Virtual Roundtable
The Security Debt Crisis – How to Catch Up on Past Due Patches and Neglected Risk
Discussion topics will include:
There is a common theme for many of the mega breaches of recent years – a neglect of basic cybersecurity hygiene that has resulted in a backlog of unpatched apps, misapplied configurations and overlooked tasks. This debt compounds over time and, as with financial debt can snowball to reach a point, where it becomes insurmountable. As organizations increasingly become cloud first, the risk profile from security debt further increases.

So, what can be done to claw back control of security...
Virtual
Roundtable
Wednesday, November 3rd, 2021
Kelvin Franklin
Dan Gunderman
Kelvin Franklin with Dan Gunderman
Virtual Roundtable
Reducing Ransomware Through Micro-Segmentation
Discussion topics will include:
Ransomware is one of the greatest challenges facing CISOs and their security teams today. Not only are these attacks complicated to deal with due to the types of crypto-locking malware that cybercriminal gangs wield, but recovering from this type of attack can be an expensive process thanks to the damage these incidents can inflict on an organization’s infrastructure.

Organizations require a fresh approach to combating ransomware to limit the ability of attackers to move laterally through the infrastructure and find...
Virtual
Roundtable
Wednesday, November 3rd, 2021
Anna Delaney
Shashi Prakash
Anna Delaney with Shashi Prakash
Virtual Roundtable
Why Protecting Your Internet Attack Surface Matters More Than Ever
Discussion topics will include:
As organizations continue to increase their presence online every year, their internet attack surface continues to grow while becoming ever more complex to protect. This not only includes fraudsters creating fake domains to impersonate legitimate websites, but also increases in typosquatting attacks, trademark infringement and vendor email compromise schemes, which are a growing area of concern for the FBI.

For CISOs and their teams, protecting against these types of attacks and fraud is an ever-growing concern, especially when much of...
Virtual
Roundtable
Tuesday, November 2nd, 2021
Aaron Cockerill
Tom Field
Aaron Cockerill with Tom Field
Virtual Roundtable
From Endpoint to Cloud: Achieving Zero Trust for Enterprises
Discussion topics will include:
The global reliance on cloud-based infrastructure and services that are accessible from any device, has prompted security teams to rethink the way they protect their organizations. To support this new and agile way of working, security leaders need to be able to balance end-user privacy with security to protect users and corporate data from phishing, malware, and other threats. At the same time, too little freedom causes employee dissatisfaction, reduced agility and collaboration.

How can you enable employees to be...
Virtual
Roundtable
Tuesday, November 2nd, 2021
Dan Gunderman
Jerome Ferrara
Dan Gunderman with Jerome Ferrara
Virtual Roundtable
State of Hybrid Work: Why Credential Management Still Matters
Discussion topics will include:
With hybrid and remote work likely to continue well into 2022, CISOs and their teams are continuing to find the best ways to secure the credentials of employees who are accessing applications and devices from a variety of locations. At the same time, workers need ready access to the resources while lines of business managers seek out ways to reduce friction to allow for the most productivity.

Organizations need a holistic approach to credential and password management. In addition to...
Virtual
Roundtable
Tuesday, November 2nd, 2021
Tony Morbin
Gwyndaf Davies
Tony Morbin with Gwyndaf Davies
Virtual Roundtable
What to do About Patch Management Overload
Discussion topics will include:
Newly discovered vulnerabilities continue to increase, with more than 18,000 published last year alone. Resources and limited time continue to be an issue amongst the Cyber Security Community, so what can be done to rectify this?

In particular, how do we align the most critical vulnerability data with the right patches to ensure we can, at least, get the top 10% addressed?

Discussion topics will include:
How you can integrate patch information and vulnerability data to improve your overall security...
Virtual
Roundtable
Thursday, October 28th, 2021
Tom Field
Partha Panda
Tom Field with Partha Panda
Virtual Roundtable
Modernizing the SOC: How High-Velocity Enterprises Must Evolve to Meet Today’s Business and IT Needs
Discussion topics will include:
Your company is a fast-moving disruptive force that’s changing your industry and leap frogging slow-moving incumbents. You recognize the value of speed and have embraced a cloud-first approach to your technology infrastructure.

