Upcoming Events

ISE® PRIVATE DINNER
Security at DevOps Speed and Scale: A Faster and More Agile Approach to Cloud Security

October 17, 2017
5:30pm - 8:30pm
Osso Steakhouse
1177 California St.
San Francisco, CA 94108
Registration
Bernie Cowens

Bernie Cowens
Vice President, Chief Security Officer
PG&E- Pacific Gas & Electric Company
Biography

As organizations move to the cloud, finding some homogeneity across tools and consolidating systems will prove invaluable in maintaining system security and patch levels over time, especially in a dynamic DevOps-driven architecture. DevOps is built on principles of automation, rapid feedback, focus on testing throughout the process, collaboration, and consistent release practices. This model can also provide a great opportunity for improved security. Security teams need tools to partner effectively with DevOps groups so each team can work to its highest abilities, pushing both goals forward rather than working at cross-purposes. Join our conversation to learn how you can improve your organization’s security by integrating it more tightly into the development process without introducing roadblocks and enable security within agile development environments.

ISE® PRIVATE DINNER
Building an Effective Detection and Response Program to Stop Targeted Attacks: Achieve Zero Breach Tolerance

October 19, 2017
5:30pm - 8:30pm
The Capital Grille (Buckhead)
255 East Paces Ferry Rd NE
Atlanta, GA 30305
Registration
Noonan_Tom

Tom Noonan
Experienced Cyber Security Entrepreneur, Director and Investor,
Co Founder & Board of Directors
Endgame
Biography

A recent Forrester survey found that 93% enterprises are hit by targeted attacks. These attacks are sophisticated, human-driven, and not just malware based. Enterprise security tools are constantly bypassed and SOC teams are overwhelmed with alerts and anxious of missing never-before-seen attacks. It is critical for security decision makers to ensure their people, process, and technology can stop targeted attacks. Enterprise SOC and hunt teams need solutions that address full scope of targeted attacks, automated workflows, instant and accurate response at the earliest stages of the attack lifecycle.

Join us for a conversation to learn how you can pivot your existing resources to combat targeted attacks by focusing on stopping attackers at the earliest stages of the attack life cycle.

ISE® PRIVATE DINNER
Why Cybersecurity Needs Eyes, and AI, on the Inside

October 25, 2017
5:30pm - 8:30pm
The Capital Grille
500 Crescent Ct
Dallas, TX 75201
Registration
Duaine Styles

Duaine Styles
Chief Information Security Officer
Torchmark Corp.

Analysts are buried in false positives, struggling to manually put the many pieces together to identify truly critical threats. Defending against cyber adversaries requires a new approach—one that considers the unique characteristics of adversary goals and behavior. AI can identify and tie together sets of behaviors that adversaries must use, but which are statistically unlikely for legitimate users and systems to accidentally perform in the course of normal operations. If you have the data you need to enable forensics post-incident, you also have the data you need to detect an adversary before they achieve their objective. Join our conversation to learn more about how the addition of AI can provide visibility and correlation across all systems and give network defenders the opportunity to gain the upper hand against adversaries now and into the future.

ISACA South Florida: Connecting Women Leaders in Technology Conference
Speaker Session: Building for the Future: Inspiring the Next Generation of Women in Technology

October 27, 2017
Renaissance Plantation
1230 S. Pine Island Rd
Plantation, Florida 3332
Registration
marci mccarthy

Marci McCarthy
CEO and President
T.E.N.
Biography

It is important for young women to know they can have successful and impactful careers in the tech sector. However, to get more young minds interested in choosing careers in technology, the narrative needs to change to show that women have a future in the industry. Join Marci McCarthy as she discusses the importance of nurturing and growing the next generation of women in technology through mentorship opportunities, STEAM programs, and other education opportunities.

ISE® PRIVATE DINNER
IT and OT Convergence: Technology Enables & Silos Kill

November 2, 2017
5:30pm - 8:30pm
Morton’s The Steakhouse
3400 West Olive Avenue
Burbank, CA 91505
Registration
David Alexander

David Alexander
Chief Information Security Officer
Los Angeles Department of Water and Power
Biography

There is a cyber security challenge facing most companies that technology has not solved. The blind spot between departmental security initiatives that can create seams, which in turn, allows hackers access to corporate data. One example is the traditional relationship between enterprise information technology (IT) and operational technology (OT) teams who operate separately, each with their own set of priorities. While IT focuses on anticipating emerging threats to computer systems, OT typically focuses on the operation of generation or production systems – whereby security can be viewed as secondary. While the impact of a security incident on most IT systems is limited to financial loss, attacks on OT can potentially endanger human life and threaten national security. Both IT and OT face increased risk by third-party vendors, such as contractors working onsite or vendors that have network access, and both teams have information that could help secure the other. There is a growing need for these two teams to communicate, but this can be a challenge due to their differing priorities and operating cultures. Other "organizational silo" examples include IT and physical security where cultural norms keep both sides from sharing security event information. While technology is an enabler that can provide visibility and threat detection, communication between the two teams is key to successfully securing both IT and OT environments. Join our conversation as we discuss the security silos within organizations, the cyber security issues that are bringing the IT and OT together, the challenges that they must overcome, and how visibility and communication, enabled by technology, are the answer to a successful relationship between both teams.

