ISMG’s Executive Roundtables are intimate, closed-door discussions focused on specific challenges being faced by information security executives in today’s cybersecurity landscape.  Moderated by one of ISMG’s Executive Editors and hosted over breakfast, lunch or dinner, Executive Roundtables provide senior cybersecurity professionals the opportunity to share their own experiences with an intimate group of peers and emerge with new strategies they can immediately put to work at their own organizations.

For more information on how ISMG is addressing the ongoing coronavirus concerns visit: https://events.ismg.io/coronavirus-guidelines/

GLOBAL ROUNDTABLE EVENTS

Ismg Executive Roundtable Dinner Atlanta Threat Hunting Ismg Executive Roundtable Sao Paulo 2018 Ismg Executive Roundtable Road To Business Driven Security Nyc Summit Ismg-Executive-Roundtable-Nyc-Web-App-Security Ismg Executive Roundtable Dinner Kansas City Business Driven Security Ismg Executive Roundtable Road To Business Driven Security Toronto Summit Ismg Executive Roundtable Toronto Open Source Components Ismg Executive Roundtable Dinner Nyc Financial Crimes

Upcoming Executive Roundtables

DateLocationCountryTopic
November 24thLATAMLATAMVirtual Roundtable – Digital Account Openings + Faster Payments = Faster Fraud? Change the Equation!
November 26thSpainSpainVirtual Roundtable – Tecnologías de autenticación, clave del éxito en la nueva era digital
December 1stNorthern IndiaIndiaVirtual Roundtable – How to Ensure Strong and Resilient Business Operations in the 'Next Normal'
December 1stU.K.I.U.K.I.Virtual Roundtable – 2021: Making IAM Integral to Your Cybersecurity Strategy
December 1stIllinoisU.S.Virtual Roundtable – Roadmap to Securing the Multicloud Environment
December 1stCarolinasU.S.Virtual Roundtable – Roadmap to Securing the Multicloud Environment
December 2ndWestern IndiaIndiaVirtual Roundtable – How to Ensure Strong and Resilient Business Operations in the 'Next Normal'
December 2ndU.S.U.S.Virtual Roundtable – CIAM Vs. IAM: Ensuring a Secure Digital Strategy
December 2ndU.S.U.S.Virtual Roundtable – Meeting 2021 Cybersecurity and Privacy Challenges for Healthcare Organizations
December 2ndRocky MountainsU.S.Virtual Roundtable – Roadmap to Securing the Multicloud Environment
December 3rdSouthern IndiaIndiaVirtual Roundtable – How to Ensure Strong and Resilient Business Operations in the 'Next Normal'
December 3rdN. Central U.S.U.S.Virtual Roundtable – Securing IT and OT Convergence for 2021 and Beyond
December 3rdWestern CanadaCanadaVirtual Roundtable – How to Make Your Entire Organization 'Cyber-Ready'
December 3rdArizonaU.S.Virtual Roundtable – Encryption: New Use Cases for a New Era
December 7thCanadaCanadaVirtual Roundtable – Insider Threat: How to Respond to Heightened Risk
December 8thU.S.U.S.Virtual Roundtable – Biometrics in the Branches: The New Weapon Against Fraud
December 8thU.S.U.S.Virtual Roundtable – The Digital Government Imperative - Securing Vital Services for Remote Citizens
December 8thSoutheast U.S.U.S.Virtual Roundtable – Moving from a Reactive to Preventative Endpoint Security Strategy
December 9thANZANZVirtual Roundtable – Proactive Steps to Avoid the Costs of Data Breaches
December 9thMid-Atlantic U.S.U.S.Virtual Roundtable – Roadmap to Securing the Multicloud Environment
December 9thSoutheast U.S.U.S.Virtual Roundtable – Doing More with Less - Making the Case for Cybersecurity for 2021
December 9thCaliforniaU.S.Virtual Roundtable – Securing IT and OT Convergence for 2021 and Beyond
December 9thPacNWU.S.Virtual Roundtable – Inverting the Vulnerability Management Pyramid
December 10thBeneluxEuropeVirtual Roundtable – 2021: Making IAM Integral to Your Cybersecurity Strategy
December 10thNevadaU.S.Virtual Roundtable – Encryption: New Use Cases for a New Era
December 15thU.S.U.S.Virtual Roundtable – De-Risking the Cloud: Strategies to Enable Modern Application Architectures
December 15thU.S.U.S.Virtual Roundtable – Who Says DDoS is Dead?
December 15thNorthwest U.S.U.S.Virtual Roundtable – Roadmap to Securing the Multicloud Environment
December 15thCaliforniaU.S.Virtual Roundtable – Encryption: New Use Cases for a New Era
December 16thMiddle EastM. EastVirtual Roundtable – Security Mandates for 2021: Secure Remote Workers, Maximum Business Resiliency
December 16thOhioU.S.Virtual Roundtable – Enterprise Security: How Do You Know What You're Missing?
December 17thMidwest U.S.U.S.Virtual Roundtable – Work from Anywhere: The Risks, the Threats, the Business Benefits

Past Executive Roundtables

MonthLocationCountryTopic
November 24SingaporeSingaporeVirtual RT – A CISO's Perspective on Managing Application Security
November 19Western U.S.U.S.Virtual RT – Insider Threat: How to Respond to Heightened Risk
November 19Eastern U.S.U.S.Virtual RT – Simplifying Security Management: The New Mandate
November 19U.S.U.S.Virtual RT – Meeting 2021 Cybersecurity and Privacy Challenges for Credit Unions
November 19DACHDACHVirtual RT – Zero-Trust-Zugriff: Das Fünfpunkteprogramm
November 18U.S.U.S.Virtual RT – Healthcare’s Threat Reality: Mobile Workforces, Virtual Clinics & Cyber Risk
November 18U.K.U.K.Virtual RT – Making PAM Central to Your Cloud Security Strategy
November 17Western U.S.U.S.Virtual RT – Moving from a Reactive to Preventative Endpoint Security Strategy
November 17Southeast U.S.U.S.Virtual RT – Measure & Communicate the Value of Your Security Program
November 17U.S.U.S.Virtual RT – People-Centric Security Awareness - Safeguarding Remote Worker Threats
November 17ItalyItalyVirtual RT – Ransomware: elementi di difesa e Incident Response
November 16Central U.S.U.S.Virtual RT – Insider Threat: How to Respond to Heightened Risk
November 12ChicagoU.S.Virtual RT – Timeline of a Breach: How to Improve Detection and Response
November 12U.S.U.S.Virtual RT – Scrutinize the Success of Your Healthcare Cloud Transformation Strategy
November 12U.S.U.S.Virtual RT – Cybersecurity Outlook: What to Expect from the Next Four Years
November 12U.K.I.U.K.I.Virtual RT – Identifying and Mitigating the New Insider Threat
November 10Bay AreaU.S.Virtual RT – Cybersecurity: Why Asset Management Matters
November 10Mid-Atlantic U.S.U.S.Virtual RT - Mythbusting SASE – Filtering Secure Access Service Edge Signal from Noise
November 10GermanyGermanyVirtual RT – Die neue Insider-Bedrohung: Erkennung und Entschärfung
November 10FranceFranceVirtual RT – Comment assurer votre sécurité et conformité avec la micro-segmentation ?
