Welcome to the BrightTALK Summit series. Our summits are a collection of topical webcasts run over the course of one or two days focused on a variety of relevant and timely subjects that matter most to you. They are free to attend. Choose all or specific summit webcasts to attend live or on demand.
Live & upcoming summits
Cyber-attacks are increasing at an exceptional rate – From DDOS attacks by “Hacktivists” groups to individual phishing attacks and state-sponsored cyber-espionage, the threat landscape has never been so fierce. As ..
In a global business environment, organizations are facing a tough challenge when it comes to staying compliant with regional, national and international regulations. With heavy penalties for non-compliance, effective st..
Threat and risk management is vital for a sound business strategy. Join thought leaders at this summit as they share best practices in managing threats, risk and vulnerabilities that come along with major IT trends in 20..
The ubiquity of mobile devices in the work place is putting the onus on security professionals to not simply think about BYOD and mobile, but to integrate both as keystone parts of their IT security strategies. No matter..
As auditors take on a more central and strategic role within organizations, there is increasing interaction between the internal audit team and stakeholders. Join this summit and learn from top thought leaders in the fie..
Far from the emerging technologies of 2011 and 2012 Cloud and Virtualization have arrived, allowing the modern IT team to become nimble and efficient at utilizing computing and infrastructure resources to enable their bu..
Advanced threats have entered the pantheon of security risk every IT team needs to be prepared for. The volume and velocity of data coupled with the proliferation of devices and the internet of things has create a hercul..
As mobile devices are becoming more and more sophisticated in an era of increased Bring Your Own Device acceptance, securing endpoints is becoming one of the hottest challenges in information security. Vulnerabilities in..