Should Banks Rely on Cloud-Based Fraud Detection Solutions?
New Approaches to Asset Management in Cybersecurity
Strategies to Defend Your Multi & Hybrid Cloud Infrastructure
Best Practices to Bridge the Security and DevOps Gap
Better Understanding Cloud Security Risks Through ‘Context’
Understanding 'Next-Gen' Backup & Restoration Processes
Software Security: How to Prioritize, Measure and Convey It To the Board
Les meilleures pratiques pour combler le fossé entre sécurité et DevOps
Does Mobile Security Remain a 'Glaring Gap' in the Enterprise?
Making Cyber Resilience Work for Your Business
The Role of NDR for Data-Centric Security in the Cloud
How to Make Your Business More Resilient to Growing Uncertainty
Applying Zero Trust in a Hybrid Cloud Environment
New Approaches to Asset Management in Cybersecurity
How to Make Your Business More Resilient to Growing Uncertainty
Identity: The Foundation for Digital and Cloud Transformation
Log4j: Tackling the Patch Management Challenge
Managing Risk Outside Your Four Walls: Strategies for Protecting Your External Attack Surface
Staying One Step Ahead of Online Fraudsters – And Their Bots
Securing Industry 4.0: Mitigate Cyber Risk in Smart Manufacturing
Managing Risk Outside Your Four Walls: Strategies for Protecting Your External Attack Surface
Understanding 'Next-Gen' Backup & Restoration Processes
From Endpoint to Cloud: Achieving Zero Trust for Enterprises
Understanding 'Next-Gen' Backup & Restoration Processes
Better Understanding Cloud Security Risks Through ‘Context’
Securing Industry 4.0: Mitigate Cyber Risk in Smart Manufacturing
Web Application Firewalls: Maximising Control and Visibility
Managing Risk Outside Your Four Walls: Strategies for Protecting Your External Attack Surface
Executive Protection for Digital Lives – What CIOs and CISOs Need to Consider Beyond the Office
Digital Healthcare's Future: It's About Availability
Managing Risk Outside Your Four Walls: Strategies for Protecting Your External Attack Surface
Executive Protection for Digital Lives – What CIOs and CISOs Need to Consider Beyond the Office
Digital Healthcare's Future: It's About Availability
Managing Risk Outside Your Four Walls: Strategies for Protecting Your External Attack Surface
Executive Protection for Digital Lives – What CIOs and CISOs Need to Consider Beyond the Office
Managing Risk Outside Your Four Walls: Strategies for Protecting Your External Attack Surface
Managing Risk Outside Your Four Walls: Strategies for Protecting Your External Attack Surface
Upcoming Roundtables
Virtual
Roundtable
Tuesday, February 1st, 2022
Anna Delaney
Ruud Grotens
Anna Delaney with Ruud Grotens
Virtual Roundtable
Should Banks Rely on Cloud-Based Fraud Detection Solutions?
Discussion topics will include:
Cloud-based technologies are seen to be fundamental to help create agility in a changing banking landscape. Still, the industry has been reticent to fully migrate to the cloud. Long-term cybersecurity and compliance concerns, legacy core banking systems and a lack of IT talent - or the in-house training resources to develop it - remain the greatest barriers to adopting more innovative technologies.

However, with a greater shift to online digital payments and Impersonation Fraud now being classed as a National...
Virtual
Roundtable
Tuesday, February 1st, 2022
Chris Cochran
Tom Field
Chris Cochran with Tom Field
Virtual Roundtable
New Approaches to Asset Management in Cybersecurity
Discussion topics will include:
The proliferation of mobile and IoT devices adds a new, unprecedented degree of complexity that security teams are left scrambling to solve: How do you account for and secure these ephemeral devices when you often can’t even identify them in real-time?

Furthermore, traditional approaches to IT asset management have not scaled to the modern cloud deployment and leave us with limited visibility and gaps in our security coverage. A new approach is required.

Discussion topics will include:
How asset management...
Virtual
Roundtable
Thursday, February 3rd, 2022
Kristina Elestedt-Jansson
Tony Morbin
Kristina Elestedt-Jansson with Tony Morbin
Virtual Roundtable
Strategies to Defend Your Multi & Hybrid Cloud Infrastructure
Discussion topics will include:
The ongoing need for digital transformation continues to drive more organizations into the cloud, bringing their apps and data with them. But managing the underlying infrastructure, working with different hyperscalers – large cloud and networking providers – as well as overseeing multiple private clouds, public clouds and edge environments remains a complex undertaking. One insecure API or server misconfiguration, and organizations risk being hit by criminal hackers and suffering long-term financial or reputational damage.

Join us for a limited seat,...
Virtual
Roundtable
Thursday, February 3rd, 2022
Anna Delaney
John Smith
Anna Delaney with John Smith
Virtual Roundtable
Best Practices to Bridge the Security and DevOps Gap
Discussion topics will include:
The rise of agile practices and DevOps has revolutionized software development. As a result, innovation is moving incredibly quickly - at a pace security teams cannot match. As more organizations shift testing processes "left", security teams often lack visibility into/at the development stage, making it easier for gaps to be missed. False positives, backlogs, lack of clear prioritization and misalignment within teams create friction between what are frequently siloed departments.

How can we break down those siloes between the people...
Virtual
Roundtable
Thursday, February 3rd, 2022
Dan Gunderman
Andy Ellis
Dan Gunderman with Andy Ellis
Virtual Roundtable
Better Understanding Cloud Security Risks Through ‘Context’
Discussion topics will include:
In just a few years, cloud conversations have gone from theoretical to critical. And with migrations to the cloud ongoing, many enterprises have had to rethink their security approach. In these environments, some practitioners are charged with expending resources to mitigate “high-severity” CVEs – regardless of how a vulnerability may interact with that IT environment. This risk may pale in comparison, for example, to a malware occurrence at the edge that goes unchecked.

A potential lack of visibility into apps,...
Virtual
Roundtable
Thursday, February 3rd, 2022
Jeremy Kirk
Andrew Stone
Jeremy Kirk with Andrew Stone
Virtual Roundtable
Understanding 'Next-Gen' Backup & Restoration Processes
Discussion topics will include:
Following a ransomware attack, leaders at organizations with functional backups might expect to be up and running within a matter of minutes. In reality, this can be a lengthy process causing confusion and frustration. "Recoverability," then, must underpin much of the enterprise's wider security strategy.

Despite a surge in crypto-locking attacks, tools have emerged allowing teams to restore data in milliseconds. Other features now prohibit even those with admin rights from deleting files - without navigating a MFA-controlled process requiring...
Virtual
Roundtable
Tuesday, February 8th, 2022
Tom Field
Chris Wysopal
Tom Field with Chris Wysopal
Virtual Roundtable
Software Security: How to Prioritize, Measure and Convey It To the Board
Discussion topics will include:
Amidst the shifting threat landscape, cloud migration and ongoing digital transformation, software security is often low or even last on the list of priorities for security leaders to address.

Yet, with the recent executive order on cybersecurity, and as headlines continue to feature high-profile breaches, board members at organizations across all industries are taking notice. Even though there are often designated technical experts on boards, there is now an increased awareness around cybersecurity – especially software security – even among...
Virtual
Roundtable
Wednesday, February 9th, 2022
Timothee Bardet
Nabil Bousselham
Timothee Bardet with Nabil Bousselham
Virtual Roundtable
Les meilleures pratiques pour combler le fossé entre sécurité et DevOps
Discussion topics will include:
L'essor des pratiques agiles et DevOps a révolutionné le développement des logiciels. En conséquence, l'innovation est presque trop rapide et les équipes de sécurité ne peuvent pas suivre. De plus en plus d'organisations adoptent des processus de développement pilotés par les tests, mais les équipes de sécurité manquent souvent de visibilité sur la phase de développement, ce qui aurait pu faciliter l'identification des lacunes. Les faux positifs, les dettes techniques, l'absence de priorités claires et le manque d’alignement au sein...
Virtual
Roundtable
Wednesday, February 9th, 2022
Dan Gunderman
Chris Rowlands
Dan Gunderman with Chris Rowlands
Virtual Roundtable
Does Mobile Security Remain a 'Glaring Gap' in the Enterprise?
Discussion topics will include:
For many, including government agencies and educational institutions, mobile devices present many threats to their organization's security posture. And troubling cyber incidents throughout 2021 - including high-profile ransomware attacks and new developments on government-grade surveillance programs - have left practitioners scrambling to boost their cyber resilience.

In many cases, an attack vector could be a compromised mobile device that leaks privileged credentials with cascading effects across the entire network. One way to plug these security gaps is to extend visibility...
Virtual
Roundtable
Tuesday, February 15th, 2022
Gaurav  Mahendru
Ranndeep  Chonker
Gaurav Mahendru with Ranndeep Chonker
Virtual Roundtable
Making Cyber Resilience Work for Your Business
Discussion topics will include:
As enterprises worldwide continue to battle the pandemic uncertainty, resilience is something that will bring in certainty for cyber risk and compliance professionals. For a resilient business, it is important to make risk-informed decisions integrated across the enterprise. It is vital to break down silos by bringing together security operations, governance, risk, and compliance with IT, employees, and customer success workflows on a single platform. Alongwith cyber and operational resilience, vendor resilience is another important pillar that cannot be missed....
Virtual
Roundtable
Tuesday, February 15th, 2022
Anton Chuvakin
Bernard Brantley
Anton Chuvakin with Bernard Brantley
Virtual Roundtable
The Role of NDR for Data-Centric Security in the Cloud
Discussion topics will include:
The past two years of digital transformation have yielded an historic wave of cloud migration. And new cloud entrants have quickly arisen to two realities: Cloud security is a vastly different animal from on-premise security. And if you don't have visibility across cloud environments, then you don't have security.

