Archived Events 2017

ISE® PRIVATE DINNER
The Myths and Realities Of Operationalizing Big Data Security Analytics

August 10, 2017
5:30pm - 8:30pm
American Cut
3035 Peachtree Rd NE #140
Atlanta, GA 30305
pete chronis

Pete Chronis
Chief Information Security Officer
Turner Broadcasting System - Time Warner
Biography

Gartner calls big data security analytics the “Next Big Thing.” It promises to automate the threat detection process, remove false positives from undermining effective security operations, and offer visibility to unseen and unknown threats, all at scale. Yet to implement it, organizations must work through the practical challenges of deploying and operationalizing this new and transformative technology. Requirements must be carefully defined, including use case coverage, data source requirements, security operations process changes, and incident response optimization. Join our conversation around deploying big data security analytics where we will delve into how companies have successfully deployed this technology and discuss topics like how to choose the correct technology, behavioral analytics proper fit in security operations, and defining successful metrics to measure results.

ISE® PRIVATE DINNER
Building a Modern Security Operations Center: Technologies to Increase SOC Efficiency Using Automation

August 9, 2017
5:30pm - 8:30pm
The Capital Grille
801 Hennepin Ave
Minneapolis, MN 55402
Judy Hatchett

Judy Hatchett
Sr. Global Manager, Information Security Risk & Compliance
3M Corporation

Modern cyber attacks are real and evolving threats; when they strike, security teams gear up to leap into action – all too often to be hampered by a gap in security operations capabilities. A well-functioning Security Operations Center (SOC) enables teams to prevent, detect and respond sooner, collaborate, and share knowledge more effectively. Join us for an engaging discussion on how technology can help organizations improve their SOC teams from good to great with automation. What technologies and processes do they have in place? What is a good measure of success? We’ll cover all of this and more.

ISE® PRIVATE DINNER
The Myths and Realities Of Operationalizing Big Data Security Analytics

August 8, 2017
5:30pm - 8:30pm
Chamberlain’s Steak and Chop House
5330 Belt Line Rd
Dallas, TX 75254
lance clark

Lance Clark
Director, Information Security
Cinemark
Biography

Gartner calls big data security analytics the “Next Big Thing.” It promises to automate the threat detection process, remove false positives from undermining effective security operations, and offer visibility to unseen and unknown threats, all at scale. Yet to implement it, organizations must work through the practical challenges of deploying and operationalizing this new and transformative technology. Requirements must be carefully defined, including use case coverage, data source requirements, security operations process changes, and incident response optimization. Join our conversation around deploying big data security analytics where we will delve into how companies have successfully deployed this technology and discuss topics like how to choose the correct technology, behavioral analytics proper fit in security operations, and defining successful metrics to measure results.

ISE® PRIVATE DINNER
Protecting Against Digital Deception--The Rise of “Artificial Perception” to Automate the Detection and Prevention of Cyber Attacks

July 25, 2017
5:30pm - 8:30pm
Bouchon Bistro- The Venetian
3355 S Las Vegas Blvd
Las Vegas, NV 89109
yonesy nunez

Ken Haertling
Senior VP, Global Cybersecurity
Las Vegas Sands
Biography

For all the protection we afford to networks, applications and data, the human element of enterprises remains the most exposed, vulnerable and frequently attacked point of entry into any enterprise. While traditional attacks leverage technology-based system vulnerabilities, such as software bugs and misconfigurations, social engineering attacks take advantage of human vulnerabilities by using deception to trick targeted victims into opening the doors to hackers. It’s time to better protect and defend this vulnerability. It is possible to automate the process by which people decide whether or not they can trust an email or other communication channel and leverage existing technology to look for signs of digital deception. This approach, which goes beyond the often over-hyped term “artificial intelligence”, represents a new form of “Artificial Perception,” and can prevent or mitigate damage in real time. To remain relevant, these automated defenses must not just “think like computers,” but also model what makes messages deceptive to end users. Join our conversation as we discuss how this bold and proven approach can help you avoid critical system breaches.

ISE® PRIVATE DINNER
Best Practices for Detecting Insider Threats

July 12, 2017
5:30pm - 8:30pm
David Burke’s Primehouse
616 N Rush St
Chicago, IL 60611

People. They are an organization’s greatest asset - and greatest risk. Employees, contractors, remote workers and partners: they are inside your network, familiar with your systems and processes, and access to sensitive information is part of their daily job. Insider risks may be small actions that appear normal on the surface and occur over months and years, making them difficult or impossible to detect. And insider risk isn’t just about theft either. It includes abusing a position and access to sensitive information for unfair advantage or personal gain. Regardless of whether it’s theft, fraud or misuse of information, it’s risk. What can CISOs do about it? Existing tools are noisy and provide a siloed view: Organizations have multiple point tools in place that were purpose-built to solve a specific problem around data retention or anomaly detection, but were not purpose-built to assess insider risk in a holistic way. Join our conversation as we take a look at best practices on insider risk.

