Recent Summits
Ransomware : Etat de la menace en 2025
En 2026, les organisations devront faire face à un paysage de menaces cyber de plus en plus complexe, avec une hausse des incidents liés aux vulnérabilités
des applications web, des risques persistants de vol et d’usurpation d’identité ou de données d’accès, et des attaques de ransomware visant de plus en plus…
Implementing SecOps for a Smooth-Running Workforce
Integrating security and IT operations (SecOps) teams offer an elevated strategy to threat prevention. While SecOps provides innumerable benefits, forming
a SecOps team can be challenging as the transition requires tool integration, budget, untapped skills, and a larger culture shift. The process grows in compl…
CISO Summit
CISOs are dealing with unprecedented challenges. The integration of AI in both attack and defense mechanisms coupled with the rise of increasingly
sophisticated cyber threats means they must protect against more complex attacks while aligning security strategies with broader business objectives. T…
Advancing App Security for a New Era of Threats
Application security (AppSec) attacks are escalating in both volume and complexity, making it more challenging for development and security teams to align
and stay ahead of potential threats. And let's face it: Traditional AppSec programs just don't cut it anymore. They're too outdated to handle the new breed…
New Age of Managing Data
The data management field is changing, driven by trends like data democratization, integration of AI and machine learning, data governance and data
analytics. Organizations looking to wisely handle their data should stay on top of trends while discerning what would work best for their environment. With t…
2025 Enterprise Strategy Group Cybersecurity and AI Summit
Cybersecurity continues to adapt to a new array of threats and opportunities created by advancing AI. Join Enterprise Strategy Group cybersecurity analysts
to navigate this changing landscape. Security teams have an opportunity to transform their defensive strategies as attack tactics evolve. While generative …