Skip to the content
DATE: Thursday, 25 February 2020  TIME: 16:30  LOCATION: Online

We would like to invite you to our first CxO round table on the 25th February, How to Secure Networks in 2021 and Embrace Zero Trust.

We will be joined by a small group of invited industry peers and security experts from Forescout to explore the main security challenges organisations are facing today and share learnings and best practices how to cope with these in a post COVID-19 era.

Topics to be addressed include Zero Trust Networking and the growth of the BYOD culture.

We look forward to hosting you!

Who is attending

This event is invitation only, exclusively for C-level IT leaders: Chief Information Officers, Chief Technology Officers, Chief Digital Officers and Chief Data Officers.


You will be mixing business with pleasure, the serious business of fine wine tasting together with the pleasure of connecting with senior-level colleagues from major UK organisations.


4.30 pm: Arrival to the virtual event

4.35 pm: Welcome and Introductions

4:45 pm: Securing Networks in 2021 and Discussion

5:30 pm: Wine tasting hosted by a professional Sommelier*


*A selection of fine wine will be delivered to your door. Please provide your preferred address for delivery.


Register Now

Security Resources

Five Significant Savings with Synchronised Security

Five Significant Savings with Synchronised Security

With Sophos' decision to retire on-premise legacy security platforms and focus on next-generation products, I thought today we would have a quick look at the key advantages of synchronised security and how it can save you money.

Managed Security Services: What you need to know

Managed Security Services: What you need to know

The rise of remote working makes protecting endpoints more difficult. Many companies have created vulnerabilities in their networks. Often infections can go undetected for days and weeks, costing you thousands not only in lost revenue and customers but also in reputational damages.

Business Tips: #2 Your Cybersecurity

Business Tips: #2 Your Cybersecurity

If you are allowing devices to connect from people’s houses – it's possible that these networks have already been compromised by hackers or will be in the future. Implementing two-factor authentication, where another device like a mobile phone is used for extra security is the most important security measure that can be applied to systems.