Webinars

Webinars

  • Turn Your Security Challenges into Opportunities

    Cyberattackers are not showing any signs of slowing down -- in fact, cyberattacks are worsening. Several factors are responsible for that with some being directly linked to the global pandemic – thanks, COVID! Infosec teams must change their security practices to address the challenges of today and the future. In this conversation among experts, you will gain insights to help you keep your organization secure in an evolving threat landscape. Learn how can you limit the impact of future ransomware and supply chain attacks, how you can differentiate cloud security solutions, and more. Moderated by: Melinda Marks, Senior Analyst, ESG Featureing: Matt Hathaway, Chief Strategy & Marketing Officer, TrueFort Read More

  • How to Build a Strong Data Security Strategy

    IT and infosec teams must think proactively and creatively about their data protection strategies, but getting there can be challenging. In this panel, cybersecurity experts delve into the trends and activities putting data at risk in the enterprise and how you can use emerging technologies to mitigate those risks. Explore key considerations for embarking on a cloud transformation journey or zero trust strategy, common mistakes organizations make as they build out their data security strategy, and more. Use these insights to help you construct a rock-solid data security strategy. Moderated by: Jack Poller, Senior Analyst, ESG Featuring: James Christiansen, VP and CSO Cloud Strategy, Netskope David Richardson, VP, Product Management, Lookout Read More

  • How to Build a Strong Data Security Strategy (Panel Discussion)

    IT and infosec teams must think proactively and creatively about their data protection strategies, but getting there can be challenging. In this panel, cybersecurity experts delve into the trends and activities putting data at risk in the enterprise and how you can use emerging technologies to mitigate those risks. Explore key considerations for embarking on a cloud transformation journey or zero trust strategy, common mistakes organizations make as they build out their data security strategy, and more. Use these insights to help you construct a rock-solid data security strategy. Moderated by: Jack Poller, Senior Analyst, ESG Featuring: James Christiansen, VP and CSO Cloud Strategy, Netskope David Richardson, VP, Product Management, Lookout Read More

  • End User Protection Strategies for 2022 and Beyond

    When it comes to end user cybersecurity and protection, there is no better method to improve cybersecurity than to educate your staff. A well-informed workforce is one of the best tools in the fight against cybersecurity breaches. But let’s be real, how easy is this? In this panel conversation, industry experts will share their insights on key areas that organizations should address when tackling data security and privacy. Moderated by: Jack Poller, Senior Analyst, ESG Featuring: Dr. Chris Pierson, Founder & CEO, Blackcloak Read More

  • Understanding a Risk-Based Approach to Cybersecurity

    Most organizations would agree that the greatest cybersecurity risks would cause the most interruption to the business. But how can CISOs and infosec professionals get ahead of potential risks and prioritize those? This conversation will explore how organizations can focus on a risk-based approach to cybersecurity, cybersecurity in the boardroom, and more. Moderated by: Doug Cahill, VP, Analyst Services, Sr. Analyst, ESG Featuring: Jonathan Trull, CISO, Qualys Read More

  • Build a Network Security Strategy that Works for You, Not Cyberattackers

    The rise in cloud adoption, remote work, and other digital transformation efforts are forcing organizations to adapt how they are managing network security. This is proving to be challenging considering there is no one-size-fits-all approach to network security. Tune into this panel discussion where experts will provide insights on how organizations can use emerging concepts like SASE, next-gen firewalls and zero trust to help enhance their network security strategy. Moderated by: John Grady, Senior Analyst, ESG Featuring: Nick Edwards, VP Product Management, Menlo Security Read More

  • Securing the Cloud-Native Enterprise

    Cloud-native applications are proliferating in even the most traditional IT environments, but the ability to secure these applications and environments has fallen behind. This fireside chat explores how security organizations can embrace cloud native by automating processes through DevSecOps, considering cloud-native application protection platforms, and more. Moderated by: Melinda Marks, Senior Analyst, ESG Featuring: Jonathan Nguyen-Duy. Vice President, Field CISO Team. Fortinet Read More

  • Navigating Privileged Access Management, Zero Trust and MFA

    Privileged access management (PAM) can be essential for organizations that are growing or have a large, complex IT system. But how do you use PAM to support a zero trust strategy? What are the collateral impacts of a poorly managed PAM strategy? This conversation among Enterprise Strategy Group cybersecurity analysts and industry leaders will explore the role of PAM in zero trust and why strong authentication is the cornerstone of zero trust. You will learn about the latest breaches and insider threats, emerging trends, cybersecurity best practices, and more. Moderated by: Dave Gruber, Principal Analyst, ESG Featuring: Pierre Viljoen, Global Head of Enterprise Technology and Governance, Enterprise Studio by HCL Technologies Clayton Donley, Vice President and General Manager, Identity Management Security Division, Broadcom Software Lee Howarth, Head of Product Management, Identity and Access Management, Broadcom Software Read More

  • Cybersecurity Operations for Today’s Threat Landscape

    A network that is compromised behaves differently than a network than it is not. Organizations need to shift their mindset and look for contacts with adversary infrastructure and they need to do so continuously and intentionally. This conversation with experts will explore the need to operate cybersecurity proficiently, how infosec professionals can embrace the mindset change needed to ensure they are helping the business, and more. Read More

  • Your Approach to Security Operations Must Evolve

    Modern SOCs play an essential role in any organization, and this goes beyond cybersecurity -- it has to do with the business entirely. This includes everything from earning trust from employees and customers to reducing impact and costs a potential breach may incur through data loss, lawsuits, or business reputation damage. In this panel, experts discuss the tools, techniques, and skills that today’s infosec professionals need for effective security operations and management. Moderated by: Jon Oltsik, Sr. Principal Analyst, ESG Fellow Featuring: Joel Vincent, VP, Product and Technology Marketing, Cribl Read More