November 5Western U.S.U.S.Virtual RT – Anatomy of a Cloud Breach
November 5Central U.S.U.S.Virtual RT – The New Playbook for Customer Identity and Access Management
November 5U.S.U.S.Virtual RT – Where Are You in Your API Security Journey?
November 4NYCU.S.Virtual RT – Inverting the Vulnerability Management Pyramid
November 4U.S.U.S.Virtual RT – Next Generation Cybersecurity in the Age of IT/OT Convergence
November 4CanadaCanadaVirtual RT – Reduce Your IoT Risk With Network Segmentation
November 3EMEAEMEAVirtual RT – When New Customers Are Not - Winning the Account Opening Battle
October 29Western U.S.U.S.Virtual RT – Smarter SOC Management Using XDR
October 29U.S.U.S.Virtual RT – How to Make Your Healthcare Organization 'Cyber-Ready'
October 28TOLAU.S.Virtual RT – Moving from a Reactive to Preventative Endpoint Security Strategy
October 28Central U.S.U.S.Virtual RT – Unlock Enterprise and Security Insights with your Log Data
October 28SingaporeSingaporeVirtual RT – Securing Endpoints and Ensuring Compliance During Exceptional Times
October 27Southwest U.S.U.S.Virtual RT – Timeline of a Breach: How to Improve Detection and Response
October 27U.S.U.S.Virtual RT – Securing Data & Infrastructure As Retail Gets Back to Work
October 27New EnglandU.S.Virtual RT – Moving from Vulnerability Management to Effective Vulnerability Response
October 22Western U.S.U.S.Virtual RT – Unlock Enterprise and Security Insights with your Log Data
October 21Eastern U.S.U.S.Virtual RT – Unlock Enterprise and Security Insights with your Log Data
October 21U.S.U.S.Virtual RT – Zero Trust Access: The Five Step Program
October 21APACAPACVirtual RT – Future DDoS Trends and Mitigation Strategies in 2020 and Beyond
October 20TOLAU.S.Virtual RT – Moving from Vulnerability Management to Effective Vulnerability Response
October 20TorontoCanadaVirtual RT – Doing More with Less - Making the Case for Cybersecurity for 2021
October 15SoCalU.S.Virtual RT – Doing More with Less - Making the Case for Cybersecurity for 2021
October 15Midwest U.S.U.S.Virtual RT – Next Generation Cybersecurity in the Age of IT/OT Convergence
October 15FranceFranceVirtual RT – Comment bâtir votre stratégie Zero Trust en 5 étapes clés?
October 14ChicagoU.S.Virtual RT – The Rise of XDR: How to Defend Against Tomorrow's Threats Today
October 14Eastern U.S.U.S.Virtual RT – Master Your Attack Surface and Reduce Digital Risk
October 14U.K.U.K.Virtual RT – Zero Trust Access: The Five Step Program
October 13Southeast U.S.U.S.Virtual RT – Your Journey to the Cloud Operating Model
October 13U.S.U.S.Virtual RT – Securing Medical Devices - The Next Threat Vector
October 13IndiaIndiaVirtual RT – How to Drive Security From a Cloud Native Architecture
October 8PacNWU.S.Virtual RT – Driving Your Competitive Advantage with Cloud-First IAM
October 8Western CanadaCanadaVirtual RT – Data Protection and Asset Management in the Cloud
October 8New JerseyU.S.Virtual RT – Next Generation Cybersecurity in the Age of IT/OT Convergence
October 7APJAPJVirtual RT – Winning the Battle Against Account Takeover Fraud
October 6Eastern U.S.U.S.Virtual RT – Zero Trust Access: The Five Step Program
October 6Northeast U.S.U.S.Virtual RT – Securing Data & Infrastructure As Retail Gets Back to Work
October 6KSAKSAVirtual RT – Data Protection & Network Security: A Risk-Adaptive Approach
October 1SoCalU.S.Virtual RT – The Cloud Security Playbook: Beyond 'Lift & Shift'
October 1Central U.S.U.S.Virtual RT – Moving from a Reactive to Preventative Endpoint Security Strategy
October 1U.S.U.S.Virtual RT – Zero Trust and the Healthcare Security Professional
October 1NordicsEuropeVirtual RT – Identifying and Mitigating the New Insider Threat
September 30U.S.U.S.Virtual RT – Secure Your Supply Chain with Collective Defense
September 30Northeast U.S.U.S.Virtual RT – Roadmap to Securing the Multicloud Environment
September 30IndiaIndiaVirtual RT – Securing Endpoints and Ensuring Compliance During Exceptional Times
September 29TexasU.S.Virtual RT – Security as a Catalyst for Digital Transformation
September 29East CanadaCanadaVirtual RT – How to Make Your Entire Organization 'Cyber-Ready'
September 29U.S.U.S.Virtual RT – When New Customers Are Not - Winning the Account Opening Battle
September 29U.K.U.K.Virtual RT – Digital Transformation, Cloud Security and SASE in an Uncertain World
September 24West CoastU.S.Virtual RT – Moving from Vulnerability Management to Effective Vulnerability Response
September 24NYCU.S.Virtual RT – Moving from Vulnerability Management to Effective Vulnerability Response
September 24ANZANZVirtual RT – A CISO’s Perspective on Managing Application Security
September 23U.S.U.S.Virtual RT – Zero Trust: Bringing the 'Trust' Back to the Individual
September 23FranceFranceVirtual RT – Protection des données dans un monde incertain
September 22Bay AreaU.S.Virtual RT – The Intersection of Digital Transformation and Zero Trust
September 22Southern U.S.U.S.Virtual RT – Zero Trust Access: The Five Step Program
September 22Eastern U.S.U.S.Virtual RT – IAM: App Security at the Pace of Your Development Teams