Enter Network Detection and Response. NDR is key to enhancing visibility and automating response in on-prem environments, and it may serve the same functions in the cloud, particularly in service to...
Virtual
Roundtable
Wednesday, February 16th, 2022
Gaurav  Mahendru
Ranndeep  Chonker
Gaurav Mahendru with Ranndeep Chonker
Virtual Roundtable
How to Make Your Business More Resilient to Growing Uncertainty
Discussion topics will include:
As enterprises worldwide continue to battle the pandemic uncertainty, resilience is something that will bring in certainty for cyber risk and compliance professionals. For a resilient business, it is important to make risk-informed decisions integrated across the enterprise. It is vital to break down silos by bringing together security operations, governance, risk, and compliance with IT, employees, and customer success workflows on a single platform. Alongwith cyber and operational resilience, vendor resilience is another important pillar that cannot be missed....
Virtual
Roundtable
Wednesday, February 16th, 2022
Tony Morbin
Daina Proctor
Tony Morbin with Daina Proctor
Virtual Roundtable
Applying Zero Trust in a Hybrid Cloud Environment
Discussion topics will include:
Accelerated digital transformation has moved communication, business, and personal interactions online. But this has significantly increased potential attack surfaces, resulting in a dramatic surge in cybersecurity incidents and exposed records. As workloads move to the cloud, threats move with them. IBM's research indicates that in 2020, upwards of 90% of cyber-related incidents originated in cloud environments.

Organizations that are ahead in applying a zero trust approach to security - zero trust pacesetters - see improvements in all aspects of their...
Virtual
Roundtable
Wednesday, February 16th, 2022
Chris Cochran
Tom Field
Chris Cochran with Tom Field
Virtual Roundtable
New Approaches to Asset Management in Cybersecurity
Discussion topics will include:
The proliferation of mobile and IoT devices adds a new, unprecedented degree of complexity that security teams are left scrambling to solve: How do you account for and secure these ephemeral devices when you often can’t even identify them in real-time?

Furthermore, traditional approaches to IT asset management have not scaled to the modern cloud deployment and leave us with limited visibility and gaps in our security coverage. A new approach is required.

Discussion topics will include:
How asset management...
Virtual
Roundtable
Thursday, February 17th, 2022
Gaurav  Mahendru
Ranndeep  Chonker
Gaurav Mahendru with Ranndeep Chonker
Virtual Roundtable
How to Make Your Business More Resilient to Growing Uncertainty
Discussion topics will include:
As enterprises worldwide continue to battle the pandemic uncertainty, resilience is something that will bring in certainty for cyber risk and compliance professionals. For a resilient business, it is important to make risk-informed decisions integrated across the enterprise. It is vital to break down silos by bringing together security operations, governance, risk, and compliance with IT, employees, and customer success workflows on a single platform. Alongwith cyber and operational resilience, vendor resilience is another important pillar that cannot be missed....
Virtual
Roundtable
Thursday, February 17th, 2022
Mathew Schwartz
John Waters
Mathew Schwartz with John Waters
Virtual Roundtable
Identity: The Foundation for Digital and Cloud Transformation
Discussion topics will include:
As organizations pursue digital transformation and greater adoption of cloud-based resources, digital identities, and their alignment to digital assets, has become crucial in terms of data security, privacy and compliance.

All of these identities - comprising everything from employees and contractors to customers and IoT/OT devices - can result in even mid-size organizations having to manage millions of identities and billions of relationships.
• How can organizations handle this requirement in a dynamic manner?
• What are the associated cybersecurity,...
Virtual
Roundtable
Thursday, February 17th, 2022
Anna Delaney
Marcin Spychala
Anna Delaney with Marcin Spychala
Virtual Roundtable
Log4j: Tackling the Patch Management Challenge
Discussion topics will include:
For the past weeks, the security community has been knee-deep in efforts to mitigate - what has been described as - the most serious security flaw to have emerged in years, the Log4j zero-day vulnerability. The story unveils a deeper problem: Organizations have too many unpatched flaws, often exacerbated by their not knowing all the systems in operation within the enterprise.

Newly discovered vulnerabilities continue to increase, with more than 18,000 published last year alone. Resources and limited time continue...
Virtual
Roundtable
Thursday, February 17th, 2022
Dan Gunderman
Shashi Prakash
Dan Gunderman with Shashi Prakash
Virtual Roundtable
Managing Risk Outside Your Four Walls: Strategies for Protecting Your External Attack Surface
Discussion topics will include:
Security practitioners are increasingly put to task to address threats and risks occurring outside the traditional four walls of the enterprise. Referred to as a company’s external attack surface, it comprises typosquat domains; fake websites, apps, and ads; counterfeit sales; email compromise; and social media fraud.

And with technology stacks piling high, security teams are increasingly looking for efficient engines that can detect and act against these external activities in real time - including scams propagated through multiple platforms and...
Virtual
Roundtable
Wednesday, February 23rd, 2022
Dan Gunderman
Tony Lauro
Dan Gunderman with Tony Lauro
Virtual Roundtable
Staying One Step Ahead of Online Fraudsters – And Their Bots
Discussion topics will include:
Malicious bots are everywhere. From denial-of-service attacks designed to “box out” or slow legitimate traffic to inventory hoarding of hot consumer goods to credential stuffing attacks that attempt to validate user credentials for account takeover (ATO), bad bots are busy disrupting your customer experience online – and your bottom line. But it doesn’t have to be a losing battle against today’s sophisticated and highly motivated bot operators.

Join ISMG's Dan Gunderman for a moderated discussion that will draw from the...
Virtual
Roundtable
Thursday, February 24th, 2022
Del Rodillas
Paul Brownlee
Del Rodillas with Paul Brownlee
Virtual Roundtable
Securing Industry 4.0: Mitigate Cyber Risk in Smart Manufacturing
Discussion topics will include:
It's the fourth Industrial Revolution, and it arrived faster than anyone could have planned. It came with smart devices, automation, cloud migration and a new streamlined ability to engage with customers and partners.

But it also brought with it the vulnerabilities inherent in legacy technology, the disconnect of OT, an enlarged attack surface and increased attention from nation-state and criminal adversaries who seek to disrupt operations or steal intellectual property.

How prepared are you to secure Industry 4.0?

Register for...
Virtual
Roundtable
Thursday, February 24th, 2022
Dan Gunderman
Shashi Prakash
Dan Gunderman with Shashi Prakash
Virtual Roundtable
Managing Risk Outside Your Four Walls: Strategies for Protecting Your External Attack Surface
Discussion topics will include:
Security practitioners are increasingly put to task to address threats and risks occurring outside the traditional four walls of the enterprise. Referred to as a company’s external attack surface, it comprises typosquat domains; fake websites, apps, and ads; counterfeit sales; email compromise; and social media fraud.

And with technology stacks piling high, security teams are increasingly looking for efficient engines that can detect and act against these external activities in real time - including scams propagated through multiple platforms and...
Virtual
Roundtable
Wednesday, March 2nd, 2022
Dan Gunderman
Andrew Stone
Dan Gunderman with Andrew Stone
Virtual Roundtable
Understanding 'Next-Gen' Backup & Restoration Processes
Discussion topics will include:
Following a ransomware attack, leaders at organizations with functional backups might expect to be up and running within a matter of minutes. In reality, this can be a lengthy process causing confusion and frustration. "Recoverability," then, must underpin much of the enterprise's wider security strategy.

Despite a surge in crypto-locking attacks, tools have emerged allowing teams to restore data in milliseconds. Other features now prohibit even those with admin rights from deleting files - without navigating a MFA-controlled process requiring...
Virtual
Roundtable
Thursday, March 10th, 2022
Anna Delaney
Aaron Cockerill
Anna Delaney with Aaron Cockerill
Virtual Roundtable
From Endpoint to Cloud: Achieving Zero Trust for Enterprises
Discussion topics will include:
The global reliance on cloud-based infrastructure and services that are accessible from any device, has prompted security teams to rethink the way they protect their organizations. To support this new and agile way of working, security leaders need to be able to balance end-user privacy with security to protect users and corporate data from phishing, malware, and other threats. At the same time, too little freedom causes employee dissatisfaction, reduced agility and collaboration.

How can you enable employees to be...
Virtual
Roundtable
Thursday, March 10th, 2022
Dan Gunderman
Andrew Stone
Dan Gunderman with Andrew Stone
Virtual Roundtable
Understanding 'Next-Gen' Backup & Restoration Processes
Discussion topics will include:
Following a ransomware attack, leaders at organizations with functional backups might expect to be up and running within a matter of minutes. In reality, this can be a lengthy process causing confusion and frustration. "Recoverability," then, must underpin much of the enterprise's wider security strategy.

Despite a surge in crypto-locking attacks, tools have emerged allowing teams to restore data in milliseconds. Other features now prohibit even those with admin rights from deleting files - without navigating a MFA-controlled process requiring...
Virtual
Roundtable
Wednesday, March 16th, 2022
Dan Gunderman
Andy Ellis
Dan Gunderman with Andy Ellis
Virtual Roundtable
Better Understanding Cloud Security Risks Through ‘Context’
Discussion topics will include:
In just a few years, cloud conversations have gone from theoretical to critical. And with migrations to the cloud ongoing, many enterprises have had to rethink their security approach. In these environments, some practitioners are charged with expending resources to mitigate “high-severity” CVEs – regardless of how a vulnerability may interact with that IT environment. This risk may pale in comparison, for example, to a malware occurrence at the edge that goes unchecked.

A potential lack of visibility into apps,...
Virtual
Roundtable
Thursday, March 17th, 2022
Paul Brownlee
Del Rodillas
Paul Brownlee with Del Rodillas
Virtual Roundtable
Securing Industry 4.0: Mitigate Cyber Risk in Smart Manufacturing
Discussion topics will include:
It's the fourth Industrial Revolution, and it arrived faster than anyone could have planned. It came with smart devices, automation, cloud migration and a new streamlined ability to engage with customers and partners.

But it also brought with it the vulnerabilities inherent in legacy technology, the disconnect of OT, an enlarged attack surface and increased attention from nation-state and criminal adversaries who seek to disrupt operations or steal intellectual property.

How prepared are you to secure Industry 4.0?

Register for...
TBD
In-Person
Roundtable
Thursday, March 17th, 2022
TBD
Anna Delaney
Jay Coley
Anna Delaney with Jay Coley
In-Person Roundtable
Web Application Firewalls: Maximising Control and Visibility
Discussion topics will include:
As organizations have shifted to online-focused business operations, expectations for the security of websites and apps are at an all-time high. Attackers, however, are constantly finding new vulnerabilities and attack vectors. Organizations deploy Web Application Firewalls to detect malicious web traffic aimed at their production apps and APIs.

Can you understand the intent of the attacks? Do you have real-time visibility and control? How can you reduce the noise of security products to focus on the most critical alerts?

