home_banner

Events

Join The IANS Peer Community

IANS facilitates and connects clients-to-experts and experts-to-experts. Our Faculty of industry experts provides the breadth and depth of information to guide you on your information security journey. Through a regional delivery model, our events gather all members of the security function.

*Receive 1 CPE credit for every hour of attendance at our events.
Video Thumbnail
Paul Hypki, Children's Hospital and Clinics of Minnesota

Forums

Two-day events with keynotes, breakout sessions, technology spotlight sessions, and networking breaks.

CISO Roundtables

One-day roundtables designed exclusively for CISOs and senior level InfoSec executives to learn and share insights in a confidential setting.

Symposiums

Half-day, deep-dive explorations of technical and operational information security topics, free of vendor presence.

Webinars

Hour-long interactive discussions examining hot topics in information security.

Filter Events By:

June 9

With their Zero Trust implementation off the ground, security teams seek the best tools/techniques to measure and ensure that their 2020 implementations are functioning at optimum levels. This webinar will help you develop a long-term roadmap that builds upon the foundation laid in year one.

Speakers:
  • Wolfgang Goerlich

    Wolfgang Goerlich

    IANS Faculty

    Wolf is an Advisory CISO of Duo Security, the leading provider of unified access security and multi-factor authentication delivered through the cloud. He has held senior management roles in IT and IT security in the financial services and healthcare verticals. In addition, Wolf has held senior leadership roles in consulting firms specializing in identity and access management, governance risk and compliance, and security programs. Wolf advises clients primarily in risk management, incident response, business continuity, and secure development.

June 15

Security teams seek fresh MITRE ATT&CK use cases to help them navigate threats and vulnerabilities in 2021. This virtual symposium will outline those use cases and how to apply them.

Speakers:
  • Dave Kennedy

    Dave Kennedy

    IANS Faculty

    Dave is the Founder and Owner of TrustedSec, an information security consulting firm, and Binary Defense, a Managed Security Service Provider (MSSP) that detects attackers early to prevent large-scale invasions. In addition to creating several widely popular open-source tools, including 'The Social-Engineer Toolkit' (SET), PenTesters Framework (PTF), and Artillery. David has also released security advisories, including zero-days, with a focus on security research.

    Prior to his work in the private sector, Dave served in the United States Marine Corps (USMC), focusing on cyber warfare and forensics analysis activities, including two tours to Iraq. He also served on the board of directors for (ISC)2, which is one of the largest security collectives and offers certifications such as the CISSP.

June 16

This roundtable at the Boston Virtual Forum is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

June 16

This one-day event is designed for security practitioners to gain actionable technical solutions and leadership insights focused on current and emerging challenges. Engage virtually with IANS Faculty members and network with peers who are tackling similar challenges.

Speakers:
  • Wolfgang Goerlich

    Wolfgang Goerlich

    IANS Faculty

    Wolf is an Advisory CISO of Duo Security, the leading provider of unified access security and multi-factor authentication delivered through the cloud. He has held senior management roles in IT and IT security in the financial services and healthcare verticals. In addition, Wolf has held senior leadership roles in consulting firms specializing in identity and access management, governance risk and compliance, and security programs. Wolf advises clients primarily in risk management, incident response, business continuity, and secure development.

  • Aaron Turner

    Aaron Turner

    IANS Faculty

    Aaron Turner is the Founder & CEO of Siriux Security, a SaaS posture management company which partners with IANS on M365 security consulting projects. He is also a member of the board and security advisor to HighSide and CTO of Integricell. Aaron is a long-serving member of the RSA Conference Program Committee, helping select educational content presented at the annual RSA Conference.

  • Jake Williams

    Jake Williams

    IANS Faculty

    Jake is the Founder, President, and Principal Analyst of Rendition Infosec, an information security consultancy. He also sits on the Vulnerability Review Board at Peerlyst, a startup social networking platform exclusively for security professionals. Jake is a prolific speaker and instructor on a variety of information security topics such as reverse engineering malware, memory forensics, threat intelligence, and advanced exploit development.

  • Sounil Yu

    Sounil Yu

    IANS Faculty

    Sounil Yu has over 30 years of hands-on experience creating, breaking and fixing computer and network systems. He is the creator of the Cyber Defense Matrix and the DIE Resiliency Framework, teaches Cybersecurity Technologies as an adjunct professor, co-chairs Art into Science: A Conference on Defense, and advises many security startups. His specialties include leading innovation programs, intern programs, and a thriving startup culture to meet emerging cybersecurity needs. He often serves as a challenge function and change agent to drive unconventional thinking and alternative approaches to hard problems in security.

