Answering The Big Questions About SASE and Zero Trust
Solving the Skills Gap with Managed Services
Zero Trust for the Midsized Enterprise: 'What's Possible?'
Cybersecurity Frameworks: What You Need to Know to Stay Secure
How Can Business Infrastructure Become More Resilient and Trusted?
OT Security: Adapting to Evolving Threat and Business Landscapes
Securing Your Cyber-Physical Landscape
The Economics of Cybercrime and Measuring the Ripple Effect of the Breach
Make Your Endpoint Security Effortless With AI-Driven Automation
The New Shift Left: Cultivate Developer Security Adoption
The State of Managed Services 2023: What a SMB Needs in a Partner
The Challenges of Digital Trust in Business Transformation
The State of Managed Services 2023: What a SMB Needs in a Partner
5 Critical Considerations for DDoS Mitigation
Combating the Modern Ransomware Threat
State of Data Security: The Human Impact of Cybercrime
Accelerate Your Cloud Migration Strategy to Modernize Applications
Cloud Migration: What is Good Security?
Account Verification: How to Read 'Digital Body Language'
Securing Applications and APIs in Multicloud Environments
OT Security: Adapting to Evolving Threat and Business Landscapes
The New Shift Left: Cultivate Developer Security Adoption
Leveraging Automation for an Effective EDR Strategy
An Effective Approach to Vulnerability Management in 2023
State of Data Security: The Human Impact of Cybercrime
The State of Managed Services 2023: What a SMB Needs in a Partner
Strategies to Combat MFA Fatigue Attacks
Advancing Threat Intel to Learn the Adversary's Next Move
How Prepared Are You for the Next Log4j?
An Integrated Approach to Embedding Security into DevOps to Establish a Secure Software Development
How to Quantify Cybersecurity Exposure as Business Risk
Financial Services: Securing Applications and APIs in Multicloud Environments
Applying Zero Trust in a Hybrid Cloud Environment
How to Quantify Cybersecurity Exposure as Business Risk
Answering the Big Questions About SASE and Zero Trust
Attack Intelligence: How to Operationalize Timely, Relevant, Actionable Info
State of Data Security: The Human Impact of Cybercrime
BEC & Ransomware: Two Sides of the Same Cybercrime Coin
Better Understanding Cloud Security Risks Through ‘Context’
Drive Accountability with Cyber Risk Governance
Achieving the Benefits of Converged Endpoint Management
Email Security: Changing the Game Against Game-Changing Attacks?
Fraud Fighting 2023: How to Win the Battle Against Bots
From Prevention to Reality: Building a Cyber Resilient Organization
Combating the Modern Ransomware Threat
Securing Applications and APIs in Multicloud Environments
How Prepared Are You for the Next Log4j?
How to Quantify Cybersecurity Exposure as Business Risk
Accelerate Your Cloud Migration Strategy to Modernize Applications
An Effective Approach to Vulnerability Management in 2023
An Integrated Approach to Embedding Security into DevOps to Establish a Secure Software Development
Answering the Big Questions About SASE and Zero Trust
Advancing Threat Intel to Learn the Adversary's Next Move
Combating the Modern Ransomware Threat
Applying Zero Trust in a Hybrid Cloud Environment
Securing Applications and APIs in Multicloud Environments
Attack Intelligence: How to Operationalize Timely, Relevant, Actionable Info
How Prepared Are You for the Next Log4j?
BEC & Ransomware: Two Sides of the Same Cybercrime Coin
How to Quantify Cybersecurity Exposure as Business Risk
Better Understanding Cloud Security Risks Through ‘Context’
Drive Accountability with Cyber Risk Governance
Email Security: Changing the Game Against Game-Changing Attacks?
Fraud Fighting 2023: How to Win the Battle Against Bots
From Prevention to Reality: Building a Cyber Resilient Organization
Accelerate Your Cloud Migration Strategy to Modernize Applications
An Effective Approach to Vulnerability Management in 2023
Combating the Modern Ransomware Threat
An Integrated Approach to Embedding Security into DevOps to Establish a Secure Software Development
Securing Applications and APIs in Multicloud Environments
Answering the Big Questions About SASE and Zero Trust
How Prepared Are You for the Next Log4j?
How to Quantify Cybersecurity Exposure as Business Risk
Upcoming Roundtables
Virtual
Roundtable
Tuesday, February 7th, 2023
Suparna Goswami
Sid Deshpande
Suparna Goswami with Sid Deshpande
Virtual Roundtable
Answering The Big Questions About SASE and Zero Trust
Discussion topics will include:
Digital business, cloud adoption and a hybrid workforce require security and networking approaches to transform in order to accelerate business growth. The SASE (secure access service edge) model enables this transformation by leveraging the power of the public cloud to simultaneously improve security and user experience. A well architected SASE approach can help organizations accelerate their digital journey by consistently applying zero trust policies for all users, applications and devices, no matter where they may be located.

Gartner forecasts that...
In
Person Roundtable
The Dylan, Amsterdam
Tuesday, February 7th, 2023
The Dylan, Amsterdam
Anna Delaney
John Schaap
Anna Delaney with John Schaap
In Person Roundtable
Solving the Skills Gap with Managed Services
Discussion topics will include:
Being prepared to respond to today's security incidents means acquiring and maintaining both the tools and the expertise to successfully detect attacks and stop them before serious damage is done. However, with the diversity and complexity of threats on the rise, security teams find themselves drowning in data and overwhelmed by the immense volume of alerts, many of them false positives.

With a shortage of 4 million cybersecurity workers globally and 75% of SMBs saying they lack the personnel to...
Virtual
Roundtable
Tuesday, February 7th, 2023
Tom  Field
Michael  Kaunitz
Tom Field with Michael Kaunitz
Virtual Roundtable
Zero Trust for the Midsized Enterprise: 'What's Possible?'
Discussion topics will include:
It's been three years now since zero trust exploded from being just an RSA Conference buzz phrase to becoming the framework of choice for extended enterprises globally. Zero trust is a strategic topic for security leaders, investors and vendors alike, and President Biden even made the framework a cornerstone of his 2021 cybersecurity executive order.

But what does zero trust mean to the midsized enterprise? Where does one begin to embrace the framework, what does the roadmap look like, and...
Virtual
Roundtable
Wednesday, February 8th, 2023
Chris McKie
Tom Field
Chris McKie with Tom Field
Virtual Roundtable
Cybersecurity Frameworks: What You Need to Know to Stay Secure
Discussion topics will include:
Implementing a cybersecurity framework (CSF) reduces risk and improves cyber resilience, but with so many different frameworks to choose from, the challenge for many is understanding how to leverage a CSF for your unique needs.

Join our virtual roundtable on February 8 to discuss what you need to know about CSFs to stay secure.

Discussion topics will include:
An overview of the leading CSF types, including NIST, ISO 27001, COBIT, CIS, Essential 8 and Zero Trust.
How to incorporate a...
In-Person
Roundtable
Sydney, Australia
Thursday, February 9th, 2023
Sydney, Australia
Peter  Stephan
Manuel  Salazar
Peter Stephan with Manuel Salazar
In-Person Roundtable
How Can Business Infrastructure Become More Resilient and Trusted?
Discussion topics will include:
Amidst an intensifying threat landscape, it’s imperative that organizations become more cyber resilient. Security executives and CISOs are looking to achieve security resilience as a means to achieving an effective cybersecurity and risk management posture. A key component of that is access to applications and services.

Enterprises must now accommodate a hybrid work environment where employees are working from anywhere while accessing internal applications. As the traditional network perimeter has dissolved, enterprises need to ensure that those coming into the...
Virtual
Roundtable
Tuesday, February 14th, 2023
Tom Field
Mike Utsal
Tom Field with Mike Utsal
Virtual Roundtable
OT Security: Adapting to Evolving Threat and Business Landscapes
Discussion topics will include:
Through accelerated digital transformation and hybrid work, our critical infrastructure is at risk like never before. And while attacks impacting cyber-physical systems long have been a growing concern, they are now more likely than ever.

Many of these legacy systems were not designed to co-exist seamlessly in a connected environment. And it will take years before a new generation of connected assets emerges with more natively integrated security processes. In the meantime, how do we introduce cybersecurity capabilities that are...
Virtual
Roundtable
Thursday, February 16th, 2023
Suparna Goswami
Leon  Poggioli
Suparna Goswami with Leon Poggioli
Virtual Roundtable
Securing Your Cyber-Physical Landscape
Discussion topics will include:
Accelerated digital transformation has heightened the risk of cyberattacks on critical infrastructure. Many of these legacy systems have not been designed to coexist seamlessly in a connected environment. Security upgrades are often installed in a piecemeal manner since the systems are complex. Moreover, visibility is poor across multiple systems and isolated environments. Digital evolution will take years before a new generation of connected assets emerges with more natively integrated security processes. In the meantime, how do we introduce cybersecurity capabilities...
In-Person
Roundtable
Morton's Steakhouse, Chicago
Thursday, February 16th, 2023
Morton's Steakhouse, Chicago
Steven Baer
Tom Field
Steven Baer with Tom Field
In-Person Roundtable
The Economics of Cybercrime and Measuring the Ripple Effect of the Breach
Discussion topics will include:
Ransomware attackers earned an estimated $465 million in profit in 2021 - up 33% from 2020. Meanwhile, the meantime between intrusion and detection - dwell time - was measured at an unsettling 56 days.

Oh, and meanwhile: There were roughly 3.5 million unfilled cybersecurity jobs by the end of 2021, and 82% of surveyed organizations reported a shortage of cybersecurity skills.

These numbers deliver two messages: It is economically rational for attackers to keep attacking, and skills-strapped enterprises increasingly need...
Virtual
Roundtable
Tuesday, February 21st, 2023
Suparna Goswami
Serge Woon
Suparna Goswami with Serge Woon
Virtual Roundtable
Make Your Endpoint Security Effortless With AI-Driven Automation
Discussion topics will include:
Organizations face more than 150 million new malware samples every year. Given the severity, it is challenging for any signature-based company to keep a track of new signatures and update on the latest threats. Moreover, zero day exploits continue to be a problem for security practitioners. With a shortage of human resources to deal with increasing amounts of data, there will be a tipping point for human analysts. The questions that arise are: how to quickly ascertain what is vulnerable,...
Virtual
Roundtable
Thursday, February 23rd, 2023
Clinton Herget
Anna Delaney
Clinton Herget with Anna Delaney
Virtual Roundtable
The New Shift Left: Cultivate Developer Security Adoption
Discussion topics will include:
Application security programs have undergone major changes in recent years to adapt to the evolution brought by agile development, DevOps pipelines and faster deployments. New DevSecOps models result in a significant security ownership shift to the development teams. But for development teams to truly take responsibility for security, they need to embrace and adopt the new security practices.

What are the organizational, process and tooling challenges that need to be overcome to support this new shift left?

Discussion topics will...
In-Person
Roundtable
Morton's The Steakhouse - New York
Thursday, February 23rd, 2023
Morton's The Steakhouse - New York
Tom  Field
Jason  Manar
Tom Field with Jason Manar
In-Person Roundtable
The State of Managed Services 2023: What a SMB Needs in a Partner
Discussion topics will include:
Sixty percent of surveyed small-to-midsized businesses say they could be hit by a successful ransomware attack in the next year, and almost three-quarters of them say such a strike might prove to be a deathblow to their organization.

Such is the state of cybersecurity with SMB, where nearly one-third of survey respondents dealt with phishing and viruses in the past year, and 40 percent say they plan to increase cybersecurity spending. Further, one-third of respondents say they are unhappy with...
In
Person Roundtable
Searcy's - The Gherkin
Tuesday, February 28th, 2023
Searcy's - The Gherkin
Anna Delaney
Emma Gray
Anna Delaney with Emma Gray
In Person Roundtable
The Challenges of Digital Trust in Business Transformation
Discussion topics will include:
Digital transformation has created a wealth of opportunities: cloud migration, smart devices, automation, IT/OT-IoT convergence, and third-party infrastructure integration. But it has also brought with it vulnerabilities inherent in legacy technology, the disconnect of OT, supply chain compromise, an enlarged attack surface and increased attention from nation-state and criminal adversaries who seek to disrupt operations or steal intellectual property.

Today's CISOs need to focus on these new vulnerabilities and risks. However, as uncertain economic times prevail, the necessity for strong...
In-Person
Roundtable
Steak 48 - Houston
Thursday, March 2nd, 2023
Steak 48 - Houston
Tom  Field
Mike DePalma
Tom Field with Mike DePalma
In-Person Roundtable
The State of Managed Services 2023: What a SMB Needs in a Partner
Discussion topics will include:
Sixty percent of surveyed small-to-midsized businesses say they could be hit by a successful ransomware attack in the next year, and almost three-quarters of them say such a strike might prove to be a deathblow to their organization.

Such is the state of cybersecurity with SMB, where nearly one-third of survey respondents dealt with phishing and viruses in the past year, and 40 percent say they plan to increase cybersecurity spending. Further, one-third of respondents say they are unhappy with...
Virtual
Roundtable
Tuesday, March 7th, 2023
Tom Field
Tom Field
Virtual Roundtable
5 Critical Considerations for DDoS Mitigation
Discussion topics will include:
Last June, Cloudflare detected what at the time was the largest distributed denial of service attack on record - 26 million requests per second. Since then, that record has been crushed, and adversaries continue to leverage DDoS attacks for distraction, destruction and as companions to ransomware campaigns.

What are the top trends in both application-layer and network-layer DDoS attacks? What are the ransom attack trends? What are the five critical considerations for mitigating modern DDoS attacks?

Join this session, 5...
Virtual
Roundtable
Wednesday, March 8th, 2023
Anna Delaney
Anna Delaney
Virtual Roundtable
Combating the Modern Ransomware Threat
Discussion topics will include:
With threats growing in volume and sophistication, today’s ransomware attacks easily outpace many organizations’ defensive capabilities. Globally, enterprises of all sizes and sectors are being compromised and held hostage by ransomware, with many being forced to pay millions in ransom because they’re ill-equipped to combat their adversaries.

This trend intersects with the continued rise of digital business and represents a new magnitude of risk. It’s imperative, then, to understand your adversaries and re-examine your security posture so that you may...
Virtual
Roundtable
Wednesday, March 8th, 2023
Tom Field
John Murphy
Tom Field with John Murphy
Virtual Roundtable
State of Data Security: The Human Impact of Cybercrime
Discussion topics will include:
Over one-third of organizations had a leadership change in the last year due to a cyberattack and its follow-on response.

That’s one of the several alarming findings from Rubrik Zero Labs’s inaugural report, “The State of Data Security: The Human Impact of Cybercrime,” which examines how the constant threat of cyber attacks is affecting organizations and the people charged with protecting them.

In this roundtable, we will discuss the findings from the in-depth global study commissioned by Rubrik and conducted...
Virtual
Roundtable
Thursday, March 9th, 2023
Geetha Nandikotkur
Geetha Nandikotkur
Virtual Roundtable
Accelerate Your Cloud Migration Strategy to Modernize Applications
Discussion topics will include:
The interest in multi-cloud adoption has shown an upward trend as C-level executives take deployment decisions. To stay competitive, companies are now modernizing applications across the board.

While multi-cloud architecture has become the new reality of corporate IT, it presents a new set of challenges to achieve the agility and scalability needed to keep up with the pace of digital transformation.

