>

ISMG’s Executive Roundtables are intimate, closed-door discussions focused on specific challenges being faced by information security executives in today’s cybersecurity landscape.  Moderated by one of ISMG’s Executive Editors and hosted over breakfast, lunch or dinner, Executive Roundtables provide senior cybersecurity professionals the opportunity to share their own experiences with an intimate group of peers and emerge with new strategies they can immediately put to work at their own organizations.

For more information on how ISMG is addressing the ongoing coronavirus concerns visit: https://events.ismg.io/coronavirus-guidelines/

GLOBAL ROUNDTABLE EVENTS

Ismg Executive Roundtable Dinner Atlanta Threat Hunting Ismg Executive Roundtable Sao Paulo 2018 Ismg Executive Roundtable Road To Business Driven Security Nyc Summit Ismg-Executive-Roundtable-Nyc-Web-App-Security Ismg Executive Roundtable Dinner Kansas City Business Driven Security Ismg Executive Roundtable Road To Business Driven Security Toronto Summit Ismg Executive Roundtable Toronto Open Source Components Ismg Executive Roundtable Dinner Nyc Financial Crimes

Upcoming Executive Roundtables

DateLocationCountryTopic
August 10thSoutheast U.S.U.S.Virtual Roundtable – Ensuring Security Across Your Hybrid Cloud Infrastructure
August 10thCentral U.S.U.S.Virtual Roundtable – Collective Defense: How to Optimize Your Resources and Data
August 12thSingaporeSingaporeVirtual Roundtable – How to Manage Vulnerabilities in Web Applications
August 12thWestern U.S.U.S.Virtual Roundtable – Ensuring Security Across Your Hybrid Cloud Infrastructure
August 17thU.K.I.EuropeVirtual Roundtable – Hybrid Cyber Resiliency: Beginning to Address the Gaps
August 18thCentral U.S.U.S.Virtual Roundtable – Ransomware: How to Reduce Your Likelihood of Being a Victim
August 18thSouthwest U.S.U.S.Virtual Roundtable – From Endpoint to Cloud: Achieving Zero Trust for Mobile Users
August 19thIndiaIndiaVirtual Roundtable – How to Manage Vulnerabilities in Web Applications
August 19thU.S.U.S.Virtual Roundtable – Protect Your Bank and Customers from Magecart-Type Attacks
August 24thU.K.I.EuropeVirtual Roundtable – Authentication as the Foundation of Zero Trust
August 25thOhio ValleyU.S.Virtual Roundtable – Defining and Securing Your 'Protect Surface'
August 26thU.S.U.S.Virtual Roundtable – Zero Trust and Your Passwordless Future
September 2ndDACHEuropeVirtual Roundtable – The Security Debt Crisis - How to Catch Up on Past Due Patches & Neglected Risk
September 7thFranceFranceVirtual Roundtable – Sécurité des endpoints à l'ère du Cloud : Comment maintenir une protection et une détection à tout moment et en tout lieu ?
September 8thNortheast U.S.U.S.Virtual Roundtable – Disruptive Defense: How to Turn the Tables on Ransomware
September 8thRocky MountainsU.S.Virtual Roundtable – Defining and Securing Your 'Protect Surface'
September 9thU.K.I.EuropeVirtual Roundtable – A New Game Plan to Combat Ransomware Attacks
September 9thS. Central U.S.U.S.Virtual Roundtable – The Security Debt Crisis - How to Catch Up on Past Due Patches & Neglected Risk
September 14thFranceFranceVirtual Roundtable – Comment renforcer la sécurité des nouveaux modes de travail ?
September 14thU.S.U.S.Virtual Roundtable – Why Brand Protection Is Now a Top CISO Priority
September 14thPacNWU.S.Virtual Roundtable – Taking the Zero Trust Journey
September 15thEMEAEMEAVirtual Roundtable – Financial Crimes Convergence: Break the Siloes Between Fraud and AML
September 15thEast CanadaCanadaVirtual Roundtable – Throw Away the Key(logger): Strategies for Protecting Users from Malware
September 16thSpainSpainVirtual Roundtable – Seguridad Endpoint en la Nube: Cómo proteger el objetivo principal de los atacantes
September 16thU.S.U.S.Virtual Roundtable – What CIOs and CISOs Need to Consider Beyond the Office
September 16thS. Central U.S.U.S.Virtual Roundtable – Reduce Data Breach Risk & Stay Compliant in the 'Infrastructure Everywhere' Environment
September 21stU.S.U.S.Virtual Roundtable – CIAM: New Strategies to Streamline and Optimize the Student Experience
September 22ndGlobalGlobalVirtual Roundtable – Healthcare Industry: How to Develop an Endpoint-to-Cloud Security Strategy
September 22ndU.S.U.S.Virtual Roundtable – Retail Security in a Time of Digital Transformation: Turning the Run into a Sprint
September 22ndSouthwest U.S.U.S.Virtual Roundtable – Disruptive Defense: How to Turn the Tables on Ransomware
September 23rdDACHEuropeVirtual Roundtable – Schwachstellen in Webapplikationen beseitigen
September 28thNordicsEuropeVirtual Roundtable – Identity as The New Perimeter
September 29thU.S.U.S.Virtual Roundtable – Beyond Digital Transformation: Securing Healthcare's Future
September 30thEMEAEuropeVirtual Roundtable – The Security Debt Crisis - How to Catch Up on Past Due Patches & Neglected Risk
September 30thS. Central U.S.U.S.Virtual Roundtable – Ensuring Security Across Your Hybrid Cloud Infrastructure
October 5thLATAMLATAMVirtual Roundtable – Taking the Zero Trust Journey
October 6thU.S.U.S.Virtual Roundtable – What CIOs and CISOs Need to Consider Beyond the Office
October 12thCentral U.S.U.S.Virtual Roundtable – Defining and Securing Your 'Protect Surface'
October 14thSouthwest U.S.U.S.Virtual Roundtable – Throw Away the Key(logger): Strategies for Protecting Users from Malware
October 19thHoustonU.S.Why SOCs Fail & What Can Be Done to Improve Cybersecurity
October 21stSoutheast U.S.U.S.Virtual Roundtable – Taking the Zero Trust Journey
October 26thU.S.U.S.Virtual Roundtable – What You Need to Know About the Latest Fraud Trends - and the Fraudsters

Past Executive Roundtables

MonthLocationCountryTopic
August 5U.K.I.EuropeVirtual RT – Password Management: Securing Hybrid Work for the Long Haul
August 4Western U.S.U.S.Virtual RT – Collective Defense: How to Optimize Your Resources and Data
August 4U.S.U.S.Virtual RT – Why Brand Protection Is Now a Top CISO Priority
August 3Mid-Atlantic U.S.U.S.Virtual RT – Security Debt Crisis - Catching Up on Past Due Patches & Neglected Risk
July 28S. Central U.S.U.S.Virtual RT – Disruptive Defense: How to Turn the Tables on Ransomware
July 28EMEAEMEAVirtual RT – Mitigating the Bad Botnet Pandemic
July 27Eastern U.S.U.S.Virtual RT – Collective Defense: How to Optimize Your Resources and Data
July 22U.S.U.S.Virtual RT – What CIOs and CISOs Need to Consider Beyond the Office
July 21Western U.S.U.S.Virtual RT – Security Debt Crisis - Catching Up on Past Due Patches & Neglected Risk
July 20U.S.U.S.Virtual RT – Trusting Your Data: How Confident Are You in the Quality of Your Data?
July 20U.K.I.EuropeVirtual RT – Eliminating Web Application Vulnerabilities
July 15Southeast U.S.U.S.Virtual RT – Ransomware: How to Reduce Your Likelihood of Being a Victim
July 15AustraliaAustraliaVirtual RT – Web Application Firewalls: Maximising Control and Visibility
July 14S. Central U.S.U.S.Virtual RT – Defining and Securing Your 'Protect Surface'
July 14N. Central U.S.U.S.Virtual RT – Future-Proofing Your Applications Against Modern Cybersecurity Threats
July 14U.S.U.S.Virtual RT – Why SOCs Fail & What Can Be Done to Improve Cybersecurity in Healthcare
July 13NorCalU.S.Virtual RT – Defining and Securing Your 'Protect Surface'
July 13U.S.U.S.Virtual RT – Why Brand Protection Is Now a Top CISO Priority
July 13DACHEuropeVirtual RT – Schwachstellen in Webapplikationen beseitigen
July 8EMEAEMEAVirtual RT – Trusting Your Data: How Confident Are You in the Quality of Your Data?