June 17

Nation states have increasingly targeted organizations managing critical infrastructure (utilities, for example) knowing that industrial control systems continue to run on antiquated technology. Security teams seek guidance to better determine their weaknesses and how to fix them.

Speakers:
  • Jake Williams

    Jake Williams

    IANS Faculty

    Jake is the Founder, President, and Principal Analyst of Rendition Infosec, an information security consultancy. He also sits on the Vulnerability Review Board at Peerlyst, a startup social networking platform exclusively for security professionals. Jake is a prolific speaker and instructor on a variety of information security topics such as reverse engineering malware, memory forensics, threat intelligence, and advanced exploit development.

June 22

Manually conducting assessment and enforcement in the cloud is time consuming, inaccurate, painful and expensive for security teams, leading to missed problems that often lead to security incidents. Teams need strategies for automation of these tasks and tools to do it with.

Speakers:
  • Dave Shackleford

    Dave Shackleford

    IANS Faculty

    Dave is the Founder and Principal Consultant with Voodoo Security, an information security consulting firm with broad expertise. He is also a Senior Instructor, Analyst, and Course Author for the SANS Institute and a VMware vExpert with extensive experience designing and configuring secure virtualized infrastructures. In addition, Dave has served as Co-Chair of the Cloud Security Alliance (CSA) Top Threats Working Group and founded the CSA Atlanta Chapter. Dave has consulted with hundreds of organizations in the areas of security, regulatory compliance, network architecture, and engineering. He has also worked as a security architect, analyst, and manager for several Fortune 500 companies.

June 24

This roundtable at the Boston Virtual Forum is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

June 24

This one-day event is designed for security practitioners to gain actionable technical solutions and leadership insights focused on current and emerging challenges. Engage virtually with IANS Faculty members and network with peers who are tackling similar challenges.

Speakers:
  • Bryson Bort

    Bryson Bort

    IANS Faculty

    Bryson is the Founder of SCYTHE, a start-up building a next generation attack emulation platform, and GRIMM, a cybersecurity consultancy, as well as Co-Founder of ICS Village, a nonprofit advancing awareness of industrial control system security. He is a Senior Fellow for Cybersecurity and National Security at R Street and the National Security Institute and an Advisor to the Army Cyber Institute and DHS/CISA. Prior to that, Bryson led an elite offensive capabilities development group. As a U.S. Army Officer, he served as a Battle Captain and Brigade Engineering Officer in support of Operation Iraqi Freedom before leaving the Army as a Captain.

  • Mick Douglas

    Mick Douglas

    IANS Faculty

    Mick is the Managing Partner for InfoSec Innovations, an information security advisory and research firm. He also serves as an Instructor and GIAC Advisory Board Member for the SANS Institute. Mick empowers information security professionals with useful tools and skills from his extensive experience as an analyst, consultant, and software developer.

  • Dave Kennedy

    Dave Kennedy

    IANS Faculty

    Dave is the Founder and Owner of TrustedSec, an information security consulting firm, and Binary Defense, a Managed Security Service Provider (MSSP) that detects attackers early to prevent large-scale invasions. In addition to creating several widely popular open-source tools, including 'The Social-Engineer Toolkit' (SET), PenTesters Framework (PTF), and Artillery. David has also released security advisories, including zero-days, with a focus on security research.

    Prior to his work in the private sector, Dave served in the United States Marine Corps (USMC), focusing on cyber warfare and forensics analysis activities, including two tours to Iraq. He also served on the board of directors for (ISC)2, which is one of the largest security collectives and offers certifications such as the CISSP.

  • Dave Shackleford

    Dave Shackleford

    IANS Faculty

    Dave is the Founder and Principal Consultant with Voodoo Security, an information security consulting firm with broad expertise. He is also a Senior Instructor, Analyst, and Course Author for the SANS Institute and a VMware vExpert with extensive experience designing and configuring secure virtualized infrastructures. In addition, Dave has served as Co-Chair of the Cloud Security Alliance (CSA) Top Threats Working Group and founded the CSA Atlanta Chapter. Dave has consulted with hundreds of organizations in the areas of security, regulatory compliance, network architecture, and engineering. He has also worked as a security architect, analyst, and manager for several Fortune 500 companies.

