ISE® FIRESIDE WEBINAR
Putting People in the Heart of Cybersecurity
Moderator:
Marci McCarthy
CEO and President
T.E.N.
Biography
Anne An
Lead Threat Intelligence Researcher
Trellix
Biography
Medha Bhalodkar
CISO, Enterprise IT Risk Officer
Columbia University
ISE® North America Executive Award Winner 2015 - Academic/Public Sector Category
ISE® North America Executive Award Winner 2016 - Academic/Public Sector Category
ISE® Northeast Executive Award Finalist 2018
Biography
Dr. Evette Maynard-Noel
Associate Chief Information Officer
Cybersecurity and Infrastructure Security Agency (CISA)
Biography
As the volume of cyberthreats rises and security talent resources become more strained, smart enterprises realize that they cannot simply hire more staff. No business can scale their cybersecurity operations or curtail stress with people alone. They need the right people, processes and technology. Join us for an engaging discussion on how closing the cyber security talent gap is not only a business imperative but is important to national security and our daily lives. We will also explore how to remove the barriers to entry, actively inspire talent to do soulful work and how to position new strategies and investments for board approval.
Attendees of this ISE® Fireside Webinar are eligible to earn 1 CPE credit upon its conclusion.
ISE® FIRESIDE WEBINAR
Dismantling and Defending Against Criminal Enterprises
Moderator:
Marci McCarthy
CEO and President
T.E.N.
Biography
Josh Griffin
Director, Cyber Threat Engineering
Change Healthcare
Douglas McKee
Principal Engineer & Director of Vulnerability Research
Trellix
Biography
Liz Morton
Senior Director, Cybersecurity
Intercontinental Exchange
Biography
Cybercriminal groups are growing in their sophistication and operations, building everything from HR, to payroll, to culture and employee recognition programs, to call centers. They are fully functioning organizations, with marketing and user support. And as they scale and build trust in and dependencies on others, they often open doors for researchers and law enforcement to poke holes in their operations and techniques. Perhaps more significantly, the line between cybercriminal groups and state-backed adversarial groups is blurring, with cybercriminal enterprises like Conti and others acting on behalf of nation-states. Join us for an insightful discussion on how we can best equip ourselves, our customers and our colleagues to protect our critical information, infrastructures, and assets from those who seek to profit from theft of intellectual and organizational data through the exploitation of vulnerabilities – which China and Russia are known to target.
Attendees of this ISE® Fireside Webinar are eligible to earn 1 CPE credit upon its conclusion.
ISE® FIRESIDE WEBINAR
Getting Ahead of Your Adversary
Moderator:
Marci McCarthy
CEO and President
T.E.N.
Biography
Douglas McKee
Principal Engineer & Director of Vulnerability Research
Trellix
Biography
Michael Boucher
Executive Director, Global Information Security
JLL
Biography
Kevin Gowen
Chief Information Security Officer
Synovus Financial Corporation
ISE® East Executive Award Winner 2022
Biography
The evolution and pace of adversarial cyberthreats are constant stress points for organizations inclusive of the heads of UK and US security services recently making an unprecedented joint appearance to warn of the threat from China. Enterprises have reacted to this pressure by increasing security budgets amid a shortage of security expertise, but still can’t keep up with modern threat actors who are constantly updating their arsenal of tools, tactics, and techniques. Most current security options rely on siloed intelligence requiring human and manual intervention. These may address immediate threats, but the increasing numbers and nuances of cyberattacks are bombarding security teams into a seemingly constant reactive posture. We’re put further on defense by organizations struggling to stay on top of basic patching and a gap in security talent to find vulnerabilities and ensure they are solved for before discovery by bad actors. Join us for an insightful conversation on how we must equip ourselves, our customers and our colleagues who are in the day-to-day fight to protect our critical information, infrastructures, and assets from those who seek to profit from the exploitation of vulnerabilities and theft of intellectual and organizational data.
Attendees of this ISE® Fireside Webinar are eligible to earn 1 CPE credit upon its conclusion.
ISE® FIRESIDE WEBINAR
I Do #SoulfulWork: Closing the Cybersecurity Talent Gap While Staying Ahead of the Threat Curve
Moderator:
Marci McCarthy
CEO and President
T.E.N.
Biography
Michael Alicea
Chief Human Resources Officer
Trellix
Biography
Devon Bryan
Global Chief Information Security Officer
Carnival Corporation
Biography
Kathleen Mullin
Chief Information Security Officer
Cancer Treatment Centers of America, Inc.