Discussion...
Virtual
Roundtable
Thursday, March 24th, 2022
Dan Gunderman
Shashi Prakash
Dan Gunderman with Shashi Prakash
Virtual Roundtable
Managing Risk Outside Your Four Walls: Strategies for Protecting Your External Attack Surface
Discussion topics will include:
Security practitioners are increasingly put to task to address threats and risks occurring outside the traditional four walls of the enterprise. Referred to as a company’s external attack surface, it comprises typosquat domains; fake websites, apps, and ads; counterfeit sales; email compromise; and social media fraud.

And with technology stacks piling high, security teams are increasingly looking for efficient engines that can detect and act against these external activities in real time - including scams propagated through multiple platforms and...
TBD
In-Person
Roundtable
Thursday, March 31st, 2022
TBD
Tom Field
Chris Pierson
Tom Field with Chris Pierson
In-Person Roundtable
Executive Protection for Digital Lives – What CIOs and CISOs Need to Consider Beyond the Office
Discussion topics will include:
Senior leaders’ unified digital life mingling personal and professional data and devices has become the soft underbelly of corporate cybersecurity. Therefore, CEOs and their CISOs need to extend the defense perimeter and protect the entire digital lives of all executives and key personnel. Some statistics:

- 27% of executives have malware on their personal devices
- 20% of executives’ homes are digitally compromised
- 69% of executive’s personal passwords are on the Dark Web
- 75% have improper privacy and...
Virtual
Roundtable
Wednesday, April 6th, 2022
Tom Field
Jon Powvens
Tom Field with Jon Powvens
Virtual Roundtable
Digital Healthcare's Future: It's About Availability
Discussion topics will include:
Healthcare compressed roughly a decade's worth of digital transformation into the past two years. As a result, patients now receive unprecedented digital services, and healthcare professionals have new tools for making decisions, sharing information, and delivering services from any remote location.

But today's digital healthcare footprint also represents one of the largest and most lucrative potential attack surfaces in history. Any healthcare entity is but a ransomware attack or a distributed denial of service incident away from being unable to...
Virtual
Roundtable
Thursday, April 7th, 2022
Dan Gunderman
Shashi Prakash
Dan Gunderman with Shashi Prakash
Virtual Roundtable
Managing Risk Outside Your Four Walls: Strategies for Protecting Your External Attack Surface
Discussion topics will include:
Security practitioners are increasingly put to task to address threats and risks occurring outside the traditional four walls of the enterprise. Referred to as a company’s external attack surface, it comprises typosquat domains; fake websites, apps, and ads; counterfeit sales; email compromise; and social media fraud.

And with technology stacks piling high, security teams are increasingly looking for efficient engines that can detect and act against these external activities in real time - including scams propagated through multiple platforms and...
TBD
In-Person
Roundtable
Tuesday, April 26th, 2022
TBD
Tom Field
Chris Pierson
Tom Field with Chris Pierson
In-Person Roundtable
Executive Protection for Digital Lives – What CIOs and CISOs Need to Consider Beyond the Office
Discussion topics will include:
Senior leaders’ unified digital life mingling personal and professional data and devices has become the soft underbelly of corporate cybersecurity. Therefore, CEOs and their CISOs need to extend the defense perimeter and protect the entire digital lives of all executives and key personnel. Some statistics:

- 27% of executives have malware on their personal devices
- 20% of executives’ homes are digitally compromised
- 69% of executive’s personal passwords are on the Dark Web
- 75% have improper privacy and...
Virtual
Roundtable
Thursday, April 28th, 2022
Tom Field
Jon Powvens
Tom Field with Jon Powvens
Virtual Roundtable
Digital Healthcare's Future: It's About Availability
Discussion topics will include:
Healthcare compressed roughly a decade's worth of digital transformation into the past two years. As a result, patients now receive unprecedented digital services, and healthcare professionals have new tools for making decisions, sharing information, and delivering services from any remote location.

But today's digital healthcare footprint also represents one of the largest and most lucrative potential attack surfaces in history. Any healthcare entity is but a ransomware attack or a distributed denial of service incident away from being unable to...
Virtual
Roundtable
Thursday, May 12th, 2022
Dan Gunderman
Shashi Prakash
Dan Gunderman with Shashi Prakash
Virtual Roundtable
Managing Risk Outside Your Four Walls: Strategies for Protecting Your External Attack Surface
Discussion topics will include:
Security practitioners are increasingly put to task to address threats and risks occurring outside the traditional four walls of the enterprise. Referred to as a company’s external attack surface, it comprises typosquat domains; fake websites, apps, and ads; counterfeit sales; email compromise; and social media fraud.

And with technology stacks piling high, security teams are increasingly looking for efficient engines that can detect and act against these external activities in real time - including scams propagated through multiple platforms and...
TBD
In-Person
Roundtable
Thursday, May 12th, 2022
TBD
Tom Field
Chris Pierson
Tom Field with Chris Pierson
In-Person Roundtable
Executive Protection for Digital Lives – What CIOs and CISOs Need to Consider Beyond the Office
Discussion topics will include:
Senior leaders’ unified digital life mingling personal and professional data and devices has become the soft underbelly of corporate cybersecurity. Therefore, CEOs and their CISOs need to extend the defense perimeter and protect the entire digital lives of all executives and key personnel. Some statistics:

- 27% of executives have malware on their personal devices
- 20% of executives’ homes are digitally compromised
- 69% of executive’s personal passwords are on the Dark Web
- 75% have improper privacy and...
Virtual
Roundtable
Wednesday, June 1st, 2022
Dan Gunderman
Shashi Prakash
Dan Gunderman with Shashi Prakash
Virtual Roundtable
Managing Risk Outside Your Four Walls: Strategies for Protecting Your External Attack Surface
Discussion topics will include:
Security practitioners are increasingly put to task to address threats and risks occurring outside the traditional four walls of the enterprise. Referred to as a company’s external attack surface, it comprises typosquat domains; fake websites, apps, and ads; counterfeit sales; email compromise; and social media fraud.

And with technology stacks piling high, security teams are increasingly looking for efficient engines that can detect and act against these external activities in real time - including scams propagated through multiple platforms and...
Virtual
Roundtable
Wednesday, June 15th, 2022
Jeremy Kirk
Shashi Prakash
Jeremy Kirk with Shashi Prakash
Virtual Roundtable
Managing Risk Outside Your Four Walls: Strategies for Protecting Your External Attack Surface
Discussion topics will include:
Security practitioners are increasingly put to task to address threats and risks occurring outside the traditional four walls of the enterprise. Referred to as a company’s external attack surface, it comprises typosquat domains; fake websites, apps, and ads; counterfeit sales; email compromise; and social media fraud.

And with technology stacks piling high, security teams are increasingly looking for efficient engines that can detect and act against these external activities in real time - including scams propagated through multiple platforms and...
Past Roundtables
Virtual
Roundtable
Thursday, January 27th, 2022
Tom Field
Frank Walsh
Tom Field with Frank Walsh
Virtual Roundtable
Fraud Fighting 2022: How to Win the Battle Against Bots
Discussion topics will include:
As enterprises globally have shifted more of their operations online, cyber adversaries have doubled down on the use of bots to automate and increase the scale of their attacks.

According to recent research from Enterprise Strategy Group, nearly half (47%) of cybersecurity professionals have seen examples of credential stuffing or cracking attacks used for account takeover in just the past 6 months. And 46% are aware of attacks on online shopping cart systems and instances of automated inventory purchasing or...
Virtual
Roundtable
Tuesday, January 25th, 2022
Tom Field
Chris Wysopal
Tom Field with Chris Wysopal
Virtual Roundtable
Software Security: How to Prioritize, Measure and Convey It To the Board
Discussion topics will include:
Amidst the shifting threat landscape, cloud migration and ongoing digital transformation, software security is often low or even last on the list of priorities for security leaders to address.

Yet, with the recent executive order on cybersecurity, and as headlines continue to feature high-profile breaches, board members at organizations across all industries are taking notice. Even though there are often designated technical experts on boards, there is now an increased awareness around cybersecurity – especially software security – even among...
Virtual
Roundtable
Thursday, January 20th, 2022
Jeremy Kirk
Shashi Prakash
Jeremy Kirk with Shashi Prakash
Virtual Roundtable
Managing Risk Outside Your Four Walls: Strategies for Protecting Your External Attack Surface
Discussion topics will include:
Security practitioners are increasingly put to task to address threats and risks occurring outside the traditional four walls of the enterprise. Referred to as a company’s external attack surface, it comprises typosquat domains; fake websites, apps, and ads; counterfeit sales; email compromise; and social media fraud.

And with technology stacks piling high, security teams are increasingly looking for efficient engines that can detect and act against these external activities in real time - including scams propagated through multiple platforms and...
Virtual
Roundtable
Thursday, January 20th, 2022
Tom Field
Jon Nelson
Tom Field with Jon Nelson
Virtual Roundtable
President's Executive Order: How to Meet The New Requirements
Discussion topics will include:
Multifactor authentication. Zero trust security. The software bill of materials. These are all key elements of President Joe Biden's 2021 cybersecurity executive order. And this is the year when requirements for each of these elements will start trickling down from federal agencies to state/local and even to private enterprises.

How prepared is your organization to meet these new requirements? Where are you particularly on the zero trust journey? Do you envision consolidating the number of cybersecurity vendors with whom you...
Virtual
Roundtable
Thursday, January 20th, 2022
Suparna Goswami
Vaibhav Khandelwal
Suparna Goswami with Vaibhav Khandelwal
Virtual Roundtable
Application Fraud Prevention: How to Better Your Existing Approach
Discussion topics will include:
With enterprises globally shifting most of their operations online, fraudsters have doubled down on the use of bots to automate and increase the scale of operations. Recent studies have shown that enterprises, especially the digital native ones, have faced credential stuffing attacks due to open fake online accounts. Moreover, there are enough incidents of automated inventory purchasing or holding.

With traditional static controls unable to prevent dynamic traffic movements, how are enterprises managing their application security? How can fraud and...
Virtual
Roundtable
Wednesday, January 19th, 2022
Tom Field
Frank Walsh
Tom Field with Frank Walsh
Virtual Roundtable
Fraud Fighting 2022: How to Win the Battle Against Bots
Discussion topics will include:
As enterprises globally have shifted more of their operations online, cyber adversaries have doubled down on the use of bots to automate and increase the scale of their attacks.