September 21NYCU.S.Virtual RT – Doing More with Less - Making the Case for Cybersecurity for 2021
September 21U.S.U.S.Virtual RT – Undetected & Unprotected: Securing IoT & Unmanaged Devices
September 17Midwest U.S.U.S.Virtual RT – Zero Trust: Bringing the 'Trust' Back to the Individual
September 17New EnglandU.S.Virtual RT – Doing More with Less - Making the Case for Cybersecurity for 2021
September 17U.K.U.K.Virtual RT – Business Resiliency in 2021: A New Approach to Security
September 16Western U.S.U.S.Virtual RT – Zero Trust Access: The Five Step Program
September 16Mid-AtlanticU.S.Virtual RT – Secure Your Supply Chain with Collective Defense
September 16U.S.U.S.Virtual RT – De-Risking the Cloud: Avoid Compliance Drag on Your Race to Innovate
September 16ItalyItalyVirtual RT – La protezione dei dati in un mondo incerto: un metodo che si adatta al rischio
September 15DallasU.S.Virtual RT – Next Generation Cybersecurity in the Age of IT/OT Convergence
September 15Central U.S.U.S.Virtual RT – Zero Trust Access: The Five Step Program
September 15U.S.U.S.Virtual RT – Managing Fast and Secure Software Development
September 10CaliforniaU.S.Virtual RT – Zero Trust: Bringing the 'Trust' Back to the Individual
September 10Western U.S.U.S.Virtual RT – Next Generation Cybersecurity in the Age of IT/OT Convergence
September 10AustraliaAustraliaVirtual RT – Securing Endpoints and Ensuring Compliance During Exceptional Times
September 9U.S.U.S.Virtual RT – Meeting the Demands of the Hybrid Consumer
September 9Western CanadaCanadaVirtual RT – Next Generation Cybersecurity in the Age of IT/OT Convergence
September 9BeneluxEuropeVirtual RT – Zero Trust Access: The Five Step Program
September 8TorontoCanadaVirtual RT – Zero Trust Access: The Five Step Program
September 3IndiaIndiaVirtual RT – A CISO’s Perspective on Managing Application Security
September 1SoCalU.S.Virtual RT – Measure & Communicate the Value of Your Security Program
September 1FranceFranceVirtual RT – Le Cloud dans tous ses états : comment en surmonter la complexité ?
August 27Southern U.S.U.S.Virtual RT – Defending the Extended Enterprise: The Latest Threats & Gaps
August 27U.S.U.S.Virtual RT – Meeting CMMC Requirements for Federal System Integrators
August 26NYCU.S.Virtual RT – Digital Transformation: The Next Generation - What to Expect in 2021
August 26NYC / NJU.S.Virtual RT – Zero Trust: Bringing the 'Trust' Back to the Individual
August 26SydneyAustraliaVirtual RT – Zero Trust Access: The Five Step Program
August 25Southwest U.S.U.S.Virtual RT – Inverting the Vulnerability Management Pyramid
August 24U.S.U.S.Virtual RT – Threat Landscape 2021: How to Improve Visibility & Reduce Response Times
August 24U.S.U.S.Virtual RT – Rapid Digitization & Risk: How to Strengthen Digital Channels
August 20South CentralU.S.Virtual RT – Maturing Zero Trust Controls in Complex Networks
August 20NYCU.S.Virtual RT – Fraudster Tactics and Trends
August 20NYCU.S.Virtual RT – The Rise of XDR: How to Defend Against Tomorrow’s Threats Today
August 19Western CanadaCanadaVirtual RT – Zero Trust Access: The Five Step Program
August 19U.S.U.S.Virtual RT – Discussing New Realities in Retail - The Needs of the 'Phygital' Consumer
August 19Midwest U.S.U.S.Virtual RT – The Future of Identity Governance
August 18U.S.U.S.Virtual RT – Managing Fast and Secure Software Development
August 18U.S.U.S.Virtual RT – Network Segmentation: A Key to Healthcare Security
August 17Western U.S.U.S.Virtual RT – Defending the Extended Enterprise: The Latest Threats & Gaps
August 13HoustonU.S.Virtual RT – Timeline of a Breach: How to Improve Detection and Response
August 13U.S.U.S.Virtual RT – Cloud Transformation: Visibility and Security in the Accelerated Journey
August 13U.S.U.S.Virtual RT – The SOC of the Future - Bringing Order to Chaos
August 13MalaysiaMalaysiaVirtual RT – How Will COVID-19 Impact the Future of Cybersecurity?
August 12MontréalCanadaVirtual RT – Zero Trust Access: The Five Step Program
August 11Southeast U.S.U.S.Virtual RT – Putting the 'I' into ROI – Making a Robust Case for Cybersecurity Investment
August 11Eastern U.S.U.S.Virtual RT – Defending the Extended Enterprise: The Latest Threats & Gaps
August 10U.S.U.S.Virtual RT – Can Better Business Continuity Secure Your Workforce?
August 6Midwest U.S.U.S.Virtual RT – Moving from Vulnerability Management to Effective Vulnerability Response
August 6APACAPACVirtual RT – Future DDoS Trends and Mitigation Strategies in 2020 and Beyond
August 5U.S.U.S.Virtual RT – Cyber Recovery with Stealth
August 4Western U.S.U.S.Virtual RT – IAM: App Security at the Pace of Your Development Teams
August 4Southeast U.S.U.S.Virtual RT – Securing Data & Infrastructure As Retail Gets Back to Work
August 4U.S.U.S.Virtual RT – Threat Landscape 2021: How to Improve Visibility & Reduce Response Times
July 30Southeast U.S.U.S.Virtual RT – Next Generation Cybersecurity in the Age of IT/OT Convergence
July 30U.S.U.S.Virtual RT – Can Better Business Continuity Secure Your Workforce?