ISE® PRIVATE DINNER
Best Practices for Detecting Insider Threats

July 11, 2017
5:30pm - 8:30pm
The Palm
Westin Buckhead Hotel
3391 Peachtree Road NE
Atlanta, GA 30326

People. They are an organization’s greatest asset - and greatest risk. Employees, contractors, remote workers and partners: they are inside your network, familiar with your systems and processes, and access to sensitive information is part of their daily job. Insider risks may be small actions that appear normal on the surface and occur over months and years, making them difficult or impossible to detect. And insider risk isn’t just about theft either. It includes abusing a position and access to sensitive information for unfair advantage or personal gain. Regardless of whether it’s theft, fraud or misuse of information, it’s risk. What can CISOs do about it? Existing tools are noisy and provide a siloed view: Organizations have multiple point tools in place that were purpose-built to solve a specific problem around data retention or anomaly detection, but were not purpose-built to assess insider risk in a holistic way. Join our conversation as we take a look at best practices on insider risk.

ISE® PRIVATE DINNER
Building a World-Class Security Operations Center

June 27, 2017
5:30pm - 8:30pm
The Capital Grille
801 Hennepin Ave
Minneapolis, MN 55402
marcia peters

Marcia Peters
Senior Vice President, Info Security Governance, Risk and Compliance
U.S. Bank
Biography

As the volume and complexity of threats continues to rise, companies are challenged with managing security incidents more effectively. There are also a wealth of security products to learn and in many cases, security teams have too many alerts to investigate with limited staff. So what can executives do to enable a world-class SOC team? For starters, the team and their toolset need to be able to provide a comprehensive Incident Case Management system with SLA management, analyst assignments and metrics tracking. To help reduce the strain on SOC team members, full incident automation should also be enabled where appropriate and provide a clearly defined workflow via a playbook which analysts use to document the investigation. Finally, a SOC team should be able to empower an effective collaboration between analysts for Tier 2 and Tier 3 incident resolution. Join our conversation to learn more about the best practices, processes and methods you can implement to build a world-class SOC team of your own.

ISE® PRIVATE DINNER
Securing your Digital Transformation through Comprehensive Managed Detection and Response Services

June 21, 2017
5:30pm - 8:30pm
Lattanzi
361 W 46th St
New York, NY 10036
yonesy nunez

Vas Rajan
Managing Director & Chief Information Security Officer
CLS Bank
Biography

Businesses are more digital than ever. Whether they have been digital from the start or are in the process of transitioning to a more digital environment, there is no doubt that more and more business is done online or via mobile phones. Engagement with customers is also thriving on digital channels such as social media, company websites and a variety of other online services. While all of these things provide a wealth of communication and business driving opportunities, they also expose businesses to far more threats than they were accustomed to in the past. Be it through their own digital channels or through 3rd party vendors who are integrated with their business assets. Join our conversation to learn how you can improve your digital security defenses by using a holistic approach for protection that goes beyond the perimeter and identifies threats in advance all the while, checking the company’s resilience to the threat by taking the attackers’ perspective.

ISE® PRIVATE DINNER
Building a World-Class Security Operations Center

June 20, 2017
5:30pm - 8:30pm
The Oceanaire Seafood Room
1400 Arapahoe St
Denver, CO 80202
Kimberly Van Nostern

Kimberly Van Nostern
ISE® Industry Expert
T.E.N.
Biography

As the volume and complexity of threats continues to rise, companies are challenged with managing security incidents more effectively. There are also a wealth of security products to learn and in many cases, security teams have too many alerts to investigate with limited staff. So what can executives do to enable a world-class SOC team? For starters, the team and their toolset need to be able to provide a comprehensive Incident Case Management system with SLA management, analyst assignments and metrics tracking. To help reduce the strain on SOC team members, full incident automation should also be enabled where appropriate and provide a clearly defined workflow via a playbook which analysts use to document the investigation. Finally, a SOC team should be able to empower an effective collaboration between analysts for Tier 2 and Tier 3 incident resolution. Join our conversation to learn more about the best practices, processes and methods you can implement to build a world-class SOC team of your own.

ISE® PRIVATE DINNER
Building a World-Class Security Operations Center

June 15, 2017
5:30pm - 8:30pm
Kayne Prime Steakhouse
1103 McGavock St
Nashville, TN 37203
joey johnson

Joey Johnson
CISO
Premise Health
Biography

As the volume and complexity of threats continues to rise, companies are challenged with managing security incidents more effectively. There are also a wealth of security products to learn and in many cases, security teams have too many alerts to investigate with limited staff. So what can executives do to enable a world-class SOC team? For starters, the team and their toolset need to be able to provide a comprehensive Incident Case Management system with SLA management, analyst assignments and metrics tracking. To help reduce the strain on SOC team members, full incident automation should also be enabled where appropriate and provide a clearly defined workflow via a playbook which analysts use to document the investigation. Finally, a SOC team should be able to empower an effective collaboration between analysts for Tier 2 and Tier 3 incident resolution. Join our conversation to learn more about the best practices, processes and methods you can implement to build a world-class SOC team of your own.

ISE® PRIVATE DINNER
Building a Modern Security Operations Center: Technologies to Increase SOC Efficiency Using Automation

June 13, 2017
5:30pm - 8:30pm
Gibson’s Steakhouse
1028 N Rush St
Chicago, IL 60611
Jasper Ossentjuk

Jasper Ossentjuk
SVP, Chief Information Security Officer
TransUnion, LLC
Biography

Modern cyber attacks are real and evolving threats; when they strike, security teams gear up to leap into action – all too often to be hampered by a gap in security operations capabilities. A well-functioning Security Operations Center (SOC) enables teams to prevent, detect and respond sooner, collaborate, and share knowledge more effectively. Join us for an engaging discussion on how technology can help organizations improve their SOC teams from good to great with automation. What technologies and processes do they have in place? What is a good measure of success? We’ll cover all of this and more.

