ISMG’s Executive Roundtables are intimate, closed-door discussions focused on specific challenges being faced by information security executives in today’s cybersecurity landscape.  Moderated by one of ISMG’s Executive Editors and hosted over breakfast, lunch or dinner, Executive Roundtables provide senior cybersecurity professionals the opportunity to share their own experiences with an intimate group of peers and emerge with new strategies they can immediately put to work at their own organizations.

Global Roundtable Events

GLOBAL ROUNDTABLE EVENTS

Ismg Executive Roundtable Dinner Atlanta Threat Hunting Ismg Executive Roundtable Sao Paulo 2018 Ismg Executive Roundtable Road To Business Driven Security Nyc Summit Ismg-Executive-Roundtable-Nyc-Web-App-Security Ismg Executive Roundtable Dinner Kansas City Business Driven Security Ismg Executive Roundtable Road To Business Driven Security Toronto Summit Ismg Executive Roundtable Toronto Open Source Components Ismg Executive Roundtable Dinner Nyc Financial Crimes

Past Executive Roundtables

Month City Country Topic
2018-10-16October Dallas U.S. Security as a Catalyst for Digital Transformation
2018-10-11October Columbus U.S. Workshop: New Essentials of Privileged Access Management
2018-10-11October Los Angeles U.S. Security as a Catalyst for Digital Transformation
2018-10-09October Boston U.S. Workshop: New Essentials of Privileged Access Management
2018-10-04October Denver U.S. Threat Hunting: How to Evolve Your Incident Response
2018-09-27September Scottsdale U.S. Threat Hunting: How to Evolve Your Incident Response
2018-09-26September London U.K. How to Establish and Maintain Digital Identity Trust
2018-09-20September San Antonio U.S. The Future of Identity and Governance
2018-09-19September Dallas U.S. A New Model of Digital Trust in a Zero Trust Online World
2018-09-18September Atlanta U.S. A New Model of Digital Trust in a Zero Trust Online World
2018-09-11September Toronto Canada The Road to Business-Driven Security
2018-09-11September Toronto Canada Open Source Components: How to Increase Speed and Reduce the Risk
2018-09-11September Toronto Canada Security as a Catalyst for Digital Transformation
2018-08-21August Kansas City U.S. The Road to Business-Driven Security
2018-08-14August NYC U.S. The Road to Business-Driven Security
2018-08-14August NYC U.S. Mobile/Web App Security: How Do You Know it’s Working?
2018-07-27July Sao Paulo Brazil Rethinking Your Cybersecurity Strategy
2018-07-24July Atlanta U.S. Threat Hunting: How to Evolve Your Incident Response
2018-07-19July Dallas U.S. Open Source Components: How to Increase Speed and Reduce the Risk
2018-06-22June Bangalore India Manage Your Enterprise Risks in the Cloud: The Security Promise
2018-06-21June Washington, D.C. U.S. Threat Hunting: How to Evolve Your Incident Response
2018-06-14June Charlotte U.S. Modern Identity and Access Management: How to Build Trust without Sacrificing Security
2018-06-12June Bangalore India Fighting the Avanced DDoS Threat: Proactive Mitigation and Collaboration
2018-05-10May Manila Philippines Enterprise Security 2018 – Business Drivers, Compliance and Regulatory Challenges
2018-05-10May Washington, D.C. U.S. Reality or Snake Oil? The Security Promise of AI, ML and Data Science
2018-04-26April Seattle U.S. Threat Hunting: How to Evolve Your Incident Response
2018-04-24April Chennai India Advanced SOC – Evolving to the Next Generation Threat Management Capability
2018-04-18April Mumbai India Manage Your Enterprise Risks in the Cloud: The Security
2018-04-18April San Francisco U.S. The Machine Identity Crisis: A Call to Action
2018-04-17April San Francisco U.S. The Machine Identity Crisis: A Call to Action
2018-04-17April San Francisco U.S. Strategic Threat Intelligence: Lessons from the Pentagon
2018-04-12April New York City U.S. Reality or Snake Oil? The Security Promise of AI, ML and Data Science
2018-04-10April Chicago U.S. Reality or Snake Oil? The Security Promise of AI, ML and Data Science
2018-04-03April Boston U.S. Active Defense: Clearing the Legal and Ethical Hurdles
2018-03-29March Atlanta U.S. Payment & Banking Innovation: Get Ahead of the Security Challenges
2018-03-28March New York City U.S. Open Source Components: How to Increase Speed and Reduce the Risk
2018-03-28March New York City U.S. How to Turn Your End User into Your Friend User and Reduce Your Biggest Risk Vector
2018-03-21March Mumbai India Identity-driven Security in an Evolving Threat Landscape
2018-03-15March Mexico City Mexico Phishing: New Strategies to Fight the Growing Threat
2018-03-13March Atlanta U.S. Active Defense: Clearing the Legal and Ethical Hurdles
2018-03-13March Bangkok Thailand 2018 Digital Identity and Mobile Banking Fraud Trends
2018-03-08March Mumbai India The Road to Business-Driven Security
2018-03-01March New York City U.S. Modern Privileged Access Management: How to Use Threat Analytics to Help Prevent Breaches
2018-02-08February New York City U.S. Threat Hunting: How to Evolve Your Incident Response
2018-02-06February Dallas U.S. Exposing the Enemy Within: How to Leverage DNS Data to Improve Breach Detection and Response
