(CISO) Leaders of Cybersecurity: Southern Region | Virtual Roundtable
Thu, Jun 03 | Online Event

(CISO) Leaders of Cybersecurity: Southern Region | Virtual Roundtable

The highly interactive InfoSec, virtual roundtable returns. Designed exclusively for Cybersecurity professionals looking to meet & brainstorm on current topics/developments. Multiple breakout rooms allow free-flowing conversation, & idea-sharing with peers that face similarly evolving concerns
Registration is Closed

Time & Location

Jun 03, 4:00 PM – 6:00 PM CDT
Online Event

About The Event

This highly interactive virtual gathering brings together 25 Cybersecurity/InfoSec Executives from Texas, Oklahoma, Louisiana & Arkansas.

Our attendees are representing a range of industries with a common goal to discuss challenges, ideas, and experiences.

This is not a webinar. This is a virtual meeting allowing participants to take an active role in the discussions, joining like-minded peers with a click of a button.

There are no presentations; The event is designed with the use of multiple breakout rooms, covering a variety of topics, and helping interaction. This is an efficient setup to truly discuss topics of interest, sharing your point of view, while listening to topic-focused valuable perspectives.

BREAKOUT ROOM SCHEDULE ⌚️

BREAKOUT 1

The Role of Cloud SIEM on a Multi-Cloud Security Strategy

The scenario where your organization uses multiple public cloud providers is a common occurrence. More and more are moving this way, however, not everyone is prepared for the increased security challenges associated with these cloud environments.

During this roundtable we are joining to share views on cloud environment development and learn what proactive steps others are using to apply new cloud-centric monitoring tools to prevent and protect.

How can organizations achieve a cost-effective solution?

What are the SIEM capabilities required to provide adequate security monitoring for cloud environments?

How can cloud SIEM multiply the value of CASB and CSPM implementations?

BREAKOUT 2

How do we Make Location-Agnostic Security a Reality?

As quickly as Security leaders approached the realities of a hybrid workplace, employees (even a limited number) are now being prepared to return to the office & travel.

The objective is to maintain security, by creating a location-agnostic security stance that remains agile and frictionless. To allow secure, remote application access for all employees.

Join this moderated roundtable to discuss with other Secuirty Leaders on how to make location-agnostic security a reality, while maintaining an excellent user experience. Learn from others, share your experience and brainstorm for future strategy.

BREAKOUT 3

Integrating AI with Cybersecurity

Learn from other Cybersecurity Leaders to see how they are tapping the power of Artificial Intelligence (AI) to drive business transformation while staying secure.

AI and Machine Learning (ML) are two powerful weapons that can be used to fight cyber crimes. Their ability to identify and prevent cyber-attacks at scale is very advantageous.

Cyberattacks are becoming more prevalent and are threatening the digital ecosystems at an alarming rate. The use of AI and ML is expected to grow at a fast pace and help in fighting these attacks.

See how others are adapting and ensure you are doing all you can to stay on track with innovation and its benefits.

As an attendee for this discussion, the key benefits of your involvement include:

  • Meet with peers; department leaders from Industry-leading organizations
  • This is an end-user discussion with a skilled moderator - We have a strict no sales pitch policy
  • Gain an understanding of the current market on a prearranged topic and create competitive advantage while dealing with change
  • Learn the challenges of others in this live environment, and build your network of peers with the ability to continue conversations after the session
  • No requirement to discuss anything confidential - this is a safe space with no recording

With a difference to other Zoom meetings, this event has a limited cap of attendees and requires approval upon registration, ensuring only end-user company attendance.

Criteria for attendance:   To help discussions, we ensure that all approved attendees are in similar employment:    ✔ Currently employed by an end-user company that does not provide solutions to the subject field & works in an industry environment which is relevant to the event topic    ✔ Chief, VP, Director, Manager position or suitable background to allow experience sharing    ✔ Internal approval should not be necessary for attending as ideas shared should be your own & do not reflect your company viewpoint

Please only attend if you are willing to join the discussion. This is not a listen-only event so we ask that all attendees join with video & audio and are prepared to interact.

Please reach out to us if you have any questions or need additional info...

Additional Information


  • 2 hours

    GIAC Members Earn CPEs

Registration is Closed

Share This Event