• Webinar 2019 Q1 Managing The 2019 Threat Landscape

    , 2019 Threat

    In this webinar, IANS Research Director Bill Brenner and IANS Faculty Member Joshua Marpet look at what to expect for threats in 2019 and, most importantly, how best to prepare for those threats. They will also discuss what they see as the coming advances in security technology and process, and how get ahead of the curve.

  • Symposium 2019 Q1 Seattle Navigating the Path to Cloud Security Maturity

    , Seattle

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 Portland Navigating the Path to Cloud Security Maturity

    , Portland

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 NewYork IAM Strategies that Work: Vendor-Agnostic “How-To” Guidance

    , New York

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • Symposium 2019 Q1 Washington DC Navigating the Path to Cloud Security Maturity

    , Washington

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 Minneapolis IAM Strategies that Work: Vendor-Agnostic “How-To” Guidance

    , Minneapolis

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • Symposium 2019 Q1 Denver Navigating the Path to Cloud Security Maturity

    , Denver

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 San Francisco How to Mature Your Application Security Program

    , San Francisco

    Fortune 1000 companies face myriad challenges when it comes to application security. They don't know how to run an effective bug bounty program. They don't know whether to do manual or automated web app pen testing or go with a more hybrid approach. And they spin up containers quickly, setting them loose with no security due diligence.

  • Symposium 2019 Q1 Nashville Navigating the Path to Cloud Security Maturity

    , Nashville

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Webinar 2019 Q1 5 Steps To Choosing A Cloud Provider

    , Cloud Provider

    You need to choose the cloud provider that best fits the needs of your organization, but there are too many vendors, an over-saturated market and confusion over security requirements that truly matter vs. vendor fluff.

  • Symposium 2019 Q1 Atlanta Deception

    , Atlanta

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • Symposium 2019 Q1 Charlotte Navigating the Path to Cloud Security Maturity

    , Charlotte

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 Los Angeles Deception

    , Santa Monica

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • Symposium 2019 Q1 Chicago Deception

    , Chicago

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • Webinar 2019 Q1 Vendor Optimization: Thinning The Herd

    , Vendor Optimization

    Security vendors have expanded offerings in a way that has created a lot of overlap and complexity within company environments. This webinar will explore how to do an assessment and logically start pruning your stack.

  • Symposium 2019 Q1 Philadelphia Vulnerability Management

    , Philadelphia

    Companies have limited resources to keep up with an endless pile of vulnerabilities and patches and need to determine what they keep getting wrong and what others are doing that’s right.

  • Symposium 2019 Q1 Boston IAM Strategies that Work: Vendor-Agnostic “How-To” Guidance

    , Boston

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • Forum 2019 Q1 Dallas

    , Dallas

    IANS Forum content is designed for senior-level information security executives across all industries. Attendees include CISOs, CIOs, VPs and Managing Directors of Information Security, Senior Information Security Architects, and Senior Information Security Engineers.

  • CISO Roundtable 2019 Q1 Dallas

    , Dallas

    This 1-day roundtable at the Dallas Information Security Forum is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

  • CISO Roundtable 2019 Q2 Toronto

    , Toronto

    This 1-day roundtable at the Toronto Information Security Forum is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

  • Webinar 2019 Q1 Managing The 2019 Threat Landscape

    , 2019 Threat

    In this webinar, IANS Research Director Bill Brenner and IANS Faculty Member Joshua Marpet look at what to expect for threats in 2019 and, most importantly, how best to prepare for those threats. They will also discuss what they see as the coming advances in security technology and process, and how get ahead of the curve.

  • Symposium 2019 Q1 Seattle Navigating the Path to Cloud Security Maturity

    , Seattle

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 Portland Navigating the Path to Cloud Security Maturity

    , Portland

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 NewYork IAM Strategies that Work: Vendor-Agnostic “How-To” Guidance

    , New York

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • Symposium 2019 Q1 Washington DC Navigating the Path to Cloud Security Maturity

    , Washington

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 Minneapolis IAM Strategies that Work: Vendor-Agnostic “How-To” Guidance

    , Minneapolis

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • Symposium 2019 Q1 Denver Navigating the Path to Cloud Security Maturity

    , Denver

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 San Francisco How to Mature Your Application Security Program

    , San Francisco

    Fortune 1000 companies face myriad challenges when it comes to application security. They don't know how to run an effective bug bounty program. They don't know whether to do manual or automated web app pen testing or go with a more hybrid approach. And they spin up containers quickly, setting them loose with no security due diligence.

