Detection and Response: Closing Gaps that Adversaries Exploit
 Protecting Your Brand from Impersonation Scams
The Many Benefits of Security Automation
Practical Steps to Security Management: Accelerating Your Response  Mechanism
Email Security: Changing the Game Against Game-Changing Attacks?
Software Security: How to Prioritize, Measure and Convey it to the Board
Zero Trust and SASE: Embracing Today's Workforce Security Solutions for the Financial Sector
How to Modernize Your SOC (Without Blowing it Up)
How to Modernize Your SOC (Without Blowing it Up)
Fast-Moving Financial Fraud: How Well-Protected is Your Financial Institution?
Are You Prepared for Attack Surface Management v2.0?
Measuring the Maturity of Your Cloud Security Program
Securing Hybrid Work Environments - The Need for a New Approach
Modernising Data Security in a Hybrid Cloud World
Retail Security in a Time of Digital Transformation
Managing Risk Outside Your Four Walls: Strategies for Protecting Your External Attack Surface
Advancing Threat Intel to Learn the Adversary's Next Move
Better Understanding Cloud Security Risks Through ‘Context’
Steps to Reducing Ransomware Risk in a Cloud-First World
Email Security: Changing the Game Against Game-Changing Attacks?
Using CIAM to Disrupt the Economics of Attackers
How Malware Helps Bad Actors Get Away with Online Fraud (and What Enterprises Can Do About It)
Cybersecurity Executive Order: One Year Later
Steps to Reducing Ransomware Risk in a Cloud-First World
Software Supply Chains: A Look into the Future
Email Security: Changing the Game Against Game-Changing Attacks?
Steps to Reducing Ransomware Risk in a Cloud-First World
How to Modernize Your SOC (Without Blowing it Up)
Are You Prepared for Attack Surface Management v2.0?
Are You Prepared for Attack Surface Management v2.0?
Retail Sector: Eliminating Bad Bots Without Causing Customer Friction
Better Understanding Cloud Security Risks Through ‘Context’
Steps to Reducing Ransomware Risk in a Cloud-First World
How Malware Helps Bad Actors Get Away with Online Fraud (and What Enterprises Can Do About It)
Upcoming Roundtables
Virtual
Roundtable
Wednesday, July 6th, 2022
Jeremy Kirk
Fabio Fratucello
Jeremy Kirk with Fabio Fratucello
Virtual Roundtable
Detection and Response: Closing Gaps that Adversaries Exploit
Discussion topics will include:
Adversaries are continually exploiting organisations faster than ever. The time between an adversary gaining access to a system to launching an attack is now coming down to just minutes. If defence teams miss an alert or an automated defensive response doesn't take place, it could result in an adversary making a successful breach or a ransomware attack.

Security technologies are an alphabet soup. XDR, or extended detection and response, is one of the latest acronyms. But what does XDR mean,...
Virtual
Roundtable
Wednesday, July 6th, 2022
Anna Delaney
Malcolm Murphy
Anna Delaney with Malcolm Murphy
Virtual Roundtable
Protecting Your Brand from Impersonation Scams
Discussion topics will include:
Retail scams, business email compromise, supply chain impersonation, and money mule recruitment campaigns are just a few of the types of brand exploitation attacks targeting businesses with an online presence.

Frost & Sullivan’s Global State of Online Digital Trust reports that 78% of consumers indicate that it’s crucial that their personal information be protected online, and 48% have stopped using an online service when it’s subject to a breach. How are you protecting your brand from sophisticated social engineering techniques?...
Virtual
Roundtable
Wednesday, July 6th, 2022
Tom Field
Michael Lyborg
Tom Field with Michael Lyborg
Virtual Roundtable
The Many Benefits of Security Automation
Discussion topics will include:
With cyberattacks on the rise and fears of international escalation in cyberspace, security teams are actively working to bolster defense. But with the prevalence of security rising, the gulf between today's workforce and its needs is vast. This leaves CISOs under-resourced and analysts in the SOC spread thin. Enter "Security Orchestration, Automation, and Response," or SOAR, tools.

Without automated tools to centralize event data and improve incident response, tasks delegated to "humans" can get tedious and overwhelming – causing a...
Conrad Bengaluru,25/3, Kensington Rd, Ulsoor, Bengaluru, 560008
In-Person
Roundtable
Thursday, July 7th, 2022
Conrad Bengaluru,25/3, Kensington Rd, Ulsoor, Bengaluru, 560008
Geetha  Nandikotkur
Murali  Urs
Geetha Nandikotkur with Murali Urs
In-Person Roundtable
Practical Steps to Security Management: Accelerating Your Response Mechanism
Discussion topics will include:
As organizations become vulnerable to threats and attacks, the big question is how to accelerate their incident response mechanism by effectively managing their security and controls.

The concerns are justified because the average volume of attacks and breaches has increased rapidly, with the bad guys creating significant business loss, downtime, and the cost of response going up.

The significant challenge for CISOs is to monitor their alerts in real-time and take appropriate action based on defined policies, an effective risk...
Virtual
Roundtable
Thursday, July 7th, 2022
Tom Field
Mike Britton
Tom Field with Mike Britton
Virtual Roundtable
Email Security: Changing the Game Against Game-Changing Attacks?
Discussion topics will include:
Phishing. Business email compromise. Executive impersonation. Ransomware. Today's email-borne threats are sophisticated, targeted and come at a relentless scale. There’s little denying that they are game-changing.

But can you say the same about your email defenses? Is email security the priority it should be for your enterprise, or are you trying to counter 2022 attacks with 2012 defenses? How do you hope to upgrade your defenses, and what will it take to obtain the resources you need?

Join this session,...
New York City - Convene
In
Person Roundtable
Tuesday, July 12th, 2022
New York City - Convene
Tom Field
Chris Eng
Tom Field with Chris Eng
In Person Roundtable
Software Security: How to Prioritize, Measure and Convey it to the Board
Discussion topics will include:
Amidst the shifting threat landscape in the healthcare sector, cloud migration and ongoing digital transformation, software security is often low or even last on the list of priorities for security leaders to address.
Yet, with the 2021 presidential executive order on cybersecurity, and as headlines continue to feature high-profile breaches, board members at healthcare organizations - and across all industries - are taking notice. Even though there are often designated technical experts on boards, there is now an increased awareness...
Virtual
Roundtable
Tuesday, July 12th, 2022
Jason Georgi
Danielle Syvertsen
Jason Georgi with Danielle Syvertsen
Virtual Roundtable
Zero Trust and SASE: Embracing Today's Workforce Security Solutions for the Financial Sector
Discussion topics will include:
Zero Trust and Secure Access Service Edge allow Financial Services enterprises to leave behind the challenges of legacy security approaches, secure their systems and support innovative and competitive ways of working.

But new strategies come with the need for new skills and tools. How is your FinServ organization embracing Zero Trust, cloud migration and SASE against competing priorities? How are you balancing in-house and outsourced resources to manage your transformation? What security gaps are evident as you secure this here-to-stay...
Virtual
Roundtable
Wednesday, July 13th, 2022
Rick McElroy
Tom  Field
Rick McElroy with Tom Field
Virtual Roundtable
How to Modernize Your SOC (Without Blowing it Up)
Discussion topics will include:
The problems are staring at you: A broader potential attack surface than you've ever had before; more alerts than your systems and staff can monitor, never mind act upon; and recruiting & retaining SOC analysts are harder than ever.

But knowing you need to modernize your SOC is one thing; doing it is quite another. How do you upgrade without a complete rip and replace? How do you gain not just the visibility you need across disparate environments, but context...
The Palm Beverly Hills
In-Person
Roundtable
Thursday, July 14th, 2022
The Palm Beverly Hills
Rick McElroy
Tom  Field
Rick McElroy with Tom Field
In-Person Roundtable
How to Modernize Your SOC (Without Blowing it Up)
Discussion topics will include:
The problems are staring at you: A broader potential attack surface than you've ever had before; more alerts than your systems and staff can monitor, never mind act upon; and recruiting & retaining SOC analysts are harder than ever.

But knowing you need to modernize your SOC is one thing; doing it is quite another. How do you upgrade without a complete rip and replace? How do you gain not just the visibility you need across disparate environments, but context...
Villa Merton
Virtual
Roundtable
Tuesday, July 19th, 2022
Villa Merton
Iain Swaine
Christian Pyrros
Iain Swaine with Christian Pyrros
Virtual Roundtable
Fast-Moving Financial Fraud: How Well-Protected is Your Financial Institution?
Discussion topics will include:
Global financial markets are at a historical turning point. While headlines are talking about Covid-19, crypto-currencies and QE, threat actors are working smarter to execute attacks. You already know the diversity of threats: from state-sponsored cyber gangs, quants in collapsed countries, or brooding black swans, it’s tough to stay protected. But with the coexistence of ‘traditional’ online banking fraud and more advanced social engineering, the need to gain deeper visibility into risk is now greater than before.

Register for this...
Virtual
Roundtable
Tuesday, July 19th, 2022
Anna Delaney
Brad LaPorte
Anna Delaney with Brad LaPorte
Virtual Roundtable
Are You Prepared for Attack Surface Management v2.0?
Discussion topics will include:
Among the lessons learned from the Log4j zero-day: Your enterprise's attack surface is no longer stopping at your ‘four walls.’ In fact according to a recent survey by Anchore, over half of the companies surveyed were targeted by software supply chain attacks in 2021.

The term "attack surface management" was coined by former Gartner analyst Brad LaPorte in 2019. But in 2022, enterprises need to embrace what LaPorte calls Attack Surface Management c2.0 - where with one well-integrated tool, security...
Morton's The Steakhouse – Wacker Place
In
Person Roundtable
Tuesday, July 19th, 2022
Morton's The Steakhouse – Wacker Place
Jonathan  Trull
Tom Field
Jonathan Trull with Tom Field
In Person Roundtable
Measuring the Maturity of Your Cloud Security Program
Discussion topics will include:
Amidst the accelerated digital transformation of the past two years, enterprises across sectors have gone from dipping their toes in the cloud to being fully immersed in multi-cloud environments. At the same time, they've encountered the reality: Security in the cloud is a different animal, and it requires unique skills.

What does cloud security maturity look like? Where is your organization on the road to maturity? How do you measure progress - and gain access to the right talent?

Register...
Virtual
Roundtable
Wednesday, July 20th, 2022
Brian Pereira
Denis Donnelly
Brian Pereira with Denis Donnelly
Virtual Roundtable
Securing Hybrid Work Environments - The Need for a New Approach
Discussion topics will include:
Hybrid work locations are becoming permanent for many organizations. These hybrid models continue to present many challenges. How does one secure the remote workforce with ever increasing successful attacks, an expanding attack surface, and impact? How do you collate ever more security data from scattered endpoints and then harness it for threat detection?

Traditional security solutions will not suffice to do this. Attackers are thinking different and so must organizations.

A new generation of cloud-based threat intelligence solutions will be...
London (Venue TBD)
In
Person Roundtable
Wednesday, July 20th, 2022
London (Venue TBD)
Tony Morbin
Bruce Hogg
Tony Morbin with Bruce Hogg
In Person Roundtable
Modernising Data Security in a Hybrid Cloud World
Discussion topics will include:
The rapid adoption of hybrid cloud and multicloud services, along with an increasing number of cloud infrastructure and platform services, has created an explosion in complexity and concerns about data security and cloud compliance.

Common challenges for organizations include; a lack of visibility and decentralized governance across public multicloud, a lack of internal consensus about how cloud compliance should be handled and the inability to get real-time, accurate and actionable insights to detect and respond to threats.

Moreover, noncompliance with...
Virtual
Roundtable
Wednesday, July 20th, 2022
Tom Field
David Balcar
Tom Field with David Balcar
Virtual Roundtable
Retail Security in a Time of Digital Transformation
Discussion topics will include:
With scores of active accounts, deep PII and stacks of legacy technology, the retail and hospitality industries remain top targets for cyber criminals. The accelerated digital transformation has also fueled new fraud attempts on point of sale systems, payment card accounts and third-party suppliers.

How has the retail/hospitality attack surface shifted in the past year? What have cybersecurity leaders learned about protecting card transactions and point of sale systems? What supply chain lessons must be learned from the SolarWinds breach?...
Wednesday, July 20th, 2022
Tom Field
Shashi  Prakash
Tom Field with Shashi Prakash
Managing Risk Outside Your Four Walls: Strategies for Protecting Your External Attack Surface
Discussion topics will include:
Security practitioners are increasingly put to task to address threats and risks occurring outside the traditional four walls of the enterprise. Referred to as a company’s external attack surface, it comprises typosquat domains; fake websites, apps, and ads; counterfeit sales; email compromise; and social media fraud.

And with technology stacks piling high, security teams are increasingly looking for efficient engines that can detect and act against these external activities in real time - including scams propagated through multiple platforms and...
Virtual
Roundtable
Thursday, July 21st, 2022
Anna Delaney
Briana Farro
Anna Delaney with Briana Farro
Virtual Roundtable
Advancing Threat Intel to Learn the Adversary's Next Move
Discussion topics will include:
As cybercriminals continue to target organizations with ransomware, API and DDoS attacks, security professionals are under constant pressure to become highly competent not just in threat prevention, but in detection and response. However they often struggle to understand threats and translate them into actionable countermeasures.

High quality defensive knowledge is scarce, and adversaries continue to take advantage of weak points including misconfigured defenses, poor security architectures, and excessive privileges, further reducing the value of investment in security solutions.

Register for...
Ruth's Chris Steakhouse Uptown
In-Person
Roundtable
Thursday, July 21st, 2022
Ruth's Chris Steakhouse Uptown
Andy Ellis
Tom Field
Andy Ellis with Tom Field
In-Person Roundtable
Better Understanding Cloud Security Risks Through ‘Context’
Discussion topics will include:
In just a few years, cloud conversations have gone from theoretical to critical. And with migrations to the cloud ongoing, many enterprises have had to rethink their security approach. In these environments, some practitioners are charged with expending resources to mitigate “high-severity” CVEs – regardless of how a vulnerability may interact with that IT environment. This risk may pale in comparison, for example, to a malware occurrence at the edge that goes unchecked.

A potential lack of visibility into apps,...
Virtual
Roundtable
Wednesday, July 27th, 2022
Jeremy Kirk
Tyler Croak
Jeremy Kirk with Tyler Croak
Virtual Roundtable
Steps to Reducing Ransomware Risk in a Cloud-First World
Discussion topics will include:
In 2021, a debilitating ransomware attack on Colonial Pipeline's IT systems caused both a physical response – the shutdown of the pipeline – and a hefty financial one, with the company paying more than $4 million ransom to restore data. After other high-profile attacks and a whole-of-government emphasis on mitigation in the U.S., it became apparent that ransomware is indeed a national security concern that can cut through every area of an enterprise.

Although there have been periods of relative...
Virtual
Roundtable
Tuesday, August 2nd, 2022
Mike Britton
Anna Delaney
Mike Britton with Anna Delaney
Virtual Roundtable
Email Security: Changing the Game Against Game-Changing Attacks?
Discussion topics will include:
Phishing. Business email compromise. Executive impersonation. Ransomware. Today's email-borne threats are sophisticated, targeted and come at a relentless scale. There’s little denying that they are game-changing.

But can you say the same about your email defenses? Is email security the priority it should be for your enterprise, or are you trying to counter 2022 attacks with 2012 defenses? How do you hope to upgrade your defenses, and what will it take to obtain the resources you need?

Join this session,...
Canada
Virtual
Roundtable
Wednesday, August 3rd, 2022
Canada
Jameeka Green Aaron
Tony Morbin
Jameeka Green Aaron with Tony Morbin
Virtual Roundtable
Using CIAM to Disrupt the Economics of Attackers
Discussion topics will include:
Deception for crime or warfare is an established tactic used by attackers, probably as old as humanity. Even in today’s online world, fake and stolen identity are primary routes for attackers to gain unauthorized access to an organization's digital assets, networks, or systems. In fact a recent report found that 79% of organizations have experienced an identity-related security breach in the last two years.

Reliably establishing and authenticating the identities of those we choose to trust online enables us to...
Dallas, TX (Venue TBD)
In-Person
Roundtable
Thursday, August 11th, 2022
Dallas, TX (Venue TBD)
Tom Field
Chip Witt
Tom Field with Chip Witt
In-Person Roundtable
How Malware Helps Bad Actors Get Away with Online Fraud (and What Enterprises Can Do About It)
Discussion topics will include:
Despite your team’s best efforts to defend against cyberattacks, organizations often lack visibility into when employees and consumers fall victim to the most nefarious type of attack - malware infections. Malware-stolen data is highly valuable to bad actors and is a gateway for them to commit fraud and infiltrate corporate networks.

When your users are affected by malware, it’s too late. Once a botnet is installed (like the infamous RedLine Stealer), cybercriminals have already started to siphon critical information such...
Virtual
Roundtable
Tuesday, August 16th, 2022
Tom Field
Sean Frazier
Tom Field with Sean Frazier
Virtual Roundtable
Cybersecurity Executive Order: One Year Later
Discussion topics will include:
The Executive Order on Improving the Nation’s Cybersecurity was groundbreaking. Signed last May, it mandated Zero Trust adoption across the government and recognized the importance of cloud adoption, cyber best practices, software supply chain integrity, and high-quality code.

Following several deadlines to date - in NIST defining critical software, the NTIA outlining minimum SBOM standards and more - agencies continue to move away from outdated security practices and toward new standards to, in turn, reduce vulnerabilities, boost cyber resilience, and...
Virtual
Roundtable
Wednesday, August 17th, 2022
Tom Field
Tyler Croak
Tom Field with Tyler Croak
Virtual Roundtable
Steps to Reducing Ransomware Risk in a Cloud-First World
Discussion topics will include:
In 2021, a debilitating ransomware attack on Colonial Pipeline's IT systems caused both a physical response – the shutdown of the pipeline – and a hefty financial one, with the company paying more than $4 million ransom to restore data. After other high-profile attacks and a whole-of-government emphasis on mitigation in the U.S., it became apparent that ransomware is indeed a national security concern that can cut through every area of an enterprise.