ISE® PRIVATE DINNER
Hunting Threats Across Time: The Benefits of Proactive Threat Hunting

June 7, 2017
5:30pm - 8:30pm
Fleming’s Prime Steakhouse
Perimeter Place
4501 Olde Perimeter Way
Atlanta, GA 30346
michelle Stewart

Michelle Stewart
VP, Information Security Intelligence & Response
Elavon

Improved incident response practices with the aid of strong automation platforms have gone a long way towards helping mature enterprises reduce the overall risk of catastrophic breaches. However, with the financial benefits of cybercrime driving criminals to elaborate methods of evading detection, it’s inevitable that they will still be able sneak some attacks by even the most advanced automated detection methods. To defend themselves, a number of organizations have found a great deal of success in the form of proactive threat hunting. Even organizations just dipping their toes into the threat hunting waters have started to reap the benefits of proactively seeking out hidden attacks. A study by the SANS Institute showed that of those engaged in threat hunting programs, over half say they’ve already achieved measurable reduction of risk in their organizations. Join our conversation to learn how your organization can reduce attack surface and system hardening, reduce exposure, and enhance speed and accuracy of response to threats via threat hunting.

ISE® PRIVATE DINNER
Building a Modern Security Operations Center: Technologies to Increase SOC Efficiency Using Automation

June 6, 2017
5:30pm - 8:30pm
Hy’s Steakhouse Toronto
120 Adelaide St W
Toronto, ON M5H 1T1
Knoblauch_Robert

Robert Knoblauch
Vice President, Enterprise Security Services, Information Security & Control
Scotiabank
Biography

Modern cyber attacks are real and evolving threats; when they strike, security teams gear up to leap into action – all too often to be hampered by a gap in security operations capabilities. A well-functioning Security Operations Center (SOC) enables teams to prevent, detect and respond sooner, collaborate, and share knowledge more effectively. Join us for an engaging discussion on how technology can help organizations improve their SOC teams from good to great with automation. What technologies and processes do they have in place? What is a good measure of success? We’ll cover all of this and more.

ISE® PRIVATE DINNER
Building a Modern Security Operations Center: Technologies to Increase SOC Efficiency Using Automation

June 1, 2017
5:30pm - 8:30pm
Char Steak & Lounge
550 East Avenue
Rochester, NY 14607
yonesy nunez

Deborah Flynt
Global Information Security Officer
Carestream
Biography

Modern cyber attacks are real and evolving threats; when they strike, security teams gear up to leap into action – all too often to be hampered by a gap in security operations capabilities. A well-functioning Security Operations Center (SOC) enables teams to prevent, detect and respond sooner, collaborate, and share knowledge more effectively. Join us for an engaging discussion on how technology can help organizations improve their SOC teams from good to great with automation. What technologies and processes do they have in place? What is a good measure of success? We’ll cover all of this and more.

ISE® PRIVATE DINNER
Managing Technology Risk and Compliance in an Expansive Digital Infrastructure

May 24, 2017
5:30pm - 8:30pm
The Palm
1750 Tysons Blvd
McLean, VA 22102
Rich Licato

Rich Licato
CISO
ARC
Biography

Organizations are complex. Modern organizations have become an interconnected mesh of digital transactions, relationships, and interactions that obfuscate traditional business boundaries. Keeping this complexity and change in sync and secure is a significant challenge for boards, executives, as well as risk management and GRC professionals throughout the business. The dynamic, distributed, and disruptive nature of business is particularly challenging from an information security standpoint as IT security, risk, and compliance must all be sustainable as an ongoing and integrated part of IT processes and the broader business. The primary directive of a mature IT risk management program should be to deliver effectiveness, efficiency, and agility to the business in managing the interrelationship of performance and risk management. This requires a strategic approach that connects the enterprise, business units, processes, transactions, and information to enable transparency, discipline, and control of the ecosystem of business and operational activities. Join our conversation as we discuss best practices for building and running an IT risk management program and maximizing its value from the convergence of strategy, process, and architecture.

ISE® PRIVATE DINNER
Hunting Threats Across Time: The Benefits of Proactive Threat Hunting

May 23, 2017
5:30pm - 8:30pm
Lattanzi
361 W 46th St
New York, NY 10036
Tomas Maldonado

Tomas Maldonado
CISO
International Flavors and Fragrances Inc.
Biography

Improved incident response practices with the aid of strong automation platforms have gone a long way towards helping mature enterprises reduce the overall risk of catastrophic breaches. However, with the financial benefits of cybercrime driving criminals to elaborate methods of evading detection, it’s inevitable that they will still be able sneak some attacks by even the most advanced automated detection methods. To defend themselves, a number of organizations have found a great deal of success in the form of proactive threat hunting. Even organizations just dipping their toes into the threat hunting waters have started to reap the benefits of proactively seeking out hidden attacks. A study by the SANS Institute showed that of those engaged in threat hunting programs, over half say they’ve already achieved measurable reduction of risk in their organizations. Join our conversation to learn how your organization can reduce attack surface and system hardening, reduce exposure, and enhance speed and accuracy of response to threats via threat hunting.