  • Symposium 2019 Q1 Nashville Navigating the Path to Cloud Security Maturity

    , Nashville

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Webinar 2019 Q1 5 Steps To Choosing A Cloud Provider

    , Cloud Provider

    You need to choose the cloud provider that best fits the needs of your organization, but there are too many vendors, an over-saturated market and confusion over security requirements that truly matter vs. vendor fluff.

  • Symposium 2019 Q1 Atlanta Deception

    , Atlanta

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • Symposium 2019 Q1 Charlotte Navigating the Path to Cloud Security Maturity

    , Charlotte

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 Los Angeles Deception

    , Santa Monica

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • Symposium 2019 Q1 Chicago Deception

    , Chicago

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • Webinar 2019 Q1 Vendor Optimization: Thinning The Herd

    , Vendor Optimization

    Security vendors have expanded offerings in a way that has created a lot of overlap and complexity within company environments. This webinar will explore how to do an assessment and logically start pruning your stack.

  • Symposium 2019 Q1 Philadelphia Vulnerability Management

    , Philadelphia

    Companies have limited resources to keep up with an endless pile of vulnerabilities and patches and need to determine what they keep getting wrong and what others are doing that’s right.

  • Symposium 2019 Q1 Boston IAM Strategies that Work: Vendor-Agnostic “How-To” Guidance

    , Boston

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • Forum 2019 Q1 Dallas

    , Dallas

    IANS Forum content is designed for senior-level information security executives across all industries. Attendees include CISOs, CIOs, VPs and Managing Directors of Information Security, Senior Information Security Architects, and Senior Information Security Engineers.

  • CISO Roundtable 2019 Q1 Dallas

    , Dallas

    This 1-day roundtable at the Dallas Information Security Forum is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

  • CISO Roundtable 2019 Q2 Toronto

    , Toronto

    This 1-day roundtable at the Toronto Information Security Forum is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

  • Webinar 2019 Q1 Managing The 2019 Threat Landscape

    , 2019 Threat

    In this webinar, IANS Research Director Bill Brenner and IANS Faculty Member Joshua Marpet look at what to expect for threats in 2019 and, most importantly, how best to prepare for those threats. They will also discuss what they see as the coming advances in security technology and process, and how get ahead of the curve.

  • Symposium 2019 Q1 Seattle Navigating the Path to Cloud Security Maturity

    , Seattle

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 Portland Navigating the Path to Cloud Security Maturity

    , Portland

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 NewYork IAM Strategies that Work: Vendor-Agnostic “How-To” Guidance

    , New York

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • Symposium 2019 Q1 Washington DC Navigating the Path to Cloud Security Maturity

    , Washington

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 Minneapolis IAM Strategies that Work: Vendor-Agnostic “How-To” Guidance

    , Minneapolis

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • Symposium 2019 Q1 Denver Navigating the Path to Cloud Security Maturity

    , Denver

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 San Francisco How to Mature Your Application Security Program

    , San Francisco

    Fortune 1000 companies face myriad challenges when it comes to application security. They don't know how to run an effective bug bounty program. They don't know whether to do manual or automated web app pen testing or go with a more hybrid approach. And they spin up containers quickly, setting them loose with no security due diligence.

  • Symposium 2019 Q1 Nashville Navigating the Path to Cloud Security Maturity

    , Nashville

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Webinar 2019 Q1 5 Steps To Choosing A Cloud Provider

    , Cloud Provider

    You need to choose the cloud provider that best fits the needs of your organization, but there are too many vendors, an over-saturated market and confusion over security requirements that truly matter vs. vendor fluff.

  • Symposium 2019 Q1 Atlanta Deception

    , Atlanta

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • Symposium 2019 Q1 Charlotte Navigating the Path to Cloud Security Maturity

    , Charlotte

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 Los Angeles Deception

    , Santa Monica

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • Symposium 2019 Q1 Chicago Deception

    , Chicago

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • Webinar 2019 Q1 Vendor Optimization: Thinning The Herd

    , Vendor Optimization

    Security vendors have expanded offerings in a way that has created a lot of overlap and complexity within company environments. This webinar will explore how to do an assessment and logically start pruning your stack.

