Upcoming Events

ISE® WEST PRIVATE WELCOME DINNER
The Myths and Realities Of Operationalizing Big Data Security Analytics

August 22, 2017
5:30pm - 8:30pm
Morton’s The Steakhouse
400 Post St. Lower Level
San Francisco, CA 94102
Registration
Ghous_Al

Al Ghous
Sr Director, Cyber Security
GE Digital
Biography

Gartner calls big data security analytics the “Next Big Thing.” It promises to automate the threat detection process, remove false positives from undermining effective security operations, and offer visibility to unseen and unknown threats, all at scale. Yet to implement it, organizations must work through the practical challenges of deploying and operationalizing this new and transformative technology. Requirements must be carefully defined, including use case coverage, data source requirements, security operations process changes, and incident response optimization. Join our conversation around deploying big data security analytics where we will delve into how companies have successfully deployed this technology and discuss topics like how to choose the correct technology, behavioral analytics proper fit in security operations, and defining successful metrics to measure results.

ISE® West Executive Forum and Awards 2017

The ISE® West Executive Forum and Awards 2017 will be held on August 23, 2017 at the Westin St. Francis in San Francisco, CA. The ISE® West Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions.

ISE® PRIVATE DINNER
Why Cybersecurity Needs Eyes, and AI, on the Inside

September 12, 2017
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
210 East Trade Street, Ste. 110
Charlotte, NC 28202
Registration

Analysts are buried in false positives, struggling to manually put the many pieces together to identify truly critical threats. Defending against cyber adversaries requires a new approach—one that considers the unique characteristics of adversary goals and behavior. AI can identify and tie together sets of behaviors that adversaries must use, but which are statistically unlikely for legitimate users and systems to accidentally perform in the course of normal operations. If you have the data you need to enable forensics post-incident, you also have the data you need to detect an adversary before they achieve their objective. Join our conversation to learn more about how the addition of AI can provide visibility and correlation across all systems and give network defenders the opportunity to gain the upper hand against adversaries now and into the future.

ISE® PRIVATE DINNER
It’s Time to Rethink Security: Data Breaches and Their Impact on Your Reputation and Share Value

September 13, 2017
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
4501 Olde Perimeter Way
Atlanta, GA 30346
Deborah Wheeler

Deborah Wheeler
CISO
Delta

A recent survey conducted by Ponemon Institute and Centrify found that a selected sample of publicly traded companies experienced an average stock price decline of 5 percent immediately following the disclosure of a breach. Coincidentally, another survey by Centrify found that 66% of consumers in the United States are likely to stop doing business with a hacked organization. Now is the time to realize the status quo of security practices and technologies are no longer effective in protecting a company’s brand, reputation and share value. Join our conversation as we discuss the challenges of a perimeter-based approach and how to redefine security for the hybrid enterprise.

ISE® PRIVATE DINNER
The Industry Need for Cloud Generation Security

September 19, 2017
5:30pm - 8:30pm
Char Steak & Lounge
550 East Ave
Rochester, NY 14607
Registration
bruce jones

Bruce Jones
CISO & VP
Excellus BCBS
Biography

The unprecedented power of cloud applications has opened up amazing new possibilities for IT organizations, lines-of-business, and users to empower work needs. Whether sanctioned or not, these cloud applications can have a dark side. The rapid pace of adoption has left most security and compliance teams behind. Users, devices and data are now interacting with a variety of new cloud services while entirely circumventing the control of the organization. This has introduced new risk factors for organizations already struggling under the duress of the traditional threat landscape. However, it doesn't have to be this way; Cloud applications and services can be adopted rapidly and securely as Info Security teams proactively build in security for users, devices and data. Please join Symantec as we discuss these new challenges and provide practical advice on how these issues can be safely overcome.

ISE® PRIVATE DINNER
It’s Time to Rethink Security: Data Breaches and Their Impact on Your Reputation and Share Value

September 19, 2017
5:30pm - 8:30pm
Nick & Sam’s
3008 Maple Ave
Dallas, TX 75201

A recent survey conducted by Ponemon Institute and Centrify found that a selected sample of publicly traded companies experienced an average stock price decline of 5 percent immediately following the disclosure of a breach. Coincidentally, another survey by Centrify found that 66% of consumers in the United States are likely to stop doing business with a hacked organization. Now is the time to realize the status quo of security practices and technologies are no longer effective in protecting a company’s brand, reputation and share value. Join our conversation as we discuss the challenges of a perimeter-based approach and how to redefine security for the hybrid enterprise.