However, the move to multi-cloud environments has made it challenging for enterprises to optimize infrastructure performance and resource consumption....
Virtual
Roundtable
Tuesday, March 14th, 2023
Anna Delaney
Michael Brown
Anna Delaney with Michael Brown
Virtual Roundtable
Cloud Migration: What is Good Security?
Discussion topics will include:
Three years ago, pre-pandemic, many enterprises were just "dipping their toes" in cloud migration. Now, in 2023, they are over their heads swimming in multi-cloud environments. They recognize that cloud security is a different animal than on-prem. But, what does good cloud security actually look like?

Welcome to this executive roundtable, "Cloud Migration: What is Good Security?" where you will gain new insights from event thought leaders.

Discussion topics will include:
Pitfalls on the cloud migration highway;
Aligning multi-cloud security...
Virtual
Roundtable
Tuesday, March 14th, 2023
Tom Field
Tom Field
Virtual Roundtable
Account Verification: How to Read 'Digital Body Language'
Discussion topics will include:
Digital transformation has brought with it a plethora of new, digital services and an historic increase in customers - existing and new - who want to deal with your institution solely through digital channels.

But how do you validate that these customers are who they claim to be - especially at account opening? How do you balance the right amounts of security controls and ease of use to minimize customer friction and abandonment? What if you could read their digital...
Virtual
Roundtable
Wednesday, March 15th, 2023
Anna Delaney
Anna Delaney
Virtual Roundtable
Securing Applications and APIs in Multicloud Environments
Discussion topics will include:
The rapid adoption of hybrid cloud and multicloud services, along with an increasing number of cloud infrastructure and platform services, has created an explosion in complexity and concerns about data security and cloud compliance. It only takes one insecure API in your API supply chain to risk being crippled by long-term financial or reputational damages.

In this executive roundtable we shall discuss best practices to keep your multicloud environments and APIs both secure and performant while empowering your organization to...
Virtual
Roundtable
Wednesday, March 15th, 2023
Gary Kneeland
Tony Morbin
Gary Kneeland with Tony Morbin
Virtual Roundtable
OT Security: Adapting to Evolving Threat and Business Landscapes
Discussion topics will include:
Through accelerated digital transformation and hybrid work, our critical infrastructure is at risk like never before. And while attacks impacting cyber-physical systems long have been a growing concern, they are now more likely than ever.

Many of these legacy systems were not designed to co-exist seamlessly in a connected environment. And it will take years before a new generation of connected assets emerges with more natively integrated security processes. In the meantime, how do we introduce cybersecurity capabilities that are...
Virtual
Roundtable
Wednesday, March 15th, 2023
Clinton Herget
Tom Field
Clinton Herget with Tom Field
Virtual Roundtable
The New Shift Left: Cultivate Developer Security Adoption
Discussion topics will include:
Application security programs have undergone major changes in recent years to adapt to the evolution brought by agile development, DevOps pipelines and faster deployments. New DevSecOps models result in a significant security ownership shift to the development teams. But for development teams to truly take responsibility for security, they need to embrace and adopt the new security practices.

What are the organizational, process and tooling challenges that need to be overcome to support this new shift left?

Discussion topics will...
Virtual
Roundtable
Thursday, March 16th, 2023
Suparna Goswami
Serge Woon
Suparna Goswami with Serge Woon
Virtual Roundtable
Leveraging Automation for an Effective EDR Strategy
Discussion topics will include:
With endpoints continuing to be the primary target of attackers, having a good EDR strategy has become a must. The accelerated speed of attacks has pushed organizations to realize the importance of automation in security solutions. While the market gets filled with new solutions every year, security practitioners want to leverage existing security solutions.
How do you make your EDR solution more effective? Can you add a layer of automation on top of your existing EDR solution? How can you...
Virtual
Roundtable
Thursday, March 16th, 2023
Geetha Nandikotkur
Geetha Nandikotkur
Virtual Roundtable
An Effective Approach to Vulnerability Management in 2023
Discussion topics will include:
With enterprises flooded with vulnerabilities, critical ones tend to get lost in the deluge more often than not. However, when the same gets exploited by threat actors, it leads to business disruptions. The challenge for most enterprises often lies in knowing the significant components of software and knowing their vulnerabilities.

The key is to have a single pane of glass to get visibility across your assets. But, how do you put the right strategies in place? Do you have enough...
Virtual
Roundtable
Thursday, March 16th, 2023
John Murphy
Anna Delaney
John Murphy with Anna Delaney
Virtual Roundtable
State of Data Security: The Human Impact of Cybercrime
Discussion topics will include:
Over one-third of organizations had a leadership change in the last year due to a cyberattack and its follow-on response.

That’s one of the several alarming findings from Rubrik Zero Labs’s inaugural report, “The State of Data Security: The Human Impact of Cybercrime,” which examines how the constant threat of cyber attacks is affecting organizations and the people charged with protecting them.

In this roundtable, we will discuss the findings from the in-depth global study commissioned by Rubrik and conducted...
In-Person
Roundtable
Morton's the Steakhouse - San Jose
Thursday, March 16th, 2023
Morton's the Steakhouse - San Jose
Tom  Field
Chris  McKie
Tom Field with Chris McKie
In-Person Roundtable
The State of Managed Services 2023: What a SMB Needs in a Partner
Discussion topics will include:
Sixty percent of surveyed small-to-midsized businesses say they could be hit by a successful ransomware attack in the next year, and almost three-quarters of them say such a strike might prove to be a deathblow to their organization.

Such is the state of cybersecurity with SMB, where nearly one-third of survey respondents dealt with phishing and viruses in the past year, and 40 percent say they plan to increase cybersecurity spending. Further, one-third of respondents say they are unhappy with...
In
Person Roundtable
London, GB
Tuesday, March 21st, 2023
London, GB
Anna Delaney
Nawshad Hoossanbuksh
Anna Delaney with Nawshad Hoossanbuksh
In Person Roundtable
Strategies to Combat MFA Fatigue Attacks
Discussion topics will include:
With cybercrime on the rise, more organizations are implementing best practices such as multi-factor authentication (MFA) to protect their users from credential theft, phishing attempts and brute-force password guessing. To circumvent this layer of protection, hackers have developed a new tactic: MFA fatigue or MFA bombing. This method relies on spamming victims with endless authentication prompts until they grant the attacker access by accident or out of sheer frustration. As attackers increasingly exploit MFA bypass vulnerabilities, how can security leaders...
Virtual
Roundtable
Tuesday, March 21st, 2023
Tom Field
Tom Field
Virtual Roundtable
Advancing Threat Intel to Learn the Adversary's Next Move
Discussion topics will include:
As cybercriminals continue to target organizations with ransomware, API and DDoS attacks, security professionals are under constant pressure to become highly competent not just in threat prevention, but in detection and response. However they often struggle to understand threats and translate them into actionable countermeasures.

High quality defensive knowledge is scarce, and adversaries continue to take advantage of weak points including misconfigured defenses, poor security architectures, and excessive privileges, further reducing the value of investment in security solutions.

Discussion topics...
Virtual
Roundtable
Wednesday, March 22nd, 2023
Anna Delaney
Anna Delaney
Virtual Roundtable
How Prepared Are You for the Next Log4j?
Discussion topics will include:
Open source code dominates modern application code. It is also considered a "national security issue," in light of Log4j attacks. Open source code, misconfigurations and known unpatched vulnerabilities are among the application security risks facing all organizations that could lead to a breach.

According to analysts at Forrester, security leaders must manage open source risk with tools and processes including a software bill of materials (SBOM), software composition analysis and third-party risk management.

The question is, how prepared are you...
Virtual
Roundtable
Thursday, March 23rd, 2023
Geetha Nandikotkur
Geetha Nandikotkur
Virtual Roundtable
An Integrated Approach to Embedding Security into DevOps to Establish a Secure Software Development
Discussion topics will include:
When done correctly, most security practitioners say that DevSecOps can transform how businesses can develop and deploy applications securely at a faster pace. However, most organizations still struggle to put it into practice.

As businesses progress with agile development processes, cloud, and DevOps, security needs to integrate with the DevOps process to ensure responsibility is shared and protection is built-in to establish a secure application life-cycle. The key is understanding how developers and security teams can move towards a DevSecOps...
In
Person Roundtable
Switzerland
Thursday, March 23rd, 2023
Switzerland
Mat Schwartz
Eyal Greenberg
Mat Schwartz with Eyal Greenberg
In Person Roundtable
How to Quantify Cybersecurity Exposure as Business Risk
Discussion topics will include:
How can CISOs best quantify the cybersecurity risks facing their organisation? Increasingly, business leaders are calling on them to express this not in terms of technical risk, but risk to the business. Such knowledge is crucial for better guiding cybersecurity investments and understanding their return investment (ROI).

Accordingly, how can CISOs best identify and continually track the actual threats facing their organisation? How should they identify and prioritize the attack scenarios — perhaps including data leakage, or a ransomware outbreak...
In
Person Roundtable
TBA
Thursday, March 23rd, 2023
TBA
Anna Delaney
Jay  Coley
Anna Delaney with Jay Coley
In Person Roundtable
Financial Services: Securing Applications and APIs in Multicloud Environments
Discussion topics will include:
The rapid adoption of hybrid cloud and multicloud services, along with an increasing number of cloud infrastructure and platform services, has created an explosion in complexity and concerns about data security and cloud compliance. It only takes one insecure API in your API supply chain to risk being crippled by long-term financial or reputational damages.

In this executive roundtable we shall discuss best practices to keep your multicloud environments and APIs both secure and performant while empowering your organization to...
Virtual
Roundtable
Tuesday, March 28th, 2023
Tom Field
Tom Field
Virtual Roundtable
Applying Zero Trust in a Hybrid Cloud Environment
Discussion topics will include:
Accelerated digital transformation has moved communication, business, and personal interactions online. But this has significantly increased potential attack surfaces, resulting in a dramatic surge in cybersecurity incidents and exposed records. As workloads move to the cloud, threats move with them. IBM's research indicates that in 2020, upwards of 90% of cyber-related incidents originated in cloud environments.

Organizations that are ahead in applying a zero trust approach to security - zero trust pacesetters - see improvements in all aspects of their...
Virtual
Roundtable
Wednesday, March 29th, 2023
Anna Delaney
Anna Delaney
Virtual Roundtable
How to Quantify Cybersecurity Exposure as Business Risk
Discussion topics will include:
How can CISOs best quantify the cybersecurity risks facing their organisation? Increasingly, business leaders are calling on them to express this not in terms of technical risk, but risk to the business. Such knowledge is crucial for better guiding cybersecurity investments and understanding their return investment (ROI).

Accordingly, how can CISOs best identify and continually track the actual threats facing their organisation? How should they identify and prioritize the attack scenarios — perhaps including data leakage, or a ransomware outbreak...
Virtual
Roundtable
Thursday, March 30th, 2023
Geetha Nandikotkur
Geetha Nandikotkur
Virtual Roundtable
Answering the Big Questions About SASE and Zero Trust
Discussion topics will include:
Digital business, cloud adoption and a hybrid workforce require security and networking approaches to transform in order to accelerate business growth. The SASE (secure access service edge) model enables this transformation by leveraging the power of the public cloud to simultaneously improve security and user experience. A well architected SASE approach can help organizations accelerate their digital journey by consistently applying zero trust policies for all users, applications and devices, no matter where they may be located.

Gartner forecasts that...
Virtual
Roundtable
Tuesday, April 4th, 2023
Tom Field
Tom Field
Virtual Roundtable
Attack Intelligence: How to Operationalize Timely, Relevant, Actionable Info
Discussion topics will include:
Attack intelligence. Beyond traditional threat intel, it draws on threat detection, visibility and collaboration to deliver information that is at once timely, relevant and actionable. As opposed to traditional threat intel, which describes what could happen to your organization, industry or supply chain, attack intelligence shows what is happening.

But how does one create and receive attack intelligence? How is it different from traditional information sharing? And how do today's most significant cybersecurity threats create a greater need for attack...
Virtual
Roundtable
Thursday, April 6th, 2023
Tom Field
John Murphy
Tom Field with John Murphy
Virtual Roundtable
State of Data Security: The Human Impact of Cybercrime
Discussion topics will include:
Over one-third of organizations had a leadership change in the last year due to a cyberattack and its follow-on response.

That’s one of the several alarming findings from Rubrik Zero Labs’s inaugural report, “The State of Data Security: The Human Impact of Cybercrime,” which examines how the constant threat of cyber attacks is affecting organizations and the people charged with protecting them.

In this roundtable, we will discuss the findings from the in-depth global study commissioned by Rubrik and conducted...
Virtual
Roundtable
Tuesday, April 11th, 2023
Tom Field
Tom Field
Virtual Roundtable
BEC & Ransomware: Two Sides of the Same Cybercrime Coin
Discussion topics will include:
Business email compromise and ransomware: They are the two biggest threats today. While it may seem that these attacks are on completely opposite sides of the threat spectrum, there are a number of factors that link them together, and a number of reasons why organizations should be concerned about them both.

What are the different variables that link the two? Why are these attacks still so successful? How can enterprises better defend against them in the future?

Register for this...
Virtual
Roundtable
Tuesday, April 18th, 2023
Tom Field
Tom Field
Virtual Roundtable
Better Understanding Cloud Security Risks Through ‘Context’
Discussion topics will include:
In just a few years, cloud conversations have gone from theoretical to critical. And with migrations to the cloud ongoing, many enterprises have had to rethink their security approach. In these environments, some practitioners are charged with expending resources to mitigate “high-severity” CVEs – regardless of how a vulnerability may interact with that IT environment. This risk may pale in comparison, for example, to a malware occurrence at the edge that goes unchecked.

A potential lack of visibility into apps,...
Virtual
Roundtable
Tuesday, May 2nd, 2023
Tom Field
Tom Field
Virtual Roundtable
Drive Accountability with Cyber Risk Governance
Discussion topics will include:
Cyber risk governance defines how an organization plans to protect itself from cyber events and threats. Governance describes the process for how to build a cybersecurity program, but doesn’t necessarily inform the effectiveness of your programs and policies. Without uniform performance targets defined in the governance policies, security leaders won’t know if their security controls are performing to their standards or if they’re within the bounds of their risk appetite.

To stay cyber resilient, forward-thinking security leaders need to measure...
In-Person
Roundtable
Eddie V's - Pittsburgh
Thursday, May 4th, 2023
Eddie V's - Pittsburgh
Mike  Fiorina
Tim Morris
Mike Fiorina with Tim Morris
In-Person Roundtable
Achieving the Benefits of Converged Endpoint Management
Discussion topics will include:
Managing endpoint risk and compliance is more challenging today than ever before. Today’s CISOs have to manage risk from many thousands of globally distributed, heterogeneous assets, while also responding to ever increasing audit scrutiny and regulatory compliance requirements.

Discussion topics will include:
Identify & remediate risks that create the greatest exposure
Assess & measure unknown vulnerabilities
Maximize IT budgets and staffing during economic uncertainty
Enhance existing investment in strategic technology vendors

Learn how converged endpoint management provides an effective, expedient...
Virtual
Roundtable
Tuesday, May 9th, 2023
Tom Field
Tom Field
Virtual Roundtable
Email Security: Changing the Game Against Game-Changing Attacks?
Discussion topics will include:
Phishing. Business email compromise. Executive impersonation. Ransomware. Today's email-borne threats are sophisticated, targeted and come at a relentless scale. There’s little denying that they are game-changing.

But can you say the same about your email defenses? Is email security the priority it should be for your enterprise, or are you trying to counter 2022 attacks with 2012 defenses? How do you hope to upgrade your defenses, and what will it take to obtain the resources you need?

