Executive Roundtable Summaries.

A community of leading IT executives driving innovative ideas and peer collaboration.

Desktop and Mobile illustration
AI-Powered Insights: Leveraging Observability for Enhanced Customer Experience
November 13, 2024

AI-Powered Insights: Leveraging Observability for Enhanced Customer Experience

By embracing AI-powered observability, retailers can anticipate customer needs, improve internal processes, and manage risks while balancing personalization and privacy.

Developing a Successful Digital Strategy for Financial Services
November 5, 2024

Developing a Successful Digital Strategy for Financial Services

The recent Virtual Executive Roundtable on Developing a Successful Digital Strategy for Financial Services provided an in-depth look at how financial institutions are approaching digital transformation.

Mastering Real-Time Data Integration for Scalable Growth
October 25, 2024

Mastering Real-Time Data Integration for Scalable Growth

While many organizations recognize the value of real-time data, integrating and harnessing this resource effectively involves navigating complex technical and organizational hurdles.

Transforming AP Processes: Leveraging Technology for Full Digital Automation
August 7, 2024

Transforming AP Processes: Leveraging Technology for Full Digital Automation

The transformative potential of automation in accounts payable (AP) processes is immense, offering significant efficiencies and strategic advantages to organizations willing to embrace technological change.

AI Operationalization & Governance
July 18, 2024

AI Operationalization & Governance

Overcoming organizational and technological obstacles, ensuring data quality, establishing robust governance, and addressing security concerns are critical for the successful operationalization of AI.

AI-Driven Risk and Vendor Management
June 27, 2024

AI-Driven Risk and Vendor Management

Gain valuable insights into how organizations can navigate the challenges and opportunities presented by AI, ensuring that these technologies are leveraged effectively and responsibly.

Building Flexible Data Architectures for Enhanced Customer Engagement
June 27, 2024

Building Flexible Data Architectures for Enhanced Customer Engagement

By sharing insights and real-world examples, participants aimed to uncover strategies for creating data architectures that not only support operational efficiency but also drive personalized customer experiences and strategic decision-making.

Navigating the Ransomware Lifecycle: Strategies for Prevention, Response, and Recovery
June 5, 2024

Navigating the Ransomware Lifecycle: Strategies for Prevention, Response, and Recovery

Ransomware threats continue to increase, putting prevention and recovery strategies at the top of the priority list for technology leaders.

Unlocking Innovation: The Power of Identity in Access Management
March 27, 2024

Unlocking Innovation: The Power of Identity in Access Management

The multifaceted challenges organizations face, from integrating third-party access to navigating the complex regulatory landscape, emphasize the pivotal role of innovative, flexible solutions in enhancing security, compliance, and operational efficiency within the digital infrastructure. O

Building Resilience Against Phishing Attacks
March 20, 2024

Building Resilience Against Phishing Attacks

Cybersecurity experts and industry leaders gathered to tackle the escalating challenge of phishing attacks, a critical concern across sectors. Through a collaborative exchange of insights and strategies, the session focused on enhancing resilience against sophisticated phishing methods.

Safeguarding Access to Everything that Matters
March 15, 2024

Safeguarding Access to Everything that Matters

The Virtual Executive Roundtable discussion, focused on identity and access management, offered a profound exploration into the nuances of safeguarding critical data and ensuring robust access control mechanisms in the technology industry.

Business Impact of Identity Security: Exploring Technology and Reputational Consequences
February 29, 2024

Business Impact of Identity Security: Exploring Technology and Reputational Consequences

From balancing security with user experience to ensuring scalability, integrating new solutions, and navigating compliance complexities, this Executive Roundtable offered a comprehensive exploration of the strategies and insights essential for safeguarding digital identities.

Leveraging Digital Accessibility for Business Growth
February 15, 2024

Leveraging Digital Accessibility for Business Growth

Digital accessibility is crucial for businesses to achieve growth and inclusivity. By integrating accessibility into every digital interaction, companies meet the diverse needs of global users and position themselves as leaders in innovation and social responsibility.

