Solving the Skills Gap with Managed Services
5 Critical Considerations for DDoS Mitigation
New Age Security Challenges for Cloud-Native Applications
How to Modernize Your SOC (Without Blowing it Up)
OT Security: Adapting to Evolving Threat and Business Landscapes
Answering The Big Questions About SASE and Zero Trust
Achieving Operational Resilience in Financial Sector
Securing a Hybrid, Mobile-First Workplace
Cyber Recovery: The Best Defense Against Paying Ransomware
OT Security: Adapting to Evolving
Solving the Skills Gap with Managed Services
5 Critical Considerations for DDoS Mitigation
How Can Business Infrastructure Become More Resilient and Trusted?
OT Security: Adapting to Evolving Threat and Business Landscapes
Securing Your Cyber-Physical Landscape
OT Security: Adapting to Evolving Threat
Upcoming Roundtables
In
Person Roundtable
One Moorgate Place, London
Tuesday, December 6th, 2022
One Moorgate Place, London
Paul  Fryer
Anna Delaney
Paul Fryer with Anna Delaney
In Person Roundtable
Solving the Skills Gap with Managed Services
Discussion topics will include:
Being prepared to respond to today's security incidents means acquiring and maintaining both the tools and the expertise to successfully detect attacks and stop them before serious damage is done. However, with the diversity and complexity of threats on the rise, security teams find themselves drowning in data and overwhelmed by the immense volume of alerts, many of them false positives.

With a shortage of 4 million cybersecurity workers globally and 75% of SMBs saying they lack the personnel to...
Virtual
Roundtable
Tuesday, December 6th, 2022
Tom  Field
Ameet Naik
Tom Field with Ameet Naik
Virtual Roundtable
5 Critical Considerations for DDoS Mitigation
Discussion topics will include:
Last June, Cloudflare detected what at the time was the largest distributed denial of service attack on record - 26 million requests per second. Since then, that record has been crushed, and adversaries continue to leverage DDoS attacks for distraction, destruction and as companions to ransomware campaigns.

What are the top trends in both application-layer and network-layer DDoS attacks? What are the ransom attack trends? What are the five critical considerations for mitigating modern DDoS attacks?

Join this session, 5...
In-Person
Roundtable
Jio World Convention Centre
Wednesday, December 7th, 2022
Jio World Convention Centre
Sandeep  Agarwal
Sandeep Variyam
Sandeep Agarwal with Sandeep Variyam
In-Person Roundtable
New Age Security Challenges for Cloud-Native Applications
Discussion topics will include:
Nearly 70% of organizations host more than half their workloads in the cloud, up from 31% in 2020. Cloud is the future. As migration to the cloud continues, organizations struggle with application development security. With organizations adopting a cloud-native approach to application development, the need of the hour is to rethink one’s cloud security strategy.
Implementing these approaches, however, poses challenges. Aside from organization-wide buy-in, how does one efficiently integrate these applications into workflows and toolsets that are already in...
Virtual
Roundtable
Wednesday, December 7th, 2022
Tom  Field
Fawaz Rasheed
Tom Field with Fawaz Rasheed
Virtual Roundtable
How to Modernize Your SOC (Without Blowing it Up)
Discussion topics will include:
The problems are staring at you: A broader potential attack surface than you've ever had before; more alerts than your systems and staff can monitor, never mind act upon; and recruiting & retaining SOC analysts are harder than ever.

But knowing you need to modernize your SOC is one thing; doing it is quite another. How do you upgrade without a complete rip and replace? How do you gain not just the visibility you need across disparate environments, but context...
Virtual
Roundtable
Wednesday, December 7th, 2022
Gary Kneeland
Roger Hill
Gary Kneeland with Roger Hill
Virtual Roundtable
OT Security: Adapting to Evolving Threat and Business Landscapes
Discussion topics will include:
Through accelerated digital transformation and hybrid work, our critical infrastructure is at risk like never before. And while attacks impacting cyber-physical systems long have been a growing concern, they are now more likely than ever.

Many of these legacy systems were not designed to co-exist seamlessly in a connected environment. And it will take years before a new generation of connected assets emerges with more natively integrated security processes. In the meantime, how do we introduce cybersecurity capabilities that are...
Virtual
Roundtable
Thursday, December 8th, 2022
Suparna Goswami
Sid Deshpande
Suparna Goswami with Sid Deshpande
Virtual Roundtable
Answering The Big Questions About SASE and Zero Trust
Discussion topics will include:
Digital business, cloud adoption and a hybrid workforce require security and networking approaches to transform in order to accelerate business growth. The SASE (secure access service edge) model enables this transformation by leveraging the power of the public cloud to simultaneously improve security and user experience. A well architected SASE approach can help organizations accelerate their digital journey by consistently applying zero trust policies for all users, applications and devices, no matter where they may be located.

Gartner forecasts that...
In
Person Roundtable
Number One at The Balmoral
Thursday, December 8th, 2022
Number One at The Balmoral
Charles  Adriaenssens
Ozgur  Ozel
Charles Adriaenssens with Ozgur Ozel
In Person Roundtable
Achieving Operational Resilience in Financial Sector
Discussion topics will include:
How can we ensure that critical systems are reliable, secure and performant in the long term? As a result of increased regulation, financial services executives need to address the task of building operational resilience across data and organisational silos.

Join this discussion on ‘Achieving Operational Resilience in Financial Services’, where we will address the importance of using data effectively to improve resilience. We will introduce the building blocks for creating a holistic monitoring approach that aligns with the regulators’ requirements,...
Virtual
Roundtable
Thursday, December 8th, 2022
Tom Field
Michael Covington, Ph.D
Tom Field with Michael Covington, Ph.D
Virtual Roundtable
Securing a Hybrid, Mobile-First Workplace
Discussion topics will include:
The nature of work has changed. Organizations now embrace a more mobile-centric, collaborative and productive workplace. The shift to supporting a remote-first work style was sudden for many, as they reacted to the global pandemic, but there are indications that businesses have made these changes permanent. The challenge now: Choose which modern technologies, practices and processes can best support and secure this new way of working.

Join this session, Securing a Hybrid, Mobile-First Workplace, to learn more about how to...
In-Person
Roundtable
Sofitel BKC, Mumbai
Tuesday, December 13th, 2022
Sofitel BKC, Mumbai
Sandeep Agarwal
Avinash  Dharmadhikari
Sandeep Agarwal with Avinash Dharmadhikari
In-Person Roundtable
Cyber Recovery: The Best Defense Against Paying Ransomware
Discussion topics will include:
Ransomware attacks are becoming inevitable as bad actors exploit the weakest link of cyber defense - humans. The goal of cyber resilience is to transform business expectations and guarantee that businesses face a less-than-significant impact from a cyberattack. After all, it is not only about how to protect and detect but also remediate and recover. The recovery process needs to ensure not only a quick recovery but also a quicker back to business. For a faster recovery environment, malware is...
Virtual
Roundtable
Thursday, January 19th, 2023
Gary Kneeland
Anna Delaney
Gary Kneeland with Anna Delaney
Virtual Roundtable
OT Security: Adapting to Evolving
Discussion topics will include:
Through accelerated digital transformation and hybrid work, our critical infrastructure is at risk like never before. And while attacks impacting cyber-physical systems long have been a growing concern, they are now more likely than ever.

Many of these legacy systems were not designed to co-exist seamlessly in a connected environment. And it will take years before a new generation of connected assets emerges with more natively integrated security processes. In the meantime, how do we introduce cybersecurity capabilities that are...
In
Person Roundtable
The Dylan, Amsterdam
Tuesday, February 7th, 2023
The Dylan, Amsterdam
Anna Delaney
John Schapp
Anna Delaney with John Schapp
In Person Roundtable
Solving the Skills Gap with Managed Services
Discussion topics will include:
Being prepared to respond to today's security incidents means acquiring and maintaining both the tools and the expertise to successfully detect attacks and stop them before serious damage is done. However, with the diversity and complexity of threats on the rise, security teams find themselves drowning in data and overwhelmed by the immense volume of alerts, many of them false positives.

With a shortage of 4 million cybersecurity workers globally and 75% of SMBs saying they lack the personnel to...
Virtual
Roundtable
Tuesday, February 7th, 2023
Tom  Field
Ameet Naik
Tom Field with Ameet Naik
Virtual Roundtable
5 Critical Considerations for DDoS Mitigation
Discussion topics will include:
Last June, Cloudflare detected what at the time was the largest distributed denial of service attack on record - 26 million requests per second. Since then, that record has been crushed, and adversaries continue to leverage DDoS attacks for distraction, destruction and as companions to ransomware campaigns.

What are the top trends in both application-layer and network-layer DDoS attacks? What are the ransom attack trends? What are the five critical considerations for mitigating modern DDoS attacks?

Join this session, 5...
In-Person
Roundtable
Sydney, Australia
Thursday, February 9th, 2023
Sydney, Australia
Jeremy Kirk
Peter  Stephan
Jeremy Kirk with Peter Stephan
In-Person Roundtable
How Can Business Infrastructure Become More Resilient and Trusted?
Discussion topics will include:
Amidst an intensifying threat landscape, it’s imperative that organizations become more cyber resilient. Security executives and CISOs are looking to achieve security resilience as a means to achieving an effective cybersecurity and risk management posture. A key component of that is access to applications and services.

Enterprises must now accommodate a hybrid work environment where employees are working from anywhere while accessing internal applications. As the traditional network perimeter has dissolved, enterprises need to ensure that those coming into the...
Virtual
Roundtable
Tuesday, February 14th, 2023
Tom Field
Mike Utsal
Tom Field with Mike Utsal
Virtual Roundtable
OT Security: Adapting to Evolving Threat and Business Landscapes
Discussion topics will include:
Through accelerated digital transformation and hybrid work, our critical infrastructure is at risk like never before. And while attacks impacting cyber-physical systems long have been a growing concern, they are now more likely than ever.

Many of these legacy systems were not designed to co-exist seamlessly in a connected environment. And it will take years before a new generation of connected assets emerges with more natively integrated security processes. In the meantime, how do we introduce cybersecurity capabilities that are...
Virtual
Roundtable
Thursday, February 16th, 2023
Suparna Goswami
Leon  Poggioli
Suparna Goswami with Leon Poggioli
Virtual Roundtable
Securing Your Cyber-Physical Landscape
Discussion topics will include:
Accelerated digital transformation has heightened the risk of critical infrastructure. Many of these legacy systems have not been designed to co-exist seamlessly in a connected environment. Security upgrades are often installed in a piecemeal manner since the systems are complex. Moreover, visibility is poor across multiple systems and isolated environments. Digital evolution will take years before a new generation of connected assets emerges with more natively integrated security processes. In the meantime, how do we introduce cybersecurity capabilities that are...
Virtual
Roundtable
Wednesday, March 15th, 2023
Tom Field
Mike Utsal
Tom Field with Mike Utsal
Virtual Roundtable
OT Security: Adapting to Evolving Threat
Discussion topics will include:
Through accelerated digital transformation and hybrid work, our critical infrastructure is at risk like never before. And while attacks impacting cyber-physical systems long have been a growing concern, they are now more likely than ever.

Many of these legacy systems were not designed to co-exist seamlessly in a connected environment. And it will take years before a new generation of connected assets emerges with more natively integrated security processes. In the meantime, how do we introduce cybersecurity capabilities that are...
Past Roundtables
In
Person Roundtable
One Moorgate Place
Thursday, December 1st, 2022
One Moorgate Place
Sam Hector
Celine Williams
Sam Hector with Celine Williams
In Person Roundtable
Addressing ever advancing threats with Extended Detection and Response
Discussion topics will include:
Cyberthreats continue to proliferate, with advanced attackers exploiting zero days and novel new methods of monetization, while ‘conventional’ attacks have been commoditized or made available ‘as a service’. Meanwhile the attack surface is expanding exponentially though cloud adoption, Apps, IOT, IIOT, working from home, and digitization, with the resultant demand from users for access to everything from everywhere via any device.

Even the plethora of new tools introduced to tackle these new threats can create their own problems, including increasing...
In
Person Roundtable
Paris, FR
Thursday, December 1st, 2022
Paris, FR
Sacha Labourey
Timothee Bardet
Sacha Labourey with Timothee Bardet
In Person Roundtable
Services financiers: Compliance et sécurité peuvent-ils devenir un atout pour le DevOps?
Discussion topics will include:
Selon l'enquête mondiale sur la sécurité de CloudBees cette année, les mesures de sécurité tout au long de la chaîne DevOps ont un impact significatif à la fois sur la livraison des logiciels et sur l'expérience globale des développeurs. Plus précisément, les dirigeants estiment que les exigences en matière de sécurité (75 %) et de conformité (76 %) entravent l'innovation. Détecter les problèmes à un stade précoce et les résoudre avant qu'ils ne ralentissent le processus ou n'entrent en production...
In
Person Roundtable
Hotel Villa Dagmar, Stockholm
Wednesday, November 30th, 2022
Hotel Villa Dagmar, Stockholm
Anna Delaney
Jay  Coley
Anna Delaney with Jay Coley
In Person Roundtable
Achieving Visibility of Applications and APIs in a Multicloud World
Discussion topics will include:
The rapid adoption of hybrid cloud and multicloud services, along with an increasing number of cloud infrastructure and platform services, has created an explosion in complexity and concerns about data security and cloud compliance. It only takes one insecure API in your API supply chain to risk being crippled by long-term financial or reputational damages.

In this executive roundtable we shall discuss best practices to keep your multicloud environments and APIs both secure and performant while empowering your organization to...
In-Person
Roundtable
Sofitel BKC, Mumbai
Tuesday, November 29th, 2022
Sofitel BKC, Mumbai
Anitosh Halder
Anitosh Halder
In-Person Roundtable
Efficient Cloud Migration for Cloud-Native Business
Discussion topics will include:
Digitization is a driving priority for business leaders across industries and sectors. The need for greater agility and faster innovations has made cloud infrastructure an attractive option to fulfil the digital transformation agenda.
However, during this transition, CIOs and tech leaders confront plenty of issues pertaining to migration, post-migration and modernization, which, if not handled well, can increase time, risk and costs.

CIO.inc, in partnership with Sify Technologies, solicits your presence for an exclusive roundtable discussion at the India Cloud...
Virtual
Roundtable
Tuesday, November 29th, 2022
Suparna Goswami
Sid Deshpande
Suparna Goswami with Sid Deshpande
Virtual Roundtable
Answering The Big Questions About SASE and Zero Trust
Discussion topics will include:
Digital business, cloud adoption and a hybrid workforce require security and networking approaches to transform in order to accelerate business growth. The SASE (secure access service edge) model enables this transformation by leveraging the power of the public cloud to simultaneously improve security and user experience. A well architected SASE approach can help organizations accelerate their digital journey by consistently applying zero trust policies for all users, applications and devices, no matter where they may be located.

Gartner forecasts that...
In-Person
Roundtable
Ritz Carlton, Bengaluru
Friday, November 25th, 2022
Ritz Carlton, Bengaluru
Anitosh Halder
Anitosh Halder
In-Person Roundtable
Efficient Cloud Migration for Cloud-Native Business
Discussion topics will include:
Digitization is a driving priority for business leaders across industries and sectors. The need for greater agility and faster innovations has made cloud infrastructure an attractive option to fulfil the digital transformation agenda.
However, during this transition, CIOs and tech leaders confront plenty of issues pertaining to migration, post-migration and modernization, which, if not handled well, can increase time, risk and costs.

CIO.inc, in partnership with Sify Technologies, solicits your presence for an exclusive roundtable discussion at the India Cloud...
In
Person Roundtable
The Ivy in the Park
Thursday, November 24th, 2022
The Ivy in the Park
Emma Gray
Anna Delaney
Emma Gray with Anna Delaney
In Person Roundtable
The Challenges of Digital Trust in Business Transformation
Discussion topics will include:
Digital transformation has created a wealth of opportunities and challenges: cloud migration, smart devices, automation, IT/OT-IoT convergence, and third-party infrastructure integration.

But it has also brought with it vulnerabilities inherent in legacy technology, the disconnect of OT, an enlarged attack surface and increased attention from threat actors and criminal adversaries who seek to disrupt operations or steal intellectual property.

Today's CISOs need to focus on these accelerated challenges in the hyperconnected ecosystem, meaning: a connected workforce, connected customers, connected supply...
In-Person
Roundtable
Mumbai
Thursday, November 24th, 2022
Mumbai
Huzefa  Motiwala
Kshitij Kapdekar
Huzefa Motiwala with Kshitij Kapdekar
In-Person Roundtable
Cloud Security in a Hybrid or Multi-Cloud Environment
Discussion topics will include:
With the massive adoption of the cloud, security is struggling to keep pace. Lack of end-to-end visibility across data and applications has hampered the effective detection of attacks. Security practitioners are looking for an effective cloud strategy.
While cloud workload protection platform and cloud security posture management solutions are used as standards, the need is for a single platform that provides greater visibility across distributed environments. A multi-cloud security approach needs an understanding of the baseline of what is being...
In-Person
Roundtable
Shangri-La Eros, New Delhi
Wednesday, November 23rd, 2022
Shangri-La Eros, New Delhi
Anitosh Halder
Ankit  Kumar Gupta
Anitosh Halder with Ankit Kumar Gupta
In-Person Roundtable
Efficient Cloud Migration for Cloud-Native Business
Discussion topics will include:
Digitization is a driving priority for business leaders across industries and sectors. The need for greater agility and faster innovations has made cloud infrastructure an attractive option to fulfil the digital transformation agenda.
However, during this transition, CIOs and tech leaders confront plenty of issues pertaining to migration, post-migration and modernization, which, if not handled well, can increase time, risk and costs.

