ISMG’s Executive Roundtables are intimate, closed-door discussions focused on specific challenges being faced by information security executives in today’s cybersecurity landscape.  Moderated by one of ISMG’s Executive Editors and hosted over breakfast, lunch or dinner, Executive Roundtables provide senior cybersecurity professionals the opportunity to share their own experiences with an intimate group of peers and emerge with new strategies they can immediately put to work at their own organizations.

Global Roundtable Events

GLOBAL ROUNDTABLE EVENTS

Ismg Executive Roundtable Dinner Atlanta Threat Hunting Ismg Executive Roundtable Sao Paulo 2018 Ismg Executive Roundtable Road To Business Driven Security Nyc Summit Ismg-Executive-Roundtable-Nyc-Web-App-Security Ismg Executive Roundtable Dinner Kansas City Business Driven Security Ismg Executive Roundtable Road To Business Driven Security Toronto Summit Ismg Executive Roundtable Toronto Open Source Components Ismg Executive Roundtable Dinner Nyc Financial Crimes

Upcoming Executive Roundtables

DateCityCountryTopic
June 20thLondonU.K.Beyond Passwords: Using Advanced Risk-Based and User Biometrics
June 20thSan FranciscoU.S.(IAM Briefing) Secure Identity: The Future is Now
June 25thNYCU.S.How Zero-Trust Can Secure Your Hybrid Cloud Environment
June 25thNYCU.S.Moving from Vulnerability Management to Effective Vulnerability Response
June 25thNYCU.S.Changing the Conversation around Digital Risk Management: Third Party Risk
June 26thSingaporeSingaporeA Unified Approach to Optimizing Cybersecurity Maturity
June 27thWashington, D.C.U.S.Changing the Conversation around Digital Risk Management: Third Party Risk
July 18thAtlantaU.S.Coming Soon
July 18thDallasU.S.Coming Soon
July 23rdLos AngelesU.S.Coming Soon
July 25thSao PauloBrazilComing Soon
July 25thSao PauloBrazilComing Soon
July 30thRioBrazilComing Soon
August 1stBraziliaBrazilComing Soon
August 6thLas VegasU.S.Coming Soon
August 13thNYCU.S.Coming Soon
August 13thNYCU.S.Coming Soon
August 13thNYCU.S.Coming Soon
August 20thDenverU.S.Coming Soon
August 27thSanta ClaraU.S.Coming Soon
September 12thNYCU.S.Coming Soon
September 12thDetroitU.S.Coming Soon
September 17thL.A.U.S.Coming Soon
September 19thPortlandU.S.Coming Soon
September 24thTorontoCanadaComing Soon
October 11thLondonU.K.Coming Soon
October 17thCalgaryCanadaComing Soon
October 30thDallasU.S.Coming Soon
November 5thNYCU.S.Coming Soon
November 13thNYCU.S.Coming Soon

