ISMG’s Executive Roundtables are intimate, closed-door discussions focused on specific challenges being faced by information security executives in today’s cybersecurity landscape.  Moderated by one of ISMG’s Executive Editors and hosted over breakfast, lunch or dinner, Executive Roundtables provide senior cybersecurity professionals the opportunity to share their own experiences with an intimate group of peers and emerge with new strategies they can immediately put to work at their own organizations.

GLOBAL ROUNDTABLE EVENTS

Ismg Executive Roundtable Dinner Atlanta Threat Hunting Ismg Executive Roundtable Sao Paulo 2018 Ismg Executive Roundtable Road To Business Driven Security Nyc Summit Ismg-Executive-Roundtable-Nyc-Web-App-Security Ismg Executive Roundtable Dinner Kansas City Business Driven Security Ismg Executive Roundtable Road To Business Driven Security Toronto Summit Ismg Executive Roundtable Toronto Open Source Components Ismg Executive Roundtable Dinner Nyc Financial Crimes

Upcoming Executive Roundtables

DateCityCountryTopic
December 12thNYCU.S.Accelerating Incident Response: Organizational Shifts to Faster Remediation
December 12thSeattleU.S.The Case for Re-Thinking Third-Party Risk
December 17thMumbaiIndiaFighting 'Unknown-Unknown' Threats with Actionable Threat Intelligence
January 14thSan AntonioU.S.Digital Risk Management: CCPA, Privacy and Security in the New Privacy World
January 16thBaltimoreU.S.Digital Risk Management: Securing Multi-Cloud Transformation
January 21stCalgaryCanadaDigital Risk Management: CCPA, Privacy and Security in the New Privacy World
January 23rdMontréalCanadaDigital Risk Management: Embracing - and Leading - Digital Transformation
January 30thSeattleU.S.Coming Soon
February 4thManilaPhilippinesComing Soon
February 4thNYCU.S.Coming Soon
February 4thPhiladelphiaU.S.Coming Soon
February 6thAtlantaU.S.Coming Soon
February 6thDallasU.S.Coming Soon
February 11thNYCU.S.Coming Soon
February 11thRaleighU.S.Coming Soon

Past Executive Roundtables

MonthCityCountryTopic
December 10DenverU.S.Changing the Conversation around Digital Risk Management: Third Party Risk
December 5San FranciscoU.S.Outmaneuvering Threat Actors in the Age of Industrial IoT (IIoT)
December 4NYCU.S.Digital Risk Management: CCPA, Privacy and Security in the New Privacy World
December 3Washington, D.C.U.S.Digital Risk Management: Securing Multi-Cloud Transformation
December 3Washington, D.C.U.S.Eliminating Standing Privileges - The Roadmap to Zero Trust Through a Just-In-Time Cloud Model
November 21NYCU.S.Advancing SOC Triage & Investigation Through Destructive Object Insights
November 21BostonU.S.Digital Risk Management: Securing Multi-Cloud Transformation
November 21MumbaiIndiaEnabling Digital Transformation with Trusted Identities
November 19PittsburghU.S.Digital Risk Management: Securing Multi-Cloud Transformation
November 19TorontoCanadaMoving from Vulnerability Management to Effective Vulnerability Response
November 14Los AngelesU.S.Accelerating Incident Response: Organizational Shifts to Faster Remediation
November 14San FranciscoU.S.Banking on Mobile Security: How Financial Services Respond to the Growing Mobile Threat Landscape
November 13LondonU.K.Financial Services: Leveraging Security to Drive Innovation & Gain a Competitive Edge
November 12NYCU.S.Cyber Confidence: How Do You Know You've Got a Trustworthy Security Posture?