July 29ChicagoU.S.Virtual RT – Cybersecurity: Why Asset Management Matters
July 29U.S.U.S.Virtual RT – Safeguarding Remote Worker Threats for Financial Services
July 28U.S.U.S.Virtual RT – Securing the Hybrid Cloud - Agility, Compliance & Collaboration Needs
July 28New EnglandU.S.Virtual RT – Balancing Personalization and Privacy in a Digitalized World
July 28NYCU.S.Virtual RT – Accelerating Incident Response: Organizational Shifts to Faster Remediation
July 27Northwest U.S.U.S.Virtual RT – Encryption Keys: More Important Than Your Data
July 23U.S.U.S.Virtual RT – Can Better Business Continuity Secure Your Workforce?
July 23APACAPACVirtual RT – The Post-COVID 'Normal' and the Relevance of MDR
July 22South CentralU.S.Virtual RT – The New Keys to Managing Dynamic Workforce Risk
July 22U.S.U.S.Virtual RT – Improvise, Adapt & Overcome Threats: A Strategy for Success
July 21Western U.S.U.S.Virtual RT – Advantage, CISO: Why Cybersecurity is Poised to Win in 2021
July 21Eastern U.S.U.S.Virtual RT – Network Segmentation: Creating Defense in Depth
July 21U.A.E.U.A.E.Virtual RT – Data Protection in an Uncertain World: A Risk-Adaptive Approach
July 16CaliforniaU.S.Virtual RT – Accelerating Incident Response: Organizational Shifts to Faster Remediation
July 16AucklandN.Z.Virtual RT – Zero Trust Access: The Five Step Program
July 15IllinoisU.S.Virtual RT – Every Breath You Take - How to Make Identity Sing
July 15MinneapolisU.S.Virtual RT – CIAM in an Uncertain World
July 14CanadaCanadaVirtual RT – Customer IAM: The Myths and Realities
July 14U.S.U.S.Virtual RT – Digital Identity Management & Security – The Currency of Care
July 9Western U.S.U.S.Virtual RT – Your Journey to the Cloud Operating Model
July 9DallasU.S.Virtual RT – The New Keys to Managing Dynamic Workforce Risk
July 8Southwest U.S.U.S.Virtual RT – Dynamic Work - Securely Enabling the Nomadic Workforce via Zero Trust
July 8Central U.S.U.S.Virtual RT – Advantage, CISO: Why Cybersecurity is Poised to Win in 2021
July 8LATAMLATAMVirtual RT – Pandemic Threat Landscape: Everything Old is New Again
July 8Hong KongChinaVirtual RT – How Will COVID-19 Impact the Future of Cybersecurity?
July 7IndiaIndiaVirtual RT – Optimizing the End Point Detection and Response Times
July 2ANZANZVirtual RT – How Will COVID-19 Impact the Future of Cybersecurity?
June 30Central U.S.U.S.Virtual RT – Pandemic Threat Landscape: Everything Old is New Again
June 30OhioU.S.Virtual RT – Dynamic Work - Securely Enabling the Nomadic Workforce via Zero Trust
June 29Eastern U.S.U.S.Virtual RT – Advantage, CISO: Why Cybersecurity is Poised to Win in 2021
June 25AtlantaU.S.Virtual RT – Indicators of Behavior: The New Way to Detect Advanced Attacks
June 25NYCU.S.Virtual RT – Encryption: New Use Cases for a New Era
June 25FranceFranceVirtual RT – Optimiser la transformation vers le Cloud
June 25IndiaIndiaVirtual RT – Cybersecurity Preparedness in Times of Disruption
June 24ChicagoU.S.Virtual RT – Make the Cloud Your Safe Place: The Future of Cloud Security
June 24U.K.U.K.Virtual RT – How to Measure & Communicate the Value of Your Security Program
June 23Western U.S.U.S.Virtual RT – Maturing Zero Trust Controls in Complex Networks
June 23SingaporeSingaporeVirtual RT – How Will COVID-19 Impact the Future of Cybersecurity?
June 22Western U.S.U.S.Virtual RT – Building and Securing the Optimal Experience for Dynamic Work
June 22CanadaU.S.Virtual RT – Customer IAM: The Myths and Realities
June 18CaliforniaU.S.Virtual RT – Beyond the Crisis: Securing the New Workforce for the Long Haul
June 18Southern U.S.U.S.Virtual RT – Digital Identity Management & Security – The Customer Journey
June 17U.S.U.S.Virtual RT – Building a Digitally Resilient Financial Services Organization
June 17NYC & MAU.S.Virtual RT – Beyond the Crisis: Securing the New Workforce for the Long Haul
June 16TexasU.S.Virtual RT – Rumors of the VPN's Demise are NOT Exaggerated
June 15NYC / NJU.S.Virtual RT – Modern IAM: Making the Business – and Security – Case
June 11Western U.S.U.S.Virtual RT – Digital Identity Management & Security - The Customer Journey
June 11BaltimoreU.S.Virtual RT – Indicators of Behavior: The New Way to Detect Advanced Attacks
June 11U.S.U.S.Virtual RT – The SOC of the Future – Bringing Order to Chaos
June 10Central U.S.U.S.Virtual RT – Zero Trust Access: The Five Step Program
June 10Southeast U.S.U.S.Virtual RT – Lessons Learned: Secure Access for the Fully-Remote Workforce
June 9U.K.U.K.Virtual RT – Beyond the Crisis: Securing the New Workforce for the Long Haul
June 8CaliforniaU.S.Virtual RT – Balancing Personalization and Privacy in a Digitalized World
June 8North CarolinaU.S.Virtual RT – Modern IAM: Making the Business – and Security – Case
June 4Southern U.S.U.S.Virtual RT – The New Keys to Managing Dynamic Workforce Risk
June 3San FranciscoU.S.Virtual RT – Encryption Keys: More Important Than Your Data
June 3U.S.U.S.Virtual RT – Zero Trust and the Healthcare Security Professional
June 2NYC / NJU.S.Virtual RT – The New Keys to Managing Dynamic Workforce Risk
June 1MassachusettsU.S.Virtual RT – The New Keys to Managing Dynamic Workforce Risk
May 28Western U.S.U.S.Virtual RT – Pandemic Threat Landscape: Everything Old is New Again
May 28WisconsinU.S.Virtual RT – Lessons Learned: Secure Access for the Fully-Remote Workforce
May 28AtlantaU.S.Virtual RT – Make the Cloud Your Safe Place: The Future of Cloud Security
May 27CaliforniaU.S.Virtual RT – Lessons Learned: Secure Access for the Fully-Remote Workforce
May 27Kansas CityU.S.Virtual RT – Lessons Learned: Secure Access for the Fully-Remote Workforce
May 26U.S.U.S.Virtual RT – Securing the 'Next Normal' of Financial Services Workplaces
May 26CanadaCanadaVirtual RT – Rightsizing Your Cybersecurity Posture for the Age of the Remote Workplace
May 26ANZAustraliaVirtual RT – Cyber Recovery: Bouncing Back from a Data Incident
May 21IndianaU.S.Virtual RT – Lessons Learned: Secure Access for the Fully-Remote Workforce
May 21TorontoU.S.Virtual RT – Make the Cloud Your Safe Place: The Future of Cloud Security
May 20Los AngelesU.S.Virtual RT – Indicators of Behavior: The New Way to Detect Advanced Attacks
May 20DenverU.S.Virtual RT – Encryption Keys: More Important Than Your Data
May 20TexasU.S.Virtual RT – Lessons Learned: Secure Access for the Fully-Remote Workforce
May 14NYCU.S.Virtual RT – Workforce Authentication: What's in Your Five-Year Plan?