Although there have been periods of relative...
Ruth's Chris Steak House Minneapolis
In-Person
Roundtable
Tuesday, August 23rd, 2022
Ruth's Chris Steak House Minneapolis
Tom Field
Andrew Yorra
Tom Field with Andrew Yorra
In-Person Roundtable
Software Supply Chains: A Look into the Future
Discussion topics will include:
If you thought 2021 was the year of the software supply chain, just wait until you see what unfolds in 2022.

Massive exploits such as the recent Log4j/Log4shell vulnerability are a sign that best practices are still evolving, and the risk of mismanaging, or worse, ignoring open source vulnerabilities, is only becoming greater. And with even the President of the U.S. calling out the need for software bills of materials, it’s time to kick up the gear on open source...
Virtual
Roundtable
Thursday, September 8th, 2022
Mike Britton
Anna Delaney
Mike Britton with Anna Delaney
Virtual Roundtable
Email Security: Changing the Game Against Game-Changing Attacks?
Discussion topics will include:
Phishing. Business email compromise. Executive impersonation. Ransomware. Today's email-borne threats are sophisticated, targeted and come at a relentless scale. There’s little denying that they are game-changing.

But can you say the same about your email defenses? Is email security the priority it should be for your enterprise, or are you trying to counter 2022 attacks with 2012 defenses? How do you hope to upgrade your defenses, and what will it take to obtain the resources you need?

Join this session,...
Virtual
Roundtable
Wednesday, September 14th, 2022
Dan Gunderman
Tyler Croak
Dan Gunderman with Tyler Croak
Virtual Roundtable
Steps to Reducing Ransomware Risk in a Cloud-First World
Discussion topics will include:
In 2021, a debilitating ransomware attack on Colonial Pipeline's IT systems caused both a physical response – the shutdown of the pipeline – and a hefty financial one, with the company paying more than $4 million ransom to restore data. After other high-profile attacks and a whole-of-government emphasis on mitigation in the U.S., it became apparent that ransomware is indeed a national security concern that can cut through every area of an enterprise.

Although there have been periods of relative...
NYC (Venue TBD)
In-Person
Roundtable
Thursday, September 15th, 2022
NYC (Venue TBD)
Rick McElroy
Tom  Field
Rick McElroy with Tom Field
In-Person Roundtable
How to Modernize Your SOC (Without Blowing it Up)
Discussion topics will include:
The problems are staring at you: A broader potential attack surface than you've ever had before; more alerts than your systems and staff can monitor, never mind act upon; and recruiting & retaining SOC analysts are harder than ever.

But knowing you need to modernize your SOC is one thing; doing it is quite another. How do you upgrade without a complete rip and replace? How do you gain not just the visibility you need across disparate environments, but context...
Virtual
Roundtable
Thursday, September 22nd, 2022
Brad LaPorte
Tom Field
Brad LaPorte with Tom Field
Virtual Roundtable
Are You Prepared for Attack Surface Management v2.0?
Discussion topics will include:
Among the lessons learned from the Log4j zero-day: Your enterprise's attack surface is no longer stopping at your ‘four walls.’ In fact according to a recent survey by Anchore, over half of the companies surveyed were targeted by software supply chain attacks in 2021.

The term "attack surface management" was coined by former Gartner analyst Brad LaPorte in 2019. But in 2022, enterprises need to embrace what LaPorte calls Attack Surface Management c2.0 - where with one well-integrated tool, security...
Virtual
Virtual
Roundtable
Tuesday, September 27th, 2022
Virtual
Anna Delaney
Brad LaPorte
Anna Delaney with Brad LaPorte
Virtual Roundtable
Are You Prepared for Attack Surface Management v2.0?
Discussion topics will include:
Among the lessons learned from the Log4j zero-day: Your enterprise's attack surface is no longer stopping at your ‘four walls.’ In fact according to a recent survey by Anchore, over half of the companies surveyed were targeted by software supply chain attacks in 2021.

The term "attack surface management" was coined by former Gartner analyst Brad LaPorte in 2019. But in 2022, enterprises need to embrace what LaPorte calls Attack Surface Management c2.0 - where with one well-integrated tool, security...
London, UK
In-Person
Roundtable
Thursday, September 29th, 2022
London, UK
Anna Delaney
Jay Coley
Anna Delaney with Jay Coley
In-Person Roundtable
Retail Sector: Eliminating Bad Bots Without Causing Customer Friction
Discussion topics will include:
Malicious bots are a growing problem for digital businesses. Your network and data can be properly secured, but your business is still vulnerable if you can’t see and stop the bad bots before they disrupt operations and commit fraud. The financial consequences can be devastating leading to disruption, fines and reputational damage. But, how do you ensure security measures are effective in stopping bots or malicious actors without causing friction for legitimate customers?

Discussion topics will include:
Differentiating legitimate bots...
NYC (Venue TBD)
In-Person
Roundtable
Tuesday, October 18th, 2022
NYC (Venue TBD)
Andy Ellis
Tom Field
Andy Ellis with Tom Field
In-Person Roundtable
Better Understanding Cloud Security Risks Through ‘Context’
Discussion topics will include:
In just a few years, cloud conversations have gone from theoretical to critical. And with migrations to the cloud ongoing, many enterprises have had to rethink their security approach. In these environments, some practitioners are charged with expending resources to mitigate “high-severity” CVEs – regardless of how a vulnerability may interact with that IT environment. This risk may pale in comparison, for example, to a malware occurrence at the edge that goes unchecked.

A potential lack of visibility into apps,...
Virtual
Roundtable
Wednesday, October 26th, 2022
Dan Gunderman
Tyler Croak
Dan Gunderman with Tyler Croak
Virtual Roundtable
Steps to Reducing Ransomware Risk in a Cloud-First World
Discussion topics will include:
In 2021, a debilitating ransomware attack on Colonial Pipeline's IT systems caused both a physical response – the shutdown of the pipeline – and a hefty financial one, with the company paying more than $4 million ransom to restore data. After other high-profile attacks and a whole-of-government emphasis on mitigation in the U.S., it became apparent that ransomware is indeed a national security concern that can cut through every area of an enterprise.

Although there have been periods of relative...
San Francisco, CA (Venue TBD)
In-Person
Roundtable
Wednesday, November 2nd, 2022
San Francisco, CA (Venue TBD)
Tom Field
Chip Witt
Tom Field with Chip Witt
In-Person Roundtable
How Malware Helps Bad Actors Get Away with Online Fraud (and What Enterprises Can Do About It)
Discussion topics will include:
Despite your team’s best efforts to defend against cyberattacks, organizations often lack visibility into when employees and consumers fall victim to the most nefarious type of attack - malware infections. Malware-stolen data is highly valuable to bad actors and is a gateway for them to commit fraud and infiltrate corporate networks.

When your users are affected by malware, it’s too late. Once a botnet is installed (like the infamous RedLine Stealer), cybercriminals have already started to siphon critical information such...
Past Roundtables
Virtual
Virtual
Roundtable
Thursday, June 30th, 2022
Virtual
Barret Kaubisch
Tom Field
Barret Kaubisch with Tom Field
Virtual Roundtable
Strategies to Catch Synthetic ID Fraud
Discussion topics will include:
Synthetic identity fraud — where criminals use a combination of real and fake information to create a fictitious identity and then open counterfeit accounts to make fraudulent purchases — costs banks $6 billion dollars annually and is one of the fastest growing types of financial crime in the U.S., according to the FBI.

Traditional fraud tools that were designed to capture stolen identities do not serve well in solving synthetic identity problems. Unlike stolen identity information, where fraudsters act quickly...
Virtual
Virtual
Roundtable
Thursday, June 30th, 2022
Virtual
Chris Campbell
Mathew Schwartz
Chris Campbell with Mathew Schwartz
Virtual Roundtable
Microsegmentation: Best Practices for Blocking and Containing Breaches in Financial Services
Discussion topics will include:
Running an effective cybersecurity program doesn't just require hoping for the best, but planning for the worst. Despite an organisation's best efforts, attackers nevertheless manage to breach their defenses and steal regulated customer data, unleash crypto-locking malware and more.

Organisations in the financial services sector have been looking to protect their network by reducing the attack surface, containing the impact of an intrusion and stopping lateral movement. The way to achieve these goals is through software-defined microsegmentation.

How can organisations...
Virtual
Roundtable
Tuesday, June 28th, 2022
Jameeka Green Aaron
Tony Morbin
Jameeka Green Aaron with Tony Morbin
Virtual Roundtable
Using CIAM to Disrupt the Economics of Attackers
Discussion topics will include:
Deception for crime or warfare is an established tactic used by attackers, probably as old as humanity. Even in today’s online world, fake and stolen identity are primary routes for attackers to gain unauthorized access to an organization's digital assets, networks, or systems. In fact a recent report found that 79% of organizations have experienced an identity-related security breach in the last two years.

Reliably establishing and authenticating the identities of those we choose to trust online enables us to...
Amsterdam - Venue TBA
In
Person Roundtable
Tuesday, June 28th, 2022
Amsterdam - Venue TBA
Paul Horton
Mathew Schwartz
Paul Horton with Mathew Schwartz
In Person Roundtable
Software Supply Chains: A Look into the Future
Discussion topics will include:
Massive exploits such as the recent Log4j/Log4shell vulnerability are a sign that best practices are still evolving, and the risk of mismanaging, or worse, ignoring open source vulnerabilities, is only becoming greater. It’s time to kick up the gear on open source and software supply chain management conversations.

Join us for an engaging, round-table conversation on what we need to know about managing open source and software supply chains in 2022.

Register for this executive roundtable, Software Supply Chains: A...
Virtual
Roundtable
Tuesday, June 28th, 2022
Anna Delaney
Keiron Holyome
Anna Delaney with Keiron Holyome
Virtual Roundtable
New Strategies for Readiness, Response, Recovery
Discussion topics will include:
Whether it's Log4j, SolarWinds or rising geopolitical tensions, anticipating cyber incidents has never been more challenging. The need for security leaders to demonstrate "cyber readiness" to the executive board is now crucial.

A useful tool to follow is the NIST Cybersecurity Framework but too often security teams prioritize the "identify", "protect", and "detect" functions, over "respond" and recover". Shifting greater focus to response and recovery will not only highlight vulnerabilities to the executive but also help increase funding across all...
Virtual
Roundtable
Thursday, June 23rd, 2022
Iain Swaine
Christian Pyrros
Iain Swaine with Christian Pyrros
Virtual Roundtable
Fast-Moving Financial Fraud: How Well-Protected is Your Financial Institution?
Discussion topics will include:
Global financial markets are at a historical turning point. While headlines are talking about Covid-19, crypto-currencies and QE, threat actors are working smarter to execute attacks. You already know the diversity of threats: from state-sponsored cyber gangs, quants in collapsed countries, or brooding black swans, it’s tough to stay protected. But with the coexistence of ‘traditional’ online banking fraud and more advanced social engineering, the need to gain deeper visibility into risk is now greater than before.

Register for this...
Virtual
Roundtable
Wednesday, June 22nd, 2022
Stephen Boyer
Anna Delaney
Stephen Boyer with Anna Delaney
Virtual Roundtable
Drive Accountability with Cyber Risk Governance
Discussion topics will include:
Cyber risk governance defines how an organization plans to protect itself from cyber events and threats. Governance describes the process for how to build a cybersecurity program, but doesn’t necessarily inform the effectiveness of your programs and policies. Without uniform performance targets defined in the governance policies, security leaders won’t know if their security controls are performing to their standards or if they’re within the bounds of their risk appetite.

To stay cyber resilient, forward-thinking security leaders need to measure...
Sofitel Hotel | Bandra Kurla Complex, Bandra East, Mumbai
In-Person
Roundtable
Wednesday, June 22nd, 2022
Sofitel Hotel | Bandra Kurla Complex, Bandra East, Mumbai
Geetha  Nandikotkur
Murali  Urs
Geetha Nandikotkur with Murali Urs
In-Person Roundtable
Practical Steps to Security Management: Accelerating Your Response Mechanism
Discussion topics will include:
As organizations become vulnerable to threats and attacks, the big question is how to accelerate their incident response mechanism by effectively managing their security and controls.

The concerns are justified because the average volume of attacks and breaches has increased rapidly, with the bad guys creating significant business loss, downtime, and the cost of response going up.

The significant challenge for CISOs is to monitor their alerts in real-time and take appropriate action based on defined policies, an effective risk...
NYC (Venue TBD)
In
Person Roundtable
Tuesday, June 21st, 2022
NYC (Venue TBD)
Tom Field
Chris Wysopal
Tom Field with Chris Wysopal
In Person Roundtable
Software Security: How to Prioritize, Measure and Convey It To the Board
Discussion topics will include:
Amidst the shifting threat landscape, cloud migration and ongoing digital transformation, software security is often low or even last on the list of priorities for security leaders to address.

Yet, with the recent executive order on cybersecurity, and as headlines continue to feature high-profile breaches, board members at organizations across all industries are taking notice. Even though there are often designated technical experts on boards, there is now an increased awareness around cybersecurity – especially software security – even among...
Virtual
Virtual
Roundtable
Tuesday, June 21st, 2022
Virtual
Fernando  Maymi
Tony Morbin
Fernando Maymi with Tony Morbin
Virtual Roundtable
Collective Defense: How to Secure the Finance Sector through Collaboration in Cybersecurity
Discussion topics will include:
When it comes to cybersecurity, financial firms often face limited visibility of unknown cyber threats (especially in today’s new hybrid work environments), insider threats, the ongoing skills shortage, and a high volume of attacks with the financial sector facing the most of any sector.
How can the finance sector raise its security posture by collaborating in real time — without any one firm losing its competitive edge? What are the barriers to threat exchange, and how can they be removed...
Convene NYC
In-Person
Roundtable
Tuesday, June 21st, 2022
Convene NYC
Tom Field
Chip Witt
Tom Field with Chip Witt
In-Person Roundtable
How Malware Helps Bad Actors Get Away with Online Fraud (and What Enterprises Can Do About It)
Discussion topics will include:
Despite your team’s best efforts to defend against cyberattacks, organizations often lack visibility into when employees and consumers fall victim to the most nefarious type of attack - malware infections. Malware-stolen data is highly valuable to bad actors and is a gateway for them to commit fraud and infiltrate corporate networks.

When your users are affected by malware, it’s too late. Once a botnet is installed (like the infamous RedLine Stealer), cybercriminals have already started to siphon critical information such...
Convene NYC
In-Person
Roundtable
Tuesday, June 21st, 2022
Convene NYC
Terry McGraw
Anna Delaney
Terry McGraw with Anna Delaney
In-Person Roundtable
Incident Response: Are You Prepared for Your Organization's Worst Day?
Discussion topics will include:
It could be ransomware, DDoS, a zero day such as Log4j or a supply chain attack similar to SolarWinds. You know it's not "if," it's "when does the next cyberattack strike?" And how prepared is your organization to respond to what invariably will be its worst day?

So much goes into preparation: What controls do you have in place for detection and response? Do you have the right people in place - and have they been drilled? Do you know...
Virtual
Roundtable
Thursday, June 16th, 2022
Andy Ellis
Anna Delaney
Andy Ellis with Anna Delaney
Virtual Roundtable
Better Understanding Cloud Security Risks Through ‘Context’
Discussion topics will include:
In just a few years, cloud conversations have gone from theoretical to critical. And with migrations to the cloud ongoing, many enterprises have had to rethink their security approach. In these environments, some practitioners are charged with expending resources to mitigate “high-severity” CVEs – regardless of how a vulnerability may interact with that IT environment. This risk may pale in comparison, for example, to a malware occurrence at the edge that goes unchecked.

A potential lack of visibility into apps,...
Grand Hyatt Singapore, 10 Scotts Rd, Singapore 228211
In-Person
Roundtable
Thursday, June 16th, 2022
Grand Hyatt Singapore, 10 Scotts Rd, Singapore 228211
Suparna Goswami
Felix Lam
Suparna Goswami with Felix Lam
In-Person Roundtable
Taking a Platform Approach to Reinvent Security for Today's Flexible Workforce
Discussion topics will include:
The transition to hybrid work has brought into sharp focus the challenges of connecting between people, devices, and data that are ever-expanding. Enterprises are looking for consistency for security and quality of experience regardless of an end-user’s location. The key is to simplify security, streamline policy enforcement and increase threat protection by combining multiple functions into a single, cloud-native service. But this needs to be done in a way that enables organisations of all sizes to deliver customer and employee...
Virtual
Roundtable
Wednesday, June 15th, 2022
Shashi Prakash
Tom Field
Shashi Prakash with Tom Field
Virtual Roundtable
Managing Risk Outside Your Four Walls: Strategies for Protecting Your External Attack Surface
Discussion topics will include:
Security practitioners are increasingly put to task to address threats and risks occurring outside the traditional four walls of the enterprise. Referred to as a company’s external attack surface, it comprises typosquat domains; fake websites, apps, and ads; counterfeit sales; email compromise; and social media fraud.

And with technology stacks piling high, security teams are increasingly looking for efficient engines that can detect and act against these external activities in real time - including scams propagated through multiple platforms and...
Virtual
Roundtable
Tuesday, June 14th, 2022
Jason Georgi
Danielle Syvertsen
Jason Georgi with Danielle Syvertsen
Virtual Roundtable
Zero Trust and SASE: Embracing Today's Workforce Security Solutions for the Financial Sector
Discussion topics will include:
Zero Trust and Secure Access Service Edge allow Financial Services enterprises to leave behind the challenges of legacy security approaches, secure their systems and support innovative and competitive ways of working.

But new strategies come with the need for new skills and tools. How is your FinServ organization embracing Zero Trust, cloud migration and SASE against competing priorities? How are you balancing in-house and outsourced resources to manage your transformation? What security gaps are evident as you secure this here-to-stay...
Virtual
Roundtable
Tuesday, June 14th, 2022
Suparna Goswami
Arvind Ganesan
Suparna Goswami with Arvind Ganesan
Virtual Roundtable
Credential Stuffing: Balancing a Layered Security Approach with User Experience
Discussion topics will include:
With the concept of super apps gaining acceptance, commerce companies are all set to leverage this new trend in the market. However, with scalability comes in security issues. Every online business with a login page is a potential target for credential stuffing. Recent studies have shown that most industries have reported credential stuffing as a significant security challenge. But visibility into this kind of attack continues to be a challenge. While a layered- security approach is ideal, user experience remains...
JW Marriott Hotel New Delhi Aerocity, Asset Area 4 - Hospitality District Delhi, Aerocity, New Delhi, Delhi 110037
In-Person
Roundtable
Thursday, June 9th, 2022
JW Marriott Hotel New Delhi Aerocity, Asset Area 4 - Hospitality District Delhi, Aerocity, New Delhi, Delhi 110037
Geetha  Nandikotkur
Murali  Urs
Geetha Nandikotkur with Murali Urs
In-Person Roundtable
Practical Steps to Security Management: Accelerating Your Response Mechanism
Discussion topics will include:
As organizations become vulnerable to threats and attacks, the big question is how to accelerate their incident response mechanism by effectively managing their security and controls.
The concerns are justified because the average volume of attacks and breaches has increased rapidly, with the bad guys creating significant business loss, downtime, and the cost of response going up.

