ismg.events Open in urlscan Pro
151.101.2.159  Public Scan

URL: https://ismg.events/summit/fraud-security-risk-newyork-2024/
Submission: On April 23 via manual from US — Scanned from DE

Form analysis 1 forms found in the DOM

Name: New FormPOST

<form class="elementor-form" method="post" name="New Form">
  <input type="hidden" name="post_id" value="5731">
  <input type="hidden" name="form_id" value="21b9e35">
  <input type="hidden" name="referer_title" value="Fraud, Security &amp; Risk Management Summit: New York">
  <input type="hidden" name="queried_id" value="14878">
  <div class="elementor-form-fields-wrapper elementor-labels-above">
    <div class="elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-100 elementor-field-required">
      <input size="1" type="email" name="form_fields[email]" id="form-field-email" class="elementor-field elementor-size-sm  elementor-field-textual" placeholder="Email" required="required" aria-required="true">
    </div>
    <div class="elementor-field-type-recaptcha_v3 elementor-field-group elementor-column elementor-field-group-field_4cf4815 elementor-col-100 recaptcha_v3-bottomright">
      <div class="elementor-field" id="form-field-field_4cf4815">
        <div class="elementor-g-recaptcha" data-sitekey="6LcLx5UlAAAAAKlm6tTcgwUwCUReiqXqnA9VF0BA" data-type="v3" data-action="Form" data-badge="bottomright" data-size="invisible">
          <div class="grecaptcha-badge" data-style="bottomright"
            style="width: 256px; height: 60px; display: block; transition: right 0.3s ease 0s; position: fixed; bottom: 14px; right: -186px; box-shadow: gray 0px 0px 5px; border-radius: 2px; overflow: hidden;">
            <div class="grecaptcha-logo"><iframe title="reCAPTCHA" width="256" height="60" role="presentation" name="a-bydv9wi9hh3e" frameborder="0" scrolling="no"
                sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox allow-storage-access-by-user-activation"
                src="https://www.google.com/recaptcha/api2/anchor?ar=1&amp;k=6LcLx5UlAAAAAKlm6tTcgwUwCUReiqXqnA9VF0BA&amp;co=aHR0cHM6Ly9pc21nLmV2ZW50czo0NDM.&amp;hl=de&amp;type=v3&amp;v=QoukH5jSO3sKFzVEA7Vc8VgC&amp;size=invisible&amp;badge=bottomright&amp;sa=Form&amp;cb=jlrux6pwwu72"></iframe>
            </div>
            <div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
              style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
          </div><iframe style="display: none;"></iframe>
        </div>
      </div>
    </div>
    <div class="elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons">
      <button type="submit" class="elementor-button elementor-size-sm">
        <span>
          <span class=" elementor-button-icon">
          </span>
          <span class="elementor-button-text">Send</span>
        </span>
      </button>
    </div>
  </div>
</form>

Text Content

Skip to content
 * Events
   * Summits
   * Roundtables
   * Custom Events
   * Sponsorship
 * Faculty
 * Contact Us
 * About

Menu
 * Events
   * Summits
   * Roundtables
   * Custom Events
   * Sponsorship
 * Faculty
 * Contact Us
 * About


APRIL 25TH, 2024


FRAUD, SECURITY & RISK MANAGEMENT SUMMIT: NEW YORK

Register Now
Overview
Topics
Agenda
Speakers
CPE Credits
Register

Overview
Topics
Agenda
Speakers
CPE Credits
Register


EVENT OVERVIEW

The ISMG Fraud, Security & Risk Management Summit dedicates a full day to
advancing cybersecurity education among leaders and delivering enlightening
sessions that encompass a diverse range of essential subjects.
Among the highlights will be a comprehensive exploration of incident response
strategies during the hands-on and engaging “solution room” exercise. This
activity tests the abilities of CISOs and cybersecurity leaders as they devise
response strategies for a worldwide cybersecurity incident.
Join us for an in-depth look at pressing topics such as the technical landscape
of AI, budget management, the shifting culture in cybersecurity, and more. As
cybersecurity leaders strive to maintain equilibrium in a rapidly evolving
landscape, the summit offers guidance on finding balance in times of change,
reinforcing the notion that a steady hand at the helm is vital in safeguarding
digital landscapes.

View our ISMG Event Experience video to see what your peers are saying about
their participation. 