Join this session,...
Virtual
Roundtable
Tuesday, May 16th, 2023
Tom Field
Tom Field
Virtual Roundtable
Fraud Fighting 2023: How to Win the Battle Against Bots
Discussion topics will include:
As enterprises globally have shifted more of their operations online, cyber adversaries have doubled down on the use of bots to automate and increase the scale of their attacks.

According to recent research from Enterprise Strategy Group, nearly half (47%) of cybersecurity professionals have seen examples of credential stuffing or cracking attacks used for account takeover in just the past 6 months. And 46% are aware of attacks on online shopping cart systems and instances of automated inventory purchasing or...
Virtual
Roundtable
Tuesday, May 23rd, 2023
Tom Field
Tom Field
Virtual Roundtable
From Prevention to Reality: Building a Cyber Resilient Organization
Discussion topics will include:
Strong cybersecurity is critical in the digital economy to create trusted, resilient organizations. But as the pace of digital transformation accelerates, the attack surface and vendor footprint within organizations has grown rapidly. Faced with greater exposure and more sophisticated cyber attacks, it is no longer possible for security leaders to prevent cyber breaches.

Security leaders must shift their focus from prevention to resilience to defend against greater exposure and more sophisticated cyber attacks. A focus on cyber resilience empowers organizations...
Virtual
Roundtable
Wednesday, May 31st, 2023
Anna Delaney
Anna Delaney
Virtual Roundtable
Combating the Modern Ransomware Threat
Discussion topics will include:
With threats growing in volume and sophistication, today’s ransomware attacks easily outpace many organizations’ defensive capabilities. Globally, enterprises of all sizes and sectors are being compromised and held hostage by ransomware, with many being forced to pay millions in ransom because they’re ill-equipped to combat their adversaries.

This trend intersects with the continued rise of digital business and represents a new magnitude of risk. It’s imperative, then, to understand your adversaries and re-examine your security posture so that you may...
Virtual
Roundtable
Wednesday, June 7th, 2023
Anna Delaney
Anna Delaney
Virtual Roundtable
Securing Applications and APIs in Multicloud Environments
Discussion topics will include:
The rapid adoption of hybrid cloud and multicloud services, along with an increasing number of cloud infrastructure and platform services, has created an explosion in complexity and concerns about data security and cloud compliance. It only takes one insecure API in your API supply chain to risk being crippled by long-term financial or reputational damages.

In this executive roundtable we shall discuss best practices to keep your multicloud environments and APIs both secure and performant while empowering your organization to...
Virtual
Roundtable
Wednesday, June 14th, 2023
Anna Delaney
Anna Delaney
Virtual Roundtable
How Prepared Are You for the Next Log4j?
Discussion topics will include:
Open source code dominates modern application code. It is also considered a "national security issue," in light of Log4j attacks. Open source code, misconfigurations and known unpatched vulnerabilities are among the application security risks facing all organizations that could lead to a breach.

According to analysts at Forrester, security leaders must manage open source risk with tools and processes including a software bill of materials (SBOM), software composition analysis and third-party risk management.

The question is, how prepared are you...
Virtual
Roundtable
Wednesday, June 21st, 2023
Anna Delaney
Anna Delaney
Virtual Roundtable
How to Quantify Cybersecurity Exposure as Business Risk
Discussion topics will include:
How can CISOs best quantify the cybersecurity risks facing their organisation? Increasingly, business leaders are calling on them to express this not in terms of technical risk, but risk to the business. Such knowledge is crucial for better guiding cybersecurity investments and understanding their return investment (ROI).

Accordingly, how can CISOs best identify and continually track the actual threats facing their organisation? How should they identify and prioritize the attack scenarios — perhaps including data leakage, or a ransomware outbreak...
Virtual
Roundtable
Thursday, July 6th, 2023
Geetha Nandikotkur
Geetha Nandikotkur
Virtual Roundtable
Accelerate Your Cloud Migration Strategy to Modernize Applications
Discussion topics will include:
The interest in multi-cloud adoption has shown an upward trend as C-level executives take deployment decisions. To stay competitive, companies are now modernizing applications across the board.

While multi-cloud architecture has become the new reality of corporate IT, it presents a new set of challenges to achieve the agility and scalability needed to keep up with the pace of digital transformation.

However, the move to multi-cloud environments has made it challenging for enterprises to optimize infrastructure performance and resource consumption....
Virtual
Roundtable
Thursday, July 13th, 2023
Geetha Nandikotkur
Geetha Nandikotkur
Virtual Roundtable
An Effective Approach to Vulnerability Management in 2023
Discussion topics will include:
With enterprises flooded with vulnerabilities, critical ones tend to get lost in the deluge more often than not. However, when the same gets exploited by threat actors, it leads to business disruptions. The challenge for most enterprises often lies in knowing the significant components of software and knowing their vulnerabilities.

The key is to have a single pane of glass to get visibility across your assets. But, how do you put the right strategies in place? Do you have enough...
Virtual
Roundtable
Thursday, July 20th, 2023
Geetha Nandikotkur
Geetha Nandikotkur
Virtual Roundtable
An Integrated Approach to Embedding Security into DevOps to Establish a Secure Software Development
Discussion topics will include:
When done correctly, most security practitioners say that DevSecOps can transform how businesses can develop and deploy applications securely at a faster pace. However, most organizations still struggle to put it into practice.

As businesses progress with agile development processes, cloud, and DevOps, security needs to integrate with the DevOps process to ensure responsibility is shared and protection is built-in to establish a secure application life-cycle. The key is understanding how developers and security teams can move towards a DevSecOps...
Virtual
Roundtable
Thursday, July 27th, 2023
Geetha Nandikotkur
Geetha Nandikotkur
Virtual Roundtable
Answering the Big Questions About SASE and Zero Trust
Discussion topics will include:
Digital business, cloud adoption and a hybrid workforce require security and networking approaches to transform in order to accelerate business growth. The SASE (secure access service edge) model enables this transformation by leveraging the power of the public cloud to simultaneously improve security and user experience. A well architected SASE approach can help organizations accelerate their digital journey by consistently applying zero trust policies for all users, applications and devices, no matter where they may be located.

Gartner forecasts that...
Virtual
Roundtable
Tuesday, August 22nd, 2023
Tom Field
Tom Field
Virtual Roundtable
Advancing Threat Intel to Learn the Adversary's Next Move
Discussion topics will include:
As cybercriminals continue to target organizations with ransomware, API and DDoS attacks, security professionals are under constant pressure to become highly competent not just in threat prevention, but in detection and response. However they often struggle to understand threats and translate them into actionable countermeasures.

High quality defensive knowledge is scarce, and adversaries continue to take advantage of weak points including misconfigured defenses, poor security architectures, and excessive privileges, further reducing the value of investment in security solutions.

Discussion topics...
Virtual
Roundtable
Wednesday, August 23rd, 2023
Anna Delaney
Anna Delaney
Virtual Roundtable
Combating the Modern Ransomware Threat
Discussion topics will include:
With threats growing in volume and sophistication, today’s ransomware attacks easily outpace many organizations’ defensive capabilities. Globally, enterprises of all sizes and sectors are being compromised and held hostage by ransomware, with many being forced to pay millions in ransom because they’re ill-equipped to combat their adversaries.

This trend intersects with the continued rise of digital business and represents a new magnitude of risk. It’s imperative, then, to understand your adversaries and re-examine your security posture so that you may...
Virtual
Roundtable
Tuesday, August 29th, 2023
Tom Field
Tom Field
Virtual Roundtable
Applying Zero Trust in a Hybrid Cloud Environment
Discussion topics will include:
Accelerated digital transformation has moved communication, business, and personal interactions online. But this has significantly increased potential attack surfaces, resulting in a dramatic surge in cybersecurity incidents and exposed records. As workloads move to the cloud, threats move with them. IBM's research indicates that in 2020, upwards of 90% of cyber-related incidents originated in cloud environments.

Organizations that are ahead in applying a zero trust approach to security - zero trust pacesetters - see improvements in all aspects of their...
Virtual
Roundtable
Wednesday, August 30th, 2023
Anna Delaney
Anna Delaney
Virtual Roundtable
Securing Applications and APIs in Multicloud Environments
Discussion topics will include:
The rapid adoption of hybrid cloud and multicloud services, along with an increasing number of cloud infrastructure and platform services, has created an explosion in complexity and concerns about data security and cloud compliance. It only takes one insecure API in your API supply chain to risk being crippled by long-term financial or reputational damages.

In this executive roundtable we shall discuss best practices to keep your multicloud environments and APIs both secure and performant while empowering your organization to...
Virtual
Roundtable
Tuesday, September 5th, 2023
Tom Field
Tom Field
Virtual Roundtable
Attack Intelligence: How to Operationalize Timely, Relevant, Actionable Info
Discussion topics will include:
Attack intelligence. Beyond traditional threat intel, it draws on threat detection, visibility and collaboration to deliver information that is at once timely, relevant and actionable. As opposed to traditional threat intel, which describes what could happen to your organization, industry or supply chain, attack intelligence shows what is happening.

But how does one create and receive attack intelligence? How is it different from traditional information sharing? And how do today's most significant cybersecurity threats create a greater need for attack...
Virtual
Roundtable
Wednesday, September 6th, 2023
Anna Delaney
Anna Delaney
Virtual Roundtable
How Prepared Are You for the Next Log4j?
Discussion topics will include:
Open source code dominates modern application code. It is also considered a "national security issue," in light of Log4j attacks. Open source code, misconfigurations and known unpatched vulnerabilities are among the application security risks facing all organizations that could lead to a breach.

According to analysts at Forrester, security leaders must manage open source risk with tools and processes including a software bill of materials (SBOM), software composition analysis and third-party risk management.

The question is, how prepared are you...
Virtual
Roundtable
Tuesday, September 12th, 2023
Tom Field
Tom Field
Virtual Roundtable
BEC & Ransomware: Two Sides of the Same Cybercrime Coin
Discussion topics will include:
Business email compromise and ransomware: They are the two biggest threats today. While it may seem that these attacks are on completely opposite sides of the threat spectrum, there are a number of factors that link them together, and a number of reasons why organizations should be concerned about them both.

What are the different variables that link the two? Why are these attacks still so successful? How can enterprises better defend against them in the future?

Register for this...
Virtual
Roundtable
Wednesday, September 13th, 2023
Anna Delaney
Anna Delaney
Virtual Roundtable
How to Quantify Cybersecurity Exposure as Business Risk
Discussion topics will include:
How can CISOs best quantify the cybersecurity risks facing their organisation? Increasingly, business leaders are calling on them to express this not in terms of technical risk, but risk to the business. Such knowledge is crucial for better guiding cybersecurity investments and understanding their return investment (ROI).

Accordingly, how can CISOs best identify and continually track the actual threats facing their organisation? How should they identify and prioritize the attack scenarios — perhaps including data leakage, or a ransomware outbreak...
Virtual
Roundtable
Tuesday, September 19th, 2023
Tom Field
Tom Field
Virtual Roundtable
Better Understanding Cloud Security Risks Through ‘Context’
Discussion topics will include:
In just a few years, cloud conversations have gone from theoretical to critical. And with migrations to the cloud ongoing, many enterprises have had to rethink their security approach. In these environments, some practitioners are charged with expending resources to mitigate “high-severity” CVEs – regardless of how a vulnerability may interact with that IT environment. This risk may pale in comparison, for example, to a malware occurrence at the edge that goes unchecked.

A potential lack of visibility into apps,...
Virtual
Roundtable
Tuesday, October 3rd, 2023
Tom Field
Tom Field
Virtual Roundtable
Drive Accountability with Cyber Risk Governance
Discussion topics will include:
Cyber risk governance defines how an organization plans to protect itself from cyber events and threats. Governance describes the process for how to build a cybersecurity program, but doesn’t necessarily inform the effectiveness of your programs and policies. Without uniform performance targets defined in the governance policies, security leaders won’t know if their security controls are performing to their standards or if they’re within the bounds of their risk appetite.

To stay cyber resilient, forward-thinking security leaders need to measure...
Virtual
Roundtable
Tuesday, October 10th, 2023
Tom Field
Tom Field
Virtual Roundtable
Email Security: Changing the Game Against Game-Changing Attacks?
Discussion topics will include:
Phishing. Business email compromise. Executive impersonation. Ransomware. Today's email-borne threats are sophisticated, targeted and come at a relentless scale. There’s little denying that they are game-changing.

But can you say the same about your email defenses? Is email security the priority it should be for your enterprise, or are you trying to counter 2022 attacks with 2012 defenses? How do you hope to upgrade your defenses, and what will it take to obtain the resources you need?

Join this session,...
Virtual
Roundtable
Tuesday, October 17th, 2023
Tom Field
Tom Field
Virtual Roundtable
Fraud Fighting 2023: How to Win the Battle Against Bots
Discussion topics will include:
As enterprises globally have shifted more of their operations online, cyber adversaries have doubled down on the use of bots to automate and increase the scale of their attacks.

According to recent research from Enterprise Strategy Group, nearly half (47%) of cybersecurity professionals have seen examples of credential stuffing or cracking attacks used for account takeover in just the past 6 months. And 46% are aware of attacks on online shopping cart systems and instances of automated inventory purchasing or...
Virtual
Roundtable
Tuesday, October 24th, 2023
Tom Field
Tom Field
Virtual Roundtable
From Prevention to Reality: Building a Cyber Resilient Organization
Discussion topics will include:
Strong cybersecurity is critical in the digital economy to create trusted, resilient organizations. But as the pace of digital transformation accelerates, the attack surface and vendor footprint within organizations has grown rapidly. Faced with greater exposure and more sophisticated cyber attacks, it is no longer possible for security leaders to prevent cyber breaches.

Security leaders must shift their focus from prevention to resilience to defend against greater exposure and more sophisticated cyber attacks. A focus on cyber resilience empowers organizations...
Virtual
Roundtable
Thursday, November 2nd, 2023
Geetha Nandikotkur
Geetha Nandikotkur
Virtual Roundtable
Accelerate Your Cloud Migration Strategy to Modernize Applications
Discussion topics will include:
The interest in multi-cloud adoption has shown an upward trend as C-level executives take deployment decisions. To stay competitive, companies are now modernizing applications across the board.

While multi-cloud architecture has become the new reality of corporate IT, it presents a new set of challenges to achieve the agility and scalability needed to keep up with the pace of digital transformation.

However, the move to multi-cloud environments has made it challenging for enterprises to optimize infrastructure performance and resource consumption....
Virtual
Roundtable
Thursday, November 9th, 2023
Geetha Nandikotkur
Geetha Nandikotkur
Virtual Roundtable
An Effective Approach to Vulnerability Management in 2023
Discussion topics will include:
With enterprises flooded with vulnerabilities, critical ones tend to get lost in the deluge more often than not. However, when the same gets exploited by threat actors, it leads to business disruptions. The challenge for most enterprises often lies in knowing the significant components of software and knowing their vulnerabilities.

The key is to have a single pane of glass to get visibility across your assets. But, how do you put the right strategies in place? Do you have enough...
Virtual
Roundtable
Wednesday, November 15th, 2023
Anna Delaney
Anna Delaney
Virtual Roundtable
Combating the Modern Ransomware Threat
Discussion topics will include:
With threats growing in volume and sophistication, today’s ransomware attacks easily outpace many organizations’ defensive capabilities. Globally, enterprises of all sizes and sectors are being compromised and held hostage by ransomware, with many being forced to pay millions in ransom because they’re ill-equipped to combat their adversaries.