ISE® PRIVATE DINNER
Stop Breaches in Real-Time Based on User Behavior

September 26, 2017
5:30pm - 8:30pm
On20
1 State St
Hartford, CT 06103
Registration

A recent Forrester study noted an astonishing two-thirds of organizations experienced an average of five or more security breaches in the past two years. These breaches have resulted in billions of compromised user names and passwords, further increasing the risk of subsequent breaches. Armed with these stolen credentials, an attacker has just the camouflage they need to “look” like a legitimate user – where they can infiltrate and move laterally through an organization without raising suspicion. Risk-based security solutions that include integrated machine learning can help IT identify suspicious activity in real-time and respond quickly to stop a potential breach in progress.

Join our conversation to learn how machine learning enables access based on user behavior, helping your security team better implement risk-based policy to protect your organization’s entire hybrid IT environment

ISE® PRIVATE DINNER
IT and OT Convergence: Technology Enables & Silos Kill

September 28, 2017
6:30pm - 9:00pm
Robard’s Steakhouse at The Woodlands Resort
2301 North Millbend Drive
The Woodlands, TX 77380
Registration

There is a cyber security challenge facing most companies that technology has not solved. The blind spot between departmental security initiatives that can create seams, which in turn, allows hackers access to corporate data. One example is the traditional relationship between enterprise information technology (IT) and operational technology (OT) teams who operate separately, each with their own set of priorities. While IT focuses on anticipating emerging threats to computer systems, OT typically focuses on the operation of generation or production systems – whereby security can be viewed as secondary. While the impact of a security incident on most IT systems is limited to financial loss, attacks on OT can potentially endanger human life and threaten national security. Both IT and OT face increased risk by third-party vendors, such as contractors working onsite or vendors that have network access, and both teams have information that could help secure the other. There is a growing need for these two teams to communicate, but this can be a challenge due to their differing priorities and operating cultures. Other "organizational silo" examples include IT and physical security where cultural norms keep both sides from sharing security event information. While technology is an enabler that can provide visibility and threat detection, communication between the two teams is key to successfully securing both IT and OT environments. Join our conversation as we discuss the security silos within organizations, the cyber security issues that are bringing the IT and OT together, the challenges that they must overcome, and how visibility and communication, enabled by technology, are the answer to a successful relationship between both teams.

This ISE® Private Dinner will be taking place alongside the Cyber Security for Critical Infrastructure Conference at The Woodlands Resort & Conference Center, from September 27-29, 2017. Please note, that the schedule for this ISE® Private Dinner will be slightly different from our standard schedule.

ISE® PRIVATE DINNER
Stop Breaches in Real-Time Based on User Behavior

September 28, 2017
5:30pm - 8:30pm
CHOPS Restaurant and Bar
1701 John F Kennedy Blvd
Philadelphia, PA 19103
Registration

A recent Forrester study noted an astonishing two-thirds of organizations experienced an average of five or more security breaches in the past two years. These breaches have resulted in billions of compromised user names and passwords, further increasing the risk of subsequent breaches. Armed with these stolen credentials, an attacker has just the camouflage they need to “look” like a legitimate user – where they can infiltrate and move laterally through an organization without raising suspicion. Risk-based security solutions that include integrated machine learning can help IT identify suspicious activity in real-time and respond quickly to stop a potential breach in progress.

Join our conversation to learn how machine learning enables access based on user behavior, helping your security team better implement risk-based policy to protect your organization’s entire hybrid IT environment.

ISE® Northeast Executive Forum and Awards 2017

The ISE® Northeast Executive Forum and Awards 2017 will be held on October 11, 2017 at the Westin Times Square in New York City. The ISE® Northeast Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® North America Leadership Summit and Awards 2017

The ISE® North America Leadership Summit and Awards will be held in November 2017 in Chicago, IL. The ISE® North America Awards are held in conjunction with a two day Leadership Summit which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The two day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details