July 6South AfricaAfricaVirtual RT – Cloud-Based Email Security: Best Practices for Securing Microsoft 365
July 6Middle EastM. EastVirtual RT – Security Debt Crisis - Catching Up on Past Due Patches & Neglected Risk
July 1BeneluxEuropeVirtual RT – Adapting to the New Work from Anywhere (WFA) Realities
June 30U.S.U.S.Virtual RT – New Strategies for Securing Healthcare's Tomorrow - Today
June 30U.K.I.EuropeVirtual RT – Cloud-Based Email Security: Best Practices for Securing Microsoft 365
June 30NordicsEuropeVirtual RT – Security Debt Crisis - Catching Up on Past Due Patches & Neglected Risk
June 29NorCalU.S.Virtual RT – Why SOCs Fail & What Can Be Done to Improve Cybersecurity
June 29Southeast U.S.U.S.Virtual RT – Software Security: How to Ensure, Measure and Convey it to the Board
June 24PacNWU.S.Virtual RT – Roadmap to Securing the Multicloud Environment
June 24Midwest U.S.U.S.Virtual RT – Bringing Application Security to the Edge
June 24U.S.U.S.Virtual RT – What You Need to Know About the Latest Fraud Trends - & the Fraudsters
June 23U.S.U.S.Virtual RT – Zero Trust: Marketing Hype to Federal Mandate - How to Map Your Course
June 22U.S.U.S.Virtual RT – What CIOs and CISOs Need to Consider Beyond the Office
June 17Southeast U.S.U.S.Virtual RT – Securing Today's Cloud Networks with SASE
June 16S. Central U.S.U.S.Virtual RT – Reduce Data Breach Risk & Stay Compliant in the 'Infrastructure Everywhere' Environment
June 16U.K.I.EuropeVirtual RT – Adapting to the New Work from Anywhere (WFA) Realities
June 16North IndiaIndiaVirtual RT – Vulnerability Response: Designing the Right Strategy
June 15PacNWU.S.Virtual RT – Security Debt Crisis - Catching Up on Past Due Patches & Neglected Risk
June 15U.S.U.S.Virtual RT – Managing and Securing Digital Identities in Healthcare
June 15EMEAEMEAVirtual RT – From Endpoint to Cloud: Achieving Zero Trust for Mobile Users
June 10Southwest U.S.U.S.Virtual RT – Inverting the Vulnerability Management Pyramid
June 10N. AmericaN. AmericaVirtual RT – From Endpoint to Cloud: Achieving Zero Trust for Mobile Users
June 10AsiaAsiaVirtual RT – The Security Promise of XDR
June 9Western U.S.U.S.Virtual RT – Why Data Governance Is Key to Your Security Plans
June 9East CanadaCanadaVirtual RT – What Are You Doing to Upgrade, Simplify & Automate Your Security Stack?
June 8Northeast U.S.U.S.Virtual RT – Securing Today's Cloud Networks with SASE
June 8W. CanadaCanadaVirtual RT – Inverting the Vulnerability Management Pyramid
June 8West IndiaIndiaVirtual RT – Vulnerability Response: Designing the Right Strategy
June 3Southeast U.S.U.S.Virtual RT – The Danger of Not Managing Insider Threats
June 2U.S.U.S.Virtual RT – Financial Services: Pitfalls to Avoid on the Zero Trust Journey
June 2U.S.U.S.Virtual RT – Loyalty for Sale: Strategies for Fighting Retail and Hospitality Fraud
June 2U.S.U.S.Virtual RT – The Danger of Not Managing Insider Threats
June 2SpainSpainVirtual RT – Buenas prácticas para fortalecer la seguridad de Office 365
May 27BeneluxEuropeVirtual RT – Future-Proofing PAM: How to Grow a Sustainable Program
May 27Middle EastM. EastVirtual RT – Using SASE to Maintain Visibility and Maximize Efficiency
May 27IndiaIndiaVirtual RT – Adopting Next-Gen Security Analytics to Enhance Detection & Response
May 26Northeast U.S.U.S.Virtual RT – Bringing Application Security to the Edge
May 26U.S.U.S.Virtual RT – Rise of the Machines: New Strategies for Managing Machine Identities
May 26South IndiaIndiaVirtual RT – Vulnerability Response: Designing the Right Strategy
May 25PacNWU.S.Virtual RT – Why SOCs Fail & What Can Be Done to Improve Cybersecurity
May 25U.S.U.S.Virtual RT – Eliminating Cloud Infrastructure Risks in the Healthcare Sector
May 25U.S.U.S.Virtual RT – Cloud Security: The Case for Next-Gen Defenses
May 25AustraliaAustraliaVirtual RT – Securing Identities for Complex Environments
May 20NorCalU.S.Virtual RT – Fighting Cyberthreats From Endpoint Through the Network
May 20U.S.U.S.Virtual RT – Business Risk: Which Attacks Can Shut You Down?
May 19East CanadaCanadaVirtual RT – Taking the Zero Trust Journey
May 19SpainSpainVirtual RT – Utilizando SASE para Mantener la Visibilidad y Maximizar la Eficiencia
May 13U.S.U.S.Virtual RT – Cloud Security & Federal Government: Re-Thinking Detection & Response
May 12Southeast U.S.U.S.Virtual RT – Throw Away the Key(logger): Strategies for Protecting Users from Malware
May 11EMEAEuropeVirtual RT – Disrupting Dwell Time: How To Modernize Your Security Architecture
May 11DACHEuropeVirtual RT – Sichtbarkeit und maximale Effizienz mit SASE
May 6PacNWU.S.Virtual RT – Why Cloud Security is Not Complete without Kubernetes Security
May 6Northeast U.S.U.S.Virtual RT – The Danger of Not Managing Insider Threats
May 6U.S.U.S.Virtual RT – Cloud Security: The Case for Next-Gen Defenses
May 5S. Central U.S.U.S.Virtual RT – Inverting the Vulnerability Management Pyramid
May 5U.S.U.S.Virtual RT – Cloud Security: The Case for Next-Gen Defenses
May 5U.K.I.EuropeVirtual RT – Strategies to Detect the Compromised Insider Threat
May 4U.S.U.S.Virtual RT – Time to Bolster Credential Management in the Oil and Gas Industry
May 4U.S.U.S.Virtual RT – Beyond Digital Transformation: Securing Healthcare’s Future
April 29South AfricaAfricaVirtual RT – Using SASE to Maintain Visibility & Maximize Efficiency
April 28Midwest U.S.U.S.Virtual RT – The New Playbook for Customer Identity and Access Management
April 28N. Central U.S.U.S.Virtual RT – Inverting the Vulnerability Management Pyramid
April 28SpainSpainVirtual RT – Buenas prácticas para fortalecer la seguridad de Office 365
April 27U.S.U.S.Virtual RT – Managing CMMC Identity Compliance for Aerospace & Defense
April 22Mid-Atlantic U.S.U.S.Virtual RT – What Are You Doing to Upgrade, Simplify & Automate Your Security Stack?
April 22U.S.U.S.Virtual RT – Leveraging the Edge for Transformation in Healthcare
April 22BangladeshBangladeshVirtual RT – Need for SOC Automation: The Security Promise
April 21SingaporeSingaporeVirtual RT – Securing your App with Cloud Delivered Security
April 20ItalyItalyVirtual RT – Come proteggere l’azienda a tutto tondo e senza sforzi?
April 20North IndiaIndiaVirtual RT – Continuous Monitoring to Meet Your Risk and Compliance Goals
April 15Central U.S.U.S.Virtual RT – Nation-State Threats: What Your Board Needs to Know
April 15U.S.U.S.Virtual RT – What CIOs and CISOs Need to Consider Beyond the Office
April 15U.K.I.EuropeVirtual RT – The CISO's Dilemma in 2021: Security vs. Employee Freedom
April 15ANZANZVirtual RT – Authentication as the Foundation of Zero Trust
April 14S. Central U.S.U.S.Virtual RT – Securing Today's Cloud Networks with SASE
April 14New EnglandU.S.Virtual RT – What Are You Doing to Upgrade, Simplify & Automate Your Security Stack?