Past Executive Roundtables

MonthCityCountryTopic
JuneBostonU.S.Changing the Conversation Around Digital Risk Management: Third Party Risk
JuneWashington, D.C.U.S.(IAM Briefing) Secure Identity: The Future is Now
JuneNYCU.S.(IAM Briefing) Secure Identity: The Future is Now
JuneChicagoU.S.(IAM Briefing) Secure Identity: The Future is Now
JuneSeattleU.S.Mobile / Web App Security: How Do You Know You've Got It Right?
JuneSeattleU.S.Understanding Third-Party Risk in Your Global Workforce
MayCharlotteU.S.Changing the Conversation around Digital Risk Management: Third Party Risk
MayAmsterdamNetherlandsWhy Application Security is Your Best Cyber Defense
MaySan FranciscoU.S.Open Source Security: How to Defend at the Speed of Attack
MayPhoenixU.S.Data Privacy & Security: Do You Meet the New Standards?
MayNashvilleU.S.Securing the Digital Enterprise
MayNYCU.S.Threat Detection and Response: How to Evolve Your Incident Response
MayAtlantaU.S.Outmaneuvering Threat Actors in the Age of Industrial IoT (IIoT)
MayChicagoU.S.Mistakes I've Made - Confessions of a Healthcare CISO
MayNYCU.S.Security's Role in Digital Transformation
AprilBostonU.S. Security as a Catalyst for Digital Transformation
AprilAtlantaU.S. Managing Access Risk - Controlling the Identity Lifecycle
AprilPhiladelphiaU.S.Managing Access Risk - Controlling the Identity Lifecycle
AprilDubaiU.A.E.Fighting Fraud in the Age of Mobility
AprilAtlantaU.S. Multilayered Security: Strategies & Solutions for Protecting Customers' Personal Information
AprilCharlotteU.S.Mobile / Web App Security: How Do You Know You’ve Got it Right?
AprilMumbaiIndiaEvolving to Next Generation Security Orchestration and Visibility
AprilCentral NJU.S.Security as a Catalyst for Digital Transformation
AprilMelbourneAustraliaZero Trust Security
AprilSan JoseU.S.Changing the Conversation around Digital Risk Management: Third Party Risk
AprilSydneyAustraliaZero Trust Security
MarchPhoenixU.S.Open Source Security: How to Defend at the Speed of Attack
MarchDallasU.S.Open Source Security: How to Defend at the Speed of Attack
MarchHoustonU.S.Managing Access Risk – Controlling the Identity Lifecycle
MarchTorontoCanadaOpen Source Security: How to Defend at the Speed of Attack
MarchNYCU.S.How to Use Automation and Orchestration to Effectively Respond to Phishing Attacks
MarchBostonU.S.DDoS Defense: How to Break the Link to Advanced Threats
March NYCU.S.Open Source Security: How to Defend at the Speed of Attack
March San FranciscoU.S.Assuring Trust in the Age of Business Email Compromise
MarchSan FranciscoU.S.Advanced Threats: How to Respond to Bigger, Stronger, Faster
FebruaryMiamiU.S.Open Source Security: How to Defend at the Speed of Attack
FebruarySeattleU.S.Security as a Catalyst for Digital Transformation
FebruaryJacksonvilleU.S.Security as a Catalyst for Digital Transformation
FebruaryColumbusU.S.Security as a Catalyst for Digital Transformation
FebruaryChennaiIndiaAccelerating Digital Transformation: The Security Promise
FebruaryBangaloreIndiaThe Rise of DevSecOps: Best Practices for Ensuring Software Security from the Start
FebruaryNYCU.S.DDoS Defense: How to Break the Link to Advanced Threats
JanuarySan FranciscoU.S.Security as a Catalyst for Digital Transformation
JanuaryBostonU.S.Securing the Digital Enterprise
JanuaryDenverU.S.Security as a Catalyst for Digital Transformation
JanuaryChicagoU.S.Healthcare & Insurance: How to Establish and Maintain Digital Identity Trust
JanuaryNYCU.S.The Road to Business-Driven Security
JanuarySeattleU.S.The Road to Business-Driven Security
MonthCityCountryTopic
2018-12-4DecemberSan DiegoU.S.Security as a Catalyst for Digital Transformation
2018-12-4DecemberWashington, D.C.U.S.Open Source Components: How to Increase Speed and Reduce the Risk
2018-11-29NovemberRaleighU.S.The Road to Business-Driven Security