Download Summit Brochure




VENUE


ETC MADISON AVE

360 Madison Ave, New York, NY 10017


HIGHLIGHT TOPICS

 * Data Science’s Role in Cyber Threat Forecasting
 * Proactive Security Posture
 * Adapting to Enhanced SEC Scrutiny
 * Third-Party Risk Management

        And much more!

Register


ADVISORS


THOUGHT LEADERS LEADING DEEP-DIVE DISCUSSIONS ON STAGE

ISMG Summits bring the foremost thought leaders and educators in the security
space on stage, at interactive workshops and networking events. Learn from the
who’s who in the cybersecurity industry, passionate about the latest tools and
technology to defend against threats.




MURLI NAMBIAR

CISO, SBI


ATANU ROY

Group CIO, Biocon Group


SACHIN SETH

CEO and MD, BSE Ebix Insurance Broking (BSE Ebix)



JOHN FRUSHOUR

Vice President and Chief Information Security Officer, New York-Presbyterian
Hospital


CLAIRE LE GAL

SVP, Fraud Intelligence, Strategy & Cyber Products, Mastercard


MICHAEL GIOIA

CISO, Babson College



KAREN BOYER

SVP Financial Crimes, M&T Bank


FRED HARRIS

Global Head of Risk & Compliance for Enterprise Technology & Operations, Citi


BRENNAN LODGE

Head of Analytic Engines Cybersecurity, HSBC



JAGATHI GADE

Global Head of Risk Engineering, Square


DAVID ANDERSON

Vice President of Cyber, Woodruff Sawyer


ANDRES ANDREU

Deputy CISO, Hearst


KEVIN COOKE

Senior Special Agent, United States Secret Service


LAURA DEANER

CISO, Northwestern Mutual


UMESH YERRAM

Global CISO, Cboe Global Markets


CHRIS HOLDEN

CISO, Crum & Forster


BRENNAN LODGE

Professor, Information Technology & Data Analytics, New York University


LA MONTE YARBOROUGH

CISO, Acting Deputy CIO, HHS


WALKER NEWELL

Vice President, Securities Litigation and Enforcement, Woodruff Sawyer


FRED HARRIS

Global Head of Risk & Compliance for Enterprise Technology & Operations, Citi


DAVID SHEIDLOWER

Vice President, Chief Information Security & Privacy Officer, Turner
Construction Company


SPEAKERS


THOUGHT LEADERS LEADING DEEP-DIVE DISCUSSIONS ON STAGE

ISMG Summits bring the foremost thought leaders and educators in the security
space to the stage, interactive workshops and networking events. Learn from the
“who’s who” in cybersecurity passionate about the latest tools and technology to
defend against threats 

View Faculty




AGENDA

You can now view or download a PDF version of the attendee guide.

Download Agenda



REGISTRATION & BREAKFAST

8:00 am et - 8:30 am et 

8:30 am – 9:00 aM ET


LA MONTE YARBOROUGH

CISO, Acting Deputy CIO, HHS


LAURA DEANER

CISO, Northwestern Mutual


PRESTON MILLER

Director, Unit 42 by Palo Alto Networks


THREAT INTELLIGENCE: PROACTIVE SECURITY POSTURE AGAINST EVOLVING ADVERSARIES

An interconnected and automated world creates new opportunities for security
practitioners and fraudsters alike.

To effectively mitigate and respond to attacks, organizations must understand
the latest capabilities and threats being deployed by their adversaries.

This session will equip CISOs with the latest analysis on the global threat
landscape, the ways in which bad actors are leveraging emerging technologies to
exploit traditional weaknesses, and bold strategies for combatting new and
evolving threats.

Key takeaways will include:

 * Integrating new threat intelligence protectively into a robust risk
   management framework.
 * Analyzing the rise in zero-day attacks and the blind spots they exploit.
 * Understanding how AI/ML capabilities are being leveraged by adversaries for
   future attacks and how they can be leveraged to neutralize them.
 * Considering the role of behavioral analytics in enhancing threat detection
   capabilities.



La Monte Yarborough, CISO, Acting Deputy CIO, HHS

Laura Deaner, CISO, Northwestern Mutual

Preston Miller, Director, Unit 42 by Palo Alto Networks

9:00 am – 9:30 aM ET


CHRIS WYSOPAL

CTO & Co-Founder, Veracode


THE CROSSROADS OF AI AND APPLICATION SECURITY

The potential of artificial intelligence is vast, with many industries already
harnessing its capabilities. In application security, AI has made some
significant improvements - including finding flaws faster, suggesting fixes, and
the ability to rewrite code - and more are likely to come

Although, as with any new technology, it brings its own risks, including
incorrect code suggestions and more intelligent malware attacks. Join this
session to explore how to harness AI tools to work for you while ensuring your
organization stays secure.