April 14U.S.U.S.Virtual RT – Accelerate Digital Commerce By Preparing for EMV 3DS 2.x
April 14IndiaIndiaVirtual RT – Redesigning Your Incident Response Strategy
April 13PacNWU.S.Virtual RT – Bringing Application Security to the Edge
April 13E. CanadaCanadaVirtual RT – The Changing Face of Insider Threats
April 13U.K.I.EuropeVirtual RT – Roadmap to a Cloud Native Security Journey
April 8Central U.S.U.S.Virtual RT – Throw Away the Key(logger): Strategies for Protecting Users from Malware
April 8Mid-Atlantic U.S.U.S.Virtual RT – Dealing with Dynamic Cloud Security for Next Generation Threat Detection
April 8FranceFranceVirtual RT – Les meilleures pratiques pour sécuriser Office 365
April 7Middle EastM. EastVirtual RT – Using SASE to Maintain Visibility & Maximize Efficiency
April 7S. IndiaIndiaVirtual RT – Continuous Monitoring to Meet Your Risk and Compliance Goals
March 31Southwest U.S.U.S.Virtual RT – Taking the Zero Trust Journey
March 31U.S.U.S.Virtual RT – Identity Transformation Meets Campus IT Modernization
March 31ASEANASEANVirtual RT – AML Modernization: Navigating the Post-Pandemic Compliance Landscape
March 30Southeast U.S.U.S.Virtual RT – Nation-State Threats: What Your Board Needs to Know
March 25U.S.U.S.Virtual RT – The Evolving Role of Security Leadership in Healthcare
March 24Mid-Atlantic U.S.U.S.Virtual RT – Why IAM Is the Core of Your Zero Trust Strategy
March 24U.S.U.S.Virtual RT – What You Need to Know About the Latest Fraud Trends - & the Fraudsters
March 23U.S.U.S.Virtual RT – Secure Transformation to the Cloud - and the Edge
March 23East & CanadaUS/CanadaVirtual RT – Securing IT and OT Convergence for 2021 and Beyond
March 23NordicsEuropeVirtual RT – The CISO's Dilemma in 2021: Security vs. Employee Freedom
March 18S. Central U.S.U.S.Virtual RT – Dealing with Dynamic Cloud Security for Next Generation Threat Detection
March 18N. Central U.S.U.S.Virtual RT – Measuring ROI in Security Terms
March 18SEASEAVirtual RT – Redefining Insider Threat: Why Traditional Detection Methods Don’t Work
March 17W. IndiaIndiaVirtual RT – Continuous Monitoring to Meet Your Risk and Compliance Goals
March 16PacNWU.S.Virtual RT – Throw Away the Key(logger): Strategies for Protecting Users from Malware
March 16U.K.I.EuropeVirtual RT – Ransomware Defense: Why PAM Is Critical
March 11Rocky MountainsU.S.Virtual RT – Encryption: New Use Cases for a New Era
March 11U.S.U.S.Virtual RT – How Manufacturers are Future Proofing Device Security
March 11FranceFranceVirtual RT – Les Stratégies pour Accélérer la Détection et la Réponse aux Incidents
March 10Southwest U.S.U.S.Virtual RT – Inverting the Vulnerability Management Pyramid
March 10U.S.U.S.Virtual RT – It’s Time to Re-Assess Supply Chain Security & Threat Intelligence
March 10U.S.U.S.Virtual RT – Security Debt Crisis - Catching Up on Past Due Patches & Neglected Risk
March 9Southeast U.S.U.S.Virtual RT – Inverting the Vulnerability Management Pyramid
March 9U.S.U.S.Virtual RT – Retail Security in a Time of Digital Transformation
March 9BeneluxEuropeVirtual RT – New Strategies to Accelerate Incident Detection and Response
March 9SEASEAVirtual RT – The Digital Identity Management & Security Journey in Asia, in 2021
March 4U.S.U.S.Virtual RT – Nation-State Threats: What Your Board Needs to Know
March 3Northeast U.S.U.S.Virtual RT – Taking the Zero Trust Journey
March 2NordicsEuropeVirtual RT – MDR: Strengthen Your Cyber Defense Strategy
February 25S. Central U.S.U.S.Virtual RT – Taking the Zero Trust Journey
February 25E. CanadaCanadaVirtual RT – Inverting the Vulnerability Management Pyramid
February 25U.K.I.EuropeVirtual RT – Using SASE to Maintain Visibility and Maximize Efficiency
February 24PacNWU.S.Virtual RT – Encryption: New Use Cases for a New Era
February 24MalaysiaMalaysiaVirtual RT – Securing the Hybrid Workforce: 2021 Strategies for Asia
February 23U.S.U.S.Virtual RT – Who Says DDoS is Dead?
February 23U.S.U.S.Virtual RT – The Crypto Agility Imperative - Planning for Next Generation Threats
February 23U.K.I.EuropeVirtual RT – Security Debt Crisis - Catching Up on Past Due Patches & Neglected Risk
February 18U.S.U.S.Virtual RT – Nation-State Threats: What Your Leadership Needs to Know
February 18U.S.U.S.Virtual RT – De-Risking the Cloud for Healthcare: Avoiding Compliance Drag
February 18U.S.U.S.Virtual RT – Bringing Application Security to the Edge
February 17WestUS/CanadaVirtual RT – Robust AppSec for the Hybrid Workplace
February 17U.S.U.S.Virtual RT – Meeting the Future Demands of the 'Phygital' Consumer
February 17Midwest U.S.U.S.Virtual RT – Work from Anywhere: The Risks, the Threats, the Business Benefits
February 17U.A.E.U.A.E.Virtual RT – Data Protection and Cloud Security: A Risk-Adaptive Approach
February 16SwitzerlandEuropeVirtual RT – Security Debt Crisis - Catching Up on Past Due Patches & Neglected Risk
February 16IndiaIndiaVirtual RT – Managing Your Enterprise Risk in the Hybrid Cloud: The Security Promise
February 11U.S.U.S.Virtual RT – What CIOs and CISOs Need to Consider Beyond the Office
February 11Eastern U.S.U.S.Virtual RT – The CISO’s Dilemma in 2021: Security vs. Employee Freedom
February 11CanadaCanadaVirtual RT – Security Debt Crisis - Catching Up on Past Due Patches & Neglected Risk
February 11BeneluxEuropeVirtual RT – Cloud Migration: Your Chance to Transform Security
February 10Northwest U.S.U.S.Virtual RT – Roadmap to Securing the Multicloud Environment
February 10S. Central U.S.U.S.Virtual RT – Measuring ROI in Security Terms
February 10Northeast U.S.U.S.Virtual RT – Inverting the Vulnerability Management Pyramid
February 9EMEAEuropeVirtual RT – How to Prevent Account Takeover Fraud without Hindering the Business
February 4U.S.U.S.Virtual RT – Nation-State Threats: What Your Board Needs to Know
February 4FranceFranceVirtual RT – Comment assurer la sécurité et la conformité des actifs critiques ?
February 3Midwest U.S.U.S.Virtual RT – Encryption: New Use Cases for a New Era
February 3U.S.U.S.Virtual RT – Addressing the Current & Future Threat Landscape for Healthcare
February 3U.S.U.S.Virtual RT – Pharma’s Top 7 Cybersecurity Threats - and How to Address Them
February 2U.S.U.S.Virtual RT – Bringing Application Security to the Edge
January 28SpainSpainVirtual RT – Cómo fortificar la seguridad de los trabajadores remotos
January 28U.K.EuropeVirtual RT – Cloud Migration: Your Chance to Transform Security
January 27Southwest U.S.U.S.Virtual RT – The New Playbook for Customer Identity and Access Management
January 27Southeast U.S.U.S.Virtual RT – Master Your Attack Surface and Reduce Digital Risk
January 27U.S.U.S.Virtual RT – How to Catch Up on Past Due Patches & Neglected Risk
January 25PacNWU.S.Virtual RT – Inverting the Vulnerability Management Pyramid
January 25Chicago & OhioU.S.Virtual RT – Identifying and Mitigating the New Insider Threat
January 21U.S.U.S.Virtual RT – The Increased Threat of Commercial Banking Employee Fraud
January 21U.S.U.S.Virtual RT – Communicating Third Party Risk to Today’s Healthcare Executives
January 21SingaporeSingaporeVirtual RT – Protecting Critical Infrastructure from Cyberattacks
January 20DallasU.S.Virtual RT – Identifying and Mitigating the New Insider Threat
January 20East & CANUS/CanadaVirtual RT – Robust AppSec for the Hybrid Workplace
January 20W. CanadaCanadaVirtual RT – How to Make Your Entire Organization 'Cyber-Ready'
January 20U.K.I.EuropeVirtual RT – Financial Crime and Fraud In 2025: How to Prepare Now
January 19FranceEuropeVirtual RT – Comment sécuriser le travail à distance et maximiser la résilience
January 19IndiaIndiaVirtual RT – Managing Risk in the Hybrid Cloud: The Security Promise
January 14Midwest U.S.U.S.Virtual RT – Securing Identities for Complex Environments
January 14U.S.U.S.Virtual RT – Who Says DDoS is Dead?
January 13NorCalU.S.Virtual RT – Identifying and Mitigating the New Insider Threat
January 13U.S.U.S.Virtual RT – The Technology Transformation of Healthcare
January 13U.S.U.S.Virtual RT – The Digital Government Imperative - Securing Vital Services
January 12SoCalU.S.Virtual RT – Identifying and Mitigating the New Insider Threat
January 12Rocky MountainsU.S.Virtual RT – Roadmap to Securing the Multicloud Environment
January 12Southeast U.S.U.S.Virtual RT – The New Playbook for Customer Identity and Access Management
January 12U.S.U.S.Virtual RT – Communicating the Third Party Risk Imperative to Executives
MonthLocationCountryTopic
December 17IndiaIndiaVirtual RT – Securing Indian Healthcare: Cybersecurity Strategies for 2021
December 16OhioU.S.Virtual RT – Enterprise Security: How Do You Know What You're Missing?
December 16Middle EastM. EastVirtual RT – How Do You Secure Remote Workers and Maximize Business Resiliency?
December 15CaliforniaU.S.Virtual RT – Encryption: New Use Cases for a New Era
December 15U.S.U.S.Virtual RT – Who Says DDoS is Dead?