But high-velocity companies need a modern security strategy that supports their aggressive ambitions, can scale with growth and doesn’t rely on an outdated security operations center or staffing it with a team of hard-to-find security experts.

Leap forward. Register for this executive roundtable to gain key insights about...
Virtual
Roundtable
Thursday, October 28th, 2021
Timothée Bardet
Jean-Sébastien Milliere
Timothée Bardet with Jean-Sébastien Milliere
Virtual Roundtable
Sécuriser le «travail hybride» avec votre infrastructure actuelle
Discussion topics will include:
L’année dernière ne restera pas seulement dans les mémoires comme l’année où les entreprises ont rapidement déplacé leurs applications en cloud et en SaaS pour assurer la continuité de leurs activités. Elle a également été marquée par une explosion d’événements de sécurité et de cyber incidents.

Alors que le mode de travail “à distance” est appelé à perdurer, comment assurer la sécurité de toutes les données et de tous les appareils de votre organisation, tout en tirant parti de votre...
Virtual
Roundtable
Thursday, October 28th, 2021
Anna Delaney
Martyna Lubińska
Anna Delaney with Martyna Lubińska
Virtual Roundtable
A New Game Plan to Combat Ransomware Attacks
Discussion topics will include:
We are in the midst of a ransomware pandemic. The list of victims is long and only growing – City of Liège, Maastricht University, Kaseya, Colonial Pipeline, to name a few. Whilst traditional antivirus and endpoint detection and response tools, along with user education, are part of the solution, they’re not always enough to prevent ransomware from infecting and spreading within organizations’ networks.

So how do we avoid being the next victim? What is being overlooked in our current defenses?...
Virtual
Roundtable
Wednesday, October 27th, 2021
Kelvin Franklin
Dan Gunderman
Kelvin Franklin with Dan Gunderman
Virtual Roundtable
Reducing Ransomware Through Micro-Segmentation
Discussion topics will include:
Ransomware is one of the greatest challenges facing CISOs and their security teams today. Not only are these attacks complicated to deal with due to the types of crypto-locking malware that cybercriminal gangs wield, but recovering from this type of attack can be an expensive process thanks to the damage these incidents can inflict on an organization’s infrastructure.

Organizations require a fresh approach to combating ransomware to limit the ability of attackers to move laterally through the infrastructure and find...
Virtual
Roundtable
Wednesday, October 27th, 2021
Tom Field
Matthew Goodwin
Tom Field with Matthew Goodwin
Virtual Roundtable
Marching Orders: Understanding and Meeting the Biden Administration’s New Cybersecurity Standards
Discussion topics will include:
First there was President Biden’s cybersecurity executive order. Then came his Industrial Control System Cybersecurity Initiative. And most recently we’ve seen a new package of supply chain and critical infrastructure security plans launched in conjunction with a White House summit, including the nation’s top technology, financial services and infrastructure leaders.

The sum of all these administrative actions: a renewed focus on critical infrastructure defense, supply chain security, DevSecOps and the zero-trust security model. As these initiatives trickle down from federal...
Virtual
Roundtable
Tuesday, October 26th, 2021
Dan Gunderman
Jerome Ferrara
Dan Gunderman with Jerome Ferrara
Virtual Roundtable
State of Hybrid Work: Why Credential Management Still Matters
Discussion topics will include:
With hybrid and remote work likely to continue well into 2022, CISOs and their teams are continuing to find the best ways to secure the credentials of employees who are accessing applications and devices from a variety of locations. At the same time, workers need ready access to the resources while lines of business managers seek out ways to reduce friction to allow for the most productivity.

Organizations need a holistic approach to credential and password management. In addition to...
Virtual
Roundtable
Tuesday, October 26th, 2021
Tom Kellermann
Tom Field
Tom Kellermann with Tom Field
Virtual Roundtable
Modern Bank Heists: What You Need to Know About the Latest Fraud Trends – and the Fraudsters
Discussion topics will include:
We are only halfway through 2021, but it’s already clear that financial fraud threats are trending far beyond traditional account takeover. Large banking institutions are no longer the only place where e-criminals can steal money. Any company that uses any type of online banking system (virtually 100% of companies) can be hacked via new routes including payment card fraud and synthetic IDs.

