ISMG’s Executive Roundtables are intimate, closed-door discussions focused on specific challenges being faced by information security executives in today’s cybersecurity landscape.  Moderated by one of ISMG’s Executive Editors and hosted over breakfast, lunch or dinner, Executive Roundtables provide senior cybersecurity professionals the opportunity to share their own experiences with an intimate group of peers and emerge with new strategies they can immediately put to work at their own organizations.

For more information on how ISMG is addressing the ongoing coronavirus concerns visit: https://events.ismg.io/coronavirus-guidelines/

GLOBAL ROUNDTABLE EVENTS

Ismg Executive Roundtable Dinner Atlanta Threat Hunting Ismg Executive Roundtable Sao Paulo 2018 Ismg Executive Roundtable Road To Business Driven Security Nyc Summit Ismg-Executive-Roundtable-Nyc-Web-App-Security Ismg Executive Roundtable Dinner Kansas City Business Driven Security Ismg Executive Roundtable Road To Business Driven Security Toronto Summit Ismg Executive Roundtable Toronto Open Source Components Ismg Executive Roundtable Dinner Nyc Financial Crimes

Upcoming Executive Roundtables

DateLocationCountryTopic
July 7thIndiaIndiaVirtual Roundtable – Optimizing the End Point Detection and Response Times for Enhanced Security
July 8thHong KongChinaVirtual Roundtable – How Will COVID-19 Impact the Future of Cybersecurity?
July 8thLATAMLATAMVirtual Roundtable – Pandemic Threat Landscape: Everything Old is New Again
July 8thCentral U.S.U.S.Virtual Roundtable – Advantage, CISO: Why Cybersecurity is Poised to Win in 2021
July 8thSouthwest U.S.U.S.Virtual Roundtable – Dynamic Work - Securely Enabling the Nomadic Workforce via Zero Trust
July 9thMalaysiaMalaysiaVirtual Roundtable – How Will COVID-19 Impact the Future of Cybersecurity?
July 9thDallasU.S.Virtual Roundtable – The New Keys to Managing Dynamic Workforce Risk
July 9thWestern U.S.U.S.Virtual Roundtable – Your Journey to the Cloud Operating Model
July 14thGermanyGermanyVirtual Roundtable – Was kommt nach der Krise? Der Business Case für SASE
July 14thU.S.U.S.Virtual Roundtable – Digital Identity Management & Security – The Currency of Care
July 14thCanadaCanadaVirtual Roundtable – Customer IAM: The Myths and Realities
July 15thMinneapolisU.S.Virtual Roundtable – CIAM in an Uncertain World
July 15thIllinoisU.S.Virtual Roundtable – Every Breath You Take - How to Make Identity Sing
July 16thAucklandN.Z.Virtual Roundtable – Zero Trust Access: The Five Step Program
July 16thCaliforniaU.S.Virtual Roundtable – Accelerating Incident Response: Organizational Shifts to Faster Remediation
July 21stEastern U.S.U.S.Virtual Roundtable – Network Segmentation: Creating Defense in Depth
July 21stU.A.E.U.A.E.Virtual Roundtable – Data Protection in an Uncertain World: A Risk-Adaptive Approach
July 21stWestern U.S.U.S.Virtual Roundtable – Advantage, CISO: Why Cybersecurity is Poised to Win in 2021
July 22ndSouth CentralU.S.Virtual Roundtable – The New Keys to Managing Dynamic Workforce Risk
July 23rdAPACAPACVirtual Roundtable – The Post-COVID 'Normal' and the Relevance of MDR
July 23rdNew EnglandU.S.Virtual Roundtable – Balancing Personalization and Privacy in a Digitalized World
July 23rdU.S.U.S.Virtual Roundtable – Can Better Business Continuity Secure Your Workforce?
July 27thNorthwest U.S.U.S.Virtual Roundtable – Encryption Keys: More Important Than Your Data
July 29thU.S.U.S.Virtual Roundtable – Safeguarding Remote Worker Threats for Financial Services
July 29thChicagoU.S.Virtual Roundtable – Cybersecurity: Why Asset Management Matters
July 30thAPACAPACVirtual Roundtable – Future DDoS Trends and Mitigation Strategies in 2020 and Beyond
July 30thU.S.U.S.Virtual Roundtable – Can Better Business Continuity Secure Your Workforce?