ISE® PRIVATE DINNER
Security at DevOps Speed and Scale: A Faster and More Agile Approach to Cloud Security

November 8, 2017
5:30pm - 8:30pm
Del Frisco’s
1426 Chestnut St.
Philadelphia, PA 19102
Registration
Carl Burgess

Carl Burgess
SVP, GISO Branded Cards & CRS
Citigroup Inc.
Biography

As organizations move to the cloud, finding some homogeneity across tools and consolidating systems will prove invaluable in maintaining system security and patch levels over time, especially in a dynamic DevOps-driven architecture. DevOps is built on principles of automation, rapid feedback, focus on testing throughout the process, collaboration, and consistent release practices. This model can also provide a great opportunity for improved security. Security teams need tools to partner effectively with DevOps groups so each team can work to its highest abilities, pushing both goals forward rather than working at cross-purposes. Join our conversation to learn how you can improve your organization’s security by integrating it more tightly into the development process without introducing roadblocks and enable security within agile development environments.

ISE® North America Leadership Summit and Awards 2017

The ISE® North America Leadership Summit and Awards will be held November 15-16, 2017 in Chicago, IL. The ISE® North America Awards are held in conjunction with a two day Leadership Summit which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The two day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® PRIVATE DINNER
Act, Don’t React: Stopping Attackers with Infrastructure-Wide Deception

November 29, 2017
5:30pm - 8:30pm
The Capital Grille (Dunwoody)
94 Perimeter Center W
Dunwoody, GA 30346
Registration

Although attacks come in many variations and styles, the majority of them start through endpoints—particularly user endpoints—and then spread laterally through systems, looking to exploit richer and richer targets. Deception technology anticipates these movements by turning every endpoint and server on the network into a trap. Deceptions are planted that are made to look like information or objects that will help the attacker advance his effort. When an attacker engages with a deception, and alarm is tripped. At this point, responders have a wealth of tools they can use to track the attacker and take action. Join our conversation to learn how by deploying deception technology across your entire infrastructure, you can uncover attackers in your network much sooner, and gain real-time, situational awareness that empowers your security team to act, before attackers can reach your critical systems.

ISE® PRIVATE DINNER
It’s Time to Rethink Security: Data Breaches and Their Impact on Your Reputation and Share Value

November 30, 2017
5:30pm - 8:30pm
Jeff Ruby’s Precinct
311 Delta Ave
Cincinnati, OH 45226
Registration

A recent survey conducted by Ponemon Institute and Centrify found that a selected sample of publicly traded companies experienced an average stock price decline of 5 percent immediately following the disclosure of a breach. Coincidentally, another survey by Centrify found that 66% of consumers in the United States are likely to stop doing business with a hacked organization. Now is the time to realize the status quo of security practices and technologies are no longer effective in protecting a company’s brand, reputation and share value. Join our conversation as we discuss the challenges of a perimeter-based approach and how to redefine security for the hybrid enterprise.

ISE® PRIVATE DINNER
It’s Time to Rethink Security: Data Breaches and Their Impact on Your Reputation and Share Value

December 5, 2017
5:30pm - 8:30pm
Kayne Prime Steakhouse
1103 McGavock St
Nashville, TN 37203
Registration

A recent survey conducted by Ponemon Institute and Centrify found that a selected sample of publicly traded companies experienced an average stock price decline of 5 percent immediately following the disclosure of a breach. Coincidentally, another survey by Centrify found that 66% of consumers in the United States are likely to stop doing business with a hacked organization. Now is the time to realize the status quo of security practices and technologies are no longer effective in protecting a company’s brand, reputation and share value. Join our conversation as we discuss the challenges of a perimeter-based approach and how to redefine security for the hybrid enterprise.

ISE® PRIVATE DINNER
It’s Time to Rethink Security: Data Breaches and Their Impact on Your Reputation and Share Value

December 7, 2017
5:30pm - 8:30pm
Del Frisco’s Grille
100 St Paul St Suite 140
Denver, CO 80206
Registration

A recent survey conducted by Ponemon Institute and Centrify found that a selected sample of publicly traded companies experienced an average stock price decline of 5 percent immediately following the disclosure of a breach. Coincidentally, another survey by Centrify found that 66% of consumers in the United States are likely to stop doing business with a hacked organization. Now is the time to realize the status quo of security practices and technologies are no longer effective in protecting a company’s brand, reputation and share value. Join our conversation as we discuss the challenges of a perimeter-based approach and how to redefine security for the hybrid enterprise.