CIO.inc, in partnership with Sify Technologies, solicits your presence for an exclusive roundtable discussion at the India Cloud...
In
Person Roundtable
Vintry & Mercer
Tuesday, November 22nd, 2022
Vintry & Mercer
Prakash  Sethuraman,
Anna Delaney
Prakash Sethuraman, with Anna Delaney
In Person Roundtable
Financial Services: Achieving Shift Left Security
Discussion topics will include:
According to this year's CloudBees Global C-Suite Security Survey, the drive to shift left is having a significant impact on both delivering software and the developer experience overall. Specifically, executives believe that security (75%) and compliance (76%) requirements hinder innovation. Catching problems early and fixing them before they slow the process or get into production is still the ultimate goal of shift left. However, a new approach and mindset are required to deliver on the promise.

Register for this executive...
In-Person
Roundtable
The Point D.C.
Thursday, November 17th, 2022
The Point D.C.
Tom Field
Juliana Vida
Tom Field with Juliana Vida
In-Person Roundtable
Government: Building Cyber Defense During Digital Transformation
Discussion topics will include:
Public sector agencies are undergoing a massive digital transformation, which is now imperative, thanks to the massive shift to remote work. Furthermore, Biden's executive order (EO), signed last May, mandated Zero Trust adoption across the government and recognized the importance of logging, log retention and management, cloud adoption, cyber best practices, software supply chain integrity, and information sharing.

One year later, what progress have we made, and what are the biggest opportunities for improvement? And how can federal agencies stay...
In-Person
Roundtable
Trident, Gurgaon
Wednesday, November 16th, 2022
Trident, Gurgaon
Abdul  Muneem
Deepak Prasad
Abdul Muneem with Deepak Prasad
In-Person Roundtable
Getting Started with Zero Trust and beyond
Discussion topics will include:
As companies adopt mobile and cloud technologies, perimeter security becomes increasingly difficult to enforce. The need of the hour is to shift access controls from the network perimeter to individual users. Companies have understood that there can no longer be an inherent mutual trust between services and there needs to be a consistent security policy enforcement across services. Is the zero trust framework the answer to this? If yes, how does one go about it?

Join ISMG's Suparna Goswami for...
In
Person Roundtable
New York City
Tuesday, November 15th, 2022
New York City
Tom  Field
Altaz  Valani
Tom Field with Altaz Valani
In Person Roundtable
Software Security: The Call for Developer-Centric Threat Modeling
Discussion topics will include:
You've got the largest potential attack surface in history, and your business-critical applications represent both your greatest opportunities and greatest threats. Application security has never been more urgent.

But how are you currently addressing the need to accelerate application development/deployment with cybersecurity and compliance needs? What are you doing to release secure software faster? What are your current threat modeling practices, and how can they be enhanced?

Register for this executive roundtable, Software Security: The Call for Developer-Centric Threat Modeling,...
In-Person
Roundtable
The Westin Mumbai Powai Lake
Wednesday, November 9th, 2022
The Westin Mumbai Powai Lake
Geetha Nandikotkur
Hatim  Matiwala
Geetha Nandikotkur with Hatim Matiwala
In-Person Roundtable
An Integrated Approach to Embedding Security into DevOps to Establish a Secure Software Development
Discussion topics will include:
When done correctly, most security practitioners say that DevSecOps can transform how businesses can develop and deploy applications securely at a faster pace. However, most organizations still struggle to put it into practice.
As businesses progress with agile development processes, cloud, and DevOps, security needs to integrate with the DevOps process to ensure responsibility is shared and protection is built-in to establish a secure application life-cycle. The key is understanding how developers and security teams can move towards a DevSecOps...
In-Person
Roundtable
Ruth's Chris Steak House Philadelphia
Tuesday, November 8th, 2022
Ruth's Chris Steak House Philadelphia
Tom Field
Tyler Croak
Tom Field with Tyler Croak
In-Person Roundtable
Complexity is the Enemy: How to Simplify Cybersecurity
Discussion topics will include:
The longer you have been doing security, the more complex your environment may be. You are not alone if you struggle with existing point products operating in isolation, on premise solutions that can't operate in the cloud, or siloed security operations and views. There are likely gaps in your security posture, and remote users may have a poor experience. And as attack surfaces - both on premise and in the cloud - only continue to grow, there are just too...
Virtual
Roundtable
Thursday, November 3rd, 2022
Tom Field
Jesse Netz
Tom Field with Jesse Netz
Virtual Roundtable
Advancing Threat Intel to Learn the Adversary's Next Move
Discussion topics will include:
As cybercriminals continue to target organizations with ransomware, API and DDoS attacks, security professionals are under constant pressure to become highly competent not just in threat prevention, but in detection and response. However they often struggle to understand threats and translate them into actionable countermeasures.

High quality defensive knowledge is scarce, and adversaries continue to take advantage of weak points including misconfigured defenses, poor security architectures, and excessive privileges, further reducing the value of investment in security solutions.

Register for...
Virtual
Roundtable
Thursday, November 3rd, 2022
Eric Hyman
Tom Field
Eric Hyman with Tom Field
Virtual Roundtable
SASE Framework: Making the Case for Managed Services
Discussion topics will include:
Software-Defined Wide Area Networking (SD-WAN) and Secure Service Edge (SSE) are two of the major technology trends to emerge from accelerated digital transformation, and they have helped enterprises respond to the new security challenges posed by hybrid work and cloud applications by deploying a Secure Access Service Edge (SASE) framework.

According to Sophos, 54% of companies say their IT departments are not sophisticated enough to handle advanced cyberattacks. And according to IDC, the driving reasons are lack of in-house skills...
In-Person
Roundtable
Palio- San Francisco, CA
Wednesday, November 2nd, 2022
Palio- San Francisco, CA
Tom Field
Chip Witt
Tom Field with Chip Witt
In-Person Roundtable
How Malware Helps Bad Actors Get Away with Online Fraud (and What Enterprises Can Do About It)
Discussion topics will include:
Despite your team’s best efforts to defend against cyberattacks, organizations often lack visibility into when employees and consumers fall victim to the most nefarious type of attack - malware infections. Malware-stolen data is highly valuable to bad actors and is a gateway for them to commit fraud and infiltrate corporate networks.

When your users are affected by malware, it’s too late. Once a botnet is installed (like the infamous RedLine Stealer), cybercriminals have already started to siphon critical information such...
In
Person Roundtable
Modern Steak on Stephen Avenue - Calgary, AB, Canada
Tuesday, November 1st, 2022
Modern Steak on Stephen Avenue - Calgary, AB, Canada
Bob  Reny
Tom Field
Bob Reny with Tom Field
In Person Roundtable
The Future of SIEM: Automate and Accelerate Security at Cloud-Scale
Discussion topics will include:
Cybersecurity teams struggle to keep up with a high volume of alerts with real threats buried in a sea of noise. More, with today's breaches rooted in compromised credentials, it is difficult for defenders to know what is abnormal when everything appears normal. Without a holistic view of an incident and automation to speed investigations, it is difficult to identify, investigate and respond to threats quickly, consistently and accurately. If today’s SIEMs aren’t keeping up, what does the future hold?...
Virtual
Roundtable
Thursday, October 27th, 2022
Fernando  Maymi
Tom Field
Fernando Maymi with Tom Field
Virtual Roundtable
Attack Intelligence: How to Operationalize Timely, Relevant, Actionable Info
Discussion topics will include:
Attack intelligence. Beyond traditional threat intel, it draws on threat detection, visibility and collaboration to deliver information that is at once timely, relevant and actionable. As opposed to traditional threat intel, which describes what could happen to your organization, industry or supply chain, attack intelligence shows what is happening.

But how does one create and receive attack intelligence? How is it different from traditional information sharing? And how do today's most significant cybersecurity threats create a greater need for attack...
In-Person
Roundtable
Mancuso's Restaurant- 201 E. Washington Street, Phoenix, AZ
Tuesday, October 25th, 2022
Mancuso's Restaurant- 201 E. Washington Street, Phoenix, AZ
Eric Hyman
Tom Field
Eric Hyman with Tom Field
In-Person Roundtable
SASE Framework: Making the Case for Managed Services
Discussion topics will include:
Software-Defined Wide Area Networking (SD-WAN) and Secure Service Edge (SSE) are two of the major technology trends to emerge from accelerated digital transformation, and they have helped enterprises respond to the new security challenges posed by hybrid work and cloud applications by deploying a Secure Access Service Edge (SASE) framework.

According to Sophos, 54% of companies say their IT departments are not sophisticated enough to handle advanced cyberattacks. And according to IDC, the driving reasons are lack of in-house skills...
In-Person
Roundtable
Hyatt Regency Phoenix
Tuesday, October 25th, 2022
Hyatt Regency Phoenix
Rick McElroy
Tom  Field
Rick McElroy with Tom Field
In-Person Roundtable
How to Modernize Your SOC (Without Blowing it Up)
Discussion topics will include:
The problems are staring at you: A broader potential attack surface than you've ever had before; more alerts than your systems and staff can monitor, never mind act upon; and recruiting & retaining SOC analysts are harder than ever.

But knowing you need to modernize your SOC is one thing; doing it is quite another. How do you upgrade without a complete rip and replace? How do you gain not just the visibility you need across disparate environments, but context...
Virtual
Roundtable
Thursday, October 20th, 2022
Ameet Naik
Anna Delaney
Ameet Naik with Anna Delaney
Virtual Roundtable
5 Critical Considerations for DDoS Mitigation
Discussion topics will include:
Last June, Cloudflare detected what at the time was the largest distributed denial of service attack on record - 26 million requests per second. Since then, that record has been crushed, and adversaries continue to leverage DDoS attacks for distraction, destruction and as companions to ransomware campaigns.

What are the top trends in both application-layer and network-layer DDoS attacks? What are the ransom attack trends? What are the five critical considerations for mitigating modern DDoS attacks?

Join this session, 5...
Virtual
Roundtable
Thursday, October 20th, 2022
Tom Field
Gary Kneeland
Tom Field with Gary Kneeland
Virtual Roundtable
OT Security: Adapting to Evolving Threat and Business Landscapes
Discussion topics will include:
Through accelerated digital transformation and hybrid work, our critical infrastructure is at risk like never before. And while attacks impacting cyber-physical systems long have been a growing concern, they are now more likely than ever.

Many of these legacy systems were not designed to co-exist seamlessly in a connected environment. And it will take years before a new generation of connected assets emerges with more natively integrated security processes. In the meantime, how do we introduce cybersecurity capabilities that are...
Virtual
Roundtable
Tuesday, October 18th, 2022
Fernando  Maymi
Jeremy Kirk
Fernando Maymi with Jeremy Kirk
Virtual Roundtable
Attack Intelligence: How to Operationalize Timely, Relevant, Actionable Info
Discussion topics will include:
Attack intelligence. Beyond traditional threat intel, it draws on threat detection, visibility and collaboration to deliver information that is at once timely, relevant and actionable. As opposed to traditional threat intel, which describes what could happen to your organization, industry or supply chain, attack intelligence shows what is happening.

But how does one create and receive attack intelligence? How is it different from traditional information sharing? And how do today's most significant cybersecurity threats create a greater need for attack...
In-Person
Roundtable
Empire Steakhouse West, NYC
Tuesday, October 18th, 2022
Empire Steakhouse West, NYC
Tom Field
Gus Evangelakos
Tom Field with Gus Evangelakos
In-Person Roundtable
Better Understanding Cloud Security Risks Through ‘Context’
Discussion topics will include:
In just a few years, cloud conversations have gone from theoretical to critical. And with migrations to the cloud ongoing, many enterprises have had to rethink their security approach. In these environments, some practitioners are charged with expending resources to mitigate “high-severity” CVEs – regardless of how a vulnerability may interact with that IT environment. This risk may pale in comparison, for example, to a malware occurrence at the edge that goes unchecked.

A potential lack of visibility into apps,...
In-Person
Roundtable
Ritz Carlton, Bangalore
Friday, October 14th, 2022
Ritz Carlton, Bangalore
Sandeep  Variyam
Deepak Prasad
Sandeep Variyam with Deepak Prasad
In-Person Roundtable
Zero Trust approach to securing cloud native applications
Discussion topics will include:
With enterprises developing applications at lightning speed, enterprises are able to meet business and customer needs at a rapid pace. This has increased the challenges for developers who now need to work together with the security team to ensure cloud-native applications are protected from attacks. However, traditional security controls don't provide the security needed to protect cloud platforms.

From code changes that have not been tested but slip through to production, to zero-day attacks, runtime applications will continue to require...
Virtual
Roundtable
Thursday, October 13th, 2022
Mathew Schwartz
Jason Ozin
Mathew Schwartz with Jason Ozin
Virtual Roundtable
Cybersecurity and Cyber Insurance Essentials for Retailers in the Ransomware Era
Discussion topics will include:
Ransomware continues to pummel organizations, with the retail sector now being the most-targeted vertical. So it's no surprise retailers are increasingly embracing practices and approaches to help them better lock down networks and payment systems, and to minimize the impact of a successful attack.

Cyber insurance is also part of many retailers' risk-mitigation strategy. But the ongoing success of ransomware as a criminal business model has led to a surge in premiums and insurers demanding more robust defenses from prospective...
In
Person Roundtable
Tuesday, October 11th, 2022
Trevor  Young
Tom  Field
Trevor Young with Tom Field
In Person Roundtable
Software Security: The Call for Developer-Centric Threat Modeling
Discussion topics will include:
You've got the largest potential attack surface in history, and your business-critical applications represent both your greatest opportunities and greatest threats. Application security has never been more urgent.

But how are you currently addressing the need to accelerate application development/deployment with cybersecurity and compliance needs? What are you doing to release secure software faster? What are your current threat modeling practices, and how can they be enhanced?

Register for this executive roundtable, Software Security: The Call for Developer-Centric Threat Modeling,...
In
Person Roundtable
Via Monte Napoleone, Frankfurt
Tuesday, October 11th, 2022
Via Monte Napoleone, Frankfurt
Mat Schwartz
Eyal Greenberg
Mat Schwartz with Eyal Greenberg
In Person Roundtable
How to Quantify Cybersecurity Exposure as Business Risk
Discussion topics will include:
How can CISOs best quantify the cybersecurity risks facing their organisation? Increasingly, business leaders are calling on them to express this not in terms of technical risk, but risk to the business. Such knowledge is crucial for better guiding cybersecurity investments and understanding their return investment (ROI).

Accordingly, how can CISOs best identify and continually track the actual threats facing their organisation? How should they identify and prioritize the attack scenarios — perhaps including data leakage, or a ransomware outbreak...
In
Person Roundtable
Shangri-La Paris
Thursday, October 6th, 2022
Shangri-La Paris
Timothee Bardet
Franck Cohen
Timothee Bardet with Franck Cohen
In Person Roundtable
Comment quantifier les menaces liées à la cybersécurité en termes de risque commercial?
Discussion topics will include:
Comment les RSSI peuvent-ils quantifier au mieux les risques en matière de cybersécurité auxquels fait face leur organisation ? De plus en plus, les dirigeants d’entreprise leur demandent d’exprimer ce risque non pas en termes techniques mais en tant que risque d’entreprise. Ces connaissances sont essentielles pour mieux guider les investissements dans la cybersécurité et envisager leur retour sur investissement (RSI).

De quelle manière, alors, les RSSI peuvent-ils identifier et assurer un suivi constant des menaces réelles qui pèsent sur...
In
Person Roundtable
Chicago
Tuesday, October 4th, 2022
Chicago
Tom Field
Todd Kiehn
Tom Field with Todd Kiehn
In Person Roundtable
SASE Framework: Making the Case for Managed Services
Discussion topics will include:
Software-Defined Wide Area Networking (SD-WAN) and Secure Service Edge (SSE) are two of the major technology trends to emerge from accelerated digital transformation, and they have helped enterprises respond to the new security challenges posed by hybrid work and cloud applications by deploying a Secure Access Service Edge (SASE) framework.

According to Sophos, 54% of companies say their IT departments are not sophisticated enough to handle advanced cyberattacks. And according to IDC, the driving reasons are lack of in-house skills...
Virtual
Roundtable
Tuesday, October 4th, 2022
Gary Kneeland
Tony Morbin
Gary Kneeland with Tony Morbin
Virtual Roundtable
OT Security: Adapting to Evolving Threat and Business Landscapes
Discussion topics will include:
Through accelerated digital transformation and hybrid work, our critical infrastructure is at risk like never before. And while attacks impacting cyber-physical systems long have been a growing concern, they are now more likely than ever.

Many of these legacy systems were not designed to co-exist seamlessly in a connected environment. And it will take years before a new generation of connected assets emerges with more natively integrated security processes. In the meantime, how do we introduce cybersecurity capabilities that are...
In
Person Roundtable
Houston
Thursday, September 29th, 2022
Houston
Mackenzie Kyle
Karthik Kannan
Mackenzie Kyle with Karthik Kannan
In Person Roundtable
Mission Critical: Modernizing Security Operations
Discussion topics will include:
Security operations teams are reaching their breaking point, and new strategies are needed.