This trend intersects with the continued rise of digital business and represents a new magnitude of risk. It’s imperative, then, to understand your adversaries and re-examine your security posture so that you may...
Virtual
Roundtable
Thursday, November 16th, 2023
Geetha Nandikotkur
Geetha Nandikotkur
Virtual Roundtable
An Integrated Approach to Embedding Security into DevOps to Establish a Secure Software Development
Discussion topics will include:
When done correctly, most security practitioners say that DevSecOps can transform how businesses can develop and deploy applications securely at a faster pace. However, most organizations still struggle to put it into practice.

As businesses progress with agile development processes, cloud, and DevOps, security needs to integrate with the DevOps process to ensure responsibility is shared and protection is built-in to establish a secure application life-cycle. The key is understanding how developers and security teams can move towards a DevSecOps...
Virtual
Roundtable
Wednesday, November 22nd, 2023
Anna Delaney
Anna Delaney
Virtual Roundtable
Securing Applications and APIs in Multicloud Environments
Discussion topics will include:
The rapid adoption of hybrid cloud and multicloud services, along with an increasing number of cloud infrastructure and platform services, has created an explosion in complexity and concerns about data security and cloud compliance. It only takes one insecure API in your API supply chain to risk being crippled by long-term financial or reputational damages.

In this executive roundtable we shall discuss best practices to keep your multicloud environments and APIs both secure and performant while empowering your organization to...
Virtual
Roundtable
Thursday, November 23rd, 2023
Geetha Nandikotkur
Geetha Nandikotkur
Virtual Roundtable
Answering the Big Questions About SASE and Zero Trust
Discussion topics will include:
Digital business, cloud adoption and a hybrid workforce require security and networking approaches to transform in order to accelerate business growth. The SASE (secure access service edge) model enables this transformation by leveraging the power of the public cloud to simultaneously improve security and user experience. A well architected SASE approach can help organizations accelerate their digital journey by consistently applying zero trust policies for all users, applications and devices, no matter where they may be located.

Gartner forecasts that...
Virtual
Roundtable
Wednesday, November 29th, 2023
Anna Delaney
Anna Delaney
Virtual Roundtable
How Prepared Are You for the Next Log4j?
Discussion topics will include:
Open source code dominates modern application code. It is also considered a "national security issue," in light of Log4j attacks. Open source code, misconfigurations and known unpatched vulnerabilities are among the application security risks facing all organizations that could lead to a breach.

According to analysts at Forrester, security leaders must manage open source risk with tools and processes including a software bill of materials (SBOM), software composition analysis and third-party risk management.

The question is, how prepared are you...
Virtual
Roundtable
Wednesday, December 6th, 2023
Anna Delaney
Anna Delaney
Virtual Roundtable
How to Quantify Cybersecurity Exposure as Business Risk
Discussion topics will include:
How can CISOs best quantify the cybersecurity risks facing their organisation? Increasingly, business leaders are calling on them to express this not in terms of technical risk, but risk to the business. Such knowledge is crucial for better guiding cybersecurity investments and understanding their return investment (ROI).

Accordingly, how can CISOs best identify and continually track the actual threats facing their organisation? How should they identify and prioritize the attack scenarios — perhaps including data leakage, or a ransomware outbreak...
Past Roundtables
In-Person
Roundtable
The Oceanaire Houston- 5061 Westheimer Rd, Houston, TX
Tuesday, January 31st, 2023
The Oceanaire Houston- 5061 Westheimer Rd, Houston, TX
Tom Field
Chad Skipper
Tom Field with Chad Skipper
In-Person Roundtable
Lateral Movement: The New Cyber Battleground
Discussion topics will include:
Enterprises face an unprecedented level of threat and complexity as they operate in today’s multi-cloud and digital world. Consequently, the stakes in security continue to rise, and lateral security has become the new battleground.

"If you can’t see it, you can't protect it" is the new mantra, and it is the foundation for this roundtable discussion. What are the advanced threats preying upon organizations' blind spots, and how are security leaders overcoming their defensive gaps to detect and defend against...
In-Person
Roundtable
Kayne Prime Steakhouse - Nashville
Thursday, January 26th, 2023
Kayne Prime Steakhouse - Nashville
Ashley McGlone
Mike  Fiorina
Ashley McGlone with Mike Fiorina
In-Person Roundtable
Achieving the Benefits of Converged Endpoint Management
Discussion topics will include:
Managing endpoint risk and compliance is more challenging today than ever before. Today’s CISOs have to manage risk from many thousands of globally distributed, heterogeneous assets, while also responding to ever increasing audit scrutiny and regulatory compliance requirements.

Discussion topics will include:
Identify & remediate risks that create the greatest exposure
Assess & measure unknown vulnerabilities
Maximize IT budgets and staffing during economic uncertainty
Enhance existing investment in strategic technology vendors

Learn how converged endpoint management provides an effective, expedient...
Virtual
Roundtable
Thursday, January 19th, 2023
Gary Kneeland
Anna Delaney
Gary Kneeland with Anna Delaney
Virtual Roundtable
OT Security: Adapting to Evolving Threat and Business Landscapes
Discussion topics will include:
Through accelerated digital transformation and hybrid work, our critical infrastructure is at risk like never before. And while attacks impacting cyber-physical systems long have been a growing concern, they are now more likely than ever.

Many of these legacy systems were not designed to co-exist seamlessly in a connected environment. And it will take years before a new generation of connected assets emerges with more natively integrated security processes. In the meantime, how do we introduce cybersecurity capabilities that are...
In
Person Roundtable
Steak 48 Houston
Thursday, January 12th, 2023
Steak 48 Houston
Steve Neiers
Tom Field
Steve Neiers with Tom Field
In Person Roundtable
Achieving the Benefits of Converged Endpoint Management
Discussion topics will include:
Managing endpoint risk and compliance is more challenging today than ever before. Today’s CISOs have to manage risk from many thousands of globally distributed, heterogeneous assets, while also responding to ever increasing audit scrutiny and regulatory compliance requirements.

Join this session, Achieving the Benefits of Converged Endpoint Management

Discussion topics will include:
Identify & remediate risks that create the greatest exposure
Report results to the board. Do they understand the metrics that are being reported?
Assess & measure the cost...
In-Person
Roundtable
Sofitel BKC, Mumbai
Tuesday, December 13th, 2022
Sofitel BKC, Mumbai
Sandeep Agarwal
Avinash  Dharmadhikari
Sandeep Agarwal with Avinash Dharmadhikari
In-Person Roundtable
Cyber Recovery: The Best Defense Against Paying Ransomware
Discussion topics will include:
Ransomware attacks are becoming inevitable as bad actors exploit the weakest link of cyber defense - humans. The goal of cyber resilience is to transform business expectations and guarantee that businesses face a less-than-significant impact from a cyberattack. After all, it is not only about how to protect and detect but also remediate and recover. The recovery process needs to ensure not only a quick recovery but also a quicker back to business. For a faster recovery environment, malware is...
Virtual
Roundtable
Thursday, December 8th, 2022
Tom Field
Michael Covington, Ph.D
Tom Field with Michael Covington, Ph.D
Virtual Roundtable
Securing a Hybrid, Mobile-First Workplace
Discussion topics will include:
The nature of work has changed. Organizations now embrace a more mobile-centric, collaborative and productive workplace. The shift to supporting a remote-first work style was sudden for many, as they reacted to the global pandemic, but there are indications that businesses have made these changes permanent. The challenge now: Choose which modern technologies, practices and processes can best support and secure this new way of working.

Join this session, Securing a Hybrid, Mobile-First Workplace, to learn more about how to...
In
Person Roundtable
Number One at The Balmoral
Thursday, December 8th, 2022
Number One at The Balmoral
Charles  Adriaenssens
Ozgur  Ozel
Charles Adriaenssens with Ozgur Ozel
In Person Roundtable
Achieving Operational Resilience in The Financial Sector
Discussion topics will include:
How can we ensure that critical systems are reliable, secure and performant in the long term? As a result of increased regulation, financial services executives need to address the task of building operational resilience across data and organisational silos.

Join this discussion on ‘Achieving Operational Resilience in Financial Services’, where we will address the importance of using data effectively to improve resilience. We will introduce the building blocks for creating a holistic monitoring approach that aligns with the regulators’ requirements,...
Virtual
Roundtable
Wednesday, December 7th, 2022
Gary Kneeland
Roger Hill
Gary Kneeland with Roger Hill
Virtual Roundtable
OT Security: Adapting to Evolving Threat and Business Landscapes
Discussion topics will include:
Through accelerated digital transformation and hybrid work, our critical infrastructure is at risk like never before. And while attacks impacting cyber-physical systems long have been a growing concern, they are now more likely than ever.

Many of these legacy systems were not designed to co-exist seamlessly in a connected environment. And it will take years before a new generation of connected assets emerges with more natively integrated security processes. In the meantime, how do we introduce cybersecurity capabilities that are...
Virtual
Roundtable
Wednesday, December 7th, 2022
Tom  Field
Fawaz Rasheed
Tom Field with Fawaz Rasheed
Virtual Roundtable
How to Modernize Your SOC (Without Blowing it Up)
Discussion topics will include:
The problems are staring at you: A broader potential attack surface than you've ever had before; more alerts than your systems and staff can monitor, never mind act upon; and recruiting & retaining SOC analysts are harder than ever.

But knowing you need to modernize your SOC is one thing; doing it is quite another. How do you upgrade without a complete rip and replace? How do you gain not just the visibility you need across disparate environments, but context...
In-Person
Roundtable
Jio World Convention Centre
Wednesday, December 7th, 2022
Jio World Convention Centre
Sandeep  Agarwal
Sandeep Variyam
Sandeep Agarwal with Sandeep Variyam
In-Person Roundtable
New Age Security Challenges for Cloud-Native Applications
Discussion topics will include:
Nearly 70% of organizations host more than half their workloads in the cloud, up from 31% in 2020. Cloud is the future. As migration to the cloud continues, organizations struggle with application development security. With organizations adopting a cloud-native approach to application development, the need of the hour is to rethink one’s cloud security strategy.
Implementing these approaches, however, poses challenges. Aside from organization-wide buy-in, how does one efficiently integrate these applications into workflows and toolsets that are already in...
Virtual
Roundtable
Tuesday, December 6th, 2022
Tom  Field
Ameet Naik
Tom Field with Ameet Naik
Virtual Roundtable
5 Critical Considerations for DDoS Mitigation
Discussion topics will include:
Last June, Cloudflare detected what at the time was the largest distributed denial of service attack on record - 26 million requests per second. Since then, that record has been crushed, and adversaries continue to leverage DDoS attacks for distraction, destruction and as companions to ransomware campaigns.

What are the top trends in both application-layer and network-layer DDoS attacks? What are the ransom attack trends? What are the five critical considerations for mitigating modern DDoS attacks?

Join this session, 5...
In
Person Roundtable
One Moorgate Place, London
Tuesday, December 6th, 2022
One Moorgate Place, London
Paul  Fryer
Anna Delaney
Paul Fryer with Anna Delaney
In Person Roundtable
Solving the Skills Gap with Managed Services
Discussion topics will include:
Being prepared to respond to today's security incidents means acquiring and maintaining both the tools and the expertise to successfully detect attacks and stop them before serious damage is done. However, with the diversity and complexity of threats on the rise, security teams find themselves drowning in data and overwhelmed by the immense volume of alerts, many of them false positives.

With a shortage of 4 million cybersecurity workers globally and 75% of SMBs saying they lack the personnel to...
In
Person Roundtable
One Moorgate Place
Thursday, December 1st, 2022
One Moorgate Place
Sam Hector
Celine Williams
Sam Hector with Celine Williams
In Person Roundtable
Addressing ever advancing threats with Extended Detection and Response
Discussion topics will include:
Cyberthreats continue to proliferate, with advanced attackers exploiting zero days and novel new methods of monetization, while ‘conventional’ attacks have been commoditized or made available ‘as a service’. Meanwhile the attack surface is expanding exponentially though cloud adoption, Apps, IOT, IIOT, working from home, and digitization, with the resultant demand from users for access to everything from everywhere via any device.

Even the plethora of new tools introduced to tackle these new threats can create their own problems, including increasing...
In
Person Roundtable
Paris, FR
Thursday, December 1st, 2022
Paris, FR
Sacha Labourey
Timothee Bardet
Sacha Labourey with Timothee Bardet
In Person Roundtable
Services financiers: Compliance et sécurité peuvent-ils devenir un atout pour le DevOps?
Discussion topics will include:
Selon l'enquête mondiale sur la sécurité de CloudBees cette année, les mesures de sécurité tout au long de la chaîne DevOps ont un impact significatif à la fois sur la livraison des logiciels et sur l'expérience globale des développeurs. Plus précisément, les dirigeants estiment que les exigences en matière de sécurité (75 %) et de conformité (76 %) entravent l'innovation. Détecter les problèmes à un stade précoce et les résoudre avant qu'ils ne ralentissent le processus ou n'entrent en production...
In
Person Roundtable
Hotel Villa Dagmar, Stockholm
Wednesday, November 30th, 2022
Hotel Villa Dagmar, Stockholm
Anna Delaney
Jay  Coley
Anna Delaney with Jay Coley
In Person Roundtable
Achieving Visibility of Applications and APIs in a Multicloud World
Discussion topics will include:
The rapid adoption of hybrid cloud and multicloud services, along with an increasing number of cloud infrastructure and platform services, has created an explosion in complexity and concerns about data security and cloud compliance. It only takes one insecure API in your API supply chain to risk being crippled by long-term financial or reputational damages.

In this executive roundtable we shall discuss best practices to keep your multicloud environments and APIs both secure and performant while empowering your organization to...
In-Person
Roundtable
Sofitel BKC, Mumbai
Tuesday, November 29th, 2022
Sofitel BKC, Mumbai
Anitosh Halder
Anitosh Halder
In-Person Roundtable
Efficient Cloud Migration for Cloud-Native Business
Discussion topics will include:
Digitization is a driving priority for business leaders across industries and sectors. The need for greater agility and faster innovations has made cloud infrastructure an attractive option to fulfil the digital transformation agenda.
However, during this transition, CIOs and tech leaders confront plenty of issues pertaining to migration, post-migration and modernization, which, if not handled well, can increase time, risk and costs.

CIO.inc, in partnership with Sify Technologies, solicits your presence for an exclusive roundtable discussion at the India Cloud...
Virtual
Roundtable
Tuesday, November 29th, 2022
Suparna Goswami
Sid Deshpande
Suparna Goswami with Sid Deshpande
Virtual Roundtable
Answering The Big Questions About SASE and Zero Trust
Discussion topics will include:
Digital business, cloud adoption and a hybrid workforce require security and networking approaches to transform in order to accelerate business growth. The SASE (secure access service edge) model enables this transformation by leveraging the power of the public cloud to simultaneously improve security and user experience. A well architected SASE approach can help organizations accelerate their digital journey by consistently applying zero trust policies for all users, applications and devices, no matter where they may be located.

Gartner forecasts that...
In-Person
Roundtable
Ritz Carlton, Bengaluru
Friday, November 25th, 2022
Ritz Carlton, Bengaluru
Anitosh Halder
Anitosh Halder
In-Person Roundtable
Efficient Cloud Migration for Cloud-Native Business
Discussion topics will include:
Digitization is a driving priority for business leaders across industries and sectors. The need for greater agility and faster innovations has made cloud infrastructure an attractive option to fulfil the digital transformation agenda.
However, during this transition, CIOs and tech leaders confront plenty of issues pertaining to migration, post-migration and modernization, which, if not handled well, can increase time, risk and costs.

