ISE® National Summit Schedule of Events 2021

August 17, 2021

12:00 PM CT: ISE® Digital Lounge Opens (Networking & Sponsor Visits)

The ISE® Digital Lounge—which remains open before, during, and after the ISE® National Summmit—allows executives and our sponsors to network with one another and share information.

Executives who check in with each sponsor will receive a “stamp” for their virtual ISE® Digital Passport and be entered in the Passports-for-Prizes raffle (winners announced the following day).

1:00 PM CT: ISE® National Summit Begins: Opening Remarks

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent

T.E.N.'s CEO & President will welcome guests and provide an overview of the program agenda for the ISE® National Summmit 2021.

1:05 PM CT: Keynote Address

Externalizing Security

Mike Towers
Chief Information Security Officer
Takeda Pharmaceuticals
ISE® Northeast Executive of the Year Award Winner 2015
ISE® North America Executive: Health Care Award Winner 2015
ISE® Northeast Executive Award Winner 2020
ISE® North America Executive: Health Care Award Winner 2020


Many security programs prioritize internal resources, stakeholders, technologies, and users. Digital health trends are forcing us all to rethink our opportunities and responsibilities to enable trusted business outcomes outside our enterprise. Are we ready?

1:20 PM CT: Sponsor Showcase

Why Asset Management Matters for Cybersecurity

Nathan Burke

Nathan Burke

The line between IT and security is blurring. What was once a simple delineation between keeping information safe and providing the tools necessary to get work done is no longer clear. Seemingly overnight, a foundational understanding of what devices, users, and cloud instances exist in environments have jumped to the top of CISOs’ lists. In this new enterprise, why does asset management – once a pure IT play – matter for cybersecurity? How can both the IT and security teams benefit from cybersecurity asset management? Join this session with Nathan Burke of Axonius to learn:

- Why so many security frameworks consider asset management to be foundational
- The difference between asset management for IT and asset management for security
- Why the asset management problem hasn’t been solved yet — and what to do about it

1:35 PM CT: Interactive Executive Roundtables

The Interactive Executive Roundtables brings together industry leaders, invited guests, and sponsor delegates to meet each other and join in interactive discussions on key industry issues as well as share best practices. The interactive roundtable discussions are hosted by our distinguished ISE® Alumni who are leading CISOs and Information Security Executives.

Continuous Global IT, Security, and Compliance Assessment


Stoddard Manikin
Children's Healthcare of Atlanta

The past year has brought into stark relief the need for organizations to have strong, cloud-based security and compliance policies. As companies engage in swift digital transformation, cybersecurity now plays a much larger role and requires us to change how we have operated in the past. Stitched-together security stacks that collect data in fragments, cannot scale, and do not interoperate are no longer viable options. Instead, security teams need an end-to-end cloud platform that gives them visibility across all their IT assets no matter where they are along with automated threat prioritization, patching and response capabilities. Given the severity of today’s threats, a full cloud platform will also need to do these things continuously, even across third-party cloud platforms, so your team can always assess the organization’s global IT, security, and compliance posture. Join our conversation as we discuss the challenges our security platforms face as well as best practices for building a next-generation cloud platform that collects and analyzes telemetry data in real time for continuous threat response.

Reassessing Technology Stacks and Security Strategies

Prentis Brooks
Head of Information Security
Lincare Holdings, Inc.

With endpoints, devices and users operating from anywhere, cybersecurity teams have their work cut out for them to protect all these moving parts. At least a portion of organizational workforces will remain remote, meaning that security professionals will need to reassess how their current technology stacks and security strategies are performing, consider other investments and anticipate further changes that will occur due to new or accelerated digital transformation projects.

Contending With the Boom of Ransomware

Ajay Gupta

Ajay Gupta
Chief of Cyber Security Operations Center

The pandemic made more opportunists out of cybercriminals than ever before. Ransomware boomed in 2020, accounting for 41% of all cyberinsurance claims filed in the first half of the year alone. As greater attacks ramp up in 2021, CISOs and their teams must ensure they are following best practices for mitigating ransomware risk as cybercriminals continue to target the most vulnerable.