December 15U.S.U.S.Virtual RT – De-Risking the Cloud: Strategies to Enable Modern Application Architectures
December 15IndiaIndiaVirtual RT – Security and Network Convergence: Building a Cyber Resilient Enterprise
December 14CanadaCanadaVirtual RT – Implementing NIST Guidelines for Zero Trust Security
December 10NevadaU.S.Virtual RT – Encryption: New Use Cases for a New Era
December 10BeneluxEuropeVirtual RT – 2021: Making IAM Integral to Your Cybersecurity Strategy
December 9CaliforniaU.S.Virtual RT – Securing IT and OT Convergence for 2021 and Beyond
December 9Southeast U.S.U.S.Virtual RT – Doing More with Less - Making the Case for Cybersecurity for 2021
December 9Mid-Atlantic U.S.U.S.Virtual RT – Roadmap to Securing the Multicloud Environment
December 9ANZANZVirtual RT – Proactive Steps to Avoid the Costs of Data Breaches
December 8Southeast U.S.U.S.Virtual RT – Moving from a Reactive to Preventative Endpoint Security Strategy
December 8U.S.U.S.Virtual RT – Biometrics in the Branches: The New Weapon Against Fraud
December 8Hong KongH. K.Virtual RT – Emerging AppSec Trends in 2021 and Beyond
December 7CanadaCanadaVirtual RT – Insider Threat: How to Respond to Heightened Risk
December 3N. Central U.S.U.S.Virtual RT – Securing IT and OT Convergence for 2021 and Beyond
December 3S. IndiaIndiaVirtual RT – How to Ensure Strong and Resilient Business Operations in the 'Next Normal'
December 2U.S.U.S.Virtual RT – 2021 Cybersecurity and Privacy Challenges for Healthcare Organizations
December 2U.S.U.S.Virtual RT – CIAM Vs. IAM: Ensuring a Secure Digital Strategy
December 2W. IndiaIndiaVirtual RT – How to Ensure Strong and Resilient Business Operations in the 'Next Normal'
December 1IllinoisU.S.Virtual RT – Roadmap to Securing the Multicloud Environment
December 1U.K.I.U.K.I.Virtual RT – 2021: Making IAM Integral to Your Cybersecurity Strategy
December 1N. IndiaIndiaVirtual RT – How to Ensure Strong and Resilient Business Operations in the 'Next Normal'
November 24LATAMLATAMVirtual RT – Digital Account Openings + Faster Payments = Faster Fraud?
November 24SingaporeSingaporeVirtual RT – A CISO's Perspective on Managing Application Security
November 19Western U.S.U.S.Virtual RT – Insider Threat: How to Respond to Heightened Risk
November 19Eastern U.S.U.S.Virtual RT – Simplifying Security Management: The New Mandate
November 19U.S.U.S.Virtual RT – Meeting 2021 Cybersecurity and Privacy Challenges for Credit Unions
November 19DACHDACHVirtual RT – Zero-Trust-Zugriff: Das Fünfpunkteprogramm
November 18U.S.U.S.Virtual RT – Healthcare’s Threat Reality: Mobile Workforces, Virtual Clinics & Cyber Risk
November 18U.K.U.K.Virtual RT – Making PAM Central to Your Cloud Security Strategy
November 17Western U.S.U.S.Virtual RT – Moving from a Reactive to Preventative Endpoint Security Strategy
November 17Southeast U.S.U.S.Virtual RT – Measure & Communicate the Value of Your Security Program
November 17U.S.U.S.Virtual RT – People-Centric Security Awareness - Safeguarding Remote Worker Threats
November 17ItalyItalyVirtual RT – Ransomware: elementi di difesa e Incident Response
November 16Central U.S.U.S.Virtual RT – Insider Threat: How to Respond to Heightened Risk
November 12ChicagoU.S.Virtual RT – Timeline of a Breach: How to Improve Detection and Response
November 12U.S.U.S.Virtual RT – Scrutinize the Success of Your Healthcare Cloud Transformation Strategy
November 12U.S.U.S.Virtual RT – Cybersecurity Outlook: What to Expect from the Next Four Years
November 12U.K.I.U.K.I.Virtual RT – Identifying and Mitigating the New Insider Threat
November 10Bay AreaU.S.Virtual RT – Cybersecurity: Why Asset Management Matters
November 10Mid-Atlantic U.S.U.S.Virtual RT - Mythbusting SASE – Filtering Secure Access Service Edge Signal from Noise
November 10GermanyGermanyVirtual RT – Die neue Insider-Bedrohung: Erkennung und Entschärfung
November 10FranceFranceVirtual RT – Comment assurer votre sécurité et conformité avec la micro-segmentation ?
November 5Western U.S.U.S.Virtual RT – Anatomy of a Cloud Breach
November 5Central U.S.U.S.Virtual RT – The New Playbook for Customer Identity and Access Management
November 5U.S.U.S.Virtual RT – Where Are You in Your API Security Journey?
November 4NYCU.S.Virtual RT – Inverting the Vulnerability Management Pyramid
November 4U.S.U.S.Virtual RT – Next Generation Cybersecurity in the Age of IT/OT Convergence
November 4CanadaCanadaVirtual RT – Reduce Your IoT Risk With Network Segmentation
November 3EMEAEMEAVirtual RT – When New Customers Are Not - Winning the Account Opening Battle
October 29Western U.S.U.S.Virtual RT – Smarter SOC Management Using XDR
October 29U.S.U.S.Virtual RT – How to Make Your Healthcare Organization 'Cyber-Ready'
October 28TOLAU.S.Virtual RT – Moving from a Reactive to Preventative Endpoint Security Strategy
October 28Central U.S.U.S.Virtual RT – Unlock Enterprise and Security Insights with your Log Data
October 28SingaporeSingaporeVirtual RT – Securing Endpoints and Ensuring Compliance During Exceptional Times
October 27Southwest U.S.U.S.Virtual RT – Timeline of a Breach: How to Improve Detection and Response
October 27U.S.U.S.Virtual RT – Securing Data & Infrastructure As Retail Gets Back to Work
October 27New EnglandU.S.Virtual RT – Moving from Vulnerability Management to Effective Vulnerability Response
October 22Western U.S.U.S.Virtual RT – Unlock Enterprise and Security Insights with your Log Data
October 21Eastern U.S.U.S.Virtual RT – Unlock Enterprise and Security Insights with your Log Data
October 21U.S.U.S.Virtual RT – Zero Trust Access: The Five Step Program
October 21APACAPACVirtual RT – Future DDoS Trends and Mitigation Strategies in 2020 and Beyond
October 20TOLAU.S.Virtual RT – Moving from Vulnerability Management to Effective Vulnerability Response
October 20TorontoCanadaVirtual RT – Doing More with Less - Making the Case for Cybersecurity for 2021
October 15SoCalU.S.Virtual RT – Doing More with Less - Making the Case for Cybersecurity for 2021
October 15Midwest U.S.U.S.Virtual RT – Next Generation Cybersecurity in the Age of IT/OT Convergence
October 15FranceFranceVirtual RT – Comment bâtir votre stratégie Zero Trust en 5 étapes clés?
October 14ChicagoU.S.Virtual RT – The Rise of XDR: How to Defend Against Tomorrow's Threats Today
October 14Eastern U.S.U.S.Virtual RT – Master Your Attack Surface and Reduce Digital Risk
October 14U.K.U.K.Virtual RT – Zero Trust Access: The Five Step Program
October 13Southeast U.S.U.S.Virtual RT – Your Journey to the Cloud Operating Model
October 13U.S.U.S.Virtual RT – Securing Medical Devices - The Next Threat Vector
October 13IndiaIndiaVirtual RT – How to Drive Security From a Cloud Native Architecture
October 8PacNWU.S.Virtual RT – Driving Your Competitive Advantage with Cloud-First IAM
October 8Western CanadaCanadaVirtual RT – Data Protection and Asset Management in the Cloud
October 8New JerseyU.S.Virtual RT – Next Generation Cybersecurity in the Age of IT/OT Convergence
October 7APJAPJVirtual RT – Winning the Battle Against Account Takeover Fraud
October 6Eastern U.S.U.S.Virtual RT – Zero Trust Access: The Five Step Program
October 6Northeast U.S.U.S.Virtual RT – Securing Data & Infrastructure As Retail Gets Back to Work
October 6KSAKSAVirtual RT – Data Protection & Network Security: A Risk-Adaptive Approach
October 1SoCalU.S.Virtual RT – The Cloud Security Playbook: Beyond 'Lift & Shift'
October 1Central U.S.U.S.Virtual RT – Moving from a Reactive to Preventative Endpoint Security Strategy
October 1U.S.U.S.Virtual RT – Zero Trust and the Healthcare Security Professional
October 1NordicsEuropeVirtual RT – Identifying and Mitigating the New Insider Threat
September 30U.S.U.S.Virtual RT – Secure Your Supply Chain with Collective Defense
September 30Northeast U.S.U.S.Virtual RT – Roadmap to Securing the Multicloud Environment
September 30IndiaIndiaVirtual RT – Securing Endpoints and Ensuring Compliance During Exceptional Times
September 29TexasU.S.Virtual RT – Security as a Catalyst for Digital Transformation
September 29East CanadaCanadaVirtual RT – How to Make Your Entire Organization 'Cyber-Ready'
September 29U.S.U.S.Virtual RT – When New Customers Are Not - Winning the Account Opening Battle
September 29U.K.U.K.Virtual RT – Digital Transformation, Cloud Security and SASE in an Uncertain World
September 24West CoastU.S.Virtual RT – Moving from Vulnerability Management to Effective Vulnerability Response
September 24NYCU.S.Virtual RT – Moving from Vulnerability Management to Effective Vulnerability Response
September 24ANZANZVirtual RT – A CISO’s Perspective on Managing Application Security
September 23U.S.U.S.Virtual RT – Zero Trust: Bringing the 'Trust' Back to the Individual
September 23FranceFranceVirtual RT – Protection des données dans un monde incertain
September 22Bay AreaU.S.Virtual RT – The Intersection of Digital Transformation and Zero Trust
September 22Southern U.S.U.S.Virtual RT – Zero Trust Access: The Five Step Program
September 22Eastern U.S.U.S.Virtual RT – IAM: App Security at the Pace of Your Development Teams
September 21NYCU.S.Virtual RT – Doing More with Less - Making the Case for Cybersecurity for 2021
September 21U.S.U.S.Virtual RT – Undetected & Unprotected: Securing IoT & Unmanaged Devices
September 17Midwest U.S.U.S.Virtual RT – Zero Trust: Bringing the 'Trust' Back to the Individual
September 17New EnglandU.S.Virtual RT – Doing More with Less - Making the Case for Cybersecurity for 2021
September 17U.K.U.K.Virtual RT – Business Resiliency in 2021: A New Approach to Security
September 16Western U.S.U.S.Virtual RT – Zero Trust Access: The Five Step Program
September 16Mid-AtlanticU.S.Virtual RT – Secure Your Supply Chain with Collective Defense
September 16U.S.U.S.Virtual RT – De-Risking the Cloud: Avoid Compliance Drag on Your Race to Innovate
September 16ItalyItalyVirtual RT – La protezione dei dati in un mondo incerto: un metodo che si adatta al rischio
September 15DallasU.S.Virtual RT – Next Generation Cybersecurity in the Age of IT/OT Convergence
September 15Central U.S.U.S.Virtual RT – Zero Trust Access: The Five Step Program
September 15U.S.U.S.Virtual RT – Managing Fast and Secure Software Development
September 10CaliforniaU.S.Virtual RT – Zero Trust: Bringing the 'Trust' Back to the Individual
September 10Western U.S.U.S.Virtual RT – Next Generation Cybersecurity in the Age of IT/OT Convergence
September 10AustraliaAustraliaVirtual RT – Securing Endpoints and Ensuring Compliance During Exceptional Times
September 9U.S.U.S.Virtual RT – Meeting the Demands of the Hybrid Consumer
September 9Western CanadaCanadaVirtual RT – Next Generation Cybersecurity in the Age of IT/OT Convergence
September 9BeneluxEuropeVirtual RT – Zero Trust Access: The Five Step Program
September 8TorontoCanadaVirtual RT – Zero Trust Access: The Five Step Program
September 3IndiaIndiaVirtual RT – A CISO’s Perspective on Managing Application Security
September 1SoCalU.S.Virtual RT – Measure & Communicate the Value of Your Security Program
September 1FranceFranceVirtual RT – Le Cloud dans tous ses états : comment en surmonter la complexité ?