Biography
While not new, the cybersecurity talent crisis is one of the most significant challenges facing organizations today. While the attack surface is growing, organizations are struggling to recruit, develop and retain security professionals to address threats. Join us for an engaging discussion as we explore how companies can close the skills gap by widening the talent pool and empowering professionals to expand their skillsets. We will also explore how organizations can go beyond investing in security products to mitigate the threat landscape and align with their technology roadmap.
Attendees of this ISE® Fireside Webinar are eligible to earn 1 CPE credit upon its conclusion.
ISE® FIRESIDE WEBINAR
Build and Protect for Tomorrow, Now.
Moderator:
Marci McCarthy
CEO and President
T.E.N.
Biography
Sean Leach
Chief Product Architect
Fastly
Biography
Katie Ewers
Director, Cybersecurity
McKesson Corporation
Biography
Paul Groisman
Sr. Director, Cybersecurity
fuboTV
Biography
The pandemic not only accelerated the move to online — it also heightened the expectations of consumers, who are now shopping, working, watching, and trying to protect their data in an increasingly digital world. This demand for secure, performant, and resilient online experiences has businesses expanding their technological ecosystems — and facing the inherent risks that accompany that shift. To complicate matters further, many traditional security tools aren’t keeping pace with these advances, slowing things down with false positives that render them virtually useless. Join us for an engaging discussion on how to innovate your business performance through advanced web application and API protection (WAAP), APIs, and microservices, wherever they live, from a single unified solution. Additionally, we will dive into the future and discuss what the web will look like when organizations are coming together to combine their strengths and securely open up their development environments to more people.
Attendees of this ISE® Fireside Webinar are eligible to earn 1 CPE credit upon its conclusion.
ISE® FIRESIDE WEBINAR
Turning the Tables to Look Outside in from A Threat Actor’s Perspective
Moderator:
Marci McCarthy
CEO and President
T.E.N.
Biography
Hosts:
Selim Aissi
Chief Information Security Officer
Blackhawk Network
ISE® West Executive Award Finalist 2015
ISE® North America Executive Award Finalist 2015 - Commercial Category
Enterprise Architect
Trellix
With the constant outpouring of news headlines, it is evident that nation-state cyberattacks are a growing threat and are only getting more sophisticated. From industrial espionage, ransomware, the theft of personal information, or disruption of services — the impact from a cyberattack takes on many forms, all damaging for an enterprise. While attackers can range from cybercriminals, individual hackers, or governments, nation-states and their criminal proxies are the most dangerous because they are the most capable, best-resourced, and persistent and operate from their territory. Consequently, organizations need to make informed decisions in an uncertain environment, to protect against a range of threats. Join us for an insightful discussion to explore how security leaders can differentiate between nation-state cyberattacks and other cyberattacks by understanding the perceptions under which organizations make decisions about cybersecurity. We will also discuss how cyber hygiene and by utilizing encryption for sensitive data as well as requiring multifactor authentication is critical to reducing an attacker’s chance of success.
Attendees of this ISE® Fireside Webinar are eligible to earn 1 CPE credit upon its conclusion.
ISE® FIRESIDE WEBINAR
Forge Ahead into the Future with XDR
Moderator:
Marci McCarthy
CEO and President
T.E.N.
Biography
Vahidin "Vaha" Memić
Solutions Architect
Trellix
Biography
Ricardo Lafosse
Chief Information Security Officer
The Kraft Heinz Company
ISE® Central Executive of the Year Award Winner 2019
ISE® North America Executive: Financial Award Finalist 2019
Biography
Shelbi Rombout
Deputy Chief Information Security Officer
U.S. Bank
Biography
With the growing sophistication of threats, it’s easy to see why so many businesses are vulnerable to attacks. With a static and siloed approach to security, these businesses often find they’re unable to handle the constantly changing nature of today’s threat environment and are dependent on error-prone manual processes, not automation. Join us for an insightful discussion on how an extended detection and response can empower your organization to instantly analyze data and predict and prevent attacks with a solution that’s always learning and adapting. Additionally, our panelists will explore how increasing intelligence at the heart of your operations will enable processes to be automated and how critical security concerns will be prioritized.
