Upcoming Events

ISE® PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

June 25, 2019
5:30pm - 8:30pm
Perry's Steakhouse & Grille - Austin Downtown
114 W. 7th Street #110
Austin, TX 78701
Registration
Allgeier_Michael

Michael Allgeier
Director, Critical Infrastructure Security
ERCOT
Biography

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and, more often than not, with legitimate credentials from a compromised user, system or device. According to the Verizon 2019 Data Breach Investigation Report, 56% of breaches took months or years to discover, a steady improvement of 2018’s statistic of 68%. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

ISE® PRIVATE DINNER
How to Avoid Making Trade-Offs Between Security and IT Operations

July 16, 2019
5:30pm - 8:30pm
Barclay Prime
237 S 18th St.
Philadelphia, PA 19103
Registration
Mark Risoldi

Mark J. Risoldi
Executive Director, Business Information Risk Management & Security
Merck & Co., Inc.
Biography

As leaders, CIOs and CISOs face pressure from all sides. They must keep organizations continuously compliant, keep critical information secure, manage fleets of networked devices and fulfill the increasingly common executive mandate to make technology an enabler for business growth. Many organizations are also challenged to update their technology from legacy systems, which make it difficult to have full visibility across endpoints and get the real-time data on which they can make confident decisions. In these stressful, fragmented environments—especially where organizations use a range of point products for security and operations, resulting in a lack of full visibility and control—there are regular trade-offs taking place among these priorities. These compromises often leave an organization open to an attack, outage or another form of disruption. Join our conversation as we discuss how security teams can better secure their enterprise against cyber threats, outages and other disruptions—without making trade-offs and without settling for “good enough”.

ISE® PRIVATE DINNER
How to Avoid Making Trade-Offs Between Security and IT Operations

July 17, 2019
5:30pm - 8:30pm
Lattanzi
361 W 46th St.
New York, NY 10036
Registration
John Graham

Kirsten Davies
SVP & Chief Information Security Officer
The Estée Lauder Companies
Biography

As leaders, CIOs and CISOs face pressure from all sides. They must keep organizations continuously compliant, keep critical information secure, manage fleets of networked devices and fulfill the increasingly common executive mandate to make technology an enabler for business growth. Many organizations are also challenged to update their technology from legacy systems, which make it difficult to have full visibility across endpoints and get the real-time data on which they can make confident decisions. In these stressful, fragmented environments—especially where organizations use a range of point products for security and operations, resulting in a lack of full visibility and control—there are regular trade-offs taking place among these priorities. These compromises often leave an organization open to an attack, outage or another form of disruption. Join our conversation as we discuss how security teams can better secure their enterprise against cyber threats, outages and other disruptions—without making trade-offs and without settling for “good enough”.

ISE® PRIVATE DINNER
Digitization and the Path to Business Transformation Via Total Data Intelligence

July 17, 2019
5:30pm - 8:30pm
Morton’s The Steakhouse
400 Post Road
San Francisco, CA 94102
Registration

Because of digitization, the amount of data existing in the world has exploded, with 2.5 quintillion bytes created every day according to Forbes. With new regulations akin to GDPR and CCPA emerging globally as a result, data privacy and cybersecurity have become top concerns for the Chief Data Officer and CISO alike. Many security professionals report that they do not currently have access to company data necessary to perform their jobs, leaving us to answer a pivotal question: How can we drive pervasive data intelligence in the organization, while reducing risks and protecting customer data privacy? Digitization only complicates this question with security leaders considering how the large movement of data will change the needs of their security program and impact strategies for protecting the data an organization collects. The majority of IT decision-makers agree they want pervasive data intelligence in their organization, but there are bottlenecks on the path to achieving 100% real-time intelligent answers, such as compliance standards, regulation requirements and risk concerns to both business and security. Join our conversation as we discuss how digitization has affected the path to business transformation and data security, requiring new approaches to acquire pervasive data intelligence that is scalable, frictionless and omnipresent.

New York Enterprise Information Security Meetup: July Edition
Fireside Chat with Marci McCarthy

July 23, 2019
6:00pm - 8:00pm
Main Floor
215 Lexington Ave
New York, NY 10016
Registration
More Information

Speaker:

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

NY Information Security Meetup (NYIS) is about advancing information security. Come join us to learn the latest information on enterprise security trends in Cyber Security, Mobile computing, Networks, Endpoint, Governance and Compliance. The meetings will feature speakers, emerging vendor demos in the security space, panel discussion, workshops, and networking.

