Products Services Support & Resources Research

Code-to-Cloud Resilience: Unpacking Exposure Management

Security Leaders' Roundtable Dinner


City Social

Wednesday, 12th February, 2025

6.30 PM to 9:00 PM

10 minute walk to Liverpool Street Station

15 minute walk to Barbican Centre Car Park

Organisations now face unprecedented challenges in detecting high-risk exposures and securing their cyber assets. This roundtable offers a unique opportunity to share personal insights, experiences, and strategies around managing digital risk. This gathering will foster meaningful conversations on proactive approaches to vulnerability reduction, threat visibility, and resilient security practices.

Network with peers, gain fresh perspectives, and engage in discussions that aim to shape the future of exposure management in cybersecurity.

Chatham House Rules apply.

Agenda:
  • 6.30 PM: Arrival and welcome
  • 7.00 PM: Introductions, discussion and dinner
  • 9.00 PM: Close
This event is invite-only, designed for information security professionals working within end-user enterprises based in the UK.

Speakers

Jason-Hart.jpeg

Craig Roberts

Principal Software Engineer at Rapid7

David Brookes-Smith

Cloud Security Lead, UKI at Rapid7


Register your interest in joining us below

Please note that we have limited space capacity for this event. All registrations are subject to approval. 


Lorem ipsum dolor sit amet, consectetur adipiscing elit. Nullam mollis lacus .

Register Now

Agenda

Day Agenda

10 am - Arrival plus Coffee & Tea
10.30 am - Round Table Part 1
12.30 am - Lunch
 1.45 pm - Round Table Part 2
 3.45 pm - End

Round Table Agenda

The below agenda covers a 5 stage plan that will be drafted during the roundtable aligned to your business. The output will provide you with a draft Target Operating Model that will enable Cybersecurity to form part of your business process to maintain and manage the operational cost of Cyber Security and effectively manage risks for the business.
The plan will include but not limited to the below details: 

Stage 1 - Mapping your current Cybersecurity Operating Model and identifying gaps
Stage 2 - Understanding your non technical security challenges and mapping security technology to business process and operations
Stage 3 - Drafting of a Cyber security strategy with clearly defined objectives and goals
Stage 4 - Clearly define Cyber Security KPIs that will highlight technology, process and or people's effectiveness
Stage 5 - Drafting of Protection level Agreements to measure the effectiveness of operationalising cyber security

WEBCAST

Thank Lorem ipsum dolor sit amet, consectetur

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Cras et nulla ligula. Maecenas commodo turpis non nisi rhoncus, non gravida ligula ornare. Quisque nulla ante, malesuada ut vestibulum eu, congue id mauris. Cras eu metus risus.

EXPLORE WEBCASTSor go back to homepage
...

CUSTOMER SUPPORT
+1-866-390-8113 (Toll Free)

SALES SUPPORT
+1-866-772-7437 (Toll Free)

Need immediate help with a breach?

+1-866-772-7437

SOLUTIONS
All Solutions
Industry Solutions
Compliance Solutions

SUPPORT & RESOURCES
Product Support
Resource Library
Customer Stories
Events & Webcasts
Training & Certification
IT & Security Fundamentals
Vulnerability & Exploit Database

ABOUT US
Company
Diversity, Equity, and Inclusion
Leadership
News & Press Releases
Public Policy
Open Source
Investors

CONNECT WITH US
Contact
Blog
Support Login
Careers