May 13Des MoinesU.S.Virtual RT – Lessons Learned: Secure Access for the Fully-Remote Workforce
May 13Midwest U.S.U.S.Virtual RT – Remote Workforce: Securing the Next Normal
May 12SeattleU.S.Virtual RT – Make the Cloud Your Safe Place: The Future of Cloud Security
May 11Southern U.S.U.S.Virtual RT – Zero Trust Access: The Five Step Program
May 11CanadaCanadaVirtual RT – Pandemic Threat Landscape: Everything Old is New Again
May 6Central U.S.U.S.Virtual RT – Remote Workforce: Securing the Next Normal
May 6LondonU.K.Virtual RT – Rightsizing Your Cybersecurity Posture for the Age of the Remote Workplace
May 5Western U.S.U.S.Virtual RT – Zero Trust Access: The Five Step Program
May 4Eastern U.S.U.S.Virtual RT – Zero Trust Access: The Five Step Program
April 30Southwest U.S.U.S.Virtual RT – Rightsizing Your Cybersecurity Posture for the Age of the Remote Workplace
April 30BostonU.S.Virtual RT – Indicators of Behavior: The New Way to Detect Advanced Attacks
April 29Northwest U.S.U.S.Virtual RT – Rightsizing Your Cybersecurity Posture for the Age of the Remote Workplace
April 29Midwest U.S.U.S.Virtual RT – Rightsizing Your Cybersecurity Posture for the Age of the Remote Workplace
April 28DallasU.S.Virtual RT – Customer IAM: The Myths and Realities
April 28Southeast U.S.U.S.Virtual RT – Rightsizing Your Cybersecurity Posture for the Age of the Remote Workplace
April 27Northeast U.S.U.S.Virtual RT – Pandemic Threat Landscape: Everything Old is New Again
April 23SeattleU.S.Virtual RT – Lessons Learned: Secure Access for the Fully-Remote Workforce
April 23West CoastU.S.Virtual RT – Identity Transformation: The Future is Now
April 22U.S.U.S.Virtual RT – Healthcare Identity Transformation: The Future is Now
April 22LondonU.K.Virtual RT – Rightsizing Your Cybersecurity Posture for the Age of the Remote Workplace
April 21ChicagoU.S.Virtual RT – Indicators of Behavior: The New Way to Detect Advanced Attacks
April 21East CoastU.S.Virtual RT – Identity Transformation: The Future is Now
April 16OhioU.S.Virtual RT – Understanding What Zero Trust Means for Business
April 15CaliforniaU.S.Virtual RT – Lessons Learned: Secure Access for the Fully-Remote Workforce
April 15TexasU.S.Virtual RT – Rightsizing Your Cybersecurity Posture for the Age of the Remote Workplace
April 14Northeast U.S.U.S.Virtual RT – Rightsizing Your Cybersecurity Posture for the Age of the Remote Workplace
April 9San FranciscoU.S.Virtual RT – The Right Roles for SIEM and EDR
March 12PhoenixU.S.Timeline of a Breach: How to Improve Detection and Response
March 10DallasU.S.Balancing Personalization and Privacy in a Digitalized World
March 10MinneapolisU.S.(IAM Briefing) Smart Identity for the Hybrid Multicloud World
March 5MadridSpainBest Practices for Detecting Fraud in Your Organization
March 3ParisFranceBest Practices for Detecting Fraud Among Your Customers
February 27HyderabadIndiaStrategies to Defend Your Enterprise Applications against Malicious Bots
February 26San FranciscoU.S.Digital Transformation in Healthcare – The Impacts & Benefits of Digital Identity
February 25San FranciscoU.S.Driving Partnership Between Security & Development
February 25ChennaiIndiaManage Your Enterprise SaaS Vulnerabilities & Risks: The Security Promise
February 24San FranciscoU.S.New CISO Stress Research: Causes, Consequences and Conversation
February 20SeattleU.S.(IAM Briefing) Smart Identity for the Hybrid Multicloud World
February 11NYCU.S.Cybersecurity: Why Asset Management Matters
February 6DallasU.S.(IAM Briefing) Smart Identity for the Hybrid Multicloud World
February 6AtlantaU.S.Timeline of a Breach: How to Improve Detection and Response
February 5New DelhiIndiaFighting 'Unknown-Unknown' Threats with Actionable Threat Intelligence
February 4PhiladelphiaU.S.Digital Risk Management: Securing Multi-Cloud Transformation
February 4NYCU.S.(IAM Briefing) Smart Identity for the Hybrid Multicloud World
January 30SeattleU.S.App Security: How Do You Know You've Got it Right?
