In partnership with ...

CyCognito_Logo Light (002).png

CyCognito empowers companies to take full control over their attack surface by uncovering and eliminating the critical security risks they didn't even know existed. Welcome to the Shadow Risk Revolution.

 

We use our intelligence-agency expertise and keen understanding of hacker techniques to help organizations uncover their shadow risk and protect their entire attack surface before attackers have a chance to exploit any gap.

Find out more here: www.cycognito.com

Register Your Interest

Details Submitted.
We'll Be In Touch To Confirm Your Place.

In partnership with ...

CyCognito_Logo Light (002).png

CyCognito empowers companies to take full control over their attack surface by uncovering and eliminating the critical security risks they didn't even know existed. Welcome to the Shadow Risk Revolution.

 

We use our intelligence-agency expertise and keen understanding of hacker techniques to help organizations uncover their shadow risk and protect their entire attack surface before attackers have a chance to exploit any gap.

Find out more here: www.cycognito.com

ONLINE WHISKY & CHOCOLATE TASTING ROUNDTABLE
EVENT

Time & Location
Thur 08 Sep 22 |  7:30pm to 9:30pm |  Online via Zoom

About the Event

Meet with other Information Security Executives for a fun and informal whisky tasting experience combined with a virtual round table event.

You'll be guided through your very own whisky tasting box (which you'll receive direct to your door), containing a selection of wonderful whisky, with some delicious organic chocolates which we'll pair with each whisky.

 

If you prefer, we also have a selection of delicious hand-crafted
non-alcoholic drinks available.  

The whisky tasting is combined with key discussion points focused around current industry topics:

"The “cost of a hack” or “cost of ransomware” is obviously devastating, but what about the cost of risk?

The underlying business challenge has always been finding an efficient way to discover an attacker’s path of least resistance through your network to your most critical assets. In other words identifying what’s at risk and why.

Money alone spent on vulnerability management doesn’t address the half dozen soft spots in an external facing network that attackers can use to infiltrate an organisation.

During this Roundtable we’ll discuss:

"How does your business view risk exposure? How do you go about understanding what your risk is? Do you know where your weaknesses are?"

AND

"What would you change in the way that the business manages Cyber Security External risk exposure?"

There's also a chance to win a bottle of whisky !!

 

They'll be plenty of opportunity to network with the other Information Security Executives and participate in discussions.

A unique, informal opportunity to discuss topic-specific views, share experiences and collaborate with peers.

Whisky.jpg