Preventing Fraud While Limiting Customer Friction
December 11, 2023

Preventing Fraud While Limiting Customer Friction

Technology leaders shared insights on the escalating challenges of fraud across various organizations.

Generative AI - Augmentation Vs. Automation
November 27, 2023

Generative AI - Augmentation Vs. Automation

As organizations navigate their GenAI journey, the focus on data integrity, scalability, and customer value remains paramount. The discussion underscored the transformative nature of GenAI, poised to reshape not just business operations but also societal norms and job roles in the coming years.

Strategically Structuring Data for Business Empowerment
November 15, 2023

Strategically Structuring Data for Business Empowerment

The roundtable brought together leading technology leaders, focusing on how businesses can strategically structure and utilize data to enhance their operations and decision-making processes. This insightful discussion explored various facets of data management, including monetization strategies, the criticality of data reliability, accessibility, and security, and the challenges encountered in creating a data-driven organizational culture.

Secure SDLC: Strengthening Your Development Process
October 11, 2023

Secure SDLC: Strengthening Your Development Process

The concept of Making Corporate Security Redundant embodies this shift, marking a transition from reactive security protocols to proactive, embedded defenses that are integral to every phase of the software development life cycle (SDLC). Security, in this evolved framework, isn't an appended element but is meticulously woven into every stage of development, ensuring that every line of code authored is inherently secure and robust.

Service Accounts: The Importance of Discovery & Protection
October 11, 2023

Service Accounts: The Importance of Discovery & Protection

In the world of cybersecurity, service accounts play a crucial role in system functionalities and data access. These hidden entities are often overlooked, leaving them vulnerable to attack. To enhance organizational security, it's essential to audit and gain comprehensive visibility of service accounts, including their roles, responsibilities, and access privileges.

Cloud Transformation: Navigating the Journey from On-Premises to Cloud
September 28, 2023

Cloud Transformation: Navigating the Journey from On-Premises to Cloud

In the dynamic intersection of technology and business evolution, the migration from on-premises systems to the cloud stands out as a pivotal juncture. Our Executive Roundtable highlights critical paths and pivotal considerations instrumental in this transformation. A comprehensive cloud adoption strategy should align with organizational goals and involve diverse stakeholders.

Innovation without Compromise: The Intersection of Security and Technology
September 28, 2023

Innovation without Compromise: The Intersection of Security and Technology

When the drive to innovate is as persistent as the need for robust security, establishing a middle ground is not just necessary but imperative. Both elements are indispensable - innovation propels organizations into new horizons of possibilities, while security anchors them, ensuring resilience and integrity are uncompromised.

Achieving Next-Level DLP with Low-Code Security Automation
August 8, 2023

Achieving Next-Level DLP with Low-Code Security Automation

Successful automation isn't just about technology; it's a strategic confluence of understanding, planning, tool selection, training, and alignment. It's a crafted team played by IT leaders who are not just technologists but visionaries, aligning machines with human aspirations. The basics of successful automation are pillars supporting the edifice of a technologically empowered future.

Consolidating Security Tools and Addressing Technical Debt
August 7, 2023

Consolidating Security Tools and Addressing Technical Debt

The difficulty of juggling multiple tools manifests in increased complexity, soaring costs, and potential security vulnerabilities. Consolidation of these tools is essential and needs a process that requires strategic planning to reduce complexity and enhance efficiency.

AI: An Agent of Transformation
August 4, 2023

AI: An Agent of Transformation

AI has emerged as a powerful agent of transformation, particularly when it comes to supporting cloud-based applications and network infrastructure. AI-powered tools and services are increasingly being used to optimize network performance, improve security, and enhance overall reliability. With its ability to analyze vast amounts of data in real-time, AI is also helping businesses to identify and address potential issues before they become major problems.

Shifting Towards Agility: Removing Fixed Capacity and Cost from Your Network
July 20, 2023

Shifting Towards Agility: Removing Fixed Capacity and Cost from Your Network

Agility in network engineering has become a core tenet for organizations striving to stay competitive. As businesses grapple with rapidly changing markets, fluctuating customer demands, and emerging technologies, the static models of yesteryears no longer suffice. Now, agility is a game-changer and a business imperative, enabling organizations to quickly adapt, scale, and innovate in line with evolving demands.