We are in of an era where Cyber Security is taking front page and enterprises are embracing new technologies to defend against rising threats. Come and join us to mingle, learn, and prosper.

ISE® PRIVATE DINNER
Digitization and the Path to Business Transformation Via Total Data Intelligence

July 25, 2019
5:30pm - 8:30pm
Fleming’s Prime Steakhouse & Wine Bar
1960-A Chain Bridge Rd.
McLean, VA 22102
Registration

Because of digitization, the amount of data existing in the world has exploded, with 2.5 quintillion bytes created every day according to Forbes. With new regulations akin to GDPR and CCPA emerging globally as a result, data privacy and cybersecurity have become top concerns for the Chief Data Officer and CISO alike. Many security professionals report that they do not currently have access to company data necessary to perform their jobs, leaving us to answer a pivotal question: How can we drive pervasive data intelligence in the organization, while reducing risks and protecting customer data privacy? Digitization only complicates this question with security leaders considering how the large movement of data will change the needs of their security program and impact strategies for protecting the data an organization collects. The majority of IT decision-makers agree they want pervasive data intelligence in their organization, but there are bottlenecks on the path to achieving 100% real-time intelligent answers, such as compliance standards, regulation requirements and risk concerns to both business and security. Join our conversation as we discuss how digitization has affected the path to business transformation and data security, requiring new approaches to acquire pervasive data intelligence that is scalable, frictionless and omnipresent.

ISE® PRIVATE DINNER
How Leveraging East-West Movement Can Turn the Tide Against Cyber Adversaries

July 30, 2019
5:30pm - 8:30pm
Morton’s The Steakhouse
618 Church St
Nashville, TN 37219
Registration

Digital Hands' Executive Speaker

Myrna Soto

Myrna Soto
COO, Digital Hands
Former Global CISO, Comcast Corp.
Current Active Board Member, CMS Energy, Spirit Airlines and Popular Inc.
ISE® Northeast Executive Award Winner 2013
ISE® North America Commercial Executive Award Finalist 2013
ISE® North America Commercial Executive Award Finalist 2012
ISE® Northeast Executive Award Finalist 2012

Biography

Traditionally, enterprises and inexperienced MSSPs have closely monitored north-south movement for cyber threats, but east-west movement—otherwise known as lateral movement—has been neglected, leading to a host of blind spots through which an adversary can maneuver. With increasing judgment falling on security teams who cannot keep intrusions from turning into data loss, lateral movement can no longer be left unmonitored and undefended. Fortunately, there are many ways security teams can shift direction on the network compass and leverage critical controls to detect and stop adversaries, but none of them are easy. Any decently sized network very quickly becomes a management quagmire due to the sheer amount of data (events, threat intel, correlation, etc.) that have to be ingested and analyzed. Having the right security technology is only a portion of the battle; strong security posture comes from having people and processes in place to adequately monitor, and manage, and analyze systems, and that includes choosing the right MSSP out of a whirlpool of possibilities. Join our conversation as we discuss how you can turn the tide against cyber adversaries by defending against malicious lateral movement, pinpointing its risks and preventing APT-level intrusions from spreading across your network.

2019 Community College Cyber Summit
Becoming a Cybersecurity Enabler: How Community Colleges Can Bridge the Diversity and Workforce Gap

August 1, 2019
9:00am - 9:30am
Bossier Parish Community College
6220 E Texas St
Bossier City, LA 71111
Registration
More information

Keynote Speaker

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Leaders in the cybersecurity industry recognize that there is a lack of women and diversity among their teams. Even though women and minorities nearly comprise half of the general workforce, they only make up a small portion of cybersecurity professionals despite millions of jobs going unfilled and rising cyberattacks. In the past, employers have maintained a structured mindset about candidates’ qualifications to include four-year or advanced degrees, proven industry experience and like-minded thinking. However, due to the shortage of qualified cybersecurity talent, we are experiencing a paradigm shift in how we view these hiring requirements. We now need candidates who are gamechangers, who can bring much needed soft skills, passions and differing opinions that can take team thinking to the next level. With their various perspectives, women and minorities must be encouraged to enter the field as early as possible, but it’s also crucial that they maintain a passion to learn and succeed by cultivating the necessary skills to stay there. Fortunately, they can obtain technical skills and certifications by pursuing specialized training, work-study programs and apprenticeships, such as those offered by cyber boot camps, technical schools and community colleges. Currently, though, community colleges and similar establishments experience challenges with marketing themselves as security partners who enable cybersecurity professional development. To connect upcoming, diverse talent with employers who need them, community colleges can adapt and enhance the way they interact with both groups. Join us as we share our insights about the challenges community colleges face in becoming cybersecurity enablers, facilitating job readiness and contributing to solve the industry’s diversity and workforce shortage.