ISE® Central Executive Forum and Awards 2017

The ISE® Central Executive Forum and Awards 2017 was held on May 17, 2017 at The Westin Galleria Dallas in Dallas, TX. The ISE® Central Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® CENTRAL PRIVATE WELCOME DINNER
Best Practices for Detecting Insider Threats

May 16, 2017
5:30pm - 8:30pm
Chamberlain’s Steakhouse
5330 Belt Line Road
Dallas, TX 75254

People. They are an organization’s greatest asset - and greatest risk. Employees, contractors, remote workers and partners: they are inside your network, familiar with your systems and processes, and access to sensitive information is part of their daily job. Insider risks may be small actions that appear normal on the surface and occur over months and years, making them difficult or impossible to detect. And insider risk isn’t just about theft either. It includes abusing a position and access to sensitive information for unfair advantage or personal gain. Regardless of whether it’s theft, fraud or misuse of information, it’s risk. What can CISOs do about it? Existing tools are noisy and provide a siloed view: Organizations have multiple point tools in place that were purpose-built to solve a specific problem around data retention or anomaly detection, but were not purpose-built to assess insider risk in a holistic way. Join our conversation as we take a look at best practices on insider risk.

ISE® PRIVATE DINNER
Hunting Threats Across Time: The Benefits of Proactive Threat Hunting

May 11, 2017
5:30pm - 8:30pm
Pappas Bros. Steakhouse Downtown
Houston Center
1200 McKinney St
Houston, TX 77010
Martin Littmann

Martin Littmann
CTO & CISO
Kelsey-Seybold Clinic
Biography

Improved incident response practices with the aid of strong automation platforms have gone a long way towards helping mature enterprises reduce the overall risk of catastrophic breaches. However, with the financial benefits of cybercrime driving criminals to elaborate methods of evading detection, it’s inevitable that they will still be able sneak some attacks by even the most advanced automated detection methods. To defend themselves, a number of organizations have found a great deal of success in the form of proactive threat hunting. Even organizations just dipping their toes into the threat hunting waters have started to reap the benefits of proactively seeking out hidden attacks. A study by the SANS Institute showed that of those engaged in threat hunting programs, over half say they’ve already achieved measurable reduction of risk in their organizations. Join our conversation to learn how your organization can reduce attack surface and system hardening, reduce exposure, and enhance speed and accuracy of response to threats via threat hunting.

ISE® PRIVATE DINNER
Building a Modern Security Operations Center: Technologies to Increase SOC Efficiency Using Automation

May 11, 2017
5:30pm - 8:30pm
Max Downtown
Cityplace I
185 Asylum St
Hartford, CT 06103
Jim Lemieux

Jim Lemieux
Senior Director, Information Security
The Travelers Companies, Inc.
Biography

Modern cyber attacks are real and evolving threats; when they strike, security teams gear up to leap into action – all too often to be hampered by a gap in security operations capabilities. A well-functioning Security Operations Center (SOC) enables teams to prevent, detect and respond sooner, collaborate, and share knowledge more effectively. Join us for an engaging discussion on how technology can help organizations improve their SOC teams from good to great with automation. What technologies and processes do they have in place? What is a good measure of success? We’ll cover all of this and more.

ISE® PRIVATE DINNER
Hunting Threats Across Time: The Benefits of Proactive Threat Hunting

May 10, 2017
5:30pm - 8:30pm
Del Frisco’s
58 E Oak St
Chicago, IL 60611
Lodico_Chris

Chris Lodico
Senior Director
Blue Cross Blue Shield of Illinois
Biography

Improved incident response practices with the aid of strong automation platforms have gone a long way towards helping mature enterprises reduce the overall risk of catastrophic breaches. However, with the financial benefits of cybercrime driving criminals to elaborate methods of evading detection, it’s inevitable that they will still be able sneak some attacks by even the most advanced automated detection methods. To defend themselves, a number of organizations have found a great deal of success in the form of proactive threat hunting. Even organizations just dipping their toes into the threat hunting waters have started to reap the benefits of proactively seeking out hidden attacks. A study by the SANS Institute showed that of those engaged in threat hunting programs, over half say they’ve already achieved measurable reduction of risk in their organizations. Join our conversation to learn how your organization can reduce attack surface and system hardening, reduce exposure, and enhance speed and accuracy of response to threats via threat hunting.

ISE® PRIVATE DINNER
Building a Modern Security Operations Center: Technologies to Increase SOC Efficiency Using Automation

May 10, 2017
5:30pm - 8:30pm
Ruth’s Chris Steak House
707 15th Street
Denver, CO 80202
mary haynes

Mary Haynes
VP, Network Security Operations
Charter Communications, Inc.
Biography

Modern cyber attacks are real and evolving threats; when they strike, security teams gear up to leap into action – all too often to be hampered by a gap in security operations capabilities. A well-functioning Security Operations Center (SOC) enables teams to prevent, detect and respond sooner, collaborate, and share knowledge more effectively. Join us for an engaging discussion on how technology can help organizations improve their SOC teams from good to great with automation. What technologies and processes do they have in place? What is a good measure of success? We’ll cover all of this and more.

ISE® PRIVATE DINNER
Building a Modern Security Operations Center: Technologies to Increase SOC Efficiency Using Automation

May 9, 2017
5:30pm - 8:30pm
Jeff Ruby Precinct
311 Delta Avenue
Cincinnati, OH 45226
Gary Warzala

Gary Warzala
Chief Information Security Officer
Fifth Third Bank
Biography

Modern cyber attacks are real and evolving threats; when they strike, security teams gear up to leap into action – all too often to be hampered by a gap in security operations capabilities. A well-functioning Security Operations Center (SOC) enables teams to prevent, detect and respond sooner, collaborate, and share knowledge more effectively. Join us for an engaging discussion on how technology can help organizations improve their SOC teams from good to great with automation. What technologies and processes do they have in place? What is a good measure of success? We’ll cover all of this and more.