  • Ed Skoudis

    Ed Skoudis

    SANS Instructor and Fellow Founder, Counter Hack

    Ed Skoudis has taught cyber incident response and advanced penetration testing techniques to more than 20,000 cybersecurity professionals. He is a SANS Faculty Fellow and Instructor. His courses distill the essence of real-world, front-line case studies he accumulates because he is consistently one of the first experts brought in to provide after-attack analysis on major breaches where credit card and other sensitive financial data is lost.

    Ed led the team that built NetWars, the low-cost, widely used cyber training and skills assessment ranges relied upon by military units and corporations with major assets at risk. His team also built CyberCity, the fully authentic urban cyber warfare simulator that was featured on the front page of the Washington Post. He was also the expert called in by the White House to test the security viability of the Trusted Internet Connection (TIC) that now protects US Government networks and lead the team that first publicly demonstrated significant security flaws in virtual machine technology. He has a rare capability of translating advanced technical knowledge into easy-to-master guidance as the popularity of his step-by-step Counter Hack books testifies. Ed earned an M.S. in Information Networking from Carnegie Mellon University, and his B.S. in Electrical Engineering from the University of Michigan, summa cum laude.

June 29

Manually conducting assessment and enforcement in the cloud is time consuming, inaccurate, painful and expensive for security teams, leading to missed problems that often lead to security incidents. Teams need strategies for automation of these tasks and tools to do it with.

Speakers:
  • Dave Shackleford

    Dave Shackleford

    IANS Faculty

    Dave is the Founder and Principal Consultant with Voodoo Security, an information security consulting firm with broad expertise. He is also a Senior Instructor, Analyst, and Course Author for the SANS Institute and a VMware vExpert with extensive experience designing and configuring secure virtualized infrastructures. In addition, Dave has served as Co-Chair of the Cloud Security Alliance (CSA) Top Threats Working Group and founded the CSA Atlanta Chapter. Dave has consulted with hundreds of organizations in the areas of security, regulatory compliance, network architecture, and engineering. He has also worked as a security architect, analyst, and manager for several Fortune 500 companies.

July 14

With privacy regulations and laws regularly updated and new laws frequently emerging in different jurisdictions, security teams need to become more adaptable in their compliance strategies. This webinar will cover how to stay on top of the shifting regulatory climate and build programs for greater flexibility.

Speakers:
  • Rebecca Herold

    Rebecca Herold

    IANS Faculty

    Rebecca is Founder, Owner, and CEO of Rebecca Herold, LLC aka The Privacy Professor®, an information security, privacy, IT, and compliance services firm. She also co-founded Privacy Security Brainiacs, a SaaS platform, early 2020 with her oldest son, Noah. Rebecca also serves as a Distinguished Ponemon Institute Fellow and as an Advisory Board Member for multiple technology businesses and startups. Additionally, Rebecca serves as an expert witness for diverse cases, is an advisor on multiple high school and college/university curriculum and program boards, and hosts a VoiceAmerica radio show called “Data Security & Privacy with the Privacy Professor.”

July 15

Attacks against hospitals and companies in the medical space have skyrocketed during the pandemic. As bad actors target long-standing vulnerabilities in these organizations, security teams seek guidance to close those security holes. This virtual symposium will outline ways to find and fix them.

Speakers:
  • Justine Bone

    Justine Bone

    IANS Faculty

    Justine is the CEO of MedSec, a company focused on medical device security management and the delivery of security solutions to healthcare delivery organizations and medical device manufacturing companies. She also serves as a member of HP’s Security Advisory Board, a member of BlackHat’s USA Guest Review Board, and as an advisor to technology startups.

  • Kevin McDonald

    Kevin McDonald

    IANS Faculty

    Kevin is a Healthcare Cybersecurity Consultant working with companies such as MedSec, LogRhythm and individual healthcare providers. Kevin has over 40 years’ experience in healthcare in roles from direct patient care as a registered nurse to a Director of Information Security at Mayo Clinic. He assisted in developing the cybersecurity program at the Mayo Clinic and designed their medical device cybersecurity program.

July 22

Security teams seek guidance to perfect the art of walking in the enemy’s shoes using the Purple Team Exercise Framework (an open-sourced purple team process), Cyber Threat Intelligence (CTI) research and CTI mapped to Adversary Behaviors/TTPs.

