ismg.events Open in urlscan Pro
151.101.2.159  Public Scan

URL: https://ismg.events/summit/london-2023/
Submission: On July 19 via manual from IN — Scanned from DE

Form analysis 1 forms found in the DOM

Name: New FormPOST

<form class="elementor-form" method="post" name="New Form">
  <input type="hidden" name="post_id" value="5731">
  <input type="hidden" name="form_id" value="21b9e35">
  <input type="hidden" name="referer_title" value="London Summit">
  <input type="hidden" name="queried_id" value="3936">
  <div class="elementor-form-fields-wrapper elementor-labels-above">
    <div class="elementor-field-type-email elementor-field-group elementor-column elementor-field-group-email elementor-col-100 elementor-field-required">
      <input size="1" type="email" name="form_fields[email]" id="form-field-email" class="elementor-field elementor-size-sm  elementor-field-textual" placeholder="Email" required="required" aria-required="true">
    </div>
    <div class="elementor-field-type-recaptcha_v3 elementor-field-group elementor-column elementor-field-group-field_4cf4815 elementor-col-100 recaptcha_v3-bottomright">
      <div class="elementor-field" id="form-field-field_4cf4815">
        <div class="elementor-g-recaptcha" data-sitekey="6LcLx5UlAAAAAKlm6tTcgwUwCUReiqXqnA9VF0BA" data-type="v3" data-action="Form" data-badge="bottomright" data-size="invisible">
          <div class="grecaptcha-badge" data-style="bottomright"
            style="width: 256px; height: 60px; display: block; transition: right 0.3s ease 0s; position: fixed; bottom: 14px; right: -186px; box-shadow: gray 0px 0px 5px; border-radius: 2px; overflow: hidden;">
            <div class="grecaptcha-logo"><iframe title="reCAPTCHA"
                src="https://www.google.com/recaptcha/api2/anchor?ar=1&amp;k=6LcLx5UlAAAAAKlm6tTcgwUwCUReiqXqnA9VF0BA&amp;co=aHR0cHM6Ly9pc21nLmV2ZW50czo0NDM.&amp;hl=de&amp;type=v3&amp;v=iZWPJyR27lB0cR4hL_xOX0GC&amp;size=invisible&amp;badge=bottomright&amp;sa=Form&amp;cb=ajiobjldcy6e"
                width="256" height="60" role="presentation" name="a-eri5iudwx1yg" frameborder="0" scrolling="no"
                sandbox="allow-forms allow-popups allow-same-origin allow-scripts allow-top-navigation allow-modals allow-popups-to-escape-sandbox"></iframe></div>
            <div class="grecaptcha-error"></div><textarea id="g-recaptcha-response" name="g-recaptcha-response" class="g-recaptcha-response"
              style="width: 250px; height: 40px; border: 1px solid rgb(193, 193, 193); margin: 10px 25px; padding: 0px; resize: none; display: none;"></textarea>
          </div><iframe style="display: none;"></iframe>
        </div>
      </div>
    </div>
    <div class="elementor-field-group elementor-column elementor-field-type-submit elementor-col-100 e-form__buttons">
      <button type="submit" class="elementor-button elementor-size-sm">
        <span>
          <span class=" elementor-button-icon">
          </span>
          <span class="elementor-button-text">Send</span>
        </span>
      </button>
    </div>
  </div>
</form>

Text Content

Skip to content
 * Events
   * Summits
   * Engage
   * Roundtables
   * Custom Events
   * Sponsorship
 * Faculty
 * Contact Us
 * About

Menu
 * Events
   * Summits
   * Engage
   * Roundtables
   * Custom Events
   * Sponsorship
 * Faculty
 * Contact Us
 * About


19TH SEPTEMBER 2023


LONDON CYBERSECURITY SUMMIT


9:00 AM BST - 5:00 PM BST

Register Now
View Agenda



IN PERSON SUMMIT


Overview
Topics
Agenda
Speakers
CPE Credits
Register

Overview
Topics
Agenda
Speakers
CPE Credits
Register



EVENT OVERVIEW

ISMG Summits feature carefully curated agendas delivering a Keynote Address from
an Industry Luminary, Case-Based Learning, Networking and more. The Summits are
geo-targeted, industry-specific, and topic-driven events designed for security
leaders.

