Security
& Risk

November 8 – 9, 2022  |  Washington, D.C. & Digital Experience

Early Access

Nov 7
  • 12:00 pm – 4:00 pm ETOn Demand Sessions

Tuesday

Nov 8
  • 10:00 am – 11:20 am ETOpening Remarks & Keynotes
  • 11:20 am – 12:00 pm ETMarketplace Break
  • 12:00 pm – 1:00 pm ETBreakout & Case Study Sessions
  • 1:10 pm – 2:10 pm ETLunch
  • 2:10 pm – 4:00 pm ETBreakout & Case Study Sessions
  • 4:00 pm – 4:35 pm ETMarketplace Break
  • 4:35 pm – 5:45 pm ETKeynote Sessions
  • 5:45 pm – 6:45 pm ETReception

Wednesday

Nov 9
  • 9:30 am – 10:50 am ETKeynote Sessions
  • 10:50 am – 11:30 am ETMarketplace Break
  • 11:30 am – 12:40 pm ETBreakout & Case Study Sessions
  • 12:40 pm – 1:40 pm ETLunch
  • 1:40 pm – 2:50 pm ETBreakout & Case Study Sessions
  • 2:50 pm – 3:25 pm ETMarketplace Break
  • 3:25 pm – 4:35 pm ETKeynote Sessions
  • 4:35 pm – 4:40 pm ETClosing Remarks

Tuesday Nov 8

10:00 am – 10:10 am ET

Welcome & Opening Remarks

with Stephanie Balaouras, VP, Group Director, Forrester

10:10 am – 10:40 am ET

Keynote Session

Securing The Future: Geopolitical Risk Will Redefine Security Strategies For The Next Decade

 
Globalization and international cooperation have passed their peak, thanks to global supply chain challenges and the threat of a third world war. As global powers work to protect themselves from the fallout, enterprises must prepare for how these changing global dynamics will affect their strategy and their security policies. Attend this keynote for insights into how geopolitical tension will define the next decade and how to adapt your security strategy to mitigate your risk. 

 

Speakers:
Renee Murphy, Principal Analyst, Forrester
Allie Mellen, Senior Analyst, Forrester

10:50 am – 11:20 am ET

Keynote Session

Privacy And The Future Of Immersive Digital Experiences

The metaverse does not exist yet. But the promise of a future defined by interoperable, immersive platforms is already driving companies’ investments, changing customer expectations, and shaping new engagement models. Individuals’ personal data, trusted identities, and attributes are fundamental pillars to achieve the promise of immersive digital experiences of the future. While many have plans on how to exploit sensitive personal data, only a few know how to keep them safe. Join this session to: 

  • Learn how the demand and the collection of individuals’ personal data will evolve as digital experiences become more immersive and intelligent. 
  • Assess the privacy risks of immersive experiences of the future. 
  • Design a privacy approach fit for future immersive experiences. 

Speakers:
Enza Iannopollo, Principal Analyst, Forrester

11:20 am – 12:00 pm ET

Marketplace Break

Marketplace breaks are your chance to connect with sponsors and catch up with colleagues on the show floor.

Check out our Sponsor Spotlights to learn more about the next great solution for your team. See below for the list of spotlights during this time.

11:30 am – 12:00 pm ET

AfterWords: Geopolitical Risk Will Redefine Security Strategies For The Next Decade

Ever wanted a chance to go backstage and be a part of the conversations that go on in the Green Room? Well now is your time! In this casual Q&A session, our opening keynoters, Allie Mellen and Renee Murphy, will be available to answer any questions you had coming out of their opening session.

12:00 pm – 12:30 pm ET

Breakout Sessions

Tackle Risk And Compliance Head On
Seven Ransomware Business Continuity Considerations You Missed

New ransomware attack methods such as double extortion and the sheer number of attacks make businesses even more aware of the looming threat. As a result, business-continuity ransomware scenario plans are in demand, and business continuity pros are on the hot seat to plan, test, and invoke plans to save the business from embarrassment and unwarranted business downtime. During this session, we’ll cover: 

  • The new threats that business continuity plans need to anticipate. 
  • How to create a plan that takes into account more than just the recovery of services. 
  • Common missing considerations that cause long delays in restoring services. 