July 30thSoutheast U.S.U.S.Virtual Roundtable – Next Generation Cybersecurity in the Age of IT/OT Convergence
August 12thMidwest U.S.U.S.Virtual Roundtable – Achieving Business Resilience through Transformation
August 25thCentralU.S.Virtual Roundtable – The New Keys to Managing Dynamic Workforce Risk
August 26thSydneyAustraliaVirtual Roundtable – Zero Trust Access: The Five Step Program
August 27thWestern U.S.U.S.Virtual Roundtable – The New Keys to Managing Dynamic Workforce Risk
August 28thNYC / NJU.S.Virtual Roundtable – Zero Trust: Bringing the 'Trust' Back to the Individual

Past Executive Roundtables

MonthLocationCountryTopic
July 2ANZANZVirtual RT – How Will COVID-19 Impact the Future of Cybersecurity?
June 30Central U.S.U.S.Virtual RT – Pandemic Threat Landscape: Everything Old is New Again
June 30OhioU.S.Virtual RT – Dynamic Work - Securely Enabling the Nomadic Workforce via Zero Trust
June 29Eastern U.S.U.S.Virtual RT – Advantage, CISO: Why Cybersecurity is Poised to Win in 2021
June 25AtlantaU.S.Virtual RT – Indicators of Behavior: The New Way to Detect Advanced Attacks
June 25NYCU.S.Virtual RT – Encryption: New Use Cases for a New Era
June 25FranceFranceVirtual RT – Optimiser la transformation vers le Cloud
June 25IndiaIndiaVirtual RT – Cybersecurity Preparedness in Times of Disruption
June 24ChicagoU.S.Virtual RT – Make the Cloud Your Safe Place: The Future of Cloud Security
June 24U.K.U.K.Virtual RT – How to Measure & Communicate the Value of Your Security Program
June 23Western U.S.U.S.Virtual RT – Maturing Zero Trust Controls in Complex Networks
June 23SingaporeSingaporeVirtual RT – How Will COVID-19 Impact the Future of Cybersecurity?
June 22Western U.S.U.S.Virtual RT – Building and Securing the Optimal Experience for Dynamic Work
June 22CanadaU.S.Virtual RT – Customer IAM: The Myths and Realities
June 18CaliforniaU.S.Virtual RT – Beyond the Crisis: Securing the New Workforce for the Long Haul
June 18Southern U.S.U.S.Virtual RT – Digital Identity Management & Security – The Customer Journey
June 17U.S.U.S.Virtual RT – Building a Digitally Resilient Financial Services Organization
June 17NYC & MAU.S.Virtual RT – Beyond the Crisis: Securing the New Workforce for the Long Haul
June 16TexasU.S.Virtual RT – Rumors of the VPN's Demise are NOT Exaggerated
June 15NYC / NJU.S.Virtual RT – Modern IAM: Making the Business – and Security – Case
June 11Western U.S.U.S.Virtual RT – Digital Identity Management & Security - The Customer Journey
June 11BaltimoreU.S.Virtual RT – Indicators of Behavior: The New Way to Detect Advanced Attacks
June 11U.S.U.S.Virtual RT – The SOC of the Future – Bringing Order to Chaos
June 10Central U.S.U.S.Virtual RT – Zero Trust Access: The Five Step Program
June 10Southeast U.S.U.S.Virtual RT – Lessons Learned: Secure Access for the Fully-Remote Workforce
June 9U.K.U.K.Virtual RT – Beyond the Crisis: Securing the New Workforce for the Long Haul
June 8CaliforniaU.S.Virtual RT – Balancing Personalization and Privacy in a Digitalized World
June 8North CarolinaU.S.Virtual RT – Modern IAM: Making the Business – and Security – Case
June 4Southern U.S.U.S.Virtual RT – The New Keys to Managing Dynamic Workforce Risk
June 3San FranciscoU.S.Virtual RT – Encryption Keys: More Important Than Your Data
June 3U.S.U.S.Virtual RT – Zero Trust and the Healthcare Security Professional
June 2NYC / NJU.S.Virtual RT – The New Keys to Managing Dynamic Workforce Risk
June 1MassachusettsU.S.Virtual RT – The New Keys to Managing Dynamic Workforce Risk
May 28Western U.S.U.S.Virtual RT – Pandemic Threat Landscape: Everything Old is New Again
May 28WisconsinU.S.Virtual RT – Lessons Learned: Secure Access for the Fully-Remote Workforce