CIO.inc, in partnership with Sify Technologies, solicits your presence for an exclusive roundtable discussion at the India Cloud...
In
Person Roundtable
The Ivy in the Park
Thursday, November 24th, 2022
The Ivy in the Park
Emma Gray
Anna Delaney
Emma Gray with Anna Delaney
In Person Roundtable
The Challenges of Digital Trust in Business Transformation
Discussion topics will include:
Digital transformation has created a wealth of opportunities and challenges: cloud migration, smart devices, automation, IT/OT-IoT convergence, and third-party infrastructure integration.

But it has also brought with it vulnerabilities inherent in legacy technology, the disconnect of OT, an enlarged attack surface and increased attention from threat actors and criminal adversaries who seek to disrupt operations or steal intellectual property.

Today's CISOs need to focus on these accelerated challenges in the hyperconnected ecosystem, meaning: a connected workforce, connected customers, connected supply...
In-Person
Roundtable
Mumbai
Thursday, November 24th, 2022
Mumbai
Huzefa  Motiwala
Kshitij Kapdekar
Huzefa Motiwala with Kshitij Kapdekar
In-Person Roundtable
Cloud Security in a Hybrid or Multi-Cloud Environment
Discussion topics will include:
With the massive adoption of the cloud, security is struggling to keep pace. Lack of end-to-end visibility across data and applications has hampered the effective detection of attacks. Security practitioners are looking for an effective cloud strategy.
While cloud workload protection platform and cloud security posture management solutions are used as standards, the need is for a single platform that provides greater visibility across distributed environments. A multi-cloud security approach needs an understanding of the baseline of what is being...
In-Person
Roundtable
Shangri-La Eros, New Delhi
Wednesday, November 23rd, 2022
Shangri-La Eros, New Delhi
Anitosh Halder
Ankit  Kumar Gupta
Anitosh Halder with Ankit Kumar Gupta
In-Person Roundtable
Efficient Cloud Migration for Cloud-Native Business
Discussion topics will include:
Digitization is a driving priority for business leaders across industries and sectors. The need for greater agility and faster innovations has made cloud infrastructure an attractive option to fulfil the digital transformation agenda.
However, during this transition, CIOs and tech leaders confront plenty of issues pertaining to migration, post-migration and modernization, which, if not handled well, can increase time, risk and costs.

CIO.inc, in partnership with Sify Technologies, solicits your presence for an exclusive roundtable discussion at the India Cloud...
In
Person Roundtable
Vintry & Mercer
Tuesday, November 22nd, 2022
Vintry & Mercer
Prakash  Sethuraman,
Anna Delaney
Prakash Sethuraman, with Anna Delaney
In Person Roundtable
Financial Services: Achieving Shift Left Security
Discussion topics will include:
According to this year's CloudBees Global C-Suite Security Survey, the drive to shift left is having a significant impact on both delivering software and the developer experience overall. Specifically, executives believe that security (75%) and compliance (76%) requirements hinder innovation. Catching problems early and fixing them before they slow the process or get into production is still the ultimate goal of shift left. However, a new approach and mindset are required to deliver on the promise.

Register for this executive...
In-Person
Roundtable
The Point D.C.
Thursday, November 17th, 2022
The Point D.C.
Tom Field
Juliana Vida
Tom Field with Juliana Vida
In-Person Roundtable
Government: Building Cyber Defense During Digital Transformation
Discussion topics will include:
Public sector agencies are undergoing a massive digital transformation, which is now imperative, thanks to the massive shift to remote work. Furthermore, Biden's executive order (EO), signed last May, mandated Zero Trust adoption across the government and recognized the importance of logging, log retention and management, cloud adoption, cyber best practices, software supply chain integrity, and information sharing.

One year later, what progress have we made, and what are the biggest opportunities for improvement? And how can federal agencies stay...
In-Person
Roundtable
Trident, Gurgaon
Wednesday, November 16th, 2022
Trident, Gurgaon
Abdul  Muneem
Deepak Prasad
Abdul Muneem with Deepak Prasad
In-Person Roundtable
Getting Started with Zero Trust and beyond
Discussion topics will include:
As companies adopt mobile and cloud technologies, perimeter security becomes increasingly difficult to enforce. The need of the hour is to shift access controls from the network perimeter to individual users. Companies have understood that there can no longer be an inherent mutual trust between services and there needs to be a consistent security policy enforcement across services. Is the zero trust framework the answer to this? If yes, how does one go about it?

Join ISMG's Suparna Goswami for...
In
Person Roundtable
New York City
Tuesday, November 15th, 2022
New York City
Tom  Field
Altaz  Valani
Tom Field with Altaz Valani
In Person Roundtable
Software Security: The Call for Developer-Centric Threat Modeling
Discussion topics will include:
You've got the largest potential attack surface in history, and your business-critical applications represent both your greatest opportunities and greatest threats. Application security has never been more urgent.

But how are you currently addressing the need to accelerate application development/deployment with cybersecurity and compliance needs? What are you doing to release secure software faster? What are your current threat modeling practices, and how can they be enhanced?

Register for this executive roundtable, Software Security: The Call for Developer-Centric Threat Modeling,...
In-Person
Roundtable
The Westin Mumbai Powai Lake
Wednesday, November 9th, 2022
The Westin Mumbai Powai Lake
Geetha Nandikotkur
Hatim  Matiwala
Geetha Nandikotkur with Hatim Matiwala
In-Person Roundtable
An Integrated Approach to Embedding Security into DevOps to Establish a Secure Software Development
Discussion topics will include:
When done correctly, most security practitioners say that DevSecOps can transform how businesses can develop and deploy applications securely at a faster pace. However, most organizations still struggle to put it into practice.
As businesses progress with agile development processes, cloud, and DevOps, security needs to integrate with the DevOps process to ensure responsibility is shared and protection is built-in to establish a secure application life-cycle. The key is understanding how developers and security teams can move towards a DevSecOps...
In-Person
Roundtable
Ruth's Chris Steak House Philadelphia
Tuesday, November 8th, 2022
Ruth's Chris Steak House Philadelphia
Tom Field
Tyler Croak
Tom Field with Tyler Croak
In-Person Roundtable
Complexity is the Enemy: How to Simplify Cybersecurity
Discussion topics will include:
The longer you have been doing security, the more complex your environment may be. You are not alone if you struggle with existing point products operating in isolation, on premise solutions that can't operate in the cloud, or siloed security operations and views. There are likely gaps in your security posture, and remote users may have a poor experience. And as attack surfaces - both on premise and in the cloud - only continue to grow, there are just too...
Virtual
Roundtable
Thursday, November 3rd, 2022
Tom Field
Jesse Netz
Tom Field with Jesse Netz
Virtual Roundtable
Advancing Threat Intel to Learn the Adversary's Next Move
Discussion topics will include:
As cybercriminals continue to target organizations with ransomware, API and DDoS attacks, security professionals are under constant pressure to become highly competent not just in threat prevention, but in detection and response. However they often struggle to understand threats and translate them into actionable countermeasures.

High quality defensive knowledge is scarce, and adversaries continue to take advantage of weak points including misconfigured defenses, poor security architectures, and excessive privileges, further reducing the value of investment in security solutions.

Register for...
Virtual
Roundtable
Thursday, November 3rd, 2022
Eric Hyman
Tom Field
Eric Hyman with Tom Field
Virtual Roundtable
SASE Framework: Making the Case for Managed Services
Discussion topics will include:
Software-Defined Wide Area Networking (SD-WAN) and Secure Service Edge (SSE) are two of the major technology trends to emerge from accelerated digital transformation, and they have helped enterprises respond to the new security challenges posed by hybrid work and cloud applications by deploying a Secure Access Service Edge (SASE) framework.

According to Sophos, 54% of companies say their IT departments are not sophisticated enough to handle advanced cyberattacks. And according to IDC, the driving reasons are lack of in-house skills...
In-Person
Roundtable
Palio- San Francisco, CA
Wednesday, November 2nd, 2022
Palio- San Francisco, CA
Tom Field
Chip Witt
Tom Field with Chip Witt
In-Person Roundtable
How Malware Helps Bad Actors Get Away with Online Fraud (and What Enterprises Can Do About It)
Discussion topics will include:
Despite your team’s best efforts to defend against cyberattacks, organizations often lack visibility into when employees and consumers fall victim to the most nefarious type of attack - malware infections. Malware-stolen data is highly valuable to bad actors and is a gateway for them to commit fraud and infiltrate corporate networks.

When your users are affected by malware, it’s too late. Once a botnet is installed (like the infamous RedLine Stealer), cybercriminals have already started to siphon critical information such...
In
Person Roundtable
Modern Steak on Stephen Avenue - Calgary, AB, Canada
Tuesday, November 1st, 2022
Modern Steak on Stephen Avenue - Calgary, AB, Canada
Bob  Reny
Tom Field
Bob Reny with Tom Field
In Person Roundtable
The Future of SIEM: Automate and Accelerate Security at Cloud-Scale
Discussion topics will include:
Cybersecurity teams struggle to keep up with a high volume of alerts with real threats buried in a sea of noise. More, with today's breaches rooted in compromised credentials, it is difficult for defenders to know what is abnormal when everything appears normal. Without a holistic view of an incident and automation to speed investigations, it is difficult to identify, investigate and respond to threats quickly, consistently and accurately. If today’s SIEMs aren’t keeping up, what does the future hold?...
Virtual
Roundtable
Thursday, October 27th, 2022
Fernando  Maymi
Tom Field
Fernando Maymi with Tom Field
Virtual Roundtable
Attack Intelligence: How to Operationalize Timely, Relevant, Actionable Info
Discussion topics will include:
Attack intelligence. Beyond traditional threat intel, it draws on threat detection, visibility and collaboration to deliver information that is at once timely, relevant and actionable. As opposed to traditional threat intel, which describes what could happen to your organization, industry or supply chain, attack intelligence shows what is happening.

But how does one create and receive attack intelligence? How is it different from traditional information sharing? And how do today's most significant cybersecurity threats create a greater need for attack...
In-Person
Roundtable
Mancuso's Restaurant- 201 E. Washington Street, Phoenix, AZ
Tuesday, October 25th, 2022
Mancuso's Restaurant- 201 E. Washington Street, Phoenix, AZ
Eric Hyman
Tom Field
Eric Hyman with Tom Field
In-Person Roundtable
SASE Framework: Making the Case for Managed Services
Discussion topics will include:
Software-Defined Wide Area Networking (SD-WAN) and Secure Service Edge (SSE) are two of the major technology trends to emerge from accelerated digital transformation, and they have helped enterprises respond to the new security challenges posed by hybrid work and cloud applications by deploying a Secure Access Service Edge (SASE) framework.

According to Sophos, 54% of companies say their IT departments are not sophisticated enough to handle advanced cyberattacks. And according to IDC, the driving reasons are lack of in-house skills...
In-Person
Roundtable
Hyatt Regency Phoenix
Tuesday, October 25th, 2022
Hyatt Regency Phoenix
Rick McElroy
Tom  Field
Rick McElroy with Tom Field
In-Person Roundtable
How to Modernize Your SOC (Without Blowing it Up)
Discussion topics will include:
The problems are staring at you: A broader potential attack surface than you've ever had before; more alerts than your systems and staff can monitor, never mind act upon; and recruiting & retaining SOC analysts are harder than ever.

But knowing you need to modernize your SOC is one thing; doing it is quite another. How do you upgrade without a complete rip and replace? How do you gain not just the visibility you need across disparate environments, but context...
Virtual
Roundtable
Thursday, October 20th, 2022
Ameet Naik
Anna Delaney
Ameet Naik with Anna Delaney
Virtual Roundtable
5 Critical Considerations for DDoS Mitigation
Discussion topics will include:
Last June, Cloudflare detected what at the time was the largest distributed denial of service attack on record - 26 million requests per second. Since then, that record has been crushed, and adversaries continue to leverage DDoS attacks for distraction, destruction and as companions to ransomware campaigns.

What are the top trends in both application-layer and network-layer DDoS attacks? What are the ransom attack trends? What are the five critical considerations for mitigating modern DDoS attacks?

Join this session, 5...
Virtual
Roundtable
Thursday, October 20th, 2022
Tom Field
Gary Kneeland
Tom Field with Gary Kneeland
Virtual Roundtable
OT Security: Adapting to Evolving Threat and Business Landscapes
Discussion topics will include:
Through accelerated digital transformation and hybrid work, our critical infrastructure is at risk like never before. And while attacks impacting cyber-physical systems long have been a growing concern, they are now more likely than ever.

Many of these legacy systems were not designed to co-exist seamlessly in a connected environment. And it will take years before a new generation of connected assets emerges with more natively integrated security processes. In the meantime, how do we introduce cybersecurity capabilities that are...
Virtual
Roundtable
Tuesday, October 18th, 2022
Fernando  Maymi
Jeremy Kirk
Fernando Maymi with Jeremy Kirk
Virtual Roundtable
Attack Intelligence: How to Operationalize Timely, Relevant, Actionable Info
Discussion topics will include:
Attack intelligence. Beyond traditional threat intel, it draws on threat detection, visibility and collaboration to deliver information that is at once timely, relevant and actionable. As opposed to traditional threat intel, which describes what could happen to your organization, industry or supply chain, attack intelligence shows what is happening.

But how does one create and receive attack intelligence? How is it different from traditional information sharing? And how do today's most significant cybersecurity threats create a greater need for attack...
In-Person
Roundtable
Empire Steakhouse West, NYC
Tuesday, October 18th, 2022
Empire Steakhouse West, NYC
Tom Field
Gus Evangelakos
Tom Field with Gus Evangelakos
In-Person Roundtable
Better Understanding Cloud Security Risks Through ‘Context’
Discussion topics will include:
In just a few years, cloud conversations have gone from theoretical to critical. And with migrations to the cloud ongoing, many enterprises have had to rethink their security approach. In these environments, some practitioners are charged with expending resources to mitigate “high-severity” CVEs – regardless of how a vulnerability may interact with that IT environment. This risk may pale in comparison, for example, to a malware occurrence at the edge that goes unchecked.

A potential lack of visibility into apps,...
In-Person
Roundtable
Ritz Carlton, Bangalore
Friday, October 14th, 2022
Ritz Carlton, Bangalore
Sandeep  Variyam
Deepak Prasad
Sandeep Variyam with Deepak Prasad
In-Person Roundtable
Zero Trust approach to securing cloud native applications
Discussion topics will include:
With enterprises developing applications at lightning speed, enterprises are able to meet business and customer needs at a rapid pace. This has increased the challenges for developers who now need to work together with the security team to ensure cloud-native applications are protected from attacks. However, traditional security controls don't provide the security needed to protect cloud platforms.

From code changes that have not been tested but slip through to production, to zero-day attacks, runtime applications will continue to require...
Virtual
Roundtable
Thursday, October 13th, 2022
Mathew Schwartz
Jason Ozin
Mathew Schwartz with Jason Ozin
Virtual Roundtable
Cybersecurity and Cyber Insurance Essentials for Retailers in the Ransomware Era
Discussion topics will include:
Ransomware continues to pummel organizations, with the retail sector now being the most-targeted vertical. So it's no surprise retailers are increasingly embracing practices and approaches to help them better lock down networks and payment systems, and to minimize the impact of a successful attack.

Cyber insurance is also part of many retailers' risk-mitigation strategy. But the ongoing success of ransomware as a criminal business model has led to a surge in premiums and insurers demanding more robust defenses from prospective...
In
Person Roundtable
Tuesday, October 11th, 2022
Trevor  Young
Tom  Field
Trevor Young with Tom Field
In Person Roundtable
Software Security: The Call for Developer-Centric Threat Modeling
Discussion topics will include:
You've got the largest potential attack surface in history, and your business-critical applications represent both your greatest opportunities and greatest threats. Application security has never been more urgent.

