ISE® FIRESIDE WEBINAR
Why a Data-first Approach to SASE Matters
WATCH VIDEO ON DEMAND
Marci McCarthy
CEO and President
T.E.N.
Biography
Sujeet Bambawale
Vice President and Chief Information Security Officer
7- Eleven
Biography
Vince Spina
Senior Vice President, Global Solutions Engineering
Forcepoint
Biography
Peter Tse
Information Security Officer
CTBC Bank, New York Branch
Biography
For years, “digital transformation” has been all the rage. Now, people work anywhere with data everywhere. Join us for an engaging conversation on how to increase workforce productivity, even with BYOD, so that your enterprise can be seamless, faster, competitive – and secure! We will also explore how and where to cut costs, improve the economies-of-scale and reduce risk by replacing fragmented and outdated infrastructures. Our discussions will also reveal how a Zero Trust approach to security can stop threats and continuously protect sensitive data in cloud, web, private apps.
ISE® FIRESIDE WEBINAR
Is ChatGPT (and other AIs) the New Shadow IT?: Enable the AI/ChatGPT World Without the Risk
Marci McCarthy
CEO and President
T.E.N.
Biography
Mike Towers
Former Chief Digital Trust Officer
Takeda Pharmaceuticals
ISE® Northeast Executive of the Year Award Winner 2015
ISE® North America Executive: Health Care Award Winner 2015
ISE® Northeast Executive Award Winner 2020
ISE® North America Executive: Health Care Award Winner 2020
Biography
In the race to compete leveraging generative artificial intelligence (AI) and tools like ChatGPT, a long-standing problem is reemerging with renewed force – Shadow IT. Join us for an engaging discussion on how you can enable your organization to leverage this revolutionary technology, without the risk. AI tools could potentially expose organizations to various security and privacy risks because employees are turning to them for an array of applications, from drafting sales and marketing emails to analyzing sensitive financial data. During our program, we will explore how enterprises can make ChatGPT and other AIs safe to use to include how to limit access to groups/users authorized to test Ais. We will also share the best practices in how to coach users on how to use the properly the platform while developing data security policies can block sensitive info in queries. For organizations that would like to take their fight against AI-related risks to the next level, we will discuss the available frameworks and the ongoing collaboration with the wider industry and government agencies to develop standards and best practices for the responsible use of generative AI.
ISE® FIRESIDE WEBINAR
Data, Devices and People Are Everywhere: Preventing Sensitive Data Loss Across ALL Egress Channels
Marci McCarthy
CEO and President
T.E.N.
Biography
Vince Spina
Senior Vice President, Global Solutions Engineering
Forcepoint
Biography
Eric S. Green
Security Operations
TikTok
Biography
Travis Farral
VP & CISO
Archaea Energy
Biography
It is hard to ignore that the lines between home and office being blurred and unmanaged devices leaving your company’s infrastructure vulnerable. “Democratization of Data, making data available to everyone all the time across websites, cloud apps, and private apps adds a whole level of challenge to the ‘risk reduction equation’. A simpler approach is warranted as the old portfolio of point products wasn’t built for this type of extended enterprise.
Join us for insightful discussion on how to unlock simplicity to bring forth comprehensive data security cross more channels into one set of policies, one console, one agent. We will also explore how to combine Zero Trust principles with a SASE architecture and advanced security to protect data across any website, cloud application, and web-based private applications to keep your data secure everywhere your people work and anywhere your data resides.
The Evolution – More Intelligence and Insight for More Advanced Protection
Marci McCarthy
CEO and President
T.E.N.
Biography
John Fokker
Head of Threat Intelligence & Principal Engineer
Trellix
Biography
Thomas Dager
Vice President, Chief Information Security Officer
Archer Daniels Midland (ADM)
Biography
Ryan Reynolds
Senior VP, Head of Cyber Risk Oversight
U.S. Bank
Biography
As the number, type, and sophistication of threats evolve, organizations require more intelligence and insight than traditional endpoint security provides. More threat actors are shifting their aim to weaknesses created by user behavior, poor cybersecurity hygiene, and shadow IT. The dramatic increase in the types of endpoint devices—including smartphones, tablets, wearable devices, and more—has overpowered first-generation endpoint security. The increasing number of potentially vulnerable endpoints can also exhaust security team resources that are relying on traditional cybersecurity defenses. Depending on separate software processes to handle the security and security management of endpoints can result in potential disconnects. And maintaining and updating blacklists of malicious codes requires more and more resources. And these legacy products still leave organizations susceptible to zero-day exploits, data theft threatening to slip through among too many false positives.
