(CISO) Leaders of Cybersecurity: Northeast | Virtual Roundtable
Time & Location
About The Event
This highly interactive virtual gathering brings together 25 Cybersecurity/InfoSec Executives from the Northeast.
Our attendees are representing a range of industries with a common goal to discuss challenges, ideas, and experiences.
This is not a webinar. This is a virtual meeting allowing participants to take an active role in the discussions, joining like-minded peers with a click of a button.
There are no presentations; The event is designed with the use of multiple breakout rooms, covering a variety of topics, and helping interaction. This is an efficient setup to truly discuss topics of interest, sharing your point of view, while listening to topic-focused valuable perspectives.
BREAKOUT ROOM SCHEDULE ⌚️
✅ Simplifying your Security Program to Secure the Future of Work
Ask any cybersecurity professional and most agree that they are confident in their ability to protect the enterprise.
Reacting to cyber breaches is an operational reality. Unfortunately, many have experienced the chaos and scarring that this can cause your enterprise - even your department and job role!
Being attacked is not a matter of 'if' but 'when' and not many companies can sit back with confidence that they have a fail proof prevention and protection system.
During this session we will go around the room, meeting other Cybersecurity leaders, sharing and discussing the biggest threats and challenges, and benchmarking ideas for future strategy to protect industry.
Learn ideas from world-class security operations. Discuss recent developments in technology that can give you ideas for implementing improvements within your security workflows.
✅ How can Cloud Native Applications Change the Threat Landscape?
Organizations are adapting as they face new challenges driven by distributed workforces and accelerated cloud transformations. The biggest challenge for organizations from small to large, is to maintain security. With the speed of change in Cloud-based models comes the need to develop and deploy a comprehensive security strategy that is specifically designed to protect and defend the company's cloud-based assets.
Businesses taking a multicloud approach can cherry-pick the solutions that best meet their business needs. What options are available? What are others doing? Join this breakout room to discuss.
✅ Using Artificial Intelligence for Email Security
Learn from other Cybersecurity Leaders to see how they are tapping the power of Artificial Intelligence (AI) to drive business transformation while staying secure.
AI is a powerful weapons that can be used to fight cyber crimes. Their ability to identify and prevent cyber-attacks at scale is very advantageous.
The use of AI is expected to grow at a fast pace and help in fighting these attacks.
See how others are adapting and ensure you are doing all you can to stay on track with innovation and its benefits.
As an attendee for this discussion, the key benefits of your involvement include:
- Meet with peers; department leaders from Industry-leading organizations
- This is an end-user discussion with a skilled moderator - We have a strict no sales pitch policy
- Gain an understanding of the current market on a prearranged topic and create competitive advantage while dealing with change
- Learn the challenges of others in this live environment, and build your network of peers with the ability to continue conversations after the session
- No requirement to discuss anything confidential - this is a safe space with no recording
With a difference to other Zoom meetings, this event has a limited cap of attendees and requires approval upon registration, ensuring only end-user company attendance.
Criteria for attendance: To help discussions, we ensure that all approved attendees are in similar employment: ✔ Currently employed by an end-user company that does not provide solutions to the subject field & works in an industry environment which is relevant to the event topic ✔ Chief, VP, Director, Manager position or suitable background to allow experience sharing ✔ Internal approval should not be necessary for attending as ideas shared should be your own & do not reflect your company viewpoint
Please only attend if you are willing to join the discussion. This is not a listen-only event so we ask that all attendees join with video & audio and are prepared to interact.
Please reach out to us if you have any questions or need additional info...