But how are you currently addressing the need to accelerate application development/deployment with cybersecurity and compliance needs? What are you doing to release secure software faster? What are your current threat modeling practices, and how can they be enhanced?

Register for this executive roundtable, Software Security: The Call for Developer-Centric Threat Modeling,...
In
Person Roundtable
Via Monte Napoleone, Frankfurt
Tuesday, October 11th, 2022
Via Monte Napoleone, Frankfurt
Mat Schwartz
Eyal Greenberg
Mat Schwartz with Eyal Greenberg
In Person Roundtable
How to Quantify Cybersecurity Exposure as Business Risk
Discussion topics will include:
How can CISOs best quantify the cybersecurity risks facing their organisation? Increasingly, business leaders are calling on them to express this not in terms of technical risk, but risk to the business. Such knowledge is crucial for better guiding cybersecurity investments and understanding their return investment (ROI).

Accordingly, how can CISOs best identify and continually track the actual threats facing their organisation? How should they identify and prioritize the attack scenarios — perhaps including data leakage, or a ransomware outbreak...
In
Person Roundtable
Shangri-La Paris
Thursday, October 6th, 2022
Shangri-La Paris
Timothee Bardet
Franck Cohen
Timothee Bardet with Franck Cohen
In Person Roundtable
Comment quantifier les menaces liées à la cybersécurité en termes de risque commercial?
Discussion topics will include:
Comment les RSSI peuvent-ils quantifier au mieux les risques en matière de cybersécurité auxquels fait face leur organisation ? De plus en plus, les dirigeants d’entreprise leur demandent d’exprimer ce risque non pas en termes techniques mais en tant que risque d’entreprise. Ces connaissances sont essentielles pour mieux guider les investissements dans la cybersécurité et envisager leur retour sur investissement (RSI).

De quelle manière, alors, les RSSI peuvent-ils identifier et assurer un suivi constant des menaces réelles qui pèsent sur...
In
Person Roundtable
Chicago
Tuesday, October 4th, 2022
Chicago
Tom Field
Todd Kiehn
Tom Field with Todd Kiehn
In Person Roundtable
SASE Framework: Making the Case for Managed Services
Discussion topics will include:
Software-Defined Wide Area Networking (SD-WAN) and Secure Service Edge (SSE) are two of the major technology trends to emerge from accelerated digital transformation, and they have helped enterprises respond to the new security challenges posed by hybrid work and cloud applications by deploying a Secure Access Service Edge (SASE) framework.

According to Sophos, 54% of companies say their IT departments are not sophisticated enough to handle advanced cyberattacks. And according to IDC, the driving reasons are lack of in-house skills...
Virtual
Roundtable
Tuesday, October 4th, 2022
Gary Kneeland
Tony Morbin
Gary Kneeland with Tony Morbin
Virtual Roundtable
OT Security: Adapting to Evolving Threat and Business Landscapes
Discussion topics will include:
Through accelerated digital transformation and hybrid work, our critical infrastructure is at risk like never before. And while attacks impacting cyber-physical systems long have been a growing concern, they are now more likely than ever.

Many of these legacy systems were not designed to co-exist seamlessly in a connected environment. And it will take years before a new generation of connected assets emerges with more natively integrated security processes. In the meantime, how do we introduce cybersecurity capabilities that are...
In
Person Roundtable
Houston
Thursday, September 29th, 2022
Houston
Mackenzie Kyle
Karthik Kannan
Mackenzie Kyle with Karthik Kannan
In Person Roundtable
Mission Critical: Modernizing Security Operations
Discussion topics will include:
Security operations teams are reaching their breaking point, and new strategies are needed.

According to a new research study by Enterprise Strategy Group, 60% of security professionals surveyed say alert triage is challenging or overwhelming, and 89% of all surveyed security decision makers feel their organization needs a transformational or moderate amount of change in its SOC to mitigate business threats.

But what does modernization actually mean? How can security leaders help their teams to better understand their threat coverage,...
In
Person Roundtable
Selfridges, Oxford Street
Thursday, September 29th, 2022
Selfridges, Oxford Street
Anna Delaney
Jay  Coley
Anna Delaney with Jay Coley
In Person Roundtable
Consumer Services: Securing Applications and APIs
Discussion topics will include:
In efforts to stay agile and reinvent their relationship with customers, some retailers have decentralized their activities and become more composable. This new architecture allows developers to access all APIs, which enables agility and flexibility in the face of digital disruption.

The problem is that this has created new vulnerabilities and vectors for the attackers to exploit. Whether defending against DDoS or bot attacks, securing APIs or OWASP vulnerabilities, security teams need to be able to detect and remediate incidents...
In-Person
Roundtable
Tivoli Mofarrej São Paulo Hotel
Wednesday, September 28th, 2022
Tivoli Mofarrej São Paulo Hotel
Longinus Timochenco
Hilmar Becker
Longinus Timochenco with Hilmar Becker
In-Person Roundtable
Fraudes e Inteligência Artificial: sua empresa está pronta para contra-atacar a nova geração de crimes financeiros?
Discussion topics will include:
É crescente o uso de recursos de inteligência artificial por parte de criminosos cibernéticos para elaborar fraudes financeiras cada vez mais eficientes. Empregando robôs e scripts automatizados, eles conseguem varrer a internet em busca de credenciais comprometidas, roubar identidades digitais e causar danos irreversíveis — quem não sofre ao contabilizar os chargebacks ao final de um mês que atire a primeira pedra. Será que a sua empresa está pronta para lidar com essa nova geração de fraudadores?

Pois saiba que...
In
Person Roundtable
One Moorgate Place
Wednesday, September 28th, 2022
One Moorgate Place
Ilkka Turunen
Tony Morbin
Ilkka Turunen with Tony Morbin
In Person Roundtable
Mitigating Software Supply Chain Risk
Discussion topics will include:
Massive exploits such as the recent Log4j/Log4shell vulnerability are a sign that best practices are still evolving, and the risk of mismanaging, or worse, ignoring open source vulnerabilities, is only becoming greater. It’s time to kick up the gear on open source and software supply chain management conversations.

Join us for an engaging, roundtable conversation on what we need to know about managing open source and software supply chains.

Register for this executive roundtable, Mitigating Software Supply Chain Risk, to...
In
Person Roundtable
Ruth's Chris Steak House St. Louis Downtown
Thursday, September 22nd, 2022
Ruth's Chris Steak House St. Louis Downtown
Tom Field
Jeannie Warner
Tom Field with Jeannie Warner
In Person Roundtable
Seize the Breach with Automation and Analytics
Discussion topics will include:
Breaches happen, and 2021 was a record-breaking year for them. According to Identity Theft Resource Center research, there were 1,291 breaches publicly reported as of Sept. 2021, compared to 1,108 breaches in 2020. That’s a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t stopping the breaches.

Why are SOC and security teams way too limited by legacy SIEM? How can machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response capabilities?

Register...
In
Person Roundtable
One Moorgate Place
Thursday, September 22nd, 2022
One Moorgate Place
Anna Delaney
Jay  Coley
Anna Delaney with Jay Coley
In Person Roundtable
Financial Services: Securing Applications and APIs in Multicloud Environments
Discussion topics will include:
The rapid adoption of hybrid cloud and multicloud services, along with an increasing number of cloud infrastructure and platform services, has created an explosion in complexity and concerns about data security and cloud compliance. It only takes one insecure API in your API supply chain to risk being crippled by long-term financial or reputational damages.

In this executive roundtable we shall discuss best practices to keep your multicloud environments and APIs both secure and performant while empowering your organization to...
In
Person Roundtable
10-11 Carlton House Terrace
Thursday, September 22nd, 2022
10-11 Carlton House Terrace
Tim Arkless
Nick Gibson
Tim Arkless with Nick Gibson
In Person Roundtable
The Path to Simplifying Operational Complexity
Discussion topics will include:
To take your detection and response to the next level, you need to establish where you are in your maturity model, benchmark that against your peers, and identify the next steps that need to be taken. Four key considerations in this process are: visibility, automation; alert handling and threat hunting.

To reduce complexity and relieve the burden of false positives, it’s essential to deploy automated detection and response that can learn from analysts and autonomously respond to day-to-day alert handling....
Virtual
Roundtable
Virtual
Thursday, September 22nd, 2022
Virtual
Rahul Neel Mani
Deepak Prasad
Rahul Neel Mani with Deepak Prasad
Virtual Roundtable
Zero Trust: The DNA of Data Security
Discussion topics will include:
According to a 2021 survey, over 50% of organizations use over 25 systems to manage identities, and
21% use over 100. Despite such preventative measures, a user falls victim to identity theft every two
seconds. With cloud permeating the boundaries of the enterprise, the surface for compromised or
stolen credentials of privileged users and applications has exploded. Zero trust - a vital architectural
shift in security - fills the gap left by old perimeter-based, defense-in-depth models.
Gartner predicts that while...
In
Person Roundtable
Frisco, TX
Tuesday, September 20th, 2022
Frisco, TX
Dave Ferguson
Tom  Field
Dave Ferguson with Tom Field
In Person Roundtable
Software Supply Chain: Threats and Strategies to Reduce Risk
Discussion topics will include:
The 2021 executive order on cybersecurity and recent high-profile incidents including SolarWinds and Log4Shell highlight the fact that an organization's software supply chain must not be overlooked by enterprise security teams. Supply chain risks have emerged in recent years in parallel with fundamental changes in how we develop and consume software.

Over the last decade or so, digital transformation and the need for fast time-to-market have driven new software development practices including agile methodologies, DevOps processes, and the broad use...
In-Person
Roundtable
Ruth's Chris Steakhouse Manhattan- 148 West 51st Street, New York, NY
Thursday, September 15th, 2022
Ruth's Chris Steakhouse Manhattan- 148 West 51st Street, New York, NY
Tom Field
Fawaz Rasheed
Tom Field with Fawaz Rasheed
In-Person Roundtable
How to Modernize Your SOC (Without Blowing it Up)
Discussion topics will include:
The problems are staring at you: A broader potential attack surface than you've ever had before; more alerts than your systems and staff can monitor, never mind act upon; and recruiting & retaining SOC analysts are harder than ever.

But knowing you need to modernize your SOC is one thing; doing it is quite another. How do you upgrade without a complete rip and replace? How do you gain not just the visibility you need across disparate environments, but context...
In-Person
Roundtable
The Grand, Berlin
Thursday, September 15th, 2022
The Grand, Berlin
Ilkka Turunen
Tony Morbin
Ilkka Turunen with Tony Morbin
In-Person Roundtable
Mitigating Software Supply Chain Risk
Discussion topics will include:
Massive exploits such as the recent Log4j/Log4shell vulnerability are a sign that open source software best practices are still evolving. Furthermore, the risk of mismanaging — or worse, ignoring — open source vulnerabilities is only becoming greater.

With the robust use of open source software and software supply chains here to stay, this executive roundtable addresses how you can manage the risks they pose - focusing in on the Oiltanking GmbH cyber-attack.

Attendees will discuss how to proactively protect enterprise...
In
Person Roundtable
Shangri La Paris, France
Thursday, September 15th, 2022
Shangri La Paris, France
Timothee Bardet
Hervé Boutemy
Timothee Bardet with Hervé Boutemy
In Person Roundtable
Les risques logiciels: les meilleures pratiques pour une vraie résilience
Discussion topics will include:
Les récentes vulnérabilités SolarWinds et Log4j/Log4shell ont encore accentué les risques de mal gérer, ou pire, d'ignorer les vulnérabilités des logiciels libres. Il est temps de passer à la vitesse supérieure dans les conversations sur l'open source et la gestion de la chaîne de développement logicielle.

Rejoignez-nous pour une conversation passionnante lors d'un déjeuner à Paris, entre cadres dirigeants IT, sur les meilleures pratiques de gestion de l'open source et des chaînes de développement logiciels.

Inscrivez-vous à cette table ronde...
Virtual
Roundtable
Wednesday, September 14th, 2022
Tyler Croak
Tom Field
Tyler Croak with Tom Field
Virtual Roundtable
Steps to Reducing Ransomware Risk in a Cloud-First World
Discussion topics will include:
In 2021, a debilitating ransomware attack on Colonial Pipeline's IT systems caused both a physical response – the shutdown of the pipeline – and a hefty financial one, with the company paying more than $4 million ransom to restore data. After other high-profile attacks and a whole-of-government emphasis on mitigation in the U.S., it became apparent that ransomware is indeed a national security concern that can cut through every area of an enterprise.

Although there have been periods of relative...
Virtual
roundtable
Wednesday, September 14th, 2022
Jeremy Kirk
Ashlee McCusker
Jeremy Kirk with Ashlee McCusker
Virtual roundtable
Building Customer Relationships Through Secure E-Commerce
Discussion topics will include:
Transacting online is key to driving new and recurring business, but the security risks are ever present. Those risks can translate into problems with customer acquisition and, subsequently, retention. Customers will move to competitors with systems that have less friction.
Sources of risk abound. Bots use stolen credentials to try to log into existing accounts. Screen-scraping bots steal content, pricing information and more, undermining an organisation’s web offerings. Fraudulent traffic and bad traffic can undermine a site’s performance and reputation....
Virtual
Roundtable
Virtual
Tuesday, September 13th, 2022
Virtual
Rick McElroy
Tom  Field
Rick McElroy with Tom Field
Virtual Roundtable
How to Modernize Your SOC (Without Blowing it Up)
Discussion topics will include:
The problems are staring at you: A broader potential attack surface than you've ever had before; more alerts than your systems and staff can monitor, never mind act upon; and recruiting & retaining SOC analysts are harder than ever.

But knowing you need to modernize your SOC is one thing; doing it is quite another. How do you upgrade without a complete rip and replace? How do you gain not just the visibility you need across disparate environments, but context...
In-Person
Roundtable
The Ritz-Carlton, Bengaluru
Tuesday, September 13th, 2022
The Ritz-Carlton, Bengaluru
Abdul  Muneem
Anubhav  Wahie
Abdul Muneem with Anubhav Wahie
In-Person Roundtable
Getting Started With Zero Trust and Beyond
Discussion topics will include:
As companies adopt mobile and cloud technologies, perimeter security becomes increasingly difficult to enforce. The need of the hour is to shift access controls from the network perimeter to individual users. Companies have understood that there can no longer be an inherent mutual trust between services and there needs to be a consistent security policy enforcement across services. Is the zero trust framework the answer to this? If yes, how does one go about it?

Join ISMG's Suparna Goswami for...
Virtual
Roundtable
Virtual
Thursday, September 8th, 2022
Virtual
Rick McElroy
Tom  Field
Rick McElroy with Tom Field
Virtual Roundtable
How to Modernize Your SOC (Without Blowing it Up)
Discussion topics will include:
The problems are staring at you: A broader potential attack surface than you've ever had before; more alerts than your systems and staff can monitor, never mind act upon; and recruiting & retaining SOC analysts are harder than ever.

But knowing you need to modernize your SOC is one thing; doing it is quite another. How do you upgrade without a complete rip and replace? How do you gain not just the visibility you need across disparate environments, but context...
Virtual
Roundtable
Thursday, September 8th, 2022
Mike Britton
Michael Novinson
Mike Britton with Michael Novinson
Virtual Roundtable
Email Security: Changing the Game Against Game-Changing Attacks?
Discussion topics will include:
Phishing. Business email compromise. Executive impersonation. Ransomware. Today's email-borne threats are sophisticated, targeted and come at a relentless scale. There’s little denying that they are game-changing.

