Upcoming Events

ISE® PRIVATE DINNER
Get Secure. Stay Secure

April 26, 2017
5:30pm - 8:30pm
The Palm
The Westin Buckhead Atlanta
3391 Peachtree Rd NE
Atlanta, GA 30326
Registration
paul Huesken

Paul Huesken
Chief Information Assurance Officer
The Coca-Cola Company
Biography

Your defenses are constantly being challenged by attackers who are morphing their tactics and adopting new evasion techniques at a record pace. Enterprises are investing more money in security products and “intelligence,” but are still finding themselves behind the eight ball when it comes to cyber threats. The struggle to get ahead and stay ahead of the ever-evolving cyber threat landscape is overwhelming. The security defenses protecting you today might not protect you tomorrow, and more than ever, you need a way to continuously validate your cybersecurity posture. Join our conversation to learn how you can apply contextual threat intelligence, product effectiveness validation, and security workflow automation to help your organization get secure, and stay secure.

ISE® PRIVATE DINNER
Hunting Threats Across Time: The Benefits of Proactive Threat Hunting

May 2, 2017
5:30pm - 8:30pm
Bourbon Steak
The Americana at Brand
237 S Brand Blvd
Glendale, CA 91204
Registration

Our ISE® Guest Host for the evening is the Chief Security Officer of a Major Telecommunications Company. This person will be revealed the night of the dinner!

Improved incident response practices with the aid of strong automation platforms have gone a long way towards helping mature enterprises reduce the overall risk of catastrophic breaches. However, with the financial benefits of cybercrime driving criminals to elaborate methods of evading detection, it’s inevitable that they will still be able sneak some attacks by even the most advanced automated detection methods. To defend themselves, a number of organizations have found a great deal of success in the form of proactive threat hunting. Even organizations just dipping their toes into the threat hunting waters have started to reap the benefits of proactively seeking out hidden attacks. A study by the SANS Institute showed that of those engaged in threat hunting programs, over half say they’ve already achieved measurable reduction of risk in their organizations. Join our conversation to learn how your organization can reduce attack surface and system hardening, reduce exposure, and enhance speed and accuracy of response to threats via threat hunting.

ISE® PRIVATE DINNER
Building a Modern Security Operations Center: Technologies to Increase SOC Efficiency Using Automation

May 4, 2017
5:30pm - 8:30pm
Alexander’s Steakhouse
448 Brannan Street
San Francisco, CA 94107
Registration
paul Huesken

Adam Ely
Vice President, Information Security
& Deputy Chief Information Security Officer
Walmart
Biography

Modern cyber attacks are real and evolving threats; when they strike, security teams gear up to leap into action – all too often to be hampered by a gap in security operations capabilities. A well-functioning Security Operations Center (SOC) enables teams to prevent, detect and respond sooner, collaborate, and share knowledge more effectively. Join us for an engaging discussion on how technology can help organizations improve their SOC teams from good to great with automation. What technologies and processes do they have in place? What is a good measure of success? We’ll cover all of this and more.

ISE® PRIVATE DINNER
Building a Modern Security Operations Center: Technologies to Increase SOC Efficiency Using Automation

May 9, 2017
5:30pm - 8:30pm
Jeff Ruby Precinct
311 Delta Avenue
Cincinnati, OH 45226
Registration
Gary Warzala

Gary Warzala
Chief Information Security Officer
Fifth Third Bank
Biography

Modern cyber attacks are real and evolving threats; when they strike, security teams gear up to leap into action – all too often to be hampered by a gap in security operations capabilities. A well-functioning Security Operations Center (SOC) enables teams to prevent, detect and respond sooner, collaborate, and share knowledge more effectively. Join us for an engaging discussion on how technology can help organizations improve their SOC teams from good to great with automation. What technologies and processes do they have in place? What is a good measure of success? We’ll cover all of this and more.

