ISMG’s Executive Roundtables are intimate, closed-door discussions focused on specific challenges being faced by information security executives in today’s cybersecurity landscape.  Moderated by one of ISMG’s Executive Editors and hosted over breakfast, lunch or dinner, Executive Roundtables provide senior cybersecurity professionals the opportunity to share their own experiences with an intimate group of peers and emerge with new strategies they can immediately put to work at their own organizations.

Global Roundtable Events

GLOBAL ROUNDTABLE EVENTS

Ismg Executive Roundtable Dinner Atlanta Threat Hunting Ismg Executive Roundtable Sao Paulo 2018 Ismg Executive Roundtable Road To Business Driven Security Nyc Summit Ismg-Executive-Roundtable-Nyc-Web-App-Security Ismg Executive Roundtable Dinner Kansas City Business Driven Security Ismg Executive Roundtable Road To Business Driven Security Toronto Summit Ismg Executive Roundtable Toronto Open Source Components Ismg Executive Roundtable Dinner Nyc Financial Crimes

Upcoming Executive Roundtables

DateCityCountryTopic
April 24thPhiladelphiaU.S.Managing Access Risk - Controlling the Identity Lifecycle
April 24thAtlantaU.S. Managing Access Risk - Controlling the Identity Lifecycle
April 30thBostonU.S. Security as a Catalyst for Digital Transformation
May 2ndNYCU.S.Security's Role in Digital Transformation
May 2ndChicagoU.S.Mistakes I've Made - Confessions of a Healthcare CISO
May 7thOrlandoU.S.Security as a Catalyst for Digital Transformation
May 7thAtlantaU.S.Outmaneuvering Threat Actors in the Age of Industrial IoT (IIoT)
May 9thNYCU.S.Threat Detection and Response: How to Evolve Your Incident Response
May 15thNashvilleU.S.Securing the Digital Enterprise
May 16thPhoenixU.S.Data Privacy & Security: Do You Meet the New Standards?
May 21stBangaloreIndiaComing Soon
May 22ndSan FranciscoU.S.Open Source Security: How to Defend at the Speed of Attack
May 23rdAmsterdamNetherlandsWhy Application Security is Your Best Cyber Defense
May 23rdMinneapolisU.S.Changing the Conversation around Digital Risk Management: Third Party Risk
May 29thCharlotteU.S.Changing the Conversation around Digital Risk Management: Third Party Risk
June 4thSeattleU.S.Coming Soon
June 4thSeattleU.S.Coming Soon
June 6thNYCU.S.Coming Soon
June 11thChicagoU.S.Coming Soon
June 12thNYCU.S.Coming Soon
June 13thBostonU.S.Coming Soon
June 18thNYCU.S.Coming Soon
June 20thAustinU.S.Coming Soon
July 26thSao PauloBrazilComing Soon
August 13thNYCU.S.Coming Soon
August 13thNYCU.S.Coming Soon
September 12thDetroitU.S.Coming Soon
September 13thNYCU.S.Coming Soon
September 17thL.A.U.S.Coming Soon
September 19thPortlandU.S.Coming Soon
September 24thTorontoCanadaComing Soon
October 11thLondonU.K.Coming Soon
October 17thCalgaryCanadaComing Soon