  • Symposium 2019 Q1 Philadelphia Vulnerability Management

    , Philadelphia

    Companies have limited resources to keep up with an endless pile of vulnerabilities and patches and need to determine what they keep getting wrong and what others are doing that’s right.

  • Symposium 2019 Q1 Boston IAM Strategies that Work: Vendor-Agnostic “How-To” Guidance

    , Boston

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • Forum 2019 Q1 Dallas

    , Dallas

    IANS Forum content is designed for senior-level information security executives across all industries. Attendees include CISOs, CIOs, VPs and Managing Directors of Information Security, Senior Information Security Architects, and Senior Information Security Engineers.

  • CISO Roundtable 2019 Q1 Dallas

    , Dallas

    This 1-day roundtable at the Dallas Information Security Forum is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

  • CISO Roundtable 2019 Q2 Toronto

    , Toronto

    This 1-day roundtable at the Toronto Information Security Forum is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

  • Webinar 2019 Q1 Managing The 2019 Threat Landscape

    , 2019 Threat

    In this webinar, IANS Research Director Bill Brenner and IANS Faculty Member Joshua Marpet look at what to expect for threats in 2019 and, most importantly, how best to prepare for those threats. They will also discuss what they see as the coming advances in security technology and process, and how get ahead of the curve.

  • Symposium 2019 Q1 Seattle Navigating the Path to Cloud Security Maturity

    , Seattle

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 Portland Navigating the Path to Cloud Security Maturity

    , Portland

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 NewYork IAM Strategies that Work: Vendor-Agnostic “How-To” Guidance

    , New York

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • Symposium 2019 Q1 Washington DC Navigating the Path to Cloud Security Maturity

    , Washington

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 Minneapolis IAM Strategies that Work: Vendor-Agnostic “How-To” Guidance

    , Minneapolis

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • Symposium 2019 Q1 Denver Navigating the Path to Cloud Security Maturity

    , Denver

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 San Francisco How to Mature Your Application Security Program

    , San Francisco

    Fortune 1000 companies face myriad challenges when it comes to application security. They don't know how to run an effective bug bounty program. They don't know whether to do manual or automated web app pen testing or go with a more hybrid approach. And they spin up containers quickly, setting them loose with no security due diligence.

  • Symposium 2019 Q1 Nashville Navigating the Path to Cloud Security Maturity

    , Nashville

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Webinar 2019 Q1 5 Steps To Choosing A Cloud Provider

    , Cloud Provider

    You need to choose the cloud provider that best fits the needs of your organization, but there are too many vendors, an over-saturated market and confusion over security requirements that truly matter vs. vendor fluff.

  • Symposium 2019 Q1 Atlanta Deception

    , Atlanta

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • Symposium 2019 Q1 Charlotte Navigating the Path to Cloud Security Maturity

    , Charlotte

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 Los Angeles Deception

    , Santa Monica

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • Symposium 2019 Q1 Chicago Deception

    , Chicago

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • Webinar 2019 Q1 Vendor Optimization: Thinning The Herd

    , Vendor Optimization

    Security vendors have expanded offerings in a way that has created a lot of overlap and complexity within company environments. This webinar will explore how to do an assessment and logically start pruning your stack.

  • Symposium 2019 Q1 Philadelphia Vulnerability Management

    , Philadelphia

    Companies have limited resources to keep up with an endless pile of vulnerabilities and patches and need to determine what they keep getting wrong and what others are doing that’s right.

  • Symposium 2019 Q1 Boston IAM Strategies that Work: Vendor-Agnostic “How-To” Guidance

    , Boston

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • Forum 2019 Q1 Dallas

    , Dallas

    IANS Forum content is designed for senior-level information security executives across all industries. Attendees include CISOs, CIOs, VPs and Managing Directors of Information Security, Senior Information Security Architects, and Senior Information Security Engineers.