ISE® VIP PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

August 6, 2019
5:30pm - 8:30pm
Charlie Palmer Steak at Four Seasons
3960 S Las Vegas Blvd
Las Vegas, NV 89119
Registration
David Scott

David Scott
Associate Director, Cybersecurity
Medication Management Solutions
BD - Medical Segment
Biography

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and, more often than not, with legitimate credentials from a compromised user, system or device. According to the Verizon 2019 Data Breach Investigation Report, 56% of breaches took months or years to discover, a steady improvement of 2018’s statistic of 68%. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

ISE® VIP PROGRAM - THE SUPERCAR DRIVING EXPERIENCE
AppSec That Won’t Slow You Down

August 7, 2019
5:30pm - 8:30pm
Las Vegas Motor Speedway
Exotics Racing Racetrack
7065 Speedway Blvd
Las Vegas, NV 89115
Registration

Saltworks Security Executive Speaker:

hurst_dennis

Dennis Hurst
Founder
Saltworks Security

ISE® VIP Hosts:

Michael Blache

Michael Blache
CISO
TaxSlayer LLC

Duane Dobbins

Duane Dobbins
Information Security Officer
New York Life Insurance Company
Biography

Max Garcia

Max Garcia
Chief Information Security Officer
Prime Revenue

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Today’s market demands will not let software development wait for security to catch up. Even if you have the right team, expertise, tools, and training in place to achieve your business goals, it won’t matter if your approach to application security is outdated. Like an airbag that is installed after a car is driven off the lot, AppSec cannot wait to be applied at later stages. Instead, security teams will achieve the most out of AppSec if they focus on weaving customized security into the DNA of each unique software development lifecycle. In order to achieve this, they will need to have an AppSec program in place that is ongoing, where DevOps teams can maintain security and necessary technologies can continue to implement it moving forward—all at optimal speeds. Join our conversation as we discuss how companies can create and manage AppSec programs that run as predictably, effectively, and measurably as a well-oiled machine.

Transportation will be provided to Las Vegas Motor Speedway from the Mandalay Bay Hotel starting at 4:30 p.m. Please meet at the Mandalay Bay Tour Bus Lobby and shuttle bus service will be provided to the event. The last shuttle bus will leave Mandalay Bay at 5:20 p.m.

ISE® PRIVATE DINNER
Security Maturity: Mapping the Road to Resilience

August 15, 2019
5:30pm - 8:30pm
Harbour 60
60 Harbour St
Toronto, ON M5J 1B7
Registration

In order to optimize a company’s security strategy, organizations often focus on the people, partners, processes, and technology employed in their cyber security program. However, because of a disconnect between business objectives and security procedures, what is often overlooked is the inherent risk the organization faces based on compliance requirements, the amount and type of data they protect, and other business-specific factors. Understanding the difference between security activities and risk helps the smart CISO rationalize for security investments that address overall business risk and bolster an organization’s security strategy. Similarly, CISOs can benchmark their company’s security capabilities against industry peers and companies facing similar risks to make a case for further security investments. Cybersecurity works best when it extends across an organization and leverages cross-industry, outside expertise to expand the protection boundary against cyber threats. To make company-wide security maturity a reality, CISOs will need to cooperate with board members, legal teams, internal auditors, and third-party vendors to understand business needs and verify how security investments can help mitigate business risks. Join our conversation as we discuss what makes a business cyber resilient, the CISO’s role in achieving organizational security maturity, and the partnerships that allow it to be possible.