The significant challenge for CISOs is to monitor their alerts in real-time and take appropriate action based on defined policies, an effective risk...
Morton's The Steakhouse - San Francisco
In
Person Roundtable
Tuesday, June 7th, 2022
Morton's The Steakhouse - San Francisco
Jonathan  Trull
Tom Field
Jonathan Trull with Tom Field
In Person Roundtable
Measuring the Maturity of Your Cloud Security Program
Discussion topics will include:
Amidst the accelerated digital transformation of the past two years, enterprises across sectors have gone from dipping their toes in the cloud to being fully immersed in multi-cloud environments. At the same time, they've encountered the reality: Security in the cloud is a different animal, and it requires unique skills.

What does cloud security maturity look like? Where is your organization on the road to maturity? How do you measure progress - and gain access to the right talent?

Register...
Virtual
Roundtable
Tuesday, June 7th, 2022
Mohan Damodaran
Tom Field
Mohan Damodaran with Tom Field
Virtual Roundtable
Incident Response: Are You Prepared for Your Organization's Worst Day?
Discussion topics will include:
It could be ransomware, DDoS, a zero day such as Log4j or a supply chain attack similar to SolarWinds. You know it's not "if," it's "when does the next cyberattack strike?" And how prepared is your organization to respond to what invariably will be its worst day?

So much goes into preparation: What controls do you have in place for detection and response? Do you have the right people in place - and have they been drilled? Do you know...
Virtual
Roundtable
Thursday, June 2nd, 2022
Tom Field
Kurt Weiss
Tom Field with Kurt Weiss
Virtual Roundtable
Financial Services: Strategies for a Frictionless Digital Onboarding
Discussion topics will include:
Balancing a frictionless consumer onboarding experience with advanced fraud prevention techniques is an increasing challenge for financial services in the digital era.

Furthermore, traditional financial services providers face fierce competition from a new generation of online-only challenger banks that are designed and built with a significant and digital-only demographic in mind: Gen-Z and younger millennials.

To attract this demographic, financial services must provide a near frictionless application process with as few clicks as possible to minimize abandonment. However, how can...
Sofitel Hotel | Bandra Kurla Complex, Bandra East, Mumbai
In-Person
Roundtable
Thursday, June 2nd, 2022
Sofitel Hotel | Bandra Kurla Complex, Bandra East, Mumbai
Suparna Goswami
Sam O'Brien
Suparna Goswami with Sam O'Brien
In-Person Roundtable
Harnessing Risk Quantification to Make Cents of Cyber
Discussion topics will include:
The events of the last 2 years have led to an incredible acceleration of digital transformation. It has not only allowed organisations to continue operating through very difficult times, but has allowed many to prosper. One of the learnings of this transformation, has been that an organisation’s cyber capabilities exist as both an enabler and as a threat. It is becoming increasingly difficult to balance the two and more is needed to differentiate which issues truly matter most.

From establishing...
Canada
Virtual
Roundtable
Wednesday, June 1st, 2022
Canada
Jameeka Green Aaron
Tony Morbin
Jameeka Green Aaron with Tony Morbin
Virtual Roundtable
Using CIAM to Disrupt the Economics of Attackers
Discussion topics will include:
Deception for crime or warfare is an established tactic used by attackers, probably as old as humanity. Even in today’s online world, fake and stolen identity are primary routes for attackers to gain unauthorized access to an organization's digital assets, networks, or systems. In fact a recent report found that 79% of organizations have experienced an identity-related security breach in the last two years.

Reliably establishing and authenticating the identities of those we choose to trust online enables us to...
Virtual
Roundtable
Wednesday, June 1st, 2022
Tom Field
Shashi Prakash
Tom Field with Shashi Prakash
Virtual Roundtable
Managing Risk Outside Your Four Walls: Strategies for Protecting Your External Attack Surface
Discussion topics will include:
Security practitioners are increasingly put to task to address threats and risks occurring outside the traditional four walls of the enterprise. Referred to as a company’s external attack surface, it comprises typosquat domains; fake websites, apps, and ads; counterfeit sales; email compromise; and social media fraud.

And with technology stacks piling high, security teams are increasingly looking for efficient engines that can detect and act against these external activities in real time - including scams propagated through multiple platforms and...
Virtual
Roundtable
Tuesday, May 31st, 2022
Tom Field
Chad Skipper
Tom Field with Chad Skipper
Virtual Roundtable
Techniques to Defeat Malware Attacks Against Multi-Cloud Environments
Discussion topics will include:
In the past five years, Linux has become the most common operating system in multi-cloud environments and powers more than 78 percent of the most popular websites. This has not gone unnoticed by malicious actors who have quickly taken advantage of weak authentication, vulnerabilities and misconfigurations in container-based infrastructures to infiltrate the environment with remote access tools (RATs), and once in, deploy ransomware or cryptomining tools.

Current malware countermeasures are mostly focused on addressing Windows-based threats, leaving many public and...
Virtual
Roundtable
Tuesday, May 31st, 2022
Jef Hu
Suparna  Goswami
Jef Hu with Suparna Goswami
Virtual Roundtable
Credential Stuffing: Understanding the Criminal Economy
Discussion topics will include:
Credential stuffing are no longer a problem for only the financial industry. Every online business with a login page is a potential target for credential stuffing. A recent study by Ponemon shows that more than half the respondents from e-commerce industry reported credential stuffing as a significant security challenge. Additionally, nearly 70% of respondents said they were unsure if their companies had adequate visibility into these attacks. Unfortunately, login requests resulting from credential stuffing is hard to detect.

For any...
Virtual
Roundtable
Thursday, May 26th, 2022
Tom Field
Kevin Orr
Tom Field with Kevin Orr
Virtual Roundtable
Identity: A Core Component to Zero Trust
Discussion topics will include:
Digital identity remains an underlying concern in cyberspace. In fact, it is one of the most substantial elements of Zero Trust architectures - which entails all users (inside or outside the organization) being authenticated, authorized, and continuously validated. Identity - from employees, to remote workers, to third-party vendors, to devices or apps - can create a direct path toward an organization's crown jewels.

Be it open access to cloud environments or excessive permissions, "identity" can spell doom for today's organizations....
Pullman New Delhi Aerocity
In-Person
Roundtable
Thursday, May 26th, 2022
Pullman New Delhi Aerocity
Suparna Goswami
Mukesh  Chand Thapliyal
Suparna Goswami with Mukesh Chand Thapliyal
In-Person Roundtable
Using SASE to Reinvent Security for Today's Flexible Workforce
Discussion topics will include:
The transition to hybrid work has brought into sharp focus the challenges of connecting between people, devices, and data that are ever-expanding. Enterprises are looking for consistency for security and quality of experience regardless of an end-user’s location. The key is to simplify security, streamline policy enforcement, and increase threat protection by combining multiple functions into a single, cloud-native service. SASE promises to do this. As the workloads have moved out of offices' secure environment, how do you improve productivity...
Virtual
Roundtable
Wednesday, May 25th, 2022
Tom Field
Noel Reynolds
Tom Field with Noel Reynolds
Virtual Roundtable
Incident Response: Are You Prepared for Your Organization's Worst Day?
Discussion topics will include:
It could be ransomware, DDoS, a zero day such as Log4j or a supply chain attack similar to SolarWinds. You know it's not "if," it's "when does the next cyberattack strike?" And how prepared is your organization to respond to what invariably will be its worst day?

So much goes into preparation: What controls do you have in place for detection and response? Do you have the right people in place - and have they been drilled? Do you know...
Shangri-La Sydney | 176 Cumberland St, The Rocks NSW 2000, Australia
In-Person
Roundtable
Wednesday, May 25th, 2022
Shangri-La Sydney | 176 Cumberland St, The Rocks NSW 2000, Australia
Jeremy Kirk
Stephen  Gillies
Jeremy Kirk with Stephen Gillies
In-Person Roundtable
How to Improve and Quantify Improvement in Application Security
Discussion topics will include:
The success of an application security program can be defined in one overarching metric: an absence of bad events such as breaches or ransomware. The process starts when an application is coded, hopefully with security in mind. But the real challenge comes in production, where not only the application itself but the defences built around it, are put to the test.

Web application firewalls are components of that defence, but it can be tricky to tune them perfectly. With attackers...
County Hall, Belvedere Rd, London, UK
In-Person
Roundtable
Tuesday, May 24th, 2022
County Hall, Belvedere Rd, London, UK
Anna Delaney
Jay Coley
Anna Delaney with Jay Coley
In-Person Roundtable
High Tech: Best Practices to Secure Data in Hybrid Work Environments
Discussion topics will include:
The ongoing need for digital transformation continues to push more and more organizations into the cloud, bringing their apps and data with them. But managing an infrastructure of multiple private clouds, public clouds, edge environments and on-prem is complex. One insecure API or misconfigured server and organizations may risk being crippled by long-term financial or reputational damages.

How can you keep your websites both secure and performant while empowering your organization to effectively detect threats before they impact your business?...
County Hall, Belvedere Rd, London SE1 7PB
In-Person
Roundtable
Tuesday, May 24th, 2022
County Hall, Belvedere Rd, London SE1 7PB
Steve Midgley
Mathew Schwartz
Steve Midgley with Mathew Schwartz
In-Person Roundtable
The Path to Cyber Maturity: Where Are You?
Discussion topics will include:
Traditional approaches to keeping data and applications secure are no longer sustainable in the era of ransomware and supply chain threats, mass digitalization and modern cloud deployment. Enterprises with ‘immature’ cybersecurity strategies are unprepared to identify and prioritize threats and perform effective risk mitigation.

Discussion topics will include:
Best practices to gain insights and visibility into your security posture
Strategies to quantify your cyber risk
Techniques to ensure defenses are in line with shifting threats

Join ISMG's Anna Delaney for...
Virtual
Roundtable
Thursday, May 19th, 2022
Tari   Schreider
Tyler Croak
Tari Schreider with Tyler Croak
Virtual Roundtable
Steps to Reducing Ransomware Risk in a Cloud-First World
Discussion topics will include:
In 2021, a debilitating ransomware attack on Colonial Pipeline's IT systems caused both a physical response – the shutdown of the pipeline – and a hefty financial one, with the company paying more than $4 million ransom to restore data. After other high-profile attacks and a whole-of-government emphasis on mitigation in the U.S., it became apparent that ransomware is indeed a national security concern that can cut through every area of an enterprise.

Although there have been periods of relative...
Virtual
Roundtable
Thursday, May 19th, 2022
Anna Delaney
Weston Morris
Anna Delaney with Weston Morris
Virtual Roundtable
Healthcare: Why Employee Experience is Key to Digital Transformation
Discussion topics will include:
Over the past two years, healthcare entities leapt headlong into digital transformation by adopting and deploying new solutions for telehealth, digital workplaces, and cybersecurity.

At the same time, the pandemic ushered high demand for care, overrun ERs, caregiver burnout and vaccine mandate backlash. The employee experience (EX) of clinical and non-clinical staff is now in crisis.

And yet, the true potential of healthcare IT innovation cannot thrive in an environment of disengaged and dissatisfied employees, which, in turn, negatively impacts...
Virtual
Roundtable
Wednesday, May 18th, 2022
Tom Field
David Balcar
Tom Field with David Balcar
Virtual Roundtable
Retail Security in a Time of Digital Transformation: Turning the Run into a Sprint
Discussion topics will include:
With scores of active accounts, deep PII and stacks of legacy technology, the retail and hospitality industries remain top targets for cyber criminals. The accelerated digital transformation has also fueled new fraud attempts on point of sale systems, payment card accounts and third-party suppliers.

How has the retail/hospitality attack surface shifted in the past year? What have cybersecurity leaders learned about protecting card transactions and point of sale systems? What supply chain lessons must be learned from the SolarWinds breach?...
Virtual
Roundtable
Wednesday, May 18th, 2022
James Brotsos
James Ferguson
James Brotsos with James Ferguson
Virtual Roundtable
How Prepared Are You for the Next Log4j?
Discussion topics will include:
Open source code dominates modern application code. It is also considered a "national security issue," in light of the recent Log4j attacks. Open source code, misconfigurations and known unpatched vulnerabilities are among the application security risks facing all organizations that could lead to a breach.

According to analysts at Forrester, security leaders must manage open source risk with tools and processes including a software bill of materials (SBOM), software composition analysis and third-party risk management.

The question is, how prepared...
Virtual
Roundtable
Wednesday, May 18th, 2022
Tim Erridge
Gianluca Varisco
Tim Erridge with Gianluca Varisco
Virtual Roundtable
Pre-Empting the Attacker's Next Move: Strengthening Threat Intel Capabilities
Discussion topics will include:
Threat intelligence is increasingly recognized as an important weapon of an organization's defense strategy. Understanding who is targeting your enterprise, their motivations and capabilities are required to predict the threat actor's next move.

However, the continual tracking and interpreting of large amounts of dispersed data, as well as regular reevaluation and development of the right skills and resources have made it challenging for businesses to cultivate mature threat intelligence capabilities.

How can security leaders strengthen their threat intelligence programs to...
Virtual
Roundtable
Wednesday, May 18th, 2022
Aaron Sharp
Jeremy Kirk
Aaron Sharp with Jeremy Kirk
Virtual Roundtable
Building a Successful Data-Driven Security Program
Discussion topics will include:
Security leaders are looking to get the most value from their investments. They're looking for metrics that help gauge how their investments have resulted in better security outcomes. They're also looking for clues in data that indicate where future investments need to be made in order to reduce their risk profiles.

There are numerous sources for security data: SIEMs, XDR or EDR platforms, logs collected by security products are amongst them. But taking raw data and transforming it into meaningful...
Virtual
Roundtable
Tuesday, May 17th, 2022
Tom Field
Richard Byrd
Tom Field with Richard Byrd
Virtual Roundtable
Collective Defense: How to Operationalize Public/Private Sector Collaboration
Discussion topics will include:
Since the release of President Biden's cybersecurity executive order last May, there has been great progress on topics such as adoption of zero-trust security and even establishment of a cybersecurity safety review board.

But one of the key provisions lacks such progress: Removing barriers to threat information sharing between government and the private sector. In the absence of guidance or support for this critical initiative, how do private and public sector entities move forward? What are the barriers, and how...
5Church Midtown, Atlanta GA
In-Person
Roundtable
Thursday, May 12th, 2022
5Church Midtown, Atlanta GA
Tom Field
Chris Pierson
Tom Field with Chris Pierson
In-Person Roundtable
Executive Protection for Digital Lives – What CIOs and CISOs Need to Consider Beyond the Office
Discussion topics will include:
Senior leaders’ unified digital life mingling personal and professional data and devices has become the soft underbelly of corporate cybersecurity. Therefore, CEOs and their CISOs need to extend the defense perimeter and protect the entire digital lives of all executives and key personnel. Some statistics:

- 27% of executives have malware on their personal devices
- 20% of executives’ homes are digitally compromised
- 69% of executive’s personal passwords are on the Dark Web
- 75% have improper privacy and...
Virtual
Roundtable
Thursday, May 12th, 2022
Shashi Prakash
Tony Morbin
Shashi Prakash with Tony Morbin
Virtual Roundtable
Managing Risk Outside Your Four Walls: Strategies for Protecting Your External Attack Surface
Discussion topics will include:
Security practitioners are increasingly put to task to address threats and risks occurring outside the traditional four walls of the enterprise. Referred to as a company’s external attack surface, it comprises typosquat domains; fake websites, apps, and ads; counterfeit sales; email compromise; and social media fraud.

And with technology stacks piling high, security teams are increasingly looking for efficient engines that can detect and act against these external activities in real time - including scams propagated through multiple platforms and...
Virtual
Roundtable
Thursday, May 12th, 2022
Geetha Nandikotkur
John  Sandiford
Geetha Nandikotkur with John Sandiford
Virtual Roundtable
An Effective Approach to Vulnerability Management in 2022
Discussion topics will include:
With enterprises flooded with vulnerabilities, critical ones tend to get lost in the deluge more often than not. However, when the same gets exploited by threat actors, it leads to business disruptions. The challenge for most enterprises often lies in knowing the significant components of software and knowing their vulnerabilities.

The key is to have a single pane of glass to get visibility across your assets. But, how do you put the right strategies in place? Do you have enough...
Virtual
Roundtable
Tuesday, May 10th, 2022
Tom Field
John Paul Blaho
Tom Field with John Paul Blaho
Virtual Roundtable
Advanced Fraud Requires Advanced Defenses
Discussion topics will include:
Digital transformation has enabled financial institutions to offer a suite of new services to customers who now can conduct business from anywhere, on any device.

But these same conveniences have opened new doors to fraudsters, who have refined their socially-engineered schemes to a new scale and sophistication that defy traditional fraud departments and their anti-fraud controls.

Advanced fraud schemes call for advanced defenses - strategies and controls that unify traditional silos such as fraud, legal, AML and other organizational silos....
Canada
Virtual
Roundtable
Tuesday, May 10th, 2022
Canada
Nabeel Saeed
Tony Morbin
Nabeel Saeed with Tony Morbin
Virtual Roundtable
How CISOs can go from *zero trust* to building trust, driving revenue, and delighting customers
Discussion topics will include:
Consumer-facing businesses need to attract, entice and delight customers, while deploying security that is unobtrusive but effective, providing assurance for both the customer and business. A high-end jewellery store may have $millions to protect, but it can’t take an impenetrable Fort Knox approach to security, similarly, what worked for securing your workforce does not work for securing your consumer-facing business.