2017 Annual WNY ISACA Conference

May 9, 2017
8:00am - 6:00pm
DoubleTree by Hilton Hotel Rochester
1111 Jefferson Rd
Rochester, NY 14623
Website

Speaker

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Cybersecurity Success Through Emotional Intelligence
8:30-9:30 PM
As new threats abound and attackers continue to find new ways to disrupt security and business, information security professionals must continue to grow as proactive innovators, good communicators, and team leaders. One way to further this growth is through Emotional Intelligence. One of the greatest problems in communication is a clear understanding of what is being said, how it is received, and how people feel about an issue. Harnessing Emotional Intelligence is a good method to channel emotions towards a path that will benefit everyone. It affects how we manage behaviors, navigate social complexities, and make personal and professional decisions that achieve positive results. Join our conversation as we discuss the benefits around utilizing Emotional Intelligence in the work place to get ahead, learn how to be authentic to who you are, learn how to shape your conversations as a thought leader, and how to show confidence and professionalism in the fields of cybersecurity and information security.

Panel Moderator

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists

Deborah Cheek

Deborah Cheek
EVP & CISO, Enterprise Compliance & Audits Cybersecurity Management
Claims Recovery Financial Services LLC
Biography

Deborah Flynt

Deborah Flynt
Global Information Security Officer
Carestream

name

Mark Leary
Vice President, Chief Information Security Officer
Conduent
ISE® Southeast Executive Award Winner 2010
Biography

Patrick Stack

Patrick Stack
CISO and IT Director, Enterprise Architecture
Eastman Kodak Company

Breaking into Information Security
10:15-11:15 AM (Panel)
To become a security professional, you need a certain mix of experience, knowledge, and skills. While Information Security is by no means an entry level career field, that doesn’t mean it’s impossible to break into the field. A formal degree aside, hands-on experience gained in the security trenches is invaluable. A solid education and a foundation in systems administration, engineering and/or development are part of the "apprenticeship" that every security professional goes through. The key to making this type of transition is in learning and understanding security issues and finding a way to apply the knowledge. Join our conversation as we discuss at length the skills, background, and experience needed to help you break into the Information Security industry.

ISE® PRIVATE DINNER
Hunting Threats Across Time: The Benefits of Proactive Threat Hunting

May 10, 2017
5:30pm - 8:30pm
Del Frisco’s
58 E Oak St
Chicago, IL 60611
Registration

Improved incident response practices with the aid of strong automation platforms have gone a long way towards helping mature enterprises reduce the overall risk of catastrophic breaches. However, with the financial benefits of cybercrime driving criminals to elaborate methods of evading detection, it’s inevitable that they will still be able sneak some attacks by even the most advanced automated detection methods. To defend themselves, a number of organizations have found a great deal of success in the form of proactive threat hunting. Even organizations just dipping their toes into the threat hunting waters have started to reap the benefits of proactively seeking out hidden attacks. A study by the SANS Institute showed that of those engaged in threat hunting programs, over half say they’ve already achieved measurable reduction of risk in their organizations. Join our conversation to learn how your organization can reduce attack surface and system hardening, reduce exposure, and enhance speed and accuracy of response to threats via threat hunting.

ISE® PRIVATE DINNER
Building a Modern Security Operations Center: Technologies to Increase SOC Efficiency Using Automation

May 10, 2017
5:30pm - 8:30pm
Ruth’s Chris Steak House
707 15th Street
Denver, CO 80202
Registration
mary haynes

Mary Haynes
VP, Network Security Operations
Charter Communications, Inc.
Biography

Modern cyber attacks are real and evolving threats; when they strike, security teams gear up to leap into action – all too often to be hampered by a gap in security operations capabilities. A well-functioning Security Operations Center (SOC) enables teams to prevent, detect and respond sooner, collaborate, and share knowledge more effectively. Join us for an engaging discussion on how technology can help organizations improve their SOC teams from good to great with automation. What technologies and processes do they have in place? What is a good measure of success? We’ll cover all of this and more.

ISE® PRIVATE DINNER
Hunting Threats Across Time: The Benefits of Proactive Threat Hunting

May 11, 2017
5:30pm - 8:30pm
Pappas Bros. Steakhouse Downtown
Houston Center
1200 McKinney St
Houston, TX 77010
Registration

Improved incident response practices with the aid of strong automation platforms have gone a long way towards helping mature enterprises reduce the overall risk of catastrophic breaches. However, with the financial benefits of cybercrime driving criminals to elaborate methods of evading detection, it’s inevitable that they will still be able sneak some attacks by even the most advanced automated detection methods. To defend themselves, a number of organizations have found a great deal of success in the form of proactive threat hunting. Even organizations just dipping their toes into the threat hunting waters have started to reap the benefits of proactively seeking out hidden attacks. A study by the SANS Institute showed that of those engaged in threat hunting programs, over half say they’ve already achieved measurable reduction of risk in their organizations. Join our conversation to learn how your organization can reduce attack surface and system hardening, reduce exposure, and enhance speed and accuracy of response to threats via threat hunting.

