We’ve answered a few FAQs to get you started. Still have questions? Please don’t hesitate to reach out!
Industry Leading Solution Providers
Meet One2One with the partners best suited to tackle your unique challenges.
Over 30 Speakers
Learn from the leaders driving IT innovation in our rapidly evolving climate.
Enjoy complimentary gifts on us, simply for taking part and exploring innovation in your sector.
Using the same data-driven matching logic as our in-person events, we take the legwork out of finding new partners. Meet directly with companies vetted specifically for you to confidently tackle your challenges, within your budget and time frame. There is a minimum of 6 meetings, and no maximum.
The challenge of digital is no exotic location, no 5-star dining, and no face time. But we do have a quite brilliant system connecting you with the right people and rewarding you for it. Take all 6 solution provider meetings and we’ll thank you generously. Being a business leader is tough, especially at the moment; you’re well-deserving of an exceptional experience, no matter the limitations.
Watch it when it’s released, or later on demand. Your experience is up to you.
The rapidly growing increase in cyberattacks worldwide comes at a hefty cost for businesses to better protect their computer networks from intrusions. Cyberattacks not only are increasing in frequency, but they are costing victims larger financial losses.
During this session, we’ll consider what might be on the horizon and where cybersecurity could be heading.
Asana’s analysis of over 13,000 employees found that misalignment and disengagement, fuelled by rising burnout and a lack of clarity at work, presents an urgent challenge to businesses today. After a year of disruption, Product Leader Paige Costello at Asana will provide valuable advice for organisations that want to learn from recent challenges and begin building more resilient, adaptable, and engaging workplaces that will drive operational excellence.
Join Druva’s Vice President & General Manager in EMEA, as he introduces the industry’s first and only at-scale SaaS solution that can advance an organisation’s cyber, data, and operational resilience without any hardware, software, or associated complexity.
Your business runs on content, and it’s time you put it to work. Sales contracts, product specs, marketing assets and videos — files like these are at the heart of your processes, but are often poorly managed across multiple, siloed systems. With the Content Cloud, you can securely manage the entire content lifecycle, from file creation and sharing, to co-editing, signature, classification, and retention. Hear from Aaron Levie, Box co-founder and CEO to find out why 67% of the Fortune 500 trust Box to get their work done.
Prior to COVID-19, often when IT leaders made budget requests for tools and software (most that would eventually become mission critical during the massive upheaval), they were given little attention. It is no secret amongst IT leaders that in reality the person with the most influence gets what they need and the person describing the realities of a risk that feels the most foreign to the business tends to end up with the least! In 2021 however boards are listening, on the back of a raft of COVID-related business outcomes. So, with an open goal what should CIOs be fighting for? Many would argue the answer to this is clearing technical debt, as it has implications for operating budgets, security, maintenance, creating space for IT upskilling and of course protection against unforeseen events. Others would say that security is the top priority now, given the frequency of attacks seen during lockdown for example. Anything else is a benefit and will likely lead to removal of some tech debt in the process. So, should a CIO’s top priority be Cyber Security?
IDG’s 2020 Cloud Computing survey revealed that strategic cloud migration is a top CIO priority. However, IT leaders also report they’re facing challenges in public cloud adoption. In this webinar, Rob Duffy, Head of Migration Practice at Cloudreach, and Barnaby Jeans, Senior Partner Development Manager at Microsoft join IDG to examine why and how companies should approach cloud migration to meet business objectives.
The current model of getting work done by leveraging technology as the tool and IT as the sole tool-enabler has run its course. Technology savviness and expertise are no longer professional specializations and are becoming basic requirements to get any work done in the business context. That leads to technology architecture and operations becoming democratized as opposed to being owned and controlled by a central IT function. This session looks at this trend and presents a holistic picture on how businesses can weave technology as an underpinning to the way work gets done going forward.
CISOs are increasingly being asked to produce actionable cyber risk reports for their boards of directors. Unfortunately, communicating cyber risk in business terms is often a challenge.
Join ThreatConnect’s VP Cyber Risk Strategy, Gerald Caponera for masterclass on building board-friendly cyber risk reports.
In recent years, ransomware incidents have become more destructive and impactful in nature and scope. With the potential to severely impact business processes and the data needed to operate and deliver critical services, ransomware has rapidly emerged as one of the most important cybersecurity risks.
During this session, we’ll consider how to tackle ransomware attacks and best position your organisation.
Learn how to adopt and follow the 8 principles of cyber security leadership in order to be an effective cyber security leader and align the security program with business objectives. Change your personal and security team’s mindset from “trying to win at security” to “not losing to malicious actors. Finally, utilize the 8 principles to expand security’s reach into departments which desperately need assistance.