May 28AtlantaU.S.Virtual RT – Make the Cloud Your Safe Place: The Future of Cloud Security
May 27CaliforniaU.S.Virtual RT – Lessons Learned: Secure Access for the Fully-Remote Workforce
May 27Kansas CityU.S.Virtual RT – Lessons Learned: Secure Access for the Fully-Remote Workforce
May 26U.S.U.S.Virtual RT – Securing the 'Next Normal' of Financial Services Workplaces
May 26CanadaCanadaVirtual RT – Rightsizing Your Cybersecurity Posture for the Age of the Remote Workplace
May 26ANZAustraliaVirtual RT – Cyber Recovery: Bouncing Back from a Data Incident
May 21IndianaU.S.Virtual RT – Lessons Learned: Secure Access for the Fully-Remote Workforce
May 21TorontoU.S.Virtual RT – Make the Cloud Your Safe Place: The Future of Cloud Security
May 20Los AngelesU.S.Virtual RT – Indicators of Behavior: The New Way to Detect Advanced Attacks
May 20DenverU.S.Virtual RT – Encryption Keys: More Important Than Your Data
May 20TexasU.S.Virtual RT – Lessons Learned: Secure Access for the Fully-Remote Workforce
May 14NYCU.S.Virtual RT – Workforce Authentication: What's in Your Five-Year Plan?
May 13Des MoinesU.S.Virtual RT – Lessons Learned: Secure Access for the Fully-Remote Workforce
May 13Midwest U.S.U.S.Virtual RT – Remote Workforce: Securing the Next Normal
May 12SeattleU.S.Virtual RT – Make the Cloud Your Safe Place: The Future of Cloud Security
May 11Southern U.S.U.S.Virtual RT – Zero Trust Access: The Five Step Program
May 11CanadaCanadaVirtual RT – Pandemic Threat Landscape: Everything Old is New Again
May 6Central U.S.U.S.Virtual RT – Remote Workforce: Securing the Next Normal
May 6LondonU.K.Virtual RT – Rightsizing Your Cybersecurity Posture for the Age of the Remote Workplace
May 5Western U.S.U.S.Virtual RT – Zero Trust Access: The Five Step Program
May 4Eastern U.S.U.S.Virtual RT – Zero Trust Access: The Five Step Program
April 30Southwest U.S.U.S.Virtual RT – Rightsizing Your Cybersecurity Posture for the Age of the Remote Workplace
April 30BostonU.S.Virtual RT – Indicators of Behavior: The New Way to Detect Advanced Attacks
April 29Northwest U.S.U.S.Virtual RT – Rightsizing Your Cybersecurity Posture for the Age of the Remote Workplace
April 29Midwest U.S.U.S.Virtual RT – Rightsizing Your Cybersecurity Posture for the Age of the Remote Workplace
April 28DallasU.S.Virtual RT – Customer IAM: The Myths and Realities
April 28Southeast U.S.U.S.Virtual RT – Rightsizing Your Cybersecurity Posture for the Age of the Remote Workplace
April 27Northeast U.S.U.S.Virtual RT – Pandemic Threat Landscape: Everything Old is New Again
April 23SeattleU.S.Virtual RT – Lessons Learned: Secure Access for the Fully-Remote Workforce
April 23West CoastU.S.Virtual RT – Identity Transformation: The Future is Now
April 22U.S.U.S.Virtual RT – Healthcare Identity Transformation: The Future is Now
April 22LondonU.K.Virtual RT – Rightsizing Your Cybersecurity Posture for the Age of the Remote Workplace
April 21ChicagoU.S.Virtual RT – Indicators of Behavior: The New Way to Detect Advanced Attacks
April 21East CoastU.S.Virtual RT – Identity Transformation: The Future is Now
April 16OhioU.S.Virtual RT – Understanding What Zero Trust Means for Business
April 15CaliforniaU.S.Virtual RT – Lessons Learned: Secure Access for the Fully-Remote Workforce
April 15TexasU.S.Virtual RT – Rightsizing Your Cybersecurity Posture for the Age of the Remote Workplace
April 14Northeast U.S.U.S.Virtual RT – Rightsizing Your Cybersecurity Posture for the Age of the Remote Workplace
April 9San FranciscoU.S.Virtual RT – The Right Roles for SIEM and EDR
March 12PhoenixU.S.Timeline of a Breach: How to Improve Detection and Response
March 10DallasU.S.Balancing Personalization and Privacy in a Digitalized World