ISE® PRIVATE DINNER
Building a Modern Security Operations Center: Technologies to Increase SOC Efficiency Using Automation

May 11, 2017
5:30pm - 8:30pm
Max Downtown
Cityplace I
185 Asylum St
Hartford, CT 06103
Registration
Jim Lemieux

Jim Lemieux
Senior Director, Information Security
The Travelers Companies, Inc.
Biography

Modern cyber attacks are real and evolving threats; when they strike, security teams gear up to leap into action – all too often to be hampered by a gap in security operations capabilities. A well-functioning Security Operations Center (SOC) enables teams to prevent, detect and respond sooner, collaborate, and share knowledge more effectively. Join us for an engaging discussion on how technology can help organizations improve their SOC teams from good to great with automation. What technologies and processes do they have in place? What is a good measure of success? We’ll cover all of this and more.

ISE® CENTRAL PRIVATE WELCOME DINNER
Best Practices for Detecting Insider Threats

May 16, 2017
5:30pm - 8:30pm
Chamberlain’s Steakhouse
5330 Belt Line Road
Dallas, TX 75254
Registration
harvey ewing

Harvey Ewing
CISO
G6 Hospitality LLC
Biography

People. They are an organization’s greatest asset - and greatest risk. Employees, contractors, remote workers and partners: they are inside your network, familiar with your systems and processes, and access to sensitive information is part of their daily job. Insider risks may be small actions that appear normal on the surface and occur over months and years, making them difficult or impossible to detect. And insider risk isn’t just about theft either. It includes abusing a position and access to sensitive information for unfair advantage or personal gain. Regardless of whether it’s theft, fraud or misuse of information, it’s risk. What can CISOs do about it? Existing tools are noisy and provide a siloed view: Organizations have multiple point tools in place that were purpose-built to solve a specific problem around data retention or anomaly detection, but were not purpose-built to assess insider risk in a holistic way. Join our conversation as we take a look at best practices on insider risk.

ISE® Central Executive Forum and Awards 2017

The ISE® Central Executive Forum and Awards 2017 will be held on May 17, 2017 at The Westin Galleria Dallas in Dallas, TX. The ISE® Central Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® PRIVATE DINNER
Hunting Threats Across Time: The Benefits of Proactive Threat Hunting

May 23, 2017
5:30pm - 8:30pm
Lattanzi
361 W 46th St
New York, NY 10036
Registration

Improved incident response practices with the aid of strong automation platforms have gone a long way towards helping mature enterprises reduce the overall risk of catastrophic breaches. However, with the financial benefits of cybercrime driving criminals to elaborate methods of evading detection, it’s inevitable that they will still be able sneak some attacks by even the most advanced automated detection methods. To defend themselves, a number of organizations have found a great deal of success in the form of proactive threat hunting. Even organizations just dipping their toes into the threat hunting waters have started to reap the benefits of proactively seeking out hidden attacks. A study by the SANS Institute showed that of those engaged in threat hunting programs, over half say they’ve already achieved measurable reduction of risk in their organizations. Join our conversation to learn how your organization can reduce attack surface and system hardening, reduce exposure, and enhance speed and accuracy of response to threats via threat hunting.

ISE® PRIVATE DINNER
Managing Technology Risk and Compliance in an Expansive Digital Infrastructure

May 24, 2017
5:30pm - 8:30pm
The Palm
1750 Tysons Blvd
McLean, VA 22102
Registration

Organizations are complex. Modern organizations have become an interconnected mesh of digital transactions, relationships, and interactions that obfuscate traditional business boundaries. Keeping this complexity and change in sync and secure is a significant challenge for boards, executives, as well as risk management and GRC professionals throughout the business. The dynamic, distributed, and disruptive nature of business is particularly challenging from an information security standpoint as IT security, risk, and compliance must all be sustainable as an ongoing and integrated part of IT processes and the broader business. The primary directive of a mature IT risk management program should be to deliver effectiveness, efficiency, and agility to the business in managing the interrelationship of performance and risk management. This requires a strategic approach that connects the enterprise, business units, processes, transactions, and information to enable transparency, discipline, and control of the ecosystem of business and operational activities. Join our conversation as we discuss best practices for building and running an IT risk management program and maximizing its value from the convergence of strategy, process, and architecture.