ISMG’s agendas provide actionable education and exclusive
networking opportunities with your peers and our subject matter expert speakers.





VENUE


LONDON

TBA




HIGHLIGHT TOPICS

 * The Art and Science of Translating Cyber Risk and Loss Exposure Into
   Quantifiable Measures
 * Future Threat Landscape
 * Zero Trust Networks = Better Enterprise Security
 * The Current Threat Landscape
 * Critical Infrastructure Protection

Register



KEYNOTE SPEAKER


HELEN RABE, CISO, BBC

Helen is passionate about aligning security with desired business outcomes,
considerate of current state and future business strategies. As an influential
and versatile security leader, her ability to clearly communicate strategy to
all levels of the organization, including the Board, have resulted in strong and
comprehensive programs with high adoption of security behaviors across
organizations.

Helen has a proven track record of developing, executing & maturing bespoke ISMS
strategies and teams to mitigate risk, counter threats and deliver world-class
security & data privacy management solutions across varied industry sectors
ranging from financial services to media & broadcasting & life sciences.





MATT GORDON-SMITH

Former CISO, Gatwick Airport


ANDREW ROBSON

CISO, Bentley Motors


MATT BROOMHALL

CISO, Lloyds


DON GIBSON

CISO, Kinley


MILOS PESIC

CISO, ABB Accelleron


DOM LUCAS

Head of Security, British International Investment


ADAM WEDGBURY

Head of Enterprise Security Architecture, Airbus


ASH HUNT

Global CISO, APEX Group


QUENTYN TAYLOR

Director, Information Security, Canon EMEA


CAMERON BROWN

Director- Cyber Security - Risk Advisory, Deliotte


MATT GORDON-SMITH

Former CISO, Gatwick Airport


STEVE FURNELL

Professor of Cyber Security, University of Nottingham


SPEAKERS


THOUGHT LEADERS ON STAGE AND LEADING DEEP DIVE DISCUSSIONS

ISMG Summits bring the foremost thought leaders and educators in the security
space to the stage and knowledge sharing discussions. Hear what is on the minds
of leading security experts as they share insights and challenges of the
ever-evolving threat landscape.

View Faculty




AGENDA

You can now view or download a PDF version of the attendee guide.

Download Agenda



REGISTRATION & BREAKFAST

8:00 am - 9:00 am

9:00 am – 9:30 aM


LONDON SUMMIT


THE ART AND SCIENCE OF TRANSLATING CYBER RISK AND LOSS EXPOSURE INTO
QUANTIFIABLE MEASURES

Because every business is unique, so too are the risks facing each one.

Hence the answer to the question “what are the biggest cyber risks we face?”
depends on who’s asking. Regardless of the answer, however, it’s up to the
cybersecurity team to not only identify cyber risks, but help business leaders
understand the operational risks each one poses, to help them quantify the
resulting business risks each one poses and to take responsibility for what
happens next.

This expert panel discusses:

 * Creating a common risk language across the organization
 * Building a playbook that helps the business identify actual exposure
 * Strategies for making cyber everyone’s responsibility

Watch brief video on this topic

9:30 am – 10:00 aM


DON GIBSON

CISO, Kinley


HEALTH HELD TO RANSOM: PROTECTING THE HEALTH OF OUR CYBERSECURITY TEAMS

Late last year, the UK government announced its National Cyber Strategy for
2022, a comprehensive plan that aims to establish “a more secure and resilient
nation, better prepared for evolving threats and risks.But what about the
personal resilience of our security leaders and their teams? A constantly
shifting threat landscape, long work hours, a lack of resources, high staff
turnover are all factors that can lead to burnout.
How can a more secure and resilient nation be achieved if we don’t look after
our people?
 