March 10MinneapolisU.S.(IAM Briefing) Smart Identity for the Hybrid Multicloud World
March 5MadridSpainBest Practices for Detecting Fraud in Your Organization
March 3ParisFranceBest Practices for Detecting Fraud Among Your Customers
February 27HyderabadIndiaStrategies to Defend Your Enterprise Applications against Malicious Bots
February 26San FranciscoU.S.Digital Transformation in Healthcare – The Impacts & Benefits of Digital Identity
February 25San FranciscoU.S.Driving Partnership Between Security & Development
February 25ChennaiIndiaManage Your Enterprise SaaS Vulnerabilities & Risks: The Security Promise
February 24San FranciscoU.S.New CISO Stress Research: Causes, Consequences and Conversation
February 20SeattleU.S.(IAM Briefing) Smart Identity for the Hybrid Multicloud World
February 11NYCU.S.Cybersecurity: Why Asset Management Matters
February 6DallasU.S.(IAM Briefing) Smart Identity for the Hybrid Multicloud World
February 6AtlantaU.S.Timeline of a Breach: How to Improve Detection and Response
February 5New DelhiIndiaFighting 'Unknown-Unknown' Threats with Actionable Threat Intelligence
February 4PhiladelphiaU.S.Digital Risk Management: Securing Multi-Cloud Transformation
February 4NYCU.S.(IAM Briefing) Smart Identity for the Hybrid Multicloud World
January 30SeattleU.S.App Security: How Do You Know You've Got it Right?
January 30NashvilleU.S.The Case for Re-Thinking Third Party Risk
January 29San JoseU.S.Understanding What Zero Trust Means for Business
January 28San FranciscoU.S.Understanding What Zero Trust Means for Business
January 28Washington, D.C.U.S.Understanding What Zero Trust Means for Business
January 23PhoenixU.S.Understanding What Zero Trust Means for Business
January 23MontréalCanadaDigital Risk Management: Embracing - and Leading - Digital Transformation
January 21CalgaryCanadaDigital Risk Management: CCPA, Privacy and Security in the New Privacy World
January 16BaltimoreU.S.Digital Risk Management: Securing Multi-Cloud Transformation
January 14San AntonioU.S.Digital Risk Management: CCPA, Privacy and Security in the New Privacy World
MonthCityCountryTopic
December 17MumbaiIndiaFighting 'Unknown-Unknown' Threats with Actionable Threat Intelligence
December 12SeattleU.S.The Case for Re-Thinking Third-Party Risk
December 12NYCU.S.Accelerating Incident Response: Organizational Shifts to Faster Remediation
December 10DenverU.S.Changing the Conversation around Digital Risk Management: Third Party Risk
December 5San FranciscoU.S.Outmaneuvering Threat Actors in the Age of Industrial IoT (IIoT)
December 4NYCU.S.Digital Risk Management: CCPA, Privacy and Security in the New Privacy World
December 3Washington, D.C.U.S.Digital Risk Management: Securing Multi-Cloud Transformation
December 3Washington, D.C.U.S.Eliminating Standing Privileges - The Roadmap to Zero Trust Through a Just-In-Time Cloud Model
November 21NYCU.S.Advancing SOC Triage & Investigation Through Destructive Object Insights
November 21BostonU.S.Digital Risk Management: Securing Multi-Cloud Transformation
November 21MumbaiIndiaEnabling Digital Transformation with Trusted Identities
November 19PittsburghU.S.Digital Risk Management: Securing Multi-Cloud Transformation
November 19TorontoCanadaMoving from Vulnerability Management to Effective Vulnerability Response
November 14Los AngelesU.S.Accelerating Incident Response: Organizational Shifts to Faster Remediation
November 14San FranciscoU.S.Banking on Mobile Security: How Financial Services Respond to the Growing Mobile Threat Landscape
November 13LondonU.K.Financial Services: Leveraging Security to Drive Innovation & Gain a Competitive Edge
November 12NYCU.S.Cyber Confidence: How Do You Know You've Got a Trustworthy Security Posture?
