Breaking down silos - from endpoints to resilience

LIVE DINNER
7 December 2022, New York 6:30 pm - 9:30 pm BST
In partnership

Dinner Location: Morton's steakhouse

The 17th annual Cost of a Data Breach Report for 2022 was launched in July and was the result of 3600+ detailed interviews regarding 550 breaches analyzed across regions/industries around the world. The findings indicate that the average cost of a data breach continues to increase, with an average cost of $4.35M in 2022. Even more rattling is that there was a 41% increase in successful attacks where ransomware was deployed, yielding an average cost of $4.54M. Security solutions need to be able to detect, investigate, and respond to malicious activity as early in the kill chain as possible.

According to the study, deploying incident response, XDR and AI/automation produced the largest savings. Organizations with XDR technologies compared to those without XDR saved 29 days in breach response time. Similarly, organizations with fully deployed security AI and automation compared to organizations with none deployed saw $3.05M in savings.

Join us for a discussion on how to capitalize on these tactics and strategies to save time, money, and reputation, with particular focus on XDR technologies.

We hope to see you in New York!

View agenda

Discussion topics

1

How can your threat management team utilize interoperable point solutions?

2

How can you build an overall framework out of your technologies and process for enhanced visibility, detection, investigation, and response?

3

What are the best ways to prioritize your investments and attention in threat management?

4

Given organizations with XDR technologies saved 29 days in breach response time, how will this influence your security strategy moving forward?

5

What are some pain points you are experiencing with your current EDR solution?

"These events are great for relationship building and early stage lead development tool"
Art DuRivage, VP Sales
"It's not a business of selling, it's a business of sharing. And so GDS helps create the environment to share with trust."
David Kidder, CEO & Co-Founder, Bionic
"It's all about exposure and visibility, right? Getting us in front of the right CEOs or the practitioners or whatever, bringing people together to share new techniques, new processes, and new technologies. "
Jason Mical, Cyber Security Evangelist, Devo
"It was a very qualified audience. It was exactly the level and the type of people we want to talk to. The dialogue, the nature of those one on ones gives you the ability to really understand what the client is seeking."
Hamp Hampton, Chief Revenue Officer, Cadalys

Trusted by

We host global organizations with the conversations that matter. That’s why we’re trusted by these top brands.

Event Agenda

Day one

6:30 pm - 7:00 pm

6:30 pm - 7:00 pm

Arrivals, welcome drinks, and networking

7:00 pm - 7:30 pm

7:00 pm - 7:30 pm

Event welcome and introductions

7:30 pm - 9:15 pm

7:30 pm - 9:15 pm

Table discussions and three course dinner

9:15 pm - 9:30 pm

9:15 pm - 9:30 pm

Event Wrap Up

Why Attend

Closed door, tailored conversations to benchmark, share and get better equipped to solve complex transformation projects.

Experience shared learning

Meet industry leading like-minded executives tackling similar initiatives.

Benchmark with your industry peers

Discover and network to gain expertise and experience on how to best act and succeed

Accelerate your projects

Accelerate In-depth face time with the world’s leading tech companies pushing the boundaries to solve your challenges.

An engaged experience

An expert host facilitates conversations, with live polling, Q&As, and gamification to ensure focused conversation

Discover next-level ideas

Ensure project success with access to industry experts and cutting edge thought leadership

De-risk new projects

Gain a range of insights from peers and technical experts who are current with emerging business trends.

About IBM

A hybrid cloud strategy helps a company achieve its technical and business objectives while being more cost-efficient than public cloud or private cloud alone. A centralized strategy for cloud-based business transformation protects a business from potential outages, security breaches and escalating costs. IBM provides you with the most comprehensive and consistent approach to development, security and operations across hybrid environments.

Find out more

Apply to attend

Thank you for your interest. One of the team will be in touch soon.