ISE® FIRESIDE WEBINAR
Not all Risks are Equal: Why Context Matters in Cloud Security
Moderator:
Marci McCarthy
CEO and President
T.E.N.
Biography
Ty Murphy
Director of Product Marketing
Orca Security
Biography
John Reeder
VP, IT Governance, Risk & Compliance
Corpay
Biography
Richard Rushing
Chief Information Security Officer
Motorola Mobility
Biography
As cloud deployments grow more complex, so too does the risk of exposing assets and data to the outside world. As our cloud journeys advance, it is quickly being discovered that many pre-cloud era security scanners are falling short and lack the ability to effectively prioritize alerts, overwhelming security teams with thousands of meaningless alerts Join us for a discussion on how to evaluate your entire cloud infrastructure and prioritize risks by considering the severity, accessibility and potential business impact of identified risks. We will also explore how leveraging context-aware security intelligence can examine all potential attack paths and alert you to the 1% of risks and vulnerabilities that matter most.
ISE® FIRESIDE WEBINAR
How to Get 100% Cloud Visibility and Coverage, 100% of the Time
Moderator:
Marci McCarthy
CEO and President
T.E.N.
Biography
Eddie Borrero
Vice President & Chief Information Security Officer
Blue Shield of California
Biography
Shawn Edwards
Chief Information Security Officer
Western Union
Biography
Deborah Galea
Senior Product Marketing Manager
Orca Security
Biography
First seen as a cost-saving strategy, companies are now leveraging the cloud to accelerate IT service delivery, improve business continuity, and provide greater flexibility, resulting in competitive advantages in dynamic market conditions. However, as cloud environments continue to expand at an unprecedented rate, new security risks are arising and conventional cloud visibility tools are falling short due to having blind spots. Join our conversation as we discuss how a zero-touch approach to cloud security can deliver continuous, 100% security visibility and coverage across your entire cloud environment while building a unified data model and a visual map of all your assets. Additionally, we will explore how enterprises can regain workload-level visibility into cloud assets as well as convert this information into actionable intelligence that allows security teams to operate effectively and efficiently.
ISE® FIRESIDE WEBINAR
Cloud Security, Simplified: Less Is More With a CNAPP
Moderator:
Marci McCarthy
CEO and President
T.E.N.
Biography
John Alexander
Senior Director of Technical Product Marketing
Orca Security
Biography
Xavier Ashe
SVP, Cybersecurity Operations
Truist
Biography
André Gold
Former Vice President, Cloud and Infrastructure Engineering
Cardinal Health
Biography
As enterprises expand the footprint of their digital infrastructures, relying on multiple, disparate cloud security solutions is resulting in high TCO, alert fatigue, and blind spots across the public cloud estate. To keep up with the pace, security leaders are seeking a centralized cloud security solution to combine intelligence from deep inside the workload with cloud configuration data to quickly detect and prioritize critical security risks at every layer of the technology stack. Join us for an insightful discussion on how Cloud-Native Application Protection Platforms (CNAPPs) can shift the focus from uncontextualized and siloed security issues to broader, interconnected combinations. This contextual insight allows you to identify the risks that pose the greatest threat to your business, and helps you improve your cloud security posture as well as meet the plethora of compliance requirements.
ISE® FIRESIDE WEBINAR
Have Your Cake and Eat It Too! Do Not Just Check the Box with MFA – Be Secure Too!
Moderator:
Marci McCarthy
CEO and President
T.E.N.
Biography
Patrick McBride
Chief Marketing Officer
Beyond Identity
Biography
Jonathan Sander
Security Field CTO
Snowflake
In this Work from Home (WFH) World, with ongoing migrations to the cloud, and digital transformation projects, controlling which individuals and devices can access a wide range of cloud resources has become a top priority. Simultaneously the massive uptick in ransomware and other attacks that feed off of stolen credentials have prompted cyber insurers to mandate widespread adoption of MFA a requirement for renewal. But not all MFA is created equal. Long-standing MFA pain points such as user inconvenience, complexity and cost are still notable obstacles to MFA adoption. And in a surprising change, the US Government and others are warning companies about “phishable” MFA. Join us for an insightful discussion on requirements for modern MFA and how you can build a trusted authentication architecture that includes both the ‘who’ as well as ‘what’ device your employees are using. We will also explore how this is a key underpinning for strong zero trust strategy-eliminating implicit trust by verifying the user’s identity and checking the security posture of the work issued or BYOD devices before granting access.