August 27Southern U.S.U.S.Virtual RT – Defending the Extended Enterprise: The Latest Threats & Gaps
August 27U.S.U.S.Virtual RT – Meeting CMMC Requirements for Federal System Integrators
August 26NYCU.S.Virtual RT – Digital Transformation: The Next Generation - What to Expect in 2021
August 26NYC / NJU.S.Virtual RT – Zero Trust: Bringing the 'Trust' Back to the Individual
August 26SydneyAustraliaVirtual RT – Zero Trust Access: The Five Step Program
August 25Southwest U.S.U.S.Virtual RT – Inverting the Vulnerability Management Pyramid
August 24U.S.U.S.Virtual RT – Threat Landscape 2021: How to Improve Visibility & Reduce Response Times
August 24U.S.U.S.Virtual RT – Rapid Digitization & Risk: How to Strengthen Digital Channels
August 20South CentralU.S.Virtual RT – Maturing Zero Trust Controls in Complex Networks
August 20NYCU.S.Virtual RT – Fraudster Tactics and Trends
August 20NYCU.S.Virtual RT – The Rise of XDR: How to Defend Against Tomorrow’s Threats Today
August 19Western CanadaCanadaVirtual RT – Zero Trust Access: The Five Step Program
August 19U.S.U.S.Virtual RT – Discussing New Realities in Retail - The Needs of the 'Phygital' Consumer
August 19Midwest U.S.U.S.Virtual RT – The Future of Identity Governance
August 18U.S.U.S.Virtual RT – Managing Fast and Secure Software Development
August 18U.S.U.S.Virtual RT – Network Segmentation: A Key to Healthcare Security
August 17Western U.S.U.S.Virtual RT – Defending the Extended Enterprise: The Latest Threats & Gaps
August 13HoustonU.S.Virtual RT – Timeline of a Breach: How to Improve Detection and Response
August 13U.S.U.S.Virtual RT – Cloud Transformation: Visibility and Security in the Accelerated Journey
August 13U.S.U.S.Virtual RT – The SOC of the Future - Bringing Order to Chaos
August 13MalaysiaMalaysiaVirtual RT – How Will COVID-19 Impact the Future of Cybersecurity?
August 12MontréalCanadaVirtual RT – Zero Trust Access: The Five Step Program
August 11Southeast U.S.U.S.Virtual RT – Putting the 'I' into ROI – Making a Robust Case for Cybersecurity Investment
August 11Eastern U.S.U.S.Virtual RT – Defending the Extended Enterprise: The Latest Threats & Gaps
August 10U.S.U.S.Virtual RT – Can Better Business Continuity Secure Your Workforce?
August 6Midwest U.S.U.S.Virtual RT – Moving from Vulnerability Management to Effective Vulnerability Response
August 6APACAPACVirtual RT – Future DDoS Trends and Mitigation Strategies in 2020 and Beyond
August 5U.S.U.S.Virtual RT – Cyber Recovery with Stealth
August 4Western U.S.U.S.Virtual RT – IAM: App Security at the Pace of Your Development Teams
August 4Southeast U.S.U.S.Virtual RT – Securing Data & Infrastructure As Retail Gets Back to Work
August 4U.S.U.S.Virtual RT – Threat Landscape 2021: How to Improve Visibility & Reduce Response Times
July 30Southeast U.S.U.S.Virtual RT – Next Generation Cybersecurity in the Age of IT/OT Convergence
July 30U.S.U.S.Virtual RT – Can Better Business Continuity Secure Your Workforce?
July 29ChicagoU.S.Virtual RT – Cybersecurity: Why Asset Management Matters
July 29U.S.U.S.Virtual RT – Safeguarding Remote Worker Threats for Financial Services
July 28U.S.U.S.Virtual RT – Securing the Hybrid Cloud - Agility, Compliance & Collaboration Needs
July 28New EnglandU.S.Virtual RT – Balancing Personalization and Privacy in a Digitalized World
July 28NYCU.S.Virtual RT – Accelerating Incident Response: Organizational Shifts to Faster Remediation
July 27Northwest U.S.U.S.Virtual RT – Encryption Keys: More Important Than Your Data
July 23U.S.U.S.Virtual RT – Can Better Business Continuity Secure Your Workforce?
July 23APACAPACVirtual RT – The Post-COVID 'Normal' and the Relevance of MDR
July 22South CentralU.S.Virtual RT – The New Keys to Managing Dynamic Workforce Risk
July 22U.S.U.S.Virtual RT – Improvise, Adapt & Overcome Threats: A Strategy for Success
July 21Western U.S.U.S.Virtual RT – Advantage, CISO: Why Cybersecurity is Poised to Win in 2021
July 21Eastern U.S.U.S.Virtual RT – Network Segmentation: Creating Defense in Depth
July 21U.A.E.U.A.E.Virtual RT – Data Protection in an Uncertain World: A Risk-Adaptive Approach
July 16CaliforniaU.S.Virtual RT – Accelerating Incident Response: Organizational Shifts to Faster Remediation
July 16AucklandN.Z.Virtual RT – Zero Trust Access: The Five Step Program
July 15IllinoisU.S.Virtual RT – Every Breath You Take - How to Make Identity Sing
July 15MinneapolisU.S.Virtual RT – CIAM in an Uncertain World
July 14CanadaCanadaVirtual RT – Customer IAM: The Myths and Realities
July 14U.S.U.S.Virtual RT – Digital Identity Management & Security – The Currency of Care
July 9Western U.S.U.S.Virtual RT – Your Journey to the Cloud Operating Model
July 9DallasU.S.Virtual RT – The New Keys to Managing Dynamic Workforce Risk
July 8Southwest U.S.U.S.Virtual RT – Dynamic Work - Securely Enabling the Nomadic Workforce via Zero Trust
July 8Central U.S.U.S.Virtual RT – Advantage, CISO: Why Cybersecurity is Poised to Win in 2021
July 8LATAMLATAMVirtual RT – Pandemic Threat Landscape: Everything Old is New Again
July 8Hong KongH. K.Virtual RT – How Will COVID-19 Impact the Future of Cybersecurity?
July 7IndiaIndiaVirtual RT – Optimizing the End Point Detection and Response Times
July 2ANZANZVirtual RT – How Will COVID-19 Impact the Future of Cybersecurity?