With so many emerging angles cybercriminals are taking, how do you ensure you have an omni-channel strategy to...
Virtual
Roundtable
Tuesday, October 26th, 2021
Anna Delaney
Martin Lee
Anna Delaney with Martin Lee
Virtual Roundtable
A New Approach to Endpoint Security
Discussion topics will include:
Today’s antivirus solutions can identify and block many types of malware easily. But how confident are you that your endpoint protection is detecting more stealthy techniques, such as malicious content hiding inside a legitimate piece of software which is then distributed through the update mechanism? In order to keep up with the criminals, a new approach to endpoint security is required.

How can you deploy endpoint protection on every system, making sure that the detection is actually enabled? How can...
Virtual
Roundtable
Thursday, October 21st, 2021
Timothée Bardet
Jean-Sébastien Milliere
Timothée Bardet with Jean-Sébastien Milliere
Virtual Roundtable
Quelles étapes clés pour mettre en place un SASE ?
Discussion topics will include:
Aujourd’hui, le plus grand défi pour les RSSI est de sécuriser tous les effectifs, qu’il s’agisse d’un bureau à domicile, d’une succursale traditionnelle, d’une succursale au sein d’un ERP ou d’une combinaison des trois. Comment dès lors fournir une “sécurité cohérente” pour chaque espace de travail ? Face à la nécessité de simplifier des solutions de sécurité de plus en plus complexes, les entreprises adoptent le service d’accès sécurisé Edge, ou SASE.

Quels sont les principaux facteurs qui empêchent les...
Virtual
Roundtable
Thursday, October 21st, 2021
Ivan Lai
Geetha Nandikotkur
Ivan Lai with Geetha Nandikotkur
Virtual Roundtable
Establishing a Risk-Based Approach to Authenticate and Authorize Identities
Discussion topics will include:
With Identity as the new perimeter and the distributed workforce using multiple devices during the pandemic, enterprises aspire to a well-orchestrated technology and tool that could offer well-defined authentication and authorization to secure user identities.

As a CISO, have you witnessed increased operational risks and security challenges in supporting your remote workforce? Are you able to provide the right user access, authentication, and control to the users accessing through multiple devices? Are you able to assess and adjust risk parameters...
Virtual
Roundtable
Wednesday, October 20th, 2021
Dan Gunderman
Wolf Goerlich
Dan Gunderman with Wolf Goerlich
Virtual Roundtable
Envisioning a Passwordless World
Discussion topics will include:
For almost all organizations, passwords are a necessary part of day-to-day work, but security leaders and CISOs know that passwords are the weak link in any security chain. Passwords are easily hacked or compromised by attackers, and trying to ensure that workers and employees follow basic cyber hygiene, including resetting passwords on a regular basis, is a nearly impossible task.

Organizations need a fresh approach, one that combines the best of how multifactor authentication works with technologies such as biometrics,...
Virtual
Roundtable
Wednesday, October 20th, 2021
Martyna Lubińska
Tom Field
Martyna Lubińska with Tom Field
Virtual Roundtable
Marching Orders: Understanding and Meeting the Biden Administration’s New Cybersecurity Standards
Discussion topics will include:
First there was President Biden’s cybersecurity executive order. Then came his Industrial Control System Cybersecurity Initiative. And most recently we’ve seen a new package of supply chain and critical infrastructure security plans launched in conjunction with a White House summit, including the nation’s top technology, financial services and infrastructure leaders.

The sum of all these administrative actions: a renewed focus on critical infrastructure defense, supply chain security, DevSecOps and the zero-trust security model. As these initiatives trickle down from federal...
Virtual
Roundtable
Wednesday, October 20th, 2021
Anna Delaney
Tom Davison
Anna Delaney with Tom Davison
Virtual Roundtable
How to Secure Remote Access: From Endpoint to Cloud
Discussion topics will include:
Cloud applications such as Office 365, Salesforce.com, ServiceNow, SAP, and others have become vital for any organization to operate and remain productive.

Compound this with managing corporate and mobile devices in a world where the network perimeter is being eroded and you have a real challenge on your hands.