Cybersecurity Awareness: From C-Suite to Boards to End Users | Part 1
July 12, 2023

Cybersecurity Awareness: From C-Suite to Boards to End Users | Part 1

The value of reliable metrics emerges as a key theme in the technology landscape, providing critical insights into an organization's security posture and guiding action prioritization. Yet, a need for ongoing refinement and enhancement underscores the importance of these metrics' accuracy, reliability, and comprehensiveness to address potential risks effectively.

Cybersecurity Awareness: From C-Suite to Boards to End Users | Part 2
July 11, 2023

Cybersecurity Awareness: From C-Suite to Boards to End Users | Part 2

The importance of cybersecurity remains a crucial topic in strategic discussions. IT departments must prioritize cybersecurity awareness to safeguard their organization. To achieve effective cybersecurity, stakeholders must clearly understand, provide support, and trust the efforts being made.

Building Cyber Resiliency Into Your Security Ecosystem
June 14, 2023

Building Cyber Resiliency Into Your Security Ecosystem

Building cyber resiliency into your security ecosystem demands a multifaceted approach, uniting several critical domains. It’s a comprehensive task that requires a blend of strategic practices and innovative technology.

Enabling Corporate Value Preservation
May 26, 2023

Enabling Corporate Value Preservation

In the continually evolving business landscape, the virtual roundtable discussion “Enabling Corporate Value Preservation” brought together IT leaders to exchange insights on pivotal aspects of modern corporate IT strategies.

IT Solutions: Building Vs. Buying
May 10, 2023

IT Solutions: Building Vs. Buying

In today’s fast-paced digital world, IT executives face many challenges as they navigate the complex landscape of technology investments and the transformation of the build versus buy decision in the ever-changing technology landscape. As technology evolves rapidly, organizations must adapt and reconsider how they approach IT investments.

Identity as a Core
May 4, 2023

Identity as a Core

Managing identity is essential for businesses to succeed in today's digital world. Identity management transcends mere security concerns and extends to crafting a seamless user experience that empowers employees to be both productive and efficient.

Security and User Experience: The Balance of Trust
April 21, 2023

Security and User Experience: The Balance of Trust

With the growing importance of user experience as a competitive advantage, organizations must find ways to ensure robust security while providing seamless and intuitive interactions for their customers.

Innovation Without Compromise
April 21, 2023

Innovation Without Compromise

The pursuit of innovation must be balanced with the need to maintain security, compliance, and the integrity of the organization's IT infrastructure.

The Challenges of Socially Engineered Attacks
April 18, 2023

The Challenges of Socially Engineered Attacks

Although organizations are investing significant resources into security education and awareness, social engineering attacks remain a pervasive threat. Even the most resilient systems can succumb to targeted social engineering attacks.

Uncovering Legacy Identity Blind Spots
April 12, 2023

Uncovering Legacy Identity Blind Spots

It's essential to identify and address vulnerabilities to protect your organization's sensitive data and systems.

Enterprise Strategies for 5G
February 17, 2023

Enterprise Strategies for 5G

5G has what it takes to bring a paradigm shift in the cellular network space. What challenges can businesses solve by adopting 5G?

How to Grow Your Brand Through Customer Experience
January 25, 2023

How to Grow Your Brand Through Customer Experience

Businesses can gauge customer sentiments, identify improvement avenues, and strategize better by analyzing data.

Bridging the Gap: Security and Development Part 2
December 21, 2022

Bridging the Gap: Security and Development Part 2

In today’s fast-paced world, security and development teams can no longer function in siloes.

Bridging the Gap: Security and Development
December 15, 2022

Bridging the Gap: Security and Development

It’s crucial for security and development teams to work together closely. But how do you bridge the gap between developers and security professionals?

Decreasing User Exposure
November 8, 2022

Decreasing User Exposure

More cyberattacks are happening today than ever before. Threat actors are using modern techniques to avoid detection and infiltrate corporate networks.

Redefining Conversational Commerce
October 25, 2022

Redefining Conversational Commerce

Conversational tools allow businesses to interact with their customers across multiple digital channels.