Chris Wysopal, CTO & Co-Founder, Veracode

9:30 am – 10:00 AM ET


PETER TSE

Information Security Officer, CTBC Bank


BORIS KLYUCHNIKOV

Special Agent, FBI


PAYMENT FRAUD: NAVIGATING THE COMPLEXITIES OF MODERN THREATS

Across industries, the payment ecosystem faces unprecedented challenges from
increasingly sophisticated fraudsters.
This session provides a comprehensive exploration of the evolving landscape of
payment fraud, shedding light on the latest threats, detection strategies, and
proactive measures to safeguard financial transactions.
 
Join us as we delve into the cutting-edge of payment fraud prevention, examining
rising threats such as account takeovers and synthetic identity fraud. Our
expert panel will explore critical topics including authentication techniques,
data security practices, and adherence to regulatory standards, while also
addressing the growing risks associated with social engineering and the specific
challenges faced in securing mobile payments.
 
Attendees will gain a comprehensive understanding of the latest trends,
vulnerabilities and strategies essential for effectively combating payment fraud
as well as:
 
 * The evolving face of payment fraud: Unpacking new trends and their industry
   impact
 * Uncovering weaknesses in digital payments: Lessons from real-world exploits
 * Harnessing AI for fraud prevention: The transformative role of machine
   learning
 * Mastering the maze of international fraud: Tackling cross-border payment
   challenges

Peter Tse, Information Security Officer, CTBC Bank

Boris Klyuchnikov, Special Agent, FBI

10:00 am – 10:30 AM ET


DAVE JOHNSON

Principal Solutions Architect, Expel


WHERE RISK MEETS CYBERSECURITY: A CRITICAL CONNECTION POINT

Many organizations look at risk as pillars – legal, fraud, regulatory and
cybersecurity. But these pillars can't be separate columns that shoulder the
load. They must be interconnected. This session looks at the ways risk and
security must align and integrate to avoid gaps for a more resilient
organization.



Dave Johnson, Principal Solutions Architect, Expel

10:30 am – 10:45 AM ET


SHASHANK GOLLA

Product Marketing Manager, Wiz


CLOUD SECURITY MATURITY AND THE NEED FOR PROACTIVE AND REACTIVE APPROACHES

Enterprises of all sizes are moving to the cloud or expanding their footprint,
and cloud environments are becoming more complex. Security leaders are
constantly trying to improve their overall security posture. Some primarily
focus on reducing risk, and others maintain a detection-first mindset.

So, what is the right approach?

The answer is both. But which approach should be the focus today depends on the
enterprise’s security maturity.

In this session, we will discuss:

 * What cloud security maturity is and the path to achieving it;
 * Creating an effective security backstop with cloud detection and response;
 * How reactive security should be an enabler for proactive security.

Shashank Golla, Product Marketing Manager, Wiz


NETWORKING & EXHIBITION BREAK

10:45 am et - 11:15 am et 


11:15 am – 11:25 am ET


MATANDA DOSS

Executive Director - Cybersecurity and Technology Controls, JP Morgan


MICHAEL DENICOLA

Supervisory Special Agent, Cyber Division, FBI


KAREN BOYER

SVP Financial Crimes, M&T Bank


CLAIRE LE GAL

SVP, Fraud Intelligence, Strategy & Cyber Products, Mastercard


STEPHEN JOHNSON

VP of Solutions Engineering, Entro Security


SECURE THE NON-HUMAN IDENTITY NIGHTMARE

Organizations large and small grapple with the challenge of the overgrowing
number of machine application identities as their cloud-native stack expands.

R&D teams create and scatter secrets across vaults, code, collaboration
solutions and more without any oversight or control by security teams.
Secret-based breaches are among the top three attack vectors, and they are the
most destructive.

What solution is needed to enable organizations to securely utilize non-human
identities and secrets? How can you detect, safeguard, and provide context for
secrets stored across vaults, source code, collaboration tools, cloud
environments, and SaaS platforms?

Introducing Entro – the complete platform for non-human identity & Secrets
management. With Entro, Security teams can finally efficiently oversee and
protect non-human identities with automated lifecycle processes and seamless
integration, ensuring comprehensive security and compliance through a unified
interface. 