January 30NashvilleU.S.The Case for Re-Thinking Third Party Risk
January 29San JoseU.S.Understanding What Zero Trust Means for Business
January 28San FranciscoU.S.Understanding What Zero Trust Means for Business
January 28Washington, D.C.U.S.Understanding What Zero Trust Means for Business
January 23PhoenixU.S.Understanding What Zero Trust Means for Business
January 23MontréalCanadaDigital Risk Management: Embracing - and Leading - Digital Transformation
January 21CalgaryCanadaDigital Risk Management: CCPA, Privacy and Security in the New Privacy World
January 16BaltimoreU.S.Digital Risk Management: Securing Multi-Cloud Transformation
January 14San AntonioU.S.Digital Risk Management: CCPA, Privacy and Security in the New Privacy World
MonthCityCountryTopic
December 17MumbaiIndiaFighting 'Unknown-Unknown' Threats with Actionable Threat Intelligence
December 12SeattleU.S.The Case for Re-Thinking Third-Party Risk
December 12NYCU.S.Accelerating Incident Response: Organizational Shifts to Faster Remediation
December 10DenverU.S.Changing the Conversation around Digital Risk Management: Third Party Risk
December 5San FranciscoU.S.Outmaneuvering Threat Actors in the Age of Industrial IoT (IIoT)
December 4NYCU.S.Digital Risk Management: CCPA, Privacy and Security in the New Privacy World
December 3Washington, D.C.U.S.Digital Risk Management: Securing Multi-Cloud Transformation
December 3Washington, D.C.U.S.Eliminating Standing Privileges - The Roadmap to Zero Trust Through a Just-In-Time Cloud Model
November 21NYCU.S.Advancing SOC Triage & Investigation Through Destructive Object Insights
November 21BostonU.S.Digital Risk Management: Securing Multi-Cloud Transformation
November 21MumbaiIndiaEnabling Digital Transformation with Trusted Identities
November 19PittsburghU.S.Digital Risk Management: Securing Multi-Cloud Transformation
November 19TorontoCanadaMoving from Vulnerability Management to Effective Vulnerability Response
November 14Los AngelesU.S.Accelerating Incident Response: Organizational Shifts to Faster Remediation
November 14San FranciscoU.S.Banking on Mobile Security: How Financial Services Respond to the Growing Mobile Threat Landscape
November 13LondonU.K.Financial Services: Leveraging Security to Drive Innovation & Gain a Competitive Edge
November 12NYCU.S.Cyber Confidence: How Do You Know You've Got a Trustworthy Security Posture?
November 7CharlotteU.S.Moving from Vulnerability Management to Effective Vulnerability Response
November 5AtlantaU.S.Moving from Vulnerability Management to Effective Vulnerability Response
October 30DallasU.S.Cloud Strategies and Security: How to Be a Business Enabler
October 29HoustonU.S.Digital Risk Management: How to Achieve Digital Resiliency
October 24AtlantaU.S.Digital Risk Management: How to Achieve Digital Resiliency
October 23MumbaiIndiaThe 2019 SOC Odyssey - Evolving to Next Generation Effectiveness
October 22NYCU.S.Unpacking Zero Trust - Balancing Security and Profitability
October 17IrvineU.S.Digital Risk Management: Embracing - and Leading - Digital Transformation
October 17CalgaryCanadaOutmaneuvering Threat Actors in the Age of Industrial IoT (IIoT)
October 10SeattleU.S.Digital Risk Management: How to Achieve Digital Resiliency
October 8PhiladelphiaU.S.Indicators of Behavior: The New Way to Detect Advanced Attacks
October 2SeattleU.S.Open Source Security: How to Defend at the Speed of Attack
October 2BostonU.S.Cyber Recovery in the Age of Ransomware
October 1DenverU.S.Data Privacy & Security: Do You Meet the New Standards?
September 26DallasU.S.Digital Risk Management: CCPA, Privacy and Security in the New Privacy World
September 26AtlantaU.S.Open Source Security: How to Defend at the Speed of Attack
September 24TorontoCanadaIndicators of Behavior: The New Way to Detect Advanced Attacks
September 24TorontoCanadaOutmaneuvering Threat Actors in the Age of Industrial IoT (IIoT)
September 19NYCU.S.(MaaS360 Briefing) Unified Endpoint Management in 2020
September 17Los AngelesU.S.Outmaneuvering Threat Actors in the Age of Industrial IoT (IIoT)
September 17BostonU.S.Open Source Security: How to Defend at the Speed of Attack
September 12ChicagoU.S.(MaaS360 Briefing) Unified Endpoint Management in 2020
September 12DetroitU.S.Outmaneuvering Threat Actors in the Age of Industrial IoT (IIoT)
September 10San FranciscoU.S.Risk Ranking Re-Evaluated: Bringing Analytics & Automation to Vulnerability Assessment
September 10NYCU.S.Outmaneuvering Threat Actors in the Age of Industrial IoT (IIoT)
September 5PhiladelphiaU.S.Getting Cyber Right - Towards a Reasonable Level of Care
August 22San DiegoU.S.Indicators of Behavior: The New Way to Detect Advanced Attacks
August 21DallasU.S.Indicators of Behavior: The New Way to Detect Advanced Attacks
August 20DenverU.S.Changing the Conversation Around Digital Risk Management: Third Party Risk
August 19MumbaiIndiaQuantify Your Cyber Exposure: Build Resilience and Defend Better
August 13NYCU.S.Securing Third Party Code - A Digital Imperative for a Connected World
August 13NYCU.S.Indicators of Behavior: The New Way to Detect Advanced Attacks
August 13NYCU.S.Mobile / Web App Security: How Do You Know You've Got It Right?
August 6Las VegasU.S.Security's Role in Digital Transformation
August 1BrasiliaBrazilEndpoint Defense 2.0: How AI and ML Can Empower Predictive Security
July 30Rio de JaneiroBrazilEndpoint Defense 2.0: How AI and ML Can Empower Predictive Security
July 25Sao PauloBrazilEndpoint Defense 2.0: How AI and ML Can Empower Predictive Security
July 25Sao PauloBrazilFaces of Fraud: How Prepared are You to Detect and Defend?