2017 Annual WNY ISACA Conference

May 9, 2017
8:00am - 6:00pm
DoubleTree by Hilton Hotel Rochester
1111 Jefferson Rd
Rochester, NY 14623
Website

Opening Keynote

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Cybersecurity Success Through Emotional Intelligence
8:30-9:30 PM
As new threats abound and attackers continue to find new ways to disrupt security and business, information security professionals must continue to grow as proactive innovators, good communicators, and team leaders. One way to further this growth is through Emotional Intelligence. One of the greatest problems in communication is a clear understanding of what is being said, how it is received, and how people feel about an issue. Harnessing Emotional Intelligence is a good method to channel emotions towards a path that will benefit everyone. It affects how we manage behaviors, navigate social complexities, and make personal and professional decisions that achieve positive results. Join our conversation as we discuss the benefits around utilizing Emotional Intelligence in the work place to get ahead, learn how to be authentic to who you are, learn how to shape your conversations as a thought leader, and how to show confidence and professionalism in the fields of cybersecurity and information security.

Panel Moderator

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists

Deborah Cheek

Deborah Cheek
EVP & CISO, Enterprise Compliance & Audits Cybersecurity Management
Claims Recovery Financial Services LLC
Biography

Deborah Flynt

Deborah Flynt
Global Information Security Officer
Carestream
Biography

name

Mark Leary
Vice President, Chief Information Security Officer
Conduent
ISE® Southeast Executive Award Winner 2010
Biography

Patrick Stack

Patrick Stack
CISO and IT Director, Enterprise Architecture
Eastman Kodak Company

Breaking into Information Security
10:15-11:15 AM (Panel)
To become a security professional, you need a certain mix of experience, knowledge, and skills. While Information Security is by no means an entry level career field, that doesn’t mean it’s impossible to break into the field. A formal degree aside, hands-on experience gained in the security trenches is invaluable. A solid education and a foundation in systems administration, engineering and/or development are part of the "apprenticeship" that every security professional goes through. The key to making this type of transition is in learning and understanding security issues and finding a way to apply the knowledge. Join our conversation as we discuss at length the skills, background, and experience needed to help you break into the Information Security industry.

ISE® PRIVATE DINNER
Building a Modern Security Operations Center: Technologies to Increase SOC Efficiency Using Automation

May 4, 2017
5:30pm - 8:30pm
Alexander’s Steakhouse
448 Brannan Street
San Francisco, CA 94107
paul Huesken

Adam Ely
Vice President, Information Security
& Deputy Chief Information Security Officer
Walmart
Biography

Modern cyber attacks are real and evolving threats; when they strike, security teams gear up to leap into action – all too often to be hampered by a gap in security operations capabilities. A well-functioning Security Operations Center (SOC) enables teams to prevent, detect and respond sooner, collaborate, and share knowledge more effectively. Join us for an engaging discussion on how technology can help organizations improve their SOC teams from good to great with automation. What technologies and processes do they have in place? What is a good measure of success? We’ll cover all of this and more.

ISE® PRIVATE DINNER
Hunting Threats Across Time: The Benefits of Proactive Threat Hunting

May 2, 2017
5:30pm - 8:30pm
Bourbon Steak
The Americana at Brand
237 S Brand Blvd
Glendale, CA 91204

Our ISE® Guest Host for the evening is the Chief Security Officer of a Major Telecommunications Company. This person will be revealed the night of the dinner!

Improved incident response practices with the aid of strong automation platforms have gone a long way towards helping mature enterprises reduce the overall risk of catastrophic breaches. However, with the financial benefits of cybercrime driving criminals to elaborate methods of evading detection, it’s inevitable that they will still be able sneak some attacks by even the most advanced automated detection methods. To defend themselves, a number of organizations have found a great deal of success in the form of proactive threat hunting. Even organizations just dipping their toes into the threat hunting waters have started to reap the benefits of proactively seeking out hidden attacks. A study by the SANS Institute showed that of those engaged in threat hunting programs, over half say they’ve already achieved measurable reduction of risk in their organizations. Join our conversation to learn how your organization can reduce attack surface and system hardening, reduce exposure, and enhance speed and accuracy of response to threats via threat hunting.

ISE® PRIVATE DINNER
Get Secure. Stay Secure

April 26, 2017
5:30pm - 8:30pm
The Palm
The Westin Buckhead Atlanta
3391 Peachtree Rd NE
Atlanta, GA 30326
paul Huesken

Paul Huesken
Chief Information Assurance Officer
The Coca-Cola Company
Biography

Your defenses are constantly being challenged by attackers who are morphing their tactics and adopting new evasion techniques at a record pace. Enterprises are investing more money in security products and “intelligence,” but are still finding themselves behind the eight ball when it comes to cyber threats. The struggle to get ahead and stay ahead of the ever-evolving cyber threat landscape is overwhelming. The security defenses protecting you today might not protect you tomorrow, and more than ever, you need a way to continuously validate your cybersecurity posture. Join our conversation to learn how you can apply contextual threat intelligence, product effectiveness validation, and security workflow automation to help your organization get secure, and stay secure.