Speakers:
Amy DeMartine, VP, Research Director, Forrester

READ MORE +READ LESS -
Elevate Trust With Privacy, Data Security, And Identity
Redefining Data Security For The Modern Age

What is data security? What capabilities and controls are included, and from where? These are significant questions for every organization when every security technology product’s purpose is to protect your organization’s data, and more security and compliance functionality is being built into nonsecurity technologies and data platforms. This session will explore: 

  • Data security controls in the context of a Zero Trust approach. 
  • The future of data security and the anticipated challenges. 
  • Technology innovations to watch. 

Speakers:
Heidi Shey, Principal Analyst, Forrester

READ MORE +READ LESS -
Lead Through Unprecedented Change
From Compliance To Cultural Change: The Future Of Security Awareness And Training

Security awareness and training remains plagued by the legacy of compliance-driven and checkbox-oriented tools and methods. Transformational security leaders are pushing for change that reflects the importance of human-centric security and the necessity of behavioral change. The future of awareness and training won’t be about awareness and training but rather a shift to evidence-based human-risk management in the near term and, in the longer term, to outcomes that lead to behavioral change. This session will offer detailed guidance for security leaders on what they should demand from their awareness and training partners and help them predict what regulators will want in the future. Join this session to: 

  • Discover what effective awareness and training programs will look like in the next three years. 
  • Plan your investments in your awareness and training resources now. 
  • Achieve actual behavior and culture change as a result of your security awareness and training program. 

Speakers:
Jinan Budge, VP, Principal Analyst, Forrester

READ MORE +READ LESS -
Bolster Defenses With Zero Trust
From Idea To Implementation: Living With Zero Trust

Zero Trust has been a lauded concept for years; now, security leaders face the difficult task of making it a lived reality. Security leaders must develop an implementation plan that is customized to their environment and supports the organization’s needs to advance Zero Trust maturity. In this session, you will learn: 

  • How to build the foundation for a successful Zero Trust journey. 
  • How to coordinate existing investments to propel your implementation forward. 
  • How to coordinate key stakeholders and build your Zero Trust roadmap. 

Speakers:
Carlos Rivera, Senior Analyst, Forrester
Heath Mullins, Sr. Analyst, Forrester

READ MORE +READ LESS -
12:35 pm – 1:05 pm ET

Case Study Sessions

Hear real world case studies showcasing the value of partnering with the right technology provider.

1:05 pm – 2:05 pm ET

Lunch & Marketplace Break

Marketplace breaks are your chance to connect with sponsors and catch up with colleagues on the show floor.

Check out our Sponsor Spotlights to learn more about the next great solution for your team. See below for the list of spotlights during this time.

2:05 pm – 2:35 pm ET

Breakout Sessions

Tackle Risk And Compliance Head On
The Supply Chain Risk Crusade And Other Ill-Fated Quests

Two years and two global crises later, supply chains are operating in a state of continuous chaos. Beyond memes and headlines, “supply chain issues” are still responsible for shortages and delays for consumers and missed opportunities for businesses. This session will explore: 

  • What’s continuing to fuel the global supply chain crisis. 
  • How connectedness, dependencies, and systemic risks create a domino effect. 
  • What’s risk pros’ role in stabilizing the impact of supply chain disruption. 

Speakers:
Alla Valente, Senior Analyst, Forrester

READ MORE +READ LESS -
Elevate Trust With Privacy, Data Security, And Identity
The Promise And Hype Of Privacy-Preserving Technologies

Privacy-preserving technologies (PPTs) promise privacy protections to the highest standard while enabling organizations to achieve data’s full potential through sophisticated data analytics. From privacy and security professionals to data scientists and technologists, privacy-preserving technologies are the technologies that everybody is talking about. Is the hype real? Join this session to learn about: 

  • What are privacy preserving technologies (PPTs)? How do they work? 
  • What problems do PPTs solve? What problems don’t they solve?. 
  • What  PPT use cases are early adopters deploying? What lessons have they have learned? 

Speakers:
Enza Iannopollo, Principal Analyst, Forrester

READ MORE +READ LESS -
Lead Through Unprecedented Change
Communicating Value: A CISO’s Business Acumen Primer for 2023

Over the past 20 years cybersecurity has evolved from a cost center and perceived roadblock risk to a market leading capability with the power to differentiate and increase competitive advantage. This places more pressure on and provides greater opportunity for security leaders better align with business models and strategies set forth by their organizations. To do so requires a clearer line-of-sight from security investment to business performance. The biggest barrier to achieving this is one of translation – truly speaking the language of risk while articulating security’s value. This session will deliver a primer on the leading concepts that strengthen CISOs’ business acumen and substantiate their place as strategic partners. 