Stephen Johnson, VP of Solutions Engineering, Entro Security

11:25 am – 11:55 am ET


PAUL KURTZ

Field CTO, Splunk


WALKER NEWELL

Vice President, Securities Litigation and Enforcement, Woodruff Sawyer


DAVID ANDERSON

Vice President of Cyber, Woodruff Sawyer


SEAN MACK

Former CISO, Wiley; ISMG Contributor


ADAPTING TO ENHANCED SEC SCRUTINY: STRATEGIES FOR CISOS POST-SOLARWINDS

In recent years, the Securities and Exchange Commission (SEC) has sued multiple
public companies for supposedly lax disclosures around cybersecurity incidents —
even when there was no evidence of bad intent or even negligence.
This year, the SEC significantly ratcheted up the pressure on public companies –
and CISOs. In July, the SEC adopted new rules giving the government more avenues
to second-guess good-faith cybersecurity disclosure decisions. Then, in
November, the SEC sued SolarWinds and its CISO for fraud, marking the start of a
new era in cybersecurity enforcement.
 
In this discussion, our esteemed panel will provide an inside perspective on SEC
risk – and mitigation – for CISOs and other security professionals in the wake
of SolarWinds ruling, including:
 * How the SEC approached cybersecurity cases before SolarWinds ruling, and the
   new rules 
 * How SolarWinds ruling and the new rules are likely to influence future SEC
   enforcement activities
 * Lessons for CISOs from the SolarWinds ruling
 * How CISOs can navigate an enhanced role in the disclosure process
 * Key indemnification and insurance considerations

Paul Kurtz, Chief Cybersecurity Advisor & Field CTO, Splunk

Walker Newell, Vice President, Securities Litigation and Enforcement, Woodruff
Sawyer

David Anderson, Vice President of Cyber, Woodruff Sawyer

Sean Mack, Former CISO, Wiley; ISMG Contributor

11:55 am – 12:25 pM ET


ROBERT O'LEARY

CFCE, Senior Solutions Architect, Binalyze


PROACTIVE THREAT HUNTING FOR ENTERPRISE ORGANIZATIONS

In this session, we'll explore the world of threat hunting and its role in
fortifying security operations centers and incident response teams.

Learn the latest methodologies, tools and best practices that SOC analysts and
incident responders use to detect and neutralize emerging cyberthreats. Through
real-world examples, you will learn how to leverage threat intelligence, conduct
network and endpoint analysis, apply machine learning algorithms, and foster a
collaborative security culture.



Robert O’Leary, CFCE, Senior Solutions Architect, Binalyze

12:25 pm – 12:55 pM ET


THERESA LANOWITZ

Head Evangelism and Research, AT&T Cybersecurity


BREAKING DOWN SILOS TOWARD A SECURE FUTURE

Edge computing is a collaborative endeavor that requires organizations to break
down silos and foster a healthy working relationship among all stakeholders.
Based on new research, Theresa Lanowitz explains how these new relationships
drive innovation focused on business requirements, increase resilience, and
improve security.
 
She will share the business drivers for edge use cases and explain how
organizations are shifting budgets to support and secure these initiatives.


Theresa Lanowitz, Head Evangelism and Research, AT&T Cybersecurity


LUNCH & EXHIBITION BREAK

12:55 pm – 1:40 pM ET


1:40 pm – 2:10 pM ET


FRED HARRIS

Global Head of Risk & Compliance for Enterprise Technology & Operations, Citi


DAVID ANDERSON

Vice President of Cyber, Woodruff Sawyer


CHRIS HOLDEN

VP, CISO, Crum & Forster


JASON POPE

VP, Sales Engineering, Rubrik


THIRD-PARTY RISK MANAGEMENT: A CRITICAL COMPONENT IN THE CYBERSECURITY FRAMEWORK

In an era where cyber teams in every industry increasingly depend on third-party
services, ranging from customer support to cloud-based solutions and fintech
innovations, it's imperative for CISOs to recalibrate their strategies for
managing third-party risks.

CISOs must recognize that third-party risk management is not just an add-on to
the cybersecurity agenda but a central piece of the overall strategy to
safeguard their organizations in the digital landscape.

This discussion delves into:

 * The significance of implementing a solid vendor risk management framework and
   the potential consequences of oversight failures.
 * Tactical approaches for managing vendors that present a higher level of risk.
 * The utilization of metrics and external notifications to monitor and mitigate
   third-party risks effectively.

