Session
Executive Summaries.

A community of IT executive thought leaders driving innovative ideas and peer collaboration.

Desktop and Mobile illustration
Gamifying Phishing and Securing Your Campus
June 7, 2021

Gamifying Phishing and Securing Your Campus

To truly secure your organization, it’s important to put security at the forefront of every strategic decision you make.

The Rise Of Next-Gen Software Supply Chain Attacks
June 7, 2021

The Rise Of Next-Gen Software Supply Chain Attacks

Bad actors are no longer waiting for public vulnerabilities. They’re actively injecting malicious code into open-source projects that feed the global supply chain.

Securing Frictionless Customer Experiences
May 17, 2021

Securing Frictionless Customer Experiences

Consumers expect a quick and frictionless experience in today's digital-first world when accessing any product or service. However, while delivering these frictionless experiences, it's also essential to consider their security ramifications.

Access Management in a Disruptive & Digitally Transforming World
May 12, 2021

Access Management in a Disruptive & Digitally Transforming World

Multi-factor authentication (MFA) and one-time-passwords (OTPs) are being used to verify identities, some argue, at the cost of customer convenience. So how do you implement security controls for your customers without asking them to do too much?

Avoiding Failure In Digital Transformation Journeys
May 12, 2021

Avoiding Failure In Digital Transformation Journeys

A digital transformation journey isn’t as easy as onboarding a third-party provider and training your workforce. There is a lot that can go wrong, and steps must be taken to prevent that.

The Risk of Third-Parties & Protecting Your Network
May 11, 2021

The Risk of Third-Parties & Protecting Your Network

Virtually every business in the world has to deal with third parties. Whether you want to host something in the cloud or want a collaboration tool for your remote workforce, it’s much more feasible to seek a third-party product or service instead of reinventing the wheel.

Best Practices In Evaluating Vendors For Risk
April 29, 2021

Best Practices In Evaluating Vendors For Risk

Third-party collaborations don’t come without security risks. More cyberattacks are stemming from third-party integrations than ever before. So, how do you assess risk before onboarding the third party? And how do you manage their access lifecycle?

Transforming Into an API-driven Architecture
April 26, 2021

Transforming Into an API-driven Architecture

More and more companies worldwide are shifting to API-driven architectures to revamp service delivery and decrease the time-to-market. But the shift doesn’t come without its challenges.