According to recent research from Enterprise Strategy Group, nearly half (47%) of cybersecurity professionals have seen examples of credential stuffing or cracking attacks used for account takeover in just the past 6 months. And 46% are aware of attacks on online shopping cart systems and instances of automated inventory purchasing or...
Virtual
Roundtable
Wednesday, January 19th, 2022
Anna Delaney
Chris Cochran
Anna Delaney with Chris Cochran
Virtual Roundtable
New Approaches to Asset Management in Cybersecurity
Discussion topics will include:
The proliferation of mobile and IoT devices adds a new, unprecedented degree of complexity that security teams are left scrambling to solve: How do you account for and secure these ephemeral devices when you often can’t even identify them in real-time?

Furthermore, traditional approaches to IT asset management have not scaled to the modern cloud deployment and leave us with limited visibility and gaps in our security coverage. A new approach is required.

Discussion topics will include:
How asset management...
Virtual
Roundtable
Tuesday, January 18th, 2022
Tom Field
Christopher Trollo
Tom Field with Christopher Trollo
Virtual Roundtable
Increase Operational Efficiency by Modernizing Your Security Operations
Discussion topics will include:
Too many endpoints. Too much data. Too little context for alerts about potential threats from insiders, criminals, and nation-states. These were all issues pre-COVID. And the pandemic-fueled accelerated transformation has only magnified them.

What are you doing today to streamline and modernize the efficiency of your security operations? How have your plans evolved throughout the pandemic, and what specifically do you intend to do in 2022? How will you address risk, the dearth of talent, and the ever evolving threat...
Virtual
Roundtable
Tuesday, January 18th, 2022
Vicente Diaz
Art Ehuan
Vicente Diaz with Art Ehuan
Virtual Roundtable
Combating the Modern Ransomware Threat
Discussion topics will include:
With threats growing in volume and sophistication, today’s ransomware attacks easily outpace many organizations’ defensive capabilities. Globally, enterprises of all sizes and sectors are being compromised and held hostage by ransomware, with many being forced to pay millions in ransom because they’re ill-equipped to combat their adversaries.

This trend intersects with the continued rise of digital business and represents a new magnitude of risk. It’s imperative, then, to understand your adversaries and re-examine your security posture so that you may...
Virtual
Roundtable
Thursday, January 13th, 2022
Anna Delaney
Chris Cochran
Anna Delaney with Chris Cochran
Virtual Roundtable
New Approaches to Asset Management in Cybersecurity
Discussion topics will include:
The proliferation of mobile and IoT devices adds a new, unprecedented degree of complexity that security teams are left scrambling to solve: How do you account for and secure these ephemeral devices when you often can’t even identify them in real-time?

Furthermore, traditional approaches to IT asset management have not scaled to the modern cloud deployment and leave us with limited visibility and gaps in our security coverage. A new approach is required.

Discussion topics will include:
How asset management...
Virtual
Roundtable
Wednesday, January 12th, 2022
Dan Gunderman
Andy Ellis
Dan Gunderman with Andy Ellis
Virtual Roundtable
Better Understanding Cloud Security Risks Through ‘Context’
Discussion topics will include:
In just a few years, cloud conversations have gone from theoretical to critical. And with migrations to the cloud ongoing, many enterprises have had to rethink their security approach. In these environments, some practitioners are charged with expending resources to mitigate “high-severity” CVEs – regardless of how a vulnerability may interact with that IT environment. This risk may pale in comparison, for example, to a malware occurrence at the edge that goes unchecked.

A potential lack of visibility into apps,...
Virtual
Roundtable
Tuesday, January 11th, 2022
Tom Field
Rick McElroy
Tom Field with Rick McElroy
Virtual Roundtable
Beyond Digital Transformation: Securing Healthcare’s Future
Discussion topics will include:
There has never been such a year for healthcare. Since the advent of the COVID-19 pandemic, healthcare entities globally have embraced cloud platforms and digital technologies to deliver telehealth products years ahead of schedule. “Healthcare from anywhere” is the new norm. The patient experience is the new competitive differentiator. And healthcare – more than ever before – is square in the adversaries’ crosshairs.

How has the healthcare attack surface shifted in the past year? What have cybersecurity leaders learned about...
Virtual
Roundtable
Tuesday, January 11th, 2022
Anna Delaney
Tom Davison
Anna Delaney with Tom Davison
Virtual Roundtable
From Endpoint to Cloud: Achieving Zero Trust for Enterprises
Discussion topics will include:
The global reliance on cloud-based infrastructure and services that are accessible from any device, has prompted security teams to rethink the way they protect their organizations. To support this new and agile way of working, security leaders need to be able to balance end-user privacy with security to protect users and corporate data from phishing, malware, and other threats. At the same time, too little freedom causes employee dissatisfaction, reduced agility and collaboration.

How can you enable employees to be...
Virtual
Roundtable
Wednesday, December 15th, 2021
Tom Field
Jacob Olcott
Tom Field with Jacob Olcott
Virtual Roundtable
Ransomware: How to Reduce Your Likelihood of Being a Victim
Discussion topics will include:
Colonial Pipeline. JBS meat processor. Scripps Health. The list of recent high-profile ransomware victims is long and growing. So are the costs to recover from these crimes.

But what if you could take preventive steps to reduce your likelihood of becoming a ransomware victim? BitSight recently analyzed hundreds of ransomware incidents to identify common security performance gaps and challenges that lead to successful ransomware incidents. One finding: Poor patching performance is a strong indicator of increased risk to ransomware. In...
Virtual
Roundtable
Wednesday, December 15th, 2021
Anna Delaney
Steve Kinman
Anna Delaney with Steve Kinman
Virtual Roundtable
DevSecOps: Uncovering the Hidden (and Costly) Risks
Discussion topics will include:
Misconfigurations. Known unpatched vulnerabilities. Open source code. The great unknown that comes from cloud migration and cloud-native apps. These are among the application security risks facing enterprises of all sizes and sectors. And yet too many security leaders maintain an arm’s length distance away from DevSecOps, lacking visibility into the risks that could lead to breach.

At a time when even the White House is talking about increasing accountability for application security, security leaders must prioritize their understanding of DevSecOps...
Virtual
Roundtable
Tuesday, December 14th, 2021
Anna Delaney
Mike Britton
Anna Delaney with Mike Britton
Virtual Roundtable
Supply Chain Attacks: Defending Against Vendor Email Compromise
Discussion topics will include:
Vendor email compromise (VEC) is a significant security threat to organizations. According to research from Abnormal Security, the percentage of companies who received a VEC attack increased 156% from July 2020 to June 2021, as threat actors increasingly see communications between vendors and customers as the weakest link.

It’s clear traditional email defenses were not designed to stop socially-engineered attacks. Without a new approach, high-profile attacks such as SolarWinds and Colonial Pipeline, will continue to cause severe financial losses and...
Virtual
Roundtable
Thursday, December 9th, 2021
Tom Field
Frank Walsh
Tom Field with Frank Walsh
Virtual Roundtable
Fraud Fighting 2022: How to Win the Battle Against Bots
Discussion topics will include:
As enterprises globally have shifted more of their operations online, cyber adversaries have doubled down on the use of bots to automate and increase the scale of their attacks.

According to recent research from Enterprise Strategy Group, nearly half (47%) of cybersecurity professionals have seen examples of credential stuffing or cracking attacks used for account takeover in just the past 6 months. And 46% are aware of attacks on online shopping cart systems and instances of automated inventory purchasing or...
Virtual
Roundtable
Thursday, December 9th, 2021
Anna Delaney
Shashi Prakash
Anna Delaney with Shashi Prakash
Virtual Roundtable
Why Protecting Your Internet Attack Surface Matters More Than Ever
Discussion topics will include:
As organizations continue to increase their presence online every year, their internet attack surface continues to grow while becoming ever more complex to protect. This not only includes fraudsters creating fake domains to impersonate legitimate websites, but also increases in typosquatting attacks, trademark infringement and vendor email compromise schemes, which are a growing area of concern for the FBI.

For CISOs and their teams, protecting against these types of attacks and fraud is an ever-growing concern, especially when much of...
Virtual
Roundtable
Wednesday, December 8th, 2021
Dan Gunderman
Wolf Goerlich
Dan Gunderman with Wolf Goerlich
Virtual Roundtable
Envisioning a Passwordless World
Discussion topics will include:
For almost all organizations, passwords are a necessary part of day-to-day work, but security leaders and CISOs know that passwords are the weak link in any security chain. Passwords are easily hacked or compromised by attackers, and trying to ensure that workers and employees follow basic cyber hygiene, including resetting passwords on a regular basis, is a nearly impossible task.

Organizations need a fresh approach, one that combines the best of how multifactor authentication works with technologies such as biometrics,...
Virtual
Roundtable
Wednesday, December 8th, 2021
Tom Field
Frank Walsh
Tom Field with Frank Walsh
Virtual Roundtable
Fraud Fighting 2022: How to Win the Battle Against Bots
Discussion topics will include:
As enterprises globally have shifted more of their operations online, cyber adversaries have doubled down on the use of bots to automate and increase the scale of their attacks.

According to recent research from Enterprise Strategy Group, nearly half (47%) of cybersecurity professionals have seen examples of credential stuffing or cracking attacks used for account takeover in just the past 6 months. And 46% are aware of attacks on online shopping cart systems and instances of automated inventory purchasing or...
Virtual
Roundtable
Wednesday, December 8th, 2021
Anna Delaney
Chris Cochran
Anna Delaney with Chris Cochran
Virtual Roundtable
New Approaches to Asset Management in Cybersecurity
Discussion topics will include:
The proliferation of mobile and IoT devices adds a new, unprecedented degree of complexity that security teams are left scrambling to solve: How do you account for and secure these ephemeral devices when you often can’t even identify them in real-time?

Furthermore, traditional approaches to IT asset management have not scaled to the modern cloud deployment and leave us with limited visibility and gaps in our security coverage. A new approach is required.