ISE® PRIVATE DINNER
Building a Modern Security Operations Center: Technologies to Increase SOC Efficiency Using Automation

June 1, 2017
5:30pm - 8:30pm
Char Steak & Lounge
550 East Avenue
Rochester, NY 14607
Registration

Modern cyber attacks are real and evolving threats; when they strike, security teams gear up to leap into action – all too often to be hampered by a gap in security operations capabilities. A well-functioning Security Operations Center (SOC) enables teams to prevent, detect and respond sooner, collaborate, and share knowledge more effectively. Join us for an engaging discussion on how technology can help organizations improve their SOC teams from good to great with automation. What technologies and processes do they have in place? What is a good measure of success? We’ll cover all of this and more.

ISE® PRIVATE DINNER
Building a Modern Security Operations Center: Technologies to Increase SOC Efficiency Using Automation

June 6, 2017
5:30pm - 8:30pm
Hy’s Steakhouse Toronto
120 Adelaide St W
Toronto, ON M5H 1T1
Registration
Knoblauch_Robert

Robert Knoblauch
Vice President, Enterprise Security Services, Information Security & Control
Scotiabank

Modern cyber attacks are real and evolving threats; when they strike, security teams gear up to leap into action – all too often to be hampered by a gap in security operations capabilities. A well-functioning Security Operations Center (SOC) enables teams to prevent, detect and respond sooner, collaborate, and share knowledge more effectively. Join us for an engaging discussion on how technology can help organizations improve their SOC teams from good to great with automation. What technologies and processes do they have in place? What is a good measure of success? We’ll cover all of this and more.

ISE® PRIVATE DINNER
Hunting Threats Across Time: The Benefits of Proactive Threat Hunting

June 7, 2017
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
Perimeter Place
4501 Olde Perimeter Way
Atlanta, GA 30346
Registration

Improved incident response practices with the aid of strong automation platforms have gone a long way towards helping mature enterprises reduce the overall risk of catastrophic breaches. However, with the financial benefits of cybercrime driving criminals to elaborate methods of evading detection, it’s inevitable that they will still be able sneak some attacks by even the most advanced automated detection methods. To defend themselves, a number of organizations have found a great deal of success in the form of proactive threat hunting. Even organizations just dipping their toes into the threat hunting waters have started to reap the benefits of proactively seeking out hidden attacks. A study by the SANS Institute showed that of those engaged in threat hunting programs, over half say they’ve already achieved measurable reduction of risk in their organizations. Join our conversation to learn how your organization can reduce attack surface and system hardening, reduce exposure, and enhance speed and accuracy of response to threats via threat hunting.

ISE® PRIVATE DINNER
Building a Modern Security Operations Center: Technologies to Increase SOC Efficiency Using Automation

June 13, 2017
5:30pm - 8:30pm
Gibson’s Steakhouse
1028 N Rush St
Chicago, IL 60611

Modern cyber attacks are real and evolving threats; when they strike, security teams gear up to leap into action – all too often to be hampered by a gap in security operations capabilities. A well-functioning Security Operations Center (SOC) enables teams to prevent, detect and respond sooner, collaborate, and share knowledge more effectively. Join us for an engaging discussion on how technology can help organizations improve their SOC teams from good to great with automation. What technologies and processes do they have in place? What is a good measure of success? We’ll cover all of this and more.

ISE® PRIVATE DINNER
Building a World-Class Security Operations Center

June 15, 2017
5:30pm - 8:30pm
Kayne Prime Steakhouse
1103 McGavock St
Nashville, TN 37203
Registration

As the volume and complexity of threats continues to rise, companies are challenged with managing security incidents more effectively. There are also a wealth of security products to learn and in many cases, security teams have too many alerts to investigate with limited staff. So what can executives do to enable a world-class SOC team? For starters, the team and their toolset need to be able to provide a comprehensive Incident Case Management system with SLA management, analyst assignments and metrics tracking. To help reduce the strain on SOC team members, full incident automation should also be enabled where appropriate and provide a clearly defined workflow via a playbook which analysts use to document the investigation. Finally, a SOC team should be able to empower an effective collaboration between analysts for Tier 2 and Tier 3 incident resolution. Join our conversation to learn more about the best practices, processes and methods you can implement to build a world-class SOC team of your own.

