NOREX IT Roundtable: Cybersecurity/ IT Security (Virtual)
This event is only for IT Leaders from Forbes / Fortune 1000 organizations.
Given the ever-evolving nature of cyber threats, keeping the organization safe is an ongoing process that requires continuous improvement and vigilance. Connect with Cybersecurity / IT Security leaders from enterprise-level organizations in this 3-hour, professionally moderated Virtual Roundtable to discuss strategies to strengthen the organization’s cybersecurity posture, phishing, security recovery planning, identifying vulnerabilities, tools, and more. How often does your organization conduct security risk assessments and vulnerability scans?
Reserve Your Spot
Wed, Nov 1 / 10:00am-1:00pm CT
Session times are approximate and will include two 5-minute breaks.
10:00 AM – Attendee Introductions & Company Overviews
Current and future cybersecurity and IT security initiatives are snared by each Member organization. What are the key factors that best align with your business objectives? What were your primary challenges and wins over the past year?
10:20 AM – Session 1: Organizational Issues, Frameworks, and Compliance
Members discuss current challenges aligning IT security strategy with business objectives While effectively meeting compliance requirements, managing risk, costs, and programs?
11:15 AM – Session 2: Securing Applications, Data, and Network Operations
What milestones are you targeting as you move toward modem 1AM or passwordless environments? Members share best practices and tools lor all layers or security, including Cloud, endpoint protection, effective patch management, multi-factor authentication, antivirus I firewall, OLP, phishing, network I system monitoring, and IDS IIPS. How Is external access to your network managed I provided during an Incident?
12:15 AM – Session 3: Identifying Threats and Vulnerabilities
Understanding risks critical to business operations Includes early threat detection and vulnerability management tools, remediation, metrics. Red / Blue teams, tabletop exercises, and more. Has your organization implemented zero trust techniques?
1:00 PM – Adjourn
Session times are approximate and will include two 5-minute breaks.
10:00 AM – Attendee Introductions & Company Overviews
Current and future cybersecurity and IT security initiatives are snared by each Member organization. What are the key factors that best align with your business objectives? What were your primary challenges and wins over the past year?
10:20 AM – Session 1: Organizational Issues, Frameworks, and Compliance
Members discuss current challenges aligning IT security strategy with business objectives While effectively meeting compliance requirements, managing risk, costs, and programs?
11:15 AM – Session 2: Securing Applications, Data, and Network Operations
What milestones are you targeting as you move toward modem 1AM or passwordless environments? Members share best practices and tools lor all layers or security, including Cloud, endpoint protection, effective patch management, multi-factor authentication, antivirus I firewall, OLP, phishing, network I system monitoring, and IDS IIPS. How Is external access to your network managed I provided during an Incident?
12:15 AM – Session 3: Identifying Threats and Vulnerabilities
Understanding risks critical to business operations Includes early threat detection and vulnerability management tools, remediation, metrics. Red / Blue teams, tabletop exercises, and more. Has your organization implemented zero trust techniques?
1:00 PM – Adjourn