This expert panel will share insights and strategies, including:
 
• How stress and burnout are emerging in the workplace today;
• The importance of showing vulnerability as a leader;
• Tools to build personal resilience and prevent burnout;
• How organizations can protect the wellbeing of their people.

Don Gibson, CISO, Kinley

10:00 am – 10:30 aM


MILOS PESIC

CISO, ABB Accelleron


ADAM WEDGBURY

Head of Enterprise Security Architecture, Airbus


ASH HUNT

Global CISO, APEX Group


AWARENESS AND BEHAVIOR CHANGE- IS THIS THE TRUE DRIVER OF RISK REDUCTION IN
INFORMATION SECURITY?

Running user awareness programs continues to be a cornerstone of many corporate
information security programs, often driven in part by regulatory requirements.
But can, and should, user training be relied on to better secure organizations?
Should organizations instead focus their efforts more broadly, for example, by
attempting not to train users, but to more effectively influence their behavior?
Join this session to hear three leading cybersecurity executives share their
experiences regarding:
 
• The use, abuse and limits of user training
• Working with behavioral psychologists and marketing professionals
• The role of user behavior in risk reduction

Milos Pesic, CISO, ABB Accelleron

Adam Wedgbury, Head of Enterprise Security Architecture, Airbus

Ash Hunt, Global CISO, APEX Group

10:30 am – 11:00 aM


MILOS PESIC

CISO, ABB Accelleron


THE ART AND SCIENCE OF TRANSLATING CYBER RISK AND LOSS EXPOSURE INTO
QUANTIFIABLE MEASURES

Because every business is unique, so too are the risks facing each one. Hence
the answer to the question "what are the biggest cyber risks we face?" depends
on who's asking. Regardless of the answer, however, it's up to the cybersecurity
team to not only identify cyber risks, but help business leaders understand the
operational risks each one poses, to help them quantify the resulting business
risks each one poses and to take responsibility for what happens next.
This expert panel discusses:
• Creating a common risk language across the organization
• Building a playbook that helps the business identify actual exposure
• Strategies for making cyber everyone’s responsibility


Milos Pesic, CISO, ABB Accelleron

11:00 am – 11:30 aM


LONDON SUMMIT


LONDON SUMMIT


ZERO TRUST NETWORKS = BETTER ENTERPRISE SECURITY

Finding a balance between a pleasant user experience and stringent security
requirements is challenging, but if you don't do it, users may revolt.

Adobe learned this when it was faced with the major shift toward remote and
hybrid work as a result of the COVID-19 pandemic. We had to move our more than
22,000 global employees to remote work over a single weekend, and the massive
change required network security controls that could readily adapt.

Adobe invested in Project ZEN – an internal initiative based on zero trust
principles. ZEN consists of pioneering technology and policies to make the path
to zero trust more efficient and attainable. It enabled us to take a new
approach to managing our user encounters and authentication across the company
and increase security while improving the overall user experience.

In this session, Eric Anderson will discuss the benefits of a zero trust
approach to network security, our path to Project ZEN and its benefits,
including how it helped us better navigate the work changes precipitated by the
pandemic. He will show how Adobe’s experience in building and deploying zero
trust networking can help you improve your organization’s approach to hybrid and
remote work.


To learn more about Adobe, click here to visit our booth to chat with a
representative.

Watch brief video on this topic



NETWORKING & EXHIBITION BREAK

11:30 am - 11:45 am


11:45 am – 12:30 pm


LONDON SUMMIT


THE CURRENT DATA BREACH LANDSCAPE

Rapid digital acceleration seen since the start of the pandemic has transformed
the way businesses operate as they adapt to changing consumer behaviors and
consumers' expectations of both customer experience and security.
Recent world events have increased the risk of cyberthreats and elevated the
importance of having a strategic incident response plan in place to deal with a
data breach, should it happen. TransUnion’s data breach solutions can help you
take a proactive approach to dealing with data breaches and better protect
consumers while helping to reduce financial losses. We do this by developing an
efficient and effective response strategy that can help your organization equip
customers with tools for combating identity theft, mitigate impacts to
reputation and credibility and rebuild trust. Mark Read, head of data breach
solutions for TransUnion in the U.K. and part of TransUnion’s award-winning
consumer solutions team, will share his insights into the current data breach
landscape, covering the pressing issues faced by businesses across the U.K. and
the role TransUnion’s data breach support services can play in helping
businesses to reduce the impact of a data breach.
Watch brief video on this topic