You need to make your customer authentication smarter, make it easier to identify, verify, and authenticate customers with the degree...
Ruth's Chris Steak House - 1355 N Harbor Dr, San Diego, CA 92101
In-Person
Roundtable
Thursday, May 5th, 2022
Ruth's Chris Steak House - 1355 N Harbor Dr, San Diego, CA 92101
Tom Field
Noel Reynolds
Tom Field with Noel Reynolds
In-Person Roundtable
Incident Response: Are You Prepared for Your Organization's Worst Day?
Discussion topics will include:
It could be ransomware, DDoS, a zero day such as Log4j or a supply chain attack similar to SolarWinds. You know it's not "if," it's "when does the next cyberattack strike?" And how prepared is your organization to respond to what invariably will be its worst day?

So much goes into preparation: What controls do you have in place for detection and response? Do you have the right people in place - and have they been drilled? Do you know...
Virtual
Roundtable
Thursday, May 5th, 2022
Jeremy Kirk
David Hawkins
Jeremy Kirk with David Hawkins
Virtual Roundtable
From Prevention to Reality: Building a Cyber Resilient Organization
Discussion topics will include:
Strong cybersecurity is critical in the digital economy to create trusted, resilient organizations. But as the pace of digital transformation accelerates, the attack surface and vendor footprint within organizations has grown rapidly. Faced with greater exposure and more sophisticated cyber attacks, it is no longer possible for security leaders to prevent cyber breaches.

Security leaders must shift their focus from prevention to resilience to defend against greater exposure and more sophisticated cyber attacks. A focus on cyber resilience empowers organizations...
Virtual
Roundtable
Thursday, May 5th, 2022
Anna Delaney
Roger Sels
Anna Delaney with Roger Sels
Virtual Roundtable
New Strategies for Readiness, Response, Recovery
Discussion topics will include:
Whether it's Log4j, SolarWinds or rising geopolitical tensions, anticipating cyber incidents has never been more challenging. The need for security leaders to demonstrate "cyber readiness" to the executive board is now crucial.

A useful tool to follow is the NIST Cybersecurity Framework but too often security teams prioritize the "identify", "protect", and "detect" functions, over "respond" and recover". Shifting greater focus to response and recovery will not only highlight vulnerabilities to the executive but also help increase funding across all...
Virtual
Roundtable
Wednesday, May 4th, 2022
Tom Field
Michael Lyborg
Tom Field with Michael Lyborg
Virtual Roundtable
The Many Benefits of Security Automation
Discussion topics will include:
With cyberattacks on the rise and fears of international escalation in cyberspace, security teams are actively working to bolster defense. But with the prevalence of security rising, the gulf between today's workforce and its needs is vast. This leaves CISOs under-resourced and analysts in the SOC spread thin. Enter "Security Orchestration, Automation, and Response," or SOAR, tools.

Without automated tools to centralize event data and improve incident response, tasks delegated to "humans" can get tedious and overwhelming – causing a...
Virtual
Roundtable
Thursday, April 28th, 2022
Tom Field
Jon Powvens
Tom Field with Jon Powvens
Virtual Roundtable
Digital Healthcare's Future: It's About Availability
Discussion topics will include:
Healthcare compressed roughly a decade's worth of digital transformation into the past two years. As a result, patients now receive unprecedented digital services, and healthcare professionals have new tools for making decisions, sharing information, and delivering services from any remote location.

But today's digital healthcare footprint also represents one of the largest and most lucrative potential attack surfaces in history. Any healthcare entity is but a ransomware attack or a distributed denial of service incident away from being unable to...
Virtual
Roundtable
Tuesday, April 26th, 2022
Tyler Croak
David Pollino
Tyler Croak with David Pollino
Virtual Roundtable
Steps to Reducing Ransomware Risk in a Cloud-First World
Discussion topics will include:
In 2021, a debilitating ransomware attack on Colonial Pipeline's IT systems caused both a physical response – the shutdown of the pipeline – and a hefty financial one, with the company paying more than $4 million ransom to restore data. After other high-profile attacks and a whole-of-government emphasis on mitigation in the U.S., it became apparent that ransomware is indeed a national security concern that can cut through every area of an enterprise.

Although there have been periods of relative...
Virtual
Roundtable
Tuesday, April 26th, 2022
Josh Zelonis
Sid Srivastava
Josh Zelonis with Sid Srivastava
Virtual Roundtable
Financial Services: Techniques to Stay Ahead of the Adversaries
Discussion topics will include:
The 2022 State of Security Automation in Financial Services Study commissioned by Accenture and Palo Alto Networks revealed that 42% of surveyed financial institutions consider their current abilities to respond and detect to threats - such as ransomware and zero-day attacks - average, at best. Furthermore only 35% say that automation currently plays a strong role in how they identify and respond to threats.

The need to build smarter defense strategies is increasingly crucial to be prepared for the next...
Ruth's Chris Steak House - 148 W 51st St, Manhattan, NY 10019
In-Person
Roundtable
Thursday, April 21st, 2022
Ruth's Chris Steak House - 148 W 51st St, Manhattan, NY 10019
Brian Fox
Tom Field
Brian Fox with Tom Field
In-Person Roundtable
Software Supply Chains: A Look into the Future
Discussion topics will include:
If you thought 2021 was the year of the software supply chain, just wait until you see what unfolds in 2022.

Massive exploits such as the recent Log4j/Log4shell vulnerability are a sign that best practices are still evolving, and the risk of mismanaging, or worse, ignoring open source vulnerabilities, is only becoming greater. And with even the President of the U.S. calling out the need for software bills of materials, it’s time to kick up the gear on open source...
Virtual
Roundtable
Wednesday, April 20th, 2022
Tom Field
Praveen Vunnava
Tom Field with Praveen Vunnava
Virtual Roundtable
Ransomware: Are the Attackers Already in Your System?
Discussion topics will include:
What we learned about ransomware over the past year: The attacks are relentless, the barrier to entry for attackers is low, and the targets … are everyone in the supply chain. You might not be a direct target, but your supplier is. Further, the adversaries are patient - they may well be in your system now, laying the foundation for a future strike.

So, how does one reduce the risk of a successful attack? And if attacked, how does one...
Virtual
Roundtable
Wednesday, April 20th, 2022
Tim  Dalgleish
Suparna  Goswami
Tim Dalgleish with Suparna Goswami
Virtual Roundtable
Securing Against Account Takeovers Using Advanced Behaviour Analytics
Discussion topics will include:
Account Takeover fraud is one of the top losses for banks and financial institutions across the globe. Fraudsters continue to evolve and develop new methods and tools to take over accounts. Traditional tools and controls like the OTP, do not work against sophisticated social engineering scams, malware attacks and other creative account takeover methods. Moreover, financial institutions have to make account opening smooth for their customers. Financial institutions globally are increasingly relying on behavioural data to get powerful insights.
How...
Virtual
Roundtable
Thursday, April 14th, 2022
Tom Field
Peter Andrious
Tom Field with Peter Andrious
Virtual Roundtable
Account Verification: How to Read 'Digital Body Language'
Discussion topics will include:
Digital transformation has brought with it a plethora of new, digital services and an historic increase in customers - existing and new - who want to deal with your institution solely through digital channels.

But how do you validate that these customers are who they claim to be - especially at account opening? How do you balance the right amounts of security controls and ease of use to minimize customer friction and abandonment? What if you could read their digital...
Virtual
Roundtable
Wednesday, April 13th, 2022
Tom Field
Chad Skipper
Tom Field with Chad Skipper
Virtual Roundtable
Techniques to Defeat Malware Attacks Against Multi-Cloud Environments
Discussion topics will include:
In the past five years, Linux has become the most common operating system in multi-cloud environments and powers more than 78 percent of the most popular websites. This has not gone unnoticed by malicious actors who have quickly taken advantage of weak authentication, vulnerabilities and misconfigurations in container-based infrastructures to infiltrate the environment with remote access tools (RATs), and once in, deploy ransomware or cryptomining tools.

Current malware countermeasures are mostly focused on addressing Windows-based threats, leaving many public and...
Virtual
Roundtable
Wednesday, April 13th, 2022
Tony Lauro
Anna Delaney
Tony Lauro with Anna Delaney
Virtual Roundtable
Embracing the Zero Trust Journey: What's Next?
Discussion topics will include:
The Zero Trust security model is not a single technology, but a strategy, or even a programmatic approach that integrates elements of identity, network, application, data and cloud security to support a secure and agile business environment.

An executive order carrying Zero Trust requirements for federal agencies and several high-profile cyberattacks have hastened this sweeping shift in security - to require all users (inside or outside the organization) to be authenticated, authorized, and continuously validated. Zero Trust, which abandons the...
Fleming’s Prime Steakhouse & Wine Bar - 180 El Camino Real, Palo Alto
In-Person
Roundtable
Tuesday, April 12th, 2022
Fleming’s Prime Steakhouse & Wine Bar - 180 El Camino Real, Palo Alto
Tom Field
Bob Reny
Tom Field with Bob Reny
In-Person Roundtable
Seize the Breach with Automation and Analytics
Discussion topics will include:
Breaches happen, and 2021 was a record-breaking year for them. According to Identity Theft Resource Center research, there were 1,291 breaches publicly reported as of Sept. 2021, compared to 1,108 breaches in 2020. That’s a 17% year-over-year increase. Meanwhile, millions are spent on security operations centers that aren’t stopping the breaches.

Why are SOC and security teams way too limited by legacy SIEM? How can machine learning-driven analytics and automation technologies provide unmatched threat detection, investigation, and response capabilities?

Register...
Ruth's Chris Steak House - 148 W 51st St, Manhattan, NY 10019
In-Person
Roundtable
Thursday, April 7th, 2022
Ruth's Chris Steak House - 148 W 51st St, Manhattan, NY 10019
Tom Field
Stephen Kiel
Tom Field with Stephen Kiel
In-Person Roundtable
From On-Prem to the Cloud: Protect Your Apps and APIs
Discussion topics will include:
The result of digital transformation: It's easier to do business with your customers and partners. But with new architectures, web apps and APIs now deployed from on-prem servers to the cloud, it is harder than ever to get a holistic view of all of these potentially vulnerable assets - never mind defend them.

What are your biggest challenges today in defending these diverse assets? What are the known gaps in your current defenses? What are you seeking in the future...
Virtual
Roundtable
Thursday, April 7th, 2022
Jeremy Kirk
Jacob Olcott
Jeremy Kirk with Jacob Olcott
Virtual Roundtable
From Prevention to Reality: Building a Cyber Resilient Organization
Discussion topics will include:
Strong cybersecurity is critical in the digital economy to create trusted, resilient organizations. But as the pace of digital transformation accelerates, the attack surface and vendor footprint within organizations has grown rapidly. Faced with greater exposure and more sophisticated cyber attacks, it is no longer possible for security leaders to prevent cyber breaches.

Security leaders must shift their focus from prevention to resilience to defend against greater exposure and more sophisticated cyber attacks. A focus on cyber resilience empowers organizations...
Virtual
Roundtable
Thursday, April 7th, 2022
Shashi Prakash
Anna Delaney
Shashi Prakash with Anna Delaney
Virtual Roundtable
Managing Risk Outside Your Four Walls: Strategies for Protecting Your External Attack Surface
Discussion topics will include:
Security practitioners are increasingly put to task to address threats and risks occurring outside the traditional four walls of the enterprise. Referred to as a company’s external attack surface, it comprises typosquat domains; fake websites, apps, and ads; counterfeit sales; email compromise; and social media fraud.

And with technology stacks piling high, security teams are increasingly looking for efficient engines that can detect and act against these external activities in real time - including scams propagated through multiple platforms and...
Virtual
Roundtable
Wednesday, April 6th, 2022
Tom Field
Jon Powvens
Tom Field with Jon Powvens
Virtual Roundtable
Digital Healthcare's Future: It's About Availability
Discussion topics will include:
Healthcare compressed roughly a decade's worth of digital transformation into the past two years. As a result, patients now receive unprecedented digital services, and healthcare professionals have new tools for making decisions, sharing information, and delivering services from any remote location.

But today's digital healthcare footprint also represents one of the largest and most lucrative potential attack surfaces in history. Any healthcare entity is but a ransomware attack or a distributed denial of service incident away from being unable to...
Virtual
Roundtable
Wednesday, April 6th, 2022
Josh Zelonis
Sid Srivastava
Josh Zelonis with Sid Srivastava
Virtual Roundtable
Financial Services: Techniques to Stay Ahead of the Adversaries
Discussion topics will include:
The 2022 State of Security Automation in Financial Services Study commissioned by Accenture and Palo Alto Networks revealed that 42% of surveyed financial institutions consider their current abilities to respond and detect to threats - such as ransomware and zero-day attacks - average, at best. Furthermore only 35% say that automation currently plays a strong role in how they identify and respond to threats.

The need to build smarter defense strategies is increasingly crucial to be prepared for the next...
The Gage - 24 South Michigan Avenue, Chicago
In-Person
Roundtable
Tuesday, April 5th, 2022
The Gage - 24 South Michigan Avenue, Chicago
Tom Field
Andrew Yorra
Tom Field with Andrew Yorra
In-Person Roundtable
Software Supply Chains: A Look into the Future
Discussion topics will include:
If you thought 2021 was the year of the software supply chain, just wait until you see what unfolds in 2022.

Massive exploits such as the recent Log4j/Log4shell vulnerability are a sign that best practices are still evolving, and the risk of mismanaging, or worse, ignoring open source vulnerabilities, is only becoming greater. And with even the President of the U.S. calling out the need for software bills of materials, it’s time to kick up the gear on open source...
Convene in Willis Tower - 233 South Wacker Drive, Chicago
In-Person
Roundtable
Tuesday, April 5th, 2022
Convene in Willis Tower - 233 South Wacker Drive, Chicago
Tom Field
Chip Witt
Tom Field with Chip Witt
In-Person Roundtable
How Malware Helps Bad Actors Get Away with Online Fraud (and What Enterprises Can Do About It)
Discussion topics will include:
Despite your team’s best efforts to defend against cyberattacks, organizations often lack visibility into when employees and consumers fall victim to the most nefarious type of attack - malware infections. Malware-stolen data is highly valuable to bad actors and is a gateway for them to commit fraud and infiltrate corporate networks.

When your users are affected by malware, it’s too late. Once a botnet is installed (like the infamous RedLine Stealer), cybercriminals have already started to siphon critical information such...
Virtual
Roundtable
Tuesday, April 5th, 2022
James Brotsos
James Ferguson
James Brotsos with James Ferguson
Virtual Roundtable
How Prepared Are You for the Next Log4j?
Discussion topics will include:
Open source code dominates modern application code. It is also considered a "national security issue," in light of the recent Log4j attacks. Open source code, misconfigurations and known unpatched vulnerabilities are among the application security risks facing all organizations that could lead to a breach.

According to analysts at Forrester, security leaders must manage open source risk with tools and processes including a software bill of materials (SBOM), software composition analysis and third-party risk management.

The question is, how prepared...
Virtual
Roundtable
Wednesday, March 30th, 2022
Gavin Hill
Tom Field
Gavin Hill with Tom Field
Virtual Roundtable
Fraud Fighting 2022: How to Win the Battle Against Bots
Discussion topics will include:
As enterprises globally have shifted more of their operations online, cyber adversaries have doubled down on the use of bots to automate and increase the scale of their attacks.

According to recent research from Enterprise Strategy Group, nearly half (47%) of cybersecurity professionals have seen examples of credential stuffing or cracking attacks used for account takeover in just the past 6 months. And 46% are aware of attacks on online shopping cart systems and instances of automated inventory purchasing or...
Virtual
Roundtable
Thursday, March 24th, 2022
Tom Field
Gavin Hill
Tom Field with Gavin Hill
Virtual Roundtable
Fraud Fighting 2022: How to Win the Battle Against Bots
Discussion topics will include:
As enterprises globally have shifted more of their operations online, cyber adversaries have doubled down on the use of bots to automate and increase the scale of their attacks.

According to recent research from Enterprise Strategy Group, nearly half (47%) of cybersecurity professionals have seen examples of credential stuffing or cracking attacks used for account takeover in just the past 6 months. And 46% are aware of attacks on online shopping cart systems and instances of automated inventory purchasing or...
Virtual
Roundtable
Thursday, March 24th, 2022
Dan Gunderman
Shashi Prakash
Dan Gunderman with Shashi Prakash
Virtual Roundtable
Managing Risk Outside Your Four Walls: Strategies for Protecting Your External Attack Surface
Discussion topics will include:
Security practitioners are increasingly put to task to address threats and risks occurring outside the traditional four walls of the enterprise. Referred to as a company’s external attack surface, it comprises typosquat domains; fake websites, apps, and ads; counterfeit sales; email compromise; and social media fraud.

And with technology stacks piling high, security teams are increasingly looking for efficient engines that can detect and act against these external activities in real time - including scams propagated through multiple platforms and...
Virtual
Roundtable
Wednesday, March 23rd, 2022
Tom Field
Peter Andrious
Tom Field with Peter Andrious
Virtual Roundtable
Account Verification: How to Read 'Digital Body Language'
Discussion topics will include:
Digital transformation has brought with it a plethora of new, digital services and an historic increase in customers - existing and new - who want to deal with your institution solely through digital channels.

But how do you validate that these customers are who they claim to be - especially at account opening? How do you balance the right amounts of security controls and ease of use to minimize customer friction and abandonment? What if you could read their digital...
El Gaucho Bellevue
In-Person
Roundtable
Tuesday, March 22nd, 2022
El Gaucho Bellevue
Tom Field
Andrew Yorra
Tom Field with Andrew Yorra
In-Person Roundtable
Software Supply Chains: A Look into the Future
Discussion topics will include:
If you thought 2021 was the year of the software supply chain, just wait until you see what unfolds in 2022.

Massive exploits such as the recent Log4j/Log4shell vulnerability are a sign that best practices are still evolving, and the risk of mismanaging, or worse, ignoring open source vulnerabilities, is only becoming greater. And with even the President of the U.S. calling out the need for software bills of materials, it’s time to kick up the gear on open source...
Meydenbauer Center
In-Person
Roundtable
Tuesday, March 22nd, 2022
Meydenbauer Center
Tom Field
Matt Tesauro
Tom Field with Matt Tesauro
In-Person Roundtable
API Security: How Are You Securing the #1 Attack Vector?
Discussion topics will include:
No surprise in the era of digital transformation: Gartner predicts that in 2022, application programming interface attacks will become the most-frequent attack vector. And yet many security leaders, when pressed, do not even know how many APIs they have in their environments - never mind their level of security.

