Upcoming Events

ISE® PRIVATE DINNER
Security Maturity: Mapping the Road to Resilience

April 24, 2019
5:30pm - 8:30pm
St. Elmo Steak House
127 S. Illinois St.
Indianapolis, IN 46225
Registration
wilcox_dustin

Dustin Wilcox
Vice President and Chief Information Security Officer
Anthem, Inc.
Biography

In order to optimize a company’s security strategy, organizations often focus on the people, partners, processes, and technology employed in their cyber security program. However, because of a disconnect between business objectives and security procedures, what is often overlooked is the inherent risk the organization faces based on compliance requirements, the amount and type of data they protect, and other business-specific factors. Understanding the difference between security activities and risk helps the smart CISO rationalize for security investments that address overall business risk and bolster an organization’s security strategy. Similarly, CISOs can benchmark their company’s security capabilities against industry peers and companies facing similar risks to make a case for further security investments. Cybersecurity works best when it extends across an organization and leverages cross-industry, outside expertise to expand the protection boundary against cyber threats. To make company-wide security maturity a reality, CISOs will need to cooperate with board members, legal teams, internal auditors, and third-party vendors to understand business needs and verify how security investments can help mitigate business risks. Join our conversation as we discuss what makes a business cyber resilient, the CISO’s role in achieving organizational security maturity, and the partnerships that allow it to be possible.

ISE® PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

April 30, 2019
5:30pm - 8:30pm
Lattanzi
361 W. 46th St.
New York, NY 10036
Registration
Vikrant Arora

Vikrant Arora
Chief Information Security Officer
Hospital for Special Surgery
ISE® North America Executive Award Finalist 2014 - Health Care Category
ISE® Northeast Executive of the Year Award Winner 2016
ISE® North America Executive Award Winner 2016 - Health Care Category

Biography

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and more often than not, with legitimate credentials from a compromised user, system, or device. According to the Verizon 2016 Data Breach Investigation Report, 70% of all insider and privilege misuse breaches took months or years to discover. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

2019 Charlotte-Metro ISSA Summit
From Coder to CISO, Developer to Director: How to Advance in Cybersecurity

May 2, 2019
1:15pm - 2:15pm
Charlotte Convention Center
501 S College Street
East Wing
Charlotte, NC 28202
Registration
More information

Moderator

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists

Robert Allen

Robert Allen
Senior Vice President, Chief Information Security Officer
Brighthouse Financial

James Hillier

James Hillier
Associate CIO & CISO
Central Piedmont Community College
Biography

Jim Nelms

Jim Nelms
Chief Information Security Officer
LabCorp

More panelists coming soon!

The cybersecurity industry is in desperate need of people with the skills and willingness to work in the trenches. Engineers, coders, analysts, developers, and others are crucial for any cybersecurity platform to succeed and flourish, but once security professionals find themselves in these positions, it can be hard for them to advance further up the ladder. It’s not a question of what position they would choose to advance to, but rather how they will advance into management and C-level roles. Success seems elusive only because it is rarely clear-cut, taking many forms and leading you down paths you don’t expect. That doesn’t mean you have to traverse the path alone, without any guidance to light your way, or stay stuck where you are. Join our conversation as leading security professionals discuss their insights, perspectives, and career experiences, exploring how they obtained their current positions and what advice they can give fellow security professionals about growing within the industry.

ISE® PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

May 7, 2019
5:30pm - 8:30pm
The Butcher’s Table
2121 Westlake Ave
Seattle, WA 98121
Registration
Chuck Markarian

Chuck Markarian
CISO
PACCAR
ISE® West Executive of the Year Award Winner 2018
ISE® West People's Choice Award Winner 2018

Biography

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and more often than not, with legitimate credentials from a compromised user, system, or device. According to the Verizon 2016 Data Breach Investigation Report, 70% of all insider and privilege misuse breaches took months or years to discover. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

ISE® PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

May 9, 2019
5:30pm - 8:30pm
Harbour 60
60 Harbour St
Toronto, ON M5J 1B7
Registration
<
Ed Amoroso

Manish Khera
Associate Partner - Cyber Security Incident
Response and Investigations Leader
EY - Ernst & Young Global Limited
Biography

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and more often than not, with legitimate credentials from a compromised user, system, or device. According to the Verizon 2016 Data Breach Investigation Report, 70% of all insider and privilege misuse breaches took months or years to discover. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

ISE® CENTRAL PRIVATE WELCOME DINNER
Build or Buy? Integrating Advanced Capabilities into Your Security Program

