CIO/ CISO National Virtual Panel
June 18, 2020
ACCESS MANAGEMENT & AUTHENTICATION
Today’s enterprises depend on the cloud, data, and software in order to make decisive decisions. That’s why the most respected brands and largest organizations in the world rely on Thales to help them protect and secure access to their most sensitive information and software, wherever it is created, shared, or stored – from the cloud and data centers to devices and across networks. Our solutions enable organizations to move to the cloud securely, achieve compliance with confidence, and create more value from their software in devices and services used by millions of consumers every day. Operating in the cloud brings additional security concerns for organizations – not only the increased risks associated with data breaches, but also the challenges faced with simplifying access for users and enabling compliance. Over 25,000 organizations and 30 million users worldwide across all industries rely on our innovative access management and authentication services to secure their digital and cloud transformation initiatives. You can rely on authentication and access management solutions from Thales to prevent data breaches, support cloud adoption and enable compliance by simplifying and securing access to all of your applications.
Decisive technology for decisive moments. More information here: https://cpl.thalesgroup.com/access-management
Speakers Include...
Eric Avigdor
Director of Product Management, Thales
Thomas J. Malta
SVP & Head of IAM Access Controls, Wells Fargo
Nancy Davoust
Vice President, Security Architecture, Identity, Authentication and Access Management, Comcast
Sundaram Lakshmanan
CTO, CipherCloud
Morey Haber
CTO & CISO, BeyondTrust
Speaker: Eric Avigdor is a Senior Director of Product Management at Thales. He manages business and Go To Market strategy for Thales’ Identity and Access Management business.
In this role Eric oversees Global activities for growth and expansion of Thales’ Access Management and Authentication portfolio.
In his 20 years in the industry, most of which in the cyber security space, Eric has led R&D, Business development and Product Management teams.
Invited Members Include...
Agenda
12:30pm-12:40pm (EST)
Opening Remarks & Executive Introductions
12:40pm-1:20pm (EST)
CXO Panel Hosted by Sponsor
1:20pm-2:00pm (EST)
Executive Discussion
Title Representation
Industry Breakdown
Org. Size by Revenue
Got questions? We’ve got answers!
Why should I attend?
Your time is valuable and we make sure to make the most of it! We take the time to figure out your challenges and customize your experience to meet your needs. Our agendas are tailored to your feedback and we pride ourselves in covering the most cutting-edge content delivered by renowned industry experts. Look forward to building enduring partnerships and together we’ll go straight to the top.
Where is the event taking place?
The event is by invitation-only. The location will be released to all attendees once your registration has been confirmed.
What is the dress code?
We recommend business attire. Most attendees wear suits or comparable attire. Ties are optional.
Can I bring a colleague with me?
Yes! We always urge our members to refer their colleagues! We love adding new members to the community, especially if they come highly recommended by a current member. Either have them reach out to your Apex POC or have them fill out the Member Registration Form.
What if I have dietary restrictions?
No problem! Please let your Apex POC know as soon as possible in order for us to work with the venue on providing alternate options for you at the event.
What if I want to speak at an assembly?
Apex is always looking for speakers that can contribute their valuable insight. If you would like to speak, please contact your Apex POC or fill out the Speaker Registration Form on the Assemblies page. Please keep in mind that we receive many inquiries for speaking and sessions are available on a first come first served basis. But no need to worry, we have plenty of opportunities available at future assemblies.
I plan on being in attendance, but what if something comes up and I have to cancel?
We understand that something may come up on your calendar! Before canceling with us, please know that we will have a separate room for attendees to step out for work-related activities (meetings, emails, conference calls, etc.). If you must cancel, we just ask that you let us know at least 48 hours in advance so that we can open up the waitlist for another member.
Compelling events have the power to transform and accelerate key enterprise IT initiatives. This has been all too evident in the Covid-19 emergency where the need to rapidly enable remote employees aligned with key strategic IT initiatives relating to digital transformation and cloud adoption. The intensity and scale of the emergency also revealed gaps in security and weaknesses in perimeter security schemes.
Join us in this executive round table event to discuss the key role that cloud-based access management and authentication can play in enabling and supporting your key IT digital transformation and cloud security initiatives.