November 5CharlotteU.S.Moving from Vulnerability Management to Effective Vulnerability Response
November 5AtlantaU.S.Moving from Vulnerability Management to Effective Vulnerability Response
October 30DallasU.S.Cloud Strategies and Security: How to Be a Business Enabler
October 29HoustonU.S.Digital Risk Management: How to Achieve Digital Resiliency
October 24AtlantaU.S.Digital Risk Management: How to Achieve Digital Resiliency
October 23MumbaiIndiaThe 2019 SOC Odyssey - Evolving to Next Generation Effectiveness
October 22NYCU.S.Unpacking Zero Trust - Balancing Security and Profitability
October 17IrvineU.S.Digital Risk Management: Embracing - and Leading - Digital Transformation
October 17CalgaryCanadaOutmaneuvering Threat Actors in the Age of Industrial IoT (IIoT)
October 10SeattleU.S.Digital Risk Management: How to Achieve Digital Resiliency
October 8PhiladelphiaU.S.Indicators of Behavior: The New Way to Detect Advanced Attacks
October 2SeattleU.S.Open Source Security: How to Defend at the Speed of Attack
October 2BostonU.S.Cyber Recovery in the Age of Ransomware
October 1DenverU.S.Data Privacy & Security: Do You Meet the New Standards?
September 26DallasU.S.Digital Risk Management: CCPA, Privacy and Security in the New Privacy World
September 26AtlantaU.S.Open Source Security: How to Defend at the Speed of Attack
September 24TorontoCanadaIndicators of Behavior: The New Way to Detect Advanced Attacks
September 24TorontoCanadaOutmaneuvering Threat Actors in the Age of Industrial IoT (IIoT)
September 19NYCU.S.(MaaS360 Briefing) Unified Endpoint Management in 2020
September 17Los AngelesU.S.Outmaneuvering Threat Actors in the Age of Industrial IoT (IIoT)
September 17BostonU.S.Open Source Security: How to Defend at the Speed of Attack
September 12ChicagoU.S.(MaaS360 Briefing) Unified Endpoint Management in 2020
September 12DetroitU.S.Outmaneuvering Threat Actors in the Age of Industrial IoT (IIoT)
September 10San FranciscoU.S.Risk Ranking Re-Evaluated: Bringing Analytics & Automation to Vulnerability Assessment
September 10NYCU.S.Outmaneuvering Threat Actors in the Age of Industrial IoT (IIoT)
September 5PhiladelphiaU.S.Getting Cyber Right - Towards a Reasonable Level of Care
August 22San DiegoU.S.Indicators of Behavior: The New Way to Detect Advanced Attacks
August 21DallasU.S.Indicators of Behavior: The New Way to Detect Advanced Attacks
August 20DenverU.S.Changing the Conversation Around Digital Risk Management: Third Party Risk
August 19MumbaiIndiaQuantify Your Cyber Exposure: Build Resilience and Defend Better
August 13NYCU.S.Securing Third Party Code - A Digital Imperative for a Connected World
August 13NYCU.S.Indicators of Behavior: The New Way to Detect Advanced Attacks
August 13NYCU.S.Mobile / Web App Security: How Do You Know You've Got It Right?
August 6Las VegasU.S.Security's Role in Digital Transformation
August 1BrasiliaBrazilEndpoint Defense 2.0: How AI and ML Can Empower Predictive Security
July 30Rio de JaneiroBrazilEndpoint Defense 2.0: How AI and ML Can Empower Predictive Security
July 25Sao PauloBrazilEndpoint Defense 2.0: How AI and ML Can Empower Predictive Security
July 25Sao PauloBrazilFaces of Fraud: How Prepared are You to Detect and Defend?
July 23Los AngelesU.S.(MaaS360 Briefing) Unified Endpoint Management in 2020
July 18DallasU.S.(MaaS360 Briefing) Unified Endpoint Management in 2020
July 18AtlantaU.S.Security as a Catalyst for Digital Transformation
June 27Washington, D.C.U.S.Changing the Conversation around Digital Risk Management: Third Party Risk
June 27LondonU.K.Beyond Passwords: Using Advanced Risk-Based and User Biometrics
June 26SingaporeSingaporeA Unified Approach to Optimizing Cybersecurity Maturity
June 25NYCU.S.Changing the Conversation around Digital Risk Management: Third Party Risk
June 25NYCU.S.Moving from Vulnerability Management to Effective Vulnerability Response
June 25NYCU.S.How Zero-Trust Can Secure Your Hybrid Cloud Environment
June 20San FranciscoU.S.(IAM Briefing) Secure Identity: The Future is Now
June 13BostonU.S.Changing the Conversation Around Digital Risk Management: Third Party Risk
June 13Washington, D.C.U.S.(IAM Briefing) Secure Identity: The Future is Now
June 12NYCU.S.(IAM Briefing) Secure Identity: The Future is Now
June 11ChicagoU.S.(IAM Briefing) Secure Identity: The Future is Now
June 4SeattleU.S.Mobile / Web App Security: How Do You Know You've Got It Right?