Business Transformation with 5G, SD-WAN, and Zero Trust
October 25, 2022

Business Transformation with 5G, SD-WAN, and Zero Trust

Modern paradigms like 5G, SD-WAN, and zero trust can enable organizations to be more agile, secure, and competitive.

Digital Transformation of Your Foundation
October 19, 2022

Digital Transformation of Your Foundation

Digital transformation efforts enable organizations to move to the cloud, deliver omnichannel experiences, expand easily, and increase revenue.

Pros and Cons of Moving File Storage to the Cloud
October 12, 2022

Pros and Cons of Moving File Storage to the Cloud

Going cloud-first allows you to be more agile, efficient, and flexible. It also promotes collaboration and empowers you to build a remote global workforce.

The Alignment and Significance of Identity
September 22, 2022

The Alignment and Significance of Identity

Security can no longer be an afterthought; it must be shifted left and made an intrinsic part of your applications and infrastructure.

Cybersecurity Staff Turnover and Burnout
September 22, 2022

Cybersecurity Staff Turnover and Burnout

Many organizations find it hard to build and mature their cyber programs because of the increased turnover and burnout of cybersecurity resources.

Managing and Prioritizing Technology Integrations
September 22, 2022

Managing and Prioritizing Technology Integrations

In today’s digitally connected world, integrations play a vital role—but organizations still still struggle with unifying data.

Powering Secure and Seamless Experiences
September 8, 2022

Powering Secure and Seamless Experiences

Identity and Access Management (IAM) is a staple of modern security. It lets you implement consolidated authentication flows across your entire infrastructure and enables you to enforce the principle of least privilege.

How to Implement Zero Trust Architecture
September 8, 2022

How to Implement Zero Trust Architecture

Zero trust is a security model that improves your security posture and reduces your attack surface. It requires you to eliminate implicit trust and authenticate digital identities every step of the way.

Strategic Alignment between CTOs and CMOs
August 30, 2022

Strategic Alignment between CTOs and CMOs

Using modern technology, marketers can deliver tailored content to customers much faster, and IT personnel can ensure that they are doing it securely.

Strategic CX Priorities in Retail: Part 2
August 3, 2022

Strategic CX Priorities in Retail: Part 2

Consumer expectations are constantly evolving. To stay relevant, companies must strive to adapt.

Strategic CX Priorities in Retail
July 5, 2022

Strategic CX Priorities in Retail

Customer expectations and demands have been changing rapidly in the last few years. Businesses that notice and react to these changes establish a formidable competitive advantage.

Critical Security Control Automation
June 27, 2022

Critical Security Control Automation

What does true security really mean? And is the definition the same for every organization? How do you go about starting your security journey?

Gaining Competitive Edge with the Cloud
June 15, 2022

Gaining Competitive Edge with the Cloud

Whether you want to quickly set up a data lake and start running analytics, build truly scalable products with minimum effort, or simply decrease your infrastructural footprint, cloud is the way to go.

Real-Time Analytics in the Cloud
May 27, 2022

Real-Time Analytics in the Cloud

Being data-driven is no longer a nice-to-have characteristic, but a necessary one.

Why Data Intensity is the new KPI for CIOs
May 26, 2022

Why Data Intensity is the new KPI for CIOs

A new buzzword in the data world is data intensity. What does it really mean? Can it be measured? What can data intensity KPIs enable you to achieve?

Preparing for the Next Generation of Data Security Attacks
May 10, 2022

Preparing for the Next Generation of Data Security Attacks

Customer data is often the most valuable asset a company has and protecting it has become a primary concern for organizations.

How to Implement a Zero Trust Security Model
April 26, 2022

How to Implement a Zero Trust Security Model

What does it take to start and progress on the zero trust journey?

How Identity is Central to Compliance
April 18, 2022

How Identity is Central to Compliance

Is identity a precursor to compliance, or is there a way to adhere to security standards and frameworks without a well-built identity system?

Speed vs. Risk Effective Software Security Doesn’t Choose
April 18, 2022

Speed vs. Risk Effective Software Security Doesn’t Choose

The rising number of sophisticated ransomware attacks has forced companies to consider shifting security left.