According to a new research study by Enterprise Strategy Group, 60% of security professionals surveyed say alert triage is challenging or overwhelming, and 89% of all surveyed security decision makers feel their organization needs a transformational or moderate amount of change in its SOC to mitigate business threats.

But what does modernization actually mean? How can security leaders help their teams to better understand their threat coverage,...
In
Person Roundtable
Selfridges, Oxford Street
Thursday, September 29th, 2022
Selfridges, Oxford Street
Anna Delaney
Jay  Coley
Anna Delaney with Jay Coley
In Person Roundtable
Consumer Services: Securing Applications and APIs
Discussion topics will include:
In efforts to stay agile and reinvent their relationship with customers, some retailers have decentralized their activities and become more composable. This new architecture allows developers to access all APIs, which enables agility and flexibility in the face of digital disruption.

The problem is that this has created new vulnerabilities and vectors for the attackers to exploit. Whether defending against DDoS or bot attacks, securing APIs or OWASP vulnerabilities, security teams need to be able to detect and remediate incidents...
In-Person
Roundtable
Tivoli Mofarrej São Paulo Hotel
Wednesday, September 28th, 2022
Tivoli Mofarrej São Paulo Hotel
Longinus Timochenco
Hilmar Becker
Longinus Timochenco with Hilmar Becker
In-Person Roundtable
Fraudes e Inteligência Artificial: sua empresa está pronta para contra-atacar a nova geração de crimes financeiros?
Discussion topics will include:
É crescente o uso de recursos de inteligência artificial por parte de criminosos cibernéticos para elaborar fraudes financeiras cada vez mais eficientes. Empregando robôs e scripts automatizados, eles conseguem varrer a internet em busca de credenciais comprometidas, roubar identidades digitais e causar danos irreversíveis — quem não sofre ao contabilizar os chargebacks ao final de um mês que atire a primeira pedra. Será que a sua empresa está pronta para lidar com essa nova geração de fraudadores?

Pois saiba que...
In
Person Roundtable
One Moorgate Place
Wednesday, September 28th, 2022
One Moorgate Place
Ilkka Turunen
Tony Morbin
Ilkka Turunen with Tony Morbin
In Person Roundtable
Mitigating Software Supply Chain Risk
Discussion topics will include:
Massive exploits such as the recent Log4j/Log4shell vulnerability are a sign that best practices are still evolving, and the risk of mismanaging, or worse, ignoring open source vulnerabilities, is only becoming greater. It’s time to kick up the gear on open source and software supply chain management conversations.

Join us for an engaging, roundtable conversation on what we need to know about managing open source and software supply chains.

Register for this executive roundtable, Mitigating Software Supply Chain Risk, to...
In
Person Roundtable
Ruth's Chris Steak House St. Louis Downtown
Thursday, September 22nd, 2022
Ruth's Chris Steak House St. Louis Downtown
Tom Field
Jeannie Warner
Tom Field with Jeannie Warner
In Person Roundtable
Seize the Breach with Automation and Analytics
Discussion topics will include:
Breaches happen, and 2021 was a record-breaking year for them. According to Identity Theft Resource Center research, there were 1,291 breaches publicly reported as of Sept. 2021, compared to 1,108 breaches in 2020. That’s a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t stopping the breaches.

Why are SOC and security teams way too limited by legacy SIEM? How can machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response capabilities?

Register...
In
Person Roundtable
10-11 Carlton House Terrace
Thursday, September 22nd, 2022
10-11 Carlton House Terrace
Tim Arkless
Nick Gibson
Tim Arkless with Nick Gibson
In Person Roundtable
The Path to Simplifying Operational Complexity
Discussion topics will include:
To take your detection and response to the next level, you need to establish where you are in your maturity model, benchmark that against your peers, and identify the next steps that need to be taken. Four key considerations in this process are: visibility, automation; alert handling and threat hunting.

To reduce complexity and relieve the burden of false positives, it’s essential to deploy automated detection and response that can learn from analysts and autonomously respond to day-to-day alert handling....
In
Person Roundtable
One Moorgate Place
Thursday, September 22nd, 2022
One Moorgate Place
Anna Delaney
Jay  Coley
Anna Delaney with Jay Coley
In Person Roundtable
Financial Services: Securing Applications and APIs in Multicloud Environments
Discussion topics will include:
The rapid adoption of hybrid cloud and multicloud services, along with an increasing number of cloud infrastructure and platform services, has created an explosion in complexity and concerns about data security and cloud compliance. It only takes one insecure API in your API supply chain to risk being crippled by long-term financial or reputational damages.

In this executive roundtable we shall discuss best practices to keep your multicloud environments and APIs both secure and performant while empowering your organization to...
Virtual
Roundtable
Virtual
Thursday, September 22nd, 2022
Virtual
Rahul Neel Mani
Deepak Prasad
Rahul Neel Mani with Deepak Prasad
Virtual Roundtable
Zero Trust: The DNA of Data Security
Discussion topics will include:
According to a 2021 survey, over 50% of organizations use over 25 systems to manage identities, and
21% use over 100. Despite such preventative measures, a user falls victim to identity theft every two
seconds. With cloud permeating the boundaries of the enterprise, the surface for compromised or
stolen credentials of privileged users and applications has exploded. Zero trust - a vital architectural
shift in security - fills the gap left by old perimeter-based, defense-in-depth models.
Gartner predicts that while...
In
Person Roundtable
Frisco, TX
Tuesday, September 20th, 2022
Frisco, TX
Dave Ferguson
Tom  Field
Dave Ferguson with Tom Field
In Person Roundtable
Software Supply Chain: Threats and Strategies to Reduce Risk
Discussion topics will include:
The 2021 executive order on cybersecurity and recent high-profile incidents including SolarWinds and Log4Shell highlight the fact that an organization's software supply chain must not be overlooked by enterprise security teams. Supply chain risks have emerged in recent years in parallel with fundamental changes in how we develop and consume software.

Over the last decade or so, digital transformation and the need for fast time-to-market have driven new software development practices including agile methodologies, DevOps processes, and the broad use...
In-Person
Roundtable
Ruth's Chris Steakhouse Manhattan- 148 West 51st Street, New York, NY
Thursday, September 15th, 2022
Ruth's Chris Steakhouse Manhattan- 148 West 51st Street, New York, NY
Tom Field
Fawaz Rasheed
Tom Field with Fawaz Rasheed
In-Person Roundtable
How to Modernize Your SOC (Without Blowing it Up)
Discussion topics will include:
The problems are staring at you: A broader potential attack surface than you've ever had before; more alerts than your systems and staff can monitor, never mind act upon; and recruiting & retaining SOC analysts are harder than ever.

But knowing you need to modernize your SOC is one thing; doing it is quite another. How do you upgrade without a complete rip and replace? How do you gain not just the visibility you need across disparate environments, but context...
In-Person
Roundtable
The Grand, Berlin
Thursday, September 15th, 2022
The Grand, Berlin
Ilkka Turunen
Tony Morbin
Ilkka Turunen with Tony Morbin
In-Person Roundtable
Mitigating Software Supply Chain Risk
Discussion topics will include:
Massive exploits such as the recent Log4j/Log4shell vulnerability are a sign that open source software best practices are still evolving. Furthermore, the risk of mismanaging — or worse, ignoring — open source vulnerabilities is only becoming greater.

With the robust use of open source software and software supply chains here to stay, this executive roundtable addresses how you can manage the risks they pose - focusing in on the Oiltanking GmbH cyber-attack.

Attendees will discuss how to proactively protect enterprise...
In
Person Roundtable
Shangri La Paris, France
Thursday, September 15th, 2022
Shangri La Paris, France
Timothee Bardet
Hervé Boutemy
Timothee Bardet with Hervé Boutemy
In Person Roundtable
Les risques logiciels: les meilleures pratiques pour une vraie résilience
Discussion topics will include:
Les récentes vulnérabilités SolarWinds et Log4j/Log4shell ont encore accentué les risques de mal gérer, ou pire, d'ignorer les vulnérabilités des logiciels libres. Il est temps de passer à la vitesse supérieure dans les conversations sur l'open source et la gestion de la chaîne de développement logicielle.

Rejoignez-nous pour une conversation passionnante lors d'un déjeuner à Paris, entre cadres dirigeants IT, sur les meilleures pratiques de gestion de l'open source et des chaînes de développement logiciels.

Inscrivez-vous à cette table ronde...
Virtual
Roundtable
Wednesday, September 14th, 2022
Tyler Croak
Tom Field
Tyler Croak with Tom Field
Virtual Roundtable
Steps to Reducing Ransomware Risk in a Cloud-First World
Discussion topics will include:
In 2021, a debilitating ransomware attack on Colonial Pipeline's IT systems caused both a physical response – the shutdown of the pipeline – and a hefty financial one, with the company paying more than $4 million ransom to restore data. After other high-profile attacks and a whole-of-government emphasis on mitigation in the U.S., it became apparent that ransomware is indeed a national security concern that can cut through every area of an enterprise.

Although there have been periods of relative...
Virtual
roundtable
Wednesday, September 14th, 2022
Jeremy Kirk
Ashlee McCusker
Jeremy Kirk with Ashlee McCusker
Virtual roundtable
Building Customer Relationships Through Secure E-Commerce
Discussion topics will include:
Transacting online is key to driving new and recurring business, but the security risks are ever present. Those risks can translate into problems with customer acquisition and, subsequently, retention. Customers will move to competitors with systems that have less friction.
Sources of risk abound. Bots use stolen credentials to try to log into existing accounts. Screen-scraping bots steal content, pricing information and more, undermining an organisation’s web offerings. Fraudulent traffic and bad traffic can undermine a site’s performance and reputation....
Virtual
Roundtable
Virtual
Tuesday, September 13th, 2022
Virtual
Rick McElroy
Tom  Field
Rick McElroy with Tom Field
Virtual Roundtable
How to Modernize Your SOC (Without Blowing it Up)
Discussion topics will include:
The problems are staring at you: A broader potential attack surface than you've ever had before; more alerts than your systems and staff can monitor, never mind act upon; and recruiting & retaining SOC analysts are harder than ever.

But knowing you need to modernize your SOC is one thing; doing it is quite another. How do you upgrade without a complete rip and replace? How do you gain not just the visibility you need across disparate environments, but context...
In-Person
Roundtable
The Ritz-Carlton, Bengaluru
Tuesday, September 13th, 2022
The Ritz-Carlton, Bengaluru
Abdul  Muneem
Anubhav  Wahie
Abdul Muneem with Anubhav Wahie
In-Person Roundtable
Getting Started With Zero Trust and Beyond
Discussion topics will include:
As companies adopt mobile and cloud technologies, perimeter security becomes increasingly difficult to enforce. The need of the hour is to shift access controls from the network perimeter to individual users. Companies have understood that there can no longer be an inherent mutual trust between services and there needs to be a consistent security policy enforcement across services. Is the zero trust framework the answer to this? If yes, how does one go about it?

Join ISMG's Suparna Goswami for...
Virtual
Roundtable
Virtual
Thursday, September 8th, 2022
Virtual
Rick McElroy
Tom  Field
Rick McElroy with Tom Field
Virtual Roundtable
How to Modernize Your SOC (Without Blowing it Up)
Discussion topics will include:
The problems are staring at you: A broader potential attack surface than you've ever had before; more alerts than your systems and staff can monitor, never mind act upon; and recruiting & retaining SOC analysts are harder than ever.

But knowing you need to modernize your SOC is one thing; doing it is quite another. How do you upgrade without a complete rip and replace? How do you gain not just the visibility you need across disparate environments, but context...
Virtual
Roundtable
Thursday, September 8th, 2022
Mike Britton
Michael Novinson
Mike Britton with Michael Novinson
Virtual Roundtable
Email Security: Changing the Game Against Game-Changing Attacks?
Discussion topics will include:
Phishing. Business email compromise. Executive impersonation. Ransomware. Today's email-borne threats are sophisticated, targeted and come at a relentless scale. There’s little denying that they are game-changing.

But can you say the same about your email defenses? Is email security the priority it should be for your enterprise, or are you trying to counter 2022 attacks with 2012 defenses? How do you hope to upgrade your defenses, and what will it take to obtain the resources you need?

Join this session,...
Virtual
Roundtable
Thursday, September 8th, 2022
Michael Lyborg
Matthias Straub
Michael Lyborg with Matthias Straub
Virtual Roundtable
Why Automation is Essential to Prevent Cyber Attacks
Discussion topics will include:
With cyberattacks on the rise and fears of international escalation in cyberspace, security teams are actively working to bolster defense. But with the prevalence of security rising, the gulf between today's workforce and its needs is vast. This leaves CISOs under-resourced and analysts in the SOC spread thin. Enter "Security Orchestration, Automation, and Response," or SOAR, tools.

Without automated tools to centralize event data and improve incident response, tasks delegated to "humans" can get tedious and overwhelming – causing a...
In-Person
Roundtable
Hotel Villa Dagmar
Tuesday, September 6th, 2022
Hotel Villa Dagmar
Mathew  Schwartz
Ilkka Turunen
Mathew Schwartz with Ilkka Turunen
In-Person Roundtable
Sweden’s NATO Application: Impact on Supply Chain Risk and Resilience
Discussion topics will include:
Massive exploits such as the recent Log4j/Log4shell vulnerability are a sign that open source software best practices are still evolving. Furthermore, the risk of mismanaging — or worse, ignoring — open source vulnerabilities is only becoming greater.

As the robust use of open source software and software supply chains remains here to stay, this executive roundtable addresses how you can deal with the risks they pose, while ensuring both remain safe to use.

Attendees will discuss how to more proactively...
In
Person Roundtable
Ruth's Chris Steak House Boston
Thursday, August 25th, 2022
Ruth's Chris Steak House Boston
Jonathan  Trull
Tom Field
Jonathan Trull with Tom Field
In Person Roundtable
Measuring the Maturity of Your Cloud Security Program
Discussion topics will include:
Amidst the accelerated digital transformation of the past two years, enterprises across sectors have gone from dipping their toes in the cloud to being fully immersed in multi-cloud environments. At the same time, they've encountered the reality: Security in the cloud is a different animal, and it requires unique skills.

What does cloud security maturity look like? Where is your organization on the road to maturity? How do you measure progress - and gain access to the right talent?

Register...
In-person
Roundtable
Pullman New Delhi Aerocity
Wednesday, August 24th, 2022
Pullman New Delhi Aerocity
Jitendra Sharma
Prabhu  Paulson K R
Jitendra Sharma with Prabhu Paulson K R
In-person Roundtable
Cloud Done Right: Cost-Effective, Agile Architecture for Speed and Scale
Discussion topics will include:
Whether you’re developing cloud-native workloads or doing a lift and shift of the existing applications, there are many considerations before making a decisive move. Concerns for reliability, efficiency, agility, and operational excellence are topmost as they directly impact the business. To tackle this, technology organizations need a platform that leverages automation and intelligence, and offers observability, automation, and intelligence for better context and actionable insights.

DynamicCIO (an ISMG initiative) and Dynatrace-AWS invite you for an exclusive executive roundtable discussion on...
In-Person
Roundtable
Ruth's Chris Steak House Minneapolis
Tuesday, August 23rd, 2022
Ruth's Chris Steak House Minneapolis
Tom Field
Andrew Yorra
Tom Field with Andrew Yorra
In-Person Roundtable
Software Supply Chains: A Look into the Future
Discussion topics will include:
If you thought 2021 was the year of the software supply chain, just wait until you see what unfolds in 2022.

Massive exploits such as the recent Log4j/Log4shell vulnerability are a sign that best practices are still evolving, and the risk of mismanaging, or worse, ignoring open source vulnerabilities, is only becoming greater. And with even the President of the U.S. calling out the need for software bills of materials, it’s time to kick up the gear on open source...
Virtual
Roundtable
Thursday, August 18th, 2022
Tom Field
Jesse Netz
Tom Field with Jesse Netz
Virtual Roundtable
Advancing Threat Intel to Learn the Adversary's Next Move
Discussion topics will include:
As cybercriminals continue to target organizations with ransomware, API and DDoS attacks, security professionals are under constant pressure to become highly competent not just in threat prevention, but in detection and response. However they often struggle to understand threats and translate them into actionable countermeasures.

High quality defensive knowledge is scarce, and adversaries continue to take advantage of weak points including misconfigured defenses, poor security architectures, and excessive privileges, further reducing the value of investment in security solutions.

Register for...
Virtual
Roundtable
Wednesday, August 17th, 2022
Tom Field
Tyler Croak
Tom Field with Tyler Croak
Virtual Roundtable
Steps to Reducing Ransomware Risk in a Cloud-First World
Discussion topics will include:
In 2021, a debilitating ransomware attack on Colonial Pipeline's IT systems caused both a physical response – the shutdown of the pipeline – and a hefty financial one, with the company paying more than $4 million ransom to restore data. After other high-profile attacks and a whole-of-government emphasis on mitigation in the U.S., it became apparent that ransomware is indeed a national security concern that can cut through every area of an enterprise.