June 4SeattleU.S.Understanding Third-Party Risk in Your Global Workforce
May 29CharlotteU.S.Changing the Conversation around Digital Risk Management: Third Party Risk
May 23AmsterdamNetherlandsWhy Application Security is Your Best Cyber Defense
May 21San FranciscoU.S.Open Source Security: How to Defend at the Speed of Attack
May 16PhoenixU.S.Data Privacy & Security: Do You Meet the New Standards?
May 15NashvilleU.S.Securing the Digital Enterprise
May 9NYCU.S.Threat Detection and Response: How to Evolve Your Incident Response
May 7AtlantaU.S.Outmaneuvering Threat Actors in the Age of Industrial IoT (IIoT)
May 2ChicagoU.S.Mistakes I've Made - Confessions of a Healthcare CISO
May 2NYCU.S.Security's Role in Digital Transformation
April 30BostonU.S. Security as a Catalyst for Digital Transformation
April 24AtlantaU.S. Managing Access Risk - Controlling the Identity Lifecycle
April 24PhiladelphiaU.S.Managing Access Risk - Controlling the Identity Lifecycle
April 23DubaiU.A.E.Fighting Fraud in the Age of Mobility
April 18AtlantaU.S. Multilayered Security: Strategies & Solutions for Protecting Customers' Personal Information
April 10CharlotteU.S.Mobile / Web App Security: How Do You Know You’ve Got it Right?
April 10MumbaiIndiaEvolving to Next Generation Security Orchestration and Visibility
April 4Central NJU.S.Security as a Catalyst for Digital Transformation
April 4MelbourneAustraliaZero Trust Security
April 2San JoseU.S.Changing the Conversation around Digital Risk Management: Third Party Risk
April 2SydneyAustraliaZero Trust Security
March 27PhoenixU.S.Open Source Security: How to Defend at the Speed of Attack
March 26DallasU.S.Open Source Security: How to Defend at the Speed of Attack
March 26HoustonU.S.Managing Access Risk - Controlling the Identity Lifecycle
March 21TorontoCanadaOpen Source Security: How to Defend at the Speed of Attack
March 19NYCU.S.How to Use Automation and Orchestration to Effectively Respond to Phishing Attacks
March 14BostonU.S.DDoS Defense: How to Break the Link to Advanced Threats
March 13NYCU.S.Open Source Security: How to Defend at the Speed of Attack
March 6San FranciscoU.S.Assuring Trust in the Age of Business Email Compromise
March 5San FranciscoU.S.Advanced Threats: How to Respond to Bigger, Stronger, Faster
February 28MiamiU.S.Open Source Security: How to Defend at the Speed of Attack
February 26SeattleU.S.Security as a Catalyst for Digital Transformation
February 20ColumbusU.S.Security as a Catalyst for Digital Transformation
February 14ChennaiIndiaAccelerating Digital Transformation: The Security Promise
February 13BangaloreIndiaThe Rise of DevSecOps: Best Practices for Ensuring Software Security from the Start
February 7NYCU.S.DDoS Defense: How to Break the Link to Advanced Threats
January 31San FranciscoU.S.Security as a Catalyst for Digital Transformation
January 30BostonU.S.Securing the Digital Enterprise
January 29DenverU.S.Security as a Catalyst for Digital Transformation
January 24ChicagoU.S.Healthcare & Insurance: How to Establish and Maintain Digital Identity Trust
January 23NYCU.S.The Road to Business-Driven Security
January 17SeattleU.S.The Road to Business-Driven Security
MonthCityCountryTopic
December 18San DiegoU.S.Security as a Catalyst for Digital Transformation
December 4Washington, D.C.U.S.Open Source Components: How to Increase Speed and Reduce the Risk
November 29RaleighU.S.The Road to Business-Driven Security
November 29MumbaiIndiaHow Secure Are You? Best Practices in Measuring Your Security Stance
November 29MumbaiIndiaThe Changing Nature of Identity in a Digitized World