Discussion topics will include:
How asset management...
Virtual
Roundtable
Wednesday, December 8th, 2021
Suparna Goswami
Deepak Prasad
Suparna Goswami with Deepak Prasad
Virtual Roundtable
Cybersecurity-Driven Digital Transformation
Discussion topics will include:
With the acceleration of digital transformation, cybersecurity has risen to the forefront of concerns for enterprises around the world. On top of that, the velocity of threats is increasing and attackers are using new, sophisticated ways of infiltrating your production environment as well as your software supply chain. Digital Transformation migration to the cloud leads to new opportunities for security transformation, but how are enterprise taking a ‘shift left’ approach while moving applications to the cloud? Are detection tools more...
Virtual
Roundtable
Tuesday, December 7th, 2021
Dan Gunderman
Wolf Goerlich
Dan Gunderman with Wolf Goerlich
Virtual Roundtable
Envisioning a Passwordless World
Discussion topics will include:
For almost all organizations, passwords are a necessary part of day-to-day work, but security leaders and CISOs know that passwords are the weak link in any security chain. Passwords are easily hacked or compromised by attackers, and trying to ensure that workers and employees follow basic cyber hygiene, including resetting passwords on a regular basis, is a nearly impossible task.

Organizations need a fresh approach, one that combines the best of how multifactor authentication works with technologies such as biometrics,...
Virtual
Roundtable
Tuesday, December 7th, 2021
Jeremy Kirk
Mike Britton
Jeremy Kirk with Mike Britton
Virtual Roundtable
Supply Chain Attacks: Defending Against Vendor Email Compromise
Discussion topics will include:
Vendor email compromise (VEC) is a significant security threat to organizations. According to research from Abnormal Security, the percentage of companies who received a VEC attack increased 156% from July 2020 to June 2021, as threat actors increasingly see communications between vendors and customers as the weakest link.

It’s clear traditional email defenses were not designed to stop socially-engineered attacks. Without a new approach, high-profile attacks such as SolarWinds and Colonial Pipeline, will continue to cause severe financial losses and...
Virtual
Roundtable
Thursday, December 2nd, 2021
Dan Gunderman
Helen Patton
Dan Gunderman with Helen Patton
Virtual Roundtable
How Government Agencies Can Start Adopting ‘Zero Trust’ Right Now
Discussion topics will include:
In May, President Joe Biden signed an executive order compelling U.S. government departments and agencies to adopt several new cybersecurity practices, including deploying “zero trust” architectures designed to mitigate threats such as supply chain and ransomware attacks that have become an area of concern.

And while federal agencies are now compelled to deploy zero trust, how they get there within the tight timelines detailed in the executive order is less specific. It will require new thinking about how to deploy...
Virtual
Roundtable
Thursday, December 2nd, 2021
Tom Field
Dan Fabbri
Tom Field with Dan Fabbri
Virtual Roundtable
Designing the Next Generation of Zero Trust
Discussion topics will include:
Zero Trust: It has become one of the biggest – and most misunderstood – buzzwords in cybersecurity. The model encourages the implementation of strong controls, methods and protocols surrounding access to critical systems and data.

Yet, while Zero Trust is a popular way to enhance cybersecurity controls in the COVID era, it has its challenges and limitations. If the access granted through Zero Trust is not reviewed periodically, it could potentially lead to the creation of an “access creep” or...
Virtual
Roundtable
Thursday, December 2nd, 2021
Mathew Schwartz
Rachel Cook
Mathew Schwartz with Rachel Cook
Virtual Roundtable
Strategies to Defend Your Multi & Hybrid Cloud Infrastructure
Discussion topics will include:
The ongoing need for digital transformation continues to drive more organizations into the cloud, bringing their apps and data with them. But managing the underlying infrastructure, working with different hyperscalers – large cloud and networking providers – as well as overseeing multiple private clouds, public clouds and edge environments remains a complex undertaking. One insecure API or server misconfiguration, and organizations risk being hit by criminal hackers and suffering long-term financial or reputational damage.

Join us for a limited seat,...
Virtual
Roundtable
Thursday, December 2nd, 2021
Anna Delaney
Martin Lee
Anna Delaney with Martin Lee
Virtual Roundtable
A New Approach to Endpoint Security
Discussion topics will include:
Today’s antivirus solutions can identify and block many types of malware easily. But how confident are you that your endpoint protection is detecting more stealthy techniques, such as malicious content hiding inside a legitimate piece of software which is then distributed through the update mechanism? In order to keep up with the criminals, a new approach to endpoint security is required.

How can you deploy endpoint protection on every system, making sure that the detection is actually enabled? How can...
Virtual
Roundtable
Wednesday, December 1st, 2021
Tom Field
Partha Panda
Tom Field with Partha Panda
Virtual Roundtable
Modernizing the SOC: How High-Velocity Enterprises Must Evolve to Meet Today’s Business and IT Needs
Discussion topics will include:
Your company is a fast-moving disruptive force that’s changing your industry and leap frogging slow-moving incumbents. You recognize the value of speed and have embraced a cloud-first approach to your technology infrastructure.

But high-velocity companies need a modern security strategy that supports their aggressive ambitions, can scale with growth and doesn’t rely on an outdated security operations center or staffing it with a team of hard-to-find security experts.

Leap forward. Register for this executive roundtable to gain key insights about...
Virtual
Roundtable
Tuesday, November 30th, 2021
Deepak Daswani
María García Iñañez
Deepak Daswani with María García Iñañez
Virtual Roundtable
Pasos clave para la aplicación de Secure Access Service Edge (SASE)
Discussion topics will include:
Hoy en día, el mayor reto para los CISOs es asegurar todos los espacios de trabajo, ya sea una oficina en casa, una oficina tradicional, una sucursal ERP o una combinación de las tres. Entonces, ¿cómo proporcionar una "seguridad coherente" para cada espacio de trabajo? Ante la necesidad de simplificar unas soluciones de seguridad cada vez más complejas, las empresas están adoptando Secure Access Service Edge (SASE).

En este nuevo escenario, es necesario responder a múltiples preguntas que surgen de...
Virtual
Roundtable
Tuesday, November 30th, 2021
Suparna Goswami
Deepak Prasad
Suparna Goswami with Deepak Prasad
Virtual Roundtable
Putting Identity a Core to Your Zero Trust Journey
Discussion topics will include:
While all industries have undergone drastic change in the way they are operating in a hybrid model, the impact on regulated industries including the financial industry has been particularly high. The change has forged a new perimeter: identity, whether human or non-human. The risk now is from any endpoint, anywhere in the world, which could potentially gain access to your systems – whether on premise or in the cloud.

How can CISOs adapt and enable business agility without compromising security?...
Virtual
Roundtable
Wednesday, November 24th, 2021
Richard Archdecon
Georg Holzach
Richard Archdecon with Georg Holzach
Virtual Roundtable
Envisioning a Passwordless World
Discussion topics will include:
For almost all organizations, passwords are a necessary part of day-to-day work, but security leaders and CISOs know that passwords are the weak link in any security chain. Passwords are easily hacked or compromised by attackers, and trying to ensure that workers and employees follow basic cyber hygiene, including resetting passwords on a regular basis, is a nearly impossible task.

Organizations need a fresh approach, one that combines the best of how multifactor authentication works with technologies such as biometrics,...
Virtual
Roundtable
Wednesday, November 24th, 2021
Suparna Goswami
Sandeep Patil
Suparna Goswami with Sandeep Patil
Virtual Roundtable
Future-Proofing Security Operations: Innovations and Best Practice for Your Enterprise
Discussion topics will include:
Too many endpoints. Too much data and little context. While these were issues before the pandemic, post pandemic, these issues have further magnified. While cloud migration has been essential, it generates more data, making it all the more essential to make sense of these data. What has been the impact of these rapid business changes on security? Is there also an opportunity to completely modernize security operations?

What are you doing today to streamline and modernize the efficiency of your...
Virtual
Roundtable
Thursday, November 18th, 2021
Dan Gunderman
Dave Lewis
Dan Gunderman with Dave Lewis
Virtual Roundtable
The Security Debt Crisis – How to Catch Up on Past Due Patches and Neglected Risk
Discussion topics will include:
There is a common theme for many of the mega breaches of recent years – a neglect of basic cybersecurity hygiene that has resulted in a backlog of unpatched apps, misapplied configurations and overlooked tasks. This debt compounds over time and, as with financial debt can snowball to reach a point, where it becomes insurmountable. As organizations increasingly become cloud first, the risk profile from security debt further increases.

So, what can be done to claw back control of security...
Virtual
Roundtable
Thursday, November 18th, 2021
Tom Field
MK Palmore
Tom Field with MK Palmore
Virtual Roundtable
Combating the Modern Ransomware Threat
Discussion topics will include:
With threats growing in volume and sophistication, today’s ransomware attacks easily outpace many organizations’ defensive capabilities. Globally, enterprises of all sizes and sectors are being compromised and held hostage by ransomware, with many being forced to pay millions in ransom because they’re ill-equipped to combat their adversaries.

This trend intersects with the continued rise of digital business and represents a new magnitude of risk. It’s imperative, then, to understand your adversaries and re-examine your security posture so that you may...
Virtual
Roundtable
Thursday, November 18th, 2021
Timothée Bardet
Roger Sels
Timothée Bardet with Roger Sels
Virtual Roundtable
Comment sécuriser infrastructures IT et endpoints à l’heure de la mobilité ?
Discussion topics will include:
Cette année a été marquée par une explosion d’événements de sécurité et de cyber incidents majeurs, ainsi qu’une généralisation forcée la mobilité. Cela pose des questions et défis quotidiens pour les dirigeants IT. Non seulement les équipes de sécurité ont besoin de toujours plus de visibilité sur des endpoints et des réseaux en nombre et en complexité croissants, mais elles doivent également mieux analyser, prioriser et s’adapter aux menaces changeantes. En effet avec une augmentation de la surface d’attaque, l’explosion...
Virtual
Roundtable
Thursday, November 18th, 2021
Anna Delaney
Richard Archdecon
Anna Delaney with Richard Archdecon
Virtual Roundtable
Envisioning a Passwordless World
Discussion topics will include:
For almost all organizations, passwords are a necessary part of day-to-day work, but security leaders and CISOs know that passwords are the weak link in any security chain. Passwords are easily hacked or compromised by attackers, and trying to ensure that workers and employees follow basic cyber hygiene, including resetting passwords on a regular basis, is a nearly impossible task.

Organizations need a fresh approach, one that combines the best of how multifactor authentication works with technologies such as biometrics,...
Virtual
Roundtable
Wednesday, November 17th, 2021
Chris Wysopal
Jeremy Kirk
Chris Wysopal with Jeremy Kirk
Virtual Roundtable
Software Security: How to Prioritize, Measure and Convey It To the Board
Discussion topics will include:
Amidst the shifting threat landscape, cloud migration and ongoing digital transformation, software security is often low or even last on the list of priorities for security leaders to address.