So, what are you doing proactively to protect your environment from API vulnerabilities, design flaws, and misconfigurations?

Register for this executive roundtable, API Security: How Are You Securing the #1 Attack...
Meydenbauer Center
In-Person
Roundtable
Tuesday, March 22nd, 2022
Meydenbauer Center
Andrew Stone
David Elichman
Andrew Stone with David Elichman
In-Person Roundtable
Understanding 'Next-Gen' Backup & Restoration Processes
Discussion topics will include:
Following a ransomware attack, leaders at organizations with functional backups might expect to be up and running within a matter of minutes. In reality, this can be a lengthy process causing confusion and frustration. "Recoverability," then, must underpin much of the enterprise's wider security strategy.

Despite a surge in crypto-locking attacks, tools have emerged allowing teams to restore data in milliseconds. Other features now prohibit even those with admin rights from deleting files - without navigating a MFA-controlled process requiring...
1 Lombard Street
In-Person
Roundtable
Thursday, March 17th, 2022
1 Lombard Street
Anna Delaney
Jay Coley
Anna Delaney with Jay Coley
In-Person Roundtable
Web Application Firewalls: Maximising Control and Visibility
Discussion topics will include:
As organizations have shifted to online-focused business operations, expectations for the security of websites and apps are at an all-time high. Attackers, however, are constantly finding new vulnerabilities and attack vectors. Organizations deploy Web Application Firewalls to detect malicious web traffic aimed at their production apps and APIs.

Can you understand the intent of the attacks? Do you have real-time visibility and control? How can you reduce the noise of security products to focus on the most critical alerts?

Discussion...
Virtual
Roundtable
Thursday, March 17th, 2022
Doug Wylie
Dharminder Debisarun
Doug Wylie with Dharminder Debisarun
Virtual Roundtable
Securing Industry 4.0: Mitigate Cyber Risk in Smart Manufacturing
Discussion topics will include:
It's the fourth Industrial Revolution, and it arrived faster than anyone could have planned. It came with smart devices, automation, cloud migration and a new streamlined ability to engage with customers and partners.

But it also brought with it the vulnerabilities inherent in legacy technology, the disconnect of OT, an enlarged attack surface and increased attention from nation-state and criminal adversaries who seek to disrupt operations or steal intellectual property.

How prepared are you to secure Industry 4.0?

Register for...
Virtual
Roundtable
Wednesday, March 16th, 2022
Tom Field
Gavin Hill
Tom Field with Gavin Hill
Virtual Roundtable
Fraud Fighting 2022: How to Win the Battle Against Bots
Discussion topics will include:
As enterprises globally have shifted more of their operations online, cyber adversaries have doubled down on the use of bots to automate and increase the scale of their attacks.

According to recent research from Enterprise Strategy Group, nearly half (47%) of cybersecurity professionals have seen examples of credential stuffing or cracking attacks used for account takeover in just the past 6 months. And 46% are aware of attacks on online shopping cart systems and instances of automated inventory purchasing or...
Virtual
Roundtable
Wednesday, March 16th, 2022
Dan Gunderman
Andy Ellis
Dan Gunderman with Andy Ellis
Virtual Roundtable
Better Understanding Cloud Security Risks Through ‘Context’
Discussion topics will include:
In just a few years, cloud conversations have gone from theoretical to critical. And with migrations to the cloud ongoing, many enterprises have had to rethink their security approach. In these environments, some practitioners are charged with expending resources to mitigate “high-severity” CVEs – regardless of how a vulnerability may interact with that IT environment. This risk may pale in comparison, for example, to a malware occurrence at the edge that goes unchecked.

A potential lack of visibility into apps,...
Virtual
Roundtable
Tuesday, March 15th, 2022
Tom Field
Michael Ehrlich
Tom Field with Michael Ehrlich
Virtual Roundtable
Collective Defense: How to Operationalize Public/Private Sector Collaboration
Discussion topics will include:
Since the release of President Biden's cybersecurity executive order last May, there has been great progress on topics such as adoption of zero-trust security and even establishment of a cybersecurity safety review board.

But one of the key provisions lacks such progress: Removing barriers to threat information sharing between government and the private sector. In the absence of guidance or support for this critical initiative, how do private and public sector entities move forward? What are the barriers, and how...
Virtual
Roundtable
Tuesday, March 15th, 2022
Murali Urs
Gaurav Mahendru
Murali Urs with Gaurav Mahendru
Virtual Roundtable
How to Make your DLP Solution Work for your Ransomware Strategy
Discussion topics will include:
It would be an understatement to say that ransomware attacks have been playing havoc for enterprises. Not only is there a massive loss of revenue, but there is also a loss of data. Businesses seem to have come under regulatory and operational pressures as more than six new data privacy laws have been introduced in the last year, a significant step towards a globalized and harmonized approach to data protection.

With ransomware attacks and pressure from the regulators looming large...
Virtual
Roundtable
Thursday, March 10th, 2022
Dan Gunderman
Andrew Stone
Dan Gunderman with Andrew Stone
Virtual Roundtable
Understanding 'Next-Gen' Backup & Restoration Processes
Discussion topics will include:
Following a ransomware attack, leaders at organizations with functional backups might expect to be up and running within a matter of minutes. In reality, this can be a lengthy process causing confusion and frustration. "Recoverability," then, must underpin much of the enterprise's wider security strategy.

Despite a surge in crypto-locking attacks, tools have emerged allowing teams to restore data in milliseconds. Other features now prohibit even those with admin rights from deleting files - without navigating a MFA-controlled process requiring...
Virtual
Roundtable
Thursday, March 10th, 2022
Anna Delaney
David Richardson
Anna Delaney with David Richardson
Virtual Roundtable
From Endpoint to Cloud: Achieving Zero Trust for Enterprises
Discussion topics will include:
The global reliance on cloud-based infrastructure and services that are accessible from any device, has prompted security teams to rethink the way they protect their organizations. To support this new and agile way of working, security leaders need to be able to balance end-user privacy with security to protect users and corporate data from phishing, malware, and other threats. At the same time, too little freedom causes employee dissatisfaction, reduced agility and collaboration.

How can you enable employees to be...
Virtual
Roundtable
Thursday, March 10th, 2022
Mathew Schwartz
Jatin Arora
Mathew Schwartz with Jatin Arora
Virtual Roundtable
Building an Effective Cyber Resiliency Program
Discussion topics will include:
The importance of cyber resiliency continues to mount as organizations face all manner of cyberattacks and potential IT disruptions - from unplanned outages and global pandemics to targeted supply-chain subterfuge and ransomware hits.

Planning remains paramount, both to guide the defenses that businesses put in place, as well as for rapidly executing incident response plans in the event that an attack does result in business disruption. Having such capabilities is increasingly demanded by regulators, across not just privacy but also...
Strega Italiano Seaport
In-Person
Roundtable
Wednesday, March 9th, 2022
Strega Italiano Seaport
Tom Field
Brian Fox
Tom Field with Brian Fox
In-Person Roundtable
Software Supply Chains: A Look into the Future
Discussion topics will include:
If you thought 2021 was the year of the software supply chain, just wait until you see what unfolds in 2022.

Massive exploits such as the recent Log4j/Log4shell vulnerability are a sign that best practices are still evolving, and the risk of mismanaging, or worse, ignoring open source vulnerabilities, is only becoming greater. And with even the President of the U.S. calling out the need for software bills of materials, it’s time to kick up the gear on open source...
Virtual
Roundtable
Wednesday, March 9th, 2022
Murali Urs
Gaurav  Mahendru
Murali Urs with Gaurav Mahendru
Virtual Roundtable
How to Make your DLP Solution Work for your Ransomware Strategy
Discussion topics will include:
It would be an understatement to say that ransomware attacks have been playing havoc for enterprises. Not only is there a massive loss of revenue, but there is also a loss of data. Businesses seem to have come under regulatory and operational pressures as more than six new data privacy laws have been introduced in the last year, a significant step towards a globalized and harmonized approach to data protection.

With ransomware attacks and pressure from the regulators looming large...
Virtual
Roundtable
Tuesday, March 8th, 2022
Praveen Vunnava
Tom Field
Praveen Vunnava with Tom Field
Virtual Roundtable
Ransomware: Are the Attackers Already in Your System?
Discussion topics will include:
What we learned about ransomware over the past year: The attacks are relentless, the barrier to entry for attackers is low, and the targets … are everyone in the supply chain. You might not be a direct target, but your supplier is. Further, the adversaries are patient - they may well be in your system now, laying the foundation for a future strike.

So, how does one reduce the risk of a successful attack? And if attacked, how does one...
Virtual
Roundtable
Tuesday, March 8th, 2022
Murali Urs
Gaurav  Mahendru
Murali Urs with Gaurav Mahendru
Virtual Roundtable
How to Make your DLP Solution Work for your Ransomware Strategy
Discussion topics will include:
It would be an understatement to say that ransomware attacks have been playing havoc for enterprises. Not only is there a massive loss of revenue, but there is also a loss of data. Businesses seem to have come under regulatory and operational pressures as more than six new data privacy laws have been introduced in the last year, a significant step towards a globalized and harmonized approach to data protection.

With ransomware attacks and pressure from the regulators looming large...
Virtual
Roundtable
Thursday, March 3rd, 2022
Tom Field
Praveen Vunnava
Tom Field with Praveen Vunnava
Virtual Roundtable
Ransomware: Are the Attackers Already in Your System?
Discussion topics will include:
What we learned about ransomware over the past year: The attacks are relentless, the barrier to entry for attackers is low, and the targets … are everyone in the supply chain. You might not be a direct target, but your supplier is. Further, the adversaries are patient - they may well be in your system now, laying the foundation for a future strike.

So, how does one reduce the risk of a successful attack? And if attacked, how does one...
Virtual
Roundtable
Wednesday, March 2nd, 2022
Dan Gunderman
Andrew Stone
Dan Gunderman with Andrew Stone
Virtual Roundtable
Understanding 'Next-Gen' Backup & Restoration Processes
Discussion topics will include:
Following a ransomware attack, leaders at organizations with functional backups might expect to be up and running within a matter of minutes. In reality, this can be a lengthy process causing confusion and frustration. "Recoverability," then, must underpin much of the enterprise's wider security strategy.

Despite a surge in crypto-locking attacks, tools have emerged allowing teams to restore data in milliseconds. Other features now prohibit even those with admin rights from deleting files - without navigating a MFA-controlled process requiring...
Virtual
Roundtable
Tuesday, March 1st, 2022
Tom Field
Peter Andrious
Tom Field with Peter Andrious
Virtual Roundtable
Account Verification: How to Read 'Digital Body Language'
Discussion topics will include:
Digital transformation has brought with it a plethora of new, digital services and an historic increase in customers - existing and new - who want to deal with your institution solely through digital channels.

But how do you validate that these customers are who they claim to be - especially at account opening? How do you balance the right amounts of security controls and ease of use to minimize customer friction and abandonment? What if you could read their digital...
Virtual
Roundtable
Thursday, February 24th, 2022
Del Rodillas
Paul Brownlee
Del Rodillas with Paul Brownlee
Virtual Roundtable
Securing Industry 4.0: Mitigate Cyber Risk in Smart Manufacturing
Discussion topics will include:
It's the fourth Industrial Revolution, and it arrived faster than anyone could have planned. It came with smart devices, automation, cloud migration and a new streamlined ability to engage with customers and partners.

But it also brought with it the vulnerabilities inherent in legacy technology, the disconnect of OT, an enlarged attack surface and increased attention from nation-state and criminal adversaries who seek to disrupt operations or steal intellectual property.

How prepared are you to secure Industry 4.0?

Register for...
Virtual
Roundtable
Wednesday, February 23rd, 2022
Dan Gunderman
Tony Lauro
Dan Gunderman with Tony Lauro
Virtual Roundtable
Staying One Step Ahead of Online Fraudsters – And Their Bots
Discussion topics will include:
Malicious bots are everywhere. From denial-of-service attacks designed to “box out” or slow legitimate traffic to inventory hoarding of hot consumer goods to credential stuffing attacks that attempt to validate user credentials for account takeover (ATO), bad bots are busy disrupting your customer experience online – and your bottom line. But it doesn’t have to be a losing battle against today’s sophisticated and highly motivated bot operators.

Join ISMG's Dan Gunderman for a moderated discussion that will draw from the...
Virtual
Roundtable
Tuesday, February 22nd, 2022
Chris Kachigian
Rob Sadowski
Chris Kachigian with Rob Sadowski
Virtual Roundtable
Work Smarter and Safer: Navigating Cloud Migration, Remote Work and Business-Disrupting Attacks
Discussion topics will include:
You have a remote or hybrid workforce, your enterprise is amidst cloud migration, your extended enterprise is more reliant than ever on disparate devices, partners and apps … and determined cyber adversaries are targeting you in exactly these areas, which can cause crippling business disruption.

How can you secure this new extended environment without negatively impacting user productivity? Which "pain" do you address first?

Register for this executive roundtable, Work Smarter and Safer: Navigating Cloud Migration, Remote Work and Business-Disrupting...
Virtual
Roundtable
Thursday, February 17th, 2022
Dan Gunderman
Shashi Prakash
Dan Gunderman with Shashi Prakash
Virtual Roundtable
Managing Risk Outside Your Four Walls: Strategies for Protecting Your External Attack Surface
Discussion topics will include:
Security practitioners are increasingly put to task to address threats and risks occurring outside the traditional four walls of the enterprise. Referred to as a company’s external attack surface, it comprises typosquat domains; fake websites, apps, and ads; counterfeit sales; email compromise; and social media fraud.

And with technology stacks piling high, security teams are increasingly looking for efficient engines that can detect and act against these external activities in real time - including scams propagated through multiple platforms and...
Virtual
Roundtable
Thursday, February 17th, 2022
Mathew Schwartz
John Waters
Mathew Schwartz with John Waters
Virtual Roundtable
Identity: The Foundation for Digital and Cloud Transformation
Discussion topics will include:
As organizations pursue digital transformation and greater adoption of cloud-based resources, digital identities, and their alignment to digital assets, has become crucial in terms of data security, privacy and compliance.

Sustaining the required digital identity fabric - comprising everything from employees and contractors to customers and IoT/OT devices - can result in even mid-size organizations having to manage millions of identities and billions of relationships.
• How can organizations handle this requirement in a dynamic manner?
• What are the...
Virtual
Roundtable
Thursday, February 17th, 2022
Anna Delaney
Marcin Spychala
Anna Delaney with Marcin Spychala
Virtual Roundtable
Log4j: Tackling the Patch Management Challenge
Discussion topics will include:
For the past weeks, the security community has been knee-deep in efforts to mitigate - what has been described as - the most serious security flaw to have emerged in years, the Log4j zero-day vulnerability. The story unveils a deeper problem: Organizations have too many unpatched flaws, often exacerbated by their not knowing all the systems in operation within the enterprise.

Newly discovered vulnerabilities continue to increase, with more than 18,000 published last year alone. Resources and limited time continue...
Virtual
Roundtable
Thursday, February 17th, 2022
Gaurav  Mahendru
Ranndeep  Chonker
Gaurav Mahendru with Ranndeep Chonker
Virtual Roundtable
Why it is Essential to Make Cyber Resilience Work for Your Business
Discussion topics will include:
As enterprises worldwide continue to battle the pandemic uncertainty, resilience is something that will bring in certainty for cyber risk and compliance professionals. For a resilient business, it is important to make risk-informed decisions integrated across the enterprise. It is vital to break down silos by bringing together security operations, governance, risk, and compliance with IT, employees, and customer success workflows on a single platform. Alongwith cyber and operational resilience, vendor resilience is another important pillar that cannot be missed....
Virtual
Roundtable
Wednesday, February 16th, 2022
Chris Cochran
Tom Field
Chris Cochran with Tom Field
Virtual Roundtable
New Approaches to Asset Management in Cybersecurity
Discussion topics will include:
The proliferation of mobile and IoT devices adds a new, unprecedented degree of complexity that security teams are left scrambling to solve: How do you account for and secure these ephemeral devices when you often can’t even identify them in real-time?

Furthermore, traditional approaches to IT asset management have not scaled to the modern cloud deployment and leave us with limited visibility and gaps in our security coverage. A new approach is required.

Discussion topics will include:
How asset management...
Virtual
Roundtable
Wednesday, February 16th, 2022
Tony Morbin
Daina Proctor
Tony Morbin with Daina Proctor
Virtual Roundtable
Applying Zero Trust in a Hybrid Cloud Environment
Discussion topics will include:
Accelerated digital transformation has moved communication, business, and personal interactions online. But this has significantly increased potential attack surfaces, resulting in a dramatic surge in cybersecurity incidents and exposed records. As workloads move to the cloud, threats move with them. IBM's research indicates that in 2020, upwards of 90% of cyber-related incidents originated in cloud environments.

Organizations that are ahead in applying a zero trust approach to security - zero trust pacesetters - see improvements in all aspects of their...
Virtual
Roundtable
Wednesday, February 16th, 2022
Gaurav  Mahendru
Ranndeep  Chonker
Gaurav Mahendru with Ranndeep Chonker
Virtual Roundtable
Why it is Essential to Make Cyber Resilience Work for Your Business
Discussion topics will include:
As enterprises worldwide continue to battle the pandemic uncertainty, resilience is something that will bring in certainty for cyber risk and compliance professionals. For a resilient business, it is important to make risk-informed decisions integrated across the enterprise. It is vital to break down silos by bringing together security operations, governance, risk, and compliance with IT, employees, and customer success workflows on a single platform. Alongwith cyber and operational resilience, vendor resilience is another important pillar that cannot be missed....
Virtual
Roundtable
Tuesday, February 15th, 2022
Anton Chuvakin
Bernard Brantley
Anton Chuvakin with Bernard Brantley
Virtual Roundtable
The Role of NDR for Data-Centric Security in the Cloud
Discussion topics will include:
The past two years of digital transformation have yielded an historic wave of cloud migration. And new cloud entrants have quickly arisen to two realities: Cloud security is a vastly different animal from on-premise security. And if you don't have visibility across cloud environments, then you don't have security.