November 7CharlotteU.S.Moving from Vulnerability Management to Effective Vulnerability Response
November 5AtlantaU.S.Moving from Vulnerability Management to Effective Vulnerability Response
October 30DallasU.S.Cloud Strategies and Security: How to Be a Business Enabler
October 29HoustonU.S.Digital Risk Management: How to Achieve Digital Resiliency
October 24AtlantaU.S.Digital Risk Management: How to Achieve Digital Resiliency
October 23MumbaiIndiaThe 2019 SOC Odyssey - Evolving to Next Generation Effectiveness
October 22NYCU.S.Unpacking Zero Trust - Balancing Security and Profitability
October 17IrvineU.S.Digital Risk Management: Embracing - and Leading - Digital Transformation
October 17CalgaryCanadaOutmaneuvering Threat Actors in the Age of Industrial IoT (IIoT)
October 10SeattleU.S.Digital Risk Management: How to Achieve Digital Resiliency
October 8PhiladelphiaU.S.Indicators of Behavior: The New Way to Detect Advanced Attacks
October 2SeattleU.S.Open Source Security: How to Defend at the Speed of Attack
October 2BostonU.S.Cyber Recovery in the Age of Ransomware
October 1DenverU.S.Data Privacy & Security: Do You Meet the New Standards?
September 26DallasU.S.Digital Risk Management: CCPA, Privacy and Security in the New Privacy World
September 26AtlantaU.S.Open Source Security: How to Defend at the Speed of Attack
September 24TorontoCanadaIndicators of Behavior: The New Way to Detect Advanced Attacks
September 24TorontoCanadaOutmaneuvering Threat Actors in the Age of Industrial IoT (IIoT)
September 19NYCU.S.(MaaS360 Briefing) Unified Endpoint Management in 2020
September 17Los AngelesU.S.Outmaneuvering Threat Actors in the Age of Industrial IoT (IIoT)
September 17BostonU.S.Open Source Security: How to Defend at the Speed of Attack
September 12ChicagoU.S.(MaaS360 Briefing) Unified Endpoint Management in 2020
September 12DetroitU.S.Outmaneuvering Threat Actors in the Age of Industrial IoT (IIoT)
September 10San FranciscoU.S.Risk Ranking Re-Evaluated: Bringing Analytics & Automation to Vulnerability Assessment
September 10NYCU.S.Outmaneuvering Threat Actors in the Age of Industrial IoT (IIoT)
September 5PhiladelphiaU.S.Getting Cyber Right - Towards a Reasonable Level of Care
August 22San DiegoU.S.Indicators of Behavior: The New Way to Detect Advanced Attacks
August 21DallasU.S.Indicators of Behavior: The New Way to Detect Advanced Attacks
August 20DenverU.S.Changing the Conversation Around Digital Risk Management: Third Party Risk
August 19MumbaiIndiaQuantify Your Cyber Exposure: Build Resilience and Defend Better
August 13NYCU.S.Securing Third Party Code - A Digital Imperative for a Connected World
August 13NYCU.S.Indicators of Behavior: The New Way to Detect Advanced Attacks
August 13NYCU.S.Mobile / Web App Security: How Do You Know You've Got It Right?
August 6Las VegasU.S.Security's Role in Digital Transformation
August 1BrasiliaBrazilEndpoint Defense 2.0: How AI and ML Can Empower Predictive Security
July 30Rio de JaneiroBrazilEndpoint Defense 2.0: How AI and ML Can Empower Predictive Security
July 25Sao PauloBrazilEndpoint Defense 2.0: How AI and ML Can Empower Predictive Security
July 25Sao PauloBrazilFaces of Fraud: How Prepared are You to Detect and Defend?