Join us for an engaging discussion on how next-generation, automated technologies can examine every process on every device to counter potential attacks have become necessary to better lock down endpoint security while investigating every phase of an attack campaign. We will also explore how behavioral analysis requires a multi-layered defense inclusive of AI and machine learning to protect against fileless and other advanced attacks.
Refine The Wheel – Crafting An Intentional And Goal Oriented Cloud Security Strategy That Tackles The Unknown Threat
Watch Video on Demand
Kevin Gowen
Chief Information Security Officer
Synovus Financial Corporation
ISE® East Executive Award Winner 2022
Biography
Marci McCarthy
CEO and President
T.E.N.
Biography
Tanweer Surve
CTO Cloud Control Management
Wells Fargo
Biography
For many security teams embarking on a multi-year cloud transformation journey, the expectation is to hit the ground running before the paint is even dry. But the evolving threat landscape can make it difficult to get started. Join our panel of cyber security thought leaders as they outline strategies and hone in on tactics for creating a cloud security plan that will modernize and simplify your security stack. The panel will also explore how emergent AI systems like ChatGPT and GPT4 will introduce new opportunities and risks in your cloud security work.
THE SEQUEL - More on How Collaboration Comes More Phishing Because Cyber Criminals are Upping their Threat Game in a Big Way
Watch Video on Demand
John Fokker
Head of Threat Intelligence & Principal Engineer
Trellix
Biography
DJ Goldsworthy
Vice President of Security Operations & Threat Management
Aflac
Biography
Marci McCarthy
CEO and President
T.E.N.
Biography
Dr. Yonesy F. Núñez
Chief Information Security Officer
The Depository Trust & Clearing Corporation (DTCC)
ISE® East Executive Award Winner 2023
Biography
We heard and listened that there is so much more to cover in how collaboration tools like Microsoft Teams, Google Docs and Slack being an integral part of everyday working life in today’s hyperconnected world but they are not designed with security in mind. Join us for an insightful discussion as we deep dive into how phishers can now attack via a variety of methods and techniques into your supply chain with the ultimate intent of getting past your own company’s protections. We will also delve into the range of security gaps and most active cyber threats that are associated with these collaboration tools ---ranging from cryptomining malware, phishing, trojans, and ransomware. We will explore how these simple endpoint attacks are evolving into complex, multi-stage operations giving an easy foothold into company networks. We will also continue how security teams can thwart massive data leaks and expensive ransomware payouts as well as take a look at the vast, new, complicated threat landscape and how we’re seeing phishing used in cyberwarfare.
Leading the Charge in Managing Cloud Security Risks as a CISO
Watch Video on Demand
Andy Ellis
Advisory CISO
Orca Security
Biography
Max Garcia
CISO, Digital First Banking
NCR Voyix
Biography
Marci McCarthy
CEO and President
T.E.N.
Biography
Chris McFarland
Vice President, Chief Information Security Officer (CISO)
Abercrombie & Fitch Co.
Biography
The financial climate has shifted, making an intentional cloud security budgeting strategy more important than ever. As the CISO, it’s your responsibility to enable security while keeping your eyes on the big picture. Join us for an engaging discussion as we unpack four budget scenarios your organization may be facing: tightening, business as usual, more funding, or even an unknown budget. We will explore how each situation requires different approaches, allowing you to walk away with clear steps you can take to reach a state of security and preparedness.
With More Collaboration Comes More Phishing: How Cyber Criminals are Upping their Threat Game in a Big Way
Watch Video on Demand
John Fokker
Head of Threat Intelligence & Principal Engineer
Trellix
Biography
DJ Goldsworthy
Vice President of Security Operations & Threat Management
Aflac
Biography
Marci McCarthy
CEO and President
T.E.N.
Biography
Dr. Yonesy F. Núñez
Chief Information Security Officer
The Depository Trust & Clearing Corporation (DTCC)
ISE® East Executive Award Winner 2023
Biography
Collaboration tools like Microsoft Teams, Google Docs and Slack are now an integral part of everyday working life where online communications with team members, vendors, partners and customers are par for the course. However, in today’s hyperconnected world, collaboration tool communications were not designed with security in mind. And phishers have taken notice where they can now attack one of the companies in your supply chain with the ultimate intent of getting past your own company’s protections. Join us for an insightful discussion as we delve into the range of security gaps and most active cyber threats that are associated with collaboration tools ---ranging from cryptomining malware, phishing, trojans, and ransomware. We will deep dive on how these simple endpoint attacks are evolving into complex, multi-stage operations giving an easy foothold into company networks. We will also explore how security teams can thwart massive data leaks and expensive ransomware payouts as well as take a look at the vast, new, complicated threat landscape and how we’re seeing phishing used in cyberwarfare.