ISE® PRIVATE DINNER
Building a Modern Security Operations Center: Technologies to Increase SOC Efficiency Using Automation

April 25, 2017
5:30pm - 8:30pm
Ruth Chris Steakhouse
1800 Market Street
Philadelphia, PA 19103
anthony Morrone

Anthony Morrone
CISO
DuPont, Inc.
Biography

Modern cyber attacks are real and evolving threats; when they strike, security teams gear up to leap into action – all too often to be hampered by a gap in security operations capabilities. A well-functioning Security Operations Center (SOC) enables teams to prevent, detect and respond sooner, collaborate, and share knowledge more effectively. Join us for an engaging discussion on how technology can help organizations improve their SOC teams from good to great with automation. What technologies and processes do they have in place? What is a good measure of success? We’ll cover all of this and more.

ISE® PRIVATE DINNER
Winning the Cybersecurity Talent War: Strategies for Staffing Your SOC With Top-Notch Talent

April 4, 2017
5:30pm - 8:30pm
Vallone’s
947 Gessner Rd
Houston, TX 77024
Mike Coogan

Mike Coogan
Chief Information Security Officer
Waste Management
Biography

How do you become the best employer in security operations? Attracting and retaining top security talent is one of the biggest differences between organizations with good security and those with great security. Join us for an engaging discussion on the successful strategies organizations are using to make their SOC the employer of choice. What motivates employees? How do they recruit and train? What tools and processes do they have in place? How do they measure success? We’ll cover all of this and more.

ISE® PRIVATE DINNER
Winning the Cybersecurity Talent War: Strategies for Staffing Your SOC With Top-Notch Talent

March 29, 2017
5:30pm - 8:30pm
The Palm
1750 Tysons Blvd.
McLean, VA 22102
Aiello_Frank

Frank Aiello
Chief Information Security Officer
The American Red Cross
Biography

How do you become the best employer in security operations? Attracting and retaining top security talent is one of the biggest differences between organizations with good security and those with great security. Join us for an engaging discussion on the successful strategies organizations are using to make their SOC the employer of choice. What motivates employees? How do the recruit and train? What tools and processes do they have in place? How do they measure success? We’ll cover all of this and more.

ISE® PRIVATE DINNER
Winning the Cybersecurity Talent War: Strategies for Staffing Your SOC With Top-Notch Talent

March 28, 2017
5:30pm - 8:30pm
The Capital Grille
201 North Tryon St.
Charlotte, NC 28202
Mark Odiorne

Mark Odiorne
Senior Vice President, Enterprise Threat Intelligence & Collaboration Center
Bank of America
Biography

How do you become the best employer in security operations? Attracting and retaining top security talent is one of the biggest differences between organizations with good security and those with great security. Join us for an engaging discussion on the successful strategies organizations are using to make their SOC the employer of choice. What motivates employees? How do they recruit and train? What tools and processes do they have in place? How do they measure success? We’ll cover all of this and more.

ISE® PRIVATE DINNER
Does the next generation of attacks validate your endpoint protection, your SOC and justify a hunt team?

March 28, 2017
5:30pm - 8:30pm
Harris’ The San Francisco Steakhouse
2100 Van Ness Avenue
San Francisco, CA 94109
Sima_Caleb

Caleb Sima
Managing Vice President, Cyber Security
Capital One
Biography

A wave of next generation attacks that are ‘advanced’ and ‘unique’ has hit. Your Ops team is commissioned to keep protections in place, operational and up-to-date, and along comes the next generation of endpoint protection. As endpoints continue to be the entry point for many largescale attacks, it is imperative that security teams take preemptive measures to identify and monitor potential blind spots as early in the attack life cycle as possible. Your SOC is already overwhelmed and anxious of missing never-before-seen attacks. You are now asked to build a “hunt team” when hunters are scarce or unqualified.

Join us in a conversation about what has changed from the attackers’ and the defenders’ points of view, its impact on the SOC, implications for hunt teams and endpoint protection.

ISE® PRIVATE DINNER
Winning the Cybersecurity Talent War: Strategies for Staffing Your SOC With Top-Notch Talent

March 23, 2017
5:30pm - 8:30pm
Bourbon Steak
The Americana at Brand
237 S Brand Blvd
Glendale, CA 91204
Mark Van Holsbeck

Mark Van Holsbeck
IT Risk and Security CISO
Avery Dennison Corporation

How do you become the best employer in security operations? Attracting and retaining top security talent is one of the biggest differences between organizations with good security and those with great security. Join us for an engaging discussion on the successful strategies organizations are using to make their SOC the employer of choice. What motivates employees? How do they recruit and train? What tools and processes do they have in place? How do they measure success? We’ll cover all of this and more.

ISE® PRIVATE DINNER
Winning the Cybersecurity Talent War: Strategies for Staffing Your SOC With Top-Notch Talent

March 21, 2017
5:30pm - 8:30pm
Fleming’s
6333 North Scottsdale Road
Scottsdale, AZ 85250
jason lish

Jason Lish
Senior Vice President, Security Technology & Operations
Charles Schwab & Company
Biography

How do you become the best employer in security operations? Attracting and retaining top security talent is one of the biggest differences between organizations with good security and those with great security. Join us for an engaging discussion on the successful strategies organizations are using to make their SOC the employer of choice. What motivates employees? How do they recruit and train? What tools and processes do they have in place? How do they measure success? We’ll cover all of this and more.