  • CISO Roundtable 2019 Q1 Dallas

    , Dallas

    This 1-day roundtable at the Dallas Information Security Forum is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

  • CISO Roundtable 2019 Q2 Toronto

    , Toronto

    This 1-day roundtable at the Toronto Information Security Forum is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

  • Webinar 2019 Q1 Managing The 2019 Threat Landscape

    , 2019 Threat

    In this webinar, IANS Research Director Bill Brenner and IANS Faculty Member Joshua Marpet look at what to expect for threats in 2019 and, most importantly, how best to prepare for those threats. They will also discuss what they see as the coming advances in security technology and process, and how get ahead of the curve.

  • Symposium 2019 Q1 Seattle Navigating the Path to Cloud Security Maturity

    , Seattle

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 Portland Navigating the Path to Cloud Security Maturity

    , Portland

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 NewYork IAM Strategies that Work: Vendor-Agnostic “How-To” Guidance

    , New York

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • Symposium 2019 Q1 Washington DC Navigating the Path to Cloud Security Maturity

    , Washington

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 Minneapolis IAM Strategies that Work: Vendor-Agnostic “How-To” Guidance

    , Minneapolis

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • Symposium 2019 Q1 Denver Navigating the Path to Cloud Security Maturity

    , Denver

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 San Francisco How to Mature Your Application Security Program

    , San Francisco

    Fortune 1000 companies face myriad challenges when it comes to application security. They don't know how to run an effective bug bounty program. They don't know whether to do manual or automated web app pen testing or go with a more hybrid approach. And they spin up containers quickly, setting them loose with no security due diligence.

  • Symposium 2019 Q1 Nashville Navigating the Path to Cloud Security Maturity

    , Nashville

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Webinar 2019 Q1 5 Steps To Choosing A Cloud Provider

    , Cloud Provider

    You need to choose the cloud provider that best fits the needs of your organization, but there are too many vendors, an over-saturated market and confusion over security requirements that truly matter vs. vendor fluff.

  • Symposium 2019 Q1 Atlanta Deception

    , Atlanta

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • Symposium 2019 Q1 Charlotte Navigating the Path to Cloud Security Maturity

    , Charlotte

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 Los Angeles Deception

    , Santa Monica

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • Symposium 2019 Q1 Chicago Deception

    , Chicago

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • Webinar 2019 Q1 Vendor Optimization: Thinning The Herd

    , Vendor Optimization

    Security vendors have expanded offerings in a way that has created a lot of overlap and complexity within company environments. This webinar will explore how to do an assessment and logically start pruning your stack.

  • Symposium 2019 Q1 Philadelphia Vulnerability Management

    , Philadelphia

    Companies have limited resources to keep up with an endless pile of vulnerabilities and patches and need to determine what they keep getting wrong and what others are doing that’s right.

  • Symposium 2019 Q1 Boston IAM Strategies that Work: Vendor-Agnostic “How-To” Guidance

    , Boston

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • Forum 2019 Q1 Dallas

    , Dallas

    IANS Forum content is designed for senior-level information security executives across all industries. Attendees include CISOs, CIOs, VPs and Managing Directors of Information Security, Senior Information Security Architects, and Senior Information Security Engineers.

  • CISO Roundtable 2019 Q1 Dallas

    , Dallas

    This 1-day roundtable at the Dallas Information Security Forum is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

  • CISO Roundtable 2019 Q2 Toronto

    , Toronto

    This 1-day roundtable at the Toronto Information Security Forum is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

  • Webinar 2019 Q1 Managing The 2019 Threat Landscape

    , 2019 Threat

    In this webinar, IANS Research Director Bill Brenner and IANS Faculty Member Joshua Marpet look at what to expect for threats in 2019 and, most importantly, how best to prepare for those threats. They will also discuss what they see as the coming advances in security technology and process, and how get ahead of the curve.

  • Symposium 2019 Q1 Seattle Navigating the Path to Cloud Security Maturity

    , Seattle

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 Portland Navigating the Path to Cloud Security Maturity

    , Portland

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 NewYork IAM Strategies that Work: Vendor-Agnostic “How-To” Guidance

    , New York

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • Symposium 2019 Q1 Washington DC Navigating the Path to Cloud Security Maturity

    , Washington

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 Minneapolis IAM Strategies that Work: Vendor-Agnostic “How-To” Guidance

    , Minneapolis

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • Symposium 2019 Q1 Denver Navigating the Path to Cloud Security Maturity

    , Denver

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 San Francisco How to Mature Your Application Security Program

    , San Francisco

    Fortune 1000 companies face myriad challenges when it comes to application security. They don't know how to run an effective bug bounty program. They don't know whether to do manual or automated web app pen testing or go with a more hybrid approach. And they spin up containers quickly, setting them loose with no security due diligence.