June 30Central U.S.U.S.Virtual RT – Pandemic Threat Landscape: Everything Old is New Again
June 30OhioU.S.Virtual RT – Dynamic Work - Securely Enabling the Nomadic Workforce via Zero Trust
June 29Eastern U.S.U.S.Virtual RT – Advantage, CISO: Why Cybersecurity is Poised to Win in 2021
June 25AtlantaU.S.Virtual RT – Indicators of Behavior: The New Way to Detect Advanced Attacks
June 25NYCU.S.Virtual RT – Encryption: New Use Cases for a New Era
June 25FranceFranceVirtual RT – Optimiser la transformation vers le Cloud
June 25IndiaIndiaVirtual RT – Cybersecurity Preparedness in Times of Disruption
June 24ChicagoU.S.Virtual RT – Make the Cloud Your Safe Place: The Future of Cloud Security
June 24U.K.U.K.Virtual RT – How to Measure & Communicate the Value of Your Security Program
June 23Western U.S.U.S.Virtual RT – Maturing Zero Trust Controls in Complex Networks
June 23SingaporeSingaporeVirtual RT – How Will COVID-19 Impact the Future of Cybersecurity?
June 22Western U.S.U.S.Virtual RT – Building and Securing the Optimal Experience for Dynamic Work
June 22CanadaU.S.Virtual RT – Customer IAM: The Myths and Realities
June 18CaliforniaU.S.Virtual RT – Beyond the Crisis: Securing the New Workforce for the Long Haul
June 18Southern U.S.U.S.Virtual RT – Digital Identity Management & Security – The Customer Journey
June 17U.S.U.S.Virtual RT – Building a Digitally Resilient Financial Services Organization
June 17NYC & MAU.S.Virtual RT – Beyond the Crisis: Securing the New Workforce for the Long Haul
June 16TexasU.S.Virtual RT – Rumors of the VPN's Demise are NOT Exaggerated
June 15NYC / NJU.S.Virtual RT – Modern IAM: Making the Business – and Security – Case
June 11Western U.S.U.S.Virtual RT – Digital Identity Management & Security - The Customer Journey
June 11BaltimoreU.S.Virtual RT – Indicators of Behavior: The New Way to Detect Advanced Attacks
June 11U.S.U.S.Virtual RT – The SOC of the Future – Bringing Order to Chaos
June 10Central U.S.U.S.Virtual RT – Zero Trust Access: The Five Step Program
June 10Southeast U.S.U.S.Virtual RT – Lessons Learned: Secure Access for the Fully-Remote Workforce
June 9U.K.U.K.Virtual RT – Beyond the Crisis: Securing the New Workforce for the Long Haul
June 8CaliforniaU.S.Virtual RT – Balancing Personalization and Privacy in a Digitalized World
June 8North CarolinaU.S.Virtual RT – Modern IAM: Making the Business – and Security – Case
June 4Southern U.S.U.S.Virtual RT – The New Keys to Managing Dynamic Workforce Risk
June 3San FranciscoU.S.Virtual RT – Encryption Keys: More Important Than Your Data
June 3U.S.U.S.Virtual RT – Zero Trust and the Healthcare Security Professional
June 2NYC / NJU.S.Virtual RT – The New Keys to Managing Dynamic Workforce Risk
June 1MassachusettsU.S.Virtual RT – The New Keys to Managing Dynamic Workforce Risk
May 28Western U.S.U.S.Virtual RT – Pandemic Threat Landscape: Everything Old is New Again
May 28WisconsinU.S.Virtual RT – Lessons Learned: Secure Access for the Fully-Remote Workforce
May 28AtlantaU.S.Virtual RT – Make the Cloud Your Safe Place: The Future of Cloud Security
May 27CaliforniaU.S.Virtual RT – Lessons Learned: Secure Access for the Fully-Remote Workforce
May 27Kansas CityU.S.Virtual RT – Lessons Learned: Secure Access for the Fully-Remote Workforce
May 26U.S.U.S.Virtual RT – Securing the 'Next Normal' of Financial Services Workplaces
May 26CanadaCanadaVirtual RT – Rightsizing Your Cybersecurity Posture for the Age of the Remote Workplace
May 26ANZAustraliaVirtual RT – Cyber Recovery: Bouncing Back from a Data Incident
May 21IndianaU.S.Virtual RT – Lessons Learned: Secure Access for the Fully-Remote Workforce
May 21TorontoCanadaVirtual RT – Make the Cloud Your Safe Place: The Future of Cloud Security
May 20Los AngelesU.S.Virtual RT – Indicators of Behavior: The New Way to Detect Advanced Attacks
May 20DenverU.S.Virtual RT – Encryption Keys: More Important Than Your Data
May 20TexasU.S.Virtual RT – Lessons Learned: Secure Access for the Fully-Remote Workforce
May 14NYCU.S.Virtual RT – Workforce Authentication: What's in Your Five-Year Plan?
May 13Des MoinesU.S.Virtual RT – Lessons Learned: Secure Access for the Fully-Remote Workforce
May 13Midwest U.S.U.S.Virtual RT – Remote Workforce: Securing the Next Normal
May 12SeattleU.S.Virtual RT – Make the Cloud Your Safe Place: The Future of Cloud Security
May 11Southern U.S.U.S.Virtual RT – Zero Trust Access: The Five Step Program
May 11CanadaCanadaVirtual RT – Pandemic Threat Landscape: Everything Old is New Again
May 6Central U.S.U.S.Virtual RT – Remote Workforce: Securing the Next Normal
May 6LondonU.K.Virtual RT – Rightsizing Your Cybersecurity Posture for the Age of the Remote Workplace
May 5Western U.S.U.S.Virtual RT – Zero Trust Access: The Five Step Program
May 4Eastern U.S.U.S.Virtual RT – Zero Trust Access: The Five Step Program
April 30Southwest U.S.U.S.Virtual RT – Rightsizing Your Cybersecurity Posture for the Age of the Remote Workplace
April 30BostonU.S.Virtual RT – Indicators of Behavior: The New Way to Detect Advanced Attacks
April 29Northwest U.S.U.S.Virtual RT – Rightsizing Your Cybersecurity Posture for the Age of the Remote Workplace
April 29Midwest U.S.U.S.Virtual RT – Rightsizing Your Cybersecurity Posture for the Age of the Remote Workplace
April 28DallasU.S.Virtual RT – Customer IAM: The Myths and Realities
April 28Southeast U.S.U.S.Virtual RT – Rightsizing Your Cybersecurity Posture for the Age of the Remote Workplace
April 27Northeast U.S.U.S.Virtual RT – Pandemic Threat Landscape: Everything Old is New Again
April 23SeattleU.S.Virtual RT – Lessons Learned: Secure Access for the Fully-Remote Workforce
April 23West CoastU.S.Virtual RT – Identity Transformation: The Future is Now
April 22U.S.U.S.Virtual RT – Healthcare Identity Transformation: The Future is Now
April 22LondonU.K.Virtual RT – Rightsizing Your Cybersecurity Posture for the Age of the Remote Workplace
April 21ChicagoU.S.Virtual RT – Indicators of Behavior: The New Way to Detect Advanced Attacks
April 21East CoastU.S.Virtual RT – Identity Transformation: The Future is Now
April 16OhioU.S.Virtual RT – Understanding What Zero Trust Means for Business
April 15CaliforniaU.S.Virtual RT – Lessons Learned: Secure Access for the Fully-Remote Workforce
April 15TexasU.S.Virtual RT – Rightsizing Your Cybersecurity Posture for the Age of the Remote Workplace
April 14Northeast U.S.U.S.Virtual RT – Rightsizing Your Cybersecurity Posture for the Age of the Remote Workplace
April 9San FranciscoU.S.Virtual RT – The Right Roles for SIEM and EDR
March 12PhoenixU.S.Timeline of a Breach: How to Improve Detection and Response
March 10DallasU.S.Balancing Personalization and Privacy in a Digitalized World
March 10MinneapolisU.S.(IAM Briefing) Smart Identity for the Hybrid Multicloud World
March 5MadridSpainBest Practices for Detecting Fraud in Your Organization
March 3ParisFranceBest Practices for Detecting Fraud Among Your Customers
February 27HyderabadIndiaStrategies to Defend Your Enterprise Applications against Malicious Bots
February 26San FranciscoU.S.Digital Transformation in Healthcare – The Impacts & Benefits of Digital Identity
February 25San FranciscoU.S.Driving Partnership Between Security & Development
February 25ChennaiIndiaManage Your Enterprise SaaS Vulnerabilities & Risks: The Security Promise
February 24San FranciscoU.S.New CISO Stress Research: Causes, Consequences and Conversation
February 20SeattleU.S.(IAM Briefing) Smart Identity for the Hybrid Multicloud World
February 11NYCU.S.Cybersecurity: Why Asset Management Matters
February 6DallasU.S.(IAM Briefing) Smart Identity for the Hybrid Multicloud World
February 6AtlantaU.S.Timeline of a Breach: How to Improve Detection and Response
February 5New DelhiIndiaFighting 'Unknown-Unknown' Threats with Actionable Threat Intelligence
February 4PhiladelphiaU.S.Digital Risk Management: Securing Multi-Cloud Transformation
February 4NYCU.S.(IAM Briefing) Smart Identity for the Hybrid Multicloud World
January 30SeattleU.S.App Security: How Do You Know You've Got it Right?