ISE® Southeast Executive Forum and Awards 2017

The ISE® Southeast Executive Forum and Awards 2017 was held on March 14, 2017 at the Westin Peachtree Plaza Downtown in Atlanta, GA.. The ISE® Southeast Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® SOUTHEAST PRIVATE WELCOME DINNER
Winning the Cybersecurity Talent War: Strategies for Staffing Your SOC With Top-Notch Talent

March 13, 2017
5:30pm - 8:30pm
Morton’s The Steakhouse
303 Peachtree Center Ave NE
Atlanta, GA 30308
Registration
reardon_mark

Mark Reardon
AVP of Information Security & Chief Information Security Officer
WellStar Health System
Biography

How do you become the best employer in security operations? Attracting and retaining top security talent is one of the biggest differences between organizations with good security and those with great security. Join us for an engaging discussion on the successful strategies organizations are using to make their SOC the employer of choice. What motivates employees? How do they recruit and train? What tools and processes do they have in place? How do they measure success? We’ll cover all of this and more.

ISE® PRIVATE DINNER
Winning the Cybersecurity Talent War: Strategies for Staffing Your SOC With Top-Notch Talent

March 1, 2017
5:30pm - 8:30pm
Metropolitan Grill
820 2nd Ave
Seattle, WA 98104
Chuck Markarian

Chuck Markarian
CISO
PACCAR, Inc.
Biography

How do you become the best employer in security operations? Attracting and retaining top security talent is one of the biggest differences between organizations with good security and those with great security. Join us for an engaging discussion on the successful strategies organizations are using to make their SOC the employer of choice. What motivates employees? How do they recruit and train? What tools and processes do they have in place? How do they measure success? We’ll cover all of this and more.

ISE® PRIVATE DINNER
Get Secure. Stay Secure

February 21, 2017
5:30pm - 8:30pm
Lattanzi
361 W 46th St
New York, NY 10036
Nemecek_Donna

Donna Nemecek
VP—Risk and Compliance
BNY Mellon
Biography

Your defenses are constantly being challenged by attackers who are morphing their tactics and adopting new evasion techniques at a record pace. Enterprises are investing more money in security products and “intelligence,” but are still finding themselves behind the eight ball when it comes to cyber threats. The struggle to get ahead and stay ahead of the ever-evolving cyber threat landscape is overwhelming. The security defenses protecting you today might not protect you tomorrow, and more than ever, you need a way to continuously validate your cybersecurity posture. Join our conversation to learn how you can apply contextual threat intelligence, product effectiveness validation, and security workflow automation to help your organization get secure, and stay secure.

ISE® VIP Signature Luncheon

February 16, 2017


11:30 am-1:30 pm
W San Francisco
181 3rd St.
San Francisco, CA 94103
Great Room
More Information

Enterprise Security Response: The New CISO imperative
As cybercriminals become savvier, many organizations can’t keep pace with the volume and speed of attacks. What do you do when something goes wrong? How do you prioritize and resolve the most critical threats first? How do you make the security talent you have radically more effective?” Connecting security and IT teams as well as best-of-breed security products through automation is the future of enterprise security response. Join our conversation as we discuss practical approaches that can help you dramatically improve the effectiveness of your security program.

ISE® VIP Signature Luncheon with Bay Dynamics

February 15, 2017

11:30 am – 1:30 pm
W San Francisco
181 3rd St.
San Francisco, CA 94103
Social Terrace
More Information

Quantifying Cyber Risk – If I Were To Fix One Thing Today, What Would I Do That Reduces Risk The Most?
In trying to monitor and protect their companies, most modern enterprises are overwhelmed with a deluge of threat and vulnerability data. With so much data to examine, the issue can quickly turn to where to focus first. How can enterprises continuously quantify their security exposures so that they know which remediation actions will reduce the most risk on any given day? Mapping actual financial impact to specific actual security exposures seen in your environment, to measure actual value at risk, makes the difference between time wasted and reduced risk exposure dollars saved. Join our conversation as we discuss how enterprises can effectively quantify cyber risk so that they can be more effective at actually protecting their business.

ISE® VIP Reception

February 15, 2017

6:00 pm - 8:00 pm
W San Francisco
181 3rd St.
San Francisco, CA 94103
Social Terrace
More Information

Who is Your Sensitive Data Guardian Angel?
Breaches are inevitable, losing sensitive data is not. As numerous, devilish threat actors continue to find new and increasingly detrimental ways to go after your organization’s data, your security team needs a guardian angel in the form of a stronger, agile, and all-encompassing Data Protection Platform. In this new reality, traditional perimeter-based approaches to security are insufficient – deeper visibility is required to guard against the evil threat actors trying to access sensitive data. Security professionals must take a data-centric approach that ensures security travels with the data regardless of user, location, or even hosting model.

Who wouldn’t be more confident with a guardian angel protecting their sensitive data throughout its lifecycle and across the enterprise? Join our evening of networking and mingling with peers to discuss the battles between evil adversaries and the guardian angels responsible for protecting your data.

T.E.N. & ISE® Sales and Marketing Breakfast at RSA® 2017

February 15, 2017

7:45 am - 10:00 am
The W Hotel
181 Third Street
San Francisco, CA 94103
Social Terrace
More Information

Straight from the CISO: Best Practices for Getting Marketing and Sales Results from Prospective Clients
This is an invitation-only program and attendance is limited to a select number of executives from solution provider organizations. Following registration, guests will receive personal notifications confirming their attendance.