  • Symposium 2019 Q1 Nashville Navigating the Path to Cloud Security Maturity

    , Nashville

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Webinar 2019 Q1 5 Steps To Choosing A Cloud Provider

    , Cloud Provider

    You need to choose the cloud provider that best fits the needs of your organization, but there are too many vendors, an over-saturated market and confusion over security requirements that truly matter vs. vendor fluff.

  • Symposium 2019 Q1 Atlanta Deception

    , Atlanta

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • Symposium 2019 Q1 Charlotte Navigating the Path to Cloud Security Maturity

    , Charlotte

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 Los Angeles Deception

    , Santa Monica

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • Symposium 2019 Q1 Chicago Deception

    , Chicago

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • Webinar 2019 Q1 Vendor Optimization: Thinning The Herd

    , Vendor Optimization

    Security vendors have expanded offerings in a way that has created a lot of overlap and complexity within company environments. This webinar will explore how to do an assessment and logically start pruning your stack.

  • Symposium 2019 Q1 Philadelphia Vulnerability Management

    , Philadelphia

    Companies have limited resources to keep up with an endless pile of vulnerabilities and patches and need to determine what they keep getting wrong and what others are doing that’s right.

  • Symposium 2019 Q1 Boston IAM Strategies that Work: Vendor-Agnostic “How-To” Guidance

    , Boston

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • Forum 2019 Q1 Dallas

    , Dallas

    IANS Forum content is designed for senior-level information security executives across all industries. Attendees include CISOs, CIOs, VPs and Managing Directors of Information Security, Senior Information Security Architects, and Senior Information Security Engineers.

  • CISO Roundtable 2019 Q1 Dallas

    , Dallas

    This 1-day roundtable at the Dallas Information Security Forum is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

  • CISO Roundtable 2019 Q2 Toronto

    , Toronto

    This 1-day roundtable at the Toronto Information Security Forum is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

  • Webinar 2019 Q1 Managing The 2019 Threat Landscape

    , 2019 Threat

    In this webinar, IANS Research Director Bill Brenner and IANS Faculty Member Joshua Marpet look at what to expect for threats in 2019 and, most importantly, how best to prepare for those threats. They will also discuss what they see as the coming advances in security technology and process, and how get ahead of the curve.

  • Symposium 2019 Q1 Seattle Navigating the Path to Cloud Security Maturity

    , Seattle

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 Portland Navigating the Path to Cloud Security Maturity

    , Portland

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 NewYork IAM Strategies that Work: Vendor-Agnostic “How-To” Guidance

    , New York

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • Symposium 2019 Q1 Washington DC Navigating the Path to Cloud Security Maturity

    , Washington

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 Minneapolis IAM Strategies that Work: Vendor-Agnostic “How-To” Guidance

    , Minneapolis

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • Symposium 2019 Q1 Denver Navigating the Path to Cloud Security Maturity

    , Denver

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 San Francisco How to Mature Your Application Security Program

    , San Francisco

    Fortune 1000 companies face myriad challenges when it comes to application security. They don't know how to run an effective bug bounty program. They don't know whether to do manual or automated web app pen testing or go with a more hybrid approach. And they spin up containers quickly, setting them loose with no security due diligence.

  • Symposium 2019 Q1 Nashville Navigating the Path to Cloud Security Maturity

    , Nashville

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Webinar 2019 Q1 5 Steps To Choosing A Cloud Provider

    , Cloud Provider

    You need to choose the cloud provider that best fits the needs of your organization, but there are too many vendors, an over-saturated market and confusion over security requirements that truly matter vs. vendor fluff.

  • Symposium 2019 Q1 Atlanta Deception

    , Atlanta

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • Symposium 2019 Q1 Charlotte Navigating the Path to Cloud Security Maturity

    , Charlotte

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 Los Angeles Deception

    , Santa Monica

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • Symposium 2019 Q1 Chicago Deception

    , Chicago

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • Webinar 2019 Q1 Vendor Optimization: Thinning The Herd

    , Vendor Optimization

    Security vendors have expanded offerings in a way that has created a lot of overlap and complexity within company environments. This webinar will explore how to do an assessment and logically start pruning your stack.