But can you say the same about your email defenses? Is email security the priority it should be for your enterprise, or are you trying to counter 2022 attacks with 2012 defenses? How do you hope to upgrade your defenses, and what will it take to obtain the resources you need?

Join this session,...
Virtual
Roundtable
Thursday, September 8th, 2022
Michael Lyborg
Matthias Straub
Michael Lyborg with Matthias Straub
Virtual Roundtable
Why Automation is Essential to Prevent Cyber Attacks
Discussion topics will include:
With cyberattacks on the rise and fears of international escalation in cyberspace, security teams are actively working to bolster defense. But with the prevalence of security rising, the gulf between today's workforce and its needs is vast. This leaves CISOs under-resourced and analysts in the SOC spread thin. Enter "Security Orchestration, Automation, and Response," or SOAR, tools.

Without automated tools to centralize event data and improve incident response, tasks delegated to "humans" can get tedious and overwhelming – causing a...
In-Person
Roundtable
Hotel Villa Dagmar
Tuesday, September 6th, 2022
Hotel Villa Dagmar
Mathew  Schwartz
Ilkka Turunen
Mathew Schwartz with Ilkka Turunen
In-Person Roundtable
Sweden’s NATO Application: Impact on Supply Chain Risk and Resilience
Discussion topics will include:
Massive exploits such as the recent Log4j/Log4shell vulnerability are a sign that open source software best practices are still evolving. Furthermore, the risk of mismanaging — or worse, ignoring — open source vulnerabilities is only becoming greater.

As the robust use of open source software and software supply chains remains here to stay, this executive roundtable addresses how you can deal with the risks they pose, while ensuring both remain safe to use.

Attendees will discuss how to more proactively...
In
Person Roundtable
Ruth's Chris Steak House Boston
Thursday, August 25th, 2022
Ruth's Chris Steak House Boston
Jonathan  Trull
Tom Field
Jonathan Trull with Tom Field
In Person Roundtable
Measuring the Maturity of Your Cloud Security Program
Discussion topics will include:
Amidst the accelerated digital transformation of the past two years, enterprises across sectors have gone from dipping their toes in the cloud to being fully immersed in multi-cloud environments. At the same time, they've encountered the reality: Security in the cloud is a different animal, and it requires unique skills.

What does cloud security maturity look like? Where is your organization on the road to maturity? How do you measure progress - and gain access to the right talent?

Register...
In-person
Roundtable
Pullman New Delhi Aerocity
Wednesday, August 24th, 2022
Pullman New Delhi Aerocity
Jitendra Sharma
Prabhu  Paulson K R
Jitendra Sharma with Prabhu Paulson K R
In-person Roundtable
Cloud Done Right: Cost-Effective, Agile Architecture for Speed and Scale
Discussion topics will include:
Whether you’re developing cloud-native workloads or doing a lift and shift of the existing applications, there are many considerations before making a decisive move. Concerns for reliability, efficiency, agility, and operational excellence are topmost as they directly impact the business. To tackle this, technology organizations need a platform that leverages automation and intelligence, and offers observability, automation, and intelligence for better context and actionable insights.

DynamicCIO (an ISMG initiative) and Dynatrace-AWS invite you for an exclusive executive roundtable discussion on...
In-Person
Roundtable
Ruth's Chris Steak House Minneapolis
Tuesday, August 23rd, 2022
Ruth's Chris Steak House Minneapolis
Tom Field
Andrew Yorra
Tom Field with Andrew Yorra
In-Person Roundtable
Software Supply Chains: A Look into the Future
Discussion topics will include:
If you thought 2021 was the year of the software supply chain, just wait until you see what unfolds in 2022.

Massive exploits such as the recent Log4j/Log4shell vulnerability are a sign that best practices are still evolving, and the risk of mismanaging, or worse, ignoring open source vulnerabilities, is only becoming greater. And with even the President of the U.S. calling out the need for software bills of materials, it’s time to kick up the gear on open source...
Virtual
Roundtable
Thursday, August 18th, 2022
Tom Field
Jesse Netz
Tom Field with Jesse Netz
Virtual Roundtable
Advancing Threat Intel to Learn the Adversary's Next Move
Discussion topics will include:
As cybercriminals continue to target organizations with ransomware, API and DDoS attacks, security professionals are under constant pressure to become highly competent not just in threat prevention, but in detection and response. However they often struggle to understand threats and translate them into actionable countermeasures.

High quality defensive knowledge is scarce, and adversaries continue to take advantage of weak points including misconfigured defenses, poor security architectures, and excessive privileges, further reducing the value of investment in security solutions.

Register for...
Virtual
Roundtable
Wednesday, August 17th, 2022
Tom Field
Tyler Croak
Tom Field with Tyler Croak
Virtual Roundtable
Steps to Reducing Ransomware Risk in a Cloud-First World
Discussion topics will include:
In 2021, a debilitating ransomware attack on Colonial Pipeline's IT systems caused both a physical response – the shutdown of the pipeline – and a hefty financial one, with the company paying more than $4 million ransom to restore data. After other high-profile attacks and a whole-of-government emphasis on mitigation in the U.S., it became apparent that ransomware is indeed a national security concern that can cut through every area of an enterprise.

Although there have been periods of relative...
Virtual
Roundtable
Wednesday, August 17th, 2022
Deepak Prasad
Anubhav  Wahie
Deepak Prasad with Anubhav Wahie
Virtual Roundtable
SOC Modernization: Simplify Operations; Multiply Impact
Discussion topics will include:
With an increasing digital footprint and sophisticated cyber adversaries, enterprises require extraordinary efforts to enhance their SOC capabilities to overcome alert fatigue, siloed functions, skills shortage, and improve 360-degree visibility. Security operations need to transform into an innate and proactive defense mechanism to withstand the surge in disruptive cyberattacks. On one hand, the CISOs and CIOs need to declutter and simplify their security operations, and on the other, they need to hyperautomate the mechanisms to ingest the right datasets to...
Virtual
Roundtable
Tuesday, August 16th, 2022
Tom Field
Sean Frazier
Tom Field with Sean Frazier
Virtual Roundtable
Cybersecurity Executive Order: One Year Later
Discussion topics will include:
The Executive Order on Improving the Nation’s Cybersecurity was groundbreaking. Signed last May, it mandated Zero Trust adoption across the government and recognized the importance of cloud adoption, cyber best practices, software supply chain integrity, and high-quality code.

Following several deadlines to date - in NIST defining critical software, the NTIA outlining minimum SBOM standards and more - agencies continue to move away from outdated security practices and toward new standards to, in turn, reduce vulnerabilities, boost cyber resilience, and...
In-Person
Roundtable
Ocean Prime- 2101 Cedar Springs Rd, Dallas TX 75201
Thursday, August 11th, 2022
Ocean Prime- 2101 Cedar Springs Rd, Dallas TX 75201
Tom Field
Chip Witt
Tom Field with Chip Witt
In-Person Roundtable
How Malware Helps Bad Actors Get Away with Online Fraud (and What Enterprises Can Do About It)
Discussion topics will include:
Despite your team’s best efforts to defend against cyberattacks, organizations often lack visibility into when employees and consumers fall victim to the most nefarious type of attack - malware infections. Malware-stolen data is highly valuable to bad actors and is a gateway for them to commit fraud and infiltrate corporate networks.

When your users are affected by malware, it’s too late. Once a botnet is installed (like the infamous RedLine Stealer), cybercriminals have already started to siphon critical information such...
Virtual
Roundtable
Wednesday, August 10th, 2022
Subbu  Subramanian
Suraj Pandey
Subbu Subramanian with Suraj Pandey
Virtual Roundtable
Accelerate Your Cloud Migration Strategy to Modernize Applications
Discussion topics will include:
The interest in multi-cloud adoption has shown an upward trend as C-level executives take deployment decisions. To stay competitive, companies are now modernizing applications across the board.

While multi-cloud architecture has become the new reality of corporate IT, it presents a new set of challenges to achieve the agility and scalability needed to keep up with the pace of digital transformation.

However, the move to multi-cloud environments has made it challenging for enterprises to optimize infrastructure performance and resource consumption....
Virtual
Roundtable
Virtual
Tuesday, August 9th, 2022
Virtual
Tom  Field
David Balcar
Tom Field with David Balcar
Virtual Roundtable
How to Modernize Your SOC (Without Blowing it Up)
Discussion topics will include:
The problems are staring at you: A broader potential attack surface than you've ever had before; more alerts than your systems and staff can monitor, never mind act upon; and recruiting & retaining SOC analysts are harder than ever.
But knowing you need to modernize your SOC is one thing; doing it is quite another. How do you upgrade without a complete rip and replace? How do you gain not just the visibility you need across disparate environments, but context...
VIrtual
Roundtable
Tuesday, August 9th, 2022
Anna Delaney
Malcolm Murphy
Anna Delaney with Malcolm Murphy
VIrtual Roundtable
Protecting Your Brand from Impersonation Scams
Discussion topics will include:
Retail scams, business email compromise, supply chain impersonation, and money mule recruitment campaigns are just a few of the types of brand exploitation attacks targeting businesses with an online presence.

Frost & Sullivan’s Global State of Online Digital Trust reports that 78% of consumers indicate that it’s crucial that their personal information be protected online, and 48% have stopped using an online service when it’s subject to a breach. How are you protecting your brand from sophisticated social engineering techniques?...
In-Person
Roundtable
Tivoli Mofarrej São Paulo Hotel
Thursday, August 4th, 2022
Tivoli Mofarrej São Paulo Hotel
Longinus Timochenco
Hilmar Becker
Longinus Timochenco with Hilmar Becker
In-Person Roundtable
Fraudes e Inteligência Artificial: sua empresa está pronta para contra-atacar a nova geração de crimes financeiros?
Discussion topics will include:
É crescente o uso de recursos de inteligência artificial por parte de criminosos cibernéticos para elaborar fraudes financeiras cada vez mais eficientes. Empregando robôs e scripts automatizados, eles conseguem varrer a internet em busca de credenciais comprometidas, roubar identidades digitais e causar danos irreversíveis — quem não sofre ao contabilizar os chargebacks ao final de um mês que atire a primeira pedra. Será que a sua empresa está pronta para lidar com essa nova geração de fraudadores?

Pois saiba que...
Virtual
Roundtable
Virtual
Thursday, August 4th, 2022
Virtual
Rick McElroy
Tom  Field
Rick McElroy with Tom Field
Virtual Roundtable
How to Modernize Your SOC (Without Blowing it Up)
Discussion topics will include:
The problems are staring at you: A broader potential attack surface than you've ever had before; more alerts than your systems and staff can monitor, never mind act upon; and recruiting & retaining SOC analysts are harder than ever.

But knowing you need to modernize your SOC is one thing; doing it is quite another. How do you upgrade without a complete rip and replace? How do you gain not just the visibility you need across disparate environments, but context...
Virtual
Roundtable
Canada
Wednesday, August 3rd, 2022
Canada
Jameeka Green Aaron
Tony Morbin
Jameeka Green Aaron with Tony Morbin
Virtual Roundtable
Using CIAM to Disrupt the Economics of Attackers
Discussion topics will include:
Deception for crime or warfare is an established tactic used by attackers, probably as old as humanity. Even in today’s online world, fake and stolen identity are primary routes for attackers to gain unauthorized access to an organization's digital assets, networks, or systems. In fact a recent report found that 79% of organizations have experienced an identity-related security breach in the last two years.

Reliably establishing and authenticating the identities of those we choose to trust online enables us to...
Virtual
Roundtable
Tuesday, August 2nd, 2022
Tom Field
Mike Britton
Tom Field with Mike Britton
Virtual Roundtable
Email Security: Changing the Game Against Game-Changing Attacks?
Discussion topics will include:
Phishing. Business email compromise. Executive impersonation. Ransomware. Today's email-borne threats are sophisticated, targeted and come at a relentless scale. There’s little denying that they are game-changing.

But can you say the same about your email defenses? Is email security the priority it should be for your enterprise, or are you trying to counter 2022 attacks with 2012 defenses? How do you hope to upgrade your defenses, and what will it take to obtain the resources you need?

Join this session,...
In
Person Roundtable
Ruth's Chris Steak House Manhattan
Thursday, July 28th, 2022
Ruth's Chris Steak House Manhattan
Mackenzie Kyle
Karthik Kannan
Mackenzie Kyle with Karthik Kannan
In Person Roundtable
Mission Critical: Modernizing Security Operations
Discussion topics will include:
Security operations teams are reaching their breaking point, and new strategies are needed.

According to a new research study by Enterprise Strategy Group, 60% of security professionals surveyed say alert triage is challenging or overwhelming, and 89% of all surveyed security decision makers feel their organization needs a transformational or moderate amount of change in its SOC to mitigate business threats.

But what does modernization actually mean? How can security leaders help their teams to better understand their threat coverage,...
Virtual
Roundtable
Wednesday, July 27th, 2022
Tyler Croak
Tom Field
Tyler Croak with Tom Field
Virtual Roundtable
Steps to Reducing Ransomware Risk in a Cloud-First World
Discussion topics will include:
In 2021, a debilitating ransomware attack on Colonial Pipeline's IT systems caused both a physical response – the shutdown of the pipeline – and a hefty financial one, with the company paying more than $4 million ransom to restore data. After other high-profile attacks and a whole-of-government emphasis on mitigation in the U.S., it became apparent that ransomware is indeed a national security concern that can cut through every area of an enterprise.

Although there have been periods of relative...
In-Person
Roundtable
Ruth's Chris Steakhouse Uptown
Thursday, July 21st, 2022
Ruth's Chris Steakhouse Uptown
Andy Ellis
Tom Field
Andy Ellis with Tom Field
In-Person Roundtable
Better Understanding Cloud Security Risks Through ‘Context’
Discussion topics will include:
In just a few years, cloud conversations have gone from theoretical to critical. And with migrations to the cloud ongoing, many enterprises have had to rethink their security approach. In these environments, some practitioners are charged with expending resources to mitigate “high-severity” CVEs – regardless of how a vulnerability may interact with that IT environment. This risk may pale in comparison, for example, to a malware occurrence at the edge that goes unchecked.

A potential lack of visibility into apps,...
Virtual
Roundtable
Thursday, July 21st, 2022
Briana Farro
Dave Perera
Briana Farro with Dave Perera
Virtual Roundtable
Advancing Threat Intel to Learn the Adversary's Next Move
Discussion topics will include:
As cybercriminals continue to target organizations with ransomware, API and DDoS attacks, security professionals are under constant pressure to become highly competent not just in threat prevention, but in detection and response. However they often struggle to understand threats and translate them into actionable countermeasures.

High quality defensive knowledge is scarce, and adversaries continue to take advantage of weak points including misconfigured defenses, poor security architectures, and excessive privileges, further reducing the value of investment in security solutions.

Register for...
Virtual
Roundtable
Wednesday, July 20th, 2022
Tom Field
Shashi  Prakash
Tom Field with Shashi Prakash
Virtual Roundtable
Managing Risk Outside Your Four Walls: Strategies for Protecting Your External Attack Surface
Discussion topics will include:
Security practitioners are increasingly put to task to address threats and risks occurring outside the traditional four walls of the enterprise. Referred to as a company’s external attack surface, it comprises typosquat domains; fake websites, apps, and ads; counterfeit sales; email compromise; and social media fraud.