July 23Los AngelesU.S.(MaaS360 Briefing) Unified Endpoint Management in 2020
July 18DallasU.S.(MaaS360 Briefing) Unified Endpoint Management in 2020
July 18AtlantaU.S.Security as a Catalyst for Digital Transformation
June 27Washington, D.C.U.S.Changing the Conversation around Digital Risk Management: Third Party Risk
June 27LondonU.K.Beyond Passwords: Using Advanced Risk-Based and User Biometrics
June 26SingaporeSingaporeA Unified Approach to Optimizing Cybersecurity Maturity
June 25NYCU.S.Changing the Conversation around Digital Risk Management: Third Party Risk
June 25NYCU.S.Moving from Vulnerability Management to Effective Vulnerability Response
June 25NYCU.S.How Zero-Trust Can Secure Your Hybrid Cloud Environment
June 20San FranciscoU.S.(IAM Briefing) Secure Identity: The Future is Now
June 13BostonU.S.Changing the Conversation Around Digital Risk Management: Third Party Risk
June 13Washington, D.C.U.S.(IAM Briefing) Secure Identity: The Future is Now
June 12NYCU.S.(IAM Briefing) Secure Identity: The Future is Now
June 11ChicagoU.S.(IAM Briefing) Secure Identity: The Future is Now
June 4SeattleU.S.Mobile / Web App Security: How Do You Know You've Got It Right?
June 4SeattleU.S.Understanding Third-Party Risk in Your Global Workforce
May 29CharlotteU.S.Changing the Conversation around Digital Risk Management: Third Party Risk
May 23AmsterdamNetherlandsWhy Application Security is Your Best Cyber Defense
May 21San FranciscoU.S.Open Source Security: How to Defend at the Speed of Attack
May 16PhoenixU.S.Data Privacy & Security: Do You Meet the New Standards?
May 15NashvilleU.S.Securing the Digital Enterprise
May 9NYCU.S.Threat Detection and Response: How to Evolve Your Incident Response
May 7AtlantaU.S.Outmaneuvering Threat Actors in the Age of Industrial IoT (IIoT)
May 2ChicagoU.S.Mistakes I've Made - Confessions of a Healthcare CISO
May 2NYCU.S.Security's Role in Digital Transformation
April 30BostonU.S. Security as a Catalyst for Digital Transformation
April 24AtlantaU.S. Managing Access Risk - Controlling the Identity Lifecycle
April 24PhiladelphiaU.S.Managing Access Risk - Controlling the Identity Lifecycle
April 23DubaiU.A.E.Fighting Fraud in the Age of Mobility
April 18AtlantaU.S. Multilayered Security: Strategies & Solutions for Protecting Customers' Personal Information
April 10CharlotteU.S.Mobile / Web App Security: How Do You Know You’ve Got it Right?
April 10MumbaiIndiaEvolving to Next Generation Security Orchestration and Visibility
April 4Central NJU.S.Security as a Catalyst for Digital Transformation
April 4MelbourneAustraliaZero Trust Security
April 2San JoseU.S.Changing the Conversation around Digital Risk Management: Third Party Risk
April 2SydneyAustraliaZero Trust Security
March 27PhoenixU.S.Open Source Security: How to Defend at the Speed of Attack
March 26DallasU.S.Open Source Security: How to Defend at the Speed of Attack
March 26HoustonU.S.Managing Access Risk - Controlling the Identity Lifecycle
March 21TorontoCanadaOpen Source Security: How to Defend at the Speed of Attack
March 19NYCU.S.How to Use Automation and Orchestration to Effectively Respond to Phishing Attacks
March 14BostonU.S.DDoS Defense: How to Break the Link to Advanced Threats
March 13NYCU.S.Open Source Security: How to Defend at the Speed of Attack
March 6San FranciscoU.S.Assuring Trust in the Age of Business Email Compromise
March 5San FranciscoU.S.Advanced Threats: How to Respond to Bigger, Stronger, Faster
February 28MiamiU.S.Open Source Security: How to Defend at the Speed of Attack
February 26SeattleU.S.Security as a Catalyst for Digital Transformation
February 20ColumbusU.S.Security as a Catalyst for Digital Transformation
February 14ChennaiIndiaAccelerating Digital Transformation: The Security Promise
February 13BangaloreIndiaThe Rise of DevSecOps: Best Practices for Ensuring Software Security from the Start
February 7NYCU.S.DDoS Defense: How to Break the Link to Advanced Threats