Although there have been periods of relative...
Virtual
Roundtable
Wednesday, August 17th, 2022
Deepak Prasad
Anubhav  Wahie
Deepak Prasad with Anubhav Wahie
Virtual Roundtable
SOC Modernization: Simplify Operations; Multiply Impact
Discussion topics will include:
With an increasing digital footprint and sophisticated cyber adversaries, enterprises require extraordinary efforts to enhance their SOC capabilities to overcome alert fatigue, siloed functions, skills shortage, and improve 360-degree visibility. Security operations need to transform into an innate and proactive defense mechanism to withstand the surge in disruptive cyberattacks. On one hand, the CISOs and CIOs need to declutter and simplify their security operations, and on the other, they need to hyperautomate the mechanisms to ingest the right datasets to...
Virtual
Roundtable
Tuesday, August 16th, 2022
Tom Field
Sean Frazier
Tom Field with Sean Frazier
Virtual Roundtable
Cybersecurity Executive Order: One Year Later
Discussion topics will include:
The Executive Order on Improving the Nation’s Cybersecurity was groundbreaking. Signed last May, it mandated Zero Trust adoption across the government and recognized the importance of cloud adoption, cyber best practices, software supply chain integrity, and high-quality code.

Following several deadlines to date - in NIST defining critical software, the NTIA outlining minimum SBOM standards and more - agencies continue to move away from outdated security practices and toward new standards to, in turn, reduce vulnerabilities, boost cyber resilience, and...
In-Person
Roundtable
Ocean Prime- 2101 Cedar Springs Rd, Dallas TX 75201
Thursday, August 11th, 2022
Ocean Prime- 2101 Cedar Springs Rd, Dallas TX 75201
Tom Field
Chip Witt
Tom Field with Chip Witt
In-Person Roundtable
How Malware Helps Bad Actors Get Away with Online Fraud (and What Enterprises Can Do About It)
Discussion topics will include:
Despite your team’s best efforts to defend against cyberattacks, organizations often lack visibility into when employees and consumers fall victim to the most nefarious type of attack - malware infections. Malware-stolen data is highly valuable to bad actors and is a gateway for them to commit fraud and infiltrate corporate networks.

When your users are affected by malware, it’s too late. Once a botnet is installed (like the infamous RedLine Stealer), cybercriminals have already started to siphon critical information such...
Virtual
Roundtable
Wednesday, August 10th, 2022
Subbu  Subramanian
Suraj Pandey
Subbu Subramanian with Suraj Pandey
Virtual Roundtable
Accelerate Your Cloud Migration Strategy to Modernize Applications
Discussion topics will include:
The interest in multi-cloud adoption has shown an upward trend as C-level executives take deployment decisions. To stay competitive, companies are now modernizing applications across the board.

While multi-cloud architecture has become the new reality of corporate IT, it presents a new set of challenges to achieve the agility and scalability needed to keep up with the pace of digital transformation.

However, the move to multi-cloud environments has made it challenging for enterprises to optimize infrastructure performance and resource consumption....
Virtual
Roundtable
Virtual
Tuesday, August 9th, 2022
Virtual
Tom  Field
David Balcar
Tom Field with David Balcar
Virtual Roundtable
How to Modernize Your SOC (Without Blowing it Up)
Discussion topics will include:
The problems are staring at you: A broader potential attack surface than you've ever had before; more alerts than your systems and staff can monitor, never mind act upon; and recruiting & retaining SOC analysts are harder than ever.
But knowing you need to modernize your SOC is one thing; doing it is quite another. How do you upgrade without a complete rip and replace? How do you gain not just the visibility you need across disparate environments, but context...
VIrtual
Roundtable
Tuesday, August 9th, 2022
Anna Delaney
Malcolm Murphy
Anna Delaney with Malcolm Murphy
VIrtual Roundtable
Protecting Your Brand from Impersonation Scams
Discussion topics will include:
Retail scams, business email compromise, supply chain impersonation, and money mule recruitment campaigns are just a few of the types of brand exploitation attacks targeting businesses with an online presence.

Frost & Sullivan’s Global State of Online Digital Trust reports that 78% of consumers indicate that it’s crucial that their personal information be protected online, and 48% have stopped using an online service when it’s subject to a breach. How are you protecting your brand from sophisticated social engineering techniques?...
In-Person
Roundtable
Tivoli Mofarrej São Paulo Hotel
Thursday, August 4th, 2022
Tivoli Mofarrej São Paulo Hotel
Longinus Timochenco
Hilmar Becker
Longinus Timochenco with Hilmar Becker
In-Person Roundtable
Fraudes e Inteligência Artificial: sua empresa está pronta para contra-atacar a nova geração de crimes financeiros?
Discussion topics will include:
É crescente o uso de recursos de inteligência artificial por parte de criminosos cibernéticos para elaborar fraudes financeiras cada vez mais eficientes. Empregando robôs e scripts automatizados, eles conseguem varrer a internet em busca de credenciais comprometidas, roubar identidades digitais e causar danos irreversíveis — quem não sofre ao contabilizar os chargebacks ao final de um mês que atire a primeira pedra. Será que a sua empresa está pronta para lidar com essa nova geração de fraudadores?

Pois saiba que...
Virtual
Roundtable
Virtual
Thursday, August 4th, 2022
Virtual
Rick McElroy
Tom  Field
Rick McElroy with Tom Field
Virtual Roundtable
How to Modernize Your SOC (Without Blowing it Up)
Discussion topics will include:
The problems are staring at you: A broader potential attack surface than you've ever had before; more alerts than your systems and staff can monitor, never mind act upon; and recruiting & retaining SOC analysts are harder than ever.

But knowing you need to modernize your SOC is one thing; doing it is quite another. How do you upgrade without a complete rip and replace? How do you gain not just the visibility you need across disparate environments, but context...
Virtual
Roundtable
Canada
Wednesday, August 3rd, 2022
Canada
Jameeka Green Aaron
Tony Morbin
Jameeka Green Aaron with Tony Morbin
Virtual Roundtable
Using CIAM to Disrupt the Economics of Attackers
Discussion topics will include:
Deception for crime or warfare is an established tactic used by attackers, probably as old as humanity. Even in today’s online world, fake and stolen identity are primary routes for attackers to gain unauthorized access to an organization's digital assets, networks, or systems. In fact a recent report found that 79% of organizations have experienced an identity-related security breach in the last two years.

Reliably establishing and authenticating the identities of those we choose to trust online enables us to...
Virtual
Roundtable
Tuesday, August 2nd, 2022
Tom Field
Mike Britton
Tom Field with Mike Britton
Virtual Roundtable
Email Security: Changing the Game Against Game-Changing Attacks?
Discussion topics will include:
Phishing. Business email compromise. Executive impersonation. Ransomware. Today's email-borne threats are sophisticated, targeted and come at a relentless scale. There’s little denying that they are game-changing.

But can you say the same about your email defenses? Is email security the priority it should be for your enterprise, or are you trying to counter 2022 attacks with 2012 defenses? How do you hope to upgrade your defenses, and what will it take to obtain the resources you need?

Join this session,...
In
Person Roundtable
Ruth's Chris Steak House Manhattan
Thursday, July 28th, 2022
Ruth's Chris Steak House Manhattan
Mackenzie Kyle
Karthik Kannan
Mackenzie Kyle with Karthik Kannan
In Person Roundtable
Mission Critical: Modernizing Security Operations
Discussion topics will include:
Security operations teams are reaching their breaking point, and new strategies are needed.

According to a new research study by Enterprise Strategy Group, 60% of security professionals surveyed say alert triage is challenging or overwhelming, and 89% of all surveyed security decision makers feel their organization needs a transformational or moderate amount of change in its SOC to mitigate business threats.

But what does modernization actually mean? How can security leaders help their teams to better understand their threat coverage,...
Virtual
Roundtable
Wednesday, July 27th, 2022
Tyler Croak
Tom Field
Tyler Croak with Tom Field
Virtual Roundtable
Steps to Reducing Ransomware Risk in a Cloud-First World
Discussion topics will include:
In 2021, a debilitating ransomware attack on Colonial Pipeline's IT systems caused both a physical response – the shutdown of the pipeline – and a hefty financial one, with the company paying more than $4 million ransom to restore data. After other high-profile attacks and a whole-of-government emphasis on mitigation in the U.S., it became apparent that ransomware is indeed a national security concern that can cut through every area of an enterprise.

Although there have been periods of relative...
In-Person
Roundtable
Ruth's Chris Steakhouse Uptown
Thursday, July 21st, 2022
Ruth's Chris Steakhouse Uptown
Andy Ellis
Tom Field
Andy Ellis with Tom Field
In-Person Roundtable
Better Understanding Cloud Security Risks Through ‘Context’
Discussion topics will include:
In just a few years, cloud conversations have gone from theoretical to critical. And with migrations to the cloud ongoing, many enterprises have had to rethink their security approach. In these environments, some practitioners are charged with expending resources to mitigate “high-severity” CVEs – regardless of how a vulnerability may interact with that IT environment. This risk may pale in comparison, for example, to a malware occurrence at the edge that goes unchecked.

A potential lack of visibility into apps,...
Virtual
Roundtable
Thursday, July 21st, 2022
Briana Farro
Dave Perera
Briana Farro with Dave Perera
Virtual Roundtable
Advancing Threat Intel to Learn the Adversary's Next Move
Discussion topics will include:
As cybercriminals continue to target organizations with ransomware, API and DDoS attacks, security professionals are under constant pressure to become highly competent not just in threat prevention, but in detection and response. However they often struggle to understand threats and translate them into actionable countermeasures.

High quality defensive knowledge is scarce, and adversaries continue to take advantage of weak points including misconfigured defenses, poor security architectures, and excessive privileges, further reducing the value of investment in security solutions.

Register for...
Virtual
Roundtable
Wednesday, July 20th, 2022
Tom Field
Shashi  Prakash
Tom Field with Shashi Prakash
Virtual Roundtable
Managing Risk Outside Your Four Walls: Strategies for Protecting Your External Attack Surface
Discussion topics will include:
Security practitioners are increasingly put to task to address threats and risks occurring outside the traditional four walls of the enterprise. Referred to as a company’s external attack surface, it comprises typosquat domains; fake websites, apps, and ads; counterfeit sales; email compromise; and social media fraud.

And with technology stacks piling high, security teams are increasingly looking for efficient engines that can detect and act against these external activities in real time - including scams propagated through multiple platforms and...
Virtual
Roundtable
Wednesday, July 20th, 2022
Tom Field
David Balcar
Tom Field with David Balcar
Virtual Roundtable
Retail Security in a Time of Digital Transformation
Discussion topics will include:
With scores of active accounts, deep PII and stacks of legacy technology, the retail and hospitality industries remain top targets for cyber criminals. The accelerated digital transformation has also fueled new fraud attempts on point of sale systems, payment card accounts and third-party suppliers.

How has the retail/hospitality attack surface shifted in the past year? What have cybersecurity leaders learned about protecting card transactions and point of sale systems? What supply chain lessons must be learned from the SolarWinds breach?...
In
Person Roundtable
10-11 Carlton House Terrace
Wednesday, July 20th, 2022
10-11 Carlton House Terrace
Tehal Gataura
Bruce Hogg
Tehal Gataura with Bruce Hogg
In Person Roundtable
Modernising Data Security for Complex Environments
Discussion topics will include:
The rapid adoption of hybrid cloud and multicloud services, along with an increasing number of cloud infrastructure and platform services, has created an explosion in complexity and concerns about data security and cloud compliance.

Common challenges for organizations include; a lack of visibility and decentralized governance across multiple environments, a lack of internal consensus about how cloud compliance should be handled and the inability to get real-time, accurate and actionable insights to detect and respond to threats.

Moreover, noncompliance with...
Virtual
Roundtable
Wednesday, July 20th, 2022
Brian Pereira
Denis Donnelly
Brian Pereira with Denis Donnelly
Virtual Roundtable
Securing Hybrid Work Environments - The Need for a New Approach
Discussion topics will include:
Hybrid work locations are becoming permanent for many organizations. These hybrid models continue to present many challenges. How does one secure the remote workforce with ever increasing successful attacks, an expanding attack surface, and impact? How do you collate ever more security data from scattered endpoints and then harness it for threat detection?

Traditional security solutions will not suffice to do this. Attackers are thinking different and so must organizations.

A new generation of cloud-based threat intelligence solutions will be...
In
Person Roundtable
Morton's The Steakhouse – Wacker Place
Tuesday, July 19th, 2022
Morton's The Steakhouse – Wacker Place
Jonathan  Trull
Tom Field
Jonathan Trull with Tom Field
In Person Roundtable
Measuring the Maturity of Your Cloud Security Program
Discussion topics will include:
Amidst the accelerated digital transformation of the past two years, enterprises across sectors have gone from dipping their toes in the cloud to being fully immersed in multi-cloud environments. At the same time, they've encountered the reality: Security in the cloud is a different animal, and it requires unique skills.

What does cloud security maturity look like? Where is your organization on the road to maturity? How do you measure progress - and gain access to the right talent?

Register...
Virtual
Roundtable
Tuesday, July 19th, 2022
Brad LaPorte
Cal Harrison
Brad LaPorte with Cal Harrison
Virtual Roundtable
Are You Prepared for Attack Surface Management v2.0?
Discussion topics will include:
Among the lessons learned from the Log4j zero-day: Your enterprise's attack surface is no longer stopping at your ‘four walls.’ In fact according to a recent survey by Anchore, over half of the companies surveyed were targeted by software supply chain attacks in 2021.

The term "attack surface management" was coined by former Gartner analyst Brad LaPorte in 2019. But in 2022, enterprises need to embrace what LaPorte calls Attack Surface Management v2.0 - where with one well-integrated tool, security...
Virtual
Roundtable
Villa Merton
Tuesday, July 19th, 2022
Villa Merton
Iain Swaine
Christian Pyrros
Iain Swaine with Christian Pyrros
Virtual Roundtable
Fast-Moving Financial Fraud: How Well-Protected is Your Financial Institution?
Discussion topics will include:
With Global financial markets at a historical turning point, we’re meeting to address how banks and financial organisations in Germany can stay ahead of state-sponsored cyber gangs, brooding black swan attacks and crypto-jacking fraud.

Whilst ‘traditional’ online banking fraud remains a consistent threat, more advanced social engineering presents the need for banks and critical infrastructure to gain deeper visibility into risk.

This executive discussion will provide insights into the warnings issued by BaFin to address how German banks can prepare...
Virtual
Roundtable
Wednesday, July 13th, 2022
Rick McElroy
Tom  Field
Rick McElroy with Tom Field
Virtual Roundtable
How to Modernize Your SOC (Without Blowing it Up)
Discussion topics will include:
The problems are staring at you: A broader potential attack surface than you've ever had before; more alerts than your systems and staff can monitor, never mind act upon; and recruiting & retaining SOC analysts are harder than ever.

But knowing you need to modernize your SOC is one thing; doing it is quite another. How do you upgrade without a complete rip and replace? How do you gain not just the visibility you need across disparate environments, but context...
Virtual
Roundtable
Tuesday, July 12th, 2022
Jason Georgi
Danielle Syvertsen
Jason Georgi with Danielle Syvertsen
Virtual Roundtable
Zero Trust and SASE: Embracing Today's Workforce Security Solutions for the Financial Sector
Discussion topics will include:
Zero Trust and Secure Access Service Edge allow Financial Services enterprises to leave behind the challenges of legacy security approaches, secure their systems and support innovative and competitive ways of working.

But new strategies come with the need for new skills and tools. How is your FinServ organization embracing Zero Trust, cloud migration and SASE against competing priorities? How are you balancing in-house and outsourced resources to manage your transformation? What security gaps are evident as you secure this here-to-stay...
In
Person Roundtable
New York City - Convene
Tuesday, July 12th, 2022
New York City - Convene
Tom Field
Chris Eng
Tom Field with Chris Eng
In Person Roundtable
Software Security: How to Prioritize, Measure and Convey it to the Board
Discussion topics will include:
Amidst the shifting threat landscape in the healthcare sector, cloud migration and ongoing digital transformation, software security is often low or even last on the list of priorities for security leaders to address.
Yet, with the 2021 presidential executive order on cybersecurity, and as headlines continue to feature high-profile breaches, board members at healthcare organizations - and across all industries - are taking notice. Even though there are often designated technical experts on boards, there is now an increased awareness...
Virtual
Roundtable
Thursday, July 7th, 2022
Tom Field
Mike Britton
Tom Field with Mike Britton
Virtual Roundtable
Email Security: Changing the Game Against Game-Changing Attacks?
Discussion topics will include:
Phishing. Business email compromise. Executive impersonation. Ransomware. Today's email-borne threats are sophisticated, targeted and come at a relentless scale. There’s little denying that they are game-changing.

But can you say the same about your email defenses? Is email security the priority it should be for your enterprise, or are you trying to counter 2022 attacks with 2012 defenses? How do you hope to upgrade your defenses, and what will it take to obtain the resources you need?

Join this session,...
In-Person
Roundtable
Conrad Bengaluru,25/3, Kensington Rd, Ulsoor, Bengaluru, 560008
Thursday, July 7th, 2022
Conrad Bengaluru,25/3, Kensington Rd, Ulsoor, Bengaluru, 560008
Geetha  Nandikotkur
Murali  Urs
Geetha Nandikotkur with Murali Urs
In-Person Roundtable
Practical Steps to Security Management: Accelerating Your Response Mechanism
Discussion topics will include:
As organizations become vulnerable to threats and attacks, the big question is how to accelerate their incident response mechanism by effectively managing their security and controls.