November 15NYCU.S.Zero Trust Security
October 30BostonU.S.Modern Identity and Access Management: How to Build Trust without Sacrificing Security
October 25ColumbusU.S.Modern Identity and Access Management: How to Build Trust without Sacrificing Security
October 18SeattleU.S.Open Source Components: How to Increase Speed and Reduce the Risk
October 18NYCU.S.Financial Crimes: How to Improve Response and Reduce False Positives
October 16DallasU.S.Security as a Catalyst for Digital Transformation
October 11ColumbusU.S.Workshop: New Essentials of Privileged Access Management
October 11Los AngelesU.S.Security as a Catalyst for Digital Transformation
October 9BostonU.S.Workshop: New Essentials of Privileged Access Management
October 4DenverU.S.Threat Hunting: How to Evolve Your Incident Response
September 27ScottsdaleU.S.Threat Hunting: How to Evolve Your Incident Response
September 26LondonU.K.How to Establish and Maintain Digital Identity Trust
September 20San AntonioU.S.The Future of Identity and Governance
September 19DallasU.S.A New Model of Digital Trust in a Zero Trust Online World
September 18AtlantaU.S.A New Model of Digital Trust in a Zero Trust Online World
September 11TorontoCanadaThe Road to Business-Driven Security
September 11TorontoCanadaOpen Source Components: How to Increase Speed and Reduce the Risk
September 11TorontoCanadaSecurity as a Catalyst for Digital Transformation
August 21Kansas CityU.S.The Road to Business-Driven Security
August 14NYCU.S.The Road to Business-Driven Security
August 14NYCU.S.Mobile / Web App Security: How Do You Know It’s Working?
July 27Sao PauloBrazilRethinking Your Cybersecurity Strategy
July 24AtlantaU.S.Threat Hunting: How to Evolve Your Incident Response
July 17DallasU.S.Open Source Components: How to Increase Speed and Reduce the Risk
June 22BangaloreIndiaManage Your Enterprise Risks in the Cloud: The Security Promise
June 21Washington, D.C.U.S.Threat Hunting: How to Evolve Your Incident Response
June 14CharlotteU.S.Modern Identity and Access Management: How to Build Trust without Sacrificing Security
June 12BangaloreIndiaFighting the Avanced DDoS Threat: Proactive Mitigation and Collaboration
May 10ManilaPhilippinesEnterprise Security 2018 – Business Drivers, Compliance and Regulatory Challenges
May 10Washington, D.C.U.S.Reality or Snake Oil? The Security Promise of AI, ML and Data Science
April 26SeattleU.S.Threat Hunting: How to Evolve Your Incident Response
April 24ChennaiIndiaAdvanced SOC – Evolving to the Next Generation Threat Management Capability
April 18MumbaiIndiaManage Your Enterprise Risks in the Cloud: The Security
April 18San FranciscoU.S.The Machine Identity Crisis: A Call to Action
April 17San FranciscoU.S.The Machine Identity Crisis: A Call to Action
April 17San FranciscoU.S.Strategic Threat Intelligence: Lessons from the Pentagon
April 12NYCU.S.Reality or Snake Oil? The Security Promise of AI, ML and Data Science
April 10ChicagoU.S.Reality or Snake Oil? The Security Promise of AI, ML and Data Science
April 3BostonU.S.Active Defense: Clearing the Legal and Ethical Hurdles
March 29AtlantaU.S.Payment & Banking Innovation: Get Ahead of the Security Challenges
March 28NYCU.S.Open Source Components: How to Increase Speed and Reduce the Risk
March 28NYCU.S.How to Turn Your End User into Your Friend User and Reduce Your Biggest Risk Vector
March 22MumbaiIndiaIdentity-driven Security in an Evolving Threat Landscape
March 15Mexico CityMexicoPhishing: New Strategies to Fight the Growing Threat