NETWORKING & EXHIBITION BREAK

11:10 am - 11:29 am et 



Track A


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE

In this dynamic keynote panel, our experts will explore the key differences
between the modern and traditional CISO.

They will take a deep dive  into the absolute must-have skills and experiences
that today’s CISOs need to succeed, in a landscape where business risk and
security decisions are more closely intertwined than ever before. You will also
gain invaluable insights into:

 * API security: If ‘API is the new endpoint,’ how do we get a handle on
   inventory, vulnerabilities and defense?
 * Third-Party Risk: What happens when your greatest vulnerabilities are through
   the doors of your most strategic service providers?
 * ChatGPT: What are the potential use cases for the defender as well as the
   adversary?

Track B


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE

In this dynamic keynote panel, our experts will explore the key differences
between the modern and traditional CISO.

They will take a deep dive  into the absolute must-have skills and experiences
that today’s CISOs need to succeed, in a landscape where business risk and
security decisions are more closely intertwined than ever before. You will also
gain invaluable insights into:

 * API security: If ‘API is the new endpoint,’ how do we get a handle on
   inventory, vulnerabilities and defense?
 * Third-Party Risk: What happens when your greatest vulnerabilities are through
   the doors of your most strategic service providers?
 * ChatGPT: What are the potential use cases for the defender as well as the
   adversary?

Track A


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE

In this dynamic keynote panel, our experts will explore the key differences
between the modern and traditional CISO.

They will take a deep dive  into the absolute must-have skills and experiences
that today’s CISOs need to succeed, in a landscape where business risk and
security decisions are more closely intertwined than ever before. You will also
gain invaluable insights into:

 * API security: If ‘API is the new endpoint,’ how do we get a handle on
   inventory, vulnerabilities and defense?
 * Third-Party Risk: What happens when your greatest vulnerabilities are through
   the doors of your most strategic service providers?
 * ChatGPT: What are the potential use cases for the defender as well as the
   adversary?

Track B


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE

In this dynamic keynote panel, our experts will explore the key differences
between the modern and traditional CISO.

They will take a deep dive  into the absolute must-have skills and experiences
that today’s CISOs need to succeed, in a landscape where business risk and
security decisions are more closely intertwined than ever before. You will also
gain invaluable insights into:

 * API security: If ‘API is the new endpoint,’ how do we get a handle on
   inventory, vulnerabilities and defense?
 * Third-Party Risk: What happens when your greatest vulnerabilities are through
   the doors of your most strategic service providers?
 * ChatGPT: What are the potential use cases for the defender as well as the
   adversary?

Track A


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE

In this dynamic keynote panel, our experts will explore the key differences
between the modern and traditional CISO.

They will take a deep dive  into the absolute must-have skills and experiences
that today’s CISOs need to succeed, in a landscape where business risk and
security decisions are more closely intertwined than ever before. You will also
gain invaluable insights into:

 * API security: If ‘API is the new endpoint,’ how do we get a handle on
   inventory, vulnerabilities and defense?
 * Third-Party Risk: What happens when your greatest vulnerabilities are through
   the doors of your most strategic service providers?
 * ChatGPT: What are the potential use cases for the defender as well as the
   adversary?

Track B


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE

In this dynamic keynote panel, our experts will explore the key differences
between the modern and traditional CISO.