May 14, 2019
5:30pm - 8:30pm
Chamberlain's Steak and Chop House
5330 Belt Line Rd
Dallas, TX 75254
Registration
mills_carrie

Andrew Stokes
Assistant Director and Information Security Officer
Texas A&M University
Biography

Many enterprises have grown comfortable with the capabilities of their security programs. However, the fact remains that threat actors are evolving their techniques all the time, making it crucial for enterprises to adopt advanced security strategies to keep up with them. For instance, the market is at an inflection point between endpoint protection and EDR functions. For organizations to adopt advanced capabilities like EDR—including the investigation, decision making, and response actions associated with malicious or suspicious detection—security teams must first modernize the way they work. That involves prioritizing work and delegating decisions to security analysts with limited experience and tenure. Join our conversation as we discuss the talent and technology changes organizations should consider in the adoption of advanced adversary detection and hunting programs.

ISE® Central Executive Forum and Awards 2019

The ISE® Central Executive Forum and Awards 2019 will be held May 15, 2019 at The Westin Galleria Dallas in Dallas, TX. The ISE® Central Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISSA-LA Summit XI
Paying It Forward: Cultivating a New Cybersecurity Workforce

May 17, 2019
11:50am - 12:40pm
Annenberg Beach House
415 Pacific Coast Hwy
Santa Monica, CA 90402
Registration
More information

Moderator

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Panelists

Antova_Galina Galina Antova
Co-Founder
Claroty
Merritt_Marian Marian Merritt
Lead for Industry Engagement
National Initiative for Cybersecurity Education (NICE)
Biography
Nather_Wendy Wendy Nather
Head, Advisory CISOs for Duo Security
Cisco
Biography
Steffens_Jennifer

Jennifer Sunshine Steffens
CEO
IOActive
Biography

Women and minorities constitute half of technology users, making it only natural for current cybersecurity professionals to look to them as the next generation to carry the torch. Not only is it important to have a cybersecurity workforce that reflects the diversity of its tech users, but also it is a necessity to pursue at a time when both the growth and the talent shortage of the industry are at an all-time high. In order to obtain and mentor this next generation of skilled, ambitious young people, we must put in the work and pass on what we have learned to them. Join our conversation as our panel of leading security executives discuss how to develop and cultivate this next generation workforce and how to locate and inspire them. They will also share their personal success stories and insights on how to make new connections as well as tips for expanding your professional network.

ISSA-LA Summit XI
Building for the Future: Inspiring the Next Generation of Cybersecurity Professionals

May 17, 2019
2:30pm - 3:20pm
Annenberg Beach House
415 Pacific Coast Hwy
Santa Monica, CA 90402
Registration
More information

Presenter

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

It is important for young professionals to know they can have successful and impactful careers in the tech sector. However, to get more young minds interested in choosing careers in technology, the narrative needs to change to show that women and minorities have a future in the industry. Join Marci McCarthy as she discusses the importance of nurturing and growing the next generation of professionals in technology through mentorship opportunities, STEAM programs and other education opportunities.

ISE® PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

May 22, 2019
5:30pm - 8:30pm
Perry's Steakhouse & Grille - Austin Downtown
114 W. 7th Street #110
Austin, TX 78701
Registration

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and more often than not, with legitimate credentials from a compromised user, system, or device. According to the Verizon 2016 Data Breach Investigation Report, 70% of all insider and privilege misuse breaches took months or years to discover. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

ISE® PRIVATE DINNER
Counter Intrusion at Scale: A New Way to Become Cyber Resilient

May 30, 2019
5:30pm - 8:30pm
Lattanzi
361 W 46th St.
New York, NY 10036
Registration

Stopping intrusions inside trusted networks has been a fundamental tenet of information security and is a requirement for an enterprise to be cyber resilient. As a result, intrusion-detecting technologies often accompany firewalls and anti-virus (AV). Together, these tools are expected to keep cyberthreats from impacting an organization, especially in regard to preventing the loss of intellectual property, regulatory controlled data and operational capacity. The earlier these threats can be detected and stopped in the attack chain, especially those that evade controls, the more an organization can be considered cyber resilient. While both firewalls and AV have been reimagined in recent years, the technology of dealing with intrusions has lagged behind, struggling in the face of sophisticated actors, flawed technology and insufficient response resources. It is time to rearchitect how we solve the problem of intrusions by countering them at scale. To do so, organizations will need to consider employing a counter intrusion system that operates in all phases of the attack chain, using a hybrid approach with AI to connect different sets of data together no matter where a malicious attack could take place. Join our conversation as we discuss a blueprint for counter intrusion at scale in an enterprise’s data center, cloud and internal network that will also mitigate the burden of alerts on cyber defense teams and help enterprises become more cyber resilient.

