STRONGER TOGETHER.
The Defender Dialogues is a dedicated, global community built specifically for cyber leaders to come together, share experiences, collaborate, network and strengthen the collective defense of our digital estates.
Stronger together.
The Defender Dialogues is a community tailored for cyber leaders to network, connect with peers, and share essential insights in a trusted, confidential environment. We provide exclusive, peer-driven meetings to discuss pressing challenges, exchange best practices, and leverage the wisdom of security leaders.
This is more than just a network; it values your expertise and support in navigating the challenges that come with the job. Join us in strengthening our collective defense against cyber threats.
Our meetings & events
Our intimate group ‘peer’ meetings are for you to come together in a trusted and confidential environment to chat, connect, share invaluable insights, and support one another in safeguarding our respective digital estates. Each meeting will start with a topic of cyber sec, chosen by the attendees beforehand.
Our meetings are not product or vendor driven. If there is a specific functionality that the group would like to see based on your specific challenges or priorities, we will organise an overview at the end of the meetings, from a pool of technologies that solve that particular challenge.
And the support does not stop once the meetings finish. We are here for each other every single day, fostering an environment of mutual assistance and encouragement. It is our hope that the relationships forged within our community are leveraged at any opportunity that arises, allowing us to continue growing together in strength and solidarity.
We will also be holding in-person events located in Europe, between Madrid and London. Please join our community for more details.
Featured Blog posts…
UPCOMING EVENTS
UPCOMING EVENTS
Wednesday, June 18th
Cyber Leaders Peer Meeting - ‘IDENTITY’
3pm CEST (Madrid) / 2pm GMT (London)
Online, via Teams
Guest speakers include Sean Remnant, Chief Strategy Officer and Paul Risk, Chief Operating Officer & CTO
From workforce IAM to third-party access, privilege creep to identity-first zero trust – we’ll look at some recent high-profile breaches, the real-world challenges and strategies that as cyber leaders, we are using to protect the most targeted asset in our enterprise: who has access to what, and why.
Expect insights, market data, peer discussions, and a few no-fluff takeaways!