ISE® PRIVATE DINNER
Building a World-Class Security Operations Center

June 20, 2017
5:30pm - 8:30pm
The Oceanaire Seafood Room
1400 Arapahoe St
Denver, CO 80202
Registration

As the volume and complexity of threats continues to rise, companies are challenged with managing security incidents more effectively. There are also a wealth of security products to learn and in many cases, security teams have too many alerts to investigate with limited staff. So what can executives do to enable a world-class SOC team? For starters, the team and their toolset need to be able to provide a comprehensive Incident Case Management system with SLA management, analyst assignments and metrics tracking. To help reduce the strain on SOC team members, full incident automation should also be enabled where appropriate and provide a clearly defined workflow via a playbook which analysts use to document the investigation. Finally, a SOC team should be able to empower an effective collaboration between analysts for Tier 2 and Tier 3 incident resolution. Join our conversation to learn more about the best practices, processes and methods you can implement to build a world-class SOC team of your own.

ISE® PRIVATE DINNER
Building a World-Class Security Operations Center

June 27, 2017
5:30pm - 8:30pm
The Capital Grille
801 Hennepin Ave
Minneapolis, MN 55402
Registration

As the volume and complexity of threats continues to rise, companies are challenged with managing security incidents more effectively. There are also a wealth of security products to learn and in many cases, security teams have too many alerts to investigate with limited staff. So what can executives do to enable a world-class SOC team? For starters, the team and their toolset need to be able to provide a comprehensive Incident Case Management system with SLA management, analyst assignments and metrics tracking. To help reduce the strain on SOC team members, full incident automation should also be enabled where appropriate and provide a clearly defined workflow via a playbook which analysts use to document the investigation. Finally, a SOC team should be able to empower an effective collaboration between analysts for Tier 2 and Tier 3 incident resolution. Join our conversation to learn more about the best practices, processes and methods you can implement to build a world-class SOC team of your own.

ISE® PRIVATE DINNER
Building a Modern Security Operations Center: Technologies to Increase SOC Efficiency Using Automation

August 9, 2017
5:30pm - 8:30pm
The Capital Grille
801 Hennepin Ave
Minneapolis, MN 55402
John Valente

John Valente
CISO
3M Corporation
Biography

Modern cyber attacks are real and evolving threats; when they strike, security teams gear up to leap into action – all too often to be hampered by a gap in security operations capabilities. A well-functioning Security Operations Center (SOC) enables teams to prevent, detect and respond sooner, collaborate, and share knowledge more effectively. Join us for an engaging discussion on how technology can help organizations improve their SOC teams from good to great with automation. What technologies and processes do they have in place? What is a good measure of success? We’ll cover all of this and more.

ISE® West Executive Forum and Awards 2017

The ISE® West Executive Forum and Awards 2017 will be held on August 23, 2017 at the Westin St. Francis in San Francisco, CA. The ISE® West Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions.

ISE® PRIVATE DINNER
The Industry Need for Cloud Generation Security

September 19, 2017
5:30pm - 8:30pm
Char Steak & Lounge
550 East Ave
Rochester, NY 14607
bruce jones

Bruce Jones
CISO & VP
Excellus BCBS
Biography

The unprecedented power of cloud applications has opened up amazing new possibilities for IT organizations, lines-of-business, and users to empower work needs. Whether sanctioned or not, these cloud applications can have a dark side. The rapid pace of adoption has left most security and compliance teams behind. Users, devices and data are now interacting with a variety of new cloud services while entirely circumventing the control of the organization. This has introduced new risk factors for organizations already struggling under the duress of the traditional threat landscape. However, it doesn't have to be this way; Cloud applications and services can be adopted rapidly and securely as Info Security teams proactively build in security for users, devices and data. Please join Symantec as we discuss these new challenges and provide practical advice on how these issues can be safely overcome.

ISE® Northeast Executive Forum and Awards 2017

The ISE® Northeast Executive Forum and Awards 2017 will be held on October 11, 2017 at the Westin Times Square in New York City. The ISE® Northeast Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® North America Leadership Summit and Awards 2017

The ISE® North America Leadership Summit and Awards will be held in November 2017 in Chicago, IL. The ISE® North America Awards are held in conjunction with a two day Leadership Summit which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The two day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details