Archived Events 2018

T.E.N. & ISE® Sales and Marketing Breakfast at RSA® 2018

ten

April 18, 2018
7:45 am - 10:00 am
W San Francisco
181 3rd St.
San Francisco, CA 94103
Social Terrace
More information

Building the Foundation for Security Sales Success: Best Practices for Connecting with Information Security Executives

Today’s Information Security Executives are busier than ever keeping their organizations and customers safe from malicious hackers and digital deviants. Making those vital first impressions and connections with CISOs can is critical and cold calls, big flashy emails, and unsolicited meeting notices are no way to reach out to a prospective customer. These antiquated and impersonal methods will largely go unnoticed or never see responses. So what is the secret to making that all important introduction and cementing the foundation of your next big business relationship? What are the best strategies and methods for ensuring you connect with the right people at the right times and in an ethical and timely manner?

Find the answers to these important questions by asking a CISO yourself at the T.E.N.’s ISE® Sales and Marketing Breakfast during the 2018 RSA® Conference. Our panel of executive thought leaders will share their real world experiences and insights about Security Solutions Providers’ sales and marketing programs. Their candid views will give you an inside track to effectively marketing and selling solutions to the nation¹s top IT and security executives.

Learn directly from leading industry CISOs about how to:

  • Make your messaging and brand stand out from the crowd
  • Best practices for building a highly effective field and event marketing program
  • Tips and techniques for building a relationship-oriented sales strategy
  • What marketing and sales tactics really work and which will fall flat or fail
  • Understand enterprise buying cycles and procurement processes and how those cycles align with delivering on your sales quotas and product roadmaps

This is an invitation-only program and attendance is limited to a select number of executives from solution provider organizations. Following registration, guests will receive personal notifications confirming their attendance.

ISE® VIP Signature Luncheon with Bay Dynamics

bay dynamics

April 18, 2018
11:30 am – 1:30 pm
W San Francisco
181 3rd St.
San Francisco, CA 94103
Social Terrace
More information

Security Investments 2018 – Getting the Most Bang for Your Buck
Organizations continue to invest millions in cyber security talent and technologies. Yet, according to a recent Forrester survey, those with the largest security budgets are more likely to say they've been breached, requiring additional spending to clean up the mess. Today’s practitioners clearly need better alternatives that allow them to optimize existing investments, minimizing cyber risks and maximizing ROI. Rapidly maturing behavior and risk analytics represent a significant opportunity, connecting the dots between existing tool sets to integrate critical operational, threat and vulnerability data, and tackle the pervasive issue of compromised and malicious insiders. The result – stakeholders across the organization, from the front lines to the board room, better understand the top actions required each day to minimize risk. This panel discussion will explore how cutting-edge analytics enable cyber leaders to achieve the greatest return on their cyber investments of the past, present and future.

ISE® VIP Reception with Digital Guardian

digital guardian

April 18, 2018
6:00 pm - 9:00 pm
W San Francisco
181 3rd St.
San Francisco, CA 94103
Social Terrace
More information

New Dawn for Data Loss Prevention
As more and more organizations move data to the cloud, they must consider a variety of new risks along the way. Organizations that do not implement a cloud DLP solution essentially leave cloud data protection up to their cloud storage providers. Problems can arise, however, when those providers fail to take security measures commensurate with the organizations’ data protection requirements. Join our conversation as we discuss the advantages of implementing a DLP solution to secure sensitive and confidential information in the cloud and how to implement consistent policies across the enterprise.

ISE® VIP Signature Luncheon with Symantec

symantec


April 17, 2018
12:00 pm – 2:00 pm
W San Francisco
181 3rd St.
San Francisco, CA 94103
Social Terrace
More information

Impending Crisis in Cyber Security
Symantec works with the top companies in the world to deliver unique security outcomes in their environments. Through those conversations, we’ve identified a common security operational crisis looming on the horizon. This conversation with Mike Fey, Symantec’s President & COO, is most appropriate for senior executives who have to oversee a large portion of their organizations’ cyber security outcomes

ISE® VIP Reception with Valimail

valimail

April 17, 2018
7:00 pm - 10:00 pm
W San Francisco
181 3rd St.
San Francisco, CA 94103
Social Terrace
More information