Speakers:
  • Bryson Bort

    Bryson Bort

    IANS Faculty

    Bryson is the Founder of SCYTHE, a start-up building a next generation attack emulation platform, and GRIMM, a cybersecurity consultancy, as well as Co-Founder of ICS Village, a nonprofit advancing awareness of industrial control system security. He is a Senior Fellow for Cybersecurity and National Security at R Street and the National Security Institute and an Advisor to the Army Cyber Institute and DHS/CISA. Prior to that, Bryson led an elite offensive capabilities development group. As a U.S. Army Officer, he served as a Battle Captain and Brigade Engineering Officer in support of Operation Iraqi Freedom before leaving the Army as a Captain.

July 27

Security teams seek fresh MITRE ATT&CK use cases to help them navigate threats and vulnerabilities in 2021. This virtual symposium will outline those use cases and how to apply them.

Speakers:
  • Mick Douglas

    Mick Douglas

    IANS Faculty

    Mick is the Managing Partner for InfoSec Innovations, an information security advisory and research firm. He also serves as an Instructor and GIAC Advisory Board Member for the SANS Institute. Mick empowers information security professionals with useful tools and skills from his extensive experience as an analyst, consultant, and software developer.

July 28

Security teams seek guidance to perfect the art of walking in the enemy’s shoes using the Purple Team Exercise Framework (an open-sourced purple team process), Cyber Threat Intelligence (CTI) research and CTI mapped to Adversary Behaviors/TTPs.

Speakers:
  • Chris Nickerson

    Chris Nickerson

    IANS Faculty

    Chris is the Co-Founder and CEO of LARES Consulting, an information security consulting firm that leverages a blend of assessment, testing, and coaching. He also serves on the Board of Directors at CREST, an international not-for-profit accreditation and certification body that represents and supports the technical information security market.

July 29

Security teams seek fresh MITRE ATT&CK use cases to help them navigate threats and vulnerabilities in 2021. This virtual symposium will outline those use cases and how to apply them.

Speakers:
  • Bryson Bort

    Bryson Bort

    IANS Faculty

    Bryson is the Founder of SCYTHE, a start-up building a next generation attack emulation platform, and GRIMM, a cybersecurity consultancy, as well as Co-Founder of ICS Village, a nonprofit advancing awareness of industrial control system security. He is a Senior Fellow for Cybersecurity and National Security at R Street and the National Security Institute and an Advisor to the Army Cyber Institute and DHS/CISA. Prior to that, Bryson led an elite offensive capabilities development group. As a U.S. Army Officer, he served as a Battle Captain and Brigade Engineering Officer in support of Operation Iraqi Freedom before leaving the Army as a Captain.

July 29

Security teams that have shifted their SOCs to the cloud seek guidance on how to choose and implement the automation/visualization tools now available to them.

Speakers:
  • George Gerchow

    George Gerchow

    IANS Faculty

    George is Chief Security Officer at Sumo Logic, a secure, cloud-native, machine data analytics service provider. George has extensive experience in board and executive communications serving as a Board Member for ANTIVIUM, Inc., a cloud monitoring and analytic startup, and VENZA, a data protection company. Likewise, George is an Adjunct Faculty member at University of Denver and Cloud Academy, in addition to a Participant in the US Technical Advisory Group: Privacy by Design, which aims to define an international standard for consumer protection as part of ISO Project Committee 317.

August 4

Security teams that have shifted their SOCs to the cloud seek guidance on how to choose and implement the automation/visualization tools now available to them.

Speakers:
  • George Gerchow

    George Gerchow

    IANS Faculty

    George is Chief Security Officer at Sumo Logic, a secure, cloud-native, machine data analytics service provider. George has extensive experience in board and executive communications serving as a Board Member for ANTIVIUM, Inc., a cloud monitoring and analytic startup, and VENZA, a data protection company. Likewise, George is an Adjunct Faculty member at University of Denver and Cloud Academy, in addition to a Participant in the US Technical Advisory Group: Privacy by Design, which aims to define an international standard for consumer protection as part of ISO Project Committee 317.

August 10

Security teams seek guidance to perfect the art of walking in the enemy’s shoes using the Purple Team Exercise Framework (an open-sourced purple team process), Cyber Threat Intelligence (CTI) research and CTI mapped to Adversary Behaviors/TTPs.