January 30NashvilleU.S.The Case for Re-Thinking Third Party Risk
January 29San JoseU.S.Understanding What Zero Trust Means for Business
January 28San FranciscoU.S.Understanding What Zero Trust Means for Business
January 28Washington, D.C.U.S.Understanding What Zero Trust Means for Business
January 23PhoenixU.S.Understanding What Zero Trust Means for Business
January 23MontréalCanadaDigital Risk Management: Embracing - and Leading - Digital Transformation
January 21CalgaryCanadaDigital Risk Management: CCPA, Privacy and Security in the New Privacy World
January 16BaltimoreU.S.Digital Risk Management: Securing Multi-Cloud Transformation
January 14San AntonioU.S.Digital Risk Management: CCPA, Privacy and Security in the New Privacy World
MonthCityCountryTopic
December 17MumbaiIndiaFighting 'Unknown-Unknown' Threats with Actionable Threat Intelligence
December 12SeattleU.S.The Case for Re-Thinking Third-Party Risk
December 12NYCU.S.Accelerating Incident Response: Organizational Shifts to Faster Remediation
December 10DenverU.S.Changing the Conversation around Digital Risk Management: Third Party Risk
December 5San FranciscoU.S.Outmaneuvering Threat Actors in the Age of Industrial IoT (IIoT)
December 4NYCU.S.Digital Risk Management: CCPA, Privacy and Security in the New Privacy World
December 3Washington, D.C.U.S.Digital Risk Management: Securing Multi-Cloud Transformation
December 3Washington, D.C.U.S.Eliminating Standing Privileges - The Roadmap to Zero Trust Through a Just-In-Time Cloud Model
November 21NYCU.S.Advancing SOC Triage & Investigation Through Destructive Object Insights
November 21BostonU.S.Digital Risk Management: Securing Multi-Cloud Transformation
November 21MumbaiIndiaEnabling Digital Transformation with Trusted Identities
November 19PittsburghU.S.Digital Risk Management: Securing Multi-Cloud Transformation
November 19TorontoCanadaMoving from Vulnerability Management to Effective Vulnerability Response
November 14Los AngelesU.S.Accelerating Incident Response: Organizational Shifts to Faster Remediation
November 14San FranciscoU.S.Banking on Mobile Security: How Financial Services Respond to the Growing Mobile Threat Landscape
November 13LondonU.K.Financial Services: Leveraging Security to Drive Innovation & Gain a Competitive Edge
November 12NYCU.S.Cyber Confidence: How Do You Know You've Got a Trustworthy Security Posture?
November 7CharlotteU.S.Moving from Vulnerability Management to Effective Vulnerability Response
November 5AtlantaU.S.Moving from Vulnerability Management to Effective Vulnerability Response
October 30DallasU.S.Cloud Strategies and Security: How to Be a Business Enabler
October 29HoustonU.S.Digital Risk Management: How to Achieve Digital Resiliency
October 24AtlantaU.S.Digital Risk Management: How to Achieve Digital Resiliency
October 23MumbaiIndiaThe 2019 SOC Odyssey - Evolving to Next Generation Effectiveness
October 22NYCU.S.Unpacking Zero Trust - Balancing Security and Profitability
October 17IrvineU.S.Digital Risk Management: Embracing - and Leading - Digital Transformation
October 17CalgaryCanadaOutmaneuvering Threat Actors in the Age of Industrial IoT (IIoT)
October 10SeattleU.S.Digital Risk Management: How to Achieve Digital Resiliency
October 8PhiladelphiaU.S.Indicators of Behavior: The New Way to Detect Advanced Attacks
October 2SeattleU.S.Open Source Security: How to Defend at the Speed of Attack
October 2BostonU.S.Cyber Recovery in the Age of Ransomware
October 1DenverU.S.Data Privacy & Security: Do You Meet the New Standards?
September 26DallasU.S.Digital Risk Management: CCPA, Privacy and Security in the New Privacy World
September 26AtlantaU.S.Open Source Security: How to Defend at the Speed of Attack
September 24TorontoCanadaIndicators of Behavior: The New Way to Detect Advanced Attacks
September 24TorontoCanadaOutmaneuvering Threat Actors in the Age of Industrial IoT (IIoT)
September 19NYCU.S.(MaaS360 Briefing) Unified Endpoint Management in 2020
September 17Los AngelesU.S.Outmaneuvering Threat Actors in the Age of Industrial IoT (IIoT)
September 17BostonU.S.Open Source Security: How to Defend at the Speed of Attack
September 12ChicagoU.S.(MaaS360 Briefing) Unified Endpoint Management in 2020
September 12DetroitU.S.Outmaneuvering Threat Actors in the Age of Industrial IoT (IIoT)
September 10San FranciscoU.S.Risk Ranking Re-Evaluated: Bringing Analytics & Automation to Vulnerability Assessment
September 10NYCU.S.Outmaneuvering Threat Actors in the Age of Industrial IoT (IIoT)
September 5PhiladelphiaU.S.Getting Cyber Right - Towards a Reasonable Level of Care
August 22San DiegoU.S.Indicators of Behavior: The New Way to Detect Advanced Attacks
August 21DallasU.S.Indicators of Behavior: The New Way to Detect Advanced Attacks
August 20DenverU.S.Changing the Conversation Around Digital Risk Management: Third Party Risk
August 19MumbaiIndiaQuantify Your Cyber Exposure: Build Resilience and Defend Better
August 13NYCU.S.Securing Third Party Code - A Digital Imperative for a Connected World
August 13NYCU.S.Indicators of Behavior: The New Way to Detect Advanced Attacks
August 13NYCU.S.Mobile / Web App Security: How Do You Know You've Got It Right?
August 6Las VegasU.S.Security's Role in Digital Transformation
August 1BrasiliaBrazilEndpoint Defense 2.0: How AI and ML Can Empower Predictive Security
July 30Rio de JaneiroBrazilEndpoint Defense 2.0: How AI and ML Can Empower Predictive Security
July 25Sao PauloBrazilEndpoint Defense 2.0: How AI and ML Can Empower Predictive Security
July 25Sao PauloBrazilFaces of Fraud: How Prepared are You to Detect and Defend?
July 23Los AngelesU.S.(MaaS360 Briefing) Unified Endpoint Management in 2020
July 18DallasU.S.(MaaS360 Briefing) Unified Endpoint Management in 2020
July 18AtlantaU.S.Security as a Catalyst for Digital Transformation
June 27Washington, D.C.U.S.Changing the Conversation around Digital Risk Management: Third Party Risk
June 27LondonU.K.Beyond Passwords: Using Advanced Risk-Based and User Biometrics
June 26SingaporeSingaporeA Unified Approach to Optimizing Cybersecurity Maturity
June 25NYCU.S.Changing the Conversation around Digital Risk Management: Third Party Risk
June 25NYCU.S.Moving from Vulnerability Management to Effective Vulnerability Response
June 25NYCU.S.How Zero-Trust Can Secure Your Hybrid Cloud Environment
June 20San FranciscoU.S.(IAM Briefing) Secure Identity: The Future is Now
June 13BostonU.S.Changing the Conversation Around Digital Risk Management: Third Party Risk
June 13Washington, D.C.U.S.(IAM Briefing) Secure Identity: The Future is Now
June 12NYCU.S.(IAM Briefing) Secure Identity: The Future is Now
June 11ChicagoU.S.(IAM Briefing) Secure Identity: The Future is Now
June 4SeattleU.S.Mobile / Web App Security: How Do You Know You've Got It Right?
June 4SeattleU.S.Understanding Third-Party Risk in Your Global Workforce
May 29CharlotteU.S.Changing the Conversation around Digital Risk Management: Third Party Risk
May 23AmsterdamNetherlandsWhy Application Security is Your Best Cyber Defense
May 21San FranciscoU.S.Open Source Security: How to Defend at the Speed of Attack
May 16PhoenixU.S.Data Privacy & Security: Do You Meet the New Standards?
May 15NashvilleU.S.Securing the Digital Enterprise
May 9NYCU.S.Threat Detection and Response: How to Evolve Your Incident Response
May 7AtlantaU.S.Outmaneuvering Threat Actors in the Age of Industrial IoT (IIoT)
May 2ChicagoU.S.Mistakes I've Made - Confessions of a Healthcare CISO
May 2NYCU.S.Security's Role in Digital Transformation
April 30BostonU.S. Security as a Catalyst for Digital Transformation
April 24AtlantaU.S. Managing Access Risk - Controlling the Identity Lifecycle
April 24PhiladelphiaU.S.Managing Access Risk - Controlling the Identity Lifecycle
April 23DubaiU.A.E.Fighting Fraud in the Age of Mobility
April 18AtlantaU.S. Multilayered Security: Strategies & Solutions for Protecting Customers' Personal Information
April 10CharlotteU.S.Mobile / Web App Security: How Do You Know You’ve Got it Right?