Enter Network Detection and Response. NDR is key to enhancing visibility and automating response in on-prem environments, and it may serve the same functions in the cloud, particularly in service to...
Virtual
Roundtable
Tuesday, February 15th, 2022
Gaurav  Mahendru
Ranndeep  Chonker
Gaurav Mahendru with Ranndeep Chonker
Virtual Roundtable
Why it is Essential to Make Cyber Resilience Work for Your Business
Discussion topics will include:
As enterprises worldwide continue to battle the pandemic uncertainty, resilience is something that will bring in certainty for cyber risk and compliance professionals. For a resilient business, it is important to make risk-informed decisions integrated across the enterprise. It is vital to break down silos by bringing together security operations, governance, risk, and compliance with IT, employees, and customer success workflows on a single platform. Alongwith cyber and operational resilience, vendor resilience is another important pillar that cannot be missed....
Virtual
Roundtable
Wednesday, February 9th, 2022
Dan Gunderman
Chris Rowlands
Dan Gunderman with Chris Rowlands
Virtual Roundtable
Does Mobile Security Remain a 'Glaring Gap' in the Enterprise?
Discussion topics will include:
For many, including government agencies and educational institutions, mobile devices present many threats to their organization's security posture. And troubling cyber incidents throughout 2021 - including high-profile ransomware attacks and new developments on government-grade surveillance programs - have left practitioners scrambling to boost their cyber resilience.

In many cases, an attack vector could be a compromised mobile device that leaks privileged credentials with cascading effects across the entire network. One way to plug these security gaps is to extend visibility...
Virtual
Roundtable
Wednesday, February 9th, 2022
Timothee Bardet
Nabil Bousselham
Timothee Bardet with Nabil Bousselham
Virtual Roundtable
Les meilleures pratiques pour combler le fossé entre sécurité et DevOps
Discussion topics will include:
L'essor des pratiques agiles et DevOps a révolutionné le développement des logiciels. En conséquence, l'innovation est presque trop rapide et les équipes de sécurité ne peuvent pas suivre. De plus en plus d'organisations adoptent des processus de développement pilotés par les tests, mais les équipes de sécurité manquent souvent de visibilité sur la phase de développement, ce qui aurait pu faciliter l'identification des lacunes. Les faux positifs, les dettes techniques, l'absence de priorités claires et le manque d’alignement au sein...
Virtual
Roundtable
Tuesday, February 8th, 2022
Tom Field
Chris Wysopal
Tom Field with Chris Wysopal
Virtual Roundtable
Software Security: How to Prioritize, Measure and Convey It To the Board
Discussion topics will include:
Amidst the shifting threat landscape, cloud migration and ongoing digital transformation, software security is often low or even last on the list of priorities for security leaders to address.

Yet, with the recent executive order on cybersecurity, and as headlines continue to feature high-profile breaches, board members at organizations across all industries are taking notice. Even though there are often designated technical experts on boards, there is now an increased awareness around cybersecurity – especially software security – even among...
Virtual
Roundtable
Thursday, February 3rd, 2022
Jeremy Kirk
Andrew Stone
Jeremy Kirk with Andrew Stone
Virtual Roundtable
Understanding 'Next-Gen' Backup & Restoration Processes
Discussion topics will include:
Following a ransomware attack, leaders at organizations with functional backups might expect to be up and running within a matter of minutes. In reality, this can be a lengthy process causing confusion and frustration. "Recoverability," then, must underpin much of the enterprise's wider security strategy.

Despite a surge in crypto-locking attacks, tools have emerged allowing teams to restore data in milliseconds. Other features now prohibit even those with admin rights from deleting files - without navigating a MFA-controlled process requiring...
Virtual
Roundtable
Thursday, February 3rd, 2022
Dan Gunderman
Andy Ellis
Dan Gunderman with Andy Ellis
Virtual Roundtable
Better Understanding Cloud Security Risks Through ‘Context’
Discussion topics will include:
In just a few years, cloud conversations have gone from theoretical to critical. And with migrations to the cloud ongoing, many enterprises have had to rethink their security approach. In these environments, some practitioners are charged with expending resources to mitigate “high-severity” CVEs – regardless of how a vulnerability may interact with that IT environment. This risk may pale in comparison, for example, to a malware occurrence at the edge that goes unchecked.

A potential lack of visibility into apps,...
Virtual
Roundtable
Thursday, February 3rd, 2022
Anna Delaney
John Smith
Anna Delaney with John Smith
Virtual Roundtable
Best Practices to Bridge the Security and DevOps Gap
Discussion topics will include:
The rise of agile practices and DevOps has revolutionized software development. As a result, innovation is moving incredibly quickly - at a pace security teams cannot match. As more organizations shift testing processes "left", security teams often lack visibility into/at the development stage, making it easier for gaps to be missed. False positives, backlogs, lack of clear prioritization and misalignment within teams create friction between what are frequently siloed departments.

How can we break down those siloes between the people...
Virtual
Roundtable
Thursday, February 3rd, 2022
Kristina Elestedt-Jansson
Tony Morbin
Kristina Elestedt-Jansson with Tony Morbin
Virtual Roundtable
Strategies to Defend Your Multi & Hybrid Cloud Infrastructure
Discussion topics will include:
The ongoing need for digital transformation continues to drive more organizations into the cloud, bringing their apps and data with them. But managing the underlying infrastructure, working with different hyperscalers – large cloud and networking providers – as well as overseeing multiple private clouds, public clouds and edge environments remains a complex undertaking. One insecure API or server misconfiguration, and organizations risk being hit by criminal hackers and suffering long-term financial or reputational damage.

Join us for a limited seat,...
Virtual
Roundtable
Tuesday, February 1st, 2022
Chris Cochran
Tom Field
Chris Cochran with Tom Field
Virtual Roundtable
New Approaches to Asset Management in Cybersecurity
Discussion topics will include:
The proliferation of mobile and IoT devices adds a new, unprecedented degree of complexity that security teams are left scrambling to solve: How do you account for and secure these ephemeral devices when you often can’t even identify them in real-time?

Furthermore, traditional approaches to IT asset management have not scaled to the modern cloud deployment and leave us with limited visibility and gaps in our security coverage. A new approach is required.

Discussion topics will include:
How asset management...
Virtual
Roundtable
Tuesday, February 1st, 2022
Anna Delaney
Ruud Grotens
Anna Delaney with Ruud Grotens
Virtual Roundtable
Should Banks Rely on Cloud-Based Fraud Detection Solutions?
Discussion topics will include:
Cloud-based technologies are seen to be fundamental to help create agility in a changing banking landscape. Still, the industry has been reticent to fully migrate to the cloud. Long-term cybersecurity and compliance concerns, legacy core banking systems and a lack of IT talent - or the in-house training resources to develop it - remain the greatest barriers to adopting more innovative technologies.

However, with a greater shift to online digital payments and Impersonation Fraud now being classed as a National...
Virtual
Roundtable
Thursday, January 27th, 2022
Tom Field
Frank Walsh
Tom Field with Frank Walsh
Virtual Roundtable
Fraud Fighting 2022: How to Win the Battle Against Bots
Discussion topics will include:
As enterprises globally have shifted more of their operations online, cyber adversaries have doubled down on the use of bots to automate and increase the scale of their attacks.

According to recent research from Enterprise Strategy Group, nearly half (47%) of cybersecurity professionals have seen examples of credential stuffing or cracking attacks used for account takeover in just the past 6 months. And 46% are aware of attacks on online shopping cart systems and instances of automated inventory purchasing or...
Virtual
Roundtable
Tuesday, January 25th, 2022
Tom Field
Chris Wysopal
Tom Field with Chris Wysopal
Virtual Roundtable
Software Security: How to Prioritize, Measure and Convey It To the Board
Discussion topics will include:
Amidst the shifting threat landscape, cloud migration and ongoing digital transformation, software security is often low or even last on the list of priorities for security leaders to address.

Yet, with the recent executive order on cybersecurity, and as headlines continue to feature high-profile breaches, board members at organizations across all industries are taking notice. Even though there are often designated technical experts on boards, there is now an increased awareness around cybersecurity – especially software security – even among...
Virtual
Roundtable
Thursday, January 20th, 2022
Jeremy Kirk
Shashi Prakash
Jeremy Kirk with Shashi Prakash
Virtual Roundtable
Managing Risk Outside Your Four Walls: Strategies for Protecting Your External Attack Surface
Discussion topics will include:
Security practitioners are increasingly put to task to address threats and risks occurring outside the traditional four walls of the enterprise. Referred to as a company’s external attack surface, it comprises typosquat domains; fake websites, apps, and ads; counterfeit sales; email compromise; and social media fraud.

And with technology stacks piling high, security teams are increasingly looking for efficient engines that can detect and act against these external activities in real time - including scams propagated through multiple platforms and...
Virtual
Roundtable
Thursday, January 20th, 2022
Tom Field
Jon Nelson
Tom Field with Jon Nelson
Virtual Roundtable
President's Executive Order: How to Meet The New Requirements
Discussion topics will include:
Multifactor authentication. Zero trust security. The software bill of materials. These are all key elements of President Joe Biden's 2021 cybersecurity executive order. And this is the year when requirements for each of these elements will start trickling down from federal agencies to state/local and even to private enterprises.

How prepared is your organization to meet these new requirements? Where are you particularly on the zero trust journey? Do you envision consolidating the number of cybersecurity vendors with whom you...
Virtual
Roundtable
Thursday, January 20th, 2022
Suparna Goswami
Vaibhav Khandelwal
Suparna Goswami with Vaibhav Khandelwal
Virtual Roundtable
Application Fraud Prevention: How to Better Your Existing Approach
Discussion topics will include:
With enterprises globally shifting most of their operations online, fraudsters have doubled down on the use of bots to automate and increase the scale of operations. Recent studies have shown that enterprises, especially the digital native ones, have faced credential stuffing attacks due to open fake online accounts. Moreover, there are enough incidents of automated inventory purchasing or holding.

With traditional static controls unable to prevent dynamic traffic movements, how are enterprises managing their application security? How can fraud and...
Virtual
Roundtable
Wednesday, January 19th, 2022
Tom Field
Frank Walsh
Tom Field with Frank Walsh
Virtual Roundtable
Fraud Fighting 2022: How to Win the Battle Against Bots
Discussion topics will include:
As enterprises globally have shifted more of their operations online, cyber adversaries have doubled down on the use of bots to automate and increase the scale of their attacks.

According to recent research from Enterprise Strategy Group, nearly half (47%) of cybersecurity professionals have seen examples of credential stuffing or cracking attacks used for account takeover in just the past 6 months. And 46% are aware of attacks on online shopping cart systems and instances of automated inventory purchasing or...
Virtual
Roundtable
Wednesday, January 19th, 2022
Anna Delaney
Chris Cochran
Anna Delaney with Chris Cochran
Virtual Roundtable
New Approaches to Asset Management in Cybersecurity
Discussion topics will include:
The proliferation of mobile and IoT devices adds a new, unprecedented degree of complexity that security teams are left scrambling to solve: How do you account for and secure these ephemeral devices when you often can’t even identify them in real-time?

Furthermore, traditional approaches to IT asset management have not scaled to the modern cloud deployment and leave us with limited visibility and gaps in our security coverage. A new approach is required.

Discussion topics will include:
How asset management...
Virtual
Roundtable
Tuesday, January 18th, 2022
Tom Field
Christopher Trollo
Tom Field with Christopher Trollo
Virtual Roundtable
Increase Operational Efficiency by Modernizing Your Security Operations
Discussion topics will include:
Too many endpoints. Too much data. Too little context for alerts about potential threats from insiders, criminals, and nation-states. These were all issues pre-COVID. And the pandemic-fueled accelerated transformation has only magnified them.

What are you doing today to streamline and modernize the efficiency of your security operations? How have your plans evolved throughout the pandemic, and what specifically do you intend to do in 2022? How will you address risk, the dearth of talent, and the ever evolving threat...
Virtual
Roundtable
Tuesday, January 18th, 2022
Vicente Diaz
Art Ehuan
Vicente Diaz with Art Ehuan
Virtual Roundtable
Combating the Modern Ransomware Threat
Discussion topics will include:
With threats growing in volume and sophistication, today’s ransomware attacks easily outpace many organizations’ defensive capabilities. Globally, enterprises of all sizes and sectors are being compromised and held hostage by ransomware, with many being forced to pay millions in ransom because they’re ill-equipped to combat their adversaries.

This trend intersects with the continued rise of digital business and represents a new magnitude of risk. It’s imperative, then, to understand your adversaries and re-examine your security posture so that you may...
Virtual
Roundtable
Thursday, January 13th, 2022
Anna Delaney
Chris Cochran
Anna Delaney with Chris Cochran
Virtual Roundtable
New Approaches to Asset Management in Cybersecurity
Discussion topics will include:
The proliferation of mobile and IoT devices adds a new, unprecedented degree of complexity that security teams are left scrambling to solve: How do you account for and secure these ephemeral devices when you often can’t even identify them in real-time?

Furthermore, traditional approaches to IT asset management have not scaled to the modern cloud deployment and leave us with limited visibility and gaps in our security coverage. A new approach is required.

Discussion topics will include:
How asset management...
Virtual
Roundtable
Wednesday, January 12th, 2022
Dan Gunderman
Andy Ellis
Dan Gunderman with Andy Ellis
Virtual Roundtable
Better Understanding Cloud Security Risks Through ‘Context’
Discussion topics will include:
In just a few years, cloud conversations have gone from theoretical to critical. And with migrations to the cloud ongoing, many enterprises have had to rethink their security approach. In these environments, some practitioners are charged with expending resources to mitigate “high-severity” CVEs – regardless of how a vulnerability may interact with that IT environment. This risk may pale in comparison, for example, to a malware occurrence at the edge that goes unchecked.

A potential lack of visibility into apps,...
Virtual
Roundtable
Tuesday, January 11th, 2022
Tom Field
Rick McElroy
Tom Field with Rick McElroy
Virtual Roundtable
Beyond Digital Transformation: Securing Healthcare’s Future
Discussion topics will include:
There has never been such a year for healthcare. Since the advent of the COVID-19 pandemic, healthcare entities globally have embraced cloud platforms and digital technologies to deliver telehealth products years ahead of schedule. “Healthcare from anywhere” is the new norm. The patient experience is the new competitive differentiator. And healthcare – more than ever before – is square in the adversaries’ crosshairs.

How has the healthcare attack surface shifted in the past year? What have cybersecurity leaders learned about...
Virtual
Roundtable
Tuesday, January 11th, 2022
Anna Delaney
Tom Davison
Anna Delaney with Tom Davison
Virtual Roundtable
From Endpoint to Cloud: Achieving Zero Trust for Enterprises
Discussion topics will include:
The global reliance on cloud-based infrastructure and services that are accessible from any device, has prompted security teams to rethink the way they protect their organizations. To support this new and agile way of working, security leaders need to be able to balance end-user privacy with security to protect users and corporate data from phishing, malware, and other threats. At the same time, too little freedom causes employee dissatisfaction, reduced agility and collaboration.

How can you enable employees to be...
Virtual
Roundtable
Wednesday, December 15th, 2021
Tom Field
Jacob Olcott
Tom Field with Jacob Olcott
Virtual Roundtable
Ransomware: How to Reduce Your Likelihood of Being a Victim
Discussion topics will include:
Colonial Pipeline. JBS meat processor. Scripps Health. The list of recent high-profile ransomware victims is long and growing. So are the costs to recover from these crimes.

But what if you could take preventive steps to reduce your likelihood of becoming a ransomware victim? BitSight recently analyzed hundreds of ransomware incidents to identify common security performance gaps and challenges that lead to successful ransomware incidents. One finding: Poor patching performance is a strong indicator of increased risk to ransomware. In...
Virtual
Roundtable
Wednesday, December 15th, 2021
Anna Delaney
Steve Kinman
Anna Delaney with Steve Kinman
Virtual Roundtable
DevSecOps: Uncovering the Hidden (and Costly) Risks
Discussion topics will include:
Misconfigurations. Known unpatched vulnerabilities. Open source code. The great unknown that comes from cloud migration and cloud-native apps. These are among the application security risks facing enterprises of all sizes and sectors. And yet too many security leaders maintain an arm’s length distance away from DevSecOps, lacking visibility into the risks that could lead to breach.

At a time when even the White House is talking about increasing accountability for application security, security leaders must prioritize their understanding of DevSecOps...
Virtual
Roundtable
Tuesday, December 14th, 2021
Anna Delaney
Mike Britton
Anna Delaney with Mike Britton
Virtual Roundtable
Supply Chain Attacks: Defending Against Vendor Email Compromise
Discussion topics will include:
Vendor email compromise (VEC) is a significant security threat to organizations. According to research from Abnormal Security, the percentage of companies who received a VEC attack increased 156% from July 2020 to June 2021, as threat actors increasingly see communications between vendors and customers as the weakest link.

It’s clear traditional email defenses were not designed to stop socially-engineered attacks. Without a new approach, high-profile attacks such as SolarWinds and Colonial Pipeline, will continue to cause severe financial losses and...
Virtual
Roundtable
Thursday, December 9th, 2021
Tom Field
Frank Walsh
Tom Field with Frank Walsh
Virtual Roundtable
Fraud Fighting 2022: How to Win the Battle Against Bots
Discussion topics will include:
As enterprises globally have shifted more of their operations online, cyber adversaries have doubled down on the use of bots to automate and increase the scale of their attacks.

According to recent research from Enterprise Strategy Group, nearly half (47%) of cybersecurity professionals have seen examples of credential stuffing or cracking attacks used for account takeover in just the past 6 months. And 46% are aware of attacks on online shopping cart systems and instances of automated inventory purchasing or...
Virtual
Roundtable
Thursday, December 9th, 2021
Anna Delaney
Shashi Prakash
Anna Delaney with Shashi Prakash
Virtual Roundtable
Why Protecting Your Internet Attack Surface Matters More Than Ever
Discussion topics will include:
As organizations continue to increase their presence online every year, their internet attack surface continues to grow while becoming ever more complex to protect. This not only includes fraudsters creating fake domains to impersonate legitimate websites, but also increases in typosquatting attacks, trademark infringement and vendor email compromise schemes, which are a growing area of concern for the FBI.

