Join us for this roundtable discussion with CSO's Contributing Editor, Bob Bragdon, along with Kurt Roemer, Chief Security Strategist at Citrix, as we collectively share experiences and leading practices for addressing these challenges across your organization
We'll discuss how while businesses are still trying to map-out what
their new work models will look like, they face significant technological
hurdles in delivering secured work environments.
Those challenges are complicated by what is likely to be a workforce operating in a myriad of diverse environments, with many transiting from office to home to travel. However you decide to structure the new workplace, your workforce will continue to demand greater consistency in the delivery of their digital workspaces - regardless of how, or from where they are accessing them. To meet escalating productivity demands, while at the same time defending your organization's digital assets, many are turning to SASE delivery models and a Zero Trust approach to security.
Hosted by CSO
Develop a resilient data and analytics strategy for an AI-ready, data-centric organization
Faced with a constantly evolving business landscape and unprecedented
levels of uncertainty, it's more vital than ever that data and analytics
leaders such as the chief data officer and chief analytics officer (CDO
and CAO) forge new paths to enable a data-and-analytics-centric culture
within their organizations.
Data and analytics leaders must be able to tie data and analytics strategy to business outcomes and promote the adoption of technologies, such as artificial intelligence (AI), while creating a resilient culture that accelerates change, and where data literacy, digital trust, governance and data-driven critical thinking are pervasive.
The virtual Gartner Data & Analytics Summit, May 4 - 6, 2021, offers content for every member of your data and analytics team - from technical- to senior-level strategy. Join data and analytics leaders to gain the skills to build and execute a world-class strategy.
Hosted by Gartner
Join CIO contributing editor Charles Pelton and subject-matter experts from our roundtable sponsor, IBM, for a private, interactive, virtual roundtable.
As the pace of change in business accelerates, IT operations are becoming
more complex. Operations teams simultaneously must operate within complex
technical environments; manage expansion-and location-of heterogeneous
data, and navigate security risks. That's why so many enterprises now look
to artificial intelligence to drive value with a more automated approach
to IT operations. The key is to build a flexible DevSecOps culture that's
delivered through ChatOps, social coding, and an AI-driven approach to
IT operations that spans modern hybrid cloud landscapes.
Hosted by CIO
The perils of security breaches are widely publicized, but do you know exactly how an attack or breach would affect your business?
At this Dark Reading webinar, learn about the costs associated with today's threats and data breaches, how to measure current threats, and how to quantify the risks to your organization, so that you can implement the tools and processes to prioritize costs and defense strategies specifically for your environment.
Attend this webinar and you'll learn to:
- Conduct more useful, effective threat and vulnerability analyses
- Better communicate with business leaders about security risks in terms everyone can understand
- Find it easier to prioritize your responses to vulnerabilities, alerts, and incidents
Hosted by DARKReading and Qualys
FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks.
Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations.
Cybersecurity is no longer just an IT problem
Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world's security leaders and gain other pressing topics of interest to the information security community.
The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world's security leaders.
Hosted by FutureCon
Your weekly 30-minute high-value insights intake
Wednesday, May 5th at 12 pm ET, the CIONET Spotlight will feature.
Michael W Smith, Chief Information Officer at The Estee Lauder Companies
Inc., who will share his insights on how he navigated The Estee Lauder
Company's technology strategy and information security through the
turbulent times of COVID-19 pandemic.
In the first series of the CIONET Spotlight, we take on the cue from the COVID-19 pandemic and the unparalleled challenges the world is going through to look back at the lessons learned and forward to the new opportunities and priorities.
Hosted by CIONET
Courageous Leadership and Fearless Reinvention: Securing the Modern Enterprise in Dynamic Times
Engage with world-class technology leaders, openly sharing business-technology strategies and innovation, reshaping the customer experience. Hear from industry leaders thinking differently, demonstrating courageous leadership and fearless reinvention. These top-tier executives will offer stories of successes and share advice on leaning in and leading into the C-suite and line of business, driving disruption and innovations that reshape and reinvent their go-to-market, while fostering a culture of trust and compassionate guidance for their teams within a safe and secure enterprise.