The concerns are justified because the average volume of attacks and breaches has increased rapidly, with the bad guys creating significant business loss, downtime, and the cost of response going up.

The significant challenge for CISOs is to monitor their alerts in real-time and take appropriate action based on defined policies, an effective risk...
Virtual
Roundtable
Wednesday, July 6th, 2022
Tom Field
Michael Lyborg
Tom Field with Michael Lyborg
Virtual Roundtable
The Many Benefits of Security Automation
Discussion topics will include:
With cyberattacks on the rise and fears of international escalation in cyberspace, security teams are actively working to bolster defense. But with the prevalence of security rising, the gulf between today's workforce and its needs is vast. This leaves CISOs under-resourced and analysts in the SOC spread thin. Enter "Security Orchestration, Automation, and Response," or SOAR, tools.

Without automated tools to centralize event data and improve incident response, tasks delegated to "humans" can get tedious and overwhelming – causing a...
Virtual
Roundtable
Wednesday, July 6th, 2022
Jeremy Kirk
Fabio Fratucello
Jeremy Kirk with Fabio Fratucello
Virtual Roundtable
Detection and Response: Closing Gaps that Adversaries Exploit
Discussion topics will include:
Adversaries are continually exploiting organisations faster than ever. The time between an adversary gaining access to a system to launching an attack is now coming down to just minutes. If defence teams miss an alert or an automated defensive response doesn't take place, it could result in an adversary making a successful breach or a ransomware attack.

Security technologies are an alphabet soup. XDR, or extended detection and response, is one of the latest acronyms. But what does XDR mean,...
Virtual
Roundtable
Virtual
Thursday, June 30th, 2022
Virtual
Barret Kaubisch
Tom Field
Barret Kaubisch with Tom Field
Virtual Roundtable
Strategies to Catch Synthetic ID Fraud
Discussion topics will include:
Synthetic identity fraud — where criminals use a combination of real and fake information to create a fictitious identity and then open counterfeit accounts to make fraudulent purchases — costs banks $6 billion dollars annually and is one of the fastest growing types of financial crime in the U.S., according to the FBI.

Traditional fraud tools that were designed to capture stolen identities do not serve well in solving synthetic identity problems. Unlike stolen identity information, where fraudsters act quickly...
Virtual
Roundtable
Virtual
Thursday, June 30th, 2022
Virtual
Chris Campbell
Mathew Schwartz
Chris Campbell with Mathew Schwartz
Virtual Roundtable
Microsegmentation: Best Practices for Blocking and Containing Breaches in Financial Services
Discussion topics will include:
Running an effective cybersecurity program doesn't just require hoping for the best, but planning for the worst. Despite an organisation's best efforts, attackers nevertheless manage to breach their defenses and steal regulated customer data, unleash crypto-locking malware and more.

Organisations in the financial services sector have been looking to protect their network by reducing the attack surface, containing the impact of an intrusion and stopping lateral movement. The way to achieve these goals is through software-defined microsegmentation.

How can organisations...
Virtual
Roundtable
Tuesday, June 28th, 2022
Jameeka Green Aaron
Tony Morbin
Jameeka Green Aaron with Tony Morbin
Virtual Roundtable
Using CIAM to Disrupt the Economics of Attackers
Discussion topics will include:
Deception for crime or warfare is an established tactic used by attackers, probably as old as humanity. Even in today’s online world, fake and stolen identity are primary routes for attackers to gain unauthorized access to an organization's digital assets, networks, or systems. In fact a recent report found that 79% of organizations have experienced an identity-related security breach in the last two years.

Reliably establishing and authenticating the identities of those we choose to trust online enables us to...
In
Person Roundtable
Amsterdam - Venue TBA
Tuesday, June 28th, 2022
Amsterdam - Venue TBA
Paul Horton
Mathew Schwartz
Paul Horton with Mathew Schwartz
In Person Roundtable
Software Supply Chains: A Look into the Future
Discussion topics will include:
Massive exploits such as the recent Log4j/Log4shell vulnerability are a sign that best practices are still evolving, and the risk of mismanaging, or worse, ignoring open source vulnerabilities, is only becoming greater. It’s time to kick up the gear on open source and software supply chain management conversations.

Join us for an engaging, round-table conversation on what we need to know about managing open source and software supply chains in 2022.

Register for this executive roundtable, Software Supply Chains: A...
Virtual
Roundtable
Tuesday, June 28th, 2022
Anna Delaney
Keiron Holyome
Anna Delaney with Keiron Holyome
Virtual Roundtable
New Strategies for Readiness, Response, Recovery
Discussion topics will include:
Whether it's Log4j, SolarWinds or rising geopolitical tensions, anticipating cyber incidents has never been more challenging. The need for security leaders to demonstrate "cyber readiness" to the executive board is now crucial.

A useful tool to follow is the NIST Cybersecurity Framework but too often security teams prioritize the "identify", "protect", and "detect" functions, over "respond" and recover". Shifting greater focus to response and recovery will not only highlight vulnerabilities to the executive but also help increase funding across all...
Virtual
Roundtable
Thursday, June 23rd, 2022
Iain Swaine
Christian Pyrros
Iain Swaine with Christian Pyrros
Virtual Roundtable
Fast-Moving Financial Fraud: How Well-Protected is Your Financial Institution?
Discussion topics will include:
Global financial markets are at a historical turning point. While headlines are talking about Covid-19, crypto-currencies and QE, threat actors are working smarter to execute attacks. You already know the diversity of threats: from state-sponsored cyber gangs, quants in collapsed countries, or brooding black swans, it’s tough to stay protected. But with the coexistence of ‘traditional’ online banking fraud and more advanced social engineering, the need to gain deeper visibility into risk is now greater than before.

Register for this...
Virtual
Roundtable
Wednesday, June 22nd, 2022
Stephen Boyer
Anna Delaney
Stephen Boyer with Anna Delaney
Virtual Roundtable
Drive Accountability with Cyber Risk Governance
Discussion topics will include:
Cyber risk governance defines how an organization plans to protect itself from cyber events and threats. Governance describes the process for how to build a cybersecurity program, but doesn’t necessarily inform the effectiveness of your programs and policies. Without uniform performance targets defined in the governance policies, security leaders won’t know if their security controls are performing to their standards or if they’re within the bounds of their risk appetite.

To stay cyber resilient, forward-thinking security leaders need to measure...
In-Person
Roundtable
Sofitel Hotel | Bandra Kurla Complex, Bandra East, Mumbai
Wednesday, June 22nd, 2022
Sofitel Hotel | Bandra Kurla Complex, Bandra East, Mumbai
Geetha  Nandikotkur
Murali  Urs
Geetha Nandikotkur with Murali Urs
In-Person Roundtable
Practical Steps to Security Management: Accelerating Your Response Mechanism
Discussion topics will include:
As organizations become vulnerable to threats and attacks, the big question is how to accelerate their incident response mechanism by effectively managing their security and controls.

The concerns are justified because the average volume of attacks and breaches has increased rapidly, with the bad guys creating significant business loss, downtime, and the cost of response going up.

The significant challenge for CISOs is to monitor their alerts in real-time and take appropriate action based on defined policies, an effective risk...
In
Person Roundtable
NYC (Venue TBD)
Tuesday, June 21st, 2022
NYC (Venue TBD)
Tom Field
Chris Wysopal
Tom Field with Chris Wysopal
In Person Roundtable
Software Security: How to Prioritize, Measure and Convey It To the Board
Discussion topics will include:
Amidst the shifting threat landscape, cloud migration and ongoing digital transformation, software security is often low or even last on the list of priorities for security leaders to address.

Yet, with the recent executive order on cybersecurity, and as headlines continue to feature high-profile breaches, board members at organizations across all industries are taking notice. Even though there are often designated technical experts on boards, there is now an increased awareness around cybersecurity – especially software security – even among...
Virtual
Roundtable
Virtual
Tuesday, June 21st, 2022
Virtual
Fernando  Maymi
Tony Morbin
Fernando Maymi with Tony Morbin
Virtual Roundtable
Collective Defense: How to Secure the Finance Sector through Collaboration in Cybersecurity
Discussion topics will include:
When it comes to cybersecurity, financial firms often face limited visibility of unknown cyber threats (especially in today’s new hybrid work environments), insider threats, the ongoing skills shortage, and a high volume of attacks with the financial sector facing the most of any sector.
How can the finance sector raise its security posture by collaborating in real time — without any one firm losing its competitive edge? What are the barriers to threat exchange, and how can they be removed...
In-Person
Roundtable
Convene NYC
Tuesday, June 21st, 2022
Convene NYC
Tom Field
Chip Witt
Tom Field with Chip Witt
In-Person Roundtable
How Malware Helps Bad Actors Get Away with Online Fraud (and What Enterprises Can Do About It)
Discussion topics will include:
Despite your team’s best efforts to defend against cyberattacks, organizations often lack visibility into when employees and consumers fall victim to the most nefarious type of attack - malware infections. Malware-stolen data is highly valuable to bad actors and is a gateway for them to commit fraud and infiltrate corporate networks.

When your users are affected by malware, it’s too late. Once a botnet is installed (like the infamous RedLine Stealer), cybercriminals have already started to siphon critical information such...
In-Person
Roundtable
Convene NYC
Tuesday, June 21st, 2022
Convene NYC
Terry McGraw
Anna Delaney
Terry McGraw with Anna Delaney
In-Person Roundtable
Incident Response: Are You Prepared for Your Organization's Worst Day?
Discussion topics will include:
It could be ransomware, DDoS, a zero day such as Log4j or a supply chain attack similar to SolarWinds. You know it's not "if," it's "when does the next cyberattack strike?" And how prepared is your organization to respond to what invariably will be its worst day?

So much goes into preparation: What controls do you have in place for detection and response? Do you have the right people in place - and have they been drilled? Do you know...
Virtual
Roundtable
Thursday, June 16th, 2022
Andy Ellis
Anna Delaney
Andy Ellis with Anna Delaney
Virtual Roundtable
Better Understanding Cloud Security Risks Through ‘Context’
Discussion topics will include:
In just a few years, cloud conversations have gone from theoretical to critical. And with migrations to the cloud ongoing, many enterprises have had to rethink their security approach. In these environments, some practitioners are charged with expending resources to mitigate “high-severity” CVEs – regardless of how a vulnerability may interact with that IT environment. This risk may pale in comparison, for example, to a malware occurrence at the edge that goes unchecked.

A potential lack of visibility into apps,...
In-Person
Roundtable
Grand Hyatt Singapore, 10 Scotts Rd, Singapore 228211
Thursday, June 16th, 2022
Grand Hyatt Singapore, 10 Scotts Rd, Singapore 228211
Suparna Goswami
Felix Lam
Suparna Goswami with Felix Lam
In-Person Roundtable
Taking a Platform Approach to Reinvent Security for Today's Flexible Workforce
Discussion topics will include:
The transition to hybrid work has brought into sharp focus the challenges of connecting between people, devices, and data that are ever-expanding. Enterprises are looking for consistency for security and quality of experience regardless of an end-user’s location. The key is to simplify security, streamline policy enforcement and increase threat protection by combining multiple functions into a single, cloud-native service. But this needs to be done in a way that enables organisations of all sizes to deliver customer and employee...
Virtual
Roundtable
Wednesday, June 15th, 2022
Shashi Prakash
Tom Field
Shashi Prakash with Tom Field
Virtual Roundtable
Managing Risk Outside Your Four Walls: Strategies for Protecting Your External Attack Surface
Discussion topics will include:
Security practitioners are increasingly put to task to address threats and risks occurring outside the traditional four walls of the enterprise. Referred to as a company’s external attack surface, it comprises typosquat domains; fake websites, apps, and ads; counterfeit sales; email compromise; and social media fraud.

And with technology stacks piling high, security teams are increasingly looking for efficient engines that can detect and act against these external activities in real time - including scams propagated through multiple platforms and...
Virtual
Roundtable
Tuesday, June 14th, 2022
Jason Georgi
Danielle Syvertsen
Jason Georgi with Danielle Syvertsen
Virtual Roundtable
Zero Trust and SASE: Embracing Today's Workforce Security Solutions for the Financial Sector
Discussion topics will include:
Zero Trust and Secure Access Service Edge allow Financial Services enterprises to leave behind the challenges of legacy security approaches, secure their systems and support innovative and competitive ways of working.

But new strategies come with the need for new skills and tools. How is your FinServ organization embracing Zero Trust, cloud migration and SASE against competing priorities? How are you balancing in-house and outsourced resources to manage your transformation? What security gaps are evident as you secure this here-to-stay...
Virtual
Roundtable
Tuesday, June 14th, 2022
Suparna Goswami
Arvind Ganesan
Suparna Goswami with Arvind Ganesan
Virtual Roundtable
Credential Stuffing: Balancing a Layered Security Approach with User Experience
Discussion topics will include:
With the concept of super apps gaining acceptance, commerce companies are all set to leverage this new trend in the market. However, with scalability comes in security issues. Every online business with a login page is a potential target for credential stuffing. Recent studies have shown that most industries have reported credential stuffing as a significant security challenge. But visibility into this kind of attack continues to be a challenge. While a layered- security approach is ideal, user experience remains...
In-Person
Roundtable
JW Marriott Hotel New Delhi Aerocity, Asset Area 4 - Hospitality District Delhi, Aerocity, New Delhi, Delhi 110037
Thursday, June 9th, 2022
JW Marriott Hotel New Delhi Aerocity, Asset Area 4 - Hospitality District Delhi, Aerocity, New Delhi, Delhi 110037
Geetha  Nandikotkur
Murali  Urs
Geetha Nandikotkur with Murali Urs
In-Person Roundtable
Practical Steps to Security Management: Accelerating Your Response Mechanism
Discussion topics will include:
As organizations become vulnerable to threats and attacks, the big question is how to accelerate their incident response mechanism by effectively managing their security and controls.
The concerns are justified because the average volume of attacks and breaches has increased rapidly, with the bad guys creating significant business loss, downtime, and the cost of response going up.

The significant challenge for CISOs is to monitor their alerts in real-time and take appropriate action based on defined policies, an effective risk...
In
Person Roundtable
Morton's The Steakhouse - San Francisco
Tuesday, June 7th, 2022
Morton's The Steakhouse - San Francisco
Jonathan  Trull
Tom Field
Jonathan Trull with Tom Field
In Person Roundtable
Measuring the Maturity of Your Cloud Security Program
Discussion topics will include:
Amidst the accelerated digital transformation of the past two years, enterprises across sectors have gone from dipping their toes in the cloud to being fully immersed in multi-cloud environments. At the same time, they've encountered the reality: Security in the cloud is a different animal, and it requires unique skills.

What does cloud security maturity look like? Where is your organization on the road to maturity? How do you measure progress - and gain access to the right talent?

Register...
Virtual
Roundtable
Tuesday, June 7th, 2022
Mohan Damodaran
Tom Field
Mohan Damodaran with Tom Field
Virtual Roundtable
Incident Response: Are You Prepared for Your Organization's Worst Day?
Discussion topics will include:
It could be ransomware, DDoS, a zero day such as Log4j or a supply chain attack similar to SolarWinds. You know it's not "if," it's "when does the next cyberattack strike?" And how prepared is your organization to respond to what invariably will be its worst day?

So much goes into preparation: What controls do you have in place for detection and response? Do you have the right people in place - and have they been drilled? Do you know...
Virtual
Roundtable
Thursday, June 2nd, 2022
Tom Field
Kurt Weiss
Tom Field with Kurt Weiss
Virtual Roundtable
Financial Services: Strategies for a Frictionless Digital Onboarding
Discussion topics will include:
Balancing a frictionless consumer onboarding experience with advanced fraud prevention techniques is an increasing challenge for financial services in the digital era.

Furthermore, traditional financial services providers face fierce competition from a new generation of online-only challenger banks that are designed and built with a significant and digital-only demographic in mind: Gen-Z and younger millennials.

To attract this demographic, financial services must provide a near frictionless application process with as few clicks as possible to minimize abandonment. However, how can...
In-Person
Roundtable
Sofitel Hotel | Bandra Kurla Complex, Bandra East, Mumbai
Thursday, June 2nd, 2022
Sofitel Hotel | Bandra Kurla Complex, Bandra East, Mumbai
Suparna Goswami
Sam O'Brien
Suparna Goswami with Sam O'Brien
In-Person Roundtable
Harnessing Risk Quantification to Make Cents of Cyber
Discussion topics will include:
The events of the last 2 years have led to an incredible acceleration of digital transformation. It has not only allowed organisations to continue operating through very difficult times, but has allowed many to prosper. One of the learnings of this transformation, has been that an organisation’s cyber capabilities exist as both an enabler and as a threat. It is becoming increasingly difficult to balance the two and more is needed to differentiate which issues truly matter most.