Stop Fake Email with DMARC Enforcement and Email Authentication
Email fraud through phishing continue to be the biggest attack vector contributing to over 90 percent of cyber-attacks, by which hackers infiltrate corporate networks. But It’s not enough to create an anti-phishing training program: there are technical solutions, such as DMARC-based email authentication, that can help mitigate the email fraud threat. But only a tiny percentage of domain owners are taking advantage. Despite widespread support for email authentication by big email providers, many domain owners have been slow to adopt. Another key issue slowing the adoption of email authentication is the perceived difficulty and complexity of implementing DMARC. Valimail has found that among the top million domains, 96.4% still have not published DMARC records — despite the fact that the overwhelming majority of email inboxes support it. Organizations are missing out on a valuable, accessible solution for protecting themselves against email fraud and phishing attacks. This is known as the “DMARC adoption gap”. Join the conversation as we discuss how you can improve your organization’s email security through implementation of DMARC and email authentication standards.

ISE® VIP Reception with Prevoty

prevoty


April 16, 2018
5:30 pm – 8:00 pm
W San Francisco
181 3rd St.
San Francisco, CA 94103
Mixx/Upstairs Bar
More information

The Evolution of AppSec: From WAFs to Autonomous Application Security
Web application firewalls (WAFs) entered the security market at the turn of the century as web apps became increasingly complex and critical to digital life. As app-targeted attacks have become more common and sophisticated, WAFs have failed in much the same way that other firewalls, rule-based security measures, and legacy security solutions have: defenses that rely on past signatures and patterns always lose. With the acceleration of DevOps application development, a more refined and modernized solution is necessary. Autonomous application security can provide real time visibility into attacks, help bridge the DevSecOps gap, and reduce overall risk.

ISE® VIP Welcome Reception with CloudPassage

cloudpassage


April 15, 2018
5:30 pm – 7:30 pm
W San Francisco
181 3rd St.
San Francisco, CA 94103
Workroom 2 & 3
More information

Security Contained: Bringing Old Age Advantages to New Age Technologies
While their roots might extend back to the 70’s, containers, micro services, and the public cloud are now on the cusp of becoming a viable replacement for hardware abstraction and virtualization tools. While the latter are popular in data centers worldwide, modern containers and cloud offerings provide a slew of benefits that improve on traditional hardware abstraction and virtualization options. However, as with any enterprise technology, there are best practices that should be adhered to for ensuring reliability, availability and security. Join our conversation as we discuss the best practices surrounding securing, managing, supporting and orchestrating containers in the modern enterprise.

ISE® PRIVATE DINNER
Deception-based Threat Detection: Myths and Realities

April 10, 2018
5:30pm - 8:30pm
Eddie V’s Prime Seafood
4400 W Boy Scout Blvd
Tampa, FL 33607
Casey Marquette

Ennis Alvarez
Vice President, Information Technology Infrastructure
Rooms To Go
Biography

In today’s world, advanced threats and insider threats demonstrate that they can evade security prevention systems. As a result, in-network threat visibility and detection are now considered critical security infrastructure. However, there are myths and realities about the effectiveness of solutions like deception for detecting advanced threats. Additionally, there are also specific strategies for operational management efficiency and key use cases that are driving adoption of deception-based solutions. Join our conversation as we discuss real-world deployment experiences, the value customers are realizing, and what pen test Red Teams are saying about deception-based threat detection.

ISE® PRIVATE DINNER
Security Best Practices in a Perimeter-less World: The Zero Trust Approach

April 5, 2018
5:30pm - 8:30pm
Eddie V’s Prime Seafood
7900 Tysons One Pl
McLean, VA 22102

The perimeter doesn’t exist. It’s gone. Your employees, customers, partners, and vendors need secure access from anywhere on any device. Today, it is almost impossible to secure corporate infrastructure using legacy technologies that have not fundamentally improved for over two decades. Furthermore, organizations continue to face increasingly potent pervasive attacks on cloud-based environments, which more traditional security infrastructure can’t keep up with. Today’s IT reality requires flexible and adaptive security, one centered on a user’s identity instead of the various networks that they consume. In this perimeter-less age of security, how is your organization adapting? Join our conversation as we discuss the best practices and proven strategies for achieving a Zero Trust security model through a software-defined perimeter.