They will take a deep dive  into the absolute must-have skills and experiences
that today’s CISOs need to succeed, in a landscape where business risk and
security decisions are more closely intertwined than ever before. You will also
gain invaluable insights into:

 * API security: If ‘API is the new endpoint,’ how do we get a handle on
   inventory, vulnerabilities and defense?
 * Third-Party Risk: What happens when your greatest vulnerabilities are through
   the doors of your most strategic service providers?
 * ChatGPT: What are the potential use cases for the defender as well as the
   adversary?

Track A


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE

In this dynamic keynote panel, our experts will explore the key differences
between the modern and traditional CISO.

They will take a deep dive  into the absolute must-have skills and experiences
that today’s CISOs need to succeed, in a landscape where business risk and
security decisions are more closely intertwined than ever before. You will also
gain invaluable insights into:

 * API security: If ‘API is the new endpoint,’ how do we get a handle on
   inventory, vulnerabilities and defense?
 * Third-Party Risk: What happens when your greatest vulnerabilities are through
   the doors of your most strategic service providers?
 * ChatGPT: What are the potential use cases for the defender as well as the
   adversary?

Track B


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE

In this dynamic keynote panel, our experts will explore the key differences
between the modern and traditional CISO.

They will take a deep dive  into the absolute must-have skills and experiences
that today’s CISOs need to succeed, in a landscape where business risk and
security decisions are more closely intertwined than ever before. You will also
gain invaluable insights into:

 * API security: If ‘API is the new endpoint,’ how do we get a handle on
   inventory, vulnerabilities and defense?
 * Third-Party Risk: What happens when your greatest vulnerabilities are through
   the doors of your most strategic service providers?
 * ChatGPT: What are the potential use cases for the defender as well as the
   adversary?

Track A


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE

In this dynamic keynote panel, our experts will explore the key differences
between the modern and traditional CISO.

They will take a deep dive  into the absolute must-have skills and experiences
that today’s CISOs need to succeed, in a landscape where business risk and
security decisions are more closely intertwined than ever before. You will also
gain invaluable insights into:

 * API security: If ‘API is the new endpoint,’ how do we get a handle on
   inventory, vulnerabilities and defense?
 * Third-Party Risk: What happens when your greatest vulnerabilities are through
   the doors of your most strategic service providers?
 * ChatGPT: What are the potential use cases for the defender as well as the
   adversary?

Track B


ROB KNOBLAUCH

Deputy CISO and VP Global Security Services , Scotiabank


CULTURE CHANGE: HOW TO INSTILL A MINDSET OF RESPONSIBLE DEFENSE

In this dynamic keynote panel, our experts will explore the key differences
between the modern and traditional CISO.

They will take a deep dive  into the absolute must-have skills and experiences
that today’s CISOs need to succeed, in a landscape where business risk and
security decisions are more closely intertwined than ever before. You will also
gain invaluable insights into:

 * API security: If ‘API is the new endpoint,’ how do we get a handle on
   inventory, vulnerabilities and defense?
 * Third-Party Risk: What happens when your greatest vulnerabilities are through
   the doors of your most strategic service providers?
 * ChatGPT: What are the potential use cases for the defender as well as the
   adversary?


LUNCH & EXHIBITION BREAK

12:30 pm – 1:00 pM


1:00 pm – 2:00 pM


LONDON SUMMIT


CRITICAL INFRASTRUCTURE PROTECTION: IMPROVING RESILIENCE

As part of its remit, the U.K.'s National Cyber Security Center, or NCSC,
safeguards the nation's critical infrastructure - much of which is controlled
within the private sector.

Marsha Quallo-Wright, an NCSC deputy director, is responsible for improving
critical infrastructure resilience, and in this exclusive session she discusses:

 * The state of critical infrastructure security;
 * The heightened cyberthreat resulting from Russia’s invasion of Ukraine;
 * Public/private sector partnerships that can improve critical infrastructure
   security and resilience.

Watch brief video on this topic

2:00 pm – 3:00 pM


LONDON SUMMIT


WHY WAFS ARE RUNNING ON EMPTY

Modern WAFs are powerful, but they can be complex to manage and operate.