Yet, with the recent executive order on cybersecurity, and as headlines continue to feature high-profile breaches, board members at organizations across all industries are taking notice. Even though there are often designated technical experts on boards, there is now an increased awareness around cybersecurity – especially software security – even among...
Virtual
Roundtable
Wednesday, November 17th, 2021
Tom Field
Ben Smith
Tom Field with Ben Smith
Virtual Roundtable
Operationalizing the MITRE ATT&CK Framework
Discussion topics will include:
Too many enterprises today are in a reactive, firefighting mode when it comes to incident response. The MITRE ATT&CK framework is gaining popularity as a structured way to approach vulnerabilities, threats and remediation. Yet a recent study showed that even though 82% of cybersecurity professionals are familiar with the MITRE ATT&CK framework, only 8% said they used it regularly. The challenge: How to operationalize the framework.

Register for this executive roundtable to gain key insights about putting MITRE ATT&CK to...
Virtual
Roundtable
Tuesday, November 16th, 2021
Tom Field
David Balcar
Tom Field with David Balcar
Virtual Roundtable
Business Risk: Which Attacks Can Shut You Down?
Discussion topics will include:
When it comes to cybersecurity in the manufacturing sector, there are generalized threats – phishing, account takeover, insider risk – that can be a nuisance, incur costs or even inflict reputational damage.

But then there are the serious threats – ransomware, supply-chain attacks, product or production tampering – that actually can shut down your business. The key is to be able to distinguish between the different categories of threats and focus most on the ones that can do the worst...
Virtual
Roundtable
Tuesday, November 16th, 2021
Mary Yang
Dan Gunderman
Mary Yang with Dan Gunderman
Virtual Roundtable
Securing Critical Infrastructure: What it Means for Your Organization
Discussion topics will include:
From SolarWinds to nation-state actors targeting vulnerable Exchange email servers to the ransomware attacks against Colonial Pipeline, the security of critical infrastructure has been at the forefront of nearly every cybersecurity conversation since the beginning of the year.

President Biden’s executive order also added to the discussion as the federal government is now poised to revamp its security posture to meet these new challenges.

But what do these changes mean for other private sector organizations? How will potential legislation such...
Virtual
Roundtable
Thursday, November 11th, 2021
Suparna Goswami
David Fairman
Suparna Goswami with David Fairman
Virtual Roundtable
Cloud Security: Building Defense using ‘Zero Trust’
Discussion topics will include:
Enterprises are increasingly relying on cloud-based infrastructure and services that are accessible from anywhere. With data no longer in an environment that can be controlled, security teams have been forced to rethink the way they protect their enterprises and their data.

Although there’s been a lot of discussion about zero trust strategies, not every organization has had the time or resource to fully explore what the model means for their security. At the same time, security leaders must grapple with...
Virtual
Roundtable
Wednesday, November 10th, 2021
Dan Gunderman
Jerome Ferrara
Dan Gunderman with Jerome Ferrara
Virtual Roundtable
State of Hybrid Work: Why Credential Management Still Matters
Discussion topics will include:
With hybrid and remote work likely to continue well into 2022, CISOs and their teams are continuing to find the best ways to secure the credentials of employees who are accessing applications and devices from a variety of locations. At the same time, workers need ready access to the resources while lines of business managers seek out ways to reduce friction to allow for the most productivity.

Organizations need a holistic approach to credential and password management. In addition to...
Virtual
Roundtable
Tuesday, November 9th, 2021
Tom Field
Kurt Roemer
Tom Field with Kurt Roemer
Virtual Roundtable
Disruptive Defense: How to Turn the Tables on Ransomware
Discussion topics will include:
The Kaseya VSA ransomware incident that impacted scores of MSPs and hundreds of enterprises globally is just the latest example: The world is being held hostage by ransomware adversaries who grow only bigger and bolder with each new success.

While essential practices somewhat stem the tide, resilience to ransomware requires much more than the latest patch or update. Disruptive innovation – past, present and future – is the theme of this discussion, where we will explore novel ransomware mitigations.

Discussion...
Virtual
Roundtable
Tuesday, November 9th, 2021
Riccardo Meggiato
Alessandro Dinia
Riccardo Meggiato with Alessandro Dinia
Virtual Roundtable
Gestione degli aggiornamenti per contrastare ransomware e minacce di nuova generazione
Discussion topics will include:
Continua ad aumentare il numero di nuove vulnerabilità scoperte, con oltre 18000 rese pubbliche solo lo scorso anno. Del resto, poche risorse e tempo limitato continuano a essere un problema, nella comunità della cybersecurity: cosa fare per risolverlo?

In particolare, come possiamo allineare i dati che abbiamo sulle vulnerabilità più critiche con le patch necessarie, per correggere almeno il 10% delle più pericolose?

Iscrivetevi a questo evento dedicato agli esperti del settore, che offre approfondimenti su come integrare informazioni sulle...
Virtual
Roundtable
Tuesday, November 9th, 2021
Anna Delaney
Chip Witt
Anna Delaney with Chip Witt
Virtual Roundtable
Throw Away the Key(logger): Strategies for Protecting Users from Malware
Discussion topics will include:
Despite your team’s best efforts to protect corporate systems from malware, users tend to click before thinking. At work, corporate security software may catch wind of an illegitimate download before it causes much damage. On personal devices, however, your employees have fewer layers of protection – and the same goes for consumers using your services.

Botnets can provide criminals with a complete picture of your users’ online activity, making it easy for them to impersonate victims and take over even...
Ruth's Chris Steak House
In-Person
Roundtable
Thursday, November 4th, 2021
Ruth's Chris Steak House
Tom Field
Chris Pierson
Tom Field with Chris Pierson
In-Person Roundtable
Executive Protection for Digital Lives – What CIOs and CISOs Need to Consider Beyond the Office
Discussion topics will include:
Senior leaders’ unified digital life mingling personal and professional data and devices has become the soft underbelly of corporate cybersecurity. Therefore, CEOs and their CISOs need to extend the defense perimeter and protect the entire digital lives of all executives and key personnel. Some statistics:

- 27% of executives have malware on their personal devices
- 20% of executives’ homes are digitally compromised
- 69% of executive’s personal passwords are on the Dark Web
- 75% have improper privacy and...
Virtual
Roundtable
Thursday, November 4th, 2021
Dan Gunderman
Dave Lewis
Dan Gunderman with Dave Lewis
Virtual Roundtable
The Security Debt Crisis – How to Catch Up on Past Due Patches and Neglected Risk
Discussion topics will include:
There is a common theme for many of the mega breaches of recent years – a neglect of basic cybersecurity hygiene that has resulted in a backlog of unpatched apps, misapplied configurations and overlooked tasks. This debt compounds over time and, as with financial debt can snowball to reach a point, where it becomes insurmountable. As organizations increasingly become cloud first, the risk profile from security debt further increases.

So, what can be done to claw back control of security...
Virtual
Roundtable
Wednesday, November 3rd, 2021
Kelvin Franklin
Dan Gunderman
Kelvin Franklin with Dan Gunderman
Virtual Roundtable
Reducing Ransomware Through Micro-Segmentation
Discussion topics will include:
Ransomware is one of the greatest challenges facing CISOs and their security teams today. Not only are these attacks complicated to deal with due to the types of crypto-locking malware that cybercriminal gangs wield, but recovering from this type of attack can be an expensive process thanks to the damage these incidents can inflict on an organization’s infrastructure.

Organizations require a fresh approach to combating ransomware to limit the ability of attackers to move laterally through the infrastructure and find...
Virtual
Roundtable
Wednesday, November 3rd, 2021
Anna Delaney
Shashi Prakash
Anna Delaney with Shashi Prakash
Virtual Roundtable
Why Protecting Your Internet Attack Surface Matters More Than Ever
Discussion topics will include:
As organizations continue to increase their presence online every year, their internet attack surface continues to grow while becoming ever more complex to protect. This not only includes fraudsters creating fake domains to impersonate legitimate websites, but also increases in typosquatting attacks, trademark infringement and vendor email compromise schemes, which are a growing area of concern for the FBI.

For CISOs and their teams, protecting against these types of attacks and fraud is an ever-growing concern, especially when much of...
Virtual
Roundtable
Tuesday, November 2nd, 2021
Aaron Cockerill
Tom Field
Aaron Cockerill with Tom Field
Virtual Roundtable
From Endpoint to Cloud: Achieving Zero Trust for Enterprises
Discussion topics will include:
The global reliance on cloud-based infrastructure and services that are accessible from any device, has prompted security teams to rethink the way they protect their organizations. To support this new and agile way of working, security leaders need to be able to balance end-user privacy with security to protect users and corporate data from phishing, malware, and other threats. At the same time, too little freedom causes employee dissatisfaction, reduced agility and collaboration.

How can you enable employees to be...
Virtual
Roundtable
Tuesday, November 2nd, 2021
Dan Gunderman
Jerome Ferrara
Dan Gunderman with Jerome Ferrara
Virtual Roundtable
State of Hybrid Work: Why Credential Management Still Matters
Discussion topics will include:
With hybrid and remote work likely to continue well into 2022, CISOs and their teams are continuing to find the best ways to secure the credentials of employees who are accessing applications and devices from a variety of locations. At the same time, workers need ready access to the resources while lines of business managers seek out ways to reduce friction to allow for the most productivity.

Organizations need a holistic approach to credential and password management. In addition to...
Virtual
Roundtable
Tuesday, November 2nd, 2021
Tony Morbin
Gwyndaf Davies
Tony Morbin with Gwyndaf Davies
Virtual Roundtable
What to do About Patch Management Overload
Discussion topics will include:
Newly discovered vulnerabilities continue to increase, with more than 18,000 published last year alone. Resources and limited time continue to be an issue amongst the Cyber Security Community, so what can be done to rectify this?

In particular, how do we align the most critical vulnerability data with the right patches to ensure we can, at least, get the top 10% addressed?

Discussion topics will include:
How you can integrate patch information and vulnerability data to improve your overall security...
Virtual
Roundtable
Thursday, October 28th, 2021
Tom Field
Partha Panda
Tom Field with Partha Panda
Virtual Roundtable
Modernizing the SOC: How High-Velocity Enterprises Must Evolve to Meet Today’s Business and IT Needs
Discussion topics will include:
Your company is a fast-moving disruptive force that’s changing your industry and leap frogging slow-moving incumbents. You recognize the value of speed and have embraced a cloud-first approach to your technology infrastructure.