Speakers:
  • Bryson Bort

    Bryson Bort

    IANS Faculty

    Bryson is the Founder of SCYTHE, a start-up building a next generation attack emulation platform, and GRIMM, a cybersecurity consultancy, as well as Co-Founder of ICS Village, a nonprofit advancing awareness of industrial control system security. He is a Senior Fellow for Cybersecurity and National Security at R Street and the National Security Institute and an Advisor to the Army Cyber Institute and DHS/CISA. Prior to that, Bryson led an elite offensive capabilities development group. As a U.S. Army Officer, he served as a Battle Captain and Brigade Engineering Officer in support of Operation Iraqi Freedom before leaving the Army as a Captain.

August 11

Software supply chain attacks are not new, but increased attacker sophistication combined with modern software development and cloud delivery exposed latent inherent risks that caught many businesses off guard. This webinar will cover how to analyze and manage software supply chain risks.

Speakers:
  • Earl Crane

    Earl Crane

    IANS Faculty

    Earl Crane is a cybersecurity executive and trusted advisor to public and private sector organizations, helping them manage their strategy, risk, and cybersecurity programs. He has made appearances in The Wall Street Journal, American Banker, National Public Radio, and The Council on Foreign Relations. He has spoken at multiple conferences, including RSA, SXSW, the World Bank, and Mexico's National Cybersecurity Forum.

August 12

The shift to remote work made security teams realize that they must be able to make SASE configuration changes with greater speed and be ready to do so when the next black swan hits. They seek guidance for how to do that without compromising their edge defenses.

Speakers:
  • Matt Chiodi

    Matt Chiodi

    IANS Faculty

    Matt is the CSO of Public Cloud at Palo Alto Networks where he works with organizations to develop and implement security strategy for public cloud adoption and maturity. He has extensive experience in information security leadership and blogging. Matt currently leads the Cloud Threat team which is an elite group of security researchers exclusively focused on public cloud concerns. He also serves as an advisory board member for Rutgers University's Cybersecurity Certificate program.

August 17

Security teams say it’s difficult to use alert/response techniques and policy controls consistently across multiple cloud environments, and they seek guidance to adapt their approach to cover the differences from one cloud to the next. This virtual symposium will provide that guidance.

Speakers:
  • George Gerchow

    George Gerchow

    IANS Faculty

    George is Chief Security Officer at Sumo Logic, a secure, cloud-native, machine data analytics service provider. George has extensive experience in board and executive communications serving as a Board Member for ANTIVIUM, Inc., a cloud monitoring and analytic startup, and VENZA, a data protection company. Likewise, George is an Adjunct Faculty member at University of Denver and Cloud Academy, in addition to a Participant in the US Technical Advisory Group: Privacy by Design, which aims to define an international standard for consumer protection as part of ISO Project Committee 317.

August 18

The strongest security organizations move beyond merely reacting to incidents and fighting fires. They are self-aware, recognize their weaknesses, and create roadmaps to move their programs from current to enhanced states. This virtual symposium will outline how to determine the best approach for your organization and implement a framework that makes sense.

Speakers:
  • Sounil Yu

    Sounil Yu

    IANS Faculty

    Sounil Yu has over 30 years of hands-on experience creating, breaking and fixing computer and network systems. He is the creator of the Cyber Defense Matrix and the DIE Resiliency Framework, teaches Cybersecurity Technologies as an adjunct professor, co-chairs Art into Science: A Conference on Defense, and advises many security startups. His specialties include leading innovation programs, intern programs, and a thriving startup culture to meet emerging cybersecurity needs. He often serves as a challenge function and change agent to drive unconventional thinking and alternative approaches to hard problems in security.

August 19

Security teams that have shifted their SOCs to the cloud seek guidance on how to choose and implement the automation/visualization tools now available to them.

Speakers:
  • George Gerchow

    George Gerchow

    IANS Faculty

    George is Chief Security Officer at Sumo Logic, a secure, cloud-native, machine data analytics service provider. George has extensive experience in board and executive communications serving as a Board Member for ANTIVIUM, Inc., a cloud monitoring and analytic startup, and VENZA, a data protection company. Likewise, George is an Adjunct Faculty member at University of Denver and Cloud Academy, in addition to a Participant in the US Technical Advisory Group: Privacy by Design, which aims to define an international standard for consumer protection as part of ISO Project Committee 317.

September 8

Security teams face increased attacks against their security architecture and seek a better approach to stay ahead of the bad guys. The DIE Triad (distributed, immutable, and ephemeral) model of adversarial resilience is one such approach. This virtual symposium will outline the components and how to incorporate them.