Modern WAFs are powerful, but they can be complex to manage and operate. From
deciding on deployment architecture and requirement mapping to DEVOPs (CI/CD)
integration and finalizing the myriad of other considerations before moving to
the tuning and operationalization phase, all this creates complexity and
confusion.

As a result, modern WAFs can be costly to implement in both commercial and
staffing terms. Join Jay Coley, lead of security strategy at Fastly, as he
demonstrates how you can reduce these issues to ensure your WAF deployments are
as flexible and as simple as possible, all the while maintaining rule accuracy
and WAF usability.

Watch brief video on this topic



CLOSING COMMENTS

3:00 pm – 3:15 pM ET




DON’T MISS YOUR CHANCE TO ATTEND THIS DYNAMIC IMPACTFUL EVENT

Register

#ISMGSummit



@ISMG_News





OUR SPONSORS






SPEAKER NAME

Title, company name


SPEAKER NAME

Title, company name


SPEAKER NAME

Title, company name


SPEAKER NAME

Title, company name


SPEAKER NAME

Title, company name


SPEAKER NAME

Title, company name


SPEAKER NAME

Title, company name


SPEAKER NAME

Title, company name


SPEAKER NAME

Title, company name


SPEAKER NAME

Title, company name


SPEAKER NAME

Title, company name


SPEAKER NAME

Title, company name


SPEAKERS


THOUGHT LEADERS ON STAGE AND LEADING DEEP DIVE DISCUSSIONS

ISMG Summits bring the foremost thought leaders and educators in the security
space to the stage, interactive workshops and networking events. Learn from the
“who’s who” in Cybersecurity passionate about the latest tools and technology to
defend against threats 

View Faculty




SPEAKERS


THOUGHT LEADERS ON STAGE AND LEADING DEEP DIVE DISCUSSIONS

ISMG Summits bring the foremost thought leaders and educators in the security
space to the stage, interactive workshops and networking events. Learn from the
“who’s who” in Cybersecurity passionate about the latest tools and technology to
defend against threats 

View Faculty




THE SUMMIT EXPERIENCE

Previous
Next
Previous
Next


CPE CREDITS

Engage offers Continuing Education Credits. Learn informative and engaging
content created specifically for security professionals.


Claim Credits


REGISTER

RSVP here to attend our events. You can select for multiple or individual
tickets. 




LONDON CYBERSECURITY SUMMIT

Sep 19, 2023

RSVP

Available till Sep 19, 2023 (05:00 PM)

Add
Please enter your email to continue


I agree to the Terms and Conditions and Privacy Policy.

Proceed


Upcoming ISMG Events


AUGUST 8, 2023

The State of Cybersecurity: What 2022 Tells us about 2023 and Beyond
See Event


AUGUST 22, 2023

Building an Effective Cloud Security Strategy
See Event


AUGUST 16, 2023

The Cloud Journey: How to Gain Maturity to Grow Securely in the Cloud
See Event


SEPTEMBER 19, 2023

London Cybersecurity Summit
See Event


AUGUST 23 - 24, 2023

New Delhi Summit
See Event

Upcoming ISMG Events


AUGUST 8, 2023

The State of Cybersecurity: What 2022 Tells us about 2023 and Beyond
See Event


AUGUST 22, 2023

Building an Effective Cloud Security Strategy
See Event


AUGUST 16, 2023

The Cloud Journey: How to Gain Maturity to Grow Securely in the Cloud
See Event

ISMG Publications





EVENT

 * Summits
 * Engage
 * Roundtables
 * Custom Events

 * Summits
 * Engage
 * Roundtables
 * Custom Events


ABOUT

 * Sponsorship
 * Leadership
 * Company
 * Privacy Policy

 * Sponsorship
 * Leadership
 * Company
 * Privacy Policy




@ISMG_News #ISMGEngage




SUBSCRIBE TO STAY UPDATED WITH OUR EVENTS

Send