January 31San FranciscoU.S.Security as a Catalyst for Digital Transformation
January 30BostonU.S.Securing the Digital Enterprise
January 29DenverU.S.Security as a Catalyst for Digital Transformation
January 24ChicagoU.S.Healthcare & Insurance: How to Establish and Maintain Digital Identity Trust
January 23NYCU.S.The Road to Business-Driven Security
January 17SeattleU.S.The Road to Business-Driven Security
MonthCityCountryTopic
December 18San DiegoU.S.Security as a Catalyst for Digital Transformation
December 4Washington, D.C.U.S.Open Source Components: How to Increase Speed and Reduce the Risk
November 29RaleighU.S.The Road to Business-Driven Security
November 29MumbaiIndiaHow Secure Are You? Best Practices in Measuring Your Security Stance
November 29MumbaiIndiaThe Changing Nature of Identity in a Digitized World
November 15NYCU.S.Zero Trust Security
October 30BostonU.S.Modern Identity and Access Management: How to Build Trust without Sacrificing Security
October 25ColumbusU.S.Modern Identity and Access Management: How to Build Trust without Sacrificing Security
October 18SeattleU.S.Open Source Components: How to Increase Speed and Reduce the Risk
October 18NYCU.S.Financial Crimes: How to Improve Response and Reduce False Positives
October 16DallasU.S.Security as a Catalyst for Digital Transformation
October 11ColumbusU.S.Workshop: New Essentials of Privileged Access Management
October 11Los AngelesU.S.Security as a Catalyst for Digital Transformation
October 9BostonU.S.Workshop: New Essentials of Privileged Access Management
October 4DenverU.S.Threat Hunting: How to Evolve Your Incident Response
September 27ScottsdaleU.S.Threat Hunting: How to Evolve Your Incident Response
September 26LondonU.K.How to Establish and Maintain Digital Identity Trust
September 20San AntonioU.S.The Future of Identity and Governance
September 19DallasU.S.A New Model of Digital Trust in a Zero Trust Online World
September 18AtlantaU.S.A New Model of Digital Trust in a Zero Trust Online World
September 11TorontoCanadaThe Road to Business-Driven Security
September 11TorontoCanadaOpen Source Components: How to Increase Speed and Reduce the Risk
September 11TorontoCanadaSecurity as a Catalyst for Digital Transformation
August 21Kansas CityU.S.The Road to Business-Driven Security
August 14NYCU.S.The Road to Business-Driven Security
August 14NYCU.S.Mobile / Web App Security: How Do You Know It’s Working?
July 27Sao PauloBrazilRethinking Your Cybersecurity Strategy
July 24AtlantaU.S.Threat Hunting: How to Evolve Your Incident Response
July 17DallasU.S.Open Source Components: How to Increase Speed and Reduce the Risk
June 22BangaloreIndiaManage Your Enterprise Risks in the Cloud: The Security Promise
June 21Washington, D.C.U.S.Threat Hunting: How to Evolve Your Incident Response
June 14CharlotteU.S.Modern Identity and Access Management: How to Build Trust without Sacrificing Security
June 12BangaloreIndiaFighting the Avanced DDoS Threat: Proactive Mitigation and Collaboration
May 10ManilaPhilippinesEnterprise Security 2018 – Business Drivers, Compliance and Regulatory Challenges
May 10Washington, D.C.U.S.Reality or Snake Oil? The Security Promise of AI, ML and Data Science
April 26SeattleU.S.Threat Hunting: How to Evolve Your Incident Response
April 24ChennaiIndiaAdvanced SOC – Evolving to the Next Generation Threat Management Capability
April 18MumbaiIndiaManage Your Enterprise Risks in the Cloud: The Security
April 18San FranciscoU.S.The Machine Identity Crisis: A Call to Action
April 17San FranciscoU.S.The Machine Identity Crisis: A Call to Action
April 17San FranciscoU.S.Strategic Threat Intelligence: Lessons from the Pentagon
April 12NYCU.S.Reality or Snake Oil? The Security Promise of AI, ML and Data Science
April 10ChicagoU.S.Reality or Snake Oil? The Security Promise of AI, ML and Data Science
April 3BostonU.S.Active Defense: Clearing the Legal and Ethical Hurdles