SAI GLOBAL WEBINAR
The Modern CISO Project

April 4, 2018
2:00 pm EST

Part computer geek, investigative analyst and law enforcement. These high level competencies seem to define the role of CISO in 2018. Since the title’s origin 23 years ago, CISOs have now become vital to helping guard the safety of an organization in a world of ever increasing and potent security threats. However, in recent years, CISOs have also become critical business enablers as well, providing effective lines of communication and appropriately addressing risks and security needs to board members. The CISO of today must understand the technical side of cyber security, in addition to enterprise risk management and how both disciplines impact an organization’s ability to successfully drive business forward. Join our panel as we discuss the current state of the CISO as well as what the future holds for the CISOs of tomorrow.

ISE® PRIVATE DINNER
Security Best Practices in a Perimeter-less World: The Zero Trust Approach

April 3, 2018
5:30pm - 8:30pm
Nick & Sam’s Steakhouse
3008 Maple Ave
Dallas, TX 75201
Robert Pace

Robert Pace
Vice President, Information Security & Compliance
First American Payment Systems
Biography

The perimeter doesn’t exist. It’s gone. Your employees, customers, partners, and vendors need secure access from anywhere on any device. Today, it is almost impossible to secure corporate infrastructure using legacy technologies that have not fundamentally improved for over two decades. Furthermore, organizations continue to face increasingly potent pervasive attacks on cloud-based environments, which more traditional security infrastructure can’t keep up with. Today’s IT reality requires flexible and adaptive security, one centered on a user’s identity instead of the various networks that they consume. In this perimeter-less age of security, how is your organization adapting? Join our conversation as we discuss the best practices and proven strategies for achieving a Zero Trust security model through a software-defined perimeter.

ISE® PRIVATE DINNER
Answering the 'Are We Okay?' Question: Simplifying for Certainty About Advanced Threats

March 14, 2018
5:30pm - 8:30pm
Lattanzi
361 46th St.
New York, NY 10036
Rosenblatt_Lauren

Lauren Dana Rosenblatt
Executive Director, Global Head of Cyber Threat Management
The Estée Lauder Companies
Biography

With every new breach, board members and leadership teams want to know if their business is protected and ask information security leaders the ever-familiar question - “Are we ok?”. Definitive answers are difficult to provide. Enterprises have implemented endpoint security programs that are complex, unable to keep up with the pace at which attackers are developing never-before-seen techniques. The threats vs. protections arms race has resulted in multiple niche products on endpoints, making the endpoint environment complex, and exposure difficult to assess. It is crucial for enterprise security leaders and their teams to implement an endpoint strategy that addresses the scope of these new attack techniques and tactics while reducing the complexity and increasing the performance of the endpoint environment.

Join our conversation as we discuss how enterprise security leaders can get to certainty with an endpoint security program that stops never-before-seen attacker techniques while reducing complexity and cost.

ISE® Southeast Executive Forum and Awards 2018

The ISE® Southeast Executive Forum and Awards 2018 was held on March 6, 2018 at the Westin Peachtree Plaza Downtown in Atlanta, GA. The ISE® Southeast Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® SOUTHEAST PRIVATE WELCOME DINNER
Voice of the Analyst

March 5, 2018
5:30pm - 8:30pm
Morton’s The Steakhouse
303 Peachtree Center Ave NE
Atlanta, GA 30308
Wade Baker

Wade Baker
Partner & Co-Founder
Cyentia Institute
Biography

It has been well-established over the years that breaches aren’t simply a dice roll pitting attacker strength against technical defenses. Most security incidents, rather, stem from operational inefficiencies and gaps that directly or indirectly lead to the organization being compromised. This makes security operations center (SOCs) and the analysts who staff them the cornerstone upon which effective cybersecurity defenses are built. However, many analysts feel that there is a misalignment between how their time is spent vs how effectively they are able to respond to incidents. While most analysts would rather invest their time on things like advanced threat hunting and incident response management, many feel that their time is spent on vastly less effective tasks. Moreover, security analysts have become hard to find, train, and retain. A recent study by the Cyentia Institute found that the more security expertise a security analyst gains, the less satisfied they tend to be in their role. Join our conversation as we look at current state of security analysts and discuss how their roles as critical members of a security team can be improved through a shift in role focus, implementation of effective automation and orchestration, and improved training options to help them maintain overall skill quality and job satisfaction.