Security professionals need a way to securely enable cloud access while maintaining visibility, control, and protecting corporate data. However, as the SolarWinds supply chain attacks recently illustrated, relying on native controls...
Virtual
Roundtable
Wednesday, October 20th, 2021
Anna Delaney
Richard Archdecon
Anna Delaney with Richard Archdecon
Virtual Roundtable
The Security Debt Crisis – How to Catch Up on Past Due Patches and Neglected Risk
Discussion topics will include:
There is a common theme for many of the mega breaches of recent years – a neglect of basic cybersecurity hygiene that has resulted in a backlog of unpatched apps, misapplied configurations and overlooked tasks. This debt compounds over time and, as with financial debt can snowball to reach a point, where it becomes insurmountable. As organizations become increasingly cloud first, the risk profile from security debt further increases.

So, what can be done to claw back control of security...
Vic & Anthony's Steakhouse
In-Person
Roundtable
Tuesday, October 19th, 2021
Vic & Anthony's Steakhouse
Tom Field
John Nowotny
Tom Field with John Nowotny
In-Person Roundtable
Why Security Programs Fail and What Can Be Done to Improve Cybersecurity
Discussion topics will include:
Each year, organizations spend billions on their security operations centers or security programs and sustain data breaches despite the investments they’ve made.

One study found that during the first three quarters of 2020, the total number of reported data breaches for the year was already approaching 3,000 and 36 billion records had been exposed.

These numbers show the failure of security programs to keep up with the threats that organizations are facing – and this will remain so as long...
Virtual
Roundtable
Tuesday, October 19th, 2021
Anna Delaney
Shashi Prakash
Anna Delaney with Shashi Prakash
Virtual Roundtable
Why Protecting Your Internet Attack Surface Matters More Than Ever
Discussion topics will include:
As organizations continue to increase their presence online every year, their internet attack surface continues to grow while becoming ever more complex to protect. This not only includes fraudsters creating fake domains to impersonate legitimate websites, but also increases in typosquatting attacks, trademark infringement and vendor email compromise schemes, which are a growing area of concern for the FBI.

For CISOs and their teams, protecting against these types of attacks and fraud is an ever-growing concern, especially when much of...
Virtual
Roundtable
Thursday, October 14th, 2021
Tom Field
Chip Witt
Tom Field with Chip Witt
Virtual Roundtable
Throw Away the Key(logger): Strategies for Protecting Users from Malware
Discussion topics will include:
Despite your team’s best efforts to protect corporate systems from malware, users tend to click before thinking. At work, corporate security software may catch wind of an illegitimate download before it causes much damage. On personal devices, however, your employees have fewer layers of protection – and the same goes for consumers using your services.

Botnets can provide criminals with a complete picture of your users’ online activity, making it easy for them to impersonate victims and take over even...
Virtual
Roundtable
Thursday, October 14th, 2021
Anna Delaney
Chris Finan
Anna Delaney with Chris Finan
Virtual Roundtable
MDR: Cybersecurity Essentials to Beat Ransomware
Discussion topics will include:
Ransomware cybercriminals are becoming increasingly sophisticated and organized, using techniques such as double and triple extortion, targeting vital infrastructure and teaming up with affiliate groups.

With the diversity and complexity of threats on the rise too, security teams find themselves drowning in data and overwhelmed by the immense volume of alerts, many of them false positives. How can organizations cut through the noise and accelerate incident detection and response times?

Register for this executive roundtable for new insights and discussion...
Virtual
Roundtable
Tuesday, October 12th, 2021
Tom Field
Victor Danevich
Tom Field with Victor Danevich
Virtual Roundtable
Defining and Securing Your 'Protect Surface'
Discussion topics will include:
The ‘Protect Surface’, coined by John Kindervag, is elemental to executing a Zero Trust strategy – the idea is that instead of trying to protect the entire attack surface which now extends throughout the Internet, identify your key assets and make sure they are segmented within a small protected area with strong authentication access rules and controls, such as:
Segmentation Gateway as a Next-Gen Firewall
Access Enforcement at the Gateway
Applying Multi-Factor Authentication

The enemy of securing the Protect Surface?...
Virtual
Roundtable
Tuesday, October 12th, 2021
Anna Delaney
Martyna Lubińska
Anna Delaney with Martyna Lubińska
Virtual Roundtable
Adopting the Attacker's Mindset to Protect The Hybrid Workforce
Discussion topics will include:
Our new hybrid workforce is an established reality and attackers no longer need to execute direct attacks, instead, they can now leverage the supply chain in order to accelerate and distribute.