Why are companies still struggling with DevSecOps
April 7, 2022

Why are companies still struggling with DevSecOps

Using DevSecOps, organizations can automate security controls at various stages of app development.

Architecting Data-Intensive Applications
April 7, 2022

Architecting Data-Intensive Applications

In today’s fast-paced world, using data to your advantage is no longer a nice-to-have but a necessity.

Starting Your Zero Trust Journey
April 1, 2022

Starting Your Zero Trust Journey

What does zero trust mean, and how do you start your zero trust journey?

Evolving Trust and Identity Access Management
March 11, 2022

Evolving Trust and Identity Access Management

Using IAM, administrators can implement infrastructure-wide authentication, create policies for groups of users, issue short-term or long-term credentials, and enforce granular access control.

Building Bridges Between Security and Development
March 3, 2022

Building Bridges Between Security and Development

Companies today realize that security can no longer be an afterthought. It needs to be made an intrinsic part of software, a functional requirement.

Development vs. Security: Who is Responsible for AppSec
February 22, 2022

Development vs. Security: Who is Responsible for AppSec

Security is no longer just InfoSec’s job. It’s a business requirement that all relevant stakeholders must collectively fulfill

Strategic Customer Experience Priorities in Retail
February 22, 2022

Strategic Customer Experience Priorities in Retail

Over the last two years, customer habits, behaviors, and preferences have changed drastically. Having a frictionless customer experience has become more critical than ever before.

Bridging The Gap Between Security and Development
February 9, 2022

Bridging The Gap Between Security and Development

It’s pivotal to bridge the gap between security and development teams and establish a silo-free partnership

Protecting Data Through Secure Frictionless Experiences
January 26, 2022

Protecting Data Through Secure Frictionless Experiences

Decreasing friction should not mean loosening your security controls. It is crucial to establish a delicate balance between customer experience and security.

Transforming into an API-driven Architecture
January 26, 2022

Transforming into an API-driven Architecture

What does it take to transform into an API-driven architecture? What are some of the challenges, and how can they be overcome?

Where To Start Your Zero Trust Journey
January 3, 2022

Where To Start Your Zero Trust Journey

What does it take to achieve zero trust? What are the fundamental elements that you need to be focusing on? And most importantly, where do you begin?

Preparing For Next-Gen Data Security Attacks
January 3, 2022

Preparing For Next-Gen Data Security Attacks

How do you protect your organization from sophisticated cyberattacks? How do you minimize your attack surface without slowing down the development process?

Securing The Software Supply Chain
January 3, 2022

Securing The Software Supply Chain

Securing the supply chain can be very challenging, as zero-day vulnerabilities in open-source and/or third-party software can stay undetected for years. How do you protect against something that perhaps exists, but you can’t see yet?

2021 Q3 Sessions In Review
November 18, 2021

2021 Q3 Sessions In Review

Vation Ventures' Roundtable Sessions regularly bring together senior IT leaders from across the globe for unique, peer-to-peer discussions on the issues that drive significant trends in the IT space.

Cyber Risk Quantification
November 2, 2021

Cyber Risk Quantification

Cyber-risk quantification should help you quantify the financial risk attached to your various IT assets, with the end goal of board-level reporting. But what are the steps involved in the calculation and where do you start?

Security-First Digital Transformation
October 14, 2021

Security-First Digital Transformation

Why security-first digital transformation is much more likely to succeed and sustain in the long term.

Next-Gen Software Supply Chain Attacks
September 29, 2021

Next-Gen Software Supply Chain Attacks

How do you securely onboard new software without stifling innovation and compromising speed?

Enabling and Empowering Culture Through Data Visibility and Visualization
September 20, 2021

Enabling and Empowering Culture Through Data Visibility and Visualization

Data visibility and visualization are powerful tools to empower team members to innovate and make informed decisions. Data visibility and visualization are powerful tools to empower team members to innovate and make informed decisions

Why the Future of Work is Hybrid
September 15, 2021

Why the Future of Work is Hybrid

As we continue to transition and evaluate new ways of working, it seems that a hybrid work environment for most organizations is here to stay.