July 23Los AngelesU.S.(MaaS360 Briefing) Unified Endpoint Management in 2020
July 18DallasU.S.(MaaS360 Briefing) Unified Endpoint Management in 2020
July 18AtlantaU.S.Security as a Catalyst for Digital Transformation
June 27Washington, D.C.U.S.Changing the Conversation around Digital Risk Management: Third Party Risk
June 27LondonU.K.Beyond Passwords: Using Advanced Risk-Based and User Biometrics
June 26SingaporeSingaporeA Unified Approach to Optimizing Cybersecurity Maturity
June 25NYCU.S.Changing the Conversation around Digital Risk Management: Third Party Risk
June 25NYCU.S.Moving from Vulnerability Management to Effective Vulnerability Response
June 25NYCU.S.How Zero-Trust Can Secure Your Hybrid Cloud Environment
June 20San FranciscoU.S.(IAM Briefing) Secure Identity: The Future is Now
June 13BostonU.S.Changing the Conversation Around Digital Risk Management: Third Party Risk
June 13Washington, D.C.U.S.(IAM Briefing) Secure Identity: The Future is Now
June 12NYCU.S.(IAM Briefing) Secure Identity: The Future is Now
June 11ChicagoU.S.(IAM Briefing) Secure Identity: The Future is Now
June 4SeattleU.S.Mobile / Web App Security: How Do You Know You've Got It Right?
June 4SeattleU.S.Understanding Third-Party Risk in Your Global Workforce
May 29CharlotteU.S.Changing the Conversation around Digital Risk Management: Third Party Risk
May 23AmsterdamNetherlandsWhy Application Security is Your Best Cyber Defense
May 21San FranciscoU.S.Open Source Security: How to Defend at the Speed of Attack
May 16PhoenixU.S.Data Privacy & Security: Do You Meet the New Standards?
May 15NashvilleU.S.Securing the Digital Enterprise
May 9NYCU.S.Threat Detection and Response: How to Evolve Your Incident Response
May 7AtlantaU.S.Outmaneuvering Threat Actors in the Age of Industrial IoT (IIoT)
May 2ChicagoU.S.Mistakes I've Made - Confessions of a Healthcare CISO
May 2NYCU.S.Security's Role in Digital Transformation
April 30BostonU.S. Security as a Catalyst for Digital Transformation
April 24AtlantaU.S. Managing Access Risk - Controlling the Identity Lifecycle
April 24PhiladelphiaU.S.Managing Access Risk - Controlling the Identity Lifecycle
April 23DubaiU.A.E.Fighting Fraud in the Age of Mobility
April 18AtlantaU.S. Multilayered Security: Strategies & Solutions for Protecting Customers' Personal Information
April 10CharlotteU.S.Mobile / Web App Security: How Do You Know You’ve Got it Right?
April 10MumbaiIndiaEvolving to Next Generation Security Orchestration and Visibility
April 4Central NJU.S.Security as a Catalyst for Digital Transformation
April 4MelbourneAustraliaZero Trust Security
April 2San JoseU.S.Changing the Conversation around Digital Risk Management: Third Party Risk
April 2SydneyAustraliaZero Trust Security
March 27PhoenixU.S.Open Source Security: How to Defend at the Speed of Attack
March 26DallasU.S.Open Source Security: How to Defend at the Speed of Attack
March 26HoustonU.S.Managing Access Risk - Controlling the Identity Lifecycle
March 21TorontoCanadaOpen Source Security: How to Defend at the Speed of Attack
March 19NYCU.S.How to Use Automation and Orchestration to Effectively Respond to Phishing Attacks
March 14BostonU.S.DDoS Defense: How to Break the Link to Advanced Threats
March 13NYCU.S.Open Source Security: How to Defend at the Speed of Attack
March 6San FranciscoU.S.Assuring Trust in the Age of Business Email Compromise
March 5San FranciscoU.S.Advanced Threats: How to Respond to Bigger, Stronger, Faster
February 28MiamiU.S.Open Source Security: How to Defend at the Speed of Attack
February 26SeattleU.S.Security as a Catalyst for Digital Transformation
February 20ColumbusU.S.Security as a Catalyst for Digital Transformation
February 14ChennaiIndiaAccelerating Digital Transformation: The Security Promise
February 13BangaloreIndiaThe Rise of DevSecOps: Best Practices for Ensuring Software Security from the Start
February 7NYCU.S.DDoS Defense: How to Break the Link to Advanced Threats
January 31San FranciscoU.S.Security as a Catalyst for Digital Transformation
January 30BostonU.S.Securing the Digital Enterprise
January 29DenverU.S.Security as a Catalyst for Digital Transformation
January 24ChicagoU.S.Healthcare & Insurance: How to Establish and Maintain Digital Identity Trust
January 23NYCU.S.The Road to Business-Driven Security
January 17SeattleU.S.The Road to Business-Driven Security
MonthCityCountryTopic
December 18San DiegoU.S.Security as a Catalyst for Digital Transformation
December 4Washington, D.C.U.S.Open Source Components: How to Increase Speed and Reduce the Risk
November 29RaleighU.S.The Road to Business-Driven Security
November 29MumbaiIndiaHow Secure Are You? Best Practices in Measuring Your Security Stance
November 29MumbaiIndiaThe Changing Nature of Identity in a Digitized World
November 15NYCU.S.Zero Trust Security
October 30BostonU.S.Modern Identity and Access Management: How to Build Trust without Sacrificing Security
October 25ColumbusU.S.Modern Identity and Access Management: How to Build Trust without Sacrificing Security
October 18SeattleU.S.Open Source Components: How to Increase Speed and Reduce the Risk
October 18NYCU.S.Financial Crimes: How to Improve Response and Reduce False Positives
October 16DallasU.S.Security as a Catalyst for Digital Transformation
October 11ColumbusU.S.Workshop: New Essentials of Privileged Access Management
October 11Los AngelesU.S.Security as a Catalyst for Digital Transformation
October 9BostonU.S.Workshop: New Essentials of Privileged Access Management
October 4DenverU.S.Threat Hunting: How to Evolve Your Incident Response
September 27ScottsdaleU.S.Threat Hunting: How to Evolve Your Incident Response
September 26LondonU.K.How to Establish and Maintain Digital Identity Trust
September 20San AntonioU.S.The Future of Identity and Governance
September 19DallasU.S.A New Model of Digital Trust in a Zero Trust Online World
September 18AtlantaU.S.A New Model of Digital Trust in a Zero Trust Online World
September 11TorontoCanadaThe Road to Business-Driven Security
September 11TorontoCanadaOpen Source Components: How to Increase Speed and Reduce the Risk
September 11TorontoCanadaSecurity as a Catalyst for Digital Transformation
August 21Kansas CityU.S.The Road to Business-Driven Security
August 14NYCU.S.The Road to Business-Driven Security
August 14NYCU.S.Mobile / Web App Security: How Do You Know It’s Working?