Join this session to:  

  • Get a valuable cheat code for translating finance and ELT terms 
  • Learn how to discuss risk using terms and context understood by the board 
  • Develop security strategies to carry market value further 

Speakers:
Christopher Gilchrist, Principal Analyst, Forrester

READ MORE +READ LESS -
Bolster Defenses With Zero Trust
Securing OT/IT Convergence

From the Colonial Pipeline attack to PIPEDREAM, critical infrastructure providers are facing more public cyberattacks than they have before. They are also undergoing major digital transformation in the form of OT/IT convergence, driven by greater efficiency, increased capabilities, and potential cost savings. This change, however, is exposing critical infrastructure to increased risk of disruptive cyberattacks at a critical time. During this session, we will explore:  

  • The current state of OT/IT convergence.  
  • The threat landscape for critical infrastructure providers 
  • How to interweave IT security principles with operations technology (OT) expertise to protect OT environments. 
READ MORE +READ LESS -
2:40 pm – 3:10 pm ET

Case Study Sessions

Hear real world case studies showcasing the value of partnering with the right technology provider.

3:15 pm – 3:45 pm ET

Breakout Sessions

Tackle Risk And Compliance Head On
Managing Cloud Security Risk And Compliance

Adoption of cloud infrastructure (infrastructure as a service, platform as a service, software as a service, private cloud), cloud-first IT strategy, and cloud migrations all highlight the importance of managing cloud security risk and compliance. Organizations, in their quest to control their cloud infrastructure and protect the data they host, must: 1) protect cloud platforms’ configuration and identities; 2) extend on-premises operating system-level security to cloud hypervisors and operating systems; and 3) apply robust protections to container runtimes and orchestration systems — all while maintaining regulatory compliance. In this session, you will learn about: 

  • The cloud security tooling landscape and architectural choices for cloud security. 
  • Key technical and nontechnical best practices. 
  • Forrester’s predictions for cloud security. 

Speakers:
Andras Cser, VP, Principal Analyst, Forrester

READ MORE +READ LESS -
Elevate Trust With Privacy, Data Security, And Identity
Customer Data: From Privacy Risk To Opportunity

The customer data landscape is shifting rapidly as a proliferation of privacy laws, companies such as Apple and Google, and rising consumer privacy expectations limit how much consumer data is readily available, and yet your marketing colleagues are doubling down on their efforts to capture more customer data. Join this session to learn: 

  • What market forces are leading marketers to be so data-hungry. 
  • How customer-facing experiences can help engender (or impede!) trust. 
  • How to break down departmental silos to collaborate with your marketing team. 

Speakers:
Stephanie Liu, Analyst, Forrester

READ MORE +READ LESS -
Lead Through Unprecedented Change
Cybersecurity Drives Revenue: How To Win Every Budget Battle

Whether your company continues to grow or gets caught up in macroeconomic headwinds, expect more pressure on security leaders to explain current spending and more challenges from the CFO when requesting budget increases. This session will explain how to leverage three factors that make winning budget battles easier, provide a methodology to incorporate them into your business case, and equip you with the ability to tell the story that gets you the budget you need.

Join this session to:

  • Utilize three externalities to make cybersecurity budgets a must-have investment area.
    • Intense customer requests
    • Aggressive cyber insurance mandates
    • Increase in regulatory requirements
  • Make impact and effectiveness the foundation of your business case for increased cybersecurity investment.
  • Weave a compelling narrative with storytelling that confirms this fact: Cybersecurity must be a core competency of your enterprise.

Speakers:
Jeff Pollard, VP, Principal Analyst, Forrester

READ MORE +READ LESS -
Bolster Defenses With Zero Trust
The Truth Behind ML’s Madness: How AI Is Actually Used In Detection And Response

Deobfuscating how AI and machine learning (ML) are used in security technologies today is more challenging than reverse-engineering the latest malware from Wizard Spider. But it doesn’t have to be, and knowing what’s going on under the hood can help inform your detection and response strategy. We must break free of the hype around AI to uncover how it’s actually used in security technologies and how to leverage it to the fullest in the security operations center (SOC). In this session, you will learn: 

  • What AI/ML is used for in security products. 
  • How to better leverage AI/ML in the SOC. 
  • How future advancements in AI/ML will change security (really). 

