Security in the Digital Age
With an alarming number of breaches, it is clear that the attack surface has greatly expanded. As enterprises work to develop a progressive strategy, there is an increasing need to deploy and manage a variety of advanced internal and external security services. This leaves the Chief Information Security Officer faced with a multitude of challenges to maintain and run a secure enterprise.
The CISO is at the center of the security dialogue and is ultimately responsible for the guidance and leadership of an increasingly intricate technology landscape. Given the weight of that responsibility, the search for the most transformative solutions that enable them to protect the enterprise is constant and the need to stay ahead of the curve, a must.
In June 2020 Apex Assembly will unite visionary leaders, entrepreneurs and industry security experts for a full day of content and networking, where we will examine the challenges of 2019 and concentrate on the most pressing issues of 2020 in the information technology security sector.
Through collaboration with our executive community, we have discovered key industry challenges and trends. These topics form the foundation of the Assembly and will be addressed through informative introductions, member roundtables, case studies and interactive workshops.
Past Speakers Include...
Topics to be covered include:
- The changing cloud compliance, risk, and cloud management framework. How to address cloud adoption and real-world cloud security challenges
- Utilizing security analytics that can help you detect compliance violations in real time while examining under behavior to speed up attack detection and response
- Ways to better manage authentication, password policies and enforce protocols to ensure consistency across enterprise-wide, customer, social and third-party systems
- What AI means for security teams and how can intelligent automation benefit your organization
- Using data governance to provide enhancement and streamlined decision making to protect the interest of data stakeholders
Invited Members Include...
- SVP/VP Level
- Sr. Director Level
- Finance & Insurance
- Healthcare & Pharma
- State & Federal Government
- Retail & Manufacturing
Org. Size by Revenue
- 250M - 500M
- 500M - 1BN
- 1BN +
Breakfast & Registration
Keynote Panel: “What are your top security concerns and how are you proactively securing the enterprise?“
Member Roundtable: “Assessing and Quantifying Cyber Risk“
Member Roundtable: “Integrated Assurance – An integrated approach to proactive risk management“
Workshop Presenter: “All your queues belong to us: Using math to sharpen security operations”
Workshop Presenter: “Cyber defense approaches: What are we missing?”
CXO Panel: “Gearing up for 2020: Best practices to secure remote worker “
Thought Leader Presenter: “Defense in Diversification: Improving cybersecurity through smart consolidation”
Member Roundtable: “Network Security & Cloud Migration”
Member Roundtable: “Security is Everybody’s Job. How a culture of secure thinking is the only way to ensure a secure environment.”
Workshop Presenter: “Web Stack Attacks: Magecart and Vendor Threats“
Workshop Presenter: “The Evolution of Threats and Threat Detection”
Lunch & Birds of a Feather
Disrupter Presenters: “Real Time Threat Handling for Defenders”
Disrupter Presenters: “Start your Journey to Passwordless authentication“
Disrupter Presenters: “Preparing for 2020 – Prioritize Unstructured Data Security and Risk“
“How Augmented Intelligence Can Make Security Tests Smarter“
WIT Panel: The Future of Women in Technology
Closing Remarks & Raffle Drawing
Cocktail Hour and Networking
Got questions? We've got answers!
Why should I attend?
Your time is valuable and we make sure to make the most of it! We take the time to figure out your challenges and customize your experience to meet your needs. Our agendas are tailored to your feedback and we pride ourselves in covering the most cutting-edge content delivered by renowned industry experts. Look forward to building enduring partnerships and together we’ll go straight to the top.
Where is the event taking place?
The event is by invitation-only. The location will be released to all attendees once your registration has been confirmed.
What is the dress code?
We recommend business attire. Most attendees wear suits or comparable attire. Ties are optional.
Can I bring a colleague with me?
Yes! We always urge our members to refer their colleagues! We love adding new members to the community, especially if they come highly recommended by a current member. Either have them reach out to your Apex POC or have them fill out the Member Registration Form.
What if I have dietary restrictions?
No problem! Please let your Apex POC know as soon as possible in order for us to work with the venue on providing alternate options for you at the event.
What if I want to speak at an assembly?
Apex is always looking for speakers that can contribute their valuable insight. If you would like to speak, please contact your Apex POC or fill out the Speaker Registration Form on the Assemblies page. Please keep in mind that we receive many inquiries for speaking and sessions are available on a first come first served basis. But no need to worry, we have plenty of opportunities available at future assemblies.
I plan on being in attendance, but what if something comes up and I have to cancel?
We understand that something may come up on your calendar! Before canceling with us, please know that we will have a separate room for attendees to step out for work-related activities (meetings, emails, conference calls, etc.). If you must cancel, we just ask that you let us know at least 48 hours in advance so that we can open up the waitlist for another member.