  • Symposium 2019 Q1 Philadelphia Vulnerability Management

    , Philadelphia

    Companies have limited resources to keep up with an endless pile of vulnerabilities and patches and need to determine what they keep getting wrong and what others are doing that’s right.

  • Symposium 2019 Q1 Boston IAM Strategies that Work: Vendor-Agnostic “How-To” Guidance

    , Boston

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • Forum 2019 Q1 Dallas

    , Dallas

    IANS Forum content is designed for senior-level information security executives across all industries. Attendees include CISOs, CIOs, VPs and Managing Directors of Information Security, Senior Information Security Architects, and Senior Information Security Engineers.

  • CISO Roundtable 2019 Q1 Dallas

    , Dallas

    This 1-day roundtable at the Dallas Information Security Forum is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

  • CISO Roundtable 2019 Q2 Toronto

    , Toronto

    This 1-day roundtable at the Toronto Information Security Forum is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

  • Webinar 2019 Q1 Managing The 2019 Threat Landscape

    , 2019 Threat

    In this webinar, IANS Research Director Bill Brenner and IANS Faculty Member Joshua Marpet look at what to expect for threats in 2019 and, most importantly, how best to prepare for those threats. They will also discuss what they see as the coming advances in security technology and process, and how get ahead of the curve.

  • Symposium 2019 Q1 Seattle Navigating the Path to Cloud Security Maturity

    , Seattle

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 Portland Navigating the Path to Cloud Security Maturity

    , Portland

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 NewYork IAM Strategies that Work: Vendor-Agnostic “How-To” Guidance

    , New York

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • Symposium 2019 Q1 Washington DC Navigating the Path to Cloud Security Maturity

    , Washington

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 Minneapolis IAM Strategies that Work: Vendor-Agnostic “How-To” Guidance

    , Minneapolis

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • Symposium 2019 Q1 Denver Navigating the Path to Cloud Security Maturity

    , Denver

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 San Francisco How to Mature Your Application Security Program

    , San Francisco

    Fortune 1000 companies face myriad challenges when it comes to application security. They don't know how to run an effective bug bounty program. They don't know whether to do manual or automated web app pen testing or go with a more hybrid approach. And they spin up containers quickly, setting them loose with no security due diligence.

  • Symposium 2019 Q1 Nashville Navigating the Path to Cloud Security Maturity

    , Nashville

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Webinar 2019 Q1 5 Steps To Choosing A Cloud Provider

    , Cloud Provider

    You need to choose the cloud provider that best fits the needs of your organization, but there are too many vendors, an over-saturated market and confusion over security requirements that truly matter vs. vendor fluff.

  • Symposium 2019 Q1 Atlanta Deception

    , Atlanta

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • Symposium 2019 Q1 Charlotte Navigating the Path to Cloud Security Maturity

    , Charlotte

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 Los Angeles Deception

    , Santa Monica

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • Symposium 2019 Q1 Chicago Deception

    , Chicago

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • Webinar 2019 Q1 Vendor Optimization: Thinning The Herd

    , Vendor Optimization

    Security vendors have expanded offerings in a way that has created a lot of overlap and complexity within company environments. This webinar will explore how to do an assessment and logically start pruning your stack.

  • Symposium 2019 Q1 Philadelphia Vulnerability Management

    , Philadelphia

    Companies have limited resources to keep up with an endless pile of vulnerabilities and patches and need to determine what they keep getting wrong and what others are doing that’s right.

  • Symposium 2019 Q1 Boston IAM Strategies that Work: Vendor-Agnostic “How-To” Guidance

    , Boston

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • Forum 2019 Q1 Dallas

    , Dallas

    IANS Forum content is designed for senior-level information security executives across all industries. Attendees include CISOs, CIOs, VPs and Managing Directors of Information Security, Senior Information Security Architects, and Senior Information Security Engineers.