1:55 PM CT: Sponsor Showcase

Modern Risk Management: Locating, Prioritizing, and Minimizing Risks to Your Business

Jeremy D. Briglia
Director of Pre-Sales Field Operations

More organizations are turning to an Integrated Risk Management path, which allows them to approach the scope of risk and audits in scalable, dynamic ways. Accomplishing tasks like security assessments, risk communications and compliance in real time has never been more important given the speed and complexity of advanced cyberattacks. However, in order to achieve a modern approach to risk management, enterprise programs must integrate vital processes such as continuous optimization, automated risk-based prioritization and insights, and the automatic operationalization of security controls. Typically, these processes occur in silos, making the need for mature, unified risk management that much more important. Join our conversation as we discuss the attributes of modern risk management programs, including better ways to strategically locate and prioritize risks, assess business risks, and mitigate current pain points for overwhelmed security teams.

2:10 PM CT: Information Security Executive® Deep Dive Panel

An industry cross section of ISE® Alumni and leading security executives explore today’s hottest security trends and issues and the key challenges they are facing now and in the future.


Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent


Joe Bennett

Joe Bennett
Vice President, Chief Information Security Officer

Amanda Fennell
ISE® Central People's Choice Award Winner 2019
ISE® North America People's Choice Award Winner 2019
ISE® Central People's Choice Award Winner 2020
ISE® Central Executive Award Finalist 2020
ISE® North America Executive: Commercial Award Finalist 2020


Chuck Markarian

Chuck Markarian
ISE® West Executive of the Year Award Winner 2018
ISE® West People's Choice Award Winner 2018


2:45 PM CT: Sponsor Showcase

Navigating Today’s New Threat Landscape

Petko Stoyanov

Petko Stoyanov
Global Chief Technology Officer

Forcepoint will take us on a journey of the road ahead in a post-pandemic world, including lessons learned from the last year; a rapidly-growing, changing threat landscape; and an evolving IT landscape that has shifted from a contained office environment to securing today’s hyper-dispersed workforce that is here to stay. We will discuss actionable insights for navigating through these challenges and changes to ensure maximum security and data protection in the world.

3:00 PM CT: Sponsor Showcase

Insider Risk Management: The Alternative to DLP is Here!

Tommy Todd

Tommy Todd
Vice President of Security

We live in a world where employees are almost twice as likely to expose corporate data than they were prior to the pandemic. As a result, organizations have been struggling to solve this problem with legacy solutions such as DLP and need a dedicated Insider Risk Program instead. By attending this session, you will learn how an Insider Risk Management approach can provide the visibility you need to quickly mitigate data exposure risks without the obstacles commonly associated with blocking and tackling.

3:15 PM CT: Closing Keynote

Lessons Learned in the Nation’s Spotlight


Mark Leary
Global Chief Information Security Officer
Regeneron Pharmaceuticals
ISE® Southeast Executive Award Winner 2010
ISE® Northeast Executive Award Winner 2019
ISE® North America Executive: Health Care Award Winner 2019


The COVID-19 pandemic thrust Regeneron into the epicenter of a global pandemic as it raced towards a therapeutic end. This heightened visibility increased hostile nation-state threats to Regeneron’s IT operations and employees were bombarded with COVID-19 social engineering attacks. This required the cybersecurity team to pivot to a multifaceted program to protect the company, its employees and, ultimately, the patient itself. Now as the pandemic advances towards a vaccine and companies are beginning to move back to semblance of earlier times, the cybersecurity team is adjusting again. Join us as Mark describes the lingering changes to Regeneron’s cybersecurity due to lessons learned and what is in store for the future.

3:30 PM CT: ISE® National Summit Concludes

Executives may continue checking in with sponsors to receive a “stamp” for their virtual ISE® Digital Passport.

4:15 PM CT: ISE® Digital Lounge Closes

The ISE® Digital Lounge closes and the event concludes.