Fred Harris, Global Head of Risk & Compliance for Enterprise Technology &

Operations, Citi

David Anderson, Vice President of Cyber, Woodruff Sawyer

Chris Holden, VP, CISO, Crum & Forster

Jason Pope, VP, Sales Engineering, Rubrik

2:10 pm – 2:20 pM ET


CHRISTOPHER HILLS

Chief Security Strategist, BeyondTrust


IDENTITY DEFENSE IN FINANCE: CONFRONTING THE EMERGING THREAT LANDSCAPE

In this session, we will explore the challenges IT and cybersecurity leaders
face to effectively navigate identity security risks within intricate and
ever-changing environments.

The discussion will touch upon key issues such as third-party vendor access,
privilege elevation, vulnerability awareness, and how an identity-first security
approach leads to zero trust and lower cyber insurance premiums.

Attendees will learn about market trends, emerging threats and risk mitigation
strategies related to identity privilege. Join us for valuable insight into the
future of identity security.

Christopher Hills, Chief Security Strategist, BeyondTrust

 

2:20 pm – 3:15 pM ET


FRED HARRIS

Global Head of Risk & Compliance for Enterprise Technology & Operations, Citi


DAVID ANDERSON

Vice President of Cyber, Woodruff Sawyer


CHRIS HOLDEN

CISO, Crum & Forster


KEVIN COOKE

Senior Special Agent, United States Secret Service


DEEPFAKES, REAL STAKES: UNMASKING CYBER DECEPTION IN A HIGH-STAKES INTERACTIVE
TABLETOP SIMULATION

Join us for this collaborative tabletop exercise, hosted jointly by the United
States Secret Service and CyberEdBoard.

This interactive session is meticulously crafted to mimic a sophisticated
cyberattack. It aims to bolster strategic response capabilities and enhance
operational readiness against the backdrop of advanced cyberthreats. The focal
point of this exercise is a strategically crafted deepfake incident targeting a
corporate executive, weaving together elements of social engineering, financial
fraud, and the challenges posed by emerging technological threats.

What you will gain from this experience:

 * Enhanced Organizational Readiness: To critically assess and improve
   organizational preparedness in response to intricate cyber incidents
   involving deepfake technology and social engineering.
 * Interagency Collaboration and Knowledge Exchange: To strengthen the
   partnership and information sharing between the Secret Service and leaders in
   the private sector cybersecurity community.
 * Strategic Response Development: To create all-encompassing incident response
   strategies that cover legal, technical and communicational facets, while also
   identifying and rectifying weaknesses in existing cybersecurity policies and
   governance.

Kevin Cooke, Senior Special Agent, United States Secret Service

Boris Klyuchnikov, Special Agent, FBI

Chris Holden, CISO, Crum & Forster

Fred Harris, Global Head of Risk & Compliance for Enterprise Technology &
Operations,

Citi

Peter Tse, Information Security Officer, CTBC Bank 

David Anderson, Vice President of Cyber, Woodruff Sawyer

Walker Newell, Vice President, Securities Litigation and Enforcement, Woodruff
Sawyer

Sean Mack, Former CISO, Wiley; ISMG Contributor


NETWORKING & EXHIBITION BREAK

3:15 pm – 3:40 pM ET


3:40 pm – 4:10 pM ET


FRED HARRIS

Global Head of Risk & Compliance for Enterprise Technology & Operations, Citi


DAVID SHEIDLOWER

Vice President, Chief Information Security & Privacy Officer, Turner
Construction Company


JAGATHI GADE

Global Head of Risk Engineering, Square


ENHANCING COLLABORATIVE RISK MANAGEMENT: UNIFYING THE APPROACH TO FRAUD, CYBER
AND TECH RISKS

In this session, we spotlight the critical synergies between various risk
functions, emphasizing the interconnectedness of fraud, cyber, and technology
risks.

The panel will focus on the importance of establishing a common language across
different risk domains and explore how fostering interdisciplinary communication
and understanding is crucial for timely and effective response to threats,
aligning different departments under a unified risk management objective.
In this discussion, our esteemed panel will:

 * Examine the collaborative frameworks that enable CISOs and IT teams to
   seamlessly integrate security measures with everyday IT operations.
 * Highlight success stories that showcase the benefits of these partnerships,
   emphasizing efficient risk mitigation and the development of a robust
   cybersecurity culture.
 * Offer insights on how to establish a shared language for risk communication,
   the formation of interdisciplinary teams, and the importance of vigilant
   monitoring and rapid response systems.
 * Discuss the critical role of CISOs in championing security investments and
   the necessity of executive support to foster an organizational environment
   that prioritizes cybersecurity awareness.