Cold calls, big flashy emails, and unsolicited meeting notices are no way to reach out to a prospective customer. These antiquated and impersonal methods will largely go unnoticed or never see responses back from that target company or CISO. So what is the secret to getting your foot in the door for a meeting? What are the best strategies and methods for ensuring you connect with the right people at the right times and in an ethical and timely manner?

Find the answers to these important questions by asking a CISO yourself at the T.E.N.’s ISE® Sales and Marketing Breakfast during the 2017 RSA® Conference. Our panel of executive thought leaders will share their real world experiences and insights about Security Solutions Providers’ sales and marketing programs. Their candid views will give you an inside track to effectively marketing and selling solutions to the nation¹s top IT and security executives.

Symantec/ISE® VIP Signature Luncheon

February 14, 2017


12:00 pm – 2:00 pm
W San Francisco
181 3rd St.
San Francisco, CA 94103
Social Terrace
More Information

Integrated Cyber Defense for the Cloud Generation
Cyber security has never been more critical to organizations than it is today. In the cloud generation, attacks are coming through four primary vectors: the user and their devices, the data in all of its locations, over the web, and over email. This shift to the cloud changes everything and means that IT needs to develop a fully integrated cyber defense strategy. Join an engaging discussion with Symantec leadership and your peers, where you will gain insight into how you can better protect your company in the cloud generation.

ISE® VIP Reception

February 14, 2017

7:00 pm – 10:00 pm
W San Francisco
181 3rd St.
San Francisco, CA 94103
Social Terrace
More Information

Avoid Getting Hacked: The Importance of Mobile and IoT Protection in an App-Centric World
The rapid adoption and overall growth of mobile computing and the rise of the Internet of Things has created an app-centric global marketplace, ushering in new applications that are driving new business models and revenue. As hackers increasingly target both consumers and enterprise mobile apps, developers and security teams must quickly locate and remediate security gaps and launch strong, agile app protection measures to help mitigate risks that are prevalent in today’s mobile and IoT environment. Additionally, the continued proliferation of IoT technology in everything from cars, home security systems, and medical tech has opened up a variety of potential critical and highly interconnected attack vectors for threat actors to take advantage of. We now live in a world where the application itself has become the new perimeter that demands security. Join our evening of networking and mingling with peers to discuss how you can improve your mobile application security through the use of advanced obfuscation, encryption, and detection.

Carbon Black ISE® VIP Reception

February 13, 2017


6:00 pm – 8:00 pm
W San Francisco
181 3rd St.
San Francisco, CA 94103
Mixx/Upstairs Bar
More Information

Replace AV, Stop All Attacks
When it comes to stopping cyber attacks, traditional antivirus (AV) no longer cuts it. In 2016, more than 50 percent of attacks evaded traditional AV by simply not using any malware. During the same time period, successful ransomware attacks cost businesses more than $1 billion. Traditional AV is failing. Cb Defense, Carbon Black’s cloud-based Next-Generation Antivirus (NGAV) protects organizations from all attacks (not just commodity malware) including: ransomware, obfuscated malware, 0-days, and non-malware attacks. Join us for an evening of networking to learn more about how your business can replace traditional AV today and stop all forms of cyber attacks.

ISE® VIP Welcome Reception

February 12, 2017


5:15 pm – 7:30 pm
W San Francisco
181 3rd St.
San Francisco, CA 94103
Workrooms 2-3
More Information

Connect, Collaborate, and Celebrate!
T.E.N. is offering a unique networking opportunity the evening before RSA® Conference 2017. This year, we will be hosting an ISE® VIP Welcome Reception where executives and vendor representatives alike can mingle in the relaxed atmosphere of our evening theme: “Connect, Collaborate, and Celebrate.” Join us for an evening filled with exciting networking opportunities and thoughtful discussion with information security executives and vendors as we kick off this year’s RSA® Conference.

*For Security Vendors and Solution Providers Only: All ticket sales for the Sunday ISE® VIP Welcome Reception are final. In the event you are not able to attend, the cost of admission will not be refunded nor transferred as a credit to another T.E.N. - ISE® Program or sponsorship. If you would like to change the person attending on your behalf, please contact Deb Jones at djones@ten-inc.com

ISE® PRIVATE DINNER
Does the Next Generation of Attacks Validate Your Endpoint Protection, your SOC and Justify a Hunt Team?

January 18, 2017
5:30pm - 8:30pm
Lattanzi
361 W 46th St
New York, NY 10036
yonesy nunez

Dr. Yonesy F. Nuñez
SVP / Information Security Leader - Wholesale & International
Wells Fargo
Biography

A wave of next generation attacks that are ‘advanced’ and ‘unique’ has hit. Your Ops team is commissioned to keep protections in place, operational and up-to-date, and along comes the next generation of endpoint protection. As endpoints continue to be the entry point for many largescale attacks, it is imperative that security teams take preemptive measures to identify and monitor potential blind spots as early in the attack life cycle as possible. Your SOC is already overwhelmed and anxious of missing never-before-seen attacks. You are now asked to build a “hunt team” when hunters are scarce or unqualified.

Join us in a conversation about what has changed from the attackers’ and the defenders’ points of view, its impact on the SOC, implications for hunt teams and endpoint protection.