Hosted by HMG Strategy
You can learn how to identify and stop these attacks before they wreak havoc on your network
Cyber-criminals have become thoughtful about ransomware attacks; taking time to maximize your organization's potential damage and their payoff. Protecting your network from this growing threat is more important than ever. And nobody knows this more than Roger Grimes, Data-Driven Defense Evangelist at KnowBe4.
With 30+ years experience as a computer security consultant, instructor, and award-winning author, Roger has dedicated his life to making sure you're prepared to defend against quickly-evolving IT security threats like ransomware.
Join Roger for this thought-provoking webinar to learn what you can do to prevent, detect, and mitigate ransomware.
Hosted by TechTalk Summits
Join CIO contributing editor Charles Pelton, and John Owens, a subject matter expert from our roundtable sponsor, Axway, along with your IT your peers, as we discuss how APIs can extend the reach of an enterprise to customers and partners.
During this virtual event we'll discuss how the key to any API strategy
is creating business value. There's no point in building APIs unless they
are used and reused to link systems and employees - and extend the reach
of your organization to partners and customers. We'll examine portals,
catalogs, and marketplaces that can help organizations monetize their
use of APIs, create new digital offerings, and reach new markets. We'll
examine the future of APIs from the perspective of the many industries
and sectors represented by roundtable participants.
Hosted by CIO and Axway
Network with IT executives and learn how to deliver secure application environments to all employees, regardless of location or device, as the workplace model continues to evolve
We'll discuss how while businesses are still trying to map-out what their new work models will look like, they face significant technological hurdles in delivering secured work environments. Those challenges are complicated by what is likely to be a workforce operating in a myriad of diverse environments, with many transiting from office to home to travel. However you decide to structure the new workplace, your workforce will continue to demand greater consistency in the delivery of their digital workspaces - regardless of how, or from where they are accessing them. To meet escalating productivity demands, while at the same time defending your organization's digital assets, many are turning to SASE delivery models and a Zero Trust approach to security.
Join us for this roundtable discussion with CSO's Contributing Editor, Bob Bragdon, along with Kurt Roemer, Chief Security Strategist at Citrix, as we collectively share experiences and leading practices for addressing these challenges across your organization.
Hosted by CSO and Citrix
Get the latest insights on privileged access management, IT security and privacy virtually at Gartner Identity & Access Management Summit 2021, Americas.
The COVID-19 pandemic greatly accelerated identity and access management (IAM) trends that were already underway. Every organization is now laser-focused on the drive to digital transformation and the need to adapt to rapid technology, organization and social changes. The crisis has raised the visibility of IAM and has highlighted the challenges ahead for IAM leaders
In this sustained period of disruption, IAM sits at the cornerstone of the effort to make businesses secure, agile and resilient.
Hosted by Gartner
Strategies for An Evolving Business Climate
Recent business disruptions left CIOs and IT executives with an unexpected stress-test of their technology infrastructure. Some struggled to adapt while others reaped the rewards of their disaster recovery planning. These lessons empowered IT organizations to build more resilient platforms for customer and employee needs. What foundational strategies are they using? How are they deploying as-a-service IT infrastructure models to improve performance, automation, and security? And what opportunities are they finding to streamline operations with IT automation?
Hosted by CIO
Join CIO contributing editor Charles Pelton and subject-matter experts from our roundtable sponsor, HPE, for a private, interactive, virtual roundtable.
The core of any organization's successful business transformation is the ability to turn data into insights. But the challenge is how to manage and analyze all data within a business whether data comes from or resides in the data center; a co-location; the edge; or the public, hybrid, or private cloud. An effective anywhere-anytime data strategy also means extracting value from data that resides on any-or a mix-of database platforms. The goals are important: real-time information for effective customer communication, operations, and an understanding of your competitive landscape.