Speakers:
  • Sounil Yu

    Sounil Yu

    IANS Faculty

    Sounil Yu has over 30 years of hands-on experience creating, breaking and fixing computer and network systems. He is the creator of the Cyber Defense Matrix and the DIE Resiliency Framework, teaches Cybersecurity Technologies as an adjunct professor, co-chairs Art into Science: A Conference on Defense, and advises many security startups. His specialties include leading innovation programs, intern programs, and a thriving startup culture to meet emerging cybersecurity needs. He often serves as a challenge function and change agent to drive unconventional thinking and alternative approaches to hard problems in security.

September 9

Security teams seek guidance to perfect the art of walking in the enemy’s shoes using the Purple Team Exercise Framework (an open-sourced purple team process), Cyber Threat Intelligence (CTI) research and CTI mapped to Adversary Behaviors/TTPs.

Speakers:
  • Bryson Bort

    Bryson Bort

    IANS Faculty

    Bryson is the Founder of SCYTHE, a start-up building a next generation attack emulation platform, and GRIMM, a cybersecurity consultancy, as well as Co-Founder of ICS Village, a nonprofit advancing awareness of industrial control system security. He is a Senior Fellow for Cybersecurity and National Security at R Street and the National Security Institute and an Advisor to the Army Cyber Institute and DHS/CISA. Prior to that, Bryson led an elite offensive capabilities development group. As a U.S. Army Officer, he served as a Battle Captain and Brigade Engineering Officer in support of Operation Iraqi Freedom before leaving the Army as a Captain.

September 14

The shift to remote work made security teams realize that they must be able to make SASE configuration changes with greater speed and be ready to do so when the next black swan hits. They seek guidance for how to do that without compromising their edge defenses.

Speakers:
  • Matt Chiodi

    Matt Chiodi

    IANS Faculty

    Matt is the CSO of Public Cloud at Palo Alto Networks where he works with organizations to develop and implement security strategy for public cloud adoption and maturity. He has extensive experience in information security leadership and blogging. Matt currently leads the Cloud Threat team which is an elite group of security researchers exclusively focused on public cloud concerns. He also serves as an advisory board member for Rutgers University's Cybersecurity Certificate program.

September 15

This roundtable at the Los Angeles/Seattle Virtual Forum is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

September 15

This one-day event is designed for security practitioners to gain actionable technical solutions and leadership insights focused on current and emerging challenges. Engage virtually with IANS Faculty members and network with peers who are tackling similar challenges.

September 23

The shift to remote work made security teams realize that they must be able to make SASE configuration changes with greater speed and be ready to do so when the next black swan hits. They seek guidance for how to do that without compromising their edge defenses.

Speakers:
  • Matt Chiodi

    Matt Chiodi

    IANS Faculty

    Matt is the CSO of Public Cloud at Palo Alto Networks where he works with organizations to develop and implement security strategy for public cloud adoption and maturity. He has extensive experience in information security leadership and blogging. Matt currently leads the Cloud Threat team which is an elite group of security researchers exclusively focused on public cloud concerns. He also serves as an advisory board member for Rutgers University's Cybersecurity Certificate program.

October 5

This roundtable at the Philadelphia/Washington, DC Virtual Forum is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

October 5

2021 Philadelphia/Washington, DC Virtual
Information Security Forum

Web Conference

This one-day event is designed for security practitioners to gain actionable technical solutions and leadership insights focused on current and emerging challenges. Engage virtually with IANS Faculty members and network with peers who are tackling similar challenges.

October 21

This roundtable at the Toronto Virtual Forum is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

October 21

2021 Toronto Virtual
Information Security Forum

Web Conference

This one-day event is designed for security practitioners to gain actionable technical solutions and leadership insights focused on current and emerging challenges. Engage virtually with IANS Faculty members and network with peers who are tackling similar challenges.

November 17

This roundtable at the Atlanta Virtual Forum is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

November 17

2021 Atlanta Virtual
Information Security Forum

Web Conference

This one-day event is designed for security practitioners to gain actionable technical solutions and leadership insights focused on current and emerging challenges. Engage virtually with IANS Faculty members and network with peers who are tackling similar challenges.

 
 

Want to know more? Let us know how we can help you.

Success! Thanks for filling out our form! Loading animation

* Required Fields