2018-11-29NovemberMumbaiIndiaHow Secure Are You? Best Practices in Measuring Your Security Stance
2018-11-29NovemberMumbaiIndiaThe Changing Nature of Identity in a Digitized World
2018-11-15NovemberNYCU.S.Zero Trust Security
2018-10-30OctoberBostonU.S.Modern Identity and Access Management: How to Build Trust without Sacrificing Security
2018-10-25OctoberColumbusU.S.Modern Identity and Access Management: How to Build Trust without Sacrificing Security
2018-10-23OctoberLondonU.K.Advanced SOC Operations – Moving from SOC to the CSOC
2018-10-18OctoberSeattleU.S.Open Source Components: How to Increase Speed and Reduce the Risk
2018-10-18OctoberNYCU.S.Financial Crimes: How to Improve Response and Reduce False Positives
2018-10-16OctoberDallasU.S.Security as a Catalyst for Digital Transformation
2018-10-11OctoberColumbusU.S.Workshop: New Essentials of Privileged Access Management
2018-10-11OctoberLos AngelesU.S.Security as a Catalyst for Digital Transformation
2018-10-09OctoberBostonU.S.Workshop: New Essentials of Privileged Access Management
2018-10-04OctoberDenverU.S.Threat Hunting: How to Evolve Your Incident Response
2018-09-27SeptemberScottsdaleU.S.Threat Hunting: How to Evolve Your Incident Response
2018-09-26SeptemberLondonU.K.How to Establish and Maintain Digital Identity Trust
2018-09-20SeptemberSan AntonioU.S.The Future of Identity and Governance
2018-09-19SeptemberDallasU.S.A New Model of Digital Trust in a Zero Trust Online World
2018-09-18SeptemberAtlantaU.S.A New Model of Digital Trust in a Zero Trust Online World
2018-09-11SeptemberTorontoCanadaThe Road to Business-Driven Security
2018-09-11SeptemberTorontoCanadaOpen Source Components: How to Increase Speed and Reduce the Risk
2018-09-11SeptemberTorontoCanadaSecurity as a Catalyst for Digital Transformation
2018-08-21AugustKansas CityU.S.The Road to Business-Driven Security
2018-08-14AugustNYCU.S.The Road to Business-Driven Security
2018-08-14AugustNYCU.S.Mobile/Web App Security: How Do You Know it’s Working?
2018-07-27JulySao PauloBrazilRethinking Your Cybersecurity Strategy
2018-07-24JulyAtlantaU.S.Threat Hunting: How to Evolve Your Incident Response
2018-07-19JulyDallasU.S.Open Source Components: How to Increase Speed and Reduce the Risk
2018-06-22JuneBangaloreIndiaManage Your Enterprise Risks in the Cloud: The Security Promise
2018-06-21JuneWashington, D.C.U.S.Threat Hunting: How to Evolve Your Incident Response
2018-06-14JuneCharlotteU.S.Modern Identity and Access Management: How to Build Trust without Sacrificing Security
2018-06-12JuneBangaloreIndiaFighting the Avanced DDoS Threat: Proactive Mitigation and Collaboration
2018-05-10MayManilaPhilippinesEnterprise Security 2018 – Business Drivers, Compliance and Regulatory Challenges
2018-05-10MayWashington, D.C.U.S.Reality or Snake Oil? The Security Promise of AI, ML and Data Science
2018-04-26AprilSeattleU.S.Threat Hunting: How to Evolve Your Incident Response
2018-04-24AprilChennaiIndiaAdvanced SOC – Evolving to the Next Generation Threat Management Capability
2018-04-18AprilMumbaiIndiaManage Your Enterprise Risks in the Cloud: The Security
2018-04-18AprilSan FranciscoU.S.The Machine Identity Crisis: A Call to Action
2018-04-17AprilSan FranciscoU.S.The Machine Identity Crisis: A Call to Action
2018-04-17AprilSan FranciscoU.S.Strategic Threat Intelligence: Lessons from the Pentagon
2018-04-12AprilNYCU.S.Reality or Snake Oil? The Security Promise of AI, ML and Data Science
2018-04-10AprilChicagoU.S.Reality or Snake Oil? The Security Promise of AI, ML and Data Science
2018-04-03AprilBostonU.S.Active Defense: Clearing the Legal and Ethical Hurdles
2018-03-29MarchAtlantaU.S.Payment & Banking Innovation: Get Ahead of the Security Challenges
2018-03-28MarchNYCU.S.Open Source Components: How to Increase Speed and Reduce the Risk
