5:30pm - 8:30pm
361 W 46th St
New York, NY 10036
VP—Risk and Compliance
Your defenses are constantly being challenged by attackers who are morphing their tactics and adopting new evasion techniques at a record pace. Enterprises are investing more money in security products and “intelligence,” but are still finding themselves behind the eight ball when it comes to cyber threats. The struggle to get ahead and stay ahead of the ever-evolving cyber threat landscape is overwhelming. The security defenses protecting you today might not protect you tomorrow, and more than ever, you need a way to continuously validate your cybersecurity posture. Join our conversation to learn how you can apply contextual threat intelligence, product effectiveness validation, and security workflow automation to help your organization get secure, and stay secure.
Enterprise Security Response: The New CISO imperative
As cybercriminals become savvier, many organizations can’t keep pace with the volume and speed of attacks. What do you do when something goes wrong? How do you prioritize and resolve the most critical threats first? How do you make the security talent you have radically more effective?” Connecting security and IT teams as well as best-of-breed security products through automation is the future of enterprise security response. Join our conversation as we discuss practical approaches that can help you dramatically improve the effectiveness of your security program.
Quantifying Cyber Risk – If I Were To Fix One Thing Today, What Would I Do That Reduces Risk The Most?
In trying to monitor and protect their companies, most modern enterprises are overwhelmed with a deluge of threat and vulnerability data. With so much data to examine, the issue can quickly turn to where to focus first. How can enterprises continuously quantify their security exposures so that they know which remediation actions will reduce the most risk on any given day? Mapping actual financial impact to specific actual security exposures seen in your environment, to measure actual value at risk, makes the difference between time wasted and reduced risk exposure dollars saved. Join our conversation as we discuss how enterprises can effectively quantify cyber risk so that they can be more effective at actually protecting their business.
Who is Your Sensitive Data Guardian Angel?
Breaches are inevitable, losing sensitive data is not. As numerous, devilish threat actors continue to find new and increasingly detrimental ways to go after your organization’s data, your security team needs a guardian angel in the form of a stronger, agile, and all-encompassing Data Protection Platform. In this new reality, traditional perimeter-based approaches to security are insufficient – deeper visibility is required to guard against the evil threat actors trying to access sensitive data. Security professionals must take a data-centric approach that ensures security travels with the data regardless of user, location, or even hosting model.
Who wouldn’t be more confident with a guardian angel protecting their sensitive data throughout its lifecycle and across the enterprise? Join our evening of networking and mingling with peers to discuss the battles between evil adversaries and the guardian angels responsible for protecting your data.
Straight from the CISO: Best Practices for Getting Marketing and Sales Results from Prospective Clients
This is an invitation-only program and attendance is limited to a select number of executives from solution provider organizations. Following registration, guests will receive personal notifications confirming their attendance.
Cold calls, big flashy emails, and unsolicited meeting notices are no way to reach out to a prospective customer. These antiquated and impersonal methods will largely go unnoticed or never see responses back from that target company or CISO. So what is the secret to getting your foot in the door for a meeting? What are the best strategies and methods for ensuring you connect with the right people at the right times and in an ethical and timely manner?
Find the answers to these important questions by asking a CISO yourself at the T.E.N.’s ISE® Sales and Marketing Breakfast during the 2017 RSA® Conference. Our panel of executive thought leaders will share their real world experiences and insights about Security Solutions Providers’ sales and marketing programs. Their candid views will give you an inside track to effectively marketing and selling solutions to the nation¹s top IT and security executives.
Integrated Cyber Defense for the Cloud Generation
Cyber security has never been more critical to organizations than it is today. In the cloud generation, attacks are coming through four primary vectors: the user and their devices, the data in all of its locations, over the web, and over email. This shift to the cloud changes everything and means that IT needs to develop a fully integrated cyber defense strategy. Join an engaging discussion with Symantec leadership and your peers, where you will gain insight into how you can better protect your company in the cloud generation.
Avoid Getting Hacked: The Importance of Mobile and IoT Protection in an App-Centric World
The rapid adoption and overall growth of mobile computing and the rise of the Internet of Things has created an app-centric global marketplace, ushering in new applications that are driving new business models and revenue. As hackers increasingly target both consumers and enterprise mobile apps, developers and security teams must quickly locate and remediate security gaps and launch strong, agile app protection measures to help mitigate risks that are prevalent in today’s mobile and IoT environment. Additionally, the continued proliferation of IoT technology in everything from cars, home security systems, and medical tech has opened up a variety of potential critical and highly interconnected attack vectors for threat actors to take advantage of. We now live in a world where the application itself has become the new perimeter that demands security. Join our evening of networking and mingling with peers to discuss how you can improve your mobile application security through the use of advanced obfuscation, encryption, and detection.
Replace AV, Stop All Attacks
When it comes to stopping cyber attacks, traditional antivirus (AV) no longer cuts it. In 2016, more than 50 percent of attacks evaded traditional AV by simply not using any malware. During the same time period, successful ransomware attacks cost businesses more than $1 billion. Traditional AV is failing. Cb Defense, Carbon Black’s cloud-based Next-Generation Antivirus (NGAV) protects organizations from all attacks (not just commodity malware) including: ransomware, obfuscated malware, 0-days, and non-malware attacks. Join us for an evening of networking to learn more about how your business can replace traditional AV today and stop all forms of cyber attacks.
Connect, Collaborate, and Celebrate!
T.E.N. is offering a unique networking opportunity the evening before RSA® Conference 2017. This year, we will be hosting an ISE® VIP Welcome Reception where executives and vendor representatives alike can mingle in the relaxed atmosphere of our evening theme: “Connect, Collaborate, and Celebrate.” Join us for an evening filled with exciting networking opportunities and thoughtful discussion with information security executives and vendors as we kick off this year’s RSA® Conference.
*For Security Vendors and Solution Providers Only: All ticket sales for the Sunday ISE® VIP Welcome Reception are final. In the event you are not able to attend, the cost of admission will not be refunded nor transferred as a credit to another T.E.N. - ISE® Program or sponsorship. If you would like to change the person attending on your behalf, please contact Deb Jones at firstname.lastname@example.org
ISE® PRIVATE DINNER
Does the Next Generation of Attacks Validate Your Endpoint Protection, your SOC and Justify a Hunt Team?
5:30pm - 8:30pm
361 W 46th St
New York, NY 10036
Dr. Yonesy F. Nuñez
SVP / Information Security Leader - Wholesale & International
A wave of next generation attacks that are ‘advanced’ and ‘unique’ has hit. Your Ops team is commissioned to keep protections in place, operational and up-to-date, and along comes the next generation of endpoint protection. As endpoints continue to be the entry point for many largescale attacks, it is imperative that security teams take preemptive measures to identify and monitor potential blind spots as early in the attack life cycle as possible. Your SOC is already overwhelmed and anxious of missing never-before-seen attacks. You are now asked to build a “hunt team” when hunters are scarce or unqualified.
Join us in a conversation about what has changed from the attackers’ and the defenders’ points of view, its impact on the SOC, implications for hunt teams and endpoint protection.