Micro-Segmentation On An Open Campus Network
September 13, 2021

Micro-Segmentation On An Open Campus Network

Organizations of all types seem to be moving toward various levels of network segmentation, but it is a gradual process. ‍

Moving From Project-Based to Product-Based
August 10, 2021

Moving From Project-Based to Product-Based

Implementing a product-first approach enables you to be more agile and customer-centered.

The Future of Open-Source Development
August 10, 2021

The Future of Open-Source Development

Open-source enables agility, drives innovation, and reduces time-to-market.

Designing a New Path Forward Towards Cyber Resilience
July 29, 2021

Designing a New Path Forward Towards Cyber Resilience

Businesses need to reassess their security policies, practices, and tools and design a new path towards cyber resilience.

Shifting Left and Incorporating Hacker-Powered Security into Your SDLC
July 29, 2021

Shifting Left and Incorporating Hacker-Powered Security into Your SDLC

Hackers are becoming more and more sophisticated, and the only way to keep them at bay is to walk in their shoes, put your white hacker hat on, and try to infiltrate your system.

How to Empower and Enable Your Culture and Organization Through Data Visibility and Visualization
July 6, 2021

How to Empower and Enable Your Culture and Organization Through Data Visibility and Visualization

Data is the most valuable resource in the world. Bar none. Using modern data visibility and visualization solutions, companies can solve critical problems and gain a formidable competitive advantage.

How To Transform Into an API-Driven Architecture
July 6, 2021

How To Transform Into an API-Driven Architecture

Whether you want to shift to a micro-service architecture, or want to take your legacy application to the cloud, or both, APIs can help streamline the transition.

Moving Beyond The Username And Password
July 6, 2021

Moving Beyond The Username And Password

We are at that point in time where passwords are not only insecure, they are also inconvenient. So how do you move beyond the username and password?

Gamifying Phishing and Securing Your Campus
June 7, 2021

Gamifying Phishing and Securing Your Campus

To truly secure your organization, it’s important to put security at the forefront of every strategic decision you make.

The Rise Of Next-Gen Software Supply Chain Attacks
June 7, 2021

The Rise Of Next-Gen Software Supply Chain Attacks

Bad actors are no longer waiting for public vulnerabilities. They’re actively injecting malicious code into open-source projects that feed the global supply chain.

Securing Frictionless Customer Experiences
May 17, 2021

Securing Frictionless Customer Experiences

Consumers expect a quick and frictionless experience in today's digital-first world when accessing any product or service. However, while delivering these frictionless experiences, it's also essential to consider their security ramifications.

Access Management in a Disruptive & Digitally Transforming World
May 12, 2021

Access Management in a Disruptive & Digitally Transforming World

Multi-factor authentication (MFA) and one-time-passwords (OTPs) are being used to verify identities, some argue, at the cost of customer convenience. So how do you implement security controls for your customers without asking them to do too much?

Avoiding Failure In Digital Transformation Journeys
May 12, 2021

Avoiding Failure In Digital Transformation Journeys

A digital transformation journey isn’t as easy as onboarding a third-party provider and training your workforce. There is a lot that can go wrong, and steps must be taken to prevent that.

The Risk of Third-Parties & Protecting Your Network
May 11, 2021

The Risk of Third-Parties & Protecting Your Network

Virtually every business in the world has to deal with third parties. Whether you want to host something in the cloud or want a collaboration tool for your remote workforce, it’s much more feasible to seek a third-party product or service instead of reinventing the wheel.

Best Practices In Evaluating Vendors For Risk
April 29, 2021

Best Practices In Evaluating Vendors For Risk

Third-party collaborations don’t come without security risks. More cyberattacks are stemming from third-party integrations than ever before. So, how do you assess risk before onboarding the third party? And how do you manage their access lifecycle?

Transforming Into an API-driven Architecture
April 26, 2021

Transforming Into an API-driven Architecture

More and more companies worldwide are shifting to API-driven architectures to revamp service delivery and decrease the time-to-market. But the shift doesn’t come without its challenges.