But high-velocity companies need a modern security strategy that supports their aggressive ambitions, can scale with growth and doesn’t rely on an outdated security operations center or staffing it with a team of hard-to-find security experts.

Leap forward. Register for this executive roundtable to gain key insights about...
Virtual
Roundtable
Thursday, October 28th, 2021
Timothée Bardet
Jean-Sébastien Milliere
Timothée Bardet with Jean-Sébastien Milliere
Virtual Roundtable
Sécuriser le «travail hybride» avec votre infrastructure actuelle
Discussion topics will include:
L’année dernière ne restera pas seulement dans les mémoires comme l’année où les entreprises ont rapidement déplacé leurs applications en cloud et en SaaS pour assurer la continuité de leurs activités. Elle a également été marquée par une explosion d’événements de sécurité et de cyber incidents.

Alors que le mode de travail “à distance” est appelé à perdurer, comment assurer la sécurité de toutes les données et de tous les appareils de votre organisation, tout en tirant parti de votre...
Virtual
Roundtable
Thursday, October 28th, 2021
Anna Delaney
Martyna Lubińska
Anna Delaney with Martyna Lubińska
Virtual Roundtable
A New Game Plan to Combat Ransomware Attacks
Discussion topics will include:
We are in the midst of a ransomware pandemic. The list of victims is long and only growing – City of Liège, Maastricht University, Kaseya, Colonial Pipeline, to name a few. Whilst traditional antivirus and endpoint detection and response tools, along with user education, are part of the solution, they’re not always enough to prevent ransomware from infecting and spreading within organizations’ networks.

So how do we avoid being the next victim? What is being overlooked in our current defenses?...
Virtual
Roundtable
Wednesday, October 27th, 2021
Kelvin Franklin
Dan Gunderman
Kelvin Franklin with Dan Gunderman
Virtual Roundtable
Reducing Ransomware Through Micro-Segmentation
Discussion topics will include:
Ransomware is one of the greatest challenges facing CISOs and their security teams today. Not only are these attacks complicated to deal with due to the types of crypto-locking malware that cybercriminal gangs wield, but recovering from this type of attack can be an expensive process thanks to the damage these incidents can inflict on an organization’s infrastructure.

Organizations require a fresh approach to combating ransomware to limit the ability of attackers to move laterally through the infrastructure and find...
Virtual
Roundtable
Wednesday, October 27th, 2021
Tom Field
Matthew Goodwin
Tom Field with Matthew Goodwin
Virtual Roundtable
Marching Orders: Understanding and Meeting the Biden Administration’s New Cybersecurity Standards
Discussion topics will include:
First there was President Biden’s cybersecurity executive order. Then came his Industrial Control System Cybersecurity Initiative. And most recently we’ve seen a new package of supply chain and critical infrastructure security plans launched in conjunction with a White House summit, including the nation’s top technology, financial services and infrastructure leaders.

The sum of all these administrative actions: a renewed focus on critical infrastructure defense, supply chain security, DevSecOps and the zero-trust security model. As these initiatives trickle down from federal...
Virtual
Roundtable
Tuesday, October 26th, 2021
Dan Gunderman
Jerome Ferrara
Dan Gunderman with Jerome Ferrara
Virtual Roundtable
State of Hybrid Work: Why Credential Management Still Matters
Discussion topics will include:
With hybrid and remote work likely to continue well into 2022, CISOs and their teams are continuing to find the best ways to secure the credentials of employees who are accessing applications and devices from a variety of locations. At the same time, workers need ready access to the resources while lines of business managers seek out ways to reduce friction to allow for the most productivity.

Organizations need a holistic approach to credential and password management. In addition to...
Virtual
Roundtable
Tuesday, October 26th, 2021
Tom Kellermann
Tom Field
Tom Kellermann with Tom Field
Virtual Roundtable
Modern Bank Heists: What You Need to Know About the Latest Fraud Trends – and the Fraudsters
Discussion topics will include:
We are only halfway through 2021, but it’s already clear that financial fraud threats are trending far beyond traditional account takeover. Large banking institutions are no longer the only place where e-criminals can steal money. Any company that uses any type of online banking system (virtually 100% of companies) can be hacked via new routes including payment card fraud and synthetic IDs.

With so many emerging angles cybercriminals are taking, how do you ensure you have an omni-channel strategy to...
Virtual
Roundtable
Tuesday, October 26th, 2021
Anna Delaney
Martin Lee
Anna Delaney with Martin Lee
Virtual Roundtable
A New Approach to Endpoint Security
Discussion topics will include:
Today’s antivirus solutions can identify and block many types of malware easily. But how confident are you that your endpoint protection is detecting more stealthy techniques, such as malicious content hiding inside a legitimate piece of software which is then distributed through the update mechanism? In order to keep up with the criminals, a new approach to endpoint security is required.

How can you deploy endpoint protection on every system, making sure that the detection is actually enabled? How can...
Virtual
Roundtable
Thursday, October 21st, 2021
Timothée Bardet
Jean-Sébastien Milliere
Timothée Bardet with Jean-Sébastien Milliere
Virtual Roundtable
Quelles étapes clés pour mettre en place un SASE ?
Discussion topics will include:
Aujourd’hui, le plus grand défi pour les RSSI est de sécuriser tous les effectifs, qu’il s’agisse d’un bureau à domicile, d’une succursale traditionnelle, d’une succursale au sein d’un ERP ou d’une combinaison des trois. Comment dès lors fournir une “sécurité cohérente” pour chaque espace de travail ? Face à la nécessité de simplifier des solutions de sécurité de plus en plus complexes, les entreprises adoptent le service d’accès sécurisé Edge, ou SASE.

Quels sont les principaux facteurs qui empêchent les...
Virtual
Roundtable
Thursday, October 21st, 2021
Ivan Lai
Geetha Nandikotkur
Ivan Lai with Geetha Nandikotkur
Virtual Roundtable
Establishing a Risk-Based Approach to Authenticate and Authorize Identities
Discussion topics will include:
With Identity as the new perimeter and the distributed workforce using multiple devices during the pandemic, enterprises aspire to a well-orchestrated technology and tool that could offer well-defined authentication and authorization to secure user identities.

As a CISO, have you witnessed increased operational risks and security challenges in supporting your remote workforce? Are you able to provide the right user access, authentication, and control to the users accessing through multiple devices? Are you able to assess and adjust risk parameters...
Virtual
Roundtable
Wednesday, October 20th, 2021
Martyna Lubińska
Tom Field
Martyna Lubińska with Tom Field
Virtual Roundtable
Marching Orders: Understanding and Meeting the Biden Administration’s New Cybersecurity Standards
Discussion topics will include:
First there was President Biden’s cybersecurity executive order. Then came his Industrial Control System Cybersecurity Initiative. And most recently we’ve seen a new package of supply chain and critical infrastructure security plans launched in conjunction with a White House summit, including the nation’s top technology, financial services and infrastructure leaders.

The sum of all these administrative actions: a renewed focus on critical infrastructure defense, supply chain security, DevSecOps and the zero-trust security model. As these initiatives trickle down from federal...
Virtual
Roundtable
Wednesday, October 20th, 2021
Dan Gunderman
Wolf Goerlich
Dan Gunderman with Wolf Goerlich
Virtual Roundtable
Envisioning a Passwordless World
Discussion topics will include:
For almost all organizations, passwords are a necessary part of day-to-day work, but security leaders and CISOs know that passwords are the weak link in any security chain. Passwords are easily hacked or compromised by attackers, and trying to ensure that workers and employees follow basic cyber hygiene, including resetting passwords on a regular basis, is a nearly impossible task.

Organizations need a fresh approach, one that combines the best of how multifactor authentication works with technologies such as biometrics,...
Virtual
Roundtable
Wednesday, October 20th, 2021
Anna Delaney
Tom Davison
Anna Delaney with Tom Davison
Virtual Roundtable
How to Secure Remote Access: From Endpoint to Cloud
Discussion topics will include:
Cloud applications such as Office 365, Salesforce.com, ServiceNow, SAP, and others have become vital for any organization to operate and remain productive.

Compound this with managing corporate and mobile devices in a world where the network perimeter is being eroded and you have a real challenge on your hands.

Security professionals need a way to securely enable cloud access while maintaining visibility, control, and protecting corporate data. However, as the SolarWinds supply chain attacks recently illustrated, relying on native controls...
Virtual
Roundtable
Wednesday, October 20th, 2021
Anna Delaney
Richard Archdecon
Anna Delaney with Richard Archdecon
Virtual Roundtable
The Security Debt Crisis – How to Catch Up on Past Due Patches and Neglected Risk
Discussion topics will include:
There is a common theme for many of the mega breaches of recent years – a neglect of basic cybersecurity hygiene that has resulted in a backlog of unpatched apps, misapplied configurations and overlooked tasks. This debt compounds over time and, as with financial debt can snowball to reach a point, where it becomes insurmountable. As organizations become increasingly cloud first, the risk profile from security debt further increases.

So, what can be done to claw back control of security...
Vic & Anthony's Steakhouse
In-Person
Roundtable
Tuesday, October 19th, 2021
Vic & Anthony's Steakhouse
Tom Field
John Nowotny
Tom Field with John Nowotny
In-Person Roundtable
Why Security Programs Fail and What Can Be Done to Improve Cybersecurity
Discussion topics will include:
Each year, organizations spend billions on their security operations centers or security programs and sustain data breaches despite the investments they’ve made.

One study found that during the first three quarters of 2020, the total number of reported data breaches for the year was already approaching 3,000 and 36 billion records had been exposed.

These numbers show the failure of security programs to keep up with the threats that organizations are facing – and this will remain so as long...
Virtual
Roundtable
Tuesday, October 19th, 2021
Anna Delaney
Shashi Prakash
Anna Delaney with Shashi Prakash
Virtual Roundtable
Why Protecting Your Internet Attack Surface Matters More Than Ever
Discussion topics will include:
As organizations continue to increase their presence online every year, their internet attack surface continues to grow while becoming ever more complex to protect. This not only includes fraudsters creating fake domains to impersonate legitimate websites, but also increases in typosquatting attacks, trademark infringement and vendor email compromise schemes, which are a growing area of concern for the FBI.