2018-03-28MarchNYCU.S.How to Turn Your End User into Your Friend User and Reduce Your Biggest Risk Vector
2018-03-21MarchMumbaiIndiaIdentity-driven Security in an Evolving Threat Landscape
2018-03-15MarchMexico CityMexicoPhishing: New Strategies to Fight the Growing Threat
2018-03-13MarchAtlantaU.S.Active Defense: Clearing the Legal and Ethical Hurdles
2018-03-13MarchBangkokThailand2018 Digital Identity and Mobile Banking Fraud Trends
2018-03-08MarchMumbaiIndiaThe Road to Business-Driven Security
2018-03-01MarchNYCU.S.Modern Privileged Access Management: How to Use Threat Analytics to Help Prevent Breaches
2018-02-08FebruaryNYCU.S.Threat Hunting: How to Evolve Your Incident Response
2018-02-06FebruaryDallasU.S.Exposing the Enemy Within: How to Leverage DNS Data to Improve Breach Detection and Response
2018-02-01FebruarySingaporeSingaporeAdvanced SOC– Evolving to the Next Generation Threat Management Capability
2018-01-23JanuaryAtlantaU.S.Modern Identity and Access Management: How to Build Trust without Sacrificing Security
2018-01-18JanuarySan FranciscoU.S.Exposing the Enemy Within: How to Leverage DNS Data to Improve Breach Detection and Response
2018-01-16JanuaryDallasU.S.Threat Hunting: How to Evolve Your Incident Response
MonthCityCountryTopic
DecemberMontrealCanadaSecure the Breach: Why You Need to Encrypt Everything
DecemberMumbaiIndiaMobility & Fraud: Scams and Solutions to Eye in 2018
DecemberSeattleU.S.The Road to Business-Driven Security
NovemberFrankfurtGermanyFighting Cybercriminals in the Era of Digital Banking
NovemberNYCU.S.Exposing the Enemy Within: How to Leverage DNS Data to Improve Breach Detection and Response
NovemberMilanItalyBattling Fraud in the Era of Open Banking
NovemberNYCU.S.Reducing the Risk of a Cyber Attack-- How to Avoid Becoming the Next Equifax
NovemberNYCU.S.Incident Response: How to Find the Internal Threat Before the Damage is Done
NovemberNYCU.S.Your Data Is On the Move, But Is It Secure?
OctoberParisFranceSecurity Transformation: Be an Enabler, Not an Obstacle
OctoberDallasU.S.The Road to Business-Driven Security
OctoberFrankfurtGermanySecurity Transformation: Be an Enabler, Not an Obstacle
OctoberLondonU.K.Reducing the Risk of a Cyber Attack - How to Avoid Becoming the Next Equifax
OctoberLondonU.K.Security Transformation: Be an Enabler, Not an Obstacle
OctoberAtlantaU.S.The Road to Business-Driven Security
OctoberSan JoseU.S.The Road to Business-Driven Security
SeptemberLos AngelesU.S.IoT Security: How to Minimize the Threat and Maximize the Trust
SeptemberSeattleU.S.IoT Security: How to Minimize the Threat and Maximize the Trust
SeptemberBostonU.S.The Road to Business-Driven Security
SeptemberDubaiU.A.E.Developing The Next Generation of SOCs in GCC Region
SetemberTorontoCanadaThe Road to Business-Driven Security
SeptemberTorontoCanadaPrivileged Access and the Business: How Secure Code Can Improve the Bottom Line
SeptemberTorontoCanadaWannaCry and Crimeware as a Service: How to Respond to This Security Game-Changer
SeptemberTorontoCanadaNIST Cybersecurity Framework: Best Practices for Implementation
SeptemberTorontoCanadaIncident Response: How to Find the Internal Threat Before the Damage is Done
AugustColumbusU.S.IoT Security: How to Minimize the Threat and Maximize the Trust
AugustTorontoCanadaPreparing for GDPR: Checklist for Conformance
AugustNYCU.S.Preparing for GDPR: Checklist for Conformance
AugustSao PauloBrazilPhishing: New Strategies to Fight the Global Threat
AugustDetriotU.S.IoT Security: How to Minimize the Threat and Maximize the Trust
AugustHoustonU.S.IoT Security: How to Minimize the Threat and Maximize the Trust
AugustCharlotteU.S.Secure the Breach: Why You Need to Encrypt Everything

For more information on how you can sponsor or attend any of our upcoming Executive Rountables please contact us today.