March 15MumbaiIndiaThe Road to Business-Driven Security
March 13AtlantaU.S.Active Defense: Clearing the Legal and Ethical Hurdles
March 13BangkokThailand2018 Digital Identity and Mobile Banking Fraud Trends
March 1NYCU.S.Modern Privileged Access Management: How to Use Threat Analytics to Help Prevent Breaches
February 8NYCU.S.Threat Hunting: How to Evolve Your Incident Response
February 6DallasU.S.Exposing the Enemy Within: How to Leverage DNS Data to Improve Breach Detection and Response
February 2SingaporeSingaporeAdvanced SOC– Evolving to the Next Generation Threat Management Capability
January 23AtlantaU.S.Modern Identity and Access Management: How to Build Trust without Sacrificing Security
January 18San FranciscoU.S.Exposing the Enemy Within: How to Leverage DNS Data to Improve Breach Detection and Response
January 16DallasU.S.Threat Hunting: How to Evolve Your Incident Response
MonthCityCountryTopic
December 7MontrealCanadaSecure the Breach: Why You Need to Encrypt Everything
December 6MumbaiIndiaMobility & Fraud: Scams and Solutions to Eye in 2018
December 5SeattleU.S.The Road to Business-Driven Security
November 28FrankfurtGermanyFighting Cybercriminals in the Era of Digital Banking
November 15NYCU.S.Exposing the Enemy Within: How to Leverage DNS Data to Improve Breach Detection and Response
November 15MilanItalyBattling Fraud in the Era of Open Banking
November 14NYCU.S.Reducing the Risk of a Cyber Attack - How to Avoid Becoming the Next Equifax
November 14NYCU.S.Incident Response: How to Find the Internal Threat Before the Damage is Done
November 7NYCU.S.Your Data Is On the Move, But Is It Secure?
October 26ParisFranceSecurity Transformation: Be an Enabler, Not an Obstacle
October 26DallasU.S.The Road to Business-Driven Security
October 24FrankfurtGermanySecurity Transformation: Be an Enabler, Not an Obstacle
October 17LondonU.K.Reducing the Risk of a Cyber Attack - How to Avoid Becoming the Next Equifax
October 17LondonU.K.Security Transformation: Be an Enabler, Not an Obstacle
October 12AtlantaU.S.The Road to Business-Driven Security
October 3San JoseU.S.The Road to Business-Driven Security
September 26Los AngelesU.S.IoT Security: How to Minimize the Threat and Maximize the Trust
September 21SeattleU.S.IoT Security: How to Minimize the Threat and Maximize the Trust
September 19BostonU.S.The Road to Business-Driven Security
September 14DubaiU.A.E.Developing The Next Generation of SOCs in GCC Region
Setember 12TorontoCanadaThe Road to Business-Driven Security
September 12TorontoCanadaPrivileged Access and the Business: How Secure Code Can Improve the Bottom Line
September 12TorontoCanadaWannaCry and Crimeware as a Service: How to Respond to This Security Game-Changer
September 12TorontoCanadaNIST Cybersecurity Framework: Best Practices for Implementation
September 12TorontoCanadaIncident Response: How to Find the Internal Threat Before the Damage is Done
August 24ColumbusU.S.IoT Security: How to Minimize the Threat and Maximize the Trust
August 24TorontoCanadaPreparing for GDPR: Checklist for Conformance
August 22NYCU.S.Preparing for GDPR: Checklist for Conformance
August 15Sao PauloBrazilPhishing: New Strategies to Fight the Global Threat
August 10DetriotU.S.IoT Security: How to Minimize the Threat and Maximize the Trust
August 3HoustonU.S.IoT Security: How to Minimize the Threat and Maximize the Trust
August 1CharlotteU.S.Secure the Breach: Why You Need to Encrypt Everything

For more information on how you can sponsor or attend any of our upcoming Executive Rountables please contact us today.