Be a voice of your industry.

Speaking at BrightTALK Originals empowers you to share your expertise to over 10 million professionals, elevates your personal brand as an industry leader, and connects you with like-minded people.

To get started, simply submit your speaking proposal by filling out our form.

Benefits of Being a Panelist

Share your insight, extend your reach, and connect with the world’s brightest professionals and experts.

By speaking in a BrightTALK Series such as Resilient Cybersecurity – This Time it’s Personal, you will become a trusted expert on topics relevant to your industry.

Your photo and bio prominently featured on the Series landing page, establishing you and your company as trusted and respected experts.

Series Overview

The Coronavirus pandemic has altered the corporate world. According to an IAPP survey, 57% of organisations reported that all, or almost all of their employees were ordered to work from home during the pandemic. Working from home requires organisations to make business-critical data readily available while also protecting it from data theft.

But how can organizations keep data inside when employees are outside? How can organisations keep up with their security measures while also staying up to date with the rate of digital transformation, and the sudden shift to remote working? And where does privacy come into all of this, has it taken a hit during the pandemic, or is it still a priority for security professionals? Finally, in all of this, it’s important to remember to place employees in the center of all key decision making and ask yourself how you can improve employee experience.

In this series we will explore:

  • The benefits of a Zero Trust Policy, and moving beyond Zero Trust, to Connected Trust
  • Keeping your data protected when you’re dealing with a distributed workforce, and key considerations to make that enable your workforce to be able to access data securely whenever, wherever
  • Keeping up with the rate of digital transformation; from cloud migration to SD WAN
  • How the pandemic has put strain on the workforce, and how to overcome this challenge

The perimeters of business have changed, and our main constant is the overlap between humans and data. How do we secure this overlap, ensuring that the correct person has access to the correct data? Join us in this series for a detailed overview from thought leaders on keeping your data protected in a turbulent environment.

Episode 1: Walking the Tightrope Between Protecting Data and Enabling Remote Workers
Filming: March 2, 2021 at 3:00 - 4:30 pm GMT

Over the last 12 months, there has been a monumental shift in remote working. However, this isn’t going to end anytime soon. Work has gone from being a location, to being an activity, and the way we work has changed forever. A Gartner survey revealed that 74% of CFOs intend to move some of their on-site staff to remote work, permanently. The problem facing many organisations is that remote working results in users and data operating outside of traditional IT defences that usually automatically trust those inside the network. Leaders must learn how to protect the data that is within their organisation, when employees are “outside”. The shift in working environments has forced leaders to make critical decisions regarding making workers remote, the use of cloud, and how to keep both their data and employees safe.

So, how can organisations protect their data, while also granting easier access to an increasingly distributed workforce? How do we enable employees to have access to data securely, wherever, whenever?

Join us in this session as we discuss:

  • The rate of change caused by the pandemic, and how this impacts security, data compliance and privacy issues for employees and customers
  • How to protect data from threats and exfiltration while granting access to it at a scale never seen before
  • How to keep remote workers safe and secure, while keeping friction out of the business, enabling employees to do their jobs
Episode 2: Zero Trust Policy: Never Trust, Always Verify
Filming: March 16, 2021 at 3:00 - 4:30 pm GMT

The catchphrase of the Zero Trust security model is “Never Trust, Always Verify. Every Time.” This attitude towards verification is especially important in a post Covid-19 world. As many workers still remain remote and require access to software from their own home devices, your security model must be diligent. However, regardless of the pandemic, data breaches have been growing in sophistication for years, and your security measures must continue to adapt to ongoing risks. According to Microsoft, 94% of companies have reported that they are in the process of deploying new Zero Trust capabilities.

So, what is Zero Trust, and what can it do for you?

In this session we will discuss:

  • Why Zero Trust is now taking off, and whether Zero Trust has the ability to damage user experience, or can it enable and improve user experience.
  • Changing how to think about security to prepare your organisation for a Zero Trust strategy.

Join this session to learn more about the value of a Zero Trust strategy, and whether Zero Trust is the end game, or if it’s simply the starting point for a future-proof cybersecurity strategy.

Episode 3: Staying in the Race: One Step Ahead of Digital Transformation
Filming: March 30, 2021 at 3:00 - 4:30 pm GMT

While organisations have had to quickly adapt to the shift from office environments to remote work, digital transformation has continued to develop throughout 2020. These developments include, but are not limited to, the move to cloud, and how versatile cloud is from those accessing customer data in banking, to those in manufacturing, to the transformation of SD WAN, which has evolved the way we stay connected forever..

While digital transformation has been a key element of 2020, business transformation and leadership has shifted too. 2020 has forced leaders to think more critically about their business security strategies than ever before. Crowd sourced transformation has developed and leaders must now listen to users rather than saying no, embracing Shadow IT. Other areas of transformation include decisions about cloud adoption, managing employee security across home devices, and wider privacy issues.

It is vital that leaders are equipped with the knowledge to make the best decisions for their companies.

In this session, we will discuss:

  • The main driving force of digital transformation
  • The ownership of IT solutions; how you can embrace Shadow IT without compromising security
  • Are companies and employees making bolder decisions and can these bring greater benefits and lower cost of ownership
  • Making the best security decisions for your business; considerations from cloud adoption to employee devices
Episode 4: Work Safely, From Anywhere – putting your employees at the centre
Filming: April 13, 2021 at 3:00 - 4:30 pm GMT

As your employees are working from home, it is key that leaders provide them with tools and secure access to platforms and internal networks, allowing them to work as productively at home as they would in the corporate office. One key consideration to come out of remote working, is whether behaviour analytics, AI and machine learning ultimately help the employee, or become a violation of privacy and freedom. Leaders must now keep employees productive, satisfied and secure while working from home.

As employees move to remote working positions, leaders must consider that not only is it important to keep data private and secure, it is essential that the privacy of employees, and customers not be overlooked. According to an IAPP survey, globally, 81% of privacy experts expect no or only a small reduction in privacy budgets. Evidently, privacy is still at the forefront of security measures, despite the effects of the pandemic.

Join us in this session as we explore:

  • Does the way you frame the business change your approach for finding the best security solutions: users vs people.
  • What makes employees happy in their work but doesn’t compromise security, or privacy.
  • When behaviour is affected by your environment, how do you build a ‘home-life’ robust business security model

Panelist Requirements:

  • Panelists must adhere 100% to our “NO COMMERCIALISM” Policy. If you cannot avoid commercialism, please do not agree to speak.
  • Panelists must share their information in an educational, non-commercial and non-self-promotional manner.

Complete the form below and we will contact you.

    Please select which episode(s) you would like to participate in: Episode 1: Walking the Tightrope Between Protecting Data and Enabling Remote WorkersEpisode 2: Zero Trust Policy: Never Trust, Always VerifyEpisode 3: Staying in the Race: One Step Ahead of Digital TransformationEpisode 4: Work Safely, From Anywhere – putting your employees at the centre
    Contact Us

    We're not around right now. But you can send us an email and we'll get back to you, asap.

    Not readable? Change text. captcha txt

    Start typing and press Enter to search