ISMG’s Executive Roundtables are intimate, closed-door discussions focused on specific challenges being faced by information security executives in today’s cybersecurity landscape.  Moderated by one of ISMG’s Executive Editors and hosted over breakfast, lunch or dinner, Executive Roundtables provide senior cybersecurity professionals the opportunity to share their own experiences with an intimate group of peers and emerge with new strategies they can immediately put to work at their own organizations.

Global Roundtable Events

GLOBAL ROUNDTABLE EVENTS

Ismg Executive Roundtable Dinner Atlanta Threat Hunting Ismg Executive Roundtable Sao Paulo 2018 Ismg Executive Roundtable Road To Business Driven Security Nyc Summit Ismg-Executive-Roundtable-Nyc-Web-App-Security Ismg Executive Roundtable Dinner Kansas City Business Driven Security Ismg Executive Roundtable Road To Business Driven Security Toronto Summit Ismg Executive Roundtable Toronto Open Source Components Ismg Executive Roundtable Dinner Nyc Financial Crimes

Upcoming Executive Roundtables

Date City Country Topic
December 18, 2018 San Diego U.S. Security as a Catalyst for Digital Transformation
January 17, 2019 Seattle U.S. Coming Soon
January 23, 2019 NYC U.S. Coming Soon: The Road to Business-Driven Security
January 17, 2019 Denver U.S. Coming Soon
January 24, 2019 Chicago U.S. Healthcare & Insurance: How to Establish and Maintain Digital Identity Trust