Hosted by CIO and HPE
As data centers incorporate new technologies and complexity grows, traditional network operations (NetOps) methods have difficulty keeping pace. What's needed is a new approach that makes intelligent decisions and offloads chores from the staff
Hear experts discuss an innovative approach to NetOps that delivers agility and automation at scale for data center fabric design, deployment, and operations
Walk away with an understanding of the benefits of automation technologies in streamlining availability and performance monitoring, event correlation and analysis, and service management
Learn the benefits of embracing a webscale management approach that enables frequent, incremental, and automated changes
Explore the possibilities when using a robust development environment for network applications that support a wide array of technologies and services
Hosted by NetworkComputing
The highly anticipated results of the annual State of the Data Center survey have arrived and will be presented at this online event!
Each year, Data Center World and AFCOM publish the highly anticipated results of the annual State of the Data Center survey to offer the industry a revealing perspective about trends and transformations that impact data center professionals and their businesses. The report provides valuable guidance on technology advancements, workforce trends, design and management challenges, and energy efficiency best practices to help data center managers make smarter decisions about their enterprise strategies.
This year's report, the results of which will be unveiled during a virtual event on May 13, includes a new focus on talent and workforce challenges and best practices, as well as an increased emphasis on the impact of automation on data center management. The report will also provide a full year's update on the changes brought about by the rapid shift to working from home, and the resulting security concerns for the data center.
Hosted by Data Center World
Join us as we honor technology leaders in South Florida
For over 20 years, the CIO ORBIE Awards have recognized technology executives for leadership, innovation and excellence in this rapidly growing, CIO-led national professional association.
The Miami CIO of the Year ORBIE Awards will honor chief information officers who have demonstrated excellence in technology leadership. CIOs are typically recognized in multiple categories, based on the size and scope of their organization and responsibilities.
Hosted by MiamiCIO
Do you know the importance of monitoring the dark web for potential
threats related to your third party vendors? If your vendor risk program
isn't incorporating dark web data, then you are missing out on potential
Online crimes make it hard for companies to know what threats are targeted towards their organizations, what breaches are being exposed, and ultimately what is happening underground.
To uncover all the threats you and your vendors face, you need to proactively incorporate dark web data into your vendor risk profile.
Hosted by Recorded Future
Join CIO contributing editor Lane Cooper and subject-matter experts from our roundtable sponsors, HPE and VMware, for a private, interactive, virtual roundtable.
According to analysts at IDC, virtualized infrastructures are proving to be the critical on-ramp and foundation for cloud computing, whether public or private. While containers have emerged as a disruptive technology, there is a growing consensus in the industry that long-term success will require effective integration with virtual machines and cloud system software to provide the technological glue that connects developers and infrastructure admins who are pursuing DevOps methodologies.
Hosted by CIO, HPE, VMware
Join your peers to discuss the most critical issues impacting CISOs today
Come together with your peers virtually to tackle top business challenges
through peer-driven content and discussions at the Florida CISO Virtual
We are currently working with C-level leaders in your community to build the most timely and relevant agenda. All of our sessions, topics and discussions are driven by CISOs, for CISOs to ensure the most valuable experience.
Hosted by Evanta, a Gartner Company
Strategies for reducing risk to the enterprise.
In today's highly regulatory environment it is essential that you have a clear understanding of risk across the enterprise. A risk management framework can bring visibility to key business and compliance risks and enable a company to make decisions on where to prioritize its limited resources. It is through a risk management framework that real value to the business can be achieved.
With all of these challenges, how do you make this happen?
In this one day conference, attendees will be provided with examples of approaches to managing information and compliance risk through a risk management framework.
Hosted by CAMP IT
See all Archived IT - CxO Events articles
See all articles from this issue