What new tactics are criminals employing and how are they distributing attacks to take advantage of the hybrid model? What is being overlooked in our current defences? How are the attackers succeeding despite our defences?

Register for this executive roundtable for new insights and discussion about:
Defence strategies that...
Virtual
Roundtable
Thursday, October 7th, 2021
Aaron Cockerill
Scott Ferguson
Aaron Cockerill with Scott Ferguson
Virtual Roundtable
Throw Away the Key(logger): Strategies for Protecting Users from Malware
Discussion topics will include:
Despite your team’s best efforts to protect corporate systems from malware, users tend to click before thinking. At work, corporate security software may catch wind of an illegitimate download before it causes much damage. On personal devices, however, your employees have fewer layers of protection – and the same goes for consumers using your services.

Botnets can provide criminals with a complete picture of your users’ online activity, making it easy for them to impersonate victims and take over even...
Virtual
Roundtable
Wednesday, October 6th, 2021
Tom Field
Chris Pierson
Tom Field with Chris Pierson
Virtual Roundtable
ISMG Virtual Roundtable Discussion: US Finance
Discussion topics will include:
Senior leaders’ unified digital life mingling personal and professional data and devices has become the soft underbelly of corporate cybersecurity. Therefore, CEOs and their CISOs need to extend the defense perimeter and protect the entire digital lives of all executives and key personnel. Some statistics:

27% of executives have malware on their personal devices
20% of executives’ homes are digitally compromised
69% of executive’s personal passwords are on the Dark Web
75% have improper privacy and security settings on their...
Virtual
Roundtable
Tuesday, October 5th, 2021
Tom Field
Dawn Cappelli
Tom Field with Dawn Cappelli
Virtual Roundtable
ISMG Virtual Roundtable Discussion: US Infrastructure
Discussion topics will include:
First there was President Biden’s cybersecurity executive order. Then came his Industrial Control System Cybersecurity Initiative. And most recently we’ve seen a new package of supply chain and critical infrastructure security plans launched in conjunction with a White House summit including the nation’s top technology, financial services and infrastructure leaders.

The sum of all these administrative actions: a renewed focus on critical infrastructure defense, supply chain security, DevSecOps and the zero-trust security model. As these initiatives trickle down from federal...
Virtual
Roundtable
Tuesday, October 5th, 2021
Anna Delaney
Nuno Almeida Silva
Anna Delaney with Nuno Almeida Silva
Virtual Roundtable
ISMG Virtual Roundtable Discussion: EMEA Finance
Discussion topics will include:
The Digital Operational Resilience Act (DORA) will soon become reality in the European Union. This new EU Regulation will create a comprehensive and cross-sectional digital operational resilience framework across the EU-27 and its rules will apply for all regulated financial institutions. Compliance also includes the UK, despite Brexit.

Banks, fintech companies, insurance firms, and fund and wealth management companies will most likely be subject to deeper scrutiny and change in their processes. This will involve taking their cyber risk strategies...
Virtual
Roundtable
Thursday, September 30th, 2021
Aaron Cockerill
Tom Field
Aaron Cockerill with Tom Field
Virtual Roundtable
ISMG Virtual Roundtable Discussion: PacNW
Discussion topics will include:
The global reliance on cloud-based infrastructure and services that are accessible from any device, has prompted security teams to rethink the way they protect their organizations. To support this new and agile way of working, security leaders need to be able to balance end-user privacy with security to protect users and corporate data from phishing, malware, and other threats. At the same time, too little freedom causes employee dissatisfaction, reduced agility and collaboration.

How can you enable employees to be...
Virtual
Roundtable
Thursday, September 30th, 2021
Scott Ferguson
Wayne Lewandowski
Scott Ferguson with Wayne Lewandowski
Virtual Roundtable
ISMG Virtual Roundtable Discussion: S. Central US
Discussion topics will include:
For many organizations, digital transformation starts with adopting a cloud infrastructure or IaaS platform to support moving many of the basics a modern enterprise needs – such as compute, storage and networking – away from the data center. This helps save time and resources and allows an organization to focus on innovation.