And with technology stacks piling high, security teams are increasingly looking for efficient engines that can detect and act against these external activities in real time - including scams propagated through multiple platforms and...
Virtual
Roundtable
Wednesday, July 20th, 2022
Tom Field
David Balcar
Tom Field with David Balcar
Virtual Roundtable
Retail Security in a Time of Digital Transformation
Discussion topics will include:
With scores of active accounts, deep PII and stacks of legacy technology, the retail and hospitality industries remain top targets for cyber criminals. The accelerated digital transformation has also fueled new fraud attempts on point of sale systems, payment card accounts and third-party suppliers.

How has the retail/hospitality attack surface shifted in the past year? What have cybersecurity leaders learned about protecting card transactions and point of sale systems? What supply chain lessons must be learned from the SolarWinds breach?...
In
Person Roundtable
10-11 Carlton House Terrace
Wednesday, July 20th, 2022
10-11 Carlton House Terrace
Tehal Gataura
Bruce Hogg
Tehal Gataura with Bruce Hogg
In Person Roundtable
Modernising Data Security for Complex Environments
Discussion topics will include:
The rapid adoption of hybrid cloud and multicloud services, along with an increasing number of cloud infrastructure and platform services, has created an explosion in complexity and concerns about data security and cloud compliance.

Common challenges for organizations include; a lack of visibility and decentralized governance across multiple environments, a lack of internal consensus about how cloud compliance should be handled and the inability to get real-time, accurate and actionable insights to detect and respond to threats.

Moreover, noncompliance with...
Virtual
Roundtable
Wednesday, July 20th, 2022
Brian Pereira
Denis Donnelly
Brian Pereira with Denis Donnelly
Virtual Roundtable
Securing Hybrid Work Environments - The Need for a New Approach
Discussion topics will include:
Hybrid work locations are becoming permanent for many organizations. These hybrid models continue to present many challenges. How does one secure the remote workforce with ever increasing successful attacks, an expanding attack surface, and impact? How do you collate ever more security data from scattered endpoints and then harness it for threat detection?

Traditional security solutions will not suffice to do this. Attackers are thinking different and so must organizations.

A new generation of cloud-based threat intelligence solutions will be...
In
Person Roundtable
Morton's The Steakhouse – Wacker Place
Tuesday, July 19th, 2022
Morton's The Steakhouse – Wacker Place
Jonathan  Trull
Tom Field
Jonathan Trull with Tom Field
In Person Roundtable
Measuring the Maturity of Your Cloud Security Program
Discussion topics will include:
Amidst the accelerated digital transformation of the past two years, enterprises across sectors have gone from dipping their toes in the cloud to being fully immersed in multi-cloud environments. At the same time, they've encountered the reality: Security in the cloud is a different animal, and it requires unique skills.

What does cloud security maturity look like? Where is your organization on the road to maturity? How do you measure progress - and gain access to the right talent?

Register...
Virtual
Roundtable
Tuesday, July 19th, 2022
Brad LaPorte
Cal Harrison
Brad LaPorte with Cal Harrison
Virtual Roundtable
Are You Prepared for Attack Surface Management v2.0?
Discussion topics will include:
Among the lessons learned from the Log4j zero-day: Your enterprise's attack surface is no longer stopping at your ‘four walls.’ In fact according to a recent survey by Anchore, over half of the companies surveyed were targeted by software supply chain attacks in 2021.

The term "attack surface management" was coined by former Gartner analyst Brad LaPorte in 2019. But in 2022, enterprises need to embrace what LaPorte calls Attack Surface Management v2.0 - where with one well-integrated tool, security...
Virtual
Roundtable
Villa Merton
Tuesday, July 19th, 2022
Villa Merton
Iain Swaine
Christian Pyrros
Iain Swaine with Christian Pyrros
Virtual Roundtable
Fast-Moving Financial Fraud: How Well-Protected is Your Financial Institution?
Discussion topics will include:
With Global financial markets at a historical turning point, we’re meeting to address how banks and financial organisations in Germany can stay ahead of state-sponsored cyber gangs, brooding black swan attacks and crypto-jacking fraud.

Whilst ‘traditional’ online banking fraud remains a consistent threat, more advanced social engineering presents the need for banks and critical infrastructure to gain deeper visibility into risk.

This executive discussion will provide insights into the warnings issued by BaFin to address how German banks can prepare...
Virtual
Roundtable
Wednesday, July 13th, 2022
Rick McElroy
Tom  Field
Rick McElroy with Tom Field
Virtual Roundtable
How to Modernize Your SOC (Without Blowing it Up)
Discussion topics will include:
The problems are staring at you: A broader potential attack surface than you've ever had before; more alerts than your systems and staff can monitor, never mind act upon; and recruiting & retaining SOC analysts are harder than ever.

But knowing you need to modernize your SOC is one thing; doing it is quite another. How do you upgrade without a complete rip and replace? How do you gain not just the visibility you need across disparate environments, but context...
Virtual
Roundtable
Tuesday, July 12th, 2022
Jason Georgi
Danielle Syvertsen
Jason Georgi with Danielle Syvertsen
Virtual Roundtable
Zero Trust and SASE: Embracing Today's Workforce Security Solutions for the Financial Sector
Discussion topics will include:
Zero Trust and Secure Access Service Edge allow Financial Services enterprises to leave behind the challenges of legacy security approaches, secure their systems and support innovative and competitive ways of working.

But new strategies come with the need for new skills and tools. How is your FinServ organization embracing Zero Trust, cloud migration and SASE against competing priorities? How are you balancing in-house and outsourced resources to manage your transformation? What security gaps are evident as you secure this here-to-stay...
In
Person Roundtable
New York City - Convene
Tuesday, July 12th, 2022
New York City - Convene
Tom Field
Chris Eng
Tom Field with Chris Eng
In Person Roundtable
Software Security: How to Prioritize, Measure and Convey it to the Board
Discussion topics will include:
Amidst the shifting threat landscape in the healthcare sector, cloud migration and ongoing digital transformation, software security is often low or even last on the list of priorities for security leaders to address.
Yet, with the 2021 presidential executive order on cybersecurity, and as headlines continue to feature high-profile breaches, board members at healthcare organizations - and across all industries - are taking notice. Even though there are often designated technical experts on boards, there is now an increased awareness...
Virtual
Roundtable
Thursday, July 7th, 2022
Tom Field
Mike Britton
Tom Field with Mike Britton
Virtual Roundtable
Email Security: Changing the Game Against Game-Changing Attacks?
Discussion topics will include:
Phishing. Business email compromise. Executive impersonation. Ransomware. Today's email-borne threats are sophisticated, targeted and come at a relentless scale. There’s little denying that they are game-changing.

But can you say the same about your email defenses? Is email security the priority it should be for your enterprise, or are you trying to counter 2022 attacks with 2012 defenses? How do you hope to upgrade your defenses, and what will it take to obtain the resources you need?

Join this session,...
In-Person
Roundtable
Conrad Bengaluru,25/3, Kensington Rd, Ulsoor, Bengaluru, 560008
Thursday, July 7th, 2022
Conrad Bengaluru,25/3, Kensington Rd, Ulsoor, Bengaluru, 560008
Geetha  Nandikotkur
Murali  Urs
Geetha Nandikotkur with Murali Urs
In-Person Roundtable
Practical Steps to Security Management: Accelerating Your Response Mechanism
Discussion topics will include:
As organizations become vulnerable to threats and attacks, the big question is how to accelerate their incident response mechanism by effectively managing their security and controls.

The concerns are justified because the average volume of attacks and breaches has increased rapidly, with the bad guys creating significant business loss, downtime, and the cost of response going up.

The significant challenge for CISOs is to monitor their alerts in real-time and take appropriate action based on defined policies, an effective risk...
Virtual
Roundtable
Wednesday, July 6th, 2022
Tom Field
Michael Lyborg
Tom Field with Michael Lyborg
Virtual Roundtable
The Many Benefits of Security Automation
Discussion topics will include:
With cyberattacks on the rise and fears of international escalation in cyberspace, security teams are actively working to bolster defense. But with the prevalence of security rising, the gulf between today's workforce and its needs is vast. This leaves CISOs under-resourced and analysts in the SOC spread thin. Enter "Security Orchestration, Automation, and Response," or SOAR, tools.

Without automated tools to centralize event data and improve incident response, tasks delegated to "humans" can get tedious and overwhelming – causing a...
Virtual
Roundtable
Wednesday, July 6th, 2022
Jeremy Kirk
Fabio Fratucello
Jeremy Kirk with Fabio Fratucello
Virtual Roundtable
Detection and Response: Closing Gaps that Adversaries Exploit
Discussion topics will include:
Adversaries are continually exploiting organisations faster than ever. The time between an adversary gaining access to a system to launching an attack is now coming down to just minutes. If defence teams miss an alert or an automated defensive response doesn't take place, it could result in an adversary making a successful breach or a ransomware attack.

Security technologies are an alphabet soup. XDR, or extended detection and response, is one of the latest acronyms. But what does XDR mean,...
Virtual
Roundtable
Virtual
Thursday, June 30th, 2022
Virtual
Barret Kaubisch
Tom Field
Barret Kaubisch with Tom Field
Virtual Roundtable
Strategies to Catch Synthetic ID Fraud
Discussion topics will include:
Synthetic identity fraud — where criminals use a combination of real and fake information to create a fictitious identity and then open counterfeit accounts to make fraudulent purchases — costs banks $6 billion dollars annually and is one of the fastest growing types of financial crime in the U.S., according to the FBI.

Traditional fraud tools that were designed to capture stolen identities do not serve well in solving synthetic identity problems. Unlike stolen identity information, where fraudsters act quickly...
Virtual
Roundtable
Virtual
Thursday, June 30th, 2022
Virtual
Chris Campbell
Mathew Schwartz
Chris Campbell with Mathew Schwartz
Virtual Roundtable
Microsegmentation: Best Practices for Blocking and Containing Breaches in Financial Services
Discussion topics will include:
Running an effective cybersecurity program doesn't just require hoping for the best, but planning for the worst. Despite an organisation's best efforts, attackers nevertheless manage to breach their defenses and steal regulated customer data, unleash crypto-locking malware and more.

Organisations in the financial services sector have been looking to protect their network by reducing the attack surface, containing the impact of an intrusion and stopping lateral movement. The way to achieve these goals is through software-defined microsegmentation.

How can organisations...
Virtual
Roundtable
Tuesday, June 28th, 2022
Jameeka Green Aaron
Tony Morbin
Jameeka Green Aaron with Tony Morbin
Virtual Roundtable
Using CIAM to Disrupt the Economics of Attackers
Discussion topics will include:
Deception for crime or warfare is an established tactic used by attackers, probably as old as humanity. Even in today’s online world, fake and stolen identity are primary routes for attackers to gain unauthorized access to an organization's digital assets, networks, or systems. In fact a recent report found that 79% of organizations have experienced an identity-related security breach in the last two years.

Reliably establishing and authenticating the identities of those we choose to trust online enables us to...
In
Person Roundtable
Amsterdam - Venue TBA
Tuesday, June 28th, 2022
Amsterdam - Venue TBA
Paul Horton
Mathew Schwartz
Paul Horton with Mathew Schwartz
In Person Roundtable
Software Supply Chains: A Look into the Future
Discussion topics will include:
Massive exploits such as the recent Log4j/Log4shell vulnerability are a sign that best practices are still evolving, and the risk of mismanaging, or worse, ignoring open source vulnerabilities, is only becoming greater. It’s time to kick up the gear on open source and software supply chain management conversations.

Join us for an engaging, round-table conversation on what we need to know about managing open source and software supply chains in 2022.

Register for this executive roundtable, Software Supply Chains: A...
Virtual
Roundtable
Tuesday, June 28th, 2022
Anna Delaney
Keiron Holyome
Anna Delaney with Keiron Holyome
Virtual Roundtable
New Strategies for Readiness, Response, Recovery
Discussion topics will include:
Whether it's Log4j, SolarWinds or rising geopolitical tensions, anticipating cyber incidents has never been more challenging. The need for security leaders to demonstrate "cyber readiness" to the executive board is now crucial.

A useful tool to follow is the NIST Cybersecurity Framework but too often security teams prioritize the "identify", "protect", and "detect" functions, over "respond" and recover". Shifting greater focus to response and recovery will not only highlight vulnerabilities to the executive but also help increase funding across all...
Virtual
Roundtable
Thursday, June 23rd, 2022
Iain Swaine
Christian Pyrros
Iain Swaine with Christian Pyrros
Virtual Roundtable
Fast-Moving Financial Fraud: How Well-Protected is Your Financial Institution?
Discussion topics will include:
Global financial markets are at a historical turning point. While headlines are talking about Covid-19, crypto-currencies and QE, threat actors are working smarter to execute attacks. You already know the diversity of threats: from state-sponsored cyber gangs, quants in collapsed countries, or brooding black swans, it’s tough to stay protected. But with the coexistence of ‘traditional’ online banking fraud and more advanced social engineering, the need to gain deeper visibility into risk is now greater than before.

Register for this...
Virtual
Roundtable
Wednesday, June 22nd, 2022
Stephen Boyer
Anna Delaney
Stephen Boyer with Anna Delaney
Virtual Roundtable
Drive Accountability with Cyber Risk Governance
Discussion topics will include:
Cyber risk governance defines how an organization plans to protect itself from cyber events and threats. Governance describes the process for how to build a cybersecurity program, but doesn’t necessarily inform the effectiveness of your programs and policies. Without uniform performance targets defined in the governance policies, security leaders won’t know if their security controls are performing to their standards or if they’re within the bounds of their risk appetite.

To stay cyber resilient, forward-thinking security leaders need to measure...
In-Person
Roundtable
Sofitel Hotel | Bandra Kurla Complex, Bandra East, Mumbai
Wednesday, June 22nd, 2022
Sofitel Hotel | Bandra Kurla Complex, Bandra East, Mumbai
Geetha  Nandikotkur
Murali  Urs
Geetha Nandikotkur with Murali Urs
In-Person Roundtable
Practical Steps to Security Management: Accelerating Your Response Mechanism
Discussion topics will include:
As organizations become vulnerable to threats and attacks, the big question is how to accelerate their incident response mechanism by effectively managing their security and controls.

The concerns are justified because the average volume of attacks and breaches has increased rapidly, with the bad guys creating significant business loss, downtime, and the cost of response going up.

The significant challenge for CISOs is to monitor their alerts in real-time and take appropriate action based on defined policies, an effective risk...
In
Person Roundtable
NYC (Venue TBD)
Tuesday, June 21st, 2022
NYC (Venue TBD)
Tom Field
Chris Wysopal
Tom Field with Chris Wysopal
In Person Roundtable
Software Security: How to Prioritize, Measure and Convey It To the Board
Discussion topics will include:
Amidst the shifting threat landscape, cloud migration and ongoing digital transformation, software security is often low or even last on the list of priorities for security leaders to address.

Yet, with the recent executive order on cybersecurity, and as headlines continue to feature high-profile breaches, board members at organizations across all industries are taking notice. Even though there are often designated technical experts on boards, there is now an increased awareness around cybersecurity – especially software security – even among...
Virtual
Roundtable
Virtual
Tuesday, June 21st, 2022
Virtual
Fernando  Maymi
Tony Morbin
Fernando Maymi with Tony Morbin
Virtual Roundtable
Collective Defense: How to Secure the Finance Sector through Collaboration in Cybersecurity
Discussion topics will include:
When it comes to cybersecurity, financial firms often face limited visibility of unknown cyber threats (especially in today’s new hybrid work environments), insider threats, the ongoing skills shortage, and a high volume of attacks with the financial sector facing the most of any sector.
How can the finance sector raise its security posture by collaborating in real time — without any one firm losing its c