Past Executive Roundtables

MonthCityCountryTopic
AprilDubaiU.A.E.Fighting Fraud in the Age of Mobility
AprilAtlantaU.S. Multilayered Security: New Strategies and Solutions for Protecting Your Customers' Personal Information
AprilCharlotteU.S.Mobile / Web App Security: How Do You Know You’ve Got it Right?
AprilMumbaiIndiaEvolving to Next Generation Security Orchestration and Visibility
AprilCentral NJU.S.Security as a Catalyst for Digital Transformation
AprilMelbourneAustraliaZero Trust Security
AprilSan JoseU.S.Changing the Conversation around Digital Risk Management: Third Party Risk
AprilSydneyAustraliaZero Trust Security
MarchPhoenixU.S.Open Source Security: How to Defend at the Speed of Attack
MarchDallasU.S.Open Source Security: How to Defend at the Speed of Attack
MarchHoustonU.S.Managing Access Risk – Controlling the Identity Lifecycle
MarchTorontoCanadaOpen Source Security: How to Defend at the Speed of Attack
MarchNYCU.S.How to Use Automation and Orchestration to Effectively Respond to Phishing Attacks
MarchBostonU.S.DDoS Defense: How to Break the Link to Advanced Threats
March NYCU.S.Open Source Security: How to Defend at the Speed of Attack
March San FranciscoU.S.Assuring Trust in the Age of Business Email Compromise
MarchSan FranciscoU.S.Advanced Threats: How to Respond to Bigger, Stronger, Faster
FebruaryMiamiU.S.Open Source Security: How to Defend at the Speed of Attack
FebruarySeattleU.S.Security as a Catalyst for Digital Transformation
FebruaryJacksonvilleU.S.Security as a Catalyst for Digital Transformation
FebruaryColumbusU.S.Security as a Catalyst for Digital Transformation
FebruaryChennaiIndiaAccelerating Digital Transformation: The Security Promise
FebruaryBangaloreIndiaThe Rise of DevSecOps: Best Practices for Ensuring Software Security from the Start
FebruaryNYCU.S.DDoS Defense: How to Break the Link to Advanced Threats
JanuarySan FranciscoU.S.Security as a Catalyst for Digital Transformation
JanuaryBostonU.S.Securing the Digital Enterprise
JanuaryDenverU.S.Security as a Catalyst for Digital Transformation
JanuaryChicagoU.S.Healthcare & Insurance: How to Establish and Maintain Digital Identity Trust
JanuaryNYCU.S.The Road to Business-Driven Security
January 2019SeattleU.S.The Road to Business-Driven Security
2018-12-4DecemberSan DiegoU.S.Security as a Catalyst for Digital Transformation
2018-12-4DecemberWashington, D.C.U.S.Open Source Components: How to Increase Speed and Reduce the Risk
2018-11-29NovemberRaleighU.S.The Road to Business-Driven Security
2018-11-29NovemberMumbaiIndiaHow Secure Are You? Best Practices in Measuring Your Security Stance
2018-11-29NovemberMumbaiIndiaThe Changing Nature of Identity in a Digitized World
2018-11-15NovemberNYCU.S.Zero Trust Security
2018-10-30OctoberBostonU.S.Modern Identity and Access Management: How to Build Trust without Sacrificing Security
2018-10-25OctoberColumbusU.S.Modern Identity and Access Management: How to Build Trust without Sacrificing Security
2018-10-23OctoberLondonU.K.Advanced SOC Operations – Moving from SOC to the CSOC
2018-10-18OctoberSeattleU.S.Open Source Components: How to Increase Speed and Reduce the Risk
2018-10-18OctoberNYCU.S.Financial Crimes: How to Improve Response and Reduce False Positives
2018-10-16OctoberDallasU.S.Security as a Catalyst for Digital Transformation
2018-10-11OctoberColumbusU.S.Workshop: New Essentials of Privileged Access Management
2018-10-11OctoberLos AngelesU.S.Security as a Catalyst for Digital Transformation
