T.E.N. Knowledge Base

ISE® East Summit and Awards 2022

Introducing Island, The Enterprise Browser  > Download Whitepaper
The consumer browser was never designed to be an enterprise application, causing organizations to overcompensate with a complex and expensive security stack that is increasingly unreasonable to manage and incredibly frustrating to work with for users and security teams alike. Island is the world’s first Enterprise Browser that naturally embeds the core needs of the enterprise into the smooth, familiar, Chromium-based browser experience.


Island Enterprise Browser - Essential Capabilities  > Download Data Sheet
At Island we reimagined what the browser could be. By taking in the needs of the enterprise we are able to have a dramatic positive impact on every layer of cybersecurity and all other functions of IT, while improving the end user experience and productivity. Leveraging the open-source browser that all major browsers are based on, Island provides fine-grained policy control over every facet of a user’s interaction with a web application giving the enterprise limitless visibility, control and compliance with their most critical applications. Island can serve as the platform for the future of productive and secured work.


ESG: A Breakthrough in Securing a Modern, Cloud-enabled Hybrid Workforce  > Download Whitepaper
With organizations leveraging more SaaS applications than ever before from a diverse collection of corporate-owned and non-corporate-owned devices used by both employees and third-party partners and contract workers, access control and sensitive data controls have become more complex than ever. New zero trust strategies seek to solve these issues. However, current security controls are flawed in their ability to effectively and efficiently provide IT, risk, and security teams the flexibility they require. New strategies are needed.


Frost & Sullivan: Extending Enterprise Security Architechture via the Browser  > Download Whitepaper
Thanks to its flexibility, capabilities, and ubiquity, the web browser utilizes a woven ecosystem of business technologies. However, managing the intersection of users, web applications, and the underlying data is difficult. Businesses need a web browser that takes a different approach than a consumer browser and delivers functions with the enterprise’s needs in mind. This new category of essential business tools is the Enterprise Browser.


Illusive Spotlight™ Solution Brief  > Download Brief
Despite the deployment of privileged account management (PAM) and multi-factor authentication (MFA), 1 in 6 enterprise endpoints and servers still have identity risks that let attackers gain the privileges they need. Privileged identities are the number one vector for ransomware and other targeted cyberattacks.


State of Machine Identity Management Report  > Download Whitepaper
In this report, we explore findings from a survey independently conducted by the Ponemon Institute and published by Keyfactor. The report sheds light on how organizations are deploying and managing their PKI and machine identities today, and what risks and challenges they face as the role of PKI and machine identities continues to evolve.


The Threat Landscape HEATs Up with Highly Evasive Adaptive Threats  > Download Whitepaper
Menlo Security has studied a variety of techniques attackers are using to successfully launch ransomware and phishing attacks and have termed these “highly evasive adaptive threats” (HEAT). HEAT attacks evade existing security defenses by understanding all the technology integrated into the existing security stack and building delivery mechanisms to evade detection. To meet the challenges posed by HEAT attacks, organizations must shift from a post-breach detection mindset to one of prevention, with a focus on stopping threats before they ever reach the endpoint.


2022 Cloud Security Alert Fatigue Report  > Download Whitepaper
Security professionals are all too familiar with alert fatigue. They faced it in the on-prem world, and now they’re dealing with it in the cloud. Organizations use many different security tools that each generate alerts, overwhelming security teams who have to spend hours each day reviewing alerts to determine which issues need to be fixed first. To find out more about the current state of alert fatigue, its causes, impacts, and possible solutions, Orca Security commissioned a global survey held among 813 IT decision makers in five countries and across ten industries.


IDC Tech Spotlight: Data Centric Security Coming of Age, Enabled with Automation  > Download Whitepaper
Data-centric security technology has witnessed a decade's worth of progress in the last couple of years driven by Machine Learning and Artificial Intelligence, replacing manual tasks with automation. The data security market is evolving to address these issues. A converging security infrastructure shows promise in reducing the complexity of managing data governance policies across hybrid and multicloud environments.


Traditional Pentesting: A Turtle Chasing a Cheetah  > Download Whitepaper
Simply doing more pentests in the traditional manner is not viable. While missing all kinds of critical vulnerabilities, traditional pentests can even make the ones that are found and reported difficult to keep up with. It’s frustrating to think of all the money, labor and resources that are being spent by security teams and their contractors only for those efforts to fall short in response to today’s and tomorrow’s cyber threats.


In the Crosshairs: Organizations and Nation-State Cyber Threats  > Download Whitepaper     > CSIS Launch Video
In order to better understand how organizations perceive and prepare for the threat nation-state actors present and how this perception aligns with the motivations and effects these incidents have, we conducted a survey of 800 IT security decision makers from the United States, the United Kingdom, Germany, France, Japan, India and Australia between November and December 2021. Respondents belonged to organizations with 500 or more employees from a range of industries, mainly focused on critical infrastructure.

Cybersecurity Talent Shortage - The Old Way Is Not the New Way

name

Mark Leary
Global Chief Information Security Officer
Regeneron Pharmaceuticals
ISE® Southeast Executive Award Winner 2010
ISE® Northeast Executive Award Winner 2019
ISE® North America Executive: Health Care Award Winner 2019

Biography

Threat & Vulnerability Management Solution Implementation

Ryan Halstead Ryan Halstead
Head of Cyber Defense and Threat Intelligence
Jack Henry & Associates
Biography

Lilly Shield: Enable and Protect

Maryanne Wagner Maryanne Wagner
Associate Director - IS Education & Development
Eli Lilly and Company
Biography

Clinical Workstation 2.0, Phase 1 (CW2)

name Don Phillips
Product Management for Managed Devices, Senior Manager
Duke Health
Biography

VS&Co. Incident Response

Jennifer Kutz Jennifer Kutz
Cybersecurity Portfolio Manager & CISO Chief of Staff
VS&Co.
Biography

Product Support Center of Excellence

Xavier Ashe
SVP, Cybersecurity Operations
Truist
Biography

Exabyte Sponsor Showcase - Island

Jason Trunk Jason Trunk
Enterprise Architect
Island