WEBINAR: The Economic and Trade Mission at the Embassy of Israel
Why Relationships Matter: Bridging the Gap Between U.S. CISOs and Israeli Security Vendors

June 3, 2019
9:00am EST – 10:00am EST | 4:00pm IDT – 5:00pm IDT

Presenter

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Registration Center Coming Soon

In today’s cybersecurity-centric world, it’s no secret that U.S. CISOs are some of the busiest, most in-demand executives of all time, making appeals to the board for support and leading their teams through complex rollouts and management of their security programs. As well-funded cybersecurity programs have become a competitive and regulatory advantage in this era of security breaches and technological advancement, U.S. CISOs need to find the best security solutions that will help solve their enterprise’s unique challenges—and the best solutions may be beyond their borders. However, most have little time to meet with U.S.-based vendors, not to mention Israeli providers. Additionally, antiquated marketing tactics do not impress them and rarely lead to follow-up communications or meaningful interactions with vendors, let alone a sale. It’s no secret that Israeli vendors and U.S. CISOs need to make connections with each other, but while the solution is simple, carrying it out is much more complex: American CISOs desire relationships with people they can trust. But how do you start building those relationships along with the trust that’s necessary to go along with them? What’s the best way for Israeli vendors and U.S. CISOs to bridge the gap between the way they approach information security while also making the best first impression and fast-tracking deals together?

Rocky Mountain Information Security Conference 2019
Empower Cyber Security Leadership Through Emotional Intelligence

June 6, 2019
11:15am - 12:15pm
Colorado Convention Center
700 14th St
Denver, CO 80202
Register
More Information

Presenter

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Research has clearly shown that a person can have the best training in the world, a sharp, analytical mind and an endless supply of good ideas, but these alone will not make them a great leader. While these factors are all important, to be an effective leader, one must also possess a high degree of Emotional Intelligence (EI). This is especially true for information and cybersecurity professionals. Harnessing Emotional Intelligence ensures effective communication between InfoSec executives and their security teams as well as communication between security executives, stakeholders, teammates, lines of business leaders, customers, and board members. Strong working relationships and interpersonal skills are the keys to success in every area of human activity, especially for a cybersecurity professional looking to enhance their leadership skills and bring out the best in their teams. Join Marci McCarthy as she discusses how you can best utilize Emotional Intelligence to get ahead, learn how to be authentic to yourself, how to shape your conversations as a thought leader, and how to improve confidence and professionalism.

ISE® PRIVATE DINNER
Counter Intrusion at Scale: A New Way to Become Cyber Resilient

June 11, 2019
5:30pm - 8:30pm
The Palm
1750 Tysons Blvd
McLean, VA 22102
Registration

Stopping intrusions inside trusted networks has been a fundamental tenet of information security and is a requirement for an enterprise to be cyber resilient. As a result, intrusion-detecting technologies often accompany firewalls and anti-virus (AV). Together, these tools are expected to keep cyberthreats from impacting an organization, especially in regard to preventing the loss of intellectual property, regulatory controlled data and operational capacity. The earlier these threats can be detected and stopped in the attack chain, especially those that evade controls, the more an organization can be considered cyber resilient. While both firewalls and AV have been reimagined in recent years, the technology of dealing with intrusions has lagged behind, struggling in the face of sophisticated actors, flawed technology and insufficient response resources. It is time to rearchitect how we solve the problem of intrusions by countering them at scale. To do so, organizations will need to consider employing a counter intrusion system that operates in all phases of the attack chain, using a hybrid approach with AI to connect different sets of data together no matter where a malicious attack could take place. Join our conversation as we discuss a blueprint for counter intrusion at scale in an enterprise’s data center, cloud and internal network that will also mitigate the burden of alerts on cyber defense teams and help enterprises become more cyber resilient.

