Highlight Topics
- Enhancing Your Security Posture
- Third Party Risk Management
- Cyber Governance
- 5G Network Security and Business Opportunities
- Zero Trust
ISMG Summits feature carefully curated agendas delivering keynotes from industry luminaries, case-based learning, solution room workshops, private roundtable discussions, one-to-one networking and more. Our geo-targeted, industry-specific, and topic-driven events provide actionable education for security leaders’ top priorities and challenges.
View our ISMG Event Experience video to see what your peers are saying about their participation.
TBC
NOTE: All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats
You can bet that their CISOs have responded to today’s challenges, and have a vision for what the CISO role will evolve to tomorrow and beyond.
One of our guests is the former CISO of the City of Toronto, and the other is current VP and CISO of RBC. We still have seats left on this panel discussion which will explore:
“Passwords must be eliminated,” he says, and in this exclusive session he explains not just why, but how:
In this talk, we will share updates to the insights that he first shared over four years ago. We will discuss how the opportunities and accountability afforded to developers need better support from employers and the vendor community. There will be practical advice to rise to the challenge.
You will learn about:
The Solution Room is an interactive and dynamic conference session designed to bring Cybersecurity Leaders together and provide peer-to-peer learning and SME advice on their most pressing challenges.
At the beginning of The Solution Room session, attendees will be broken into small groups. In your group, you’ll receive help from your peers, a moderator and a Secret Service Agent as you work through the lifecycle of a Business Email Compromise.
The US Secret Service has extensive experience and expertise in investigating and preventing BEC attacks. They have a proven track record of successfully identifying, disrupting, and prosecuting cybercriminals involved in BEC schemes.
During this workshop on the anatomy of a BEC attack and its mutations, the US Secret Service will provide attendees the opportunity to learn from the experts and gain a deeper understanding of this type of cybercrime. Participants will hear about the latest forms of BEC attacks, including executive impersonation, invoice fraud, and supplier swindle, and understand the tactics and techniques used by attackers.
They will:
Zero Trust is an effective approach to securing access to applications and resources, but it still requires a comprehensive strategy to addressing human-related security threats. UEBA uses machine learning algorithms to detect and respond to anomalous behavior in users and devices, providing an additional layer of security to Zero Trust.
In this session you will explore:
By neglecting to prioritize comprehensive cybersecurity strategies, businesses expose themselves to increased risk and hinder their ability to successfully implement other technology projects. It is essential that executive leadership takes an active role in championing proper cybersecurity investments and ensuring they are a top priority in order to secure the business and maximize the potential of technology projects.
In this session we will explore:
Cyber insurance, when properly deployed, can help avoid and respond to incidents, as well as reduce the financial impact of such incidents. This session reviews hot topics in cyber insurance, and provides a road map to maximizing your insurance recovery in the event of a loss.
Key learning objectives:
ISMG Summits bring the foremost thought leaders and educators in the security space to the stage, interactive workshops and networking events. Learn from the “who’s who” in Cybersecurity passionate about the latest tools and technology to defend against threats
Engage offers Continuing Education Credits. Learn informative and engaging content created specifically for security professionals.
RSVP here to attend our events. You can select for multiple or individual tickets.
NOTE: All requests to attend will be reviewed by event staff and approved based on professional qualifications and event capacity.
Upcoming ISMG Events
Upcoming ISMG Events