Now, organizations are looking to invest more in other cloud-based services, such as SaaS applications to support hybrid work or various PaaS offerings that cloud service providers have...
Virtual
Roundtable
Thursday, September 30th, 2021
Anna Delaney
Richard Archdecon
Anna Delaney with Richard Archdecon
Virtual Roundtable
ISMG Virtual Roundtable Discussion: EMEA
Discussion topics will include:
There is a common theme for many of the mega breaches of recent years – a neglect of basic cybersecurity hygiene that has resulted in a backlog of unpatched apps, misapplied configurations and overlooked tasks. This debt compounds over time and, as with financial debt can snowball to reach a point, where it becomes insurmountable. As organizations become increasingly cloud first, the risk profile from security debt further increases.

So, what can be done to claw back control of security...
Virtual
Roundtable
Wednesday, September 29th, 2021
Tom Field
Rick McElroy
Tom Field with Rick McElroy
Virtual Roundtable
ISMG Virtual Roundtable Discussion: US Healthcare
Discussion topics will include:
There has never been such a year for healthcare. Since the advent of the COVID-19 pandemic, healthcare entities globally have embraced cloud platforms and digital technologies to deliver telehealth products years ahead of schedule. “Healthcare from anywhere” is the new norm. The patient experience is the new competitive differentiator. And healthcare – more than ever before – is square in the adversaries’ crosshairs.

How has the healthcare attack surface shifted in the past year? What have cybersecurity leaders learned about...
Virtual
Roundtable
Wednesday, September 29th, 2021
Aaron Cockerill
Scott Ferguson
Aaron Cockerill with Scott Ferguson
Virtual Roundtable
ISMG Virtual Roundtable Discussion: Northeast US
Discussion topics will include:
The global reliance on cloud-based infrastructure and services that are accessible from any device, has prompted security teams to rethink the way they protect their organizations. To support this new and agile way of working, security leaders need to be able to balance end-user privacy with security to protect users and corporate data from phishing, malware, and other threats. At the same time, too little freedom causes employee dissatisfaction, reduced agility and collaboration.

How can you enable employees to be...
Virtual
Roundtable
Wednesday, September 29th, 2021
Timothee Bardet
Jean-Sébastien Milliere
Timothee Bardet with Jean-Sébastien Milliere
Virtual Roundtable
Table Ronde Virtuelle France d'ISMG
Discussion topics will include:
L’année dernière ne restera pas seulement dans les mémoires comme l’année où les entreprises ont rapidement déplacé leurs applications en cloud et en SaaS pour assurer la continuité de leurs activités. Elle a également été marquée par une explosion d’événements de sécurité et de cyber incidents.

Alors que le mode de travail “à distance” est appelé à perdurer, comment assurer la sécurité de toutes les données et de tous les appareils de votre organisation, tout en tirant parti de votre...
Virtual
Roundtable
Tuesday, September 28th, 2021
Tom Field
Jeremy Snyder
Tom Field with Jeremy Snyder
Virtual Roundtable
ISMG Virtual Roundtable Discussion: UKI
Discussion topics will include:
The hybrid way of working is an established reality and one which has opened up a host of opportunities for criminals. Attackers no longer need to execute direct attacks, using attack vectors targeted straight at systems or at individuals. They can now take advantage of the supply chain in order to spread out the attacks elsewhere. In this new reality, you have to think like the attacker to avoid being the next victim.

What new tactics are criminals employing and...
Virtual
Roundtable
Tuesday, September 28th, 2021
Tom Field
Jeremy Snyder
Tom Field with Jeremy Snyder
Virtual Roundtable
ISMG Executive Roundtable Discussion: Nordics
Discussion topics will include:
Whether by circumstance or design, your enterprise has shifted some infrastructure and/or services to the cloud, and you’re planning even more migration in 2022. It takes a different mindset and skills to secure cloud environments vs. on-premise. But how do you develop a working roadmap for secure cloud migration? How do you know where you’re beginning and where you should go next?

Register for this executive roundtable to gain key insights about secure cloud migration and to discuss with your...

Information Security Media Group Brands

ISMG’s 30 global media properties provide security professionals with industry and geo-specific news, research and educational events.