For CISOs and their teams, protecting against these types of attacks and fraud is an ever-growing concern, especially when much of...
Virtual
Roundtable
Wednesday, December 8th, 2021
Tom Field
Frank Walsh
Tom Field with Frank Walsh
Virtual Roundtable
Fraud Fighting 2022: How to Win the Battle Against Bots
Discussion topics will include:
As enterprises globally have shifted more of their operations online, cyber adversaries have doubled down on the use of bots to automate and increase the scale of their attacks.

According to recent research from Enterprise Strategy Group, nearly half (47%) of cybersecurity professionals have seen examples of credential stuffing or cracking attacks used for account takeover in just the past 6 months. And 46% are aware of attacks on online shopping cart systems and instances of automated inventory purchasing or...
Virtual
Roundtable
Wednesday, December 8th, 2021
Dan Gunderman
Wolf Goerlich
Dan Gunderman with Wolf Goerlich
Virtual Roundtable
Envisioning a Passwordless World
Discussion topics will include:
For almost all organizations, passwords are a necessary part of day-to-day work, but security leaders and CISOs know that passwords are the weak link in any security chain. Passwords are easily hacked or compromised by attackers, and trying to ensure that workers and employees follow basic cyber hygiene, including resetting passwords on a regular basis, is a nearly impossible task.

Organizations need a fresh approach, one that combines the best of how multifactor authentication works with technologies such as biometrics,...
Virtual
Roundtable
Wednesday, December 8th, 2021
Anna Delaney
Chris Cochran
Anna Delaney with Chris Cochran
Virtual Roundtable
New Approaches to Asset Management in Cybersecurity
Discussion topics will include:
The proliferation of mobile and IoT devices adds a new, unprecedented degree of complexity that security teams are left scrambling to solve: How do you account for and secure these ephemeral devices when you often can’t even identify them in real-time?

Furthermore, traditional approaches to IT asset management have not scaled to the modern cloud deployment and leave us with limited visibility and gaps in our security coverage. A new approach is required.

Discussion topics will include:
How asset management...
Virtual
Roundtable
Wednesday, December 8th, 2021
Suparna Goswami
Deepak Prasad
Suparna Goswami with Deepak Prasad
Virtual Roundtable
Cybersecurity-Driven Digital Transformation
Discussion topics will include:
With the acceleration of digital transformation, cybersecurity has risen to the forefront of concerns for enterprises around the world. On top of that, the velocity of threats is increasing and attackers are using new, sophisticated ways of infiltrating your production environment as well as your software supply chain. Digital Transformation migration to the cloud leads to new opportunities for security transformation, but how are enterprise taking a ‘shift left’ approach while moving applications to the cloud? Are detection tools more...
Virtual
Roundtable
Tuesday, December 7th, 2021
Dan Gunderman
Wolf Goerlich
Dan Gunderman with Wolf Goerlich
Virtual Roundtable
Envisioning a Passwordless World
Discussion topics will include:
For almost all organizations, passwords are a necessary part of day-to-day work, but security leaders and CISOs know that passwords are the weak link in any security chain. Passwords are easily hacked or compromised by attackers, and trying to ensure that workers and employees follow basic cyber hygiene, including resetting passwords on a regular basis, is a nearly impossible task.

Organizations need a fresh approach, one that combines the best of how multifactor authentication works with technologies such as biometrics,...
Virtual
Roundtable
Tuesday, December 7th, 2021
Jeremy Kirk
Mike Britton
Jeremy Kirk with Mike Britton
Virtual Roundtable
Supply Chain Attacks: Defending Against Vendor Email Compromise
Discussion topics will include:
Vendor email compromise (VEC) is a significant security threat to organizations. According to research from Abnormal Security, the percentage of companies who received a VEC attack increased 156% from July 2020 to June 2021, as threat actors increasingly see communications between vendors and customers as the weakest link.

It’s clear traditional email defenses were not designed to stop socially-engineered attacks. Without a new approach, high-profile attacks such as SolarWinds and Colonial Pipeline, will continue to cause severe financial losses and...
Virtual
Roundtable
Thursday, December 2nd, 2021
Dan Gunderman
Helen Patton
Dan Gunderman with Helen Patton
Virtual Roundtable
How Government Agencies Can Start Adopting ‘Zero Trust’ Right Now
Discussion topics will include:
In May, President Joe Biden signed an executive order compelling U.S. government departments and agencies to adopt several new cybersecurity practices, including deploying “zero trust” architectures designed to mitigate threats such as supply chain and ransomware attacks that have become an area of concern.

And while federal agencies are now compelled to deploy zero trust, how they get there within the tight timelines detailed in the executive order is less specific. It will require new thinking about how to deploy...
Virtual
Roundtable
Thursday, December 2nd, 2021
Tom Field
Dan Fabbri
Tom Field with Dan Fabbri
Virtual Roundtable
Designing the Next Generation of Zero Trust
Discussion topics will include:
Zero Trust: It has become one of the biggest – and most misunderstood – buzzwords in cybersecurity. The model encourages the implementation of strong controls, methods and protocols surrounding access to critical systems and data.

Yet, while Zero Trust is a popular way to enhance cybersecurity controls in the COVID era, it has its challenges and limitations. If the access granted through Zero Trust is not reviewed periodically, it could potentially lead to the creation of an “access creep” or...
Virtual
Roundtable
Thursday, December 2nd, 2021
Mathew Schwartz
Rachel Cook
Mathew Schwartz with Rachel Cook
Virtual Roundtable
Strategies to Defend Your Multi & Hybrid Cloud Infrastructure
Discussion topics will include:
The ongoing need for digital transformation continues to drive more organizations into the cloud, bringing their apps and data with them. But managing the underlying infrastructure, working with different hyperscalers – large cloud and networking providers – as well as overseeing multiple private clouds, public clouds and edge environments remains a complex undertaking. One insecure API or server misconfiguration, and organizations risk being hit by criminal hackers and suffering long-term financial or reputational damage.

Join us for a limited seat,...
Virtual
Roundtable
Thursday, December 2nd, 2021
Anna Delaney
Martin Lee
Anna Delaney with Martin Lee
Virtual Roundtable
A New Approach to Endpoint Security
Discussion topics will include:
Today’s antivirus solutions can identify and block many types of malware easily. But how confident are you that your endpoint protection is detecting more stealthy techniques, such as malicious content hiding inside a legitimate piece of software which is then distributed through the update mechanism? In order to keep up with the criminals, a new approach to endpoint security is required.

How can you deploy endpoint protection on every system, making sure that the detection is actually enabled? How can...
Virtual
Roundtable
Wednesday, December 1st, 2021
Tom Field
Partha Panda
Tom Field with Partha Panda
Virtual Roundtable
Modernizing the SOC: How High-Velocity Enterprises Must Evolve to Meet Today’s Business and IT Needs
Discussion topics will include:
Your company is a fast-moving disruptive force that’s changing your industry and leap frogging slow-moving incumbents. You recognize the value of speed and have embraced a cloud-first approach to your technology infrastructure.

But high-velocity companies need a modern security strategy that supports their aggressive ambitions, can scale with growth and doesn’t rely on an outdated security operations center or staffing it with a team of hard-to-find security experts.

Leap forward. Register for this executive roundtable to gain key insights about...
Virtual
Roundtable
Tuesday, November 30th, 2021
Deepak Daswani
María García Iñañez
Deepak Daswani with María García Iñañez
Virtual Roundtable
Pasos clave para la aplicación de Secure Access Service Edge (SASE)
Discussion topics will include:
Hoy en día, el mayor reto para los CISOs es asegurar todos los espacios de trabajo, ya sea una oficina en casa, una oficina tradicional, una sucursal ERP o una combinación de las tres. Entonces, ¿cómo proporcionar una "seguridad coherente" para cada espacio de trabajo? Ante la necesidad de simplificar unas soluciones de seguridad cada vez más complejas, las empresas están adoptando Secure Access Service Edge (SASE).

En este nuevo escenario, es necesario responder a múltiples preguntas que surgen de...
Virtual
Roundtable
Tuesday, November 30th, 2021
Suparna Goswami
Deepak Prasad
Suparna Goswami with Deepak Prasad
Virtual Roundtable
Putting Identity a Core to Your Zero Trust Journey
Discussion topics will include:
While all industries have undergone drastic change in the way they are operating in a hybrid model, the impact on regulated industries including the financial industry has been particularly high. The change has forged a new perimeter: identity, whether human or non-human. The risk now is from any endpoint, anywhere in the world, which could potentially gain access to your systems – whether on premise or in the cloud.

How can CISOs adapt and enable business agility without compromising security?...
Virtual
Roundtable
Wednesday, November 24th, 2021
Richard Archdecon
Georg Holzach
Richard Archdecon with Georg Holzach
Virtual Roundtable
Envisioning a Passwordless World
Discussion topics will include:
For almost all organizations, passwords are a necessary part of day-to-day work, but security leaders and CISOs know that passwords are the weak link in any security chain. Passwords are easily hacked or compromised by attackers, and trying to ensure that workers and employees follow basic cyber hygiene, including resetting passwords on a regular basis, is a nearly impossible task.

Organizations need a fresh approach, one that combines the best of how multifactor authentication works with technologies such as biometrics,...
Virtual
Roundtable
Wednesday, November 24th, 2021
Suparna Goswami
Sandeep Patil
Suparna Goswami with Sandeep Patil
Virtual Roundtable
Future-Proofing Security Operations: Innovations and Best Practice for Your Enterprise
Discussion topics will include:
Too many endpoints. Too much data and little context. While these were issues before the pandemic, post pandemic, these issues have further magnified. While cloud migration has been essential, it generates more data, making it all the more essential to make sense of these data. What has been the impact of these rapid business changes on security? Is there also an opportunity to completely modernize security operations?

What are you doing today to streamline and modernize the efficiency of your...
Virtual
Roundtable
Thursday, November 18th, 2021
Tom Field
MK Palmore
Tom Field with MK Palmore
Virtual Roundtable
Combating the Modern Ransomware Threat
Discussion topics will include:
With threats growing in volume and sophistication, today’s ransomware attacks easily outpace many organizations’ defensive capabilities. Globally, enterprises of all sizes and sectors are being compromised and held hostage by ransomware, with many being forced to pay millions in ransom because they’re ill-equipped to combat their adversaries.

This trend intersects with the continued rise of digital business and represents a new magnitude of risk. It’s imperative, then, to understand your adversaries and re-examine your security posture so that you may...
Virtual
Roundtable
Thursday, November 18th, 2021
Dan Gunderman
Dave Lewis
Dan Gunderman with Dave Lewis
Virtual Roundtable
The Security Debt Crisis – How to Catch Up on Past Due Patches and Neglected Risk
Discussion topics will include:
There is a common theme for many of the mega breaches of recent years – a neglect of basic cybersecurity hygiene that has resulted in a backlog of unpatched apps, misapplied configurations and overlooked tasks. This debt compounds over time and, as with financial debt can snowball to reach a point, where it becomes insurmountable. As organizations increasingly become cloud first, the risk profile from security debt further increases.

So, what can be done to claw back control of security...
Virtual
Roundtable
Thursday, November 18th, 2021
Anna Delaney
Richard Archdecon
Anna Delaney with Richard Archdecon
Virtual Roundtable
Envisioning a Passwordless World
Discussion topics will include:
For almost all organizations, passwords are a necessary part of day-to-day work, but security leaders and CISOs know that passwords are the weak link in any security chain. Passwords are easily hacked or compromised by attackers, and trying to ensure that workers and employees follow basic cyber hygiene, including resetting passwords on a regular basis, is a nearly impossible task.

Organizations need a fresh approach, one that combines the best of how multifactor authentication works with technologies such as biometrics,...
Virtual
Roundtable
Thursday, November 18th, 2021
Timothée Bardet
Roger Sels
Timothée Bardet with Roger Sels
Virtual Roundtable
Comment sécuriser infrastructures IT et endpoints à l’heure de la mobilité ?
Discussion topics will include:
Cette année a été marquée par une explosion d’événements de sécurité et de cyber incidents majeurs, ainsi qu’une généralisation forcée la mobilité. Cela pose des questions et défis quotidiens pour les dirigeants IT. Non seulement les équipes de sécurité ont besoin de toujours plus de visibilité sur des endpoints et des réseaux en nombre et en complexité croissants, mais elles doivent également mieux analyser, prioriser et s’adapter aux menaces changeantes. En effet avec une augmentation de la surface d’attaque, l’explosion...
Virtual
Roundtable
Wednesday, November 17th, 2021
Chris Wysopal
Jeremy Kirk
Chris Wysopal with Jeremy Kirk
Virtual Roundtable
Software Security: How to Prioritize, Measure and Convey It To the Board
Discussion topics will include:
Amidst the shifting threat landscape, cloud migration and ongoing digital transformation, software security is often low or even last on the list of priorities for security leaders to address.

Yet, with the recent executive order on cybersecurity, and as headlines continue to feature high-profile breaches, board members at organizations across all industries are taking notice. Even though there are often designated technical experts on boards, there is now an increased awareness around cybersecurity – especially software security – even among...
Virtual
Roundtable
Wednesday, November 17th, 2021
Tom Field
Ben Smith
Tom Field with Ben Smith
Virtual Roundtable
Operationalizing the MITRE ATT&CK Framework
Discussion topics will include:
Too many enterprises today are in a reactive, firefighting mode when it comes to incident response. The MITRE ATT&CK framework is gaining popularity as a structured way to approach vulnerabilities, threats and remediation. Yet a recent study showed that even though 82% of cybersecurity professionals are familiar with the MITRE ATT&CK framework, only 8% said they used it regularly. The challenge: How to operationalize the framework.

Register for this executive roundtable to gain key insights about putting MITRE ATT&CK to...
Virtual
Roundtable
Tuesday, November 16th, 2021
Mary Yang
Dan Gunderman
Mary Yang with Dan Gunderman
Virtual Roundtable
Securing Critical Infrastructure: What it Means for Your Organization
Discussion topics will include:
From SolarWinds to nation-state actors targeting vulnerable Exchange email servers to the ransomware attacks against Colonial Pipeline, the security of critical infrastructure has been at the forefront of nearly every cybersecurity conversation since the beginning of the year.

President Biden’s executive order also added to the discussion as the federal government is now poised to revamp its security posture to meet these new challenges.

But what do these changes mean for other private sector organizations? How will potential legislation such...
Virtual
Roundtable
Tuesday, November 16th, 2021
Tom Field
David Balcar
Tom Field with David Balcar
Virtual Roundtable
Business Risk: Which Attacks Can Shut You Down?
Discussion topics will include:
When it comes to cybersecurity in the manufacturing sector, there are generalized threats – phishing, account takeover, insider risk – that can be a nuisance, incur costs or even inflict reputational damage.

But then there are the serious threats – ransomware, supply-chain attacks, product or production tampering – that actually can shut down your business. The key is to be able to distinguish between the different categories of threats and focus most on the ones that can do the worst...
Virtual
Roundtable
Thursday, November 11th, 2021
Suparna Goswami
David Fairman
Suparna Goswami with David Fairman
Virtual Roundtable
Cloud Security: Building Defense using ‘Zero Trust’
Discussion topics will include:
Enterprises are increasingly relying on cloud-based infrastructure and services that are accessible from anywhere. With data no longer in an environment that can be controlled, security teams have been forced to rethink the way they protect their enterprises and their data.

Although there’s been a lot of discussion about zero trust strategies, not every organization has had the time or resource to fully explore what the model means for their security. At the same time, security leaders must grapple with...
Virtual
Roundtable
Wednesday, November 10th, 2021
Dan Gunderman
Jerome Ferrara
Dan Gunderman with Jerome Ferrara
Virtual Roundtable
State of Hybrid Work: Why Credential Management Still Matters
Discussion topics will include:
With hybrid and remote work likely to continue well into 2022, CISOs and their teams are continuing to find the best ways to secure the credentials of employees who are accessing applications and devices from a variety of locations. At the same time, workers need ready access to the resources while lines of business managers seek out ways to reduce friction to allow for the most productivity.

Organizations need a holistic approach to credential and password management. In addition to...
Virtual
Roundtable
Tuesday, November 9th, 2021
Tom Field
Kurt Roemer
Tom Field with Kurt Roemer
Virtual Roundtable
Disruptive Defense: How to Turn the Tables on Ransomware
Discussion topics will include:
The Kaseya VSA ransomware incident that impacted scores of MSPs and hundreds of enterprises globally is just the latest example: The world is being held hostage by ransomware adversaries who grow only bigger and bolder with each new success.

While essential practices somewhat stem the tide, resilience to ransomware requires much more than the latest patch or update. Disruptive innovation – past, present and future – is the theme of this discussion, where we will explore novel ransomware mitigations.

Discussion...
Virtual
Roundtable
Tuesday, November 9th, 2021
Riccardo Meggiato
Alessandro Dinia
Riccardo Meggiato with Alessandro Dinia
Virtual Roundtable
Gestione degli aggiornamenti per contrastare ransomware e minacce di nuova generazione
Discussion topics will include:
Continua ad aumentare il numero di nuove vulnerabilità scoperte, con oltre 18000 rese pubbliche solo lo scorso anno. Del resto, poche risorse e tempo limitato continuano a essere un problema, nella comunità della cybersecurity: cosa fare per risolverlo?

In particolare, come possiamo allineare i dati che abbiamo sulle vulnerabilità più critiche con le patch necessarie, per correggere almeno il 10% delle più pericolose?

Iscrivetevi a questo evento dedicato agli esperti del settore, che offre approfondimenti su come integrare informazioni sulle...
Virtual
Roundtable
Tuesday, November 9th, 2021
Anna Delaney
Chip Witt
Anna Delaney with Chip Witt
Virtual Roundtable
Throw Away the Key(logger): Strategies for Protecting Users from Malware
Discussion topics will include:
Despite your team’s best efforts to protect corporate systems from malware, users tend to click before thinking. At work, corporate security software may catch wind of an illegitimate download before it causes much damage. On personal devices, however, your employees have fewer layers of protection – and the same goes for consumers using your services.