2018-10-09OctoberBostonU.S.Workshop: New Essentials of Privileged Access Management
2018-10-04OctoberDenverU.S.Threat Hunting: How to Evolve Your Incident Response
2018-09-27SeptemberScottsdaleU.S.Threat Hunting: How to Evolve Your Incident Response
2018-09-26SeptemberLondonU.K.How to Establish and Maintain Digital Identity Trust
2018-09-20SeptemberSan AntonioU.S.The Future of Identity and Governance
2018-09-19SeptemberDallasU.S.A New Model of Digital Trust in a Zero Trust Online World
2018-09-18SeptemberAtlantaU.S.A New Model of Digital Trust in a Zero Trust Online World
2018-09-11SeptemberTorontoCanadaThe Road to Business-Driven Security
2018-09-11SeptemberTorontoCanadaOpen Source Components: How to Increase Speed and Reduce the Risk
2018-09-11SeptemberTorontoCanadaSecurity as a Catalyst for Digital Transformation
2018-08-21AugustKansas CityU.S.The Road to Business-Driven Security
2018-08-14AugustNYCU.S.The Road to Business-Driven Security
2018-08-14AugustNYCU.S.Mobile/Web App Security: How Do You Know it’s Working?
2018-07-27JulySao PauloBrazilRethinking Your Cybersecurity Strategy
2018-07-24JulyAtlantaU.S.Threat Hunting: How to Evolve Your Incident Response
2018-07-19JulyDallasU.S.Open Source Components: How to Increase Speed and Reduce the Risk
2018-06-22JuneBangaloreIndiaManage Your Enterprise Risks in the Cloud: The Security Promise
2018-06-21JuneWashington, D.C.U.S.Threat Hunting: How to Evolve Your Incident Response
2018-06-14JuneCharlotteU.S.Modern Identity and Access Management: How to Build Trust without Sacrificing Security
2018-06-12JuneBangaloreIndiaFighting the Avanced DDoS Threat: Proactive Mitigation and Collaboration
2018-05-10MayManilaPhilippinesEnterprise Security 2018 – Business Drivers, Compliance and Regulatory Challenges
2018-05-10MayWashington, D.C.U.S.Reality or Snake Oil? The Security Promise of AI, ML and Data Science
2018-04-26AprilSeattleU.S.Threat Hunting: How to Evolve Your Incident Response
2018-04-24AprilChennaiIndiaAdvanced SOC – Evolving to the Next Generation Threat Management Capability
2018-04-18AprilMumbaiIndiaManage Your Enterprise Risks in the Cloud: The Security
2018-04-18AprilSan FranciscoU.S.The Machine Identity Crisis: A Call to Action
2018-04-17AprilSan FranciscoU.S.The Machine Identity Crisis: A Call to Action
2018-04-17AprilSan FranciscoU.S.Strategic Threat Intelligence: Lessons from the Pentagon
2018-04-12AprilNYCU.S.Reality or Snake Oil? The Security Promise of AI, ML and Data Science
2018-04-10AprilChicagoU.S.Reality or Snake Oil? The Security Promise of AI, ML and Data Science
2018-04-03AprilBostonU.S.Active Defense: Clearing the Legal and Ethical Hurdles
2018-03-29MarchAtlantaU.S.Payment & Banking Innovation: Get Ahead of the Security Challenges
2018-03-28MarchNYCU.S.Open Source Components: How to Increase Speed and Reduce the Risk
2018-03-28MarchNYCU.S.How to Turn Your End User into Your Friend User and Reduce Your Biggest Risk Vector
2018-03-21MarchMumbaiIndiaIdentity-driven Security in an Evolving Threat Landscape
2018-03-15MarchMexico CityMexicoPhishing: New Strategies to Fight the Growing Threat
2018-03-13MarchAtlantaU.S.Active Defense: Clearing the Legal and Ethical Hurdles
2018-03-13MarchBangkokThailand2018 Digital Identity and Mobile Banking Fraud Trends
2018-03-08MarchMumbaiIndiaThe Road to Business-Driven Security
2018-03-01MarchNYCU.S.Modern Privileged Access Management: How to Use Threat Analytics to Help Prevent Breaches