July 27Sao PauloBrazilRethinking Your Cybersecurity Strategy
July 24AtlantaU.S.Threat Hunting: How to Evolve Your Incident Response
July 17DallasU.S.Open Source Components: How to Increase Speed and Reduce the Risk
June 22BangaloreIndiaManage Your Enterprise Risks in the Cloud: The Security Promise
June 21Washington, D.C.U.S.Threat Hunting: How to Evolve Your Incident Response
June 14CharlotteU.S.Modern Identity and Access Management: How to Build Trust without Sacrificing Security
June 12BangaloreIndiaFighting the Avanced DDoS Threat: Proactive Mitigation and Collaboration
May 10ManilaPhilippinesEnterprise Security 2018 – Business Drivers, Compliance and Regulatory Challenges
May 10Washington, D.C.U.S.Reality or Snake Oil? The Security Promise of AI, ML and Data Science
April 26SeattleU.S.Threat Hunting: How to Evolve Your Incident Response
April 24ChennaiIndiaAdvanced SOC – Evolving to the Next Generation Threat Management Capability
April 18MumbaiIndiaManage Your Enterprise Risks in the Cloud: The Security
April 18San FranciscoU.S.The Machine Identity Crisis: A Call to Action
April 17San FranciscoU.S.The Machine Identity Crisis: A Call to Action
April 17San FranciscoU.S.Strategic Threat Intelligence: Lessons from the Pentagon
April 12NYCU.S.Reality or Snake Oil? The Security Promise of AI, ML and Data Science
April 10ChicagoU.S.Reality or Snake Oil? The Security Promise of AI, ML and Data Science
April 3BostonU.S.Active Defense: Clearing the Legal and Ethical Hurdles
March 29AtlantaU.S.Payment & Banking Innovation: Get Ahead of the Security Challenges
March 28NYCU.S.Open Source Components: How to Increase Speed and Reduce the Risk
March 28NYCU.S.How to Turn Your End User into Your Friend User and Reduce Your Biggest Risk Vector
March 22MumbaiIndiaIdentity-driven Security in an Evolving Threat Landscape
March 15Mexico CityMexicoPhishing: New Strategies to Fight the Growing Threat
March 15MumbaiIndiaThe Road to Business-Driven Security
March 13AtlantaU.S.Active Defense: Clearing the Legal and Ethical Hurdles
March 13BangkokThailand2018 Digital Identity and Mobile Banking Fraud Trends
March 1NYCU.S.Modern Privileged Access Management: How to Use Threat Analytics to Help Prevent Breaches
February 8NYCU.S.Threat Hunting: How to Evolve Your Incident Response
February 6DallasU.S.Exposing the Enemy Within: How to Leverage DNS Data to Improve Breach Detection and Response
February 2SingaporeSingaporeAdvanced SOC– Evolving to the Next Generation Threat Management Capability
January 23AtlantaU.S.Modern Identity and Access Management: How to Build Trust without Sacrificing Security
January 18San FranciscoU.S.Exposing the Enemy Within: How to Leverage DNS Data to Improve Breach Detection and Response
January 16DallasU.S.Threat Hunting: How to Evolve Your Incident Response
MonthCityCountryTopic
December 7MontrealCanadaSecure the Breach: Why You Need to Encrypt Everything
December 6MumbaiIndiaMobility & Fraud: Scams and Solutions to Eye in 2018
December 5SeattleU.S.The Road to Business-Driven Security
November 28FrankfurtGermanyFighting Cybercriminals in the Era of Digital Banking
November 15NYCU.S.Exposing the Enemy Within: How to Leverage DNS Data to Improve Breach Detection and Response
November 15MilanItalyBattling Fraud in the Era of Open Banking
November 14NYCU.S.Reducing the Risk of a Cyber Attack - How to Avoid Becoming the Next Equifax
November 14NYCU.S.Incident Response: How to Find the Internal Threat Before the Damage is Done
November 7NYCU.S.Your Data Is On the Move, But Is It Secure?
October 26ParisFranceSecurity Transformation: Be an Enabler, Not an Obstacle
October 26DallasU.S.The Road to Business-Driven Security
October 24FrankfurtGermanySecurity Transformation: Be an Enabler, Not an Obstacle
October 17LondonU.K.Reducing the Risk of a Cyber Attack - How to Avoid Becoming the Next Equifax
October 17LondonU.K.Security Transformation: Be an Enabler, Not an Obstacle
October 12AtlantaU.S.The Road to Business-Driven Security
October 3San JoseU.S.The Road to Business-Driven Security
September 26Los AngelesU.S.IoT Security: How to Minimize the Threat and Maximize the Trust
September 21SeattleU.S.IoT Security: How to Minimize the Threat and Maximize the Trust
September 19BostonU.S.The Road to Business-Driven Security
September 14DubaiU.A.E.Developing The Next Generation of SOCs in GCC Region
Setember 12TorontoCanadaThe Road to Business-Driven Security
September 12TorontoCanadaPrivileged Access and the Business: How Secure Code Can Improve the Bottom Line
September 12TorontoCanadaWannaCry and Crimeware as a Service: How to Respond to This Security Game-Changer
September 12TorontoCanadaNIST Cybersecurity Framework: Best Practices for Implementation
September 12TorontoCanadaIncident Response: How to Find the Internal Threat Before the Damage is Done
August 24ColumbusU.S.IoT Security: How to Minimize the Threat and Maximize the Trust
August 24TorontoCanadaPreparing for GDPR: Checklist for Conformance
August 22NYCU.S.Preparing for GDPR: Checklist for Conformance
August 15Sao PauloBrazilPhishing: New Strategies to Fight the Global Threat
August 10DetriotU.S.IoT Security: How to Minimize the Threat and Maximize the Trust
August 3HoustonU.S.IoT Security: How to Minimize the Threat and Maximize the Trust
August 1CharlotteU.S.Secure the Breach: Why You Need to Encrypt Everything

For more information on how you can sponsor or attend any of our upcoming Executive Rountables please contact us today.