We’ve answered a few FAQs to get you started. Still have questions? Please don’t hesitate to reach out!
Industry Leading Solution Providers
Meet One2One with the partners best suited to tackle your unique challenges.
Over 30 Speakers
Learn from the leaders driving IT innovation in our rapidly evolving climate.
Enjoy complimentary gifts on us, simply for taking part and exploring innovation in your sector.
Using the same data-driven matching logic as our in-person events, we take the legwork out of finding new partners. Meet directly with companies vetted specifically for you to confidently tackle your challenges, within your budget and time frame. There is a minimum of 6 meetings, and no maximum.
The challenge of digital is no exotic location, no 5-star dining, and no face time. But we do have a quite brilliant system connecting you with the right people and rewarding you for it. Take all 6 solution provider meetings and we’ll thank you generously. Being a business leader is tough, especially at the moment; you’re well-deserving of an exceptional experience, no matter the limitations.
Watch it when it’s released, or later on demand. Your experience is up to you.
Please Join the Vice President, Corporate and Information Security, CSO CISM of RICOH USA, Inc., David Levine in this Executive Interview where he will discuss how a third party risk management program is a critical component of an effective cybersecurity plan.
5G implementation across the globe creates new opportunities and efficiencies for many businesses, however its use will also create increased cybersecurity risk. If you are planning to use 5G, as a business you must be prepared. Because 5G is the conversion to a mostly all-software network, future upgrades will be software updates and because of the cyber vulnerabilities of software, the tougher part of the real 5G roll out is to retool how we secure the most important network of the 21st century and the ecosystem of devices and applications that sprout from that network.
The COVID-19 pandemic has created an environment where, more than ever before security professionals need to consider the total threat landscape. Economic hardship, increased isolation, weakened control systems and other factors have resulted in new threats and increased vulnerabilities.
Threats that arise in the cyberworld can have physical security implications and vice versa. We can no longer allow ourselves to segregate these two disciplines. Insider threats can transcend the physical and digital, threatening online communications can escalate into a physical attack. To mitigate risk, we need to look to our colleagues to share information and collaborate like never before. This session will help you:
Prior to COVID-19, often when IT leaders made budget requests for tools and software (most that would eventually become mission critical during the massive upheaval), they were given little attention. It is no secret amongst IT leaders that in reality the person with the most influence gets what they need and the person describing the realities of a risk that feels the most foreign to the business tends to end up with the least! In 2021 however boards are listening, on the back of a raft of COVID-related business outcomes. So, with an open goal what should CIOs be fighting for? Many would argue the answer to this is clearing technical debt, as it has implications for operating budgets, security, maintenance, creating space for IT upskilling and of course protection against unforeseen events. Others would say that security is the top priority now, given the frequency of attacks seen during lockdown for example. Anything else is a benefit and will likely lead to removal of some tech debt in the process. So, should a CIO’s top priority be Cyber Security?
InfoSec: CONNECT is invitation-only for IT executives. Exclusivity lets us cater to your specific challenges and keep you in the company of the leaders driving progress in your field.
We only work with the best in class. All solution providers are thoroughly vetted, and matched to you based on your specific challenges and current projects.
InfoSec: CONNECT Virtual Summit is the digital counterpart to the invitation-only summit for IT executives. InfoSec: CONNECT bridges you to the information and solutions most relevant to your top priorities.
InfoSec: CONNECT Virtual Summit is unique in its ability to connect you to qualified solution providers. Our partners are willing to cover the cost of your attendance, in order to gain access to such an exclusive audience.
Your virtual pass includes:
– All sessions and their recordings
– 6-8 one-on-one meetings with vetted solution providers, specifically matched to you
– £300-£500 in gifts upon meeting completion
Based on the details of your registration, we carefully select at least 6 best-fit solution providers for you to meet with. Each meeting is 30 minutes long and focused on solving a specific priority you have listed. Once completed, you’re eligible to receive a gift package. All meetings will take place on Zoom and all logistics are handled for you!
We are looking for executives with genuine needs for new solutions and buying influence or authority. Invitations are extended to C-level executives, SVPs, VPs, Directors and Managers within all functions of Security and Information Technology.
Yes! But only for your One2Onemeetings. The summit sessions, however, will all be available to you on demand to watch at your leisure, anytime, any place.
There’s a lot of reasons to attend! For starters, InfoSec: CONNECT Virtual Summit is the only online event customised to help you with your current challenges. You’ll learn from industry veterans and connect to the solutions you need. Your time is valuable and sticking to your budget is more important than ever. InfoSec: CONNECT is designed to help you maximise your time and money for the best possible results.