For CISOs and their teams, protecting against these types of attacks and fraud is an ever-growing concern, especially when much of...
Virtual
Roundtable
Thursday, October 14th, 2021
Tom Field
Chip Witt
Tom Field with Chip Witt
Virtual Roundtable
Throw Away the Key(logger): Strategies for Protecting Users from Malware
Discussion topics will include:
Despite your team’s best efforts to protect corporate systems from malware, users tend to click before thinking. At work, corporate security software may catch wind of an illegitimate download before it causes much damage. On personal devices, however, your employees have fewer layers of protection – and the same goes for consumers using your services.

Botnets can provide criminals with a complete picture of your users’ online activity, making it easy for them to impersonate victims and take over even...
Virtual
Roundtable
Thursday, October 14th, 2021
Anna Delaney
Chris Finan
Anna Delaney with Chris Finan
Virtual Roundtable
MDR: Cybersecurity Essentials to Beat Ransomware
Discussion topics will include:
Ransomware cybercriminals are becoming increasingly sophisticated and organized, using techniques such as double and triple extortion, targeting vital infrastructure and teaming up with affiliate groups.

With the diversity and complexity of threats on the rise too, security teams find themselves drowning in data and overwhelmed by the immense volume of alerts, many of them false positives. How can organizations cut through the noise and accelerate incident detection and response times?

Register for this executive roundtable for new insights and discussion...
Virtual
Roundtable
Tuesday, October 12th, 2021
Tom Field
Victor Danevich
Tom Field with Victor Danevich
Virtual Roundtable
Defining and Securing Your 'Protect Surface'
Discussion topics will include:
The ‘Protect Surface’, coined by John Kindervag, is elemental to executing a Zero Trust strategy – the idea is that instead of trying to protect the entire attack surface which now extends throughout the Internet, identify your key assets and make sure they are segmented within a small protected area with strong authentication access rules and controls, such as:
Segmentation Gateway as a Next-Gen Firewall
Access Enforcement at the Gateway
Applying Multi-Factor Authentication

The enemy of securing the Protect Surface?...
Virtual
Roundtable
Tuesday, October 12th, 2021
Anna Delaney
Martyna Lubińska
Anna Delaney with Martyna Lubińska
Virtual Roundtable
Adopting the Attacker's Mindset to Protect The Hybrid Workforce
Discussion topics will include:
Our new hybrid workforce is an established reality and attackers no longer need to execute direct attacks, instead, they can now leverage the supply chain in order to accelerate and distribute.

What new tactics are criminals employing and how are they distributing attacks to take advantage of the hybrid model? What is being overlooked in our current defences? How are the attackers succeeding despite our defences?

Register for this executive roundtable for new insights and discussion about:
Defence strategies that...
Virtual
Roundtable
Thursday, October 7th, 2021
Aaron Cockerill
Scott Ferguson
Aaron Cockerill with Scott Ferguson
Virtual Roundtable
Throw Away the Key(logger): Strategies for Protecting Users from Malware
Discussion topics will include:
Despite your team’s best efforts to protect corporate systems from malware, users tend to click before thinking. At work, corporate security software may catch wind of an illegitimate download before it causes much damage. On personal devices, however, your employees have fewer layers of protection – and the same goes for consumers using your services.

Botnets can provide criminals with a complete picture of your users’ online activity, making it easy for them to impersonate victims and take over even...
Virtual
Roundtable
Wednesday, October 6th, 2021
Tom Field
Chris Pierson
Tom Field with Chris Pierson
Virtual Roundtable
ISMG Virtual Roundtable Discussion: US Finance
Discussion topics will include:
Senior leaders’ unified digital life mingling personal and professional data and devices has become the soft underbelly of corporate cybersecurity. Therefore, CEOs and their CISOs need to extend the defense perimeter and protect the entire digital lives of all executives and key personnel. Some statistics:

27% of executives have malware on their personal devices
20% of executives’ homes are digitally compromised
69% of executive’s personal passwords are on the Dark Web
75% have improper privacy and security settings on their...
Virtual
Roundtable
Tuesday, October 5th, 2021
Tom Field
Dawn Cappelli
Tom Field with Dawn Cappelli
Virtual Roundtable
ISMG Virtual Roundtable Discussion: US Infrastructure
Discussion topics will include:
First there was President Biden’s cybersecurity executive order. Then came his Industrial Control System Cybersecurity Initiative. And most recently we’ve seen a new package of supply chain and critical infrastructure security plans launched in conjunction with a White House summit including the nation’s top technology, financial services and infrastructure leaders.

The sum of all these administrative actions: a renewed focus on critical infrastructure defense, supply chain security, DevSecOps and the zero-trust security model. As these initiatives trickle down from federal...
Virtual
Roundtable
Tuesday, October 5th, 2021
Anna Delaney
Nuno Almeida Silva
Anna Delaney with Nuno Almeida Silva
Virtual Roundtable
ISMG Virtual Roundtable Discussion: EMEA Finance
Discussion topics will include:
The Digital Operational Resilience Act (DORA) will soon become reality in the European Union. This new EU Regulation will create a comprehensive and cross-sectional digital operational resilience framework across the EU-27 and its rules will apply for all regulated financial institutions. Compliance also includes the UK, despite Brexit.

Banks, fintech companies, insurance firms, and fund and wealth management companies will most likely be subject to deeper scrutiny and change in their processes. This will involve taking their cyber risk strategies...
Virtual
Roundtable
Thursday, September 30th, 2021
Aaron Cockerill
Tom Field
Aaron Cockerill with Tom Field
Virtual Roundtable
ISMG Virtual Roundtable Discussion: PacNW
Discussion topics will include:
The global reliance on cloud-based infrastructure and services that are accessible from any device, has prompted security teams to rethink the way they protect their organizations. To support this new and agile way of working, security leaders need to be able to balance end-user privacy with security to protect users and corporate data from phishing, malware, and other threats. At the same time, too little freedom causes employee dissatisfaction, reduced agility and collaboration.

How can you enable employees to be...
Virtual
Roundtable
Thursday, September 30th, 2021
Scott Ferguson
Wayne Lewandowski
Scott Ferguson with Wayne Lewandowski
Virtual Roundtable
ISMG Virtual Roundtable Discussion: S. Central US
Discussion topics will include:
For many organizations, digital transformation starts with adopting a cloud infrastructure or IaaS platform to support moving many of the basics a modern enterprise needs – such as compute, storage and networking – away from the data center. This helps save time and resources and allows an organization to focus on innovation.

Now, organizations are looking to invest more in other cloud-based services, such as SaaS applications to support hybrid work or various PaaS offerings that cloud service providers have...
Virtual
Roundtable
Thursday, September 30th, 2021
Anna Delaney
Richard Archdecon
Anna Delaney with Richard Archdecon
Virtual Roundtable
ISMG Virtual Roundtable Discussion: EMEA
Discussion topics will include:
There is a common theme for many of the mega breaches of recent years – a neglect of basic cybersecurity hygiene that has resulted in a backlog of unpatched apps, misapplied configurations and overlooked tasks. This debt compounds over time and, as with financial debt can snowball to reach a point, where it becomes insurmountable. As organizations become increasingly cloud first, the risk profile from security debt further increases.

So, what can be done to claw back control of security...
Virtual
Roundtable
Wednesday, September 29th, 2021
Aaron Cockerill
Scott Ferguson
Aaron Cockerill with Scott Ferguson
Virtual Roundtable
ISMG Virtual Roundtable Discussion: Northeast US
Discussion topics will include:
The global reliance on cloud-based infrastructure and services that are accessible from any device, has prompted security teams to rethink the way they protect their organizations. To support this new and agile way of working, security leaders need to be able to balance end-user privacy with security to protect users and corporate data from phishing, malware, and other threats. At the same time, too little freedom causes employee dissatisfaction, reduced agility and collaboration.

How can you enable employees to be...
Virtual
Roundtable
Wednesday, September 29th, 2021
Tom Field
Rick McElroy
Tom Field with Rick McElroy
Virtual Roundtable
ISMG Virtual Roundtable Discussion: US Healthcare
Discussion topics will include:
There has never been such a year for healthcare. Since the advent of the COVID-19 pandemic, healthcare entities globally have embraced cloud platforms and digital technologies to deliver telehealth products years ahead of schedule. “Healthcare from anywhere” is the new norm. The patient experience is the new competitive differentiator. And healthcare – more than ever before – is square in the adversaries’ crosshairs.

How has the healthcare attack surface shifted in the past year? What have cybersecurity leaders learned about...
Virtual
Roundtable
Wednesday, September 29th, 2021
Timothee Bardet
Jean-Sébastien Milliere
Timothee Bardet with Jean-Sébastien Milliere
Virtual Roundtable
Table Ronde Virtuelle France d'ISMG
Discussion topics will include:
L’année dernière ne restera pas seulement dans les mémoires comme l’année où les entreprises ont rapidement déplacé leurs applications en cloud et en SaaS pour assurer la continuité de leurs activités. Elle a également été marquée par une explosion d’événements de sécurité et de cyber incidents.

Alors que le mode de travail “à distance” est appelé à perdurer, comment assurer la sécurité de toutes les données et de tous les appareils de votre organisation, tout en tirant parti de votre...
Virtual
Roundtable
Tuesday, September 28th, 2021
Tom Field
Jeremy Snyder
Tom Field with Jeremy Snyder
Virtual Roundtable
ISMG Virtual Roundtable Discussion: UKI
Discussion topics will include:
The hybrid way of working is an established reality and one which has opened up a host of opportunities for criminals. Attackers no longer need to execute direct attacks, using attack vectors targeted straight at systems or at individuals. They can now take advantage of the supply chain in order to spread out the attacks elsewhere. In this new reality, you have to think like the attacker to avoid being the next victim.

What new tactics are criminals employing and...
Virtual
Roundtable
Tuesday, September 28th, 2021
Tom Field
Jeremy Snyder
Tom Field with Jeremy Snyder
Virtual Roundtable
ISMG Executive Roundtable Discussion: Nordics
Discussion topics will include:
Whether by circumstance or design, your enterprise has shifted some infrastructure and/or services to the cloud, and you’re planning even more migration in 2022. It takes a different mindset and skills to secure cloud environments vs. on-premise. But how do you develop a working roadmap for secure cloud migration? How do you know where you’re beginning and where you should go next?

Register for this executive roundtable to gain key insights about secure cloud migration and to discuss with your...

Information Security Media Group Brands

ISMG’s 30 global media properties provide security professionals with industry and geo-specific news, research and educational events.