April 10MumbaiIndiaEvolving to Next Generation Security Orchestration and Visibility
April 4Central NJU.S.Security as a Catalyst for Digital Transformation
April 4MelbourneAustraliaZero Trust Security
April 2San JoseU.S.Changing the Conversation around Digital Risk Management: Third Party Risk
April 2SydneyAustraliaZero Trust Security
March 27PhoenixU.S.Open Source Security: How to Defend at the Speed of Attack
March 26DallasU.S.Open Source Security: How to Defend at the Speed of Attack
March 26HoustonU.S.Managing Access Risk - Controlling the Identity Lifecycle
March 21TorontoCanadaOpen Source Security: How to Defend at the Speed of Attack
March 19NYCU.S.How to Use Automation and Orchestration to Effectively Respond to Phishing Attacks
March 14BostonU.S.DDoS Defense: How to Break the Link to Advanced Threats
March 13NYCU.S.Open Source Security: How to Defend at the Speed of Attack
March 6San FranciscoU.S.Assuring Trust in the Age of Business Email Compromise
March 5San FranciscoU.S.Advanced Threats: How to Respond to Bigger, Stronger, Faster
February 28MiamiU.S.Open Source Security: How to Defend at the Speed of Attack
February 26SeattleU.S.Security as a Catalyst for Digital Transformation
February 20ColumbusU.S.Security as a Catalyst for Digital Transformation
February 14ChennaiIndiaAccelerating Digital Transformation: The Security Promise
February 13BangaloreIndiaThe Rise of DevSecOps: Best Practices for Ensuring Software Security from the Start
February 7NYCU.S.DDoS Defense: How to Break the Link to Advanced Threats
January 31San FranciscoU.S.Security as a Catalyst for Digital Transformation
January 30BostonU.S.Securing the Digital Enterprise
January 29DenverU.S.Security as a Catalyst for Digital Transformation
January 24ChicagoU.S.Healthcare & Insurance: How to Establish and Maintain Digital Identity Trust
January 23NYCU.S.The Road to Business-Driven Security
January 17SeattleU.S.The Road to Business-Driven Security
MonthCityCountryTopic
December 18San DiegoU.S.Security as a Catalyst for Digital Transformation
December 4Washington, D.C.U.S.Open Source Components: How to Increase Speed and Reduce the Risk
November 29RaleighU.S.The Road to Business-Driven Security
November 29MumbaiIndiaHow Secure Are You? Best Practices in Measuring Your Security Stance
November 29MumbaiIndiaThe Changing Nature of Identity in a Digitized World
November 15NYCU.S.Zero Trust Security
October 30BostonU.S.Modern Identity and Access Management: How to Build Trust without Sacrificing Security
October 25ColumbusU.S.Modern Identity and Access Management: How to Build Trust without Sacrificing Security
October 18SeattleU.S.Open Source Components: How to Increase Speed and Reduce the Risk
October 18NYCU.S.Financial Crimes: How to Improve Response and Reduce False Positives
October 16DallasU.S.Security as a Catalyst for Digital Transformation
October 11ColumbusU.S.Workshop: New Essentials of Privileged Access Management
October 11Los AngelesU.S.Security as a Catalyst for Digital Transformation
October 9BostonU.S.Workshop: New Essentials of Privileged Access Management
October 4DenverU.S.Threat Hunting: How to Evolve Your Incident Response
September 27ScottsdaleU.S.Threat Hunting: How to Evolve Your Incident Response
September 26LondonU.K.How to Establish and Maintain Digital Identity Trust
September 20San AntonioU.S.The Future of Identity and Governance
September 19DallasU.S.A New Model of Digital Trust in a Zero Trust Online World
September 18AtlantaU.S.A New Model of Digital Trust in a Zero Trust Online World
September 11TorontoCanadaThe Road to Business-Driven Security
September 11TorontoCanadaOpen Source Components: How to Increase Speed and Reduce the Risk
September 11TorontoCanadaSecurity as a Catalyst for Digital Transformation
August 21Kansas CityU.S.The Road to Business-Driven Security
August 14NYCU.S.The Road to Business-Driven Security
August 14NYCU.S.Mobile / Web App Security: How Do You Know It’s Working?
July 27Sao PauloBrazilRethinking Your Cybersecurity Strategy
July 24AtlantaU.S.Threat Hunting: How to Evolve Your Incident Response
July 17DallasU.S.Open Source Components: How to Increase Speed and Reduce the Risk
June 22BangaloreIndiaManage Your Enterprise Risks in the Cloud: The Security Promise
June 21Washington, D.C.U.S.Threat Hunting: How to Evolve Your Incident Response
June 14CharlotteU.S.Modern Identity and Access Management: How to Build Trust without Sacrificing Security
June 12BangaloreIndiaFighting the Avanced DDoS Threat: Proactive Mitigation and Collaboration
May 10ManilaPhilippinesEnterprise Security 2018 – Business Drivers, Compliance and Regulatory Challenges
May 10Washington, D.C.U.S.Reality or Snake Oil? The Security Promise of AI, ML and Data Science
April 26SeattleU.S.Threat Hunting: How to Evolve Your Incident Response
April 24ChennaiIndiaAdvanced SOC – Evolving to the Next Generation Threat Management Capability
April 18MumbaiIndiaManage Your Enterprise Risks in the Cloud: The Security
April 18San FranciscoU.S.The Machine Identity Crisis: A Call to Action
April 17San FranciscoU.S.The Machine Identity Crisis: A Call to Action
April 17San FranciscoU.S.Strategic Threat Intelligence: Lessons from the Pentagon
April 12NYCU.S.Reality or Snake Oil? The Security Promise of AI, ML and Data Science
April 10ChicagoU.S.Reality or Snake Oil? The Security Promise of AI, ML and Data Science
April 3BostonU.S.Active Defense: Clearing the Legal and Ethical Hurdles
March 29AtlantaU.S.Payment & Banking Innovation: Get Ahead of the Security Challenges
March 28NYCU.S.Open Source Components: How to Increase Speed and Reduce the Risk
March 28NYCU.S.How to Turn Your End User into Your Friend User and Reduce Your Biggest Risk Vector
March 22MumbaiIndiaIdentity-driven Security in an Evolving Threat Landscape
March 15Mexico CityMexicoPhishing: New Strategies to Fight the Growing Threat
March 15MumbaiIndiaThe Road to Business-Driven Security
March 13AtlantaU.S.Active Defense: Clearing the Legal and Ethical Hurdles
March 13BangkokThailand2018 Digital Identity and Mobile Banking Fraud Trends
March 1NYCU.S.Modern Privileged Access Management: How to Use Threat Analytics to Help Prevent Breaches
February 8NYCU.S.Threat Hunting: How to Evolve Your Incident Response
February 6DallasU.S.Exposing the Enemy Within: How to Leverage DNS Data to Improve Breach Detection and Response
February 2SingaporeSingaporeAdvanced SOC– Evolving to the Next Generation Threat Management Capability
January 23AtlantaU.S.Modern Identity and Access Management: How to Build Trust without Sacrificing Security
January 18San FranciscoU.S.Exposing the Enemy Within: How to Leverage DNS Data to Improve Breach Detection and Response
January 16DallasU.S.Threat Hunting: How to Evolve Your Incident Response
MonthCityCountryTopic
December 7MontrealCanadaSecure the Breach: Why You Need to Encrypt Everything
December 6MumbaiIndiaMobility & Fraud: Scams and Solutions to Eye in 2018
December 5SeattleU.S.The Road to Business-Driven Security
November 28FrankfurtGermanyFighting Cybercriminals in the Era of Digital Banking
November 15NYCU.S.Exposing the Enemy Within: How to Leverage DNS Data to Improve Breach Detection and Response
November 15MilanItalyBattling Fraud in the Era of Open Banking
November 14NYCU.S.Reducing the Risk of a Cyber Attack - How to Avoid Becoming the Next Equifax
November 14NYCU.S.Incident Response: How to Find the Internal Threat Before the Damage is Done
November 7NYCU.S.Your Data Is On the Move, But Is It Secure?
October 26ParisFranceSecurity Transformation: Be an Enabler, Not an Obstacle
October 26DallasU.S.The Road to Business-Driven Security
October 24FrankfurtGermanySecurity Transformation: Be an Enabler, Not an Obstacle
October 17LondonU.K.Reducing the Risk of a Cyber Attack - How to Avoid Becoming the Next Equifax
October 17LondonU.K.Security Transformation: Be an Enabler, Not an Obstacle
October 12AtlantaU.S.The Road to Business-Driven Security
October 3San JoseU.S.The Road to Business-Driven Security
September 26Los AngelesU.S.IoT Security: How to Minimize the Threat and Maximize the Trust
September 21SeattleU.S.IoT Security: How to Minimize the Threat and Maximize the Trust
September 19BostonU.S.The Road to Business-Driven Security
September 14DubaiU.A.E.Developing The Next Generation of SOCs in GCC Region
Setember 12TorontoCanadaThe Road to Business-Driven Security
September 12TorontoCanadaPrivileged Access and the Business: How Secure Code Can Improve the Bottom Line
September 12TorontoCanadaWannaCry and Crimeware as a Service: How to Respond to This Security Game-Changer
September 12TorontoCanadaNIST Cybersecurity Framework: Best Practices for Implementation
September 12TorontoCanadaIncident Response: How to Find the Internal Threat Before the Damage is Done
August 24ColumbusU.S.IoT Security: How to Minimize the Threat and Maximize the Trust
August 24TorontoCanadaPreparing for GDPR: Checklist for Conformance
August 22NYCU.S.Preparing for GDPR: Checklist for Conformance
August 15Sao PauloBrazilPhishing: New Strategies to Fight the Global Threat
August 10DetriotU.S.IoT Security: How to Minimize the Threat and Maximize the Trust
August 3HoustonU.S.IoT Security: How to Minimize the Threat and Maximize the Trust
August 1CharlotteU.S.Secure the Breach: Why You Need to Encrypt Everything

For more information on how you can sponsor or attend any of our upcoming Executive Rountables please contact us today.