CIO/ CISO Membership Dinner
September 10, 2019
Boston, MA
Security in the Digital Age
Thales e-Security is a leader in advanced data security solutions and services that deliver trust wherever information is created, shared or stored. Thales e-Security is part of Thales Group. www.thalesesecurity.com
Invited Members Include...
Title Representation
Industry Breakdown
Org. Size by Revenue
Agenda
5:00pm-5:30pm
Registration
5:30pm-6:15pm
Cocktails & Networking
6:15pm-6:30pm
Welcome & Introductions
6:30pm-8:30pm
Private Dinner
Got questions? We’ve got answers!
Why should I attend?
Your time is valuable and we make sure to make the most of it! We take the time to figure out your challenges and customize your experience to meet your needs. Our agendas are tailored to your feedback and we pride ourselves in covering the most cutting-edge content delivered by renowned industry experts. Look forward to building enduring partnerships and together we’ll go straight to the top.
Where is the event taking place?
The event is by invitation-only. The location will be released to all attendees once your registration has been confirmed.
What is the dress code?
We recommend business attire. Most attendees wear suits or comparable attire. Ties are optional.
Can I bring a colleague with me?
Yes! We always urge our members to refer their colleagues! We love adding new members to the community, especially if they come highly recommended by a current member. Either have them reach out to your Apex POC or have them fill out the Member Registration Form.
What if I have dietary restrictions?
No problem! Please let your Apex POC know as soon as possible in order for us to work with the venue on providing alternate options for you at the event.
What if I want to speak at an assembly?
Apex is always looking for speakers that can contribute their valuable insight. If you would like to speak, please contact your Apex POC or fill out the Speaker Registration Form on the Assemblies page. Please keep in mind that we receive many inquiries for speaking and sessions are available on a first come first served basis. But no need to worry, we have plenty of opportunities available at future assemblies.
I plan on being in attendance, but what if something comes up and I have to cancel?
We understand that something may come up on your calendar! Before canceling with us, please know that we will have a separate room for attendees to step out for work-related activities (meetings, emails, conference calls, etc.). If you must cancel, we just ask that you let us know at least 48 hours in advance so that we can open up the waitlist for another member.
Scaling Multicloud and Hybrid Cloud Usage without Sacrificing Data Security and Compliance
On September 10, 2019, Apex Assembly proudly hosted an exclusive CIO/ CISO Dinner in Boston, MA. The invitation-only event united leading Security IT decision makers and business leaders from the metropolitan area to address key challenges, industry insights and business goals. The private dinner brought together like-minded executives in an intimate setting, ensuring the development of organic conversations and the establishment of long-lasting business relationships.
Analysts claim that 50% of today’s public cloud data and workloads will migrate to private clouds in the next two years. But, don’t worry about the public cloud behemoths because their average CAGR continues above 20%. However, the result is that cloud data is spreading across multiclouds and increasingly migrating to private clouds that offers the Enterprise more control. This acceleration in lift and shift of workloads creates data security and compliance risks as well as management complexities. In this discussion, we’ll share trends and best practices for enabling data portability without compromising security, compliance, and operational efficiencies.
Take Aways:
· Sharing trends seen by analysts and your peers on multicloud adoption and challenges
· Discussion of best practices for leveraging native cloud data security services effectively to maintain compliance and control
· Methodology for efficiently applying data security techniques that allow for secure lift and shift between public and private clouds