Introduction to CTI Cyber threat intelligence can be leveraged to provide a huge advantage over sophisticated malicious actors and automated commodity cyber attacks your organization is facing. Establishing a CTI program is extremely cost effective and can assist in focusing IT resources on taking proactive action to avoid the consequences of a data breach. With an abundance of (mostly) free tools the CTI program can quickly move the organization to be intelligence lead when it comes to vulnerability management and maintaining a robust cyber security posture.
An insight into the Cyber profession from the Ministry of Defence.
Learn how and why competitive advantages are vital in todays technology driven world.
Many CIO’s (IT Managers/Digital Leaders) have found themselves with a new voice since the outset of the global pandemic. For others though, it feels like not much has changed, and for these leaders it is a question of why – what is different in their organisation compared to others?
During this session, I will discuss how to take advantage of what is a unique opportunity to grow influence for the benefit of your organisation.
The Spectator is the worlds oldest magazine. But that didn’t stop us pursuing the worlds best tech — Microservices, APIs, Cloud and Headless. Together they make MACH, which is the key to delivering amazing commerce and digital experiences to your customers.
Main cloud vendors are making a huge bet on products like Google BigQuery, Amazon Redshift, Snowflake, Azure DataBricks, etc. They’re changing the way organizations deal with their data and it’ll change how we build the next generation of digital products.
Connecting your product with customer data is becoming mandatory in enterprise products.
During this talk I’ll explain how we’re evolving CARTO to deal with this new reality and how our customers love this new approach in which they don’t need to move their data outside of their data warehouse
We will review case studies from real-world projects that built AI systems that use Natural Language Processing (NLP) in healthcare. These case studies cover projects that deployed automated patient risk prediction, automated diagnosis, clinical guidelines, and revenue cycle optimization.
2020 saw an increase in cloud migration for justifiable reasons – the shift to home working, urgent business continuity and the remote provision of services. From a security perspective unplanned or misunderstood cloud adoption has a host of dangers for business and organisation leadership. At the heart of this a potential gap in technology and business expectations from the use of cloud, whatever that really means. How do security, technology and business leadership achieve mutual understanding on meeting business objectives through cloud technologies that provides the services the business wants, through the technology that cloud can provide with the right security to protect assets that the business values? But what about the risk – it’s on the Internet remembers! Without joint buy-in it is a road to disappointment all round, but how do you get this? Learn about the road that ONS has taken to bring security, business, and technology together with joint vision to support its national mission while address risk concerns.
In this talk David Prince and Greg Wilson from Baringa Partners will share their experience supporting organisations to develop effective and strategically aligned operating models for security. They will talk about the common symptoms of poor operating models, and their suggested approach and lessons learnt that security leaders can consider when designing the future of their security functions.
The idea of the session will be to outline and discuss, how software development has changed/is changing from a bespoke, custom developoment process towards integrating existing components and services.
What is the impact for suppliers? What does this change in the skills needed
An agile level 2 board provides the possibility to get a transparent overview of all running and postponed projects to achieve a strategically good prioritization with different parameters.
The board is aligned to the strategy of the company and embedded in an overall process.
InfoSec: CONNECT is invitation-only for IT executives. Exclusivity lets us cater to your specific challenges and keep you in the company of the leaders driving progress in your field.
We only work with the best in class. All solution providers are thoroughly vetted, and matched to you based on your specific challenges and current projects.
InfoSec: CONNECT Virtual Summit is the digital counterpart to the invitation-only summit for IT executives. InfoSec: CONNECT bridges you to the information and solutions most relevant to your top priorities.
InfoSec: CONNECT Virtual Summit is unique in its ability to connect you to qualified solution providers. Our partners are willing to cover the cost of your attendance, in order to gain access to such an exclusive audience.
Your virtual pass includes:
– All sessions and their recordings
– 6-8 one-on-one meetings with vetted solution providers, specifically matched to you
– £300-£500 in gifts upon meeting completion
Based on the details of your registration, we carefully select at least 6 best-fit solution providers for you to meet with. Each meeting is 30 minutes long and focused on solving a specific priority you have listed. Once completed, you’re eligible to receive a gift package. All meetings will take place on Zoom and all logistics are handled for you!
We are looking for executives with genuine needs for new solutions and buying influence or authority. Invitations are extended to C-level executives, SVPs, VPs, Directors and Managers within all functions of Security and Information Technology.
Yes! But only for your One2Onemeetings. The summit sessions, however, will all be available to you on demand to watch at your leisure, anytime, any place.
There’s a lot of reasons to attend! For starters, InfoSec: CONNECT Virtual Summit is the only online event customised to help you with your current challenges. You’ll learn from industry veterans and connect to the solutions you need. Your time is valuable and sticking to your budget is more important than ever. InfoSec: CONNECT is designed to help you maximise your time and money for the best possible results.
Exciting news! All of our executive tools and services are now available under one roof. Quartz Network now includes Quartz Events, our industry-leading executive summits, Quartz Education, our on-demand peer-led content, and Quartz Network Solutions, our streamlined B2B solution-finding platform.