  • CISO Roundtable 2019 Q1 Dallas

    , Dallas

    This 1-day roundtable at the Dallas Information Security Forum is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

  • CISO Roundtable 2019 Q2 Toronto

    , Toronto

    This 1-day roundtable at the Toronto Information Security Forum is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

  • Webinar 2019 Q1 Managing The 2019 Threat Landscape

    , 2019 Threat

    In this webinar, IANS Research Director Bill Brenner and IANS Faculty Member Joshua Marpet look at what to expect for threats in 2019 and, most importantly, how best to prepare for those threats. They will also discuss what they see as the coming advances in security technology and process, and how get ahead of the curve.

  • Symposium 2019 Q1 Seattle Navigating the Path to Cloud Security Maturity

    , Seattle

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 Portland Navigating the Path to Cloud Security Maturity

    , Portland

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 NewYork IAM Strategies that Work: Vendor-Agnostic “How-To” Guidance

    , New York

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • Symposium 2019 Q1 Washington DC Navigating the Path to Cloud Security Maturity

    , Washington

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 Minneapolis IAM Strategies that Work: Vendor-Agnostic “How-To” Guidance

    , Minneapolis

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • Symposium 2019 Q1 Denver Navigating the Path to Cloud Security Maturity

    , Denver

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 San Francisco How to Mature Your Application Security Program

    , San Francisco

    Fortune 1000 companies face myriad challenges when it comes to application security. They don't know how to run an effective bug bounty program. They don't know whether to do manual or automated web app pen testing or go with a more hybrid approach. And they spin up containers quickly, setting them loose with no security due diligence.

  • Symposium 2019 Q1 Nashville Navigating the Path to Cloud Security Maturity

    , Nashville

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Webinar 2019 Q1 5 Steps To Choosing A Cloud Provider

    , Cloud Provider

    You need to choose the cloud provider that best fits the needs of your organization, but there are too many vendors, an over-saturated market and confusion over security requirements that truly matter vs. vendor fluff.

  • Symposium 2019 Q1 Atlanta Deception

    , Atlanta

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • Symposium 2019 Q1 Charlotte Navigating the Path to Cloud Security Maturity

    , Charlotte

    Securing the cloud is fundamentally different, yet there are very few guidebooks or clear methods to ensure adequate protection. Leading-edge organizations are doing amazing things with cloud-native and DevSecOps approaches, but they’ve matured their security operational capabilities the hard way.

  • Symposium 2019 Q1 Los Angeles Deception

    , Santa Monica

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • Symposium 2019 Q1 Chicago Deception

    , Chicago

    Deception is an effective tool to detect APT adversaries that have already bypassed traditional detection schemes. These attackers will continue to maneuver in the network unchecked unless we put something in the way to entice them to make a mistake. Deception arms organizations that already have a robust security program with a safety net to catch attackers who have already made it inside, or are working their way in.

  • Webinar 2019 Q1 Vendor Optimization: Thinning The Herd

    , Vendor Optimization

    Security vendors have expanded offerings in a way that has created a lot of overlap and complexity within company environments. This webinar will explore how to do an assessment and logically start pruning your stack.

  • Symposium 2019 Q1 Philadelphia Vulnerability Management

    , Philadelphia

    Companies have limited resources to keep up with an endless pile of vulnerabilities and patches and need to determine what they keep getting wrong and what others are doing that’s right.

  • Symposium 2019 Q1 Boston IAM Strategies that Work: Vendor-Agnostic “How-To” Guidance

    , Boston

    Facing the cloud and its mobile constituency, investments in end-point protection and next generation firewalls are powerless. In these environments, it is identity that stands between information assets and a world of possible threats. Yet few organizations have prioritized the development of a practical strategy for the planning, execution, operation, and governance of Identity and Access Management (IAM). This under-investment creates an identity debt that will increasingly be paid with inefficiencies and incidents.

  • Forum 2019 Q1 Dallas

    , Dallas

    IANS Forum content is designed for senior-level information security executives across all industries. Attendees include CISOs, CIOs, VPs and Managing Directors of Information Security, Senior Information Security Architects, and Senior Information Security Engineers.

  • CISO Roundtable 2019 Q1 Dallas

    , Dallas

    This 1-day roundtable at the Dallas Information Security Forum is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

  • CISO Roundtable 2019 Q2 Toronto

    , Toronto

    This 1-day roundtable at the Toronto Information Security Forum is designed exclusively for CISOs and senior level information security executives to learn and share insights in a confidential setting.

Check out IANS other upcoming events