Speakers:
Allie Mellen, Senior Analyst, Forrester

READ MORE +READ LESS -
3:45 pm – 4:30 pm ET

Marketplace Break

Marketplace breaks are your chance to connect with sponsors and catch up with colleagues on the show floor.

Check out our Sponsor Spotlights to learn more about the next great solution for your team. See below for the list of spotlights during this time.

4:00 pm – 4:30 pm ET

Analyst-Led Meetups

Spend some time in these small, interactive group roundtable discussions focused on key security topics.  Forrester analysts will kick-off the discussion, but bring your topic or question to the meetup and help spark the conversation. First-come, first-served.

Topics coming soon!

4:30 pm – 5:00 pm ET

Keynote Session

ICS Threats: From Pipe Dream To PIPEDREAM

Threats to industrial control systems (ICS) and critical infrastructure are nothing new. What’s changed is the pervasiveness of the ability to carry out cyber-attacks against these systems and the geopolitical environment which makes these systems prime targets by adversaries. Robert M. Lee, CEO and Co-founder of Dragos will discuss ICS threats from cascading IT attacks to today’s ICS-focused malware as well as strategies for defending modern infrastructure.

 

Speakers:
Robert M. Lee, CEO & Co-Founder, Drago

5:05 pm – 5:35 pm ET

Keynote Session

Unleash Your Potential With ZTE

Amidst the cacophony of Zero Trust messaging, Zero Trust Edge has emerged as an ideal technology for security leaders to embrace. The combination of networking and security controls positions ZTE as a simple solution for multiple problems and accelerates overall ZT adoption. This session will focus on the following areas: 

  • ZTE- what it is, and what it isn’t 
  • How ZTE enables edge computing 
  • How and why to apply ZTE from an organizational perspective 

Speakers:
Heath Mullins, Sr. Analyst, Forrester

5:35 pm – 6:35 pm ET

Evening Reception

Join us for an opening night reception full of networking, fun, food and refreshments.

Wednesday Nov 9

9:30 am – 10:10 am ET

Keynote Session

From CISO To Chief Trust Officer: The Next Step Forward In CISO Career Paths

Sparked by the trust imperative and in response to companies moving away from business models that put them at odds with their customers, a new C-suite role has emerged: chief trust officer. It’s also the next step in the career path for CISOs. No other role in the C-suite brings the insights and empathy necessary to become an effective CTrO as the CISO. The trust imperative will force firms to accept that cybersecurity is a core competency, requiring CISOs to become CTrOs to inspire trust and secure the future. Attend this keynote to: 

  • Understand how informal customer-facing activity helped train CISOs to step in as CTrOs.  
  • Learn how the CTrO role helps CISOs escape the clutches of IT to truly become a C-level executive. 
  • Find out how other CISOs became CTrOs: some by design and some by accident.  
  • Discover the essential elements of the CTrO organization and responsibilities. 

Speakers:
Jeff Pollard, VP, Principal Analyst, Forrester

10:15 am – 10:45 am ET

Keynote Session

Guest Panel 

More details coming soon!

Speakers:
Joseph Blankenship, VP, Research Director, Forrester

10:50 am – 11:30 pm ET

Marketplace Break

Marketplace breaks are your chance to connect with sponsors and catch up with colleagues on the show floor.

Check out our Sponsor Spotlights to learn more about the next great solution for your team. See below for the list of spotlights during this time.

11:00 am – 11:30 am ET

AfterWords: From CISO to Chief Trust Officer: The Next Step Forward In CISO Career Paths

Ever wanted a chance to go backstage and be a part of the conversations that go on in the Green Room? Well now is your time! In this casual Q&A session, our opening keynote, Jeff Pollard, will be available to answer any questions you had coming out of his session.

Speakers:
Jeff Pollard, VP, Principal Analyst, Forrester

11:30 am – 12:00 pm ET

Breakout Sessions

Tackle Risk And Compliance Head On
Dodgeball, Your New Favorite Sport: Systemic Risks

Dodgeball is a humiliating sport. If you have weak arms and can’t get out of the way, you will get hit. Cybersecurity is in a dodgeball competition with systemic risks and doesn’t even know it. You, too, can dodge systemic-risk events or, better yet, mitigate those risks by catching them. During this session, we’ll cover: 

  • How cybersecurity is not immune to the humiliating sport that is systemic risks. 
  • What ball is going to hit your blindside by understanding the 2022 systemic risk ranking. 
  • How to plan for and communicate cybersecurity systemic-risk events (way to catch that ball!). 

