Be a voice of your industry.
Speaking at BrightTALK Originals empowers you to share your expertise to over 10 million professionals, elevates your personal brand as an industry leader, and connects you with like-minded people.
To get started, simply submit your speaking proposal by filling out our form.
Benefits of Being a Panelist
Share your insight, extend your reach, and connect with the world’s brightest professionals and experts.
By speaking in a BrightTALK Series such as Resilient Cybersecurity – This Time it’s Personal, you will become a trusted expert on topics relevant to your industry.
Your photo and bio prominently featured on the Series landing page, establishing you and your company as trusted and respected experts.
The Coronavirus pandemic has altered the corporate world. According to an IAPP survey, 57% of organisations reported that all, or almost all of their employees were ordered to work from home during the pandemic. Working from home requires organisations to make business-critical data readily available while also protecting it from data theft.
But how can organizations keep data inside when employees are outside? How can organisations keep up with their security measures while also staying up to date with the rate of digital transformation, and the sudden shift to remote working? And where does privacy come into all of this, has it taken a hit during the pandemic, or is it still a priority for security professionals? Finally, in all of this, it’s important to remember to place employees in the center of all key decision making and ask yourself how you can improve employee experience.
In this series we will explore:
- The benefits of a Zero Trust Policy, and moving beyond Zero Trust, to Connected Trust
- Keeping your data protected when you’re dealing with a distributed workforce, and key considerations to make that enable your workforce to be able to access data securely whenever, wherever
- Keeping up with the rate of digital transformation; from cloud migration to SD WAN
- How the pandemic has put strain on the workforce, and how to overcome this challenge
The perimeters of business have changed, and our main constant is the overlap between humans and data. How do we secure this overlap, ensuring that the correct person has access to the correct data? Join us in this series for a detailed overview from thought leaders on keeping your data protected in a turbulent environment.
Filming: March 16, 2021 at 3:00 - 4:30 pm GMT
The catchphrase of the Zero Trust security model is “Never Trust, Always Verify. Every Time.” This attitude towards verification is especially important in a post Covid-19 world. As many workers still remain remote and require access to software from their own home devices, your security model must be diligent. However, regardless of the pandemic, data breaches have been growing in sophistication for years, and your security measures must continue to adapt to ongoing risks. According to Microsoft, 94% of companies have reported that they are in the process of deploying new Zero Trust capabilities.
So, what is Zero Trust, and what can it do for you?
In this session we will discuss:
- Why Zero Trust is now taking off, and whether Zero Trust has the ability to damage user experience, or can it enable and improve user experience.
- Changing how to think about security to prepare your organisation for a Zero Trust strategy.
Join this session to learn more about the value of a Zero Trust strategy, and whether Zero Trust is the end game, or if it’s simply the starting point for a future-proof cybersecurity strategy.
Filming: March 30, 2021 at 3:00 - 4:30 pm GMT
While organisations have had to quickly adapt to the shift from office environments to remote work, digital transformation has continued to develop throughout 2020. These developments include, but are not limited to, the move to cloud, and how versatile cloud is from those accessing customer data in banking, to those in manufacturing, to the transformation of SD WAN, which has evolved the way we stay connected forever..
While digital transformation has been a key element of 2020, business transformation and leadership has shifted too. 2020 has forced leaders to think more critically about their business security strategies than ever before. Crowd sourced transformation has developed and leaders must now listen to users rather than saying no, embracing Shadow IT. Other areas of transformation include decisions about cloud adoption, managing employee security across home devices, and wider privacy issues.
It is vital that leaders are equipped with the knowledge to make the best decisions for their companies.
In this session, we will discuss:
- The main driving force of digital transformation
- The ownership of IT solutions; how you can embrace Shadow IT without compromising security
- Are companies and employees making bolder decisions and can these bring greater benefits and lower cost of ownership
- Making the best security decisions for your business; considerations from cloud adoption to employee devices
Filming: April 13, 2021 at 3:00 - 4:30 pm GMT
As your employees are working from home, it is key that leaders provide them with tools and secure access to platforms and internal networks, allowing them to work as productively at home as they would in the corporate office. One key consideration to come out of remote working, is whether behaviour analytics, AI and machine learning ultimately help the employee, or become a violation of privacy and freedom. Leaders must now keep employees productive, satisfied and secure while working from home.
As employees move to remote working positions, leaders must consider that not only is it important to keep data private and secure, it is essential that the privacy of employees, and customers not be overlooked. According to an IAPP survey, globally, 81% of privacy experts expect no or only a small reduction in privacy budgets. Evidently, privacy is still at the forefront of security measures, despite the effects of the pandemic.
Join us in this session as we explore:
- Does the way you frame the business change your approach for finding the best security solutions: users vs people.
- What makes employees happy in their work but doesn’t compromise security, or privacy.
- When behaviour is affected by your environment, how do you build a ‘home-life’ robust business security model
- Panelists must adhere 100% to our “NO COMMERCIALISM” Policy. If you cannot avoid commercialism, please do not agree to speak.
- Panelists must share their information in an educational, non-commercial and non-self-promotional manner.
Complete the form below and we will contact you.