2018-02-01February Singapore Singapore Advanced SOC– Evolving to the Next Generation Threat Management Capability
2018-01-23January Atlanta U.S. Modern Identity and Access Management: How to Build Trust without Sacrificing Security
2018-01-18January San Francisco U.S. Exposing the Enemy Within: How to Leverage DNS Data to Improve Breach Detection and Response
2018-01-16January Dallas U.S. Threat Hunting: How to Evolve Your Incident Response
2017-12-07December Montreal CA Secure the Breach: Why You Need to Encrypt Everything
2017-12-06December Mumbai India Mobility & Fraud: Scams and Solutions to Eye in 2018
2017-12-05December Seattle U.S. The Road to Business-Driven Security
2017-12-28November Frankfurt Germany Fighting Cybercriminals in the Era of Digital Banking
2017-11-15November New York City U.S. Exposing the Enemy Within: How to Leverage DNS Data to Improve Breach Detection and Response
2017-11-15November Milan IT Battling Fraud in the Era of Open Banking
2017-11-14November New York City U.S. Reducing the Risk of a Cyber Attack-- How to Avoid Becoming the Next Equifax
2017-11-14November New York City U.S. Incident Response: How to Find the Internal Threat Before the Damage is Done
2017-11-07November New York City U.S. Your Data Is On the Move, But Is It Secure?
2017-10-26October Paris France Security Transformation: Be an Enabler, Not an Obstacle
2017-10-26October Dallas U.S. The Road to Business-Driven Security
2017-10-24October Frankfurt Germany Security Transformation: Be an Enabler, Not an Obstacle
2017-10-17October London U.K. Reducing the Risk of a Cyber Attack-- How to Avoid Becoming the Next Equifax
2017-10-17October London U.K. Security Transformation: Be an Enabler, Not an Obstacle
2017-10-12October Atlanta U.S. The Road to Business-Driven Security
2017-10-03October San Jose U.S. The Road to Business-Driven Security
2017-09-26September L.A. U.S. IoT Security: How to Minimize the Threat and Maximize the Trust
2017-09-21September Seattle U.S. IoT Security: How to Minimize the Threat and Maximize the Trust
2017-09-19September Boston U.S. The Road to Business-Driven Security
2017-09-14September Dubai UAE Developing The Next Generation of SOCs in GCC Region
2017-09-12September Toronto CA The Road to Business-Driven Security
2017-09-12September Toronto CA Privileged Access and the Business: How Secure Code Can Improve the Bottom Line
2017-09-12September Toronto CA WannaCry and Crimeware as a Service: How to Respond to This Security Game-Changer
2017-09-12September Toronto CA NIST Cybersecurity Framework: Best Practices for Implementation
2017-09-12September Toronto CA Incident Response: How to Find the Internal Threat Before the Damage is Done
2017-08-24August Columbus U.S. IoT Security: How to Minimize the Threat and Maximize the Trust
2017-08-24August Toronto CA Preparing for GDPR: Checklist for Conformance
2017-08-22August New York City U.S. Preparing for GDPR: Checklist for Conformance
2017-08-15August Sao Paulo Brazil Phishing: New Strategies to Fight the Global Threat
2017-08-10August Detroit U.S. IoT Security: How to Minimize the Threat and Maximize the Trust
2017-08-08August New York City U.S. Incident Response: How to Find the Internal Threat Before the Damage is Done
2017-08-08August New York City U.S. WannaCry and Crimeware as a Service: How to Respond to This Security Game-Changer
2017-08-03August Houston U.S. IoT Security: How to Minimize the Threat and Maximize the Trust
2017-08-01August Charlotte U.S. Secure the Breach: Why You Need to Encrypt Everything
2017-07-07July Bangalore India A Roadmap for Effective Security Automation
2017-06-06June New York City U.S. Strategic Cybersecurity Investments: How is Your Organization Responding to Evolving Threats?
2017-06-06June Paris France “Protect This House” – Is Your Mainframe as Secure as it Must Be?
2017-06-06June Chicago U.S. RAT Attacks, Ransomware and Banking Trojans: Lessons Learned from Studying Cybercrime
2017-06-06June New York City U.S. Trusted Access: What’s Your State of Privileged Access and Device Security?
2017-06-06June Chicago U.S. 2017 Threat Landscape: Responding to Ransomware and Other Evolving Attacks
2017-06-06June New Delhi India A Roadmap for Effective Security Automation
2017-06-06
June
Washington, D.C. U.S. How Can You Really Know If Your Network Is Truly Secure?
2017-05-05May San Francisco U.S. 2017 Threat Landscape: Responding to Ransomware and Other Evolving Attacks
2017-05-05May St. Louis U.S. Healthcare Use-Case: Privileged Identity Management
2017-05-05May Bangalore India RAT Attacks, Ransomware and Banking Trojans: Lessons Learned from Studying Cybercrime
2017-05-05May Minneapolis U.S. Healthcare Use-Case: Privileged Identity Management
2017-05-05May Seattle U.S. Trusted Access: What’s Your State of Privileged Access and Device Security?
2017-05-05May Chicago U.S. 2017 Threat Landscape: Responding to Ransomware and Other Evolving Attacks
2017-04-04April Charlotte U.S. “Protect This House” – Is Your Mainframe as Secure as it Must Be?
2017-04-04April Mumbai India Strategic Cybersecurity Investments: How is Your Organization Responding to Evolving Threats?

For more information on how you can sponsor or attend any of our upcoming Executive Rountables please contact us today.