Speakers:
Renee Murphy, Principal Analyst, Forrester

READ MORE +READ LESS -
Elevate Trust With Privacy, Data Security, And Identity
Biometrics: The Good, Bad, And The Ugly

Biometrics usage is at a crossroads. While it provides valuable convenience and ease of use for consumers, biometrics also opens a potential hornet’s nest of privacy and compliance concerns. Organizations must also select from a wide range of biometric options, including voice, finger, face, and other emerging technologies. This session will explore: 

  • Key use cases and industries that are deploying biometrics. 
  • What regulatory forces are influencing biometrics around privacy protection. 
  • How to deploy biometrics in a privacy-centric way. 

Speakers:
Merritt Maxim, VP, Research Director, Forrester

READ MORE +READ LESS -
Lead Through Unprecedented Change
Panel Discussion: Amplify Security’s Influence And Impact With BISOs

Businesses are charging forward with innovative ways to win, serve, and retain customers, putting greater pressure on all functions to move quickly — and on the CISO to keep pace. But in large organizations with multiple business units, building and maintaining a bridge that connects business objectives with security requirements cannot fall on the CISO alone. Enter the business information security officer (BISO). Effective BISOs seamlessly transition between diplomat, therapist, translator, negotiator, and cybersecurity expert and, in doing so, enable business leaders to make security-minded, risk-informed decisions. This session will provide you valuable insights into the BISO role and best practices for empowering BISOs in your organization. 

Join this session to: 

  • Hire or develop talent with the right skill set for the role. 
  • Overcome common challenges in integrating BISOs into business units. 
  • Harness the power of effective collaboration and empower the organization to go to market on trust. 

Speakers:
Jess Burn, Senior Analyst, Forrester

READ MORE +READ LESS -
Bolster Defenses With Zero Trust
Reinvent Your Vulnerability Management Program To Regain Trust

Vulnerability management is the hot potato of IT and security programs. It’s often neglected, lacks ownership, or is seen as a burdensome disruption to business. As the business adopts more technology and the drumbeat of critical vulnerability drops continues, security leaders must become strategic fortune-tellers, responsible for predicting and prioritizing vulnerabilities. During this session, we’ll explore: 

  • What key best practices you must use for vulnerability management policies. 
  • How to prioritize remediation and build zero-day playbooks. 
  • How to factor new technology adoption into your vulnerability management strategy. 

Speakers:
Erik Nost, Senior Analyst, Forrester

READ MORE +READ LESS -
12:05 pm – 12:35 pm ET

Case Study Sessions

Hear real world case studies showcasing the value of partnering with the right technology provider.

12:35 pm – 1:35 pm ET

Lunch & Marketplace Break

Marketplace breaks are your chance to connect with sponsors and catch up with colleagues on the show floor.

Check out our Sponsor Spotlights to learn more about the next great solution for your team. See below for the list of spotlights during this time.

1:35 pm – 2:05 pm ET

Breakout Sessions

Tackle Risk And Compliance Head On
Secure Software Supply Chain Essentials

The weakest link in your software supply chain is security. The NIST’s special publication, “Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations,” provides guidelines on how to strengthen the supply chain and reduce the risk to your enterprise. For security leaders, this is a great tool to get your executive team, risk management team, and the rest of the organization aligned and working toward a more secure supply chain. During this session, we’ll explore the following questions: 

  • Why do all enterprises, not just government suppliers, need to be aware of the NIST guidelines?  
  • What are the software security considerations put forward by NIST? 
  • How can you start putting the guidelines into practice? 

Speakers:
Janet Worthington, Senior Analyst, Forrester

READ MORE +READ LESS -
Elevate Trust With Privacy, Data Security, And Identity
The State Of Decentralized Digital Identities

Decentralized digital identities (DDIs, also known as self-sovereign identities) represent the next major paradigm shift in identity and access management (IAM). Privacy-conscious, end-user-centric, and extending beyond registration and authentication into credentials, authorizations, and proofs, DDI infrastructures are set to permanently change the IAM landscape. In this session, you will learn about: 

  • Use case patterns for DDIs. 
  • Key strengths and weaknesses of DDIs. 
  • The state of adoption, real-life examples, and future opportunities for DDI. 