March 29AtlantaU.S.Payment & Banking Innovation: Get Ahead of the Security Challenges
March 28NYCU.S.Open Source Components: How to Increase Speed and Reduce the Risk
March 28NYCU.S.How to Turn Your End User into Your Friend User and Reduce Your Biggest Risk Vector
March 22MumbaiIndiaIdentity-driven Security in an Evolving Threat Landscape
March 15Mexico CityMexicoPhishing: New Strategies to Fight the Growing Threat
March 15MumbaiIndiaThe Road to Business-Driven Security
March 13AtlantaU.S.Active Defense: Clearing the Legal and Ethical Hurdles
March 13BangkokThailand2018 Digital Identity and Mobile Banking Fraud Trends
March 1NYCU.S.Modern Privileged Access Management: How to Use Threat Analytics to Help Prevent Breaches
February 8NYCU.S.Threat Hunting: How to Evolve Your Incident Response
February 6DallasU.S.Exposing the Enemy Within: How to Leverage DNS Data to Improve Breach Detection and Response
February 2SingaporeSingaporeAdvanced SOC– Evolving to the Next Generation Threat Management Capability
January 23AtlantaU.S.Modern Identity and Access Management: How to Build Trust without Sacrificing Security
January 18San FranciscoU.S.Exposing the Enemy Within: How to Leverage DNS Data to Improve Breach Detection and Response
January 16DallasU.S.Threat Hunting: How to Evolve Your Incident Response
MonthCityCountryTopic
December 7MontrealCanadaSecure the Breach: Why You Need to Encrypt Everything
December 6MumbaiIndiaMobility & Fraud: Scams and Solutions to Eye in 2018
December 5SeattleU.S.The Road to Business-Driven Security
November 28FrankfurtGermanyFighting Cybercriminals in the Era of Digital Banking
November 15NYCU.S.Exposing the Enemy Within: How to Leverage DNS Data to Improve Breach Detection and Response
November 15MilanItalyBattling Fraud in the Era of Open Banking
November 14NYCU.S.Reducing the Risk of a Cyber Attack - How to Avoid Becoming the Next Equifax
November 14NYCU.S.Incident Response: How to Find the Internal Threat Before the Damage is Done
November 7NYCU.S.Your Data Is On the Move, But Is It Secure?
October 26ParisFranceSecurity Transformation: Be an Enabler, Not an Obstacle
October 26DallasU.S.The Road to Business-Driven Security
October 24FrankfurtGermanySecurity Transformation: Be an Enabler, Not an Obstacle
October 17LondonU.K.Reducing the Risk of a Cyber Attack - How to Avoid Becoming the Next Equifax
October 17LondonU.K.Security Transformation: Be an Enabler, Not an Obstacle
October 12AtlantaU.S.The Road to Business-Driven Security
October 3San JoseU.S.The Road to Business-Driven Security
September 26Los AngelesU.S.IoT Security: How to Minimize the Threat and Maximize the Trust
September 21SeattleU.S.IoT Security: How to Minimize the Threat and Maximize the Trust
September 19BostonU.S.The Road to Business-Driven Security
September 14DubaiU.A.E.Developing The Next Generation of SOCs in GCC Region
Setember 12TorontoCanadaThe Road to Business-Driven Security
September 12TorontoCanadaPrivileged Access and the Business: How Secure Code Can Improve the Bottom Line
September 12TorontoCanadaWannaCry and Crimeware as a Service: How to Respond to This Security Game-Changer
September 12TorontoCanadaNIST Cybersecurity Framework: Best Practices for Implementation
September 12TorontoCanadaIncident Response: How to Find the Internal Threat Before the Damage is Done
August 24ColumbusU.S.IoT Security: How to Minimize the Threat and Maximize the Trust
August 24TorontoCanadaPreparing for GDPR: Checklist for Conformance
August 22NYCU.S.Preparing for GDPR: Checklist for Conformance
August 15Sao PauloBrazilPhishing: New Strategies to Fight the Global Threat
August 10DetriotU.S.IoT Security: How to Minimize the Threat and Maximize the Trust
August 3HoustonU.S.IoT Security: How to Minimize the Threat and Maximize the Trust
August 1CharlotteU.S.Secure the Breach: Why You Need to Encrypt Everything

For more information on how you can sponsor or attend any of our upcoming Executive Rountables please contact us today.