2018-02-08FebruaryNYCU.S.Threat Hunting: How to Evolve Your Incident Response
2018-02-06FebruaryDallasU.S.Exposing the Enemy Within: How to Leverage DNS Data to Improve Breach Detection and Response
2018-02-01FebruarySingaporeSingaporeAdvanced SOC– Evolving to the Next Generation Threat Management Capability
2018-01-23JanuaryAtlantaU.S.Modern Identity and Access Management: How to Build Trust without Sacrificing Security
2018-01-18JanuarySan FranciscoU.S.Exposing the Enemy Within: How to Leverage DNS Data to Improve Breach Detection and Response
2018-01-16JanuaryDallasU.S.Threat Hunting: How to Evolve Your Incident Response
2017-12-07DecemberMontrealCanadaSecure the Breach: Why You Need to Encrypt Everything
2017-12-06DecemberMumbaiIndiaMobility & Fraud: Scams and Solutions to Eye in 2018
2017-12-05DecemberSeattleU.S.The Road to Business-Driven Security
2017-12-28NovemberFrankfurtGermanyFighting Cybercriminals in the Era of Digital Banking
2017-11-15NovemberNYCU.S.Exposing the Enemy Within: How to Leverage DNS Data to Improve Breach Detection and Response
2017-11-15NovemberMilanItalyBattling Fraud in the Era of Open Banking
2017-11-14NovemberNYCU.S.Reducing the Risk of a Cyber Attack-- How to Avoid Becoming the Next Equifax
2017-11-14NovemberNYCU.S.Incident Response: How to Find the Internal Threat Before the Damage is Done
2017-11-07NovemberNYCU.S.Your Data Is On the Move, But Is It Secure?
2017-10-26OctoberParisFranceSecurity Transformation: Be an Enabler, Not an Obstacle
2017-10-26OctoberDallasU.S.The Road to Business-Driven Security
2017-10-24OctoberFrankfurtGermanySecurity Transformation: Be an Enabler, Not an Obstacle
2017-10-17OctoberLondonU.K.Reducing the Risk of a Cyber Attack-- How to Avoid Becoming the Next Equifax
2017-10-17OctoberLondonU.K.Security Transformation: Be an Enabler, Not an Obstacle
2017-10-12OctoberAtlantaU.S.The Road to Business-Driven Security
2017-10-03OctoberSan JoseU.S.The Road to Business-Driven Security
2017-09-26SeptemberLos AngelesU.S.IoT Security: How to Minimize the Threat and Maximize the Trust
2017-09-21SeptemberSeattleU.S.IoT Security: How to Minimize the Threat and Maximize the Trust
2017-09-19SeptemberBostonU.S.The Road to Business-Driven Security
2017-09-14SeptemberDubaiU.A.E.Developing The Next Generation of SOCs in GCC Region
2017-09-12SeptemberTorontoCanadaThe Road to Business-Driven Security
2017-09-12SeptemberTorontoCanadaPrivileged Access and the Business: How Secure Code Can Improve the Bottom Line
2017-09-12SeptemberTorontoCanadaWannaCry and Crimeware as a Service: How to Respond to This Security Game-Changer
2017-09-12SeptemberTorontoCanadaNIST Cybersecurity Framework: Best Practices for Implementation
2017-09-12SeptemberTorontoCanadaIncident Response: How to Find the Internal Threat Before the Damage is Done
2017-08-24AugustColumbusU.S.IoT Security: How to Minimize the Threat and Maximize the Trust
2017-08-24AugustTorontoCanadaPreparing for GDPR: Checklist for Conformance
2017-08-22AugustNYCU.S.Preparing for GDPR: Checklist for Conformance
2017-08-15AugustSao PauloBrazilPhishing: New Strategies to Fight the Global Threat
2017-08-10AugustDetroitU.S.IoT Security: How to Minimize the Threat and Maximize the Trust
2017-08-03AugustHoustonU.S.IoT Security: How to Minimize the Threat and Maximize the Trust
2017-08-01AugustCharlotteU.S.Secure the Breach: Why You Need to Encrypt Everything

For more information on how you can sponsor or attend any of our upcoming Executive Rountables please contact us today.