Speakers:
Andras Cser, VP, Principal Analyst, Forrester

READ MORE +READ LESS -
Lead Through Unprecedented Change
Beyond The B.S. (Or B.A.): Buck Tradition To Hire Early-Career Security Talent

It’s time for CISOs to stop waiting on institutions for change and take on the cybersecurity staffing shortage themselves. This session, filled with real-world examples, will make the case for breaking with traditional hiring practices at the entry level and forming new collaborations to cultivate a bigger, more diverse cybersecurity talent pool, a pool that includes underrepresented minorities, women, veterans, and populations of workers with transferable skills. Join this session to:  

  • Bust outdated four-year degree requirements and move away from restrictive applicant tracking systems and screening practices. 
  • Start or support new talent development efforts in your region or industry. 
  • Cultivate the time and ability of your management team to train early-career talent. 

Speakers:
Jess Burn, Senior Analyst, Forrester

READ MORE +READ LESS -
Bolster Defenses With Zero Trust
Rethinking How To Secure The Anywhere-Work Endpoint

For many, work has stopped being tied to an office — not solely because of the COVID-19 pandemic but also because of the shift to remote access. In a world where users are no longer limited to fixed locations or specific devices, the importance of traditional endpoints diminishes and is replaced by how users interact with remote data. Security leaders must adapt how they structure their endpoint security strategy to protect business information while ensuring user privacy and flexibility. In this session, we will explore:  

  • The current state of securing anywhere work. 
  • How to protect while ensuring user privacy in a “bring your own device” world. 
  • What the future of the endpoint looks like: the browser. 

Speakers:
Paddy Harrington, Senior Analyst, Forrester

READ MORE +READ LESS -
2:10 pm – 2:40 pm ET

Case Study Sessions

Hear real world case studies showcasing the value of partnering with the right technology provider.

2:40 pm – 3:20 pm ET

Marketplace Break

Marketplace breaks are your chance to connect with sponsors and catch up with colleagues on the show floor.

Check out our Sponsor Spotlights to learn more about the next great solution for your team. See below for the list of spotlights during this time.

2:50 pm – 3:20 pm ET

Analyst-Led Meetups

Spend some time in these small, interactive group roundtable discussions focused on key security topics.  Forrester analysts will kick-off the discussion, but bring your topic or question to the meetup and help spark the conversation. First-come, first-served.

Topics coming soon!

3:20 pm – 3:50 pm ET

Keynote Panel

Insider Risk Reduction Requires Two Parts Culture, One Part Security

Insider incidents are responsible for almost a quarter of data breaches. Data breaches, however, are not the only risk that can be triggered by insiders. Organizations have to address the risk posed by insiders through accidental disclosure, policy violations, and malicious actions. Reducing insider risk, however, requires more of a cultural approach than a security-centric strategy. This panel will discuss an insider risk approach that focuses on the people, not technology.  

Speakers:
Joseph Blankenship, VP, Research Director, Forrester
Alla Valente, Senior Analyst, Forrester

4:00 pm – 4:30 pm ET

Keynote Session

Adopt Minimum Viable Security To Drive Trust

Business leaders prioritize both innovation and security — minimum viable security (MVS) bridges the two by aligning security requirements with the product’s context and the development team’s agility. MVS enables security leaders to contribute directly to the early-stage products that drive hypergrowth. During this session, we will: 

  • Explore why security teams struggle to support rapid prototyping and concept testing … and why that matters. 
  • Explain how an MVS approach adds the right level of security into early-stage products and positions them for security success later, without stymieing innovation today. 
  • Provide a framework and best practices to help security leaders understand what security issues to prioritize during early-stage product development. 

Speakers:
Sandy Carielli, Principal Analyst, Forrester

4:30 pm – 4:35 pm ET

Closing Remarks

with Stephanie Balaouras, VP, Group Director, Forrester

All sessions shown in US Eastern Time.

Times are subject to change.

Security & Risk · November 8 – 9, 2022 · Washington, D.C. & Digital Experience

Hyatt Regency Crystal City
2799 Richmond Highway
Arlington, VA 22202

Book your hotel today. (Rate ends October 17, 2022)