ISE® PRIVATE DINNER
Build or Buy? Integrating Advanced Capabilities into Your Security Program

August 21, 2019
5:30pm - 8:30pm
Harris’ Steakhouse
2100 Van Ness Avenue
San Francisco, CA 94109
Registration

Many enterprises have grown comfortable with the capabilities of their security programs. However, the fact remains that threat actors are evolving their techniques all the time, making it crucial for enterprises to adopt advanced security strategies to keep up with them. For instance, the market is at an inflection point between endpoint protection and EDR functions. For organizations to adopt advanced capabilities like EDR—including the investigation, decision making, and response actions associated with malicious or suspicious detection—security teams must first modernize the way they work. That involves prioritizing work and delegating decisions to security analysts with limited experience and tenure. Join our conversation as we discuss the talent and technology changes organizations should consider in the adoption of advanced adversary detection and hunting programs.

ISE® West Executive Forum and Awards 2019

The ISE® West Executive Forum and Awards 2019 will be held August 22, 2019 at the Westin St. Francis in San Francisco, CA. The ISE® West Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® PRIVATE DINNER
Security Maturity: Mapping the Road to Resilience

September 12, 2019
5:30pm - 8:30pm
Cocktail Hour
Cumberland Bar
JW Marriott Nashville
201 8th Ave S
Nashville, TN 37203

Dinner
Bourbon Steak
JW Marriott Nashville
201 8th Ave S, 34th floor
Nashville, TN 37203

In order to optimize a company’s security strategy, organizations often focus on the people, partners, processes, and technology employed in their cyber security program. However, because of a disconnect between business objectives and security procedures, what is often overlooked is the inherent risk the organization faces based on compliance requirements, the amount and type of data they protect, and other business-specific factors. Understanding the difference between security activities and risk helps the smart CISO rationalize for security investments that address overall business risk and bolster an organization’s security strategy. Similarly, CISOs can benchmark their company’s security capabilities against industry peers and companies facing similar risks to make a case for further security investments. Cybersecurity works best when it extends across an organization and leverages cross-industry, outside expertise to expand the protection boundary against cyber threats. To make company-wide security maturity a reality, CISOs will need to cooperate with board members, legal teams, internal auditors, and third-party vendors to understand business needs and verify how security investments can help mitigate business risks. Join our conversation as we discuss what makes a business cyber resilient, the CISO’s role in achieving organizational security maturity, and the partnerships that allow it to be possible.

Cybercon 2019
Cybersecurity: Identifying and Managing Risk From All Angles

September 24, 2019
Loudermilk Conference Center
40 Courtland St NE
Atlanta, GA 30303
More Information
Registration

Cybercon's 5th year brings together best-in-class experts to discuss identifying and managing cyber risk during an unprecedented era of technological transformation. AI, Blockchain and Autonomous Vehicles are just three examples of technologies that are transforming business operations. Evolving business operations also means new cyber threats must be identified and managed. At the same time, the private sector and government are grappling with creating a better regulatory landscape for cybersecurity and privacy to keep up with a 21st century digital economy.

Workshops are offered during the full day conference specifically aimed at business operations and focusing on managing and growing your business with cybersecurity concerns in mind. We believe learning is best done by participating in workshops that emphasize interactive content. Cybercon will have breach simulations where you engage in crisis management with incomplete facts under time pressure.

Cybercon is designed for General Counsels, Chief Financial Officers, business owners, cybersecurity experts, Chief Information Officers and Chief Information Security Officers to collaborate on the current cybersecurity challenges businesses face in this fast-paced environment. This year’s goal is to identify practical mitigation strategies that will have measurable impact on a business' risk profile and bottom line.

The ISE® Lions' Den & Jungle Lounge



September 25, 2019
Atlanta Tech Village | Atlanta, GA
Details

This September, TEN of security’s hottest emerging security companies have the courage to enter… The 2019 ISE® Lions' Den. The ISE® Lions represent the brightest minds in security and they are hungry for the next great emerging technology solutions. Each Gazelle will deliver their best pitch for the chance to earn $25,000 worth of prizes. Additionally, the Jungle Lounge will offer the opportunity to learn more about these emerging companies and a chance to network with a diverse group of Imformation Security Executives, investors, and other key members of the InfoSec community.

ISE® Northeast Executive Forum and Awards 2019

The ISE® Northeast Executive Forum and Awards 2019 will be held October 3, 2019 at the Westin Times Square in New York City. The ISE® Northeast Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® North America Leadership Summit and Awards 2019

The ISE® North America Leadership Summit and Awards 2019 will be held November 13-14, 2019 at the InterContinental Chicago Magnificent Mile in Chicago, IL. The ISE® North America Awards are held in conjunction with a two day Leadership Summit which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The two day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details