Fred Harris, Global Head of Risk & Compliance for Enterprise Technology &

Operations, Citi

David Sheidlower, Vice President, Chief Information Security & Privacy Officer,
Turner

Construction Company

Jagathi Gade, Global Head of Risk Engineering, Square

4:10 pm – 4:40 pM ET


BRENNAN LODGE

Professor, Information Technology & Data Analytics, New York University


UMESH YERRAM

Global CISO, Cboe Global Markets


ANDRES ANDREU

Deputy CISO, Hearst


INTELLIGENCE AMPLIFIED: DATA SCIENCE'S ROLE IN CYBERTHREAT FORECASTING

Data science has ascended beyond the role of a mere tool; it has become a
pivotal force in reshaping how organizations confront and adapt to threats.
Its role in analyzing past incidents and identifying future vulnerabilities is
essential across organizational silos and industries.
 
In this exclusive session, our panel will take a deep dive into the dual
significance of leveraging data science to not only fortify security posture but
also to proactively enhance organizational readiness. Key areas of discussion
will include:
 
 * Predictive Analytics for Security Posture: Unveiling effective methods to
   harness predictive analytics and thoroughly assess existing security posture.
 * Data Science in Threat Intelligence: Delving into how data science can
   process vast amounts of cyberthreat intelligence to predict and prevent
   attacks.
 * Machine Learning Algorithms for Pattern Recognition: An in-depth examination
   of how machine learning algorithms can assimilate knowledge from past
   security incidents to identify patterns and prevent future breaches.
 * Collaborative Data Initiatives: An exploration of the significance of data
   sharing across organizational boundaries, emphasizing the collective strength
   derived from collaborative defense efforts.
 * Role of Education in Cybersecurity: Shining a light on the indispensable role
   of education in building, upskilling and retaining adaptive, vigilant teams.

Brennan Lodge, Professor, Information Technology & Data Analytics, New York
University

Umesh Yerram, Global CISO, Cboe Global Markets

Andres Andreu, Deputy CISO, Hearst


CLOSING COMMENTS

4:40 PM - 4:45 pm ET




DON’T MISS YOUR CHANCE TO ATTEND THIS DYNAMIC IMPACTFUL EVENT

#ISMGSummit



@ISMG_News





SPONSORS








THE SUMMIT EXPERIENCE

Previous
Next
Previous
Next


CPE CREDITS

Our summits offer Continuing Education Credits. Learn informative and engaging
content created specifically for security professionals.


Claim Credits


REGISTER

RSVP here to attend our events. You can select for multiple or individual
tickets.

NOTE:  All requests to attend will be reviewed by event staff and approved based
on professional qualifications and event capacity.






2024 FRAUD, SECURITY, AND RISK SUMMIT: NEW YORK

Apr 25, 2024

RSVP

Available till Apr 25, 2024 (11:00 PM)

Add
Please enter your email to continue


I agree to the Terms and Conditions and Privacy Policy.

Proceed


Upcoming ISMG Events


APRIL 10, 2024

Strategies and Mandates for Phishing-Resistant MFA in Financial Services and
Healthcare
See Event


APRIL 24, 2024

Securing OT/IoT in the Age of Automation and Cloud Integration
See Event


MAY 15, 2024

Prevent, Contain, Minimise the Impact of Cyberattacks to Ensure your
Organization's Resilience
See Event


APRIL 16, 2024

Cybersecurity Implications of AI Summit: North America West Summit
See Event


JUNE 13, 2024

Cybersecurity & Business Transformation Summit: Bengaluru
See Event

Upcoming ISMG Events


MAY 15, 2024

Prevent, Contain, Minimise the Impact of Cyberattacks to Ensure your
Organization's Resilience
See Event


APRIL 16, 2024

Cybersecurity Implications of AI Summit: North America West Summit
See Event


APRIL 24, 2024

Securing OT/IoT in the Age of Automation and Cloud Integration
See Event


EVENT

 * Summits
 * Engage
 * Roundtables
 * Custom Events

 * Summits
 * Engage
 * Roundtables
 * Custom Events


ABOUT

 * Sponsorship
 * Leadership
 * Company
 * Privacy Policy

 * Sponsorship
 * Leadership
 * Company
 * Privacy Policy



@ISMG_News #ISMGEngage




SUBSCRIBE TO STAY UPDATED WITH OUR EVENTS

Send