(CISO) Leaders of Cybersecurity: Northeast | Virtual Roundtable
Time & Location
About The Event
This highly interactive virtual gathering brings together 25 Cybersecurity/InfoSec Executives from the Northeast.
Our attendees are representing a range of industries with a common goal to discuss challenges, ideas, and experiences.
This is not a webinar. This is a virtual meeting allowing participants to take an active role in the discussions, joining like-minded peers with a click of a button.
There are no presentations; The event is designed with the use of multiple breakout rooms, covering a variety of topics, and helping interaction. This is an efficient setup to truly discuss topics of interest, sharing your point of view, while listening to topic-focused valuable perspectives.
BREAKOUT ROOM SCHEDULE ⌚️
✅ Driving Confidence and Resilience in Your Security Program
Ask any cybersecurity professional and most agree that they are confident in their ability to protect the enterprise.
Reacting to cyber breaches is an operational reality. Unfortunately, many have experienced the chaos and scarring that this can cause your enterprise - even your department and job role!
Being attacked is not a matter of 'if' but 'when' and not many companies can sit back with confidence that they have a fail proof prevention and protection system.
During this session we will go around the room, meeting other Cybersecurity leaders, sharing and discussing the biggest threats and challenges, and benchmarking ideas for future strategy to protect industry.
Learn ideas from world-class security operations. Discuss recent developments in technology that can give you ideas for implementing improvements within your security workflows.
✅ Securing Your Cloud Using Modern Tools
Organizations are adapting as they face new challenges driven by distributed workforces and accelerated cloud transformations. The biggest challenge for organizations from small to large, is to maintain security. With the speed of change in Cloud-based models comes the need to develop and deply a comprehensive security strategy that is specifically designed to protect and defend the company's cloud-based assets.
Businesses taking a multicloud approach can cherry-pick the solutions that best meet their business needs. What options are available? What are others doing? Join this breakout room to discuss.
✅ Understanding the Meaning and Design Principles Behind Zero Trust and SASE
With the speed of innovation, Zero Trust network access, and Secure Access Service Edge are two approaches that every organization is focused on to better secure their increasingly dispersed remote workforces against attack.
Join to discuss a few ways/ideas that network and security teams can accomplish zero trust and use the forward-thinking framework of SASE to unite and deliver the protection and performance that could be possible.
How are the security teams of other organizations adapting to change? How are current initiatives developing, and what challenges are expected? You are not expected to join and discuss anything confidential - the aim is to join a 2-hour meeting which can give you more value by looking outside of your teams/organization. Join to get an idea on the perspectives of others.
As an attendee for this discussion, the key benefits of your involvement include:
- Meet with peers; department leaders from Industry-leading organizations
- This is an end-user discussion with a skilled moderator - We have a strict no sales pitch policy
- Gain an understanding of the current market on a prearranged topic and create competitive advantage while dealing with change
- Learn the challenges of others in this live environment, and build your network of peers with the ability to continue conversations after the session
- No requirement to discuss anything confidential - this is a safe space with no recording
With a difference to other Zoom meetings, this event has a limited cap of attendees and requires approval upon registration, ensuring only end-user company attendance.
Criteria for attendance: To help discussions, we ensure that all approved attendees are in similar employment: ✔ Currently employed by an end-user company that does not provide solutions to the subject field & works in an industry environment which is relevant to the event topic ✔ Chief, VP, Director, Manager position or suitable background to allow experience sharing ✔ Internal approval should not be necessary for attending as ideas shared should be your own & do not reflect your company viewpoint
Please only attend if you are willing to join the discussion. This is not a listen-only event so we ask that all attendees join with video & audio and are prepared to interact.
Please reach out to us if you have any questions or need additional info...
GIAC Members Earn CPEs