2019 Community College Cyber Summit
Becoming a Cybersecurity Enabler: How Community Colleges Can Bridge the Diversity and Workforce Gap

August 1, 2019
9:00am - 9:30am
Bossier Parish Community College
6220 E Texas St
Bossier City, LA 71111
Registration
More information

Keynote Speaker

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Leaders in the cybersecurity industry recognize that there is a lack of women and diversity among their teams. Even though women and minorities nearly comprise half of the general workforce, they only make up a small portion of cybersecurity professionals despite millions of jobs going unfilled and rising cyberattacks. In the past, employers have maintained a structured mindset about candidates’ qualifications to include four-year or advanced degrees, proven industry experience and like-minded thinking. However, due to the shortage of qualified cybersecurity talent, we are experiencing a paradigm shift in how we view these hiring requirements. We now need candidates who are gamechangers, who can bring much needed soft skills, passions and differing opinions that can take team thinking to the next level. With their various perspectives, women and minorities must be encouraged to enter the field as early as possible, but it’s also crucial that they maintain a passion to learn and succeed by cultivating the necessary skills to stay there. Fortunately, they can obtain technical skills and certifications by pursuing specialized training, work-study programs and apprenticeships, such as those offered by cyber boot camps, technical schools and community colleges. Currently, though, community colleges and similar establishments experience challenges with marketing themselves as security partners who enable cybersecurity professional development. To connect upcoming, diverse talent with employers who need them, community colleges can adapt and enhance the way they interact with both groups. Join us as we share our insights about the challenges community colleges face in becoming cybersecurity enablers, facilitating job readiness and contributing to solve the industry’s diversity and workforce shortage.

ISE® VIP PRIVATE DINNER
Improving Visibility for Effective Threat Detection and Response

August 6, 2019
5:30pm - 8:30pm
Charlie Palmer Steak at Four Seasons
3960 S Las Vegas Blvd
Las Vegas, NV 89119
Registration

Modern targeted attacks are designed to stay under the radar by moving in small, but deliberate steps over long periods of time and more often than not, with legitimate credentials from a compromised user, system, or device. According to the Verizon 2016 Data Breach Investigation Report, 70% of all insider and privilege misuse breaches took months or years to discover. Safeguarding against these threats requires a multilayered security strategy that includes the ability to detect and combat threats that have evaded traditional rule and signature-based solutions, while also using legitimate credentials of compromised employees, contractors, partners or IoT devices. Join our conversation as we discuss how you can leverage granular access control and visibility and combine this with automated attack detection for a more proactive and timely approach to security.

ISE® VIP PROGRAM - THE SUPERCAR DRIVING EXPERIENCE
AppSec That Won’t Slow You Down

August 7, 2019
5:30pm - 8:30pm
Las Vegas Motor Speedway
Exotics Racing Racetrack
7065 Speedway Blvd
Las Vegas, NV 89115
Registration

Saltworks Security Executive Speaker:

hurst_dennis

Dennis Hurst
Founder
Saltworks Security

ISE® VIP Host

Marci McCarthy

Marci McCarthy
CEO and President of T.E.N.
CEO and Chairman of ISE® Talent
Biography

Today’s market demands will not let software development wait for security to catch up. Even if you have the right team, expertise, tools, and training in place to achieve your business goals, it won’t matter if your approach to application security is outdated. Like an airbag that is installed after a car is driven off the lot, AppSec cannot wait to be applied at later stages. Instead, security teams will achieve the most out of AppSec if they focus on weaving customized security into the DNA of each unique software development lifecycle. In order to achieve this, they will need to have an AppSec program in place that is ongoing, where DevOps teams can maintain security and necessary technologies can continue to implement it moving forward—all at optimal speeds. Join our conversation as we discuss how companies can create and manage AppSec programs that run as predictably, effectively, and measurably as a well-oiled machine.

Transportation will be provided to Las Vegas Motor Speedway from the Mandalay Bay Hotel starting at 4:30 p.m. Please meet at the Mandalay Bay Tour Bus Lobby and shuttle bus service will be provided to the event. The last shuttle bus will leave Mandalay Bay at 5:20 p.m.

ISE® West Executive Forum and Awards 2019

The ISE® West Executive Forum and Awards 2019 will be held August 22, 2019 at the Westin St. Francis in San Francisco, CA. The ISE® West Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® Northeast Executive Forum and Awards 2019

The ISE® Northeast Executive Forum and Awards 2019 will be held October 3, 2019 at the Westin Times Square in New York City. The ISE® Northeast Awards are held in conjunction with a one day Executive Forum which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The one day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details

ISE® North America Leadership Summit and Awards 2019

The ISE® North America Leadership Summit and Awards 2019 will be held November 13-14, 2019 at the InterContinental Chicago Magnificent Mile in Chicago, IL. The ISE® North America Awards are held in conjunction with a two day Leadership Summit which includes keynote speakers, interactive roundtables moderated by the CISOs and VPs of participating companies, and hot topic panel discussions. The two day program offers the opportunity to meet with peers and leading IT executives from across the region to discuss and share insights into today's issues and solutions. Details