Botnets can provide criminals with a complete picture of your users’ online activity, making it easy for them to impersonate victims and take over even...
Ruth's Chris Steak House
In-Person
Roundtable
Thursday, November 4th, 2021
Ruth's Chris Steak House
Tom Field
Chris Pierson
Tom Field with Chris Pierson
In-Person Roundtable
Executive Protection for Digital Lives – What CIOs and CISOs Need to Consider Beyond the Office
Discussion topics will include:
Senior leaders’ unified digital life mingling personal and professional data and devices has become the soft underbelly of corporate cybersecurity. Therefore, CEOs and their CISOs need to extend the defense perimeter and protect the entire digital lives of all executives and key personnel. Some statistics:

- 27% of executives have malware on their personal devices
- 20% of executives’ homes are digitally compromised
- 69% of executive’s personal passwords are on the Dark Web
- 75% have improper privacy and...
Virtual
Roundtable
Thursday, November 4th, 2021
Dan Gunderman
Dave Lewis
Dan Gunderman with Dave Lewis
Virtual Roundtable
The Security Debt Crisis – How to Catch Up on Past Due Patches and Neglected Risk
Discussion topics will include:
There is a common theme for many of the mega breaches of recent years – a neglect of basic cybersecurity hygiene that has resulted in a backlog of unpatched apps, misapplied configurations and overlooked tasks. This debt compounds over time and, as with financial debt can snowball to reach a point, where it becomes insurmountable. As organizations increasingly become cloud first, the risk profile from security debt further increases.

So, what can be done to claw back control of security...
Virtual
Roundtable
Wednesday, November 3rd, 2021
Kelvin Franklin
Dan Gunderman
Kelvin Franklin with Dan Gunderman
Virtual Roundtable
Reducing Ransomware Through Micro-Segmentation
Discussion topics will include:
Ransomware is one of the greatest challenges facing CISOs and their security teams today. Not only are these attacks complicated to deal with due to the types of crypto-locking malware that cybercriminal gangs wield, but recovering from this type of attack can be an expensive process thanks to the damage these incidents can inflict on an organization’s infrastructure.

Organizations require a fresh approach to combating ransomware to limit the ability of attackers to move laterally through the infrastructure and find...
Virtual
Roundtable
Wednesday, November 3rd, 2021
Anna Delaney
Shashi Prakash
Anna Delaney with Shashi Prakash
Virtual Roundtable
Why Protecting Your Internet Attack Surface Matters More Than Ever
Discussion topics will include:
As organizations continue to increase their presence online every year, their internet attack surface continues to grow while becoming ever more complex to protect. This not only includes fraudsters creating fake domains to impersonate legitimate websites, but also increases in typosquatting attacks, trademark infringement and vendor email compromise schemes, which are a growing area of concern for the FBI.

For CISOs and their teams, protecting against these types of attacks and fraud is an ever-growing concern, especially when much of...
Virtual
Roundtable
Tuesday, November 2nd, 2021
Aaron Cockerill
Tom Field
Aaron Cockerill with Tom Field
Virtual Roundtable
From Endpoint to Cloud: Achieving Zero Trust for Enterprises
Discussion topics will include:
The global reliance on cloud-based infrastructure and services that are accessible from any device, has prompted security teams to rethink the way they protect their organizations. To support this new and agile way of working, security leaders need to be able to balance end-user privacy with security to protect users and corporate data from phishing, malware, and other threats. At the same time, too little freedom causes employee dissatisfaction, reduced agility and collaboration.

How can you enable employees to be...
Virtual
Roundtable
Tuesday, November 2nd, 2021
Dan Gunderman
Jerome Ferrara
Dan Gunderman with Jerome Ferrara
Virtual Roundtable
State of Hybrid Work: Why Credential Management Still Matters
Discussion topics will include:
With hybrid and remote work likely to continue well into 2022, CISOs and their teams are continuing to find the best ways to secure the credentials of employees who are accessing applications and devices from a variety of locations. At the same time, workers need ready access to the resources while lines of business managers seek out ways to reduce friction to allow for the most productivity.

Organizations need a holistic approach to credential and password management. In addition to...
Virtual
Roundtable
Tuesday, November 2nd, 2021
Tony Morbin
Gwyndaf Davies
Tony Morbin with Gwyndaf Davies
Virtual Roundtable
What to do About Patch Management Overload
Discussion topics will include:
Newly discovered vulnerabilities continue to increase, with more than 18,000 published last year alone. Resources and limited time continue to be an issue amongst the Cyber Security Community, so what can be done to rectify this?

In particular, how do we align the most critical vulnerability data with the right patches to ensure we can, at least, get the top 10% addressed?

Discussion topics will include:
How you can integrate patch information and vulnerability data to improve your overall security...
Virtual
Roundtable
Thursday, October 28th, 2021
Tom Field
Partha Panda
Tom Field with Partha Panda
Virtual Roundtable
Modernizing the SOC: How High-Velocity Enterprises Must Evolve to Meet Today’s Business and IT Needs
Discussion topics will include:
Your company is a fast-moving disruptive force that’s changing your industry and leap frogging slow-moving incumbents. You recognize the value of speed and have embraced a cloud-first approach to your technology infrastructure.

But high-velocity companies need a modern security strategy that supports their aggressive ambitions, can scale with growth and doesn’t rely on an outdated security operations center or staffing it with a team of hard-to-find security experts.

Leap forward. Register for this executive roundtable to gain key insights about...
Virtual
Roundtable
Thursday, October 28th, 2021
Anna Delaney
Martyna Lubińska
Anna Delaney with Martyna Lubińska
Virtual Roundtable
A New Game Plan to Combat Ransomware Attacks
Discussion topics will include:
We are in the midst of a ransomware pandemic. The list of victims is long and only growing – City of Liège, Maastricht University, Kaseya, Colonial Pipeline, to name a few. Whilst traditional antivirus and endpoint detection and response tools, along with user education, are part of the solution, they’re not always enough to prevent ransomware from infecting and spreading within organizations’ networks.

So how do we avoid being the next victim? What is being overlooked in our current defenses?...
Virtual
Roundtable
Thursday, October 28th, 2021
Timothée Bardet
Jean-Sébastien Milliere
Timothée Bardet with Jean-Sébastien Milliere
Virtual Roundtable
Sécuriser le «travail hybride» avec votre infrastructure actuelle
Discussion topics will include:
L’année dernière ne restera pas seulement dans les mémoires comme l’année où les entreprises ont rapidement déplacé leurs applications en cloud et en SaaS pour assurer la continuité de leurs activités. Elle a également été marquée par une explosion d’événements de sécurité et de cyber incidents.

Alors que le mode de travail “à distance” est appelé à perdurer, comment assurer la sécurité de toutes les données et de tous les appareils de votre organisation, tout en tirant parti de votre...
Virtual
Roundtable
Wednesday, October 27th, 2021
Tom Field
Matthew Goodwin
Tom Field with Matthew Goodwin
Virtual Roundtable
Marching Orders: Understanding and Meeting the Biden Administration’s New Cybersecurity Standards
Discussion topics will include:
First there was President Biden’s cybersecurity executive order. Then came his Industrial Control System Cybersecurity Initiative. And most recently we’ve seen a new package of supply chain and critical infrastructure security plans launched in conjunction with a White House summit, including the nation’s top technology, financial services and infrastructure leaders.

The sum of all these administrative actions: a renewed focus on critical infrastructure defense, supply chain security, DevSecOps and the zero-trust security model. As these initiatives trickle down from federal...
Virtual
Roundtable
Wednesday, October 27th, 2021
Kelvin Franklin
Dan Gunderman
Kelvin Franklin with Dan Gunderman
Virtual Roundtable
Reducing Ransomware Through Micro-Segmentation
Discussion topics will include:
Ransomware is one of the greatest challenges facing CISOs and their security teams today. Not only are these attacks complicated to deal with due to the types of crypto-locking malware that cybercriminal gangs wield, but recovering from this type of attack can be an expensive process thanks to the damage these incidents can inflict on an organization’s infrastructure.

Organizations require a fresh approach to combating ransomware to limit the ability of attackers to move laterally through the infrastructure and find...
Virtual
Roundtable
Tuesday, October 26th, 2021
Tom Kellermann
Tom Field
Tom Kellermann with Tom Field
Virtual Roundtable
Modern Bank Heists: What You Need to Know About the Latest Fraud Trends – and the Fraudsters
Discussion topics will include:
We are only halfway through 2021, but it’s already clear that financial fraud threats are trending far beyond traditional account takeover. Large banking institutions are no longer the only place where e-criminals can steal money. Any company that uses any type of online banking system (virtually 100% of companies) can be hacked via new routes including payment card fraud and synthetic IDs.

With so many emerging angles cybercriminals are taking, how do you ensure you have an omni-channel strategy to...
Virtual
Roundtable
Tuesday, October 26th, 2021
Dan Gunderman
Jerome Ferrara
Dan Gunderman with Jerome Ferrara
Virtual Roundtable
State of Hybrid Work: Why Credential Management Still Matters
Discussion topics will include:
With hybrid and remote work likely to continue well into 2022, CISOs and their teams are continuing to find the best ways to secure the credentials of employees who are accessing applications and devices from a variety of locations. At the same time, workers need ready access to the resources while lines of business managers seek out ways to reduce friction to allow for the most productivity.

Organizations need a holistic approach to credential and password management. In addition to...
Virtual
Roundtable
Tuesday, October 26th, 2021
Anna Delaney
Martin Lee
Anna Delaney with Martin Lee
Virtual Roundtable
A New Approach to Endpoint Security
Discussion topics will include:
Today’s antivirus solutions can identify and block many types of malware easily. But how confident are you that your endpoint protection is detecting more stealthy techniques, such as malicious content hiding inside a legitimate piece of software which is then distributed through the update mechanism? In order to keep up with the criminals, a new approach to endpoint security is required.

How can you deploy endpoint protection on every system, making sure that the detection is actually enabled? How can...
Virtual
Roundtable
Thursday, October 21st, 2021
Timothée Bardet
Jean-Sébastien Milliere
Timothée Bardet with Jean-Sébastien Milliere
Virtual Roundtable
Quelles étapes clés pour mettre en place un SASE ?
Discussion topics will include:
Aujourd’hui, le plus grand défi pour les RSSI est de sécuriser tous les effectifs, qu’il s’agisse d’un bureau à domicile, d’une succursale traditionnelle, d’une succursale au sein d’un ERP ou d’une combinaison des trois. Comment dès lors fournir une “sécurité cohérente” pour chaque espace de travail ? Face à la nécessité de simplifier des solutions de sécurité de plus en plus complexes, les entreprises adoptent le service d’accès sécurisé Edge, ou SASE.

Quels sont les principaux facteurs qui empêchent les...
Virtual
Roundtable
Thursday, October 21st, 2021
Ivan Lai
Geetha Nandikotkur
Ivan Lai with Geetha Nandikotkur
Virtual Roundtable
Establishing a Risk-Based Approach to Authenticate and Authorize Identities
Discussion topics will include:
With Identity as the new perimeter and the distributed workforce using multiple devices during the pandemic, enterprises aspire to a well-orchestrated technology and tool that could offer well-defined authentication and authorization to secure user identities.

As a CISO, have you witnessed increased operational risks and security challenges in supporting your remote workforce? Are you able to provide the right user access, authentication, and control to the users accessing through multiple devices? Are you able to assess and adjust risk parameters...
Virtual
Roundtable
Wednesday, October 20th, 2021
Dan Gunderman
Wolf Goerlich
Dan Gunderman with Wolf Goerlich
Virtual Roundtable
Envisioning a Passwordless World
Discussion topics will include:
For almost all organizations, passwords are a necessary part of day-to-day work, but security leaders and CISOs know that passwords are the weak link in any security chain. Passwords are easily hacked or compromised by attackers, and trying to ensure that workers and employees follow basic cyber hygiene, including resetting passwords on a regular basis, is a nearly impossible task.

Organizations need a fresh approach, one that combines the best of how multifactor authentication works with technologies such as biometrics,...
Virtual
Roundtable
Wednesday, October 20th, 2021
Martyna Lubińska
Tom Field
Martyna Lubińska with Tom Field
Virtual Roundtable
Marching Orders: Understanding and Meeting the Biden Administration’s New Cybersecurity Standards
Discussion topics will include:
First there was President Biden’s cybersecurity executive order. Then came his Industrial Control System Cybersecurity Initiative. And most recently we’ve seen a new package of supply chain and critical infrastructure security plans launched in conjunction with a White House summit, including the nation’s top technology, financial services and infrastructure leaders.

The sum of all these administrative actions: a renewed focus on critical infrastructure defense, supply chain security, DevSecOps and the zero-trust security model. As these initiatives trickle down from federal...
Virtual
Roundtable
Wednesday, October 20th, 2021
Anna Delaney
Tom Davison
Anna Delaney with Tom Davison
Virtual Roundtable
How to Secure Remote Access: From Endpoint to Cloud
Discussion topics will include:
Cloud applications such as Office 365, Salesforce.com, ServiceNow, SAP, and others have become vital for any organization to operate and remain productive.

Compound this with managing corporate and mobile devices in a world where the network perimeter is being eroded and you have a real challenge on your hands.

Security professionals need a way to securely enable cloud access while maintaining visibility, control, and protecting corporate data. However, as the SolarWinds supply chain attacks recently illustrated, relying on native controls...
Virtual
Roundtable
Wednesday, October 20th, 2021
Anna Delaney
Richard Archdecon
Anna Delaney with Richard Archdecon
Virtual Roundtable
The Security Debt Crisis – How to Catch Up on Past Due Patches and Neglected Risk
Discussion topics will include:
There is a common theme for many of the mega breaches of recent years – a neglect of basic cybersecurity hygiene that has resulted in a backlog of unpatched apps, misapplied configurations and overlooked tasks. This debt compounds over time and, as with financial debt can snowball to reach a point, where it becomes insurmountable. As organizations become increasingly cloud first, the risk profile from security debt further increases.

So, what can be done to claw back control of security...
Vic & Anthony's Steakhouse
In-Person
Roundtable
Tuesday, October 19th, 2021
Vic & Anthony's Steakhouse
Tom Field
John Nowotny
Tom Field with John Nowotny
In-Person Roundtable
Why Security Programs Fail and What Can Be Done to Improve Cybersecurity
Discussion topics will include:
Each year, organizations spend billions on their security operations centers or security programs and sustain data breaches despite the investments they’ve made.

One study found that during the first three quarters of 2020, the total number of reported data breaches for the year was already approaching 3,000 and 36 billion records had been exposed.

These numbers show the failure of security programs to keep up with the threats that organizations are facing – and this will remain so as long...
Virtual
Roundtable
Tuesday, October 19th, 2021
Anna Delaney
Shashi Prakash
Anna Delaney with Shashi Prakash
Virtual Roundtable
Why Protecting Your Internet Attack Surface Matters More Than Ever
Discussion topics will include:
As organizations continue to increase their presence online every year, their internet attack surface continues to grow while becoming ever more complex to protect. This not only includes fraudsters creating fake domains to impersonate legitimate websites, but also increases in typosquatting attacks, trademark infringement and vendor email compromise schemes, which are a growing area of concern for the FBI.

For CISOs and their teams, protecting against these types of attacks and fraud is an ever-growing concern, especially when much of...
Virtual
Roundtable
Thursday, October 14th, 2021
Tom Field
Chip Witt
Tom Field with Chip Witt
Virtual Roundtable
Throw Away the Key(logger): Strategies for Protecting Users from Malware
Discussion topics will include:
Despite your team’s best efforts to protect corporate systems from malware, users tend to click before thinking. At work, corporate security software may catch wind of an illegitimate download before it causes much damage. On personal devices, however, your employees have fewer layers of protection – and the same goes for consumers using your services.

Botnets can provide criminals with a complete picture of your users’ online activity, making it easy for them to impersonate victims and take over even...
Virtual
Roundtable
Thursday, October 14th, 2021
Anna Delaney
Chris Finan
Anna Delaney with Chris Finan
Virtual Roundtable
MDR: Cybersecurity Essentials to Beat Ransomware
Discussion topics will include:
Ransomware cybercriminals are becoming increasingly sophisticated and organized, using techniques such as double and triple extortion, targeting vital infrastructure and teaming up with affiliate groups.

With the diversity and complexity of threats on the rise too, security teams find themselves drowning in data and overwhelmed by the immense volume of alerts, many of them false positives. How can organizations cut through the noise and accelerate incident detection and response times?

Register for this executive roundtable for new insights and discussion...
Virtual
Roundtable
Tuesday, October 12th, 2021
Tom Field
Victor Danevich
Tom Field with Victor Danevich
Virtual Roundtable
Defining and Securing Your 'Protect Surface'
Discussion topics will include:
The ‘Protect Surface’, coined by John Kindervag, is elemental to executing a Zero Trust strategy – the idea is that instead of trying to protect the entire attack surface which now extends throughout the Internet, identify your key assets and make sure they are segmented within a small protected area with strong authentication access rules and controls, such as:
Segmentation Gateway as a Next-Gen Firewall
Access Enforcement at the Gateway
Applying Multi-Factor Authentication

The enemy of securing the Protect Surface?...
Virtual
Roundtable
Tuesday, October 12th, 2021
Anna Delaney
Martyna Lubińska
Anna Delaney with Martyna Lubińska
Virtual Roundtable
Adopting the Attacker's Mindset to Protect The Hybrid Workforce
Discussion topics will include:
Our new hybrid workforce is an established reality and attackers no longer need to execute direct attacks, instead, they can now leverage the supply chain in order to accelerate and distribute.

What new tactics are criminals employing and how are they distributing attacks to take advantage of the hybrid model? What is being overlooked in our current defences? How are the attackers succeeding despite our defences?

Register for this executive roundtable for new insights and discussion about:
Defence strategies that...
Virtual
Roundtable
Thursday, October 7th, 2021
Aaron Cockerill
Scott Ferguson
Aaron Cockerill with Scott Ferguson
Virtual Roundtable
Throw Away the Key(logger): Strategies for Protecting Users from Malware
Discussion topics will include:
Despite your team’s best efforts to protect corporate systems from malware, users tend to click before thinking. At work, corporate security software may catch wind of an illegitimate download before it causes much damage. On personal devices, however, your employees have fewer layers of protection – and the same goes for consumers using your services.

Botnets can provide criminals with a complete picture of your users’ online activity, making it easy for them to impersonate victims and take over even...