ISE® PRIVATE DINNER
Answering the 'Are We Okay?' Question: Simplifying for Certainty About Advanced Threats

February 28, 2018
5:30pm - 8:30pm
Vic & Anthony’s Steakhouse
1510 Texas Ave
Houston, TX 77002
Eric Seagren

Eric Seagren
Global IT Security Manager
Oceaneering International
Biography

Unique to this dinner, guests will have the pleasure of enjoying fine wines paired with the most delicious meals. We will periodically break up the conversation when each wine is brought out for tasting with an appropriately-paired, dinner course. Each pairing will be described and discussed as you partake in them, providing plenty of time to enjoy the combination flavors before we resume discussion.

With every new breach, board members and leadership teams want to know if their business is protected and often ask information security leaders the ever-familiar question - “Are we ok?”. Answering this question, especially before any theft or data loss occurs, is a mostly arduous and uncertain task. Enterprises have implemented endpoint security programs that are evolving but are still unable to keep up with the pace at which attackers are developing never-before-seen techniques. The leapfrogging of threats vs. protections has resulted in multiple niche products on endpoints, making the endpoint environment complex, costly, and fragile. It is crucial for enterprise security leaders and their teams to implement an endpoint strategy that addresses the scope of these new attack techniques and tactics while reducing the complexity of the endpoints. Join our conversation as we discuss how enterprise security leaders can get to a path of certainty and build an endpoint security program that stops never-before-seen attacker techniques while reducing complexity and cost.

ISE® PRIVATE DINNER
Securely Empower Productivity and Innovation

February 20, 2018
5:30pm - 8:30pm
The James Kitchen + Bar
616 N Rush St
Chicago, IL 60611
Nicole Ford

Nicole Darden Ford
Global Vice President, IT & CISO
Baxter International, Inc.
Biography

The internet has changed the market landscape for many industries. A variety of companies have decentralized access to information and have transformed how business is done. Innovation is no different. What was once confined to R&D centers, innovation is now expected of every area of an organization. As such, departments are constantly advancing and finding new solutions to existing problems. While this engine is great for a company's productivity, it can also open the door to new risks and the emergence of shadow IT, which in turn becomes a headache for security teams. However, forward thinking companies must not resist this revolution, but rather harness this movement as a force for progress and productivity. As more organizations embrace new innovations, their security teams must in turn, become strategic partners to enable security and progress.

ISE® PRIVATE DINNER
It’s Time to Rethink Security: Data Breaches and Their Impact on Your Reputation and Share Value

January 25, 2018
5:30pm - 8:30pm
Jeff Ruby’s Precinct
311 Delta Ave
Cincinnati, OH 45226
Casey Marquette

Casey Marquette
Senior Director, Information Security
CVS Health
Biography

A recent survey conducted by Ponemon Institute and Centrify found that a selected sample of publicly traded companies experienced an average stock price decline of 5 percent immediately following the disclosure of a breach. Coincidentally, another survey by Centrify found that 66% of consumers in the United States are likely to stop doing business with a hacked organization. Now is the time to realize the status quo of security practices and technologies are no longer effective in protecting a company’s brand, reputation and share value. Join our conversation as we discuss the challenges of a perimeter-based approach and how to redefine security for the hybrid enterprise.

ISE® PRIVATE DINNER
Stop Breaches in Real-Time Based on User Behavior

January 24, 2018
5:30pm - 8:30pm
BLT Steak
201 E Trade St
Charlotte, NC 28202
James Hillier

James Hillier
CISO/ Associate CIO
Central Piedmont Community College

A recent Forrester study noted an astonishing two-thirds of organizations experienced an average of five or more security breaches in the past two years. These breaches have resulted in billions of compromised user names and passwords, further increasing the risk of subsequent breaches. Armed with these stolen credentials, an attacker has just the camouflage they need to “look” like a legitimate user – where they can infiltrate and move laterally through an organization without raising suspicion. Risk-based security solutions that include integrated machine learning can help IT identify suspicious activity in real-time and respond quickly to stop a potential breach in progress. Join our conversation to learn how machine learning enables access based on user behavior, helping your security team better implement risk-based policy to protect your organization’s entire hybrid IT environment.