Past Executive Roundtables

Month City Country Topic
2018-12-4December Washington, D.C. U.S. Open Source Components: How to Increase Speed and Reduce the Risk
2018-11-29November Raleigh U.S. The Road to Business-Driven Security
2018-11-29November Mumbai India How Secure Are You? Best Practices in Measuring Your Security Stance
2018-11-29November Mumbai U.S. The Changing Nature of Identity in a Digitized World
2018-11-15November New York City U.S. Zero Trust Security
2018-10-30October Boston U.S Modern Identity and Access Management: How to Build Trust without Sacrificing Security
2018-10-25October Columbus U.S Modern Identity and Access Management: How to Build Trust without Sacrificing Security
2018-10-23October London U.K. Advanced SOC Operations – Moving from SOC to the CSOC
2018-10-18October Seattle U.S Open Source Components: How to Increase Speed and Reduce the Risk
2018-10-18October New York City U.S Financial Crimes: How to Improve Response and Reduce False Positives
2018-10-16October Dallas U.S. Security as a Catalyst for Digital Transformation
2018-10-11October Columbus U.S. Workshop: New Essentials of Privileged Access Management
2018-10-11October Los Angeles U.S. Security as a Catalyst for Digital Transformation
2018-10-09October Boston U.S. Workshop: New Essentials of Privileged Access Management
2018-10-04October Denver U.S. Threat Hunting: How to Evolve Your Incident Response
2018-09-27September Scottsdale U.S. Threat Hunting: How to Evolve Your Incident Response
2018-09-26September London U.K. How to Establish and Maintain Digital Identity Trust
2018-09-20September San Antonio U.S. The Future of Identity and Governance
2018-09-19September Dallas U.S. A New Model of Digital Trust in a Zero Trust Online World
2018-09-18September Atlanta U.S. A New Model of Digital Trust in a Zero Trust Online World
2018-09-11September Toronto Canada The Road to Business-Driven Security
2018-09-11September Toronto Canada Open Source Components: How to Increase Speed and Reduce the Risk
2018-09-11September Toronto Canada Security as a Catalyst for Digital Transformation
2018-08-21August Kansas City U.S. The Road to Business-Driven Security
2018-08-14August New York City U.S. The Road to Business-Driven Security
2018-08-14August New York City U.S. Mobile/Web App Security: How Do You Know it’s Working?
2018-07-27July Sao Paulo Brazil Rethinking Your Cybersecurity Strategy
2018-07-24July Atlanta U.S. Threat Hunting: How to Evolve Your Incident Response
2018-07-19July Dallas U.S. Open Source Components: How to Increase Speed and Reduce the Risk
2018-06-22June Bangalore India Manage Your Enterprise Risks in the Cloud: The Security Promise
2018-06-21June Washington, D.C. U.S. Threat Hunting: How to Evolve Your Incident Response
2018-06-14June Charlotte U.S. Modern Identity and Access Management: How to Build Trust without Sacrificing Security
2018-06-12June Bangalore India Fighting the Avanced DDoS Threat: Proactive Mitigation and Collaboration
2018-05-10May Manila Philippines Enterprise Security 2018 – Business Drivers, Compliance and Regulatory Challenges
2018-05-10May Washington, D.C. U.S. Reality or Snake Oil? The Security Promise of AI, ML and Data Science
2018-04-26April Seattle U.S. Threat Hunting: How to Evolve Your Incident Response
2018-04-24April Chennai India Advanced SOC – Evolving to the Next Generation Threat Management Capability
2018-04-18April Mumbai India Manage Your Enterprise Risks in the Cloud: The Security
2018-04-18April San Francisco U.S. The Machine Identity Crisis: A Call to Action
2018-04-17April San Francisco U.S. The Machine Identity Crisis: A Call to Action
2018-04-17April San Francisco U.S. Strategic Threat Intelligence: Lessons from the Pentagon
2018-04-12April New York City U.S. Reality or Snake Oil? The Security Promise of AI, ML and Data Science
2018-04-10April Chicago U.S. Reality or Snake Oil? The Security Promise of AI, ML and Data Science
2018-04-03April Boston U.S. Active Defense: Clearing the Legal and Ethical Hurdles
2018-03-29March Atlanta U.S. Payment & Banking Innovation: Get Ahead of the Security Challenges
2018-03-28March New York City U.S. Open Source Components: How to Increase Speed and Reduce the Risk
2018-03-28March New York City U.S. How to Turn Your End User into Your Friend User and Reduce Your Biggest Risk Vector
2018-03-21March Mumbai India Identity-driven Security in an Evolving Threat Landscape
2018-03-15March Mexico City Mexico Phishing: New Strategies to Fight the Growing Threat
2018-03-13March Atlanta U.S. Active Defense: Clearing the Legal and Ethical Hurdles
2018-03-13March Bangkok Thailand 2018 Digital Identity and Mobile Banking Fraud Trends
2018-03-08March Mumbai India The Road to Business-Driven Security
2018-03-01March New York City U.S. Modern Privileged Access Management: How to Use Threat Analytics to Help Prevent Breaches
2018-02-08February New York City U.S. Threat Hunting: How to Evolve Your Incident Response
2018-02-06February Dallas U.S. Exposing the Enemy Within: How to Leverage DNS Data to Improve Breach Detection and Response
2018-02-01February Singapore Singapore Advanced SOC– Evolving to the Next Generation Threat Management Capability
2018-01-23January Atlanta U.S. Modern Identity and Access Management: How to Build Trust without Sacrificing Security
2018-01-18January San Francisco U.S. Exposing the Enemy Within: How to Leverage DNS Data to Improve Breach Detection and Response
2018-01-16January Dallas U.S. Threat Hunting: How to Evolve Your Incident Response
2017-12-07December Montreal CA Secure the Breach: Why You Need to Encrypt Everything
2017-12-06December Mumbai India Mobility & Fraud: Scams and Solutions to Eye in 2018
2017-12-05December Seattle U.S. The Road to Business-Driven Security
2017-12-28November Frankfurt Germany Fighting Cybercriminals in the Era of Digital Banking
2017-11-15November New York City U.S. Exposing the Enemy Within: How to Leverage DNS Data to Improve Breach Detection and Response
2017-11-15November Milan IT Battling Fraud in the Era of Open Banking
2017-11-14November New York City U.S. Reducing the Risk of a Cyber Attack-- How to Avoid Becoming the Next Equifax
2017-11-14November New York City U.S. Incident Response: How to Find the Internal Threat Before the Damage is Done
2017-11-07November New York City U.S. Your Data Is On the Move, But Is It Secure?
2017-10-26October Paris France Security Transformation: Be an Enabler, Not an Obstacle
2017-10-26October Dallas U.S. The Road to Business-Driven Security
2017-10-24October Frankfurt Germany Security Transformation: Be an Enabler, Not an Obstacle
2017-10-17October London U.K. Reducing the Risk of a Cyber Attack-- How to Avoid Becoming the Next Equifax
2017-10-17October London U.K. Security Transformation: Be an Enabler, Not an Obstacle
2017-10-12October Atlanta U.S. The Road to Business-Driven Security
2017-10-03October San Jose U.S. The Road to Business-Driven Security
2017-09-26September L.A. U.S. IoT Security: How to Minimize the Threat and Maximize the Trust
2017-09-21September Seattle U.S. IoT Security: How to Minimize the Threat and Maximize the Trust
2017-09-19September Boston U.S. The Road to Business-Driven Security
2017-09-14September Dubai UAE Developing The Next Generation of SOCs in GCC Region
2017-09-12September Toronto CA The Road to Business-Driven Security
2017-09-12September Toronto CA Privileged Access and the Business: How Secure Code Can Improve the Bottom Line
2017-09-12September Toronto CA WannaCry and Crimeware as a Service: How to Respond to This Security Game-Changer
2017-09-12September Toronto CA NIST Cybersecurity Framework: Best Practices for Implementation
2017-09-12September Toronto CA Incident Response: How to Find the Internal Threat Before the Damage is Done
2017-08-24August Columbus U.S. IoT Security: How to Minimize the Threat and Maximize the Trust
2017-08-24August Toronto CA Preparing for GDPR: Checklist for Conformance
2017-08-22August New York City U.S. Preparing for GDPR: Checklist for Conformance
2017-08-15August Sao Paulo Brazil Phishing: New Strategies to Fight the Global Threat
2017-08-10August Detroit U.S. IoT Security: How to Minimize the Threat and Maximize the Trust
2017-08-03August Houston U.S. IoT Security: How to Minimize the Threat and Maximize the Trust
2017-08-01August Charlotte U.S. Secure the Breach: Why You Need to Encrypt Everything

For more information on how you can sponsor or attend any of our upcoming Executive Rountables please contact us today.