From establishing...
Virtual
Roundtable
Canada
Wednesday, June 1st, 2022
Canada
Jameeka Green Aaron
Tony Morbin
Jameeka Green Aaron with Tony Morbin
Virtual Roundtable
Using CIAM to Disrupt the Economics of Attackers
Discussion topics will include:
Deception for crime or warfare is an established tactic used by attackers, probably as old as humanity. Even in today’s online world, fake and stolen identity are primary routes for attackers to gain unauthorized access to an organization's digital assets, networks, or systems. In fact a recent report found that 79% of organizations have experienced an identity-related security breach in the last two years.

Reliably establishing and authenticating the identities of those we choose to trust online enables us to...
Virtual
Roundtable
Wednesday, June 1st, 2022
Tom Field
Shashi Prakash
Tom Field with Shashi Prakash
Virtual Roundtable
Managing Risk Outside Your Four Walls: Strategies for Protecting Your External Attack Surface
Discussion topics will include:
Security practitioners are increasingly put to task to address threats and risks occurring outside the traditional four walls of the enterprise. Referred to as a company’s external attack surface, it comprises typosquat domains; fake websites, apps, and ads; counterfeit sales; email compromise; and social media fraud.

And with technology stacks piling high, security teams are increasingly looking for efficient engines that can detect and act against these external activities in real time - including scams propagated through multiple platforms and...
Virtual
Roundtable
Tuesday, May 31st, 2022
Tom Field
Chad Skipper
Tom Field with Chad Skipper
Virtual Roundtable
Techniques to Defeat Malware Attacks Against Multi-Cloud Environments
Discussion topics will include:
In the past five years, Linux has become the most common operating system in multi-cloud environments and powers more than 78 percent of the most popular websites. This has not gone unnoticed by malicious actors who have quickly taken advantage of weak authentication, vulnerabilities and misconfigurations in container-based infrastructures to infiltrate the environment with remote access tools (RATs), and once in, deploy ransomware or cryptomining tools.

Current malware countermeasures are mostly focused on addressing Windows-based threats, leaving many public and...
Virtual
Roundtable
Tuesday, May 31st, 2022
Jef Hu
Suparna  Goswami
Jef Hu with Suparna Goswami
Virtual Roundtable
Credential Stuffing: Understanding the Criminal Economy
Discussion topics will include:
Credential stuffing are no longer a problem for only the financial industry. Every online business with a login page is a potential target for credential stuffing. A recent study by Ponemon shows that more than half the respondents from e-commerce industry reported credential stuffing as a significant security challenge. Additionally, nearly 70% of respondents said they were unsure if their companies had adequate visibility into these attacks. Unfortunately, login requests resulting from credential stuffing is hard to detect.

For any...
Virtual
Roundtable
Thursday, May 26th, 2022
Tom Field
Kevin Orr
Tom Field with Kevin Orr
Virtual Roundtable
Identity: A Core Component to Zero Trust
Discussion topics will include:
Digital identity remains an underlying concern in cyberspace. In fact, it is one of the most substantial elements of Zero Trust architectures - which entails all users (inside or outside the organization) being authenticated, authorized, and continuously validated. Identity - from employees, to remote workers, to third-party vendors, to devices or apps - can create a direct path toward an organization's crown jewels.

Be it open access to cloud environments or excessive permissions, "identity" can spell doom for today's organizations....
In-Person
Roundtable
Pullman New Delhi Aerocity
Thursday, May 26th, 2022
Pullman New Delhi Aerocity
Suparna Goswami
Mukesh  Chand Thapliyal
Suparna Goswami with Mukesh Chand Thapliyal
In-Person Roundtable
Using SASE to Reinvent Security for Today's Flexible Workforce
Discussion topics will include:
The transition to hybrid work has brought into sharp focus the challenges of connecting between people, devices, and data that are ever-expanding. Enterprises are looking for consistency for security and quality of experience regardless of an end-user’s location. The key is to simplify security, streamline policy enforcement, and increase threat protection by combining multiple functions into a single, cloud-native service. SASE promises to do this. As the workloads have moved out of offices' secure environment, how do you improve productivity...
Virtual
Roundtable
Wednesday, May 25th, 2022
Tom Field
Noel Reynolds
Tom Field with Noel Reynolds
Virtual Roundtable
Incident Response: Are You Prepared for Your Organization's Worst Day?
Discussion topics will include:
It could be ransomware, DDoS, a zero day such as Log4j or a supply chain attack similar to SolarWinds. You know it's not "if," it's "when does the next cyberattack strike?" And how prepared is your organization to respond to what invariably will be its worst day?

So much goes into preparation: What controls do you have in place for detection and response? Do you have the right people in place - and have they been drilled? Do you know...
In-Person
Roundtable
Shangri-La Sydney | 176 Cumberland St, The Rocks NSW 2000, Australia
Wednesday, May 25th, 2022
Shangri-La Sydney | 176 Cumberland St, The Rocks NSW 2000, Australia
Jeremy Kirk
Stephen  Gillies
Jeremy Kirk with Stephen Gillies
In-Person Roundtable
How to Improve and Quantify Improvement in Application Security
Discussion topics will include:
The success of an application security program can be defined in one overarching metric: an absence of bad events such as breaches or ransomware. The process starts when an application is coded, hopefully with security in mind. But the real challenge comes in production, where not only the application itself but the defences built around it, are put to the test.

Web application firewalls are components of that defence, but it can be tricky to tune them perfectly. With attackers...
In-Person
Roundtable
County Hall, Belvedere Rd, London, UK
Tuesday, May 24th, 2022
County Hall, Belvedere Rd, London, UK
Anna Delaney
Jay Coley
Anna Delaney with Jay Coley
In-Person Roundtable
High Tech: Best Practices to Secure Data in Hybrid Work Environments
Discussion topics will include:
The ongoing need for digital transformation continues to push more and more organizations into the cloud, bringing their apps and data with them. But managing an infrastructure of multiple private clouds, public clouds, edge environments and on-prem is complex. One insecure API or misconfigured server and organizations may risk being crippled by long-term financial or reputational damages.

How can you keep your websites both secure and performant while empowering your organization to effectively detect threats before they impact your business?...
In-Person
Roundtable
County Hall, Belvedere Rd, London SE1 7PB
Tuesday, May 24th, 2022
County Hall, Belvedere Rd, London SE1 7PB
Steve Midgley
Mathew Schwartz
Steve Midgley with Mathew Schwartz
In-Person Roundtable
The Path to Cyber Maturity: Where Are You?
Discussion topics will include:
Traditional approaches to keeping data and applications secure are no longer sustainable in the era of ransomware and supply chain threats, mass digitalization and modern cloud deployment. Enterprises with ‘immature’ cybersecurity strategies are unprepared to identify and prioritize threats and perform effective risk mitigation.

Discussion topics will include:
Best practices to gain insights and visibility into your security posture
Strategies to quantify your cyber risk
Techniques to ensure defenses are in line with shifting threats

Join ISMG's Anna Delaney for...
Virtual
Roundtable
Thursday, May 19th, 2022
Tari   Schreider
Tyler Croak
Tari Schreider with Tyler Croak
Virtual Roundtable
Steps to Reducing Ransomware Risk in a Cloud-First World
Discussion topics will include:
In 2021, a debilitating ransomware attack on Colonial Pipeline's IT systems caused both a physical response – the shutdown of the pipeline – and a hefty financial one, with the company paying more than $4 million ransom to restore data. After other high-profile attacks and a whole-of-government emphasis on mitigation in the U.S., it became apparent that ransomware is indeed a national security concern that can cut through every area of an enterprise.

Although there have been periods of relative...
Virtual
Roundtable
Thursday, May 19th, 2022
Anna Delaney
Weston Morris
Anna Delaney with Weston Morris
Virtual Roundtable
Healthcare: Why Employee Experience is Key to Digital Transformation
Discussion topics will include:
Over the past two years, healthcare entities leapt headlong into digital transformation by adopting and deploying new solutions for telehealth, digital workplaces, and cybersecurity.

At the same time, the pandemic ushered high demand for care, overrun ERs, caregiver burnout and vaccine mandate backlash. The employee experience (EX) of clinical and non-clinical staff is now in crisis.

And yet, the true potential of healthcare IT innovation cannot thrive in an environment of disengaged and dissatisfied employees, which, in turn, negatively impacts...
Virtual
Roundtable
Wednesday, May 18th, 2022
James Brotsos
James Ferguson
James Brotsos with James Ferguson
Virtual Roundtable
How Prepared Are You for the Next Log4j?
Discussion topics will include:
Open source code dominates modern application code. It is also considered a "national security issue," in light of the recent Log4j attacks. Open source code, misconfigurations and known unpatched vulnerabilities are among the application security risks facing all organizations that could lead to a breach.

According to analysts at Forrester, security leaders must manage open source risk with tools and processes including a software bill of materials (SBOM), software composition analysis and third-party risk management.

The question is, how prepared...
Virtual
Roundtable
Wednesday, May 18th, 2022
Tom Field
David Balcar
Tom Field with David Balcar
Virtual Roundtable
Retail Security in a Time of Digital Transformation: Turning the Run into a Sprint
Discussion topics will include:
With scores of active accounts, deep PII and stacks of legacy technology, the retail and hospitality industries remain top targets for cyber criminals. The accelerated digital transformation has also fueled new fraud attempts on point of sale systems, payment card accounts and third-party suppliers.

How has the retail/hospitality attack surface shifted in the past year? What have cybersecurity leaders learned about protecting card transactions and point of sale systems? What supply chain lessons must be learned from the SolarWinds breach?...
Virtual
Roundtable
Wednesday, May 18th, 2022
Tim Erridge
Gianluca Varisco
Tim Erridge with Gianluca Varisco
Virtual Roundtable
Pre-Empting the Attacker's Next Move: Strengthening Threat Intel Capabilities
Discussion topics will include:
Threat intelligence is increasingly recognized as an important weapon of an organization's defense strategy. Understanding who is targeting your enterprise, their motivations and capabilities are required to predict the threat actor's next move.

However, the continual tracking and interpreting of large amounts of dispersed data, as well as regular reevaluation and development of the right skills and resources have made it challenging for businesses to cultivate mature threat intelligence capabilities.

How can security leaders strengthen their threat intelligence programs to...
Virtual
Roundtable
Wednesday, May 18th, 2022
Aaron Sharp
Jeremy Kirk
Aaron Sharp with Jeremy Kirk
Virtual Roundtable
Building a Successful Data-Driven Security Program
Discussion topics will include:
Security leaders are looking to get the most value from their investments. They're looking for metrics that help gauge how their investments have resulted in better security outcomes. They're also looking for clues in data that indicate where future investments need to be made in order to reduce their risk profiles.

There are numerous sources for security data: SIEMs, XDR or EDR platforms, logs collected by security products are amongst them. But taking raw data and transforming it into meaningful...
Virtual
Roundtable
Tuesday, May 17th, 2022
Tom Field
Richard Byrd
Tom Field with Richard Byrd
Virtual Roundtable
Collective Defense: How to Operationalize Public/Private Sector Collaboration
Discussion topics will include:
Since the release of President Biden's cybersecurity executive order last May, there has been great progress on topics such as adoption of zero-trust security and even establishment of a cybersecurity safety review board.

But one of the key provisions lacks such progress: Removing barriers to threat information sharing between government and the private sector. In the absence of guidance or support for this critical initiative, how do private and public sector entities move forward? What are the barriers, and how...
In-Person
Roundtable
5Church Midtown, Atlanta GA
Thursday, May 12th, 2022
5Church Midtown, Atlanta GA
Tom Field
Chris Pierson
Tom Field with Chris Pierson
In-Person Roundtable
Executive Protection for Digital Lives – What CIOs and CISOs Need to Consider Beyond the Office
Discussion topics will include:
Senior leaders’ unified digital life mingling personal and professional data and devices has become the soft underbelly of corporate cybersecurity. Therefore, CEOs and their CISOs need to extend the defense perimeter and protect the entire digital lives of all executives and key personnel. Some statistics:

- 27% of executives have malware on their personal devices
- 20% of executives’ homes are digitally compromised
- 69% of executive’s personal passwords are on the Dark Web
- 75% have improper privacy and...
Virtual
Roundtable
Thursday, May 12th, 2022
Shashi Prakash
Tony Morbin
Shashi Prakash with Tony Morbin
Virtual Roundtable
Managing Risk Outside Your Four Walls: Strategies for Protecting Your External Attack Surface
Discussion topics will include:
Security practitioners are increasingly put to task to address threats and risks occurring outside the traditional four walls of the enterprise. Referred to as a company’s external attack surface, it comprises typosquat domains; fake websites, apps, and ads; counterfeit sales; email compromise; and social media fraud.

And with technology stacks piling high, security teams are increasingly looking for efficient engines that can detect and act against these external activities in real time - including scams propagated through multiple platforms and...
Virtual
Roundtable
Thursday, May 12th, 2022
Geetha Nandikotkur
John  Sandiford
Geetha Nandikotkur with John Sandiford
Virtual Roundtable
An Effective Approach to Vulnerability Management in 2022
Discussion topics will include:
With enterprises flooded with vulnerabilities, critical ones tend to get lost in the deluge more often than not. However, when the same gets exploited by threat actors, it leads to business disruptions. The challenge for most enterprises often lies in knowing the significant components of software and knowing their vulnerabilities.

The key is to have a single pane of glass to get visibility across your assets. But, how do you put the right strategies in place? Do you have enough...
Virtual
Roundtable
Tuesday, May 10th, 2022
Tom Field
John Paul Blaho
Tom Field with John Paul Blaho
Virtual Roundtable
Advanced Fraud Requires Advanced Defenses
Discussion topics will include:
Digital transformation has enabled financial institutions to offer a suite of new services to customers who now can conduct business from anywhere, on any device.

But these same conveniences have opened new doors to fraudsters, who have refined their socially-engineered schemes to a new scale and sophistication that defy traditional fraud departments and their anti-fraud controls.

Advanced fraud schemes call for advanced defenses - strategies and controls that unify traditional silos such as fraud, legal, AML and other organizational silos....
Virtual
Roundtable
Canada
Tuesday, May 10th, 2022
Canada
Nabeel Saeed
Tony Morbin
Nabeel Saeed with Tony Morbin
Virtual Roundtable
How CISOs can go from *zero trust* to building trust, driving revenue, and delighting customers
Discussion topics will include:
Consumer-facing businesses need to attract, entice and delight customers, while deploying security that is unobtrusive but effective, providing assurance for both the customer and business. A high-end jewellery store may have $millions to protect, but it can’t take an impenetrable Fort Knox approach to security, similarly, what worked for securing your workforce does not work for securing your consumer-facing business.

You need to make your customer authentication smarter, make it easier to identify, verify, and authenticate customers with the degree...
In-Person
Roundtable
Ruth's Chris Steak House - 1355 N Harbor Dr, San Diego, CA 92101
Thursday, May 5th, 2022
Ruth's Chris Steak House - 1355 N Harbor Dr, San Diego, CA 92101
Tom Field
Noel Reynolds
Tom Field with Noel Reynolds
In-Person Roundtable
Incident Response: Are You Prepared for Your Organization's Worst Day?
Discussion topics will include:
It could be ransomware, DDoS, a zero day such as Log4j or a supply chain attack similar to SolarWinds. You know it's not "if," it's "when does the next cyberattack strike?" And how prepared is your organization to respond to what invariably will be its worst day?

So much goes into preparation: What controls do you have in place for detection and response? Do you have the right people in place - and have they been drilled? Do you know...
Virtual
Roundtable
Thursday, May 5th, 2022
Jeremy Kirk
David Hawkins
Jeremy Kirk with David Hawkins
Virtual Roundtable
From Prevention to Reality: Building a Cyber Resilient Organization
Discussion topics will include:
Strong cybersecurity is critical in the digital economy to create trusted, resilient organizations. But as the pace of digital transformation accelerates, the attack surface and vendor footprint within organizations has grown rapidly. Faced with greater exposure and more sophisticated cyber attacks, it is no longer possible for security leaders to prevent cyber breaches.

Security leaders must shift their focus from prevention to resilience to defend against greater exposure and more sophisticated cyber attacks. A focus on cyber resilience empowers organizations...
Virtual
Roundtable
Thursday, May 5th, 2022
Anna Delaney
Roger Sels
Anna Delaney with Roger Sels
Virtual Roundtable
New Strategies for Readiness, Response, Recovery
Discussion topics will include:
Whether it's Log4j, SolarWinds or rising geopolitical tensions, anticipating cyber incidents has never been more challenging. The need for security leaders to demonstrate "cyber readiness" to the executive board is now crucial.

A useful tool to follow is the NIST Cybersecurity Framework but too often security teams prioritize the "identify", "protect", and "detect" functions, over "respond" and recover". Shifting greater focus to response and recovery will not only highlight vulnerabilities to the executive but also help increase funding across all...
Virtual
Roundtable
Wednesday, May 4th, 2022
Tom Field
Michael Lyborg
Tom Field with Michael Lyborg
Virtual Roundtable
The Many Benefits of Security Automation
Discussion topics will include:
With cyberattacks on the rise and fears of international escalation in cyberspace, security teams are actively working to bolster defense. But with the prevalence of security rising, the gulf between today's workforce and its needs is vast. This leaves CISOs under-resourced and analysts in the SOC spread thin. Enter "Security Orchestration, Automation, and Response," or SOAR, tools.

Without automated tools to centralize event data and improve incident response, tasks delegated to "humans" can get tedious and overwhelming – causing a...
Virtual
Roundtable
Thursday, April 28th, 2022
Tom Field
Jon Powvens
Tom Field with Jon Powvens
Virtual Roundtable
Digital Healthcare's Future: It's About Availability
Discussion topics will include:
Healthcare compressed roughly a decade's worth of digital transformation into the past two years. As a result, patients now receive unprecedented digital services, and healthcare professionals have new tools for making decisions, sharing information, and delivering services from any remote location.

But today's digital healthcare footprint also represents one of the largest and most lucrative potential attack surfaces in history. Any healthcare entity is but a ransomware attack or a distributed denial of service incident away from being unable to...
Virtual
Roundtable
Tuesday, April 26th, 2022
Tyler Croak
David Pollino
Tyler Croak with David Pollino
Virtual Roundtable
Steps to Reducing Ransomware Risk in a Cloud-First World
Discussion topics will include:
In 2021, a debilitating ransomware attack on Colonial Pipeline's IT systems caused both a physical response – the shutdown of the pipeline – and a hefty financial one, with the company paying more than $4 million ransom to restore data. After other high-profile attacks and a whole-of-government emphasis on mitigation in the U.S., it became apparent that ransomware is indeed a national security concern that can cut through every area of an enterprise.

Although there have been periods of relative...
Virtual
Roundtable
Tuesday, April 26th, 2022
Josh Zelonis
Sid Srivastava
Josh Zelonis with Sid Srivastava
Virtual Roundtable
Financial Services: Techniques to Stay Ahead of the Adversaries
Discussion topics will include:
The 2022 State of Security Automation in Financial Services Study commissioned by Accenture and Palo Alto Networks revealed that 42% of surveyed financial institutions consider their current abilities to respond and detect to threats - such as ransomware and zero-day attacks - average, at best. Furthermore only 35% say that automation currently plays a strong role in how they identify and respond to threats.

The need to build smarter defense strategies is increasingly crucial to be prepared for the next...
In-Person
Roundtable
Ruth's Chris Steak House - 148 W 51st St, Manhattan, NY 10019
Thursday, April 21st, 2022
Ruth's Chris Steak House - 148 W 51st St, Manhattan, NY 10019
Brian Fox
Tom Field
Brian Fox with Tom Field
In-Person Roundtable
Software Supply Chains: A Look into the Future
Discussion topics will include:
If you thought 2021 was the year of the software supply chain, just wait until you see what unfolds in 2022.

Massive exploits such as the recent Log4j/Log4shell vulnerability are a sign that best practices are still evolving, and the risk of mismanaging, or worse, ignoring open source vulnerabilities, is only becoming greater. And with even the President of the U.S. calling out the need for software bills of materials, it’s time to kick up the gear on open source...
Virtual
Roundtable
Wednesday, April 20th, 2022
Tom Field
Praveen Vunnava
Tom Field with Praveen Vunnava
Virtual Roundtable
Ransomware: Are the Attackers Already in Your System?
Discussion topics will include:
What we learned about ransomware over the past year: The attacks are relentless, the barrier to entry for attackers is low, and the targets … are everyone in the supply chain. You might not be a direct target, but your supplier is. Further, the adversaries are patient - they may well be in your system now, laying the foundation for a future strike.

So, how does one reduce the risk of a successful attack? And if attacked, how does one...
Virtual
Roundtable
Wednesday, April 20th, 2022
Tim  Dalgleish
Suparna  Goswami
Tim Dalgleish with Suparna Goswami
Virtual Roundtable
Securing Against Account Takeovers Using Advanced Behaviour Analytics
Discussion topics will include:
Account Takeover fraud is one of the top losses for banks and financial institutions across the globe. Fraudsters continue to evolve and develop new methods and tools to take over accounts. Traditional tools and controls like the OTP, do not work against sophisticated social engineering scams, malware attacks and other creative account takeover methods. Moreover, financial institutions have to make account opening smooth for their customers. Financial institutions globally are increasingly relying on behavioural data to get powerful insights.
How...
Virtual
Roundtable
Thursday, April 14th, 2022
Tom Field
Peter Andrious
Tom Field with Peter Andrious
Virtual Roundtable
Account Verification: How to Read 'Digital Body Language'
Discussion topics will include:
Digital transformation has brought with it a plethora of new, digital services and an historic increase in customers - existing and new - who want to deal with your institution solely through digital channels.

But how do you validate that these customers are who they claim to be - especially at account opening? How do you balance the right amounts of security controls and ease of use to minimize customer friction and abandonment? What if you could read their digital...
Virtual
Roundtable
Wednesday, April 13th, 2022
Tom Field
Chad Skipper
Tom Field with Chad Skipper
Virtual Roundtable
Techniques to Defeat Malware Attacks Against Multi-Cloud Environments
Discussion topics will include:
In the past five years, Linux has become the most common operating system in multi-cloud environments and powers more than 78 percent of the most popular websites. This has not gone unnoticed by malicious actors who have quickly taken advantage of weak authentication, vulnerabilities and misconfigurations in container-based infrastructures to infiltrate the environment with remote access tools (RATs), and once in, deploy ransomware or cryptomining tools.

Current malware countermeasures are mostly focused on addressing Windows-based threats, leaving many public and...
Virtual
Roundtable
Wednesday, April 13th, 2022
Tony Lauro
Anna Delaney
Tony Lauro with Anna Delaney
Virtual Roundtable
Embracing the Zero Trust Journey: What's Next?
Discussion topics will include:
The Zero Trust security model is not a single technology, but a strategy, or even a programmatic approach that integrates elements of identity, network, application, data and cloud security to support a secure and agile business environment.

An executive order carrying Zero Trust requirements for federal agencies and several high-profile cyberattacks have hastened this sweeping shift in security - to require all users (inside or outside the organization) to be authenticated, authorized, and continuously validated. Zero Trust, which abandons the...
In-Person
Roundtable
Fleming’s Prime Steakhouse & Wine Bar - 180 El Camino Real, Palo Alto
Tuesday, April 12th, 2022
Fleming’s Prime Steakhouse & Wine Bar - 180 El Camino Real, Palo Alto
Tom Field
Bob Reny
Tom Field with Bob Reny
In-Person Roundtable
Seize the Breach with Automation and Analytics
Discussion topics will include:
Breaches happen, and 2021 was a record-breaking year for them. According to Identity Theft Resource Center research, there were 1,291 breaches publicly reported as of Sept. 2021, compared to 1,108 breaches in 2020. That’s a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t stopping the breaches.

Why are SOC and security teams way too limited by legacy SIEM? How can machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response capabilities?

Register...
In-Person
Roundtable
Ruth's Chris Steak House - 148 W 51st St, Manhattan, NY 10019
Thursday, April 7th, 2022
Ruth's Chris Steak House - 148 W 51st St, Manhattan, NY 10019
Tom Field
Stephen Kiel
Tom Field with Stephen Kiel
In-Person Roundtable
From On-Prem to the Cloud: Protect Your Apps and APIs
Discussion topics will include:
The result of digital transformation: It's easier to do business with your customers and partners. But with new architectures, web apps and APIs now deployed from on-prem servers to the cloud, it is harder than ever to get a holistic view of all of these potentially vulnerable assets - never mind defend them.

What are your biggest challenges today in defending these diverse assets? What are the known gaps in your current defenses? What are you seeking in the future...
Virtual
Roundtable
Thursday, April 7th, 2022
Jeremy Kirk
Jacob Olcott
Jeremy Kirk with Jacob Olcott
Virtual Roundtable
From Prevention to Reality: Building a Cyber Resilient Organization
Discussion topics will include:
Strong cybersecurity is critical in the digital economy to create trusted, resilient organizations. But as the pace of digital transformation accelerates, the attack surface and vendor footprint within organizations has grown rapidly. Faced with greater exposure and more sophisticated cyber attacks, it is no longer possible for security leaders to prevent cyber breaches.

Security leaders must shift their focus from prevention to resilience to defend against greater exposure and more sophisticated cyber attacks. A focus on cyber resilience empowers organizations...
Virtual
Roundtable
Thursday, April 7th, 2022
Shashi Prakash
Anna Delaney
Shashi Prakash with Anna Delaney
Virtual Roundtable
Managing Risk Outside Your Four Walls: Strategies for Protecting Your External Attack Surface
Discussion topics will include:
Security practitioners are increasingly put to task to address threats and risks occurring outside the traditional four walls of the enterprise. Referred to as a company’s external attack surface, it comprises typosquat domains; fake websites, apps, and ads; counterfeit sales; email compromise; and social media fraud.

And with technology stacks piling high, security teams are increasingly looking for efficient engines that can detect and act against these external activities in real time - including scams propagated through multiple platforms and...
Virtual
Roundtable
Wednesday, April 6th, 2022
Tom Field
Jon Powvens
Tom Field with Jon Powvens
Virtual Roundtable
Digital Healthcare's Future: It's About Availability
Discussion topics will include:
Healthcare compressed roughly a decade's worth of digital transformation into the past two years. As a result, patients now receive unprecedented digital services, and healthcare professionals have new tools for making decisions, sharing information, and delivering services from any remote location.

But today's digital healthcare footprint also represents one of the largest and most lucrative potential attack surfaces in history. Any healthcare entity is but a ransomware attack or a distributed denial of service incident away from being unable to...
Virtual
Roundtable
Wednesday, April 6th, 2022
Josh Zelonis
Sid Srivastava
Josh Zelonis with Sid Srivastava
Virtual Roundtable
Financial Services: Techniques to Stay Ahead of the Adversaries
Discussion topics will include:
The 2022 State of Security Automation in Financial Services Study commissioned by Accenture and Palo Alto Networks revealed that 42% of surveyed financial institutions consider their current abilities to respond and detect to threats - such as ransomware and zero-day attacks - average, at best. Furthermore only 35% say that automation currently plays a strong role in how they identify and respond to threats.

The need to build smarter defense strategies is increasingly crucial to be prepared for the next...
In-Person
Roundtable
The Gage - 24 South Michigan Avenue, Chicago
Tuesday, April 5th, 2022
The Gage - 24 South Michigan Avenue, Chicago
Tom Field
Andrew Yorra
Tom Field with Andrew Yorra
In-Person Roundtable
Software Supply Chains: A Look into the Future
Discussion topics will include:
If you thought 2021 was the year of the software supply chain, just wait until you see what unfolds in 2022.

Massive exploits such as the recent Log4j/Log4shell vulnerability are a sign that best practices are still evolving, and the risk of mismanaging, or worse, ignoring open source vulnerabilities, is only becoming greater. And with even the President of the U.S. calling out the need for software bills of materials, it’s time to kick up the gear on open source...
In-Person
Roundtable
Convene in Willis Tower - 233 South Wacker Drive, Chicago
Tuesday, April 5th, 2022
Convene in Willis Tower - 233 South Wacker Drive, Chicago
Tom Field
Chip Witt
Tom Field with Chip Witt
In-Person Roundtable
How Malware Helps Bad Actors Get Away with Online Fraud (and What Enterprises Can Do About It)
Discussion topics will include:
Despite your team’s best efforts to defend against cyberattacks, organizations often lack visibility into when employees and consumers fall victim to the most nefarious type of attack - malware infections. Malware-stolen data is highly valuable to bad actors and is a gateway for them to commit fraud and infiltrate corporate networks.

When your users are affected by malware, it’s too late. Once a botnet is installed (like the infamous RedLine Stealer), cybercriminals have already started to siphon critical information such...
Virtual
Roundtable
Tuesday, April 5th, 2022
James Brotsos
James Ferguson
James Brotsos with James Ferguson
Virtual Roundtable
How Prepared Are You for the Next Log4j?
Discussion topics will include:
Open source code dominates modern application code. It is also considered a "national security issue," in light of the recent Log4j attacks. Open source code, misconfigurations and known unpatched vulnerabilities are among the application security risks facing all organizations that could lead to a breach.

According to analysts at Forrester, security leaders must manage open source risk with tools and processes including a software bill of materials (SBOM), software composition analysis and third-party risk management.

The question is, how prepared...
Virtual
Roundtable
Wednesday, March 30th, 2022
Gavin Hill
Tom Field
Gavin Hill with Tom Field
Virtual Roundtable
Fraud Fighting 2022: How to Win the Battle Against Bots
Discussion topics will include:
As enterprises globally have shifted more of their operations online, cyber adversaries have doubled down on the use of bots to automate and increase the scale of their attacks.

According to recent research from Enterprise Strategy Group, nearly half (47%) of cybersecurity professionals have seen examples of credential stuffing or cracking attacks used for account takeover in just the past 6 months. And 46% are aware of attacks on online shopping cart systems and instances of automated inventory purchasing or...
Virtual
Roundtable
Thursday, March 24th, 2022
Dan Gunderman
Shashi Prakash
Dan Gunderman with Shashi Prakash
Virtual Roundtable
Managing Risk Outside Your Four Walls: Strategies for Protecting Your External Attack Surface
Discussion topics will include:
Security practitioners are increasingly put to task to address threats and risks occurring outside the traditional four walls of the enterprise. Referred to as a company’s external attack surface, it comprises typosquat domains; fake websites, apps, and ads; counterfeit sales; email compromise; and social media fraud.

And with technology stacks piling high, security teams are increasingly looking for efficient engines that can detect and act against these external activities in real time - including scams propagated through multiple platforms and...
Virtual
Roundtable
Thursday, March 24th, 2022
Tom Field
Gavin Hill
Tom Field with Gavin Hill
Virtual Roundtable
Fraud Fighting 2022: How to Win the Battle Against Bots
Discussion topics will include:
As enterprises globally have shifted more of their operations online, cyber adversaries have doubled down on the use of bots to automate and increase the scale of their attacks.

According to recent research from Enterprise Strategy Group, nearly half (47%) of cybersecurity professionals have seen examples of credential stuffing or cracking attacks used for account takeover in just the past 6 months. And 46% are aware of attacks on online shopping cart systems and instances of automated inventory purchasing or...
Virtual
Roundtable
Wednesday, March 23rd, 2022
Tom Field
Peter Andrious
Tom Field with Peter Andrious
Virtual Roundtable
Account Verification: How to Read 'Digital Body Language'
Discussion topics will include:
Digital transformation has brought with it a plethora of new, digital services and an historic increase in customers - existing and new - who want to deal with your institution solely through digital channels.

But how do you validate that these customers are who they claim to be - especially at account opening? How do you balance the right amounts of security controls and ease of use to minimize customer friction and abandonment? What if you could read their digital...
In-Person
Roundtable
El Gaucho Bellevue
Tuesday, March 22nd, 2022
El Gaucho Bellevue
Tom Field
Andrew Yorra
Tom Field with Andrew Yorra
In-Person Roundtable
Software Supply Chains: A Look into the Future
Discussion topics will include:
If you thought 2021 was the year of the software supply chain, just wait until you see what unfolds in 2022.

Massive exploits such as the recent Log4j/Log4shell vulnerability are a sign that best practices are still evolving, and the risk of mismanaging, or worse, ignoring open source vulnerabilities, is only becoming greater. And with even the President of the U.S. calling out the need for software bills of materials, it’s time to kick up the gear on open source...
In-Person
Roundtable
Meydenbauer Center
Tuesday, March 22nd, 2022
Meydenbauer Center
Andrew Stone
David Elichman
Andrew Stone with David Elichman
In-Person Roundtable
Understanding 'Next-Gen' Backup & Restoration Processes
Discussion topics will include:
Following a ransomware attack, leaders at organizations with functional backups might expect to be up and running within a matter of minutes. In reality, this can be a lengthy process causing confusion and frustration. "Recoverability," then, must underpin much of the enterprise's wider security strategy.

Despite a surge in crypto-locking attacks, tools have emerged allowing teams to restore data in milliseconds. Other features now prohibit even those with admin rights from deleting files - without navigating a MFA-controlled process requiring...
In-Person
Roundtable
Meydenbauer Center
Tuesday, March 22nd, 2022
Meydenbauer Center
Tom Field
Matt Tesauro
Tom Field with Matt Tesauro
In-Person Roundtable
API Security: How Are You Securing the #1 Attack Vector?
Discussion topics will include:
No surprise in the era of digital transformation: Gartner predicts that in 2022, application programming interface attacks will become the most-frequent attack vector. And yet many security leaders, when pressed, do not even know how many APIs they have in their environments - never mind their level of security.

So, what are you doing proactively to protect your environment from API vulnerabilities, design flaws, and misconfigurations?

Register for this executive roundtable, API Security: How Are You Securing the #1 Attack...
In-Person
Roundtable
1 Lombard Street
Thursday, March 17th, 2022
1 Lombard Street
Anna Delaney
Jay Coley
Anna Delaney with Jay Coley
In-Person Roundtable
Web Application Firewalls: Maximising Control and Visibility
Discussion topics will include:
As organizations have shifted to online-focused business operations, expectations for the security of websites and apps are at an all-time high. Attackers, however, are constantly finding new vulnerabilities and attack vectors. Organizations deploy Web Application Firewalls to detect malicious web traffic aimed at their production apps and APIs.

Can you understand the intent of the attacks? Do you have real-time visibility and control? How can you reduce the noise of security products to focus on the most critical alerts?

Discussion...
Virtual
Roundtable
Thursday, March 17th, 2022
Doug Wylie
Dharminder Debisarun
Doug Wylie with Dharminder Debisarun
Virtual Roundtable
Securing Industry 4.0: Mitigate Cyber Risk in Smart Manufacturing
Discussion topics will include:
It's the fourth Industrial Revolution, and it arrived faster than anyone could have planned. It came with smart devices, automation, cloud migration and a new streamlined ability to engage with customers and partners.

But it also brought with it the vulnerabilities inherent in legacy technology, the disconnect of OT, an enlarged attack surface and increased attention from nation-state and criminal adversaries who seek to disrupt operations or steal intellectual property.

How prepared are you to secure Industry 4.0?

Register for...
Virtual
Roundtable
Wednesday, March 16th, 2022
Tom Field
Gavin Hill
Tom Field with Gavin Hill
Virtual Roundtable
Fraud Fighting 2022: How to Win the Battle Against Bots
Discussion topics will include:
As enterprises globally have shifted more of their operations online, cyber adversaries have doubled down on the use of bots to automate and increase the scale of their attacks.

According to recent research from Enterprise Strategy Group, nearly half (47%) of cybersecurity professionals have seen examples of credential stuffing or cracking attacks used for account takeover in just the past 6 months. And 46% are aware of attacks on online shopping cart systems and instances of automated inventory purchasing or...
Virtual
Roundtable
Wednesday, March 16th, 2022
Dan Gunderman
Andy Ellis
Dan Gunderman with Andy Ellis
Virtual Roundtable
Better Understanding Cloud Security Risks Through ‘Context’
Discussion topics will include:
In just a few years, cloud conversations have gone from theoretical to critical. And with migrations to the cloud ongoing, many enterprises have had to rethink their security approach. In these environments, some practitioners are charged with expending resources to mitigate “high-severity” CVEs – regardless of how a vulnerability may interact with that IT environment. This risk may pale in comparison, for example, to a malware occurrence at the edge that goes unchecked.

A potential lack of visibility into apps,...
Virtual
Roundtable
Tuesday, March 15th, 2022
Tom Field
Michael Ehrlich
Tom Field with Michael Ehrlich
Virtual Roundtable
Collective Defense: How to Operationalize Public/Private Sector Collaboration
Discussion topics will include:
Since the release of President Biden's cybersecurity executive order last May, there has been great progress on topics such as adoption of zero-trust security and even establishment of a cybersecurity safety review board.

But one of the key provisions lacks such progress: Removing barriers to threat information sharing between government and the private sector. In the absence of guidance or support for this critical initiative, how do private and public sector entities move forward? What are the barriers, and how...
Virtual
Roundtable
Tuesday, March 15th, 2022
Murali Urs
Gaurav Mahendru
Murali Urs with Gaurav Mahendru
Virtual Roundtable
How to Make your DLP Solution Work for your Ransomware Strategy
Discussion topics will include:
It would be an understatement to say that ransomware attacks have been playing havoc for enterprises. Not only is there a massive loss of revenue, but there is also a loss of data. Businesses seem to have come under regulatory and operational pressures as more than six new data privacy laws have been introduced in the last year, a significant step towards a globalized and harmonized approach to data protection.

With ransomware attacks and pressure from the regulators looming large...
Virtual
Roundtable
Thursday, March 10th, 2022
Anna Delaney
David Richardson
Anna Delaney with David Richardson
Virtual Roundtable
From Endpoint to Cloud: Achieving Zero Trust for Enterprises
Discussion topics will include:
The global reliance on cloud-based infrastructure and services that are accessible from any device, has prompted security teams to rethink the way they protect their organizations. To support this new and agile way of working, security leaders need to be able to balance end-user privacy with security to protect users and corporate data from phishing, malware, and other threats. At the same time, too little freedom causes employee dissatisfaction, reduced agility and collaboration.

How can you enable employees to be...
Virtual
Roundtable
Thursday, March 10th, 2022
Dan Gunderman
Andrew Stone
Dan Gunderman with Andrew Stone
Virtual Roundtable
Understanding 'Next-Gen' Backup & Restoration Processes
Discussion topics will include:
Following a ransomware attack, leaders at organizations with functional backups might expect to be up and running within a matter of minutes. In reality, this can be a lengthy process causing confusion and frustration. "Recoverability," then, must underpin much of the enterprise's wider security strategy.

Despite a surge in crypto-locking attacks, tools have emerged allowing teams to restore data in milliseconds. Other features now prohibit even those with admin rights from deleting files - without navigating a MFA-controlled process requiring...
Virtual
Roundtable
Thursday, March 10th, 2022
Mathew Schwartz
Jatin Arora
Mathew Schwartz with Jatin Arora
Virtual Roundtable
Building an Effective Cyber Resiliency Program
Discussion topics will include:
The importance of cyber resiliency continues to mount as organizations face all manner of cyberattacks and potential IT disruptions - from unplanned outages and global pandemics to targeted supply-chain subterfuge and ransomware hits.

Planning remains paramount, both to guide the defenses that businesses put in place, as well as for rapidly executing incident response plans in the event that an attack does result in business disruption. Having such capabilities is increasingly demanded by regulators, across not just privacy but also...
In-Person
Roundtable
Strega Italiano Seaport
Wednesday, March 9th, 2022
Strega Italiano Seaport
Tom Field
Brian Fox
Tom Field with Brian Fox
In-Person Roundtable
Software Supply Chains: A Look into the Future
Discussion topics will include:
If you thought 2021 was the year of the software supply chain, just wait until you see what unfolds in 2022.

Massive exploits such as the recent Log4j/Log4shell vulnerability are a sign that best practices are still evolving, and the risk of mismanaging, or worse, ignoring open source vulnerabilities, is only becoming greater. And with even the President of the U.S. calling out the need for software bills of materials, it’s time to kick up the gear on open source...
Virtual
Roundtable
Wednesday, March 9th, 2022
Murali Urs
Gaurav  Mahendru
Murali Urs with Gaurav Mahendru
Virtual Roundtable
How to Make your DLP Solution Work for your Ransomware Strategy
Discussion topics will include:
It would be an understatement to say that ransomware attacks have been playing havoc for enterprises. Not only is there a massive loss of revenue, but there is also a loss of data. Businesses seem to have come under regulatory and operational pressures as more than six new data privacy laws have been introduced in the last year, a significant step towards a globalized and harmonized approach to data protection.

With ransomware attacks and pressure from the regulators looming large...
Virtual
Roundtable
Tuesday, March 8th, 2022
Praveen Vunnava
Tom Field
Praveen Vunnava with Tom Field
Virtual Roundtable
Ransomware: Are the Attackers Already in Your System?
Discussion topics will include:
What we learned about ransomware over the past year: The attacks are relentless, the barrier to entry for attackers is low, and the targets … are everyone in the supply chain. You might not be a direct target, but your supplier is. Further, the adversaries are patient - they may well be in your system now, laying the foundation for a future strike.

So, how does one reduce the risk of a successful attack? And if attacked, how does one...
Virtual
Roundtable
Tuesday, March 8th, 2022
Murali Urs
Gaurav  Mahendru
Murali Urs with Gaurav Mahendru
Virtual Roundtable
How to Make your DLP Solution Work for your Ransomware Strategy
Discussion topics will include:
It would be an understatement to say that ransomware attacks have been playing havoc for enterprises. Not only is there a massive loss of revenue, but there is also a loss of data. Businesses seem to have come under regulatory and operational pressures as more than six new data privacy laws have been introduced in the last year, a significant step towards a globalized and harmonized approach to data protection.

With ransomware attacks and pressure from the regulators looming large...
Virtual
Roundtable
Thursday, March 3rd, 2022
Tom Field
Praveen Vunnava
Tom Field with Praveen Vunnava
Virtual Roundtable
Ransomware: Are the Attackers Already in Your System?
Discussion topics will include:
What we learned about ransomware over the past year: The attacks are relentless, the barrier to entry for attackers is low, and the targets … are everyone in the supply chain. You might not be a direct target, but your supplier is. Further, the adversaries are patient - they may well be in your system now, laying the foundation for a future strike.

So, how does one reduce the risk of a successful attack? And if attacked, how does one...
Virtual
Roundtable
Wednesday, March 2nd, 2022
Dan Gunderman
Andrew Stone
Dan Gunderman with Andrew Stone
Virtual Roundtable
Understanding 'Next-Gen' Backup & Restoration Processes
Discussion topics will include:
Following a ransomware attack, leaders at organizations with functional backups might expect to be up and running within a matter of minutes. In reality, this can be a lengthy process causing confusion and frustration. "Recoverability," then, must underpin much of the enterprise's wider security strategy.

Despite a surge in crypto-locking attacks, tools have emerged allowing teams to restore data in milliseconds. Other features now prohibit even those with admin rights from deleting files - without navigating a MFA-controlled process requiring...
Virtual
Roundtable
Tuesday, March 1st, 2022
Tom Field
Peter Andrious
Tom Field with Peter Andrious
Virtual Roundtable
Account Verification: How to Read 'Digital Body Language'
Discussion topics will include:
Digital transformation has brought with it a plethora of new, digital services and an historic increase in customers - existing and new - who want to deal with your institution solely through digital channels.

But how do you validate that these customers are who they claim to be - especially at account opening? How do you balance the right amounts of security controls and ease of use to minimize customer friction and abandonment? What if you could read their digital...
Virtual
Roundtable
Thursday, February 24th, 2022
Del Rodillas
Paul Brownlee
Del Rodillas with Paul Brownlee
Virtual Roundtable
Securing Industry 4.0: Mitigate Cyber Risk in Smart Manufacturing
Discussion topics will include:
It's the fourth Industrial Revolution, and it arrived faster than anyone could have planned. It came with smart devices, automation, cloud migration and a new streamlined ability to engage with customers and partners.

But it also brought with it the vulnerabilities inherent in legacy technology, the disconnect of OT, an enlarged attack surface and increased attention from nation-state and criminal adversaries who seek to disrupt operations or steal intellectual property.

How prepared are you to secure Industry 4.0?

Register for...
Virtual
Roundtable
Wednesday, February 23rd, 2022
Dan Gunderman
Tony Lauro
Dan Gunderman with Tony Lauro
Virtual Roundtable
Staying One Step Ahead of Online Fraudsters – And Their Bots
Discussion topics will include:
Malicious bots are everywhere. From denial-of-service attacks designed to “box out” or slow legitimate traffic to inventory hoarding of hot consumer goods to credential stuffing attacks that attempt to validate user credentials for account takeover (ATO), bad bots are busy disrupting your customer experience online – and your bottom line. But it doesn’t have to be a losing battle against today’s sophisticated and highly motivated bot operators.

Join ISMG's Dan Gunderman for a moderated discussion that will draw from the...
Virtual
Roundtable
Tuesday, February 22nd, 2022
Chris Kachigian
Rob Sadowski
Chris Kachigian with Rob Sadowski
Virtual Roundtable
Work Smarter and Safer: Navigating Cloud Migration, Remote Work and Business-Disrupting Attacks
Discussion topics will include:
You have a remote or hybrid workforce, your enterprise is amidst cloud migration, your extended enterprise is more reliant than ever on disparate devices, partners and apps … and determined cyber adversaries are targeting you in exactly these areas, which can cause crippling business disruption.

How can you secure this new extended environment without negatively impacting user productivity? Which "pain" do you address first?

Register for this executive roundtable, Work Smarter and Safer: Navigating Cloud Migration, Remote Work and Business-Disrupting...
Virtual
Roundtable
Thursday, February 17th, 2022
Dan Gunderman
Shashi Prakash
Dan Gunderman with Shashi Prakash
Virtual Roundtable
Managing Risk Outside Your Four Walls: Strategies for Protecting Your External Attack Surface
Discussion topics will include:
Security practitioners are increasingly put to task to address threats and risks occurring outside the traditional four walls of the enterprise. Referred to as a company’s external attack surface, it comprises typosquat domains; fake websites, apps, and ads; counterfeit sales; email compromise; and social media fraud.

And with technology stacks piling high, security teams are increasingly looking for efficient engines that can detect and act against these external activities in real time - including scams propagated through multiple platforms and...
Virtual
Roundtable
Thursday, February 17th, 2022
Anna Delaney
Marcin Spychala
Anna Delaney with Marcin Spychala
Virtual Roundtable
Log4j: Tackling the Patch Management Challenge
Discussion topics will include:
For the past weeks, the security community has been knee-deep in efforts to mitigate - what has been described as - the most serious security flaw to have emerged in years, the Log4j zero-day vulnerability. The story unveils a deeper problem: Organizations have too many unpatched flaws, often exacerbated by their not knowing all the systems in operation within the enterprise.

Newly discovered vulnerabilities continue to increase, with more than 18,000 published last year alone. Resources and limited time continue...
Virtual
Roundtable
Thursday, February 17th, 2022
Mathew Schwartz
John Waters
Mathew Schwartz with John Waters
Virtual Roundtable
Identity: The Foundation for Digital and Cloud Transformation
Discussion topics will include:
As organizations pursue digital transformation and greater adoption of cloud-based resources, digital identities, and their alignment to digital assets, has become crucial in terms of data security, privacy and compliance.

Sustaining the required digital identity fabric - comprising everything from employees and contractors to customers and IoT/OT devices - can result in even mid-size organizations having to manage millions of identities and billions of relationships.
• How can organizations handle this requirement in a dynamic manner?
• What are the...
Virtual
Roundtable
Thursday, February 17th, 2022
Gaurav  Mahendru
Ranndeep  Chonker
Gaurav Mahendru with Ranndeep Chonker
Virtual Roundtable
Why it is Essential to Make Cyber Resilience Work for Your Business
Discussion topics will include:
As enterprises worldwide continue to battle the pandemic uncertainty, resilience is something that will bring in certainty for cyber risk and compliance professionals. For a resilient business, it is important to make risk-informed decisions integrated across the enterprise. It is vital to break down silos by bringing together security operations, governance, risk, and compliance with IT, employees, and customer success workflows on a single platform. Alongwith cyber and operational resilience, vendor resilience is another important pillar that cannot be missed....
Virtual
Roundtable
Wednesday, February 16th, 2022
Chris Cochran
Tom Field
Chris Cochran with Tom Field
Virtual Roundtable
New Approaches to Asset Management in Cybersecurity
Discussion topics will include:
The proliferation of mobile and IoT devices adds a new, unprecedented degree of complexity that security teams are left scrambling to solve: How do you account for and secure these ephemeral devices when you often can’t even identify them in real-time?

Furthermore, traditional approaches to IT asset management have not scaled to the modern cloud deployment and leave us with limited visibility and gaps in our security coverage. A new approach is required.

Discussion topics will include:
How asset management...
Virtual
Roundtable
Wednesday, February 16th, 2022
Tony Morbin
Daina Proctor
Tony Morbin with Daina Proctor
Virtual Roundtable
Applying Zero Trust in a Hybrid Cloud Environment
Discussion topics will include:
Accelerated digital transformation has moved communication, business, and personal interactions online. But this has significantly increased potential attack surfaces, resulting in a dramatic surge in cybersecurity incidents and exposed records. As workloads move to the cloud, threats move with them. IBM's research indicates that in 2020, upwards of 90% of cyber-related incidents originated in cloud environments.

Organizations that are ahead in applying a zero trust approach to security - zero trust pacesetters - see improvements in all aspects of their...
Virtual
Roundtable
Wednesday, February 16th, 2022
Gaurav  Mahendru
Ranndeep  Chonker
Gaurav Mahendru with Ranndeep Chonker
Virtual Roundtable
Why it is Essential to Make Cyber Resilience Work for Your Business
Discussion topics will include:
As enterprises worldwide continue to battle the pandemic uncertainty, resilience is something that will bring in certainty for cyber risk and compliance professionals. For a resilient business, it is important to make risk-informed decisions integrated across the enterprise. It is vital to break down silos by bringing together security operations, governance, risk, and compliance with IT, employees, and customer success workflows on a single platform. Alongwith cyber and operational resilience, vendor resilience is another important pillar that cannot be missed....
Virtual
Roundtable
Tuesday, February 15th, 2022
Anton Chuvakin
Bernard Brantley
Anton Chuvakin with Bernard Brantley
Virtual Roundtable
The Role of NDR for Data-Centric Security in the Cloud
Discussion topics will include:
The past two years of digital transformation have yielded an historic wave of cloud migration. And new cloud entrants have quickly arisen to two realities: Cloud security is a vastly different animal from on-premise security. And if you don't have visibility across cloud environments, then you don't have security.

Enter Network Detection and Response. NDR is key to enhancing visibility and automating response in on-prem environments, and it may serve the same functions in the cloud, particularly in service to...
Virtual
Roundtable
Tuesday, February 15th, 2022
Gaurav  Mahendru
Ranndeep  Chonker
Gaurav Mahendru with Ranndeep Chonker
Virtual Roundtable
Why it is Essential to Make Cyber Resilience Work for Your Business
Discussion topics will include:
As enterprises worldwide continue to battle the pandemic uncertainty, resilience is something that will bring in certainty for cyber risk and compliance professionals. For a resilient business, it is important to make risk-informed decisions integrated across the enterprise. It is vital to break down silos by bringing together security operations, governance, risk, and compliance with IT, employees, and customer success workflows